24h | 7d | 30d

Overview

  • Microsoft
  • Microsoft Malware Protection Engine

20 May 2026
Published
21 May 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.04%

KEV

Description

Heap-based buffer overflow in Microsoft Defender allows an unauthorized attacker to execute code over a network.

Statistics

  • 4 Posts
  • 252 Interactions

Last activity: 19 hours ago

Fediverse

Profile picture fallback

msrc.microsoft.com/update-guid

One job. You had one job.

Heap-based buffer overflow in Microsoft Defender allows an unauthorized attacker to execute code over a network.

  • 81
  • 134
  • 0
  • 22h ago
Profile picture fallback
  • 13
  • 24
  • 1
  • 20h ago

Bluesky

Profile picture fallback
[some-subscribed-rss] New Post: "No way to prevent this" say users of only language where this regularly happens, by https://xeiaso.net/shitposts/no-way-to-prevent-this/CVE-2026-45584/
  • 0
  • 0
  • 0
  • 19h ago

Overview

  • Linux
  • Linux

15 May 2026
Published
21 May 2026
Updated

CVSS v3.1
HIGH (7.1)
EPSS
0.01%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: ptrace: slightly saner 'get_dumpable()' logic The 'dumpability' of a task is fundamentally about the memory image of the task - the concept comes from whether it can core dump or not - and makes no sense when you don't have an associated mm. And almost all users do in fact use it only for the case where the task has a mm pointer. But we have one odd special case: ptrace_may_access() uses 'dumpable' to check various other things entirely independently of the MM (typically explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for threads that no longer have a VM (and maybe never did, like most kernel threads). It's not what this flag was designed for, but it is what it is. The ptrace code does check that the uid/gid matches, so you do have to be uid-0 to see kernel thread details, but this means that the traditional "drop capabilities" model doesn't make any difference for this all. Make it all make a *bit* more sense by saying that if you don't have a MM pointer, we'll use a cached "last dumpability" flag if the thread ever had a MM (it will be zero for kernel threads since it is never set), and require a proper CAP_SYS_PTRACE capability to override.

Statistics

  • 6 Posts
  • 191 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

EVERYONE GETS AN LPE

Windows:
(#CVE_2026_33825)
(#CVE_2026_41091)
(#CVE_2026_45498)
(#CVE_2026_27910):

Linux:
(#CVE_2026_31431)
(#CVE_2026_46333)

FreeBSD:
(#CVE_2026_45250)
(#CVE_2026_7270)

  • 105
  • 69
  • 0
  • 1h ago
Profile picture fallback

Logic bug in the kernel's __ptrace_may_access() function
(CVE-2026-46333)

cdn2.qualys.com/advisory/2026/

  • 2
  • 5
  • 0
  • Last hour
Profile picture fallback

Just pushed a fresh round of updates to Jambula OS Linux including fixes and mitigations for:

✅ dirty frag (CVE-2026-43284/CVE-2026-43500)
✅ fragnesia (CVE-2026-46300)
✅ ssh-keysign-pwn (CVE-2026-46333)

Are you running a Raspberry Pi 5? This is a great time to try Jambula OS - a lightweight, secure, CLI-focused Linux platform built around a local-first service architecture.

Download image & learn more at:

jambula.org

#JambulaOS #Linux #OpenSource #RaspberryPi #SmartHome #HomeLab

  • 5
  • 5
  • 0
  • 1h ago

Bluesky

Profile picture fallback
🔴 CVE-2026-46333 — Linux Kernel ptrace Flaw, Full Advisory Released Qualys today published the complete advisory for a nine-year-old Linux kernel flaw that lets any local unprivileged user. Read Detail- www.cyberkendra.com/2026/05/nine... #linux #security #vulnerability #infosec
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
CVE-2026-46333: Local Root Privilege Escalation and Credential Disclosure in the Linux Kernel ptrace Path
  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback
这是今天(2026年5月21日)早上: 这是今天晚上: 也不知道说什么了,直接看吧。 Linux 第4漏洞:CVE-2026-46333(7.1分) 这是继 Copy Fail(4 月 29 日)、Dirty Frag(5 月 7 日)和 Fragnesia(5 月 13
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Drupal
  • Drupal core

20 May 2026
Published
21 May 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Drupal Drupal core allows SQL Injection. This issue affects Drupal core: from 8.9.0 before 10.4.10, from 10.5.0 before 10.5.10, from 10.6.0 before 10.6.9, from 11.0.0 before 11.1.10, from 11.2.0 before 11.2.12, from 11.3.0 before 11.3.10.

