{"metadata": {"count": 450101, "page": 1, "per_page": 1000}, "data": [{"uuid": "2dfb79df-8fef-44db-a865-362fb172228a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T14:07:08.238900+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3ml4ebzet3f2o", "content": "\ud83d\udccc CVE-2026-5712 - This vulnerability impacts all versions of IdentityIQ and allows an authenticated identity that is the requestor or assignee of a work item to edit th... https://www.cyberhub.blog/cves/CVE-2026-5712", "vulnerability": "CVE-2026-5712", "author": {"login": "automation"}}, {"uuid": "50c0a416-108b-4813-8381-b2c29b2e68fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T14:02:29.995602+00:00", "type": "seen", "source": "https://bsky.app/profile/crustytldr.bsky.social/post/3ml4dzqow2e2u", "content": "\ud83d\udd12 The CPanel Zero-Day Was Active for 64 Days Before Anyone Knew\n\nA critical cPanel zero-day vulnerability (CVE-2026-41940) was actively exploited for 64 days, starting in February 2026, bef...\n\nhttps://is.gd/ttqQu7 #CyberSecurity #InfoSec #CrustyTLDR", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "8751ea62-7171-49aa-817a-c9571a6fe07a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:58:53.516030+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml4dtc6bef2e", "content": "CVE-2026-43574 - OpenClaw\nCVE ID : CVE-2026-43574\n \n Published : 5. Mai 2026 11:25 | 56\u00a0Minuten ago\n \n Description : OpenClaw before 2026.4.12 contains an improper authorization vulnerability in helper-backed channels where empty resolved approver lists are interpreted as expl...", "vulnerability": "CVE-2026-43574", "author": {"login": "automation"}}, {"uuid": "eb6b7617-100c-4bf8-a448-fedc6479a728", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:53:53.276508+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml4dkdqqod2k", "content": "CVE-2026-43530 - OpenClaw 2026.2.23\nCVE ID : CVE-2026-43530\n \n Published : 5. Mai 2026 11:25 | 56\u00a0Minuten ago\n \n Description : OpenClaw versions 2026.2.23 before 2026.4.12 contain a weakened exec approval binding vulnerability in busybox and toybox applet execution that allows...", "vulnerability": "CVE-2026-43530", "author": {"login": "automation"}}, {"uuid": "b2e141ca-1610-4853-be69-85c8130acc45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:48:52.658061+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml4dbfc4yt2i", "content": "CVE-2026-43571 - OpenClaw\nCVE ID : CVE-2026-43571\n \n Published : 5. Mai 2026 11:25 | 56\u00a0Minuten ago\n \n Description : OpenClaw before 2026.4.10 contains a plugin trust bypass vulnerability that allows channel setup catalog lookups to resolve workspace plugin shadows before bund...", "vulnerability": "CVE-2026-43571", "author": {"login": "automation"}}, {"uuid": "a2795be3-f2a0-42b1-8b83-1206db3badb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:48:29.498579+00:00", "type": "seen", "source": "https://bsky.app/profile/winfuture.de/post/3ml4daoff4u2e", "content": "\u00dcber 40.000 Server durch Zero-Day-L\u00fccke in cPanel kompromittiert. Die Schwachstelle CVE-2026-41940 erm\u00f6glicht Angreifern Admin-Zugriff ohne Authentifizierung. #cPanel #Sicherheitsl\u00fccke", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "4f992073-8d25-4974-af96-74a0a7eccdc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:47:53.781982+00:00", "type": "seen", "source": "https://bsky.app/profile/montxt.bsky.social/post/3ml4d7mzeba2v", "content": "MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks  https://thehackernews.com/2026/05/metinfo-cms-cve-2026-29014-exploited.html", "vulnerability": "cve-2026-29014", "author": {"login": "automation"}}, {"uuid": "328495bf-13e5-4819-8faf-c2b5a82d0e80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:43:52.441909+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml4cyguagu2q", "content": "CVE-2026-43535 - OpenClaw\nCVE ID : CVE-2026-43535\n \n Published : 5. Mai 2026 11:25 | 56\u00a0Minuten ago\n \n Description : OpenClaw before 2026.4.14 contains an authorization context reuse vulnerability in collect-mode queue batches that allows messages from different senders to inh...", "vulnerability": "CVE-2026-43535", "author": {"login": "automation"}}, {"uuid": "3d116db5-e7ec-4809-a19c-0c315f0099b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:40:48.983397+00:00", "type": "seen", "source": "https://bsky.app/profile/blockchainreport.bsky.social/post/3ml4csxovlk2j", "content": "Critical #Bitcoin Core vulnerability (CVE-2024-52911) found in versions 0.14.0-29.0. Specially crafted blocks could cause remote node crashes or potential code execution by exploiting a memory error during transaction validation. Monitor official Bitcoin Core channels for patches. #crypto #security", "vulnerability": "CVE-2024-52911", "author": {"login": "automation"}}, {"uuid": "b97ec37e-6ac3-4634-ba6f-117440d329dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:38:51.931721+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml4cpifruj2k", "content": "CVE-2026-43532 - OpenClaw 2026.4.7\nCVE ID : CVE-2026-43532\n \n Published : 5. Mai 2026 11:25 | 56\u00a0Minuten ago\n \n Description : OpenClaw versions 2026.4.7 before 2026.4.10 fail to normalize Discord event cover image parameters in sandbox media processing. Attackers can bypass me...", "vulnerability": "CVE-2026-43532", "author": {"login": "automation"}}, {"uuid": "7845a958-a9ff-422b-9ccc-b4611ab69fd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:34:57.542346+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml4ciibyrd2u", "content": "MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks", "vulnerability": "CVE-2026-29014", "author": {"login": "automation"}}, {"uuid": "862d9f36-d3b2-44f6-9d71-ccaa34063b3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:33:51.543747+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml4cgjycdd2i", "content": "CVE-2026-43569 - OpenClaw\nCVE ID : CVE-2026-43569\n \n Published : 5. Mai 2026 11:25 | 56\u00a0Minuten ago\n \n Description : OpenClaw before 2026.4.9 contains an authentication bypass vulnerability allowing untrusted workspace plugins to be auto-enabled during non-interactive onboardi...", "vulnerability": "CVE-2026-43569", "author": {"login": "automation"}}, {"uuid": "08b3e127-336f-480c-a7cc-fb0582b1bd1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:33:16.807776+00:00", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3ml4cfcmpf225", "content": "Eclipse Equinox OSGi 3.8\uff5e3.18\u306b\u306f\u3001\u8a8d\u8a3c\u306a\u3057\u3067\u30d5\u30a9\u30fc\u30af\u30b3\u30de\u30f3\u30c9\u306b\u3088\u308a\u4efb\u610f\u30b3\u30fc\u30c9\u5b9f\u884c\u306e\u8106\u5f31\u6027\u304c\u3042\u308b\u3002\u653b\u6483\u8005\u306ftelnet\u3067\u63a5\u7d9a\u3057\u3001\u60aa\u610f\u306e\u3042\u308bJava\u30b3\u30fc\u30c9\u3092\u5b9f\u884c\u53ef\u80fd\u3002\nCVE-2023-54342 CVSS 9.8 | CRITICAL", "vulnerability": "CVE-2023-54342", "author": {"login": "automation"}}, {"uuid": "8c0d37a1-e3a9-4e75-8039-b6ba2d1fafbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:33:05.573515+00:00", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml4cf64tt72h", "content": "CVE-2024-13362 eazydocs (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "vulnerability": "CVE-2024-13362", "author": {"login": "automation"}}, {"uuid": "04269871-d957-484c-b39e-56d379cf7ee5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:32:51.237072+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml4ceqfz5z2n", "content": "CVE-2026-43528 - OpenClaw\nCVE ID : CVE-2026-43528\n \n Published : 5. Mai 2026 11:24 | 56\u00a0Minuten ago\n \n Description : OpenClaw before 2026.4.14 contains a redaction bypass vulnerability that allows authenticated gateway clients to receive unredacted secrets through sourceConfig...", "vulnerability": "CVE-2026-43528", "author": {"login": "automation"}}, {"uuid": "4fadfeec-f771-4ce5-b118-60dea1cc0e32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:32:07.936216+00:00", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3ml4cdh4uwn2w", "content": "fast-uri\u306enormalize()\u3067\u3001\u30a8\u30f3\u30b3\u30fc\u30c9\u3055\u308c\u305f\u533a\u5207\u308a\u6587\u5b57\u304c\u30c7\u30b3\u30fc\u30c9\u3055\u308c\u3001\u30db\u30b9\u30c8\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u306e\u6a29\u9650\u304c\u5909\u66f4\u3055\u308c\u308b\u8106\u5f31\u6027\u3002\u30d0\u30fc\u30b8\u30e7\u30f33.1.1\u4ee5\u524d\u3067\u767a\u751f\u3057\u3001\u4fe1\u983c\u3067\u304d\u306a\u3044URL\u306e\u6b63\u898f\u5316\u3092\u884c\u3046\u2026\nCVE-2026-6322 CVSS 7.5 | HIGH", "vulnerability": "CVE-2026-6322", "author": {"login": "automation"}}, {"uuid": "b4e3c7f8-a6ea-460d-8a7a-b4fb1d5e2ba6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:29:57+00:00", "type": "seen", "source": "https://gist.github.com/Yann-P/66d4982a965dee8fcb8dd89db29e7006", "content": "", "vulnerability": "CVE-2026-35397", "author": {"login": "automation"}}, {"uuid": "0e17e705-eff1-4f4e-8379-85ebdc89543c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:29:29.741075+00:00", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3ml4c6p6e372t", "content": "Android\u306eSystem\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u306b\u3001\u30e6\u30fc\u30b6\u30fc\u64cd\u4f5c\u306a\u3057\u3067\u60aa\u7528\u53ef\u80fd\u306a\u30ea\u30e2\u30fc\u30c8\u30b3\u30fc\u30c9\u5b9f\u884c\u306e\u8106\u5f31\u6027\uff08CVE-2026-0073\uff09\u304c\u767a\u898b\u3055\u308c\u3001\u4fee\u6b63\u3055\u308c\u307e\u3057\u305f\u3002", "vulnerability": "CVE-2026-0073", "author": {"login": "automation"}}, {"uuid": "964a8d3e-1809-473c-9051-60fe5662fc2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:27:50.859277+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml4c3rxdte2k", "content": "CVE-2026-43572 - OpenClaw 2026.4.10\nCVE ID : CVE-2026-43572\n \n Published : 5. Mai 2026 11:25 | 56\u00a0Minuten ago\n \n Description : OpenClaw versions 2026.4.10 before 2026.4.14 contain a missing authorization vulnerability in the Microsoft Teams SSO invoke handler that fails to app...", "vulnerability": "CVE-2026-43572", "author": {"login": "automation"}}, {"uuid": "5770fd71-f4a0-43cc-8c1c-d3618509544c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:24:45.141531+00:00", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3ml4bwabkpp2e", "content": "MetInfo CMS 7.9, 8.0, 8.1\u306b\u8a8d\u8a3c\u306a\u3057PHP\u30b3\u30fc\u30c9\u5b9f\u884c\u306e\u8106\u5f31\u6027\uff08CVE-2026-29014\uff09\u3042\u308a\u3002\u653b\u6483\u8005\u306f\u4efb\u610f\u30b3\u30fc\u30c9\u5b9f\u884c\u53ef\u80fd\u3002", "vulnerability": "CVE-2026-29014", "author": {"login": "automation"}}, {"uuid": "bfa6e951-0382-424e-94a4-2475fc9abdc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:24:00.109792+00:00", "type": "seen", "source": "https://bsky.app/profile/cybersecurity0001.bsky.social/post/3ml4buhm5762b", "content": "MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks", "vulnerability": "CVE-2026-29014", "author": {"login": "automation"}}, {"uuid": "3e4fda29-ea8a-4c67-aeb3-476dd31099d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:22:50.461065+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml4bstirqs2k", "content": "CVE-2026-43527 - OpenClaw\nCVE ID : CVE-2026-43527\n \n Published : 5. Mai 2026 11:24 | 56\u00a0Minuten ago\n \n Description : OpenClaw before 2026.4.14 contains a server-side request forgery vulnerability in browser SSRF policy that allows private-network navigation by default. Attacke...", "vulnerability": "CVE-2026-43527", "author": {"login": "automation"}}, {"uuid": "727e9f93-67d6-47b8-8b27-faefb0b8246f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:21:57.851877+00:00", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3ml4bqcdbabu2", "content": "Update WhatsApp now: Two new flaws could expose you to malicious files WhatsApp patches flaws that could expose users to malicious content and disguised malware. Meta has published a new security a...\n\n#Bugs #News #CVE-2026-23863 #CVE-2026-23866 #whatsapp\n\nOrigin | Interest | Match", "vulnerability": "CVE-2026-23866", "author": {"login": "automation"}}, {"uuid": "53dee4a6-36bf-447e-8145-e939439addee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:21:57.506163+00:00", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3ml4bqcdbabu2", "content": "Update WhatsApp now: Two new flaws could expose you to malicious files WhatsApp patches flaws that could expose users to malicious content and disguised malware. Meta has published a new security a...\n\n#Bugs #News #CVE-2026-23863 #CVE-2026-23866 #whatsapp\n\nOrigin | Interest | Match", "vulnerability": "CVE-2026-23863", "author": {"login": "automation"}}, {"uuid": "d97a22b8-5377-47a4-b2a5-8f5245f7c886", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:17:55.470587+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml4bjuyxgq2e", "content": "CVE-2026-43566 - OpenClaw 2026.4.7\nCVE ID : CVE-2026-43566\n \n Published : 5. Mai 2026 11:25 | 56\u00a0Minuten ago\n \n Description : OpenClaw versions 2026.4.7 before 2026.4.14 contain a privilege escalation vulnerability where heartbeat owner downgrade logic skips webhook wake event...", "vulnerability": "CVE-2026-43566", "author": {"login": "automation"}}, {"uuid": "070cf2a7-90e6-428c-b02e-b57ae52f5b39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:12:52.263371+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml4bawkgn42i", "content": "CVE-2026-43570 - OpenClaw 2026.3.22\nCVE ID : CVE-2026-43570\n \n Published : 5. Mai 2026 11:25 | 56\u00a0Minuten ago\n \n Description : OpenClaw versions 2026.3.22 before 2026.4.5 contain a symlink traversal vulnerability in remote marketplace repository path handling that allows attac...", "vulnerability": "CVE-2026-43570", "author": {"login": "automation"}}, {"uuid": "2b7b51ab-327f-401a-af92-349c433f87de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:07:49.265302+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml4axy3e6a2n", "content": "CVE-2026-43534 - OpenClaw\nCVE ID : CVE-2026-43534\n \n Published : 5. Mai 2026 11:25 | 56\u00a0Minuten ago\n \n Description : OpenClaw before 2026.4.10 contains an input validation vulnerability that allows external hook metadata to be enqueued as trusted system events. Attackers can s...", "vulnerability": "CVE-2026-43534", "author": {"login": "automation"}}, {"uuid": "445b217c-5848-4c6c-8aeb-9e3d32c8c022", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:05:35.075322+00:00", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3ml4atwxe4s25", "content": "CVE-2026-0073 affects Android\u2019s System component and it can be exploited without any user interaction. www.securityweek.com/critical-rem...", "vulnerability": "CVE-2026-0073", "author": {"login": "automation"}}, {"uuid": "4479cd48-f09b-46bf-9c2c-cc3d01aa14a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:05:28.258767+00:00", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/116522111956035434", "content": "CVE-2026-0073 affects Android\u2019s System component and it can be exploited without any user interaction. https://www.securityweek.com/critical-remote-code-execution-vulnerability-patched-in-android-2/", "vulnerability": "CVE-2026-0073", "author": {"login": "automation"}}, {"uuid": "1e2a4f8b-aa76-44d4-aae0-eb46008e06db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:03:32.193497+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml4aqchxnl2e", "content": "CVE-2026-43568 - OpenClaw 2026.4.5\nCVE ID : CVE-2026-43568\n \n Published : 5. Mai 2026 11:25 | 56\u00a0Minuten ago\n \n Description : OpenClaw versions 2026.4.5 before 2026.4.10 contain a privilege escalation vulnerability allowing write-scoped operators to modify persistent memory dr...", "vulnerability": "CVE-2026-43568", "author": {"login": "automation"}}, {"uuid": "9fbff6aa-2801-492f-b776-05d123bb518b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:01:29.846896+00:00", "type": "seen", "source": "https://bsky.app/profile/ninjaowl.ai/post/3ml4amncfz227", "content": "MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...", "vulnerability": "CVE-2026-29014", "author": {"login": "automation"}}, {"uuid": "1be0f36e-f551-4c21-ba1e-8641f5262f5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:00:58+00:00", "type": "seen", "source": "https://t.me/poxek/6061", "content": "CVE-2026-41940 (CVSS 9.8) \u2014 pre-auth bypass \u0432 cPanel/WHM\n#CVE #cPanel #WHM #Web #AppSec\n\n\u0411\u0430\u0433 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c root-\u0434\u043e\u0441\u0442\u0443\u043f \u0437\u0430 \u0441\u0447\u0435\u0442 \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u044f\u0446\u0438\u0438 session-\u0444\u0430\u0439\u043b\u043e\u043c \u0447\u0435\u0440\u0435\u0437 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u043e\u0448\u0438\u0431\u043e\u043a, \u0432\u043a\u043b\u044e\u0447\u0430\u044f CRLF-\u0438\u043d\u044a\u0435\u043a\u0446\u0438\u044e.\n\n\u041c\u0430\u0441\u0448\u0442\u0430\u0431 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432\u043d\u0443\u0448\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0439: \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442\u0441\u044f cPanel &amp; WHM, cPanel DNSOnly \u0438 WP Squared. \u041f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u0430\u044f \u043f\u043e\u0432\u0435\u0440\u0445\u043d\u043e\u0441\u0442\u044c \u0430\u0442\u0430\u043a\u0438 \u2014 \u0432\u0441\u0435 \u043d\u0435\u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0435\u043d\u043d\u044b\u0435 \u0438\u043d\u0441\u0442\u0430\u043d\u0441\u044b \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u043a cPanel/WHM \u0432 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442 (~1.5 \u043c\u043b\u043d exposed \u0438\u043d\u0441\u0442\u0430\u043d\u0441\u043e\u0432).\n\n\u267e\ufe0f\u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0441\u0443\u0442\u044c\u267e\ufe0f\n\ncPanel/WHM \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u043b session-\u0444\u0430\u0439\u043b \u0435\u0449\u0435 \u0434\u043e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0438 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e \u043e\u0431\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u043b \u0432\u0445\u043e\u0434\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435. \u041f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 Basic Auth \u043f\u0430\u0440\u043e\u043b\u044c \u0438\u0437 Authorization \u043f\u043e\u043f\u0430\u0434\u0430\u043b \u0432 \u0441\u0435\u0441\u0441\u0438\u044e \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043e\u0447\u0438\u0441\u0442\u043a\u043e\u0439, \u043c\u043e\u0433\u043b\u0438 \u0441\u043e\u0445\u0440\u0430\u043d\u044f\u0442\u044c\u0441\u044f \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0438\u0435 \u0441\u0438\u043c\u0432\u043e\u043b\u044b \u0432\u0440\u043e\u0434\u0435 \\r\\n. \u0418\u0437-\u0437\u0430 \u044d\u0442\u043e\u0433\u043e \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043c\u043e\u0433 \u0432\u043d\u0435\u0434\u0440\u0438\u0442\u044c \u0432 session-\u0444\u0430\u0439\u043b \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0441\u0442\u0440\u043e\u043a\u0438 \u0438 \u043f\u043e\u0434\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u043d\u0443\u0436\u043d\u044b\u0435 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, user=root, hasroot=1. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0447\u0430\u0441\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0445 \u043c\u043e\u0433\u043b\u0430 \u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u0442\u044c\u0441\u044f \u0432 raw session-\u0444\u0430\u0439\u043b \u0431\u0435\u0437 \u043a\u043e\u0434\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f. \n\n\u0417\u0430\u0442\u0435\u043c \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043f\u0440\u043e\u0432\u043e\u0446\u0438\u0440\u043e\u0432\u0430\u043b \u043f\u043e\u0432\u0442\u043e\u0440\u043d\u043e\u0435 \u0447\u0442\u0435\u043d\u0438\u0435 \u044d\u0442\u043e\u0439 \u0441\u0435\u0441\u0441\u0438\u0438, \u0438 \u0441\u0435\u0440\u0432\u0435\u0440 \u0443\u0436\u0435 \u0432\u043e\u0441\u043f\u0440\u0438\u043d\u0438\u043c\u0430\u043b \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u043d\u044b\u0435 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u044f \u043a\u0430\u043a \u0432\u0430\u043b\u0438\u0434\u043d\u044b\u0435.\n\n\u267e\ufe0f\u041f\u0430\u0439\u043f\u043b\u0430\u0439\u043d \u0430\u0442\u0430\u043a\u0438\u267e\ufe0f\n\n\u25aa\ufe0f\u0410\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u0441\u043e\u0437\u0434\u0430\u0435\u0442 pre-auth session \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0443\u0441\u043f\u0435\u0448\u043d\u0443\u044e \u043f\u043e\u043f\u044b\u0442\u043a\u0443 \u0432\u0445\u043e\u0434\u0430\n\u25aa\ufe0f\u041f\u043e\u043b\u0443\u0447\u0430\u0435\u0442 whostmgrsession cookie \u0438 \u043f\u043e\u0432\u0442\u043e\u0440\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0435\u0433\u043e \u0431\u0435\u0437 -\u0447\u0430\u0441\u0442\u0438\n\u25aa\ufe0f\u041e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 Basic Auth, \u0433\u0434\u0435 \u0432 \u043f\u0430\u0440\u043e\u043b\u044c \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u044b CRLF \u0438 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 session-\u043f\u043e\u043b\u044f\n\u25aa\ufe0f\u042d\u0442\u0438 \u0441\u0442\u0440\u043e\u043a\u0438 \u043f\u043e\u043f\u0430\u0434\u0430\u044e\u0442 \u0432 raw session-\u0444\u0430\u0439\u043b\n\u25aa\ufe0f\u0417\u0430\u0442\u0435\u043c \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u0442\u0440\u0438\u0433\u0433\u0435\u0440\u0438\u0442 \u043f\u0443\u0442\u044c \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u043d\u0435\u0432\u0435\u0440\u043d\u043e\u0433\u043e/\u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0433\u043e cp_security_token, \u0447\u0442\u043e\u0431\u044b raw-\u0441\u0435\u0441\u0441\u0438\u044f \u0431\u044b\u043b\u0430 \u043f\u0435\u0440\u0435\u0447\u0438\u0442\u0430\u043d\u0430 \u0438 \u0437\u0430\u043f\u0438\u0441\u0430\u043d\u0430 \u0432 JSON-cache\n\u25aa\ufe0f\u041f\u043e\u0441\u043b\u0435 \u044d\u0442\u043e\u0433\u043e \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u043d\u044b\u0435 \u043f\u043e\u043b\u044f \u0441\u0442\u0430\u043d\u043e\u0432\u044f\u0442\u0441\u044f top-level-\u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0430\u043c\u0438 \u0441\u0435\u0441\u0441\u0438\u0438\n\u25aa\ufe0f\u0417\u0430 \u0441\u0447\u0435\u0442 successful_internal_auth_with_timestamp \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u043f\u0430\u0440\u043e\u043b\u044f \u0444\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u0441\u044f\n\u25aa\ufe0f\u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043f\u043e\u043b\u0443\u0447\u0430\u0435\u0442 root-\u0434\u043e\u0441\u0442\u0443\u043f \u0431\u0435\u0437 \u0437\u043d\u0430\u043d\u0438\u044f \u043f\u0430\u0440\u043e\u043b\u044f\n\n\u267e\ufe0f\u0420\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u267e\ufe0f\n\n\u25aa\ufe0f\u041e\u0431\u043d\u043e\u0432\u0438\u0442\u044c cPanel &amp; WHM / WP Squared \u0434\u043e \u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0435\u043d\u043d\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u0439\n\u25aa\ufe0f\u0417\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u044c \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0439 detection script \u043e\u0442 cPanel \u0434\u043b\u044f \u043f\u043e\u0438\u0441\u043a\u0430 IOC \u0432 session-\u0444\u0430\u0439\u043b\u0430\u0445\n\u25aa\ufe0f\u041f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c /var/cpanel/sessions/raw/, /var/cpanel/sessions/preauth/, session-cache \u0438 access logs\n\u25aa\ufe0f\u041f\u0440\u043e\u0432\u0435\u0441\u0442\u0438 \u0440\u043e\u0442\u0430\u0446\u0438\u044e root, WHM/reseller \u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0445 \u043f\u0430\u0440\u043e\u043b\u0435\u0439\n\u25aa\ufe0f\u0415\u0441\u043b\u0438 \u043d\u0435\u043b\u044c\u0437\u044f \u0441\u0440\u0430\u0437\u0443 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u2014 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043f\u043e\u0440\u0442\u0430\u043c 2083, 2087, 2095, 2096 \u0438 Service Subdomains, \u043b\u0438\u0431\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e \u043e\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c cpsrvd/cpdavd\n\n  \ud83d\udd17\u0418\u0441\u0442\u043e\u0447\u043d\u0438\u043a\n\n\ud83c\udf1a @poxek | \ud83d\udcf2 MAX |\ud83c\udf1a \u0411\u043b\u043e\u0433 | \ud83d\udcfa YT | \ud83d\udcfa RT | \ud83d\udcfa VK", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "abd7468a-f611-4225-9c67-d562f4f69c3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T13:00:12+00:00", "type": "seen", "source": "https://t.me/cibsecurity/89306", "content": "\ud83d\udd8b\ufe0f MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks \ud83d\udd8b\ufe0f\n\nThreat actors are actively exploiting a critical security flaw impacting an opensource content management system CMS known as MetInfo, according to new findings from VulnCheck. The vulnerability in question is CVE202629014 CVSS score 9.8, a code injection flaw that could result in arbitrary code execution. \"MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "vulnerability": "CVE-2026-29014", "author": {"login": "automation"}}, {"uuid": "dc33ca73-1d61-4602-8ba1-18efccb6cf37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T12:59:52.527589+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml4ajlkjrp2o", "content": "CVE-2026-43573 - OpenClaw\nCVE ID : CVE-2026-43573\n \n Published : 5. Mai 2026 11:25 | 56\u00a0Minuten ago\n \n Description : OpenClaw before 2026.4.10 contains a server-side request forgery policy bypass vulnerability in existing-session browser interaction routes. Attackers can bypas...", "vulnerability": "CVE-2026-43573", "author": {"login": "automation"}}, {"uuid": "473c7625-f08f-4043-9650-eae8016c8647", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T12:59:52+00:00", "type": "seen", "source": "https://t.me/ctinow/249768", "content": "MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks\nhttps://ift.tt/oO9uPZB", "vulnerability": "CVE-2026-29014", "author": {"login": "automation"}}, {"uuid": "e2fc7d2f-036b-4dd4-b26e-91447c42ea13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T12:56:26.729615+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml4admiy662r", "content": "CVE-2026-43531 - OpenClaw\nCVE ID : CVE-2026-43531\n \n Published : 5. Mai 2026 11:25 | 56\u00a0Minuten ago\n \n Description : OpenClaw before 2026.4.9 contains an environment variable injection vulnerability allowing malicious workspace .env files to set runtime-control variables. Atta...", "vulnerability": "CVE-2026-43531", "author": {"login": "automation"}}, {"uuid": "b02e5de9-f226-4dbc-9fde-6fc8ecc8950d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T12:53:27.383102+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml4a6airkd2v", "content": "CVE-2026-6262 - Betheme\nCVE ID : CVE-2026-6262\n \n Published : 5. Mai 2026 11:24 | 56\u00a0Minuten ago\n \n Description : The Betheme theme for WordPress is vulnerable to Arbitrary File Deletion in versions up to, and including, 28.4. This is due to the upload_icons() function workflo...", "vulnerability": "CVE-2026-6262", "author": {"login": "automation"}}, {"uuid": "d5b25bfa-1323-4ebf-82c7-9ff7e45a0ec6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T12:51:28.956159+00:00", "type": "seen", "source": "https://bsky.app/profile/dubhead.bsky.social/post/3ml4a2pu6fk22", "content": "\u8106\u5f31\u6027 CVE-2026-43923 \u304c\u4fee\u6b63\u3055\u308c\u3066\u307e\u3059 #Harelang\n\nHare 0.26.0.1 released\nlists.sr.ht/~sircmpwn/ha...", "vulnerability": "CVE-2026-43923", "author": {"login": "automation"}}, {"uuid": "1c72f026-a466-4630-9121-4cd017a37b59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T12:50:41.862160+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml47ze3p352p", "content": "CVE-2026-43567 - OpenClaw\nCVE