Overview
Description
Statistics
- 26 Posts
- 9 Interactions
Fediverse
⚠️Alerte CERT-FR⚠️
La vulnérabilité CVE-2026-42897 affecte Microsoft Exchange et permet une injection de code indirecte à distance (XSS) ainsi qu'un contournement de la politique de sécurité.
Elle est activement exploitée.
Microsoft describes this security flaw (CVE-2026-42897) as a spoofing vulnerability affecting up-to-date Exchange Server 2016, Exchange Server 2019, and Exchange Server Subscription Edition (SE) software. https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-exchange-zero-day-flaw-exploited-in-attacks/
Kritische Sicherheitslücke CVE-2026-42897 bedroht Microsoft Exchange Server 2016, 2019 und Subscription Edition. Angreifer können über OWA JavaScript-Code ausführen. #Microsoft #ITSec https://winfuture.de/news,158719.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia
Exchange Server – CVE-2026-42897 : cette faille zero-day est déjà exploitée ! https://www.it-connect.fr/exchange-server-cve-2026-42897-cette-faille-zero-day-est-deja-exploitee/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft #Exchange
High critical cross-site scripting (CSS) vuln in Microsoft Exchange Server 2016 being used in the wild
📰 Microsoft Exchange Zero-Day Under Active Attack, Mitigations Deployed Automatically
📢 Microsoft confirms a new Exchange Server zero-day (CVE-2026-42897) is actively exploited! The XSS flaw in OWA affects on-prem servers. Mitigations are being deployed automatically via the EM service. Check your systems! 🛡️ #Exchange #Zeroday
🌐 cyber[.]netsecops[.]io
Hups, a new exchange Zero Day just dropped.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42897
Mitigation available. No Patch.
Bluesky
Overview
Description
Statistics
- 10 Posts
- 141 Interactions
Fediverse
Regarding CVE-2026-42945 in nginx - no modern (or even old) Linux distribution runs nginx without ASLR.
The way the PoC exploit works is they spawn nginx like this:
> exec setarch x86_64 -R /nginx-src/build/nginx -p /app -c /app/nginx.conf
Setarch -R disables ASLR. I've had a look through Github and I can't find any other software which actually does this for nginx either.
So, cool, sweet technical vuln - it's valid - but the RCE apocalypse ain't coming.
Une faille vieille de 18 ans dans Nginx, un PoC public, beaucoup de bruit… mais qui est vraiment concerné ?
🚨 Nouvelle faille critique sur NGINX : CVE-2026-42945 (Z)
Une vulnérabilité dans ngx_http_rewrite_module peut provoquer un crash des workers NGINX, voire une exécution de code si l’ASLR est désactivé.
👉 https://security-tracker.debian.org/tracker/CVE-2026-42945
I don't wanna ruin your Friday, but nginx has a serious CVE with a rating of 9.2, and you should patch or mitigate it asap.
The CVE is an unauthenticated http request that can lead to a deterministic buffer overflow and remote code execution.
@beyondmachines1
Meanwhile, not completely off the hook people, you can check the vul updates via: https://security-tracker.debian.org/tracker/CVE-2026-42945
Bluesky
Overview
Description
Statistics
- 23 Posts
- 12 Interactions
Fediverse
Why are we even bothering, again, if the "giants" of cyber aren't bothering? https://www.rapid7.com/blog/post/ve-cve-2026-20182-critical-authentication-bypass-cisco-catalyst-sd-wan-controller-fixed/
CISA said all federal agencies have until Sunday to patch CVE-2026-20182, the latest Cisco SD-WAN bug exploited by nation-state actors.
It was discovered by Rapid7, which said it "behaves like a master key."
https://therecord.media/cisa-orders-all-federal-agencies-to-patch-cisco-sd-wan-bug
📰 Cisco Scrambles to Patch Critical 10.0 CVSS Zero-Day in SD-WAN Under Active Attack
🚨 CRITICAL ZERO-DAY: Cisco warns of active exploitation of a 10.0 CVSS auth bypass flaw (CVE-2026-20182) in Catalyst SD-WAN. Attackers can gain full admin access. CISA has issued a directive to patch immediately! ⚠️ #CyberSecurity #ZeroDay #Cisco
🌐 cyber[.]netsecops[.]io
Bluesky
Overview
Description
Statistics
- 7 Posts
- 118 Interactions
Fediverse
Local file exposure #vulnerability in linux kernels (CVE-2026-46333):
https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn
Apparently this issue was already identified in 2020 but wasn't fixed back then.
