24h | 7d | 30d

Overview

  • Go toolchain
  • cmd/cgo
  • cmd/cgo

05 Feb 2026
Published
05 Feb 2026
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.

Statistics

  • 1 Post
  • 29 Interactions

Last activity: 15 hours ago

Bluesky

Profile picture fallback
๐ŸŽŠ Go 1.25.7 and 1.24.13 are released! ๐Ÿ” Security: Includes a security fix for cmd/cgo (CVE-2025-61732) and an update for crypto/tls (CVE-2025-68121). ๐Ÿ”ˆ Announcement: https://groups.google.com/g/golang-announce/c/K09ubi9FQFk/m/oQiZUMk9AQAJ ๐Ÿ“ฆ Download: https://go.dev/dl/#go1.25.7 #golang
  • 5
  • 24
  • 0
  • 15h ago

Overview

  • OpenSSL
  • OpenSSL

27 Jan 2026
Published
29 Jan 2026
Updated

CVSS
Pending
EPSS
0.66%

KEV

Description

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue. OpenSSL 1.1.1 and 1.0.2 are not affected by this issue.

Statistics

  • 1 Post

Last activity: 5 hours ago

Bluesky

Profile picture fallback
The latest update for #CyCognito includes "Emerging Threat: CVE-2026-24858 โ€“ FortiCloud SSO Authentication Bypass" and "Emerging Threat: CVE-2025-15467 โ€“ OpenSSL CMS AuthEnvelopedData Stack-Based Buffer Overflow". #cybersecurity #AttackSurfaceManagement #EASM https://opsmtrs.com/44Srq0X
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Pending

27 Nov 2024
Published
03 Nov 2025
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture fallback
โš ๏ธ URGENT for Developers & SysAdmins: Critical vulnerabilities (CVE-2024-53920, CVE-2025-1244) patched in Emacs for #Ubuntu 20.04/22.04/24.04 LTS. Read more: ๐Ÿ‘‰ tinyurl.com/3r76skcy #Security
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Red Hat
  • Red Hat Enterprise Linux 7 Extended Lifecycle Support
  • emacs

12 Feb 2025
Published
24 Nov 2025
Updated

CVSS
Pending
EPSS
0.21%

KEV

Description

A command injection flaw was found in the text editor Emacs. It could allow a remote, unauthenticated attacker to execute arbitrary shell commands on a vulnerable system. Exploitation is possible by tricking users into visiting a specially crafted website or an HTTP URL with a redirect.

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture fallback
โš ๏ธ URGENT for Developers & SysAdmins: Critical vulnerabilities (CVE-2024-53920, CVE-2025-1244) patched in Emacs for #Ubuntu 20.04/22.04/24.04 LTS. Read more: ๐Ÿ‘‰ tinyurl.com/3r76skcy #Security
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Kubernetes
  • ingress-nginx

03 Feb 2026
Published
05 Feb 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.10%

KEV

Description

A security issue was discovered in ingress-nginxย where the `nginx.ingress.kubernetes.io/auth-method` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

Statistics

  • 2 Posts

Last activity: 9 hours ago

Bluesky

Profile picture fallback
๐Ÿ”ด CVE-2026-1580 and CVE-2026-24512 allow for config #injection via the "nginx.ingress.kubernetes.io/auth-method" ingress annotation and the "rules.http.paths.path" ingress field, respectively. ๐ŸŸก CVE-2026-24514 is a #DoS in the ingress-nginx admission controller, triggered by sending large requests.
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
โณ With EOL in March, Ingress #NGINX has 4 newly disclosed vulnerabilities: #CVE-2026-1580, CVE-2026-24512, CVE-2026-24513, and CVE-2026-24514. We recommend that you migrate to F5's NGINX Ingress: buff.ly/vqTJvPK If you canโ€™t migrate yet, update to v1.14.3. More details on each CVE below.
  • 0
  • 0
  • 0
  • 9h ago
Showing 31 to 35 of 35 CVEs