ID : CVE-2026-43567\n \n Published : 5. Mai 2026 11:25 | 56\u00a0Minuten ago\n \n Description : OpenClaw before 2026.4.10 contains a path traversal vulnerability in the screen_record tool's outPath parameter that bypasses workspace-only filesystem guards. ...", "vulnerability": "CVE-2026-43567", "author": {"login": "automation"}}, {"uuid": "fc248767-af91-46a3-9c7c-f1d833ea3a62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T12:48:11.446422+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml47uuqaam2p", "content": "CVE-2026-43529 - OpenClaw\nCVE ID : CVE-2026-43529\n \n Published : 5. Mai 2026 11:25 | 56\u00a0Minuten ago\n \n Description : OpenClaw before 2026.4.10 contains a time-of-check-time-of-use vulnerability in the validateScriptFileForShellBleed function that allows local attackers to bypa...", "vulnerability": "CVE-2026-43529", "author": {"login": "automation"}}, {"uuid": "180b084d-d861-49d1-af7a-c707f50547ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T12:45:52.621571+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml47qqdazm2k", "content": "CVE-2026-6261 - Betheme\nCVE ID : CVE-2026-6261\n \n Published : 5. Mai 2026 11:25 | 56\u00a0Minuten ago\n \n Description : The Betheme theme for WordPress is vulnerable to Arbitrary File Upload in versions up to, and including, 28.4. This is due to the upload_icons() function workflow ...", "vulnerability": "CVE-2026-6261", "author": {"login": "automation"}}, {"uuid": "eec69825-5af2-44a8-8cfa-850c435b23c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T12:43:43.841564+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml47mvcgti2h", "content": "CVE-2026-43533 - OpenClaw\nCVE ID : CVE-2026-43533\n \n Published : 5. Mai 2026 11:25 | 56\u00a0Minuten ago\n \n Description : OpenClaw before 2026.4.10 contains an arbitrary file read vulnerability in QQBot media tags that allows attackers to reference host-local paths outside the inte...", "vulnerability": "CVE-2026-43533", "author": {"login": "automation"}}, {"uuid": "d68fa739-9275-4cfd-a3c8-8d04b9aa38bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T12:33:05.980736+00:00", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml46zuzgnt2c", "content": "CVE-2026-6963 wp-mail-gateway (CVSS Score 8.8) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "vulnerability": "CVE-2026-6963", "author": {"login": "automation"}}, {"uuid": "fa1d8130-0399-4378-b00e-d85c7fae9d81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T12:30:28.669692+00:00", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3ml46v2kyxc22", "content": "A critical pre-authentication bypass, CVE-2026-41940, targeting cPanel/WHM has triggered a surge in malicious hosts. Active campaigns involve Mirai variants and ransomware appending \u201c.sorry\u201d to files. #cPanelFlaw #RansomwareAttack #MiraiBotnet", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "08291fab-b380-4244-9d32-ca2d4a7635d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T12:29:26.360594+00:00", "type": "seen", "source": "https://bsky.app/profile/cybersecurity0001.bsky.social/post/3ml46tcv6bb2k", "content": "Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API", "vulnerability": "CVE-2026-22679", "author": {"login": "automation"}}, {"uuid": "d3d42c43-dcd4-4b15-97b9-ff9fbf82e0fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T12:24:28.936091+00:00", "type": "seen", "source": "https://bsky.app/profile/nadsec.online/post/3ml46kgtazk2d", "content": "Presenting, for absolutely no reason at all, CVE-2026-31431 as a 587-byte x86_64 static ELF:\ngithub.com/Rat5ak/CVE-2...", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "2fccdaee-3bd7-4567-b2df-257988b21652", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T12:03:38.617483+00:00", "type": "seen", "source": "https://bsky.app/profile/hmier.bsky.social/post/3ml45f7nvfk2f", "content": "high risk CVE-2026-23918 in Apache HTTP Server HTTP/2 implementation.\n\ncc @levhita.net", "vulnerability": "CVE-2026-23918", "author": {"login": "automation"}}, {"uuid": "ee6bbb38-21f9-4b95-9eff-64a999052ad7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T12:01:42+00:00", "type": "seen", "source": "https://gist.github.com/khoipro/fbcbfa478c3fd58b001a2dc3d620bcdf", "content": "#!/bin/bash\n# CVE-2026-31431 (\"Copy Fail\") \u2014 pure-bash static vulnerability checker\n#\n# Exit codes:\n#   0 = NOT VULNERABLE (patched kernel or preconditions not met)\n#   1 = INCONCLUSIVE\n#   2 = LIKELY VULNERABLE\n#   3 = MITIGATED (workaround applied, kernel not yet patched)\n#\n# Use only on hosts you own or are explicitly authorized to test.\n\nKERNEL=$(uname -r)\nARCH=$(uname -m)\nALG_NAME=\"authencesn(hmac(sha256),cbc(aes))\"\n\nRED='\\033[0;31m'; GREEN='\\033[0;32m'; YELLOW='\\033[1;33m'\nBOLD='\\033[1m';   DIM='\\033[2m';      NC='\\033[0m'\n\n# \u2500\u2500\u2500 result variables \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\nR_KVER=\"\"        # patched | vulnerable | not_affected | unknown\nR_KVER_NOTE=\"\"\nR_CFG=\"\"         # m | y | not_set | unknown\nR_MOD=\"\"         # loaded | on_disk | absent\nR_AF_ALG=\"\"      # available | unavailable\nR_CRYPTO=\"\"      # present | absent\nR_WORKAROUND=\"\"  # blacklist | cmdline | both | none\nR_WA_NOTE=\"\"\nR_CONTAINER=\"\"   # no | docker | container | systemd-nspawn\n\n# \u2500\u2500\u2500 checks (silent) \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\ncheck_kernel_version() {\n    local rel=\"${KERNEL%%-*}\"\n    local major minor patch\n    IFS='.' read -r major minor patch &lt;&lt;&lt; \"$rel\"\n    patch=\"${patch%%[^0-9]*}\"\n    major=\"${major:-0}\"; minor=\"${minor:-0}\"; patch=\"${patch:-0}\"\n\n    if [ \"$major\" -lt 4 ] || { [ \"$major\" -eq 4 ] &amp;&amp; [ \"$minor\" -lt 14 ]; }; then\n        R_KVER=\"not_affected\"; R_KVER_NOTE=\"&lt; 4.14, predates vulnerable code\"; return\n    fi\n\n    # \u2500\u2500 RHEL-family kernels \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\n    # Format: major.minor.0-BUILD.elX[_Y].ARCH  (e.g. 5.14.0-214.el9.x86_64)\n    # The upstream sublevel is always .0; the RHEL build number carries the\n    # real patch level.  We cannot compare patch against the upstream LTS\n    # table, so we check the RPM changelog for the actual CVE fix.\n    if echo \"$KERNEL\" | grep -qE \"\\.el[0-9]\"; then\n        local rhel_build el_tag kern_pkg\n        rhel_build=$(echo \"$KERNEL\" | sed 's/.*-\\([0-9]*\\)\\..*/\\1/')\n        el_tag=$(echo \"$KERNEL\" | grep -oE \"el[0-9]+(_[0-9]+)?\" | head -1)\n\n        if command -v rpm &gt;/dev/null 2&gt;&amp;1; then\n            # Find the exact RPM that owns this kernel's vmlinuz\n            kern_pkg=$(rpm -qf \"/boot/vmlinuz-${KERNEL}\" 2&gt;/dev/null | head -1)\n            # Fallback: kernel-core package by NEVRA\n            [ -z \"$kern_pkg\" ] &amp;&amp; \\\n                kern_pkg=$(rpm -qa 2&gt;/dev/null | grep -E \"^kernel(-core)?-\" \\\n                           | grep \"${KERNEL%.*}\" | head -1)\n            if [ -n \"$kern_pkg\" ]; then\n                if rpm -q --changelog \"$kern_pkg\" 2&gt;/dev/null \\\n                        | grep -qF \"CVE-2026-31431\"; then\n                    R_KVER=\"patched\"\n                    R_KVER_NOTE=\"RHEL backport confirmed (${el_tag} build ${rhel_build})\"\n                else\n                    R_KVER=\"vulnerable\"\n                    R_KVER_NOTE=\"RHEL ${el_tag} build ${rhel_build} \u2014 CVE-2026-31431 not in kernel changelog\"\n                fi\n            else\n                # Package query failed (container without /boot, or non-RPM overlay)\n                R_KVER=\"unknown\"\n                R_KVER_NOTE=\"RHEL ${el_tag} \u2014 run: rpm -q --changelog kernel-core-\\$(uname -r) | grep CVE-2026-31431\"\n            fi\n        else\n            R_KVER=\"unknown\"\n            R_KVER_NOTE=\"RHEL-family ${el_tag} build ${rhel_build} \u2014 check Red Hat advisory for CVE-2026-31431\"\n        fi\n        return\n    fi\n\n    # \u2500\u2500 Upstream LTS version table \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\n    local patched=0 min_patch=\"\"\n    case \"$major.$minor\" in\n        5.10) min_patch=254; [ \"$patch\" -ge 254 ] &amp;&amp; patched=1 ;;\n        5.15) min_patch=204; [ \"$patch\" -ge 204 ] &amp;&amp; patched=1 ;;\n        6.1)  min_patch=170; [ \"$patch\" -ge 170 ] &amp;&amp; patched=1 ;;\n        6.6)  min_patch=137; [ \"$patch\" -ge 137 ] &amp;&amp; patched=1 ;;\n        6.12) min_patch=85;  [ \"$patch\" -ge 85  ] &amp;&amp; patched=1 ;;\n        6.18) min_patch=22;  [ \"$patch\" -ge 22  ] &amp;&amp; patched=1 ;;\n        6.19) min_patch=12;  [ \"$patch\" -ge 12  ] &amp;&amp; patched=1 ;;\n    esac\n\n    if [ \"$patched\" -eq 1 ]; then\n        R_KVER=\"patched\"; R_KVER_NOTE=\"patched release\"\n    elif [ -n \"$min_patch\" ]; then\n        R_KVER=\"vulnerable\"; R_KVER_NOTE=\"vulnerable, patched &gt;= $major.$minor.$min_patch\"\n    elif { [ \"$major\" -gt 6 ] || { [ \"$major\" -eq 6 ] &amp;&amp; [ \"$minor\" -ge 20 ]; }; }; then\n        # Beyond the highest tracked LTS \u2014 may or may not be patched\n        R_KVER=\"unknown\"; R_KVER_NOTE=\"beyond tracked versions \u2014 check distro advisory\"\n    else\n        # 4.14\u20136.19 non-LTS or EOL: in vulnerable range, no upstream fix for this series\n        R_KVER=\"vulnerable\"\n        R_KVER_NOTE=\"non-LTS/EOL upstream series ${major}.