Statistics

  • 6 Posts
  • 1 Interaction

Last activity: 7 hours ago

Fediverse

Profile picture fallback

Si votre CMS est un , ou si vous connaissez quelqu’un qui administre un site Drupal : c’est le moment de vérifier la version.

La faille CVE-2026-9082 touche Drupal Core avec base PostgreSQL : injection SQL critique, exploitable sans compte, pouvant mener à fuite de données, élévation de privilèges voire RCE selon le contexte.

À corriger en priorité :
Drupal 10.5 → 10.5.10
Drupal 10.6 → 10.6.9
Drupal 11.2 → 11.2.12
Drupal 11.3 → 11.3.10

MySQL/MariaDB ne semblent pas concernés par cette SQLi, mais les mises à jour incluent aussi Symfony/Twig : patch recommandé pour tout le monde.
👇
drupal.org/sa-core-2026-004

"Drupal – CVE-2026-9082 : cette faille critique de type injection SQL menace les sites Web"
👇
it-connect.fr/drupal-cve-2026-

🔍 (à noter la diff entre estimation LLM VLAI et attribution CVSS officielle en Medium)
👇
vulnerability.circl.lu/vuln/CV

💬
⬇️
infosec.pub/

  • 1
  • 0
  • 0
  • 12h ago
Profile picture fallback

🚨 Drupal sites using PostgreSQL face a highly critical SQL injection vuln (CVE-2026-9082), risking RCE & data exposure. Patch versions 11.3, 11.2, 10.6, 10.5.x ASAP. Update Symfony & Twig too. No active exploitation yet. radar.offseq.com/threat/drupal

  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback

Patch immediately before public exploits emerge.

drupal.org/sa-core-2026-004

Affected:

- 8.9.0 , < 10.4.10
- 10.5.0 , < 10.5.10
- 10.6.0 , < 10.6.9
- 11.0.0 , < 11.1.10
- 11.2.0 , < 11.2.12
- 11.3.0 , < 11.3.10

CVE-2026-9082 - Highly critical - SQL Injection
CVE-2026-8495 - Missing Authorization
CVE-2026-8493 - XSS
CVE-2026-8492
CVE-2026-8491

#Drupal #PHP #CyberSecurity #Infosec #CVE #WebSecurity #PostgreSQL #SqlInjection #PrivilegeEscalation #XSS

  • 0
  • 0
  • 0
  • 22h ago

Bluesky

Profile picture fallback
Drupal Core patched CVE-2026-9082, a critical PostgreSQL-only flaw that could enable SQL injection, privilege escalation, info disclosure, and even remote code execution on affected sites. #Drupal #PostgreSQL #CVE20269082
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
CVE-2026-9082 enables unauthenticated arbitrary SQL injection on Drupal sites using PostgreSQL, potentially leading to privilege escalation and remote code execution.
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Microsoft
  • Microsoft Defender Antimalware Platform

20 May 2026
Published
21 May 2026
Updated

CVSS v3.1
MEDIUM (4.0)
EPSS
2.27%

Description

Microsoft Defender Denial of Service Vulnerability

Statistics

  • 8 Posts
  • 179 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

EVERYONE GETS AN LPE

Windows:
(#CVE_2026_33825)
(#CVE_2026_41091)
(#CVE_2026_45498)
(#CVE_2026_27910):

Linux:
(#CVE_2026_31431)
(#CVE_2026_46333)

FreeBSD:
(#CVE_2026_45250)
(#CVE_2026_7270)

  • 105
  • 69
  • 0
  • 1h ago
Profile picture fallback

I thought there was a bug in EPSS since I couldn't see the score for CVE-2026-45498, but... it's just too new. Released today. Rare not-Patch-Tuesday CVE release for Microsoft. Wonder what's up.