Mitigation:
- runtime:
sudo sysctl -w kernel.yama.ptrace_scope=2
- To make the mitigation persistent:
echo "kernel.yama.ptrace_scope=2" | sudo tee /etc/sysctl.d/01-harden-ptrace.conf
WARNING: This mitigation may break existing functionality. Test before deploying.
WARNING 2: While this mitigation does block the currently existing PoC, it may not prevent other attack vectors exploiting this vulnerability.
ssh-keysign-pwn is the fourth local-root Linux kernel disclosure in roughly two weeks. (But who's counting?)
AlmaLinux 9 and 10 are both vulnerable. AlmaLinux 8 is not exploitable with the current public PoCs, but is getting the patch as well.
Patched kernel versions are available for testing now: https://almalinux.org/blog/2026-05-15-ssh-keysign-pwn-cve-2026-46333/
#Debian has released kernel update that fixes the CVE-2026-46333 (ssh-keysign-pwn) vulnerability.
Debian stable (trixie) kernel update: https://lists.debian.org/debian-security-announce/2026/msg00185.html
Debian oldstable (bookworm) kernel update: https://lists.debian.org/debian-security-announce/2026/msg00186.html
What a week… #Linux ssh-keysign-pwn (CVE-2026-46333):
Mitigation (breaks strace, gdb etc)
$ sudo sysctl -w kernel.yama.ptrace_scope=3
$ echo 'kernel.yama.ptrace_scope = 3' | sudo tee /etc/sysctl.d/99-ssh-keysign-pwn.conf
If you are changing sysctl kernel.yama.ptrace_scope because of the ssh-keygen-pwn exploit https://almalinux.org/blog/2026-05-15-ssh-keysign-pwn-cve-2026-46333/ on fedora/rhel, be aware that your sysctl will be competing with /usr/lib/sysctl.d/10-default-yama-scope.conf so better change it in that file.
Overview
Description
Statistics
- 6 Posts
- 2 Interactions
Fediverse
Fragnesia: una nuova vulnerabilità di escalation dei privilegi nel kernel Linux
Scoperta una nuova falla di sicurezza nel kernel Linux, chiamata Fragnesia (CVE-2026-46300), che consente a un utente locale non privilegiato di ottenere i privilegi di amministratore (root) su una distribuzione GNU/Linux.
@linux #UnoLinux #gnulinux #linux
Oh and while we are here, Linux fans, please tell me you have updated your machine for "Fragnesia (CVE-2026-46300)", right… right!?
Linux distributions are alerting users to a newly disclosed kernel vulnerability that could allow local attackers to escalate privileges to root.
The flaw, dubbed Fragnesia and tracked as CVE-2026-46300, enables unprivileged users to obtain root access by overwriting critical system files.
Most Linux distributions are impacted, and vendors have begun rolling out security patches.
Bluesky
Overview
Description
Statistics
- 1 Post
- 25 Interactions
Fediverse
NOTICE: Shortcuts broke its x-callback-url implementation.
Seems to be part of the security fix for CVE-2026-28993 included in iOS 26.5/18.7.9, macOS 26.5/15.7.7/14.8.7. On these OSes, it’s no longer possible to get a result from a Shortcut call via `x-success` callback, you will *always* get an x-error.
In theory, per the CVE, Shortcuts should offer a permissions prompt, not just fail.
Apple Folks: FB22785648
Overview
Description
Statistics
- 2 Posts
Overview
- Microsoft
- Windows 11 version 22H3
Description
Statistics
- 2 Posts
Fediverse
CVE-2026-41096 普通に刺さりそうで怖いな
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096
Bluesky
Overview
Description
Statistics
- 1 Post
- 4 Interactions
Fediverse
CVE-2026-43898: Critical SandboxJS Escape (CVSS 10.0) Enables Full Host Takeover via npm
#CyberSecurity
https://securebulletin.com/cve-2026-43898-critical-sandboxjs-escape-cvss-10-0-enables-full-host-takeover-via-npm/
Overview
- Fortinet
- FortiSandbox Cloud
Description
Statistics
- 1 Post
- 4 Interactions
Fediverse
CVE-2026-26083: Critical Fortinet FortiSandbox Flaw Allows Unauthenticated Remote Code Execution — Patch Now
#CyberSecurity
https://securebulletin.com/cve-2026-26083-critical-fortinet-fortisandbox-flaw-allows-unauthenticated-remote-code-execution-patch-now/