${minor} \u2014 no upstream fix available\"\n    fi\n}\n\ncheck_kernel_config() {\n    local val\n    val=$(grep -E \"^CONFIG_CRYPTO_USER_API_AEAD=\" /boot/config-\"$KERNEL\" 2&gt;/dev/null \\\n        || zcat /proc/config.gz 2&gt;/dev/null | grep -E \"^CONFIG_CRYPTO_USER_API_AEAD=\")\n    case \"$val\" in\n        *=m) R_CFG=\"m\" ;;\n        *=y) R_CFG=\"y\" ;;\n        \"\")\n            # Distinguish: config file readable but key absent = not compiled\n            #              config file unreadable            = unknown state\n            if [ -r \"/boot/config-${KERNEL}\" ] || [ -r /proc/config.gz ]; then\n                R_CFG=\"not_set\"\n            else\n                R_CFG=\"unknown\"\n            fi\n            ;;\n        *)   R_CFG=\"unknown\" ;;\n    esac\n}\n\ncheck_module() {\n    if lsmod 2&gt;/dev/null | grep -q \"^algif_aead\"; then\n        R_MOD=\"loaded\"; return\n    fi\n    local ko\n    ko=$(find /lib/modules/\"$KERNEL\" -name \"algif_aead.ko*\" 2&gt;/dev/null | head -1)\n    [ -n \"$ko\" ] &amp;&amp; R_MOD=\"on_disk\" || R_MOD=\"absent\"\n}\n\ncheck_af_alg() {\n    if grep -qE \"^ALG\\b\" /proc/net/protocols 2&gt;/dev/null \\\n        || lsmod 2&gt;/dev/null | grep -q \"^af_alg\"; then\n        R_AF_ALG=\"available\"\n    else\n        R_AF_ALG=\"unavailable\"\n    fi\n}\n\ncheck_proc_crypto() {\n    if [ ! -r /proc/crypto ]; then\n        R_CRYPTO=\"absent\"; return\n    fi\n    grep -qF \"name         : $ALG_NAME\" /proc/crypto 2&gt;/dev/null \\\n        &amp;&amp; R_CRYPTO=\"present\" || R_CRYPTO=\"absent\"\n}\n\ncheck_workaround() {\n    local bl=0 cl=0 gb=0\n\n    # 1. modprobe.d blacklist (=m case, effective immediately after rmmod)\n    if grep -rl \"install algif_aead /bin/false\" /etc/modprobe.d/ 2&gt;/dev/null | grep -q .; then\n        bl=1\n    fi\n\n    # 2. initcall_blacklist active in CURRENT boot (=y case, effective now)\n    grep -q \"initcall_blacklist=algif_aead_init\" /proc/cmdline 2&gt;/dev/null &amp;&amp; cl=1\n\n    # 3. initcall_blacklist configured in bootloader but NOT yet active (pending reboot)\n    if [ $cl -eq 0 ]; then\n        if command -v grubby &gt;/dev/null 2&gt;&amp;1 \\\n                &amp;&amp; grubby --info=ALL 2&gt;/dev/null \\\n                   | grep -qF \"initcall_blacklist=algif_aead_init\"; then\n            gb=1\n        elif grep -q \"initcall_blacklist=algif_aead_init\" /etc/default/grub 2&gt;/dev/null; then\n            gb=1\n        fi\n    fi\n\n    if   [ $bl -eq 1 ] &amp;&amp; [ $cl -eq 1 ]; then\n        R_WORKAROUND=\"both\";      R_WA_NOTE=\"blacklist + cmdline\"\n    elif [ $bl -eq 1 ]; then\n        R_WORKAROUND=\"blacklist\"; R_WA_NOTE=\"/etc/modprobe.d/\"\n    elif [ $cl -eq 1 ]; then\n        R_WORKAROUND=\"cmdline\";   R_WA_NOTE=\"initcall_blacklist active in /proc/cmdline\"\n    elif [ $gb -eq 1 ]; then\n        R_WORKAROUND=\"pending\";   R_WA_NOTE=\"configured in bootloader \u2014 reboot required to activate\"\n    else\n        R_WORKAROUND=\"none\";      R_WA_NOTE=\"\"\n    fi\n}\n\ncheck_container() {\n    if [ -f /.dockerenv ]; then\n        R_CONTAINER=\"docker\"\n    elif grep -qE \"lxc|kubepods|docker|containerd\" /proc/1/cgroup 2&gt;/dev/null; then\n        R_CONTAINER=\"container\"\n    elif [ -n \"${container:-}\" ]; then\n        R_CONTAINER=\"systemd-nspawn\"\n    else\n        R_CONTAINER=\"no\"\n    fi\n}\n\n# \u2500\u2500\u2500 run all checks silently \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\ncheck_kernel_version\ncheck_kernel_config\ncheck_module\ncheck_af_alg\ncheck_proc_crypto\ncheck_workaround\ncheck_container\n\n# \u2500\u2500\u2500 helper: colored label \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\nclabel() {\n    # clabel COLOR \"TEXT\"\n    printf \"${1}%-12s${NC}\" \"$2\"\n}\n\nok()   { clabel \"$GREEN\"  \"$1\"; }\nbad()  { clabel \"$RED\"    \"$1\"; }\nmeh()  { clabel \"$YELLOW\" \"$1\"; }\ndim()  { printf \"${DIM}%s${NC}\" \"$1\"; }\n\n# \u2500\u2500\u2500 status table \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\nW=54\nDIV=$(printf '\u2500%.0s' $(seq 1 $W))\n\necho -e \"${BOLD}CVE-2026-31431 \\\"Copy Fail\\\"${NC}  \u00b7  $KERNEL  \u00b7  $ARCH\"\necho \"$DIV\"\nprintf \"  %-18s %-14s %s\\n\" \"CHECK\" \"VALUE\" \"NOTE\"\necho \"$DIV\"\n\n# 1. Kernel version\nprintf \"  %-18s \" \"Kernel\"\ncase \"$R_KVER\" in\n    patched)      ok  \"patched\"     ;;\n    not_affected) ok  \"not affected\" ;;\n    vulnerable)   bad \"vulnerable\"  ;;\n    *)            meh \"unknown\"     ;;\nesac\nprintf \"  %s\\n\" \"$(dim \"$R_KVER_NOTE\")\"\n\n# 2. Kernel config\nprintf \"  %-18s \" \"Config\"\ncase \"$R_CFG\" in\n    not_set) ok  \"not set\"  ;;\n    m)       meh \"=m\"       ;;\n    y)       bad \"=y\"       ;;\n    *)       meh \"unknown\"  ;;\nesac\ncase \"$R_CFG\" in\n    m)       printf \"  %s\\n\" \"$(dim \"loadable module\")\" ;;\n    y)       printf \"  %s\\n\" \"$(dim \"built-in, rmmod N/A\")\" ;;\n    not_set) printf \"  %s\\n\" \"$(dim \"not compiled\")\" ;;\n    unknown) printf \"  %s\\n\" \"$(dim \"config file unreadable\")\" ;;\n    *)       printf \"\\n\" ;;\nesac\n\n# 3. Module\nprintf \"  %-18s \" \"algif_aead\"\ncase \"$R_MOD\" in\n    loaded)   bad \"loaded\"    ;;\n    on_disk)  meh \"not loaded\" ;;\n    absent)   ok  \"absent\"    ;;\nesac\ncase \"$R_MOD\" in\n    on_disk) printf \"  %s\\n\" \"$(dim \"module file on disk\")\" ;;\n    *)       printf \"\\n\" ;;\nesac\n\n# 4. AF_ALG\nprintf \"  %-18s \" \"AF_ALG socket\"\ncase \"$R_AF_ALG\" in\n    available)   meh \"available\"   ;;\n    unavailable) ok  \"unavailable\" ;;\nesac\nprintf \"\\n\"\n\n# 5. authencesn\nprintf \"  %-18s \" \"authencesn\"\ncase \"$R_CRYPTO\" in\n    present) bad \"instantiated\" ;;\n    absent)  ok  \"absent\"       ;;\nesac\nprintf \"  %s\\n\" \"$(dim \"/proc/crypto\")\"\n\n# 6. Workaround\nprintf \"  %-18s \" \"Workaround\"\ncase \"$R_WORKAROUND\" in\n    both|blacklist|cmdline) ok  \"${R_WORKAROUND}\" ;;\n    pending)                meh \"pending\"          ;;\n    none)                   bad \"none\"             ;;\nesac\n[ -n \"$R_WA_NOTE\" ] &amp;&amp; printf \"  %s\\n\" \"$(dim \"$R_WA_NOTE\")\" || printf \"\\n\"\n\n# 7. Container (only shown when detected \u2014 skipping host means checks may mislead)\nif [ \"$R_CONTAINER\" != \"no\" ]; then\n    printf \"  %-18s \" \"Environment\"\n    meh \"$R_CONTAINER\"\n    printf \"  %s\\n\" \"$(dim \"running inside container \u2014 apply workaround on HOST\")\"\nfi\n\necho \"$DIV\"\n\n# \u2500\u2500\u2500 verdict \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\nverdict() {\n    if [ \"$R_KVER\" = \"not_affected\" ]; then\n        printf \"  ${GREEN}${BOLD}NOT VULNERABLE${NC}   kernel predates vulnerable code (&lt; 4.14)\\n\"\n        return 0\n    fi\n    if [ \"$R_KVER\" = \"patched\" ]; then\n        printf \"  ${GREEN}${BOLD}NOT VULNERABLE${NC}   running a patched kernel\\n\"\n        return 0\n    fi\n    if [ \"$R_CFG\" = \"not_set\" ] &amp;&amp; [ \"$R_MOD\" = \"absent\" ]; then\n        printf \"  ${GREEN}${BOLD}NOT VULNERABLE${NC}   algif_aead not compiled into this kernel\\n\"\n        return 0\n    fi\n    if [ \"$R_WORKAROUND\" = \"pending\" ] &amp;&amp; [ \"$R_MOD\" != \"loaded\" ]; then\n        printf \"  ${YELLOW}${BOLD}MITIGATED${NC}        workaround configured \u2014 ${RED}REBOOT REQUIRED${NC} to activate\\n\"\n        return 3\n    fi\n    if [ \"$R_WORKAROUND\" != \"none\" ] &amp;&amp; [ \"$R_WORKAROUND\" != \"pending\" ] &amp;&amp; [ \"$R_MOD\" != \"loaded\" ]; then\n        printf \"  ${YELLOW}${BOLD}MITIGATED${NC}        workaround active \u2014 upgrade kernel to apply permanent fix\\n\"\n        return 3\n    fi\n    if [ \"$R_AF_ALG\" = \"available\" ] &amp;&amp; [ \"$R_CRYPTO\" = \"present\" ] &amp;&amp; [ \"$R_MOD\" = \"loaded\" ]; then\n        printf \"  ${RED}${BOLD}LIKELY VULNERABLE${NC}  all preconditions met \u2014 apply workaround or upgrade kernel\\n\"\n        return 2\n    fi\n    # Module on disk (=m) or built-in (=y) with no workaround:\n    # any unprivileged user can trigger auto-load via AF_ALG socket \u2014 treat as exploitable\n    if [ \"$R_WORKAROUND\" = \"none\" ] &amp;&amp; { [ \"$R_MOD\" = \"on_disk\" ] || [ \"$R_CFG\" = \"y\" ]; }; then\n        printf \"  ${RED}${BOLD}LIKELY VULNERABLE${NC}  module loadable/built-in, no workaround \u2014 apply workaround or upgrade kernel\\n\"\n        return 2\n    fi\n    printf \"  ${YELLOW}${BOLD}INCONCLUSIVE${NC}     not all preconditions confirmed \u2014 dynamic test recommended\\n\"\n    return 1\n}\n\nverdict\nEXIT_CODE=$?\necho \"$DIV\"\nexit $EXIT_CODE\n\n\n#!/bin/bash\n# Workaround for CVE-2026-31431 (\"Copy Fail\")\n# Disables algif_aead to prevent page-cache corruption via AF_ALG splice.\n# Supports: Debian/Ubuntu, RHEL/CentOS/Fedora, Arch, SUSE, and derivatives.\nset -e\n\n# ---------------------------------------------------------------------------\n# Pre-flight: must run as root\n# ---------------------------------------------------------------------------\nif [ \"$EUID\" -ne 0 ]; then\n    if command -v sudo &gt;/dev/null 2&gt;&amp;1; then\n        exec sudo \"$0\" \"$@\"\n    else\n        echo \"[-] This script must be run as root.\" &gt;&amp;2\n        exit 1\n    fi\nfi\n\n# ---------------------------------------------------------------------------\n# Container detection \u2014 modprobe blacklist written here affects only THIS\n# container's namespace; it does NOT protect the host kernel.  