(It's a Microsoft Defender DoS, which, sure, seems bad for an A/V thing, but... it's just DoS according to the CVE and KB.)

(Also the KB says there's no exploitation, but CISA KEV says otherwise... curiouser and curiouser.)

  • 1
  • 1
  • 0
  • 23h ago
Profile picture fallback

Two #Microsoft Defender #vulnerabilities actively exploited. One grants full SYSTEM access. #CISA has a June 3 federal deadline. Here is what to check. #CVE-2026-41091 allows privilege #escalation to #SYSTEM level. #CVE-2026-45498 is a denial-of-service bug that can take Defender offline. Both are on CISA's KEV catalog with a federal patch deadline of #June 3.
Source : reddit.com/r/cybersecurity/com

  • 0
  • 0
  • 0
  • 3h ago

Bluesky

Profile picture fallback
Microsoft Defender vulnerabilities exploited in the wild (CVE-2026-41091, CVE-2026-45498) 📖 Read more: www.helpnetsecurity.com/2026/05/21/m... #cybersecurity #cybersecuritynews #vulnerability #vulnerabilitydisclosure #Windows @microsoft.com
  • 1
  • 0
  • 0
  • 7h ago
Profile picture fallback
Microsoft patched two exploited zero-days in Defender: CVE-2026-41091, a local privilege escalation to SYSTEM, and CVE-2026-45498, a denial-of-service flaw. CISA added both to KEV. #MicrosoftDefender #CVE202641091 #CVE202645498
  • 1
  • 0
  • 0
  • 7h ago
Profile picture fallback
Microsoft patched two actively exploited Defender zero-days, CVE-2026-41091 and CVE-2026-45498. One can grant SYSTEM privileges, while the other can trigger DoS on unpatched Windows devices. #MicrosoftDefender #CISA #Windows الأمنية
  • 1
  • 0
  • 0
  • 6h ago
Profile picture fallback
~Cisa~ CISA added seven actively exploited vulnerabilities to the KEV catalog, urging immediate remediation. - IOCs: CVE-2026-41091, CVE-2026-45498 - #CISA #KEV #ThreatIntel #Vulnerability
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
Two actively exploited vulnerabilities in Microsoft Defender, CVE-2026-41091 and CVE-2026-45498, have been patched according to an advisory dated May 21, […]
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Microsoft
  • Microsoft Malware Protection Engine

20 May 2026
Published
21 May 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
12.10%

Description

Improper link resolution before file access ('link following') in Microsoft Defender allows an authorized attacker to elevate privileges locally.

Statistics

  • 7 Posts
  • 177 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

EVERYONE GETS AN LPE

Windows:
(#CVE_2026_33825)
(#CVE_2026_41091)
(#CVE_2026_45498)
(#CVE_2026_27910):

Linux:
(#CVE_2026_31431)
(#CVE_2026_46333)

FreeBSD:
(#CVE_2026_45250)
(#CVE_2026_7270)

  • 105
  • 69
  • 0
  • 1h ago
Profile picture fallback

Two #Microsoft Defender #vulnerabilities actively exploited. One grants full SYSTEM access. #CISA has a June 3 federal deadline. Here is what to check. #CVE-2026-41091 allows privilege #escalation to #SYSTEM level. #CVE-2026-45498 is a denial-of-service bug that can take Defender offline. Both are on CISA's KEV catalog with a federal patch deadline of #June 3.
Source : reddit.com/r/cybersecurity/com

