Overview
- Microsoft
- .NET 10.0
12 May 2026
Published
13 May 2026
Updated
CVSS v3.1
MEDIUM (4.3)
EPSS
0.08%
KEV
Description
A tampering vulnerability exists when .NET Core improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could write arbitrary files and directories to certain locations on a vulnerable system. However, an attacker would have limited control over the destination of the files and directories.
To exploit the vulnerability, an attacker must send a specially crafted file to a vulnerable system.
The security update fixes the vulnerability by ensuring .NET Core properly handles files.
Statistics
- 1 Post
- 1 Interaction
Last activity: 2 hours ago
Fediverse
via @dotnet : .NET and .NET Framework May 2026 servicing releases updates
https://ift.tt/nkE2LOt
#dotnet #dotnetframework #May2026 #servicingupdates #securityupdates #cve202632177 #cve202635433 #cve202632175 #cve202642899 #release8 #dotnet10 #dotnet9 #dotnet8 #a…
Overview
- Microsoft
- .NET 10.0
12 May 2026
Published
13 May 2026
Updated
CVSS v3.1
HIGH (7.5)
EPSS
0.04%
KEV
Description
Loop with unreachable exit condition ('infinite loop') in ASP.NET Core allows an unauthorized attacker to deny service over a network.
Statistics
- 1 Post
- 1 Interaction
Last activity: 2 hours ago
Fediverse
via @dotnet : .NET and .NET Framework May 2026 servicing releases updates
https://ift.tt/nkE2LOt
#dotnet #dotnetframework #May2026 #servicingupdates #securityupdates #cve202632177 #cve202635433 #cve202632175 #cve202642899 #release8 #dotnet10 #dotnet9 #dotnet8 #a…
Overview
Description
In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the metaphone() function in ext/standard/metaphone.c uses a signed int variable to track the current position within the input string. If a string longer than 2,147,483,647 bytes is passed, a signed integer overflow occurs, resulting in undefined behavior. This can lead to an out-of-bounds read, causing a segmentation fault or access to unrelated memory, and may affect the availability of the PHP process.
Statistics
- 2 Posts
Last activity: 4 hours ago
Bluesky
🛡️ Security updates:
Modules:
- php-7.3.33-20
- php-7.2.34-27
Software Collections:
- php73-php-7.3.33-20
- php72-php-7.2.34-27
With recent important security fixes backported from 8.2.31 (CVE-2026-6735, CVE-2026-6722, CVE-2026-7261, CVE-2026-7262, CVE-2026-7568)
Overview
Description
In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, 8.5.* before 8.5.6, due to improper sanitation of user data, it allows an attacker to compose an URL, which will cause the target to execute arbitrary JavaScript code (XSS) on the target's machine when the target is viewing the PHP-FPM status page.
Statistics
- 2 Posts
Last activity: 4 hours ago
Bluesky
🛡️ Security updates:
Modules:
- php-7.3.33-20
- php-7.2.34-27
Software Collections:
- php73-php-7.3.33-20
- php72-php-7.2.34-27
With recent important security fixes backported from 8.2.31 (CVE-2026-6735, CVE-2026-6722, CVE-2026-7261, CVE-2026-7262, CVE-2026-7568)
Overview
- PHP Group
- PHP
- soap
10 May 2026
Published
11 May 2026
Updated
CVSS v4.0
MEDIUM (6.3)
EPSS
0.04%
KEV
Description
In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, when SoapServer is configured with SOAP_PERSISTENCE_SESSION, the handler object is persisted across requests via session storage. However, in the case SOAP requests results in an error, the persistance is handled incorrectly, resulting in freeing the object while keeping a pointer to it, which may lead to use-after-free. This may lead to memory corruption, information disclosure, or process crashes, with confidentiality, integrity, and availability impact on the vulnerable system.
Statistics
- 2 Posts
Last activity: 4 hours ago
Bluesky
🛡️ Security updates:
Modules:
- php-7.3.33-20
- php-7.2.34-27
Software Collections:
- php73-php-7.3.33-20
- php72-php-7.2.34-27
With recent important security fixes backported from 8.2.31 (CVE-2026-6735, CVE-2026-6722, CVE-2026-7261, CVE-2026-7262, CVE-2026-7568)
Overview
- PHP Group
- PHP
- soap
10 May 2026
Published
12 May 2026
Updated
CVSS v4.0
CRITICAL (9.5)
EPSS
0.23%
KEV
Description
In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the SOAP extension's object deduplication mechanism stores pointers to PHP objects in a global map without incrementing their reference counts. When an apache:Map node contains duplicate keys, processing the second entry overwrites the first in the temporary result map, freeing the original PHP object while its stale pointer remains in the map. A subsequent href reference to the freed node can copy the dangling pointer into the result. As PHP string allocations can reclaim the freed memory region, an attacker with control over the SOAP request body can exploit this use-after-free to achieve remote code execution.
Statistics
- 2 Posts
Last activity: 4 hours ago
Bluesky
🛡️ Security updates:
Modules:
- php-7.3.33-20
- php-7.2.34-27
Software Collections:
- php73-php-7.3.33-20
- php72-php-7.2.34-27
With recent important security fixes backported from 8.2.31 (CVE-2026-6735, CVE-2026-6722, CVE-2026-7261, CVE-2026-7262, CVE-2026-7568)
Overview
- PHP Group
- PHP
- soap
10 May 2026
Published
11 May 2026
Updated
CVSS v4.0
LOW (2.9)
EPSS
0.08%
KEV
Description
In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, when a SOAP server has a typemap configured, the decoding process contains a mistake which checks the wrong variable in case of missing value element. This leads to dereferences a NULL pointer, causing a segmentation fault. This allows a remote unauthenticated attacker to crash the PHP SOAP server process, resulting in denial of service.
Statistics
- 2 Posts
Last activity: 4 hours ago
Bluesky
🛡️ Security updates:
Modules:
- php-7.3.33-20
- php-7.2.34-27
Software Collections:
- php73-php-7.3.33-20
- php72-php-7.2.34-27
With recent important security fixes backported from 8.2.31 (CVE-2026-6735, CVE-2026-6722, CVE-2026-7261, CVE-2026-7262, CVE-2026-7568)
Overview
- Apache Software Foundation
- Apache Tomcat
12 May 2026
Published
13 May 2026
Updated
CVSS
Pending
EPSS
0.02%
KEV
Description
Exposure of HTTP Authentication Header to unexpected hosts during WebSocket authentication vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.2 through 9.0.117, from 8.5.24 through 8.5.100, from 7.0.83 through 7.0.109.
Users are recommended to upgrade to version 11.0.22, 10.1.55 or 9.0.118, which fix the issue.
Statistics
- 1 Post
Last activity: 21 hours ago
Overview
- Apache Software Foundation
- Apache Tomcat
12 May 2026
Published
12 May 2026
Updated
CVSS
Pending
EPSS
0.04%
KEV
Description
Improper Input Validation vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117, from 10.0.0-M1 through 10.0.27.
Older, end of support versions may also be affected.
Users are recommended to upgrade to version [FIXED_VERSION], which fixes the issue.
Statistics
- 1 Post
Last activity: 21 hours ago
Overview
- Apache Software Foundation
- Apache Tomcat
12 May 2026
Published
13 May 2026
Updated
CVSS
Pending
EPSS
0.02%
KEV
Description
Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117.
Older, unsupported versions may also be affected.
Users are recommended to upgrade to version [FIXED_VERSION], which fixes the issue.
Statistics
- 1 Post
Last activity: 21 hours ago