The built-in\n# (=y) GRUB path is also ineffective because /etc/default/grub inside the\n# container is not the host's bootloader config.\n# ---------------------------------------------------------------------------\nIS_CONTAINER=0\nif [ -f /.dockerenv ] \\\n    || grep -qE \"lxc|kubepods|docker|containerd\" /proc/1/cgroup 2&gt;/dev/null \\\n    || [ -n \"${container:-}\" ]; then\n    IS_CONTAINER=1\n    echo \"[!] Container environment detected.\"\n    echo \"    Workaround applied here affects only this container's namespace.\"\n    echo \"    Apply this script on the HOST system to protect the host kernel.\"\n    echo \"\"\nfi\n\n# ---------------------------------------------------------------------------\n# Detect distro (for logging only \u2014 tool detection drives behaviour)\n# ---------------------------------------------------------------------------\nDISTRO=\"unknown\"\nif [ -f /etc/os-release ]; then\n    DISTRO=$(. /etc/os-release &amp;&amp; echo \"${NAME:-unknown}\")\nfi\n\n# ---------------------------------------------------------------------------\n# Detect initramfs rebuild tool\n# ---------------------------------------------------------------------------\nif command -v dracut &gt;/dev/null 2&gt;&amp;1; then\n    INITRAMFS_CMD=\"dracut -f\"\nelif command -v update-initramfs &gt;/dev/null 2&gt;&amp;1; then\n    INITRAMFS_CMD=\"update-initramfs -u\"\nelif command -v mkinitcpio &gt;/dev/null 2&gt;&amp;1; then\n    INITRAMFS_CMD=\"mkinitcpio -P\"\nelif command -v mkinitfs &gt;/dev/null 2&gt;&amp;1; then\n    INITRAMFS_CMD=\"mkinitfs\"           # Alpine Linux\nelse\n    INITRAMFS_CMD=\"\"\nfi\n\n# ---------------------------------------------------------------------------\n# Detect GRUB config tool and target config path\n# ---------------------------------------------------------------------------\nif command -v grub2-mkconfig &gt;/dev/null 2&gt;&amp;1; then\n    GRUB_MKCFG=\"grub2-mkconfig\"\nelif command -v grub-mkconfig &gt;/dev/null 2&gt;&amp;1; then\n    GRUB_MKCFG=\"grub-mkconfig\"\nelse\n    GRUB_MKCFG=\"\"\nfi\n\n# grubby is the preferred kernel-cmdline tool on RHEL/CentOS/Fedora;\n# it handles both legacy GRUB and BLS (Boot Loader Specification) entries.\nif command -v grubby &gt;/dev/null 2&gt;&amp;1; then\n    GRUB_KERNEL_TOOL=\"grubby\"\nelse\n    GRUB_KERNEL_TOOL=\"grub\"\nfi\n\ndetect_grub_cfg_path() {\n    if [ -d /sys/firmware/efi ]; then\n        # Try distro-specific EFI path first to avoid picking the wrong entry\n        # when multiple distros share the same EFI partition.\n        local distro_id cfg\n        distro_id=$(. /etc/os-release 2&gt;/dev/null &amp;&amp; echo \"${ID:-}\" || echo \"\")\n        if [ -n \"$distro_id\" ] &amp;&amp; [ -f \"/boot/efi/EFI/${distro_id}/grub.cfg\" ]; then\n            echo \"/boot/efi/EFI/${distro_id}/grub.cfg\"\n            return\n        fi\n        # Exclude the generic BOOT fallback directory to avoid stale entries.\n        cfg=$(find /boot/efi/EFI -maxdepth 2 -name \"grub.cfg\" 2&gt;/dev/null \\\n            | grep -iv \"/BOOT/\" | head -1)\n        [ -z \"$cfg\" ] &amp;&amp; cfg=$(find /boot/efi -name \"grub.cfg\" 2&gt;/dev/null | head -1)\n        if [ -z \"$cfg\" ]; then\n            echo \"[-] UEFI boot detected but no grub.cfg found under /boot/efi\" &gt;&amp;2\n            exit 1\n        fi\n        echo \"$cfg\"\n    elif [ -f /boot/grub2/grub.cfg ]; then\n        echo \"/boot/grub2/grub.cfg\"\n    elif [ -f /boot/grub/grub.cfg ]; then\n        echo \"/boot/grub/grub.cfg\"\n    else\n        echo \"[-] Cannot locate grub.cfg \u2014 searched /boot/grub2 and /boot/grub\" &gt;&amp;2\n        exit 1\n    fi\n}\n\n# ---------------------------------------------------------------------------\n# Read kernel config\n# ---------------------------------------------------------------------------\nKERNEL=$(uname -r)\nCONFIG_VAL=$(grep -E \"^CONFIG_CRYPTO_USER_API_AEAD=\" /boot/config-\"$KERNEL\" 2&gt;/dev/null \\\n    || zcat /proc/config.gz 2&gt;/dev/null | grep -E \"^CONFIG_CRYPTO_USER_API_AEAD=\" \\\n    || echo \"NOT_FOUND\")\n\necho \"[*] Distro : $DISTRO\"\necho \"[*] Kernel : $KERNEL\"\necho \"[*] CONFIG_CRYPTO_USER_API_AEAD: $CONFIG_VAL\"\necho \"[*] initramfs tool: ${INITRAMFS_CMD:-NOT FOUND}\"\necho \"[*] GRUB mkconfig : ${GRUB_MKCFG:-NOT FOUND}\"\necho \"[*] kernel cmdline: ${GRUB_KERNEL_TOOL}\"\necho \"\"\n\n# ---------------------------------------------------------------------------\ncase \"$CONFIG_VAL\" in\n\n    CONFIG_CRYPTO_USER_API_AEAD=m)\n        echo \"[*] Module mode \u2014 rmmod + blacklist + initramfs rebuild\"\n\n        # Unload with modprobe -r to handle dependencies gracefully.\n        # Do NOT exit if unload fails (e.g. module in use, container) \u2014\n        # the blacklist still prevents reload after next reboot.\n        if lsmod | grep -q \"^algif_aead\"; then\n            if modprobe -r algif_aead 2&gt;/dev/null; then\n                echo \"[+] algif_aead unloaded\"\n            else\n                echo \"[!] Could not unload algif_aead (module in use or insufficient privileges)\"\n                echo \"    Blacklist will prevent reload. Reboot to fully apply.\"\n            fi\n        else\n            echo \"[*] algif_aead not currently loaded, skipping unload\"\n        fi\n\n        BLACKLIST_FILE=\"/etc/modprobe.d/disable-algif_aead.conf\"\n        if [ -f \"$BLACKLIST_FILE\" ]; then\n            echo \"[*] Blacklist already present at $BLACKLIST_FILE\"\n        else\n            echo \"install algif_aead /bin/false\" | tee \"$BLACKLIST_FILE\" &gt; /dev/null\n            echo \"[+] Blacklisted at $BLACKLIST_FILE\"\n\n            if [ -z \"$INITRAMFS_CMD\" ]; then\n                echo \"[-] No initramfs rebuild tool found (dracut / update-initramfs / mkinitcpio).\" &gt;&amp;2\n                echo \"    Rebuild initramfs manually before next boot.\" &gt;&amp;2\n            else\n                $INITRAMFS_CMD\n                echo \"[+] initramfs rebuilt ($INITRAMFS_CMD)\"\n            fi\n        fi\n        ;;\n\n    CONFIG_CRYPTO_USER_API_AEAD=y)\n        echo \"[!] Built-in mode \u2014 must use initcall_blacklist via GRUB kernel cmdline\"\n\n        PARAM=\"initcall_blacklist=algif_aead_init\"\n\n        if [ \"$GRUB_KERNEL_TOOL\" = \"grubby\" ]; then\n            # RHEL / CentOS / Fedora: grubby handles both legacy GRUB and BLS entries.\n            if grubby --info=ALL 2&gt;/dev/null | grep -qF \"$PARAM\"; then\n                echo \"[*] $PARAM already present in kernel args (grubby), skipping\"\n            else\n                grubby --update-kernel=ALL --args=\"$PARAM\"\n                echo \"[+] Added $PARAM to all kernel entries via grubby\"\n                echo \"[+] Reboot to apply. Verify: cat /proc/cmdline | grep initcall_blacklist\"\n            fi\n        else\n            # Debian / Ubuntu / Arch / SUSE: edit /etc/default/grub then mkconfig\n            GRUB_FILE=\"/etc/default/grub\"\n\n            if ! [ -f \"$GRUB_FILE\" ]; then\n                echo \"[-] $GRUB_FILE not found \u2014 cannot configure GRUB automatically.\" &gt;&amp;2\n                echo \"    Add '$PARAM' to your bootloader's kernel command line manually.\" &gt;&amp;2\n                exit 1\n            fi\n\n            if grep -q \"$PARAM\" \"$GRUB_FILE\"; then\n                echo \"[*] $PARAM already present in $GRUB_FILE, skipping\"\n            else\n                # Prefer GRUB_CMDLINE_LINUX (all entries) over _DEFAULT (default entry only)\n                if grep -q \"^GRUB_CMDLINE_LINUX=\" \"$GRUB_FILE\"; then\n                    GRUB_VAR=\"GRUB_CMDLINE_LINUX\"\n                elif grep -q \"^GRUB_CMDLINE_LINUX_DEFAULT=\" \"$GRUB_FILE\"; then\n                    GRUB_VAR=\"GRUB_CMDLINE_LINUX_DEFAULT\"\n                else\n                    echo \"[-] Neither GRUB_CMDLINE_LINUX nor GRUB_CMDLINE_LINUX_DEFAULT found in $GRUB_FILE\" &gt;&amp;2\n                    echo \"    Add '$PARAM' to your bootloader's kernel command line manually.\" &gt;&amp;2\n                    exit 1\n                fi\n\n                sed -i \"s|\\(${GRUB_VAR}=\\\"[^\\\"]*\\)\\\"|\\1 ${PARAM}\\\"|\" \"$GRUB_FILE\"\n\n                # Verify the parameter was actually inserted\n                if ! grep -q \"$PARAM\" \"$GRUB_FILE\"; then\n                    echo \"[-] sed substitution failed \u2014 $PARAM not found in $GRUB_FILE after edit.\" &gt;&amp;2\n                    echo \"    Add '$PARAM' to ${GRUB_VAR} in $GRUB_FILE manually.\" &gt;&amp;2\n                    exit 1\n                fi\n                echo \"[+] Added $PARAM to $GRUB_VAR in $GRUB_FILE\"\n\n                if [ -z \"$GRUB_MKCFG\" ]; then\n                    echo \"[-] No GRUB config tool found (grub2-mkconfig / grub-mkconfig).\" &gt;&amp;2\n                    echo \"    Regenerate your GRUB config manually before rebooting.\" &gt;&amp;2\n                    exit 1\n                fi\n\n                GRUB_CFG=$(detect_grub_cfg_path)\n                echo \"[*] Regenerating GRUB config at $GRUB_CFG\"\n                $GRUB_MKCFG -o \"$GRUB_CFG\"\n                echo \"[+] GRUB updated \u2014 reboot required to apply\"\n                echo \"    After reboot, verify with: cat /proc/cmdline | grep initcall_blacklist\"\n            fi\n        fi\n        ;;\n\n    NOT_FOUND)\n        echo \"[-] Kernel config not found.\" &gt;&amp;2\n        echo \"    Try: grep CONFIG_CRYPTO_USER_API_AEAD /boot/config-$KERNEL\" &gt;&amp;2\n        exit 1\n        ;;\n\n    *)\n        echo \"[-] Unexpected config value: $CONFIG_VAL\" &gt;&amp;2\n        exit 1\n        ;;\nesac\n\n# ---------------------------------------------------------------------------\n# Verification\n# ---------------------------------------------------------------------------\necho \"\"\necho \"[+] Done.\"\n\ncase \"$CONFIG_VAL\" in\n    CONFIG_CRYPTO_USER_API_AEAD=m)\n        if lsmod | grep -q \"^algif_aead\"; then\n            echo \"[!] WARNING: algif_aead is still loaded \u2014 unload failed.\"\n        else\n            echo \"[+] algif_aead is NOT loaded. Workaround active immediately.\"\n        fi\n        ;;\n    CONFIG_CRYPTO_USER_API_AEAD=y)\n        echo \"[*] Built-in module \u2014 workaround takes effect after reboot.\"\n        echo \"    Post-reboot check: cat /proc/cmdline | grep initcall_blacklist\"\n        ;;\nesac", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "4f09d65c-4fec-45f2-9d4f-4eb473092d95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T12:01:29.862971+00:00", "type": "seen", "source": "https://bsky.app/profile/securestep9.bsky.social/post/3ml45bb4yih24", "content": "#Apache HTTP Server Vulnerability CVE-2026-23918 Exposes Millions of Servers to Remote Code Execution Attacks.\nAnyone running Apache httpd version 2.4.66 or earlier are strongly urged to upgrade immediately!\n\n\ud83d\udc47", "vulnerability": "CVE-2026-23918", "author": {"login": "automation"}}, {"uuid": "b8f98051-c627-4956-ae87-746af102a3aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T12:00:05+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82911", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-41044\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a mrillicit\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Shell\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-05 11:44:04\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\n\u65e0\u63cf\u8ff0\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-41044", "author": {"login": "automation"}}, {"uuid": "ff35462f-c911-4eba-a101-fc0e15ffc72d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T11:57:08.462868+00:00", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116521843218674009", "content": "There is a new vulnerability with elevated criticality in D-Link DI-8100 (CVE-2026-7854) https://vuldb.com/vuln/361131", "vulnerability": "CVE-2026-7854", "author": {"login": "automation"}}, {"uuid": "76a60d9d-684c-4640-8954-8571cd5e6ca5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T11:44:26.604891+00:00", "type": "seen", "source": "https://bsky.app/profile/securestep9.bsky.social/post/3ml44ctvsok2g", "content": "#WhatsApp Vulnerability CVE-2026-23866 Lets Attackers Leverage Instagram Reels to Execute Malicious URLs:\n\n\ud83d\udc47\ncybersecuritynews.com/whatsapp-vul...", "vulnerability": "CVE-2026-23866", "author": {"login": "automation"}}, {"uuid": "7beb74a5-fd97-4591-90ef-782a9d4f6393", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T11:43:23.727537+00:00", "type": "seen", "source": "https://bsky.app/profile/cerberusit.bsky.social/post/3ml44ay7fhq2h", "content": "Weaver E-cology users are discovering the hard way that their office automation platform\u2019s debug API is basically an invitation for active exploitation. This critical CVE-2026-22679 flaw allows attackers to bypass whatever meager defenses were in place to achieve remote code ex...\n\nRead full story", "vulnerability": "CVE-2026-22679", "author": {"login": "automation"}}, {"uuid": "acf74f11-8c58-41d3-8caf-cfb27bee6f50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T11:37:22.053068+00:00", "type": "seen", "source": "https://bsky.app/profile/albertvalo.itch.io/post/3ml43vkrjrc2f", "content": "vale aviam. Resulta que s'ha descobert una vulnerabilitat en el kernel anonemada Copy Fail, o CVE-2026-31431, la cual dona acc\u00e9s privilegiat (root) a qualsevol usuario sense aquests privilegis. Aix\u00f2 es un problema perqu\u00e8 imagina que un script de python solicita aquests privilegis aprofitant-se", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "355766e2-ae56-48aa-ad57-090b9206bf92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T11:37:13+00:00", "type": "seen", "source": "https://t.me/habr_com_news/46251", "content": "\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u041d\u0422\u0426 \u0418\u0422 \u00ab\u0420\u043e\u0441\u0430\u00bb \u0437\u0430\u044f\u0432\u0438\u043b\u0430, \u0447\u0442\u043e \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2026-31431, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0435\u0439 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 Copy Fail. \u041a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u043b\u0443\u0436\u0431\u0435 \u0425\u0430\u0431\u0440\u0430 \u0432 \u043f\u0440\u0435\u0441\u0441\u2011\u0441\u043b\u0443\u0436\u0431\u0435 \u041d\u0422\u0426 \u0418\u0422 \u00ab\u0420\u043e\u0441\u0430\u00bb, \u0432 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0439 \u043a\u0430\u0440\u0442\u043e\u0447\u043a\u0435 ROSA Bugzilla \u043f\u043e \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0443\u043a\u0430\u0437\u0430\u043d \u0441\u0442\u0430\u0442\u0443\u0441 RESOLVED FIXED. \u0422\u0430\u043c \u0436\u0435 \u0440\u0430\u0437\u043c\u0435\u0449\u0435\u043d\u044b \u0441\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0441\u0431\u043e\u0440\u043a\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u0439 \u044f\u0434\u0435\u0440 \u0434\u043b\u044f ROSA 13 \u0438 ROSA 2021.1 (ROSA 12), \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u044f\u0434\u0440\u0430 6.12, 6.6, 5.15 \u0438 5.10. \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u044f\u0434\u0435\u0440 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u044b \u0434\u043b\u044f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u044b\u0445 \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440 x86_64 (Intel, AMD), aarch64 (Baikal\u2011M, Baikal\u2011L) \u0438 loongarch64 (Loongson, \u00ab\u0418\u0440\u0442\u044b\u0448\u00bb).\n\n#\u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c #\u041e\u0421", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "1e44f5ba-a74c-4c44-9fcd-ec704e31afb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T11:37:11.897142+00:00", "type": "seen", "source": "https://bsky.app/profile/albertvalo.itch.io/post/3ml43vkrgtk2f", "content": "vale aviam. Resulta que s'ha descobert una vulnerabilitat en el kernel anonemada Copy Fail, o CVE-2026-31431, la cual dona acc\u00e9s privilegiat (root) a qualsevol usuario sense aquests privilegis. Aix\u00f2 es un problema perqu\u00e8 imagina que un script de python solicita aquests privilegis aprofitant-se", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "0483070e-3923-4215-9d42-2c032f23eaf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T11:37:11.182473+00:00", "type": "seen", "source": "https://bsky.app/profile/albertvalo.itch.io/post/3ml43vkchds2f", "content": "vale aviam. Resulta que s'ha descobert una vulnerabilitat en el kernel anonemada Copy Fail, o CVE-2026-31431, la cual dona acc\u00e9s privilegiat (root) a qualsevol usuario sense aquests privilegis. Aix\u00f2 es un problema perqu\u00e8 imagina que un script de python solicita aquests privilegis aprofitant-se", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "88b1fdcb-921c-47dd-88d8-e4c2ecc5ec19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T11:37:04.184085+00:00", "type": "seen", "source": "https://bsky.app/profile/albertvalo.itch.io/post/3ml43vkcgek2f", "content": "vale aviam. Resulta que s'ha descobert una vulnerabilitat en el kernel anonemada Copy Fail, o CVE-2026-31431, la cual dona acc\u00e9s privilegiat (root) a qualsevol usuario sense aquests privilegis. Aix\u00f2 es un problema perqu\u00e8 imagina que un script de python solicita aquests privilegis aprofitant-se", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "8b806e28-a77e-4fe6-b3ec-018146a8bdaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T11:37:01.730042+00:00", "type": "seen", "source": "https://bsky.app/profile/albertvalo.itch.io/post/3ml43vkcchk2f", "content": "vale aviam. Resulta que s'ha descobert una vulnerabilitat en el kernel anonemada Copy Fail, o CVE-2026-31431, la cual dona acc\u00e9s privilegiat (root) a qualsevol usuario sense aquests privilegis. Aix\u00f2 es un problema perqu\u00e8 imagina que un script de python solicita aquests privilegis aprofitant-se", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "e7f144a2-f05b-4c9d-9327-b835424a1cb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T11:33:05.882525+00:00", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml43olqrv42a", "content": "CVE-2024-13362 url-shortify (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "vulnerability": "CVE-2024-13362", "author": {"login": "automation"}}, {"uuid": "65c9b4b6-ec69-4a55-a6bc-93b601a36bb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T11:26:46+00:00", "type": "seen", "source": "Telegram/qLtl-ESgxngd0KdCJZLq4iZUn677J7G_lqnf1Nr9VcS_CEGq", "content": "", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "e110a7cc-23cd-405b-a043-f38528ed4cf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T11:25:11.838206+00:00", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116521717688012588", "content": "Some increased actor activities are shown targeting Apache HTTP Server (CVE-2026-34032) https://vuldb.com/vuln/360959/cti", "vulnerability": "CVE-2026-34032", "author": {"login": "automation"}}, {"uuid": "70053ff6-7fb0-4c3d-989b-3b366768d856", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T11:19:07.516468+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml42vmaprd2v", "content": "CVE-2026-6180 - PaperCut MF: Card truncation on HP readers\nCVE ID : CVE-2026-6180\n \n Published : May 5, 2026, 7:16 a.m. | 1\u00a0hour, 19\u00a0minutes ago\n \n Description : A race condition exists in PaperCut MF when processing badge-swipe data from certain HP multifunction devices. Unde...", "vulnerability": "CVE-2026-6180", "author": {"login": "automation"}}, {"uuid": "24c98833-b55e-4f12-8c8d-d3231dbbbbb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T11:14:06.863145+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml42mnpm2o2e", "content": "CVE-2026-6418 - PaperCut NG/MF: Path Traversal in Shared Account Synchronization\nCVE ID : CVE-2026-6418\n \n Published : May 5, 2026, 7:16 a.m. | 1\u00a0hour, 19\u00a0minutes ago\n \n Description : An issue was discovered in the Shared Account Synchronization component of PaperCut MF (versi...", "vulnerability": "CVE-2026-6418", "author": {"login": "automation"}}, {"uuid": "1f66213c-92f4-42f9-9ea0-6537afa3e355", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T11:09:06.791064+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml42dpaud62p", "content": "CVE-2026-43868 - Apache Thrift: Rust implementation vulnerable to CVE-2020-13949 pattern\nCVE ID : CVE-2026-43868\n \n Published : May 5, 2026, 7:49 a.m. | 46\u00a0minutes ago\n \n Description : Memory Allocation with Excessive Size Value vulnerability in Apache Thrift.\n\nThis issue affe...", "vulnerability": "CVE-2020-13949", "author": {"login": "automation"}}, {"uuid": "1c6e1a2a-8f4c-45e6-9557-38c5528854aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T11:09:06.602603+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml42dpaud62p", "content": "CVE-2026-43868 - Apache Thrift: Rust implementation vulnerable to CVE-2020-13949 pattern\nCVE ID : CVE-2026-43868\n \n Published : May 5, 2026, 7:49 a.m. | 46\u00a0minutes ago\n \n Description : Memory Allocation with Excessive Size Value vulnerability in Apache Thrift.\n\nThis issue affe...", "vulnerability": "CVE-2026-43868", "author": {"login": "automation"}}, {"uuid": "3cf78729-cd78-4c70-b096-30aa69342cf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T11:04:06.687794+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml422qsgql2c", "content": "CVE-2026-3359 - Form Maker by 10Web \u2013 Mobile-Friendly Drag &amp; Drop Contact Form Builder\nCVE ID : CVE-2026-3359\n \n Published : May 5, 2026, 7:42 a.m. | 53\u00a0minutes ago\n \n Description : The Form Maker by 10Web \u2013 Mobile-Friendly Drag &amp; Drop Contact Form Builder plugin for WordP...", "vulnerability": "CVE-2026-3359", "author": {"login": "automation"}}, {"uuid": "99a2f941-5789-4784-9998-b6209df6d9f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T11:02:07.449788+00:00", "type": "seen", "source": "https://bsky.app/profile/keiwork35.bsky.social/post/3ml3zx7dchd2b", "content": "\u3010\u8106\u5f31\u6027\u60c5\u5831\u3011 CVE-2026-7334 Google Chrome for\u00a0Mac\u306e\u8106\u5f31\u6027\u306b\u3064\u3044\u3066\n\nGoogle Chrome for Mac \u306e 147.0.7727.138 \u3088\u308a\u524d\u306e\u30d0\u30fc\u30b8\u30e7\u30f3\u306b\u304a\u3044\u3066\u3001Views \u306b Use after free \u306e\u8106\u5f31\u6027\u304c\u5b58\u5728\u3057\u307e\u3059\u3002", "vulnerability": "CVE-2026-7334", "author": {"login": "automation"}}, {"uuid": "32382e0d-265e-4a75-a170-51da488cef3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T11:00:04+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82904", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-31431-Copy-Fail\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a Industri4l-H3ll-Xpl0it3rs\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-05 10:59:44\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nCVE-2026-31431 Exploit | by infrar3d\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "f56828d7-760c-485c-a712-067626ad3975", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:59:06.444885+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3zrsedcp2c", "content": "CVE-2026-2729 - Forminator \u2013 Contact Form, Payment Form &amp; Custom Form Builder\nCVE ID : CVE-2026-2729\n \n Published : May 5, 2026, 7:15 a.m. | 1\u00a0hour, 20\u00a0minutes ago\n \n Description : The Forminator plugin for WordPress is vulnerable to authorization bypass in all versions up to,...", "vulnerability": "CVE-2026-2729", "author": {"login": "automation"}}, {"uuid": "f5b4f113-c183-4e35-810e-7434f1880a38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:54:06.086645+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3zismlb22e", "content": "CVE-2026-3454 - GenerateBlocks\nCVE ID : CVE-2026-3454\n \n Published : May 5, 2026, 7:16 a.m. | 1\u00a0hour, 19\u00a0minutes ago\n \n Description : The GenerateBlocks plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.0. This is ...", "vulnerability": "CVE-2026-3454", "author": {"login": "automation"}}, {"uuid": "a75498f0-1844-4ec2-8c3d-112ade4982e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:53:40.759470+00:00", "type": "seen", "source": "https://bsky.app/profile/pixelhead.bsky.social/post/3ml3zi47fz22h", "content": "Wegen diesem Copy Fail Bug CVE-2026-31431 bei #linux ... ich wei\u00df jetzt immer noch nicht, ob oder wie sehr das Smartphones oder Tablets mit Android betrifft.\nIch habe mal auf meknem Linuxrechner nach meiner Kernel Baureihe nachgeschaut (im Changelog) und da ist noch kein Fix dabei. \n#copyfail", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "85eccb8e-bae7-4463-9cbe-e086e696b1a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:49:46.471434+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3zb4z75s2t", "content": "CVE-2026-43870 - Apache Thrift: Node.js web_server.js multi-vulnerability\nCVE ID : CVE-2026-43870\n \n Published : May 5, 2026, 7:45 a.m. | 50\u00a0minutes ago\n \n Description : Origin Validation Error, Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Im...", "vulnerability": "CVE-2026-43870", "author": {"login": "automation"}}, {"uuid": "4e6f2759-db11-42ce-88b0-b4934d5a662b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:46:01.306290+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3z2g4dqg2o", "content": "CVE-2026-3601 - User Registration &amp; Membership\nCVE ID : CVE-2026-3601\n \n Published : May 5, 2026, 8:27 a.m. | 8\u00a0minutes ago\n \n Description : The User Registration &amp; Membership plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capabili...", "vulnerability": "CVE-2026-3601", "author": {"login": "automation"}}, {"uuid": "6579e275-76e8-4f97-8b8a-1d783906f513", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:42:40.695207+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3yugygs62i", "content": "CVE-2026-40797 - WordPress WebinarIgnition plugin\nCVE ID : CVE-2026-40797\n \n Published : May 5, 2026, 7:16 a.m. | 1\u00a0hour, 19\u00a0minutes ago\n \n Description : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saleswonder LLC Webin...", "vulnerability": "CVE-2026-40797", "author": {"login": "automation"}}, {"uuid": "4b44bd44-0358-49f1-887a-263f0a0fe58d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:39:40.590847+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3yp2zkcb2v", "content": "CVE-2026-7824 - PaperCut Hive (Ricoh): Plain text password in logs\nCVE ID : CVE-2026-7824\n \n Published : May 5, 2026, 7:16 a.m. | 1\u00a0hour, 19\u00a0minutes ago\n \n Description : An issue was discovered in the PaperCut Hive Ricoh embedded application. When the \"Deep Logging\" (diagnosti...", "vulnerability": "CVE-2026-7824", "author": {"login": "automation"}}, {"uuid": "3f8d8485-f297-4493-96a5-364cdd6fbd0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:38:40.136202+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3ynbiewp2p", "content": "CVE-2026-5192 - Forminator Forms \u2013 Contact Form, Payment Form &amp; Custom Form Builder\nCVE ID : CVE-2026-5192\n \n Published : May 5, 2026, 7:16 a.m. | 1\u00a0hour, 19\u00a0minutes ago\n \n Description : The Forminator Forms \u2013 Contact Form, Payment Form &amp; Custom Form Builder plugin for Wor...", "vulnerability": "CVE-2026-5192", "author": {"login": "automation"}}, {"uuid": "2b445578-d3b3-4923-9540-a93ef6ca443d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:37:44.532257+00:00", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3ml3ylm7kj725", "content": "\ud83d\udcf0 Bug Kritis Weaver E-cology Dieksploitasi dalam Serangan Sejak Maret\n\n\ud83d\udc49 Baca artikel lengkap di sini: https://ahmandonk.com/2026/05/05/bug-kritis-weaver-e-cology-dieksploitasi-dalam-serangan-sejak-maret/\n\n#ahmandonkTechNews #beritaTeknologi #cve-2026-22679 #potatocrime #keamananSiber #kerentan", "vulnerability": "cve-2026-22679", "author": {"login": "automation"}}, {"uuid": "40c44438