  • 0
  • 0
  • 0
  • 3h ago

Bluesky

Profile picture fallback
Microsoft Defender vulnerabilities exploited in the wild (CVE-2026-41091, CVE-2026-45498) 📖 Read more: www.helpnetsecurity.com/2026/05/21/m... #cybersecurity #cybersecuritynews #vulnerability #vulnerabilitydisclosure #Windows @microsoft.com
  • 1
  • 0
  • 0
  • 7h ago
Profile picture fallback
Microsoft patched two exploited zero-days in Defender: CVE-2026-41091, a local privilege escalation to SYSTEM, and CVE-2026-45498, a denial-of-service flaw. CISA added both to KEV. #MicrosoftDefender #CVE202641091 #CVE202645498
  • 1
  • 0
  • 0
  • 7h ago
Profile picture fallback
Microsoft patched two actively exploited Defender zero-days, CVE-2026-41091 and CVE-2026-45498. One can grant SYSTEM privileges, while the other can trigger DoS on unpatched Windows devices. #MicrosoftDefender #CISA #Windows الأمنية
  • 1
  • 0
  • 0
  • 6h ago
Profile picture fallback
~Cisa~ CISA added seven actively exploited vulnerabilities to the KEV catalog, urging immediate remediation. - IOCs: CVE-2026-41091, CVE-2026-45498 - #CISA #KEV #ThreatIntel #Vulnerability
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
Two actively exploited vulnerabilities in Microsoft Defender, CVE-2026-41091 and CVE-2026-45498, have been patched according to an advisory dated May 21, […]
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • FreeBSD
  • FreeBSD

21 May 2026
Published
21 May 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

The setcred(2) system call is only available to privileged users. However, before the privilege level of the caller is checked, the user-supplied list of supplementary groups is copied into a fixed-size kernel stack buffer without first validating its length. If the supplied list exceeds the capacity of that buffer, a stack buffer overflow occurs. Because the bounds check on the supplementary groups list occurs after the kernel stack buffer has already been written, an unprivileged local user may trigger the overflow without holding any special privilege. Successful exploitation may allow an attacker to execute arbitrary code in the context of the kernel, allowing an unprivileged local user to gain elevated privileges on the affected system.

Statistics

  • 4 Posts
  • 189 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

EVERYONE GETS AN LPE

Windows:
(#CVE_2026_33825)
(#CVE_2026_41091)
(#CVE_2026_45498)
(#CVE_2026_27910):

Linux:
(#CVE_2026_31431)
(#CVE_2026_46333)

FreeBSD:
(#CVE_2026_45250)
(#CVE_2026_7270)

  • 105
  • 69
  • 0
  • 1h ago
Profile picture fallback
  • 1
  • 14
  • 1
  • 3h ago

Bluesky

Profile picture fallback
[some-subscribed-rss] New Post: "No way to prevent this" say users of only language where this regularly happens, by https://xeiaso.net/shitposts/no-way-to-prevent-this/CVE-2026-45250/
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Cisco
  • Cisco Secure Workload

20 May 2026
Published
21 May 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.05%

KEV

Description

A vulnerability in the&nbsp;access validation of internal REST APIs of Cisco Secure Workload could allow an unauthenticated, remote attacker to access site resources with the privileges of the&nbsp;Site Admin role. This vulnerability is due to insufficient validation and authentication when accessing REST API endpoints. An attacker could exploit this vulnerability if they are able to send a crafted API request to an affected endpoint. A successful exploit could allow the attacker to read sensitive information and make configuration changes across tenant boundaries with the privileges of the&nbsp;Site Admin user.&nbsp;

Statistics

  • 4 Posts
  • 2 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

deep narrator voice "it was a segmentation product that cannot segment"

cve.org/CVERecord?id=CVE-2026-

  • 0
  • 2
  • 0
  • 23h ago
Profile picture fallback

Max severity #Cisco Secure Workload flaw gives Site #Admin privileges..Cisco has released security updates to address a maximum-severity Secure Workload #vulnerability that allows attackers to gain Site Admin privileges.Tracked as CVE-2026-20223, the security flaw was found in Secure Workload's internal REST APIs, and it enables unauthenticated attackers to access resources with the privileges of the Site Admin role.#cybersec #security #security #cyber #sec

  • 0
  • 0
  • 0
  • 3h ago

Bluesky

Profile picture fallback
Cisco fixed CVE-2026-20223, a max-severity Secure Workload flaw that could let unauthenticated attackers gain Site Admin rights via crafted REST API requests and expose sensitive data across tenant boundaries. #Cisco #SecureWorkload #PSIRT
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
Cisco patched CVE-2026-20223, a critical 10.0 flaw in Secure Workload that could let attackers gain Site Admin privileges via crafted REST API requests. Also fixed 3 medium bugs in ThousandEyes and Nexus switches. #Cisco #SecureWorkload #Nexus9016
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Microsoft
  • Windows 11 Version 24H2

19 May 2026
Published
21 May 2026
Updated

CVSS v3.1
MEDIUM (6.8)
EPSS
0.09%

KEV

Description

Microsoft is aware of a security feature bypass vulnerability in Windows publicly referred to as &quot;YellowKey&quot;. The proof of concept for this vulnerability has been made public violating coordinated vulnerability best practices. We are issuing this CVE to provide mitigation guidance that can be implemented to protect against this vulnerability until the security update is made available.

Statistics

  • 3 Posts

Last activity: 10 hours ago

Bluesky

Profile picture fallback
Microsoft released mitigations for YellowKey, a zero-day flaw tracked as CVE-2026-45585 that can bypass BitLocker on Windows systems with physical access via USB and WinRE shell access. #YellowKey #BitLocker #WinRE
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
マイクロソフトは、BitLockerのバイパス脆弱性「YellowKey」(CVE-2026-45585)に対する対策を提供しています Microsoft provides mitigation for “YellowKey” BitLocker bypass flaw (CVE-2026-45585) #HelpNetSecurity (May 20) www.helpnetsecurity.com/2026/05/20/y...
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
Microsoft has issued a mitigation for the YellowKey BitLocker bypass exploit, identified as CVE-2026-45585.
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • F5
  • NGINX Plus

13 May 2026
Published
14 May 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.27%

KEV

Description

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Statistics

  • 3 Posts
  • 6 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

@gzobra @adulau @firstdotorg

Thank you for these kind words!

If you are interested we started to deploy in production the algorithms presented during FIRST CTI in Munich. An example here:

vulnerability.circl.lu/vuln/cv

Click on the "Forecast" tab.

Have a nice day!

  • 2
  • 2
  • 0
  • 5h ago

Bluesky

Profile picture fallback
🚨 nginx has a critical vuln hiding in it for 18 years. We patched it across AlmaLinux 8, 9, 10 & Kitten—including EOL streams—before upstream did. Details on our blog. 👉 https://almalinux.org/blog/2026-05-13-nginx-rift-cve-2026-42945/?utm_medium=social&utm_source=bluesky
  • 0
  • 2
  • 0
  • 2h ago
Profile picture fallback
The latest update for #CyCognito includes "Emerging Threat: (CVE-2026-42945) NGINX Rift Heap Overflow in Rewrite Module" and "Emerging Threat: (CVE-2026-20182) Cisco Catalyst SD-WAN Authentication Bypass". #cybersecurity #AttackSurfaceManagement #EASM https://opsmtrs.com/44Srq0X
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • Linux
  • Linux

22 Apr 2026
Published
18 May 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
2.57%

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

Statistics

  • 2 Posts
  • 174 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

EVERYONE GETS AN LPE

Windows:
(#CVE_2026_33825)
(#CVE_2026_41091)
(#CVE_2026_45498)
(#CVE_2026_27910):

Linux:
(#CVE_2026_31431)
(#CVE_2026_46333)

FreeBSD:
(#CVE_2026_45250)
(#CVE_2026_7270)

  • 105
  • 69
  • 0
  • 1h ago
Profile picture fallback

I missed this news a week ago, but holy cow, this kernel exploit should be causing a general panic.

jorijn.com/en/blog/copy-fail-c

  • 0
  • 0
  • 0
  • 7h ago
Showing 1 to 10 of 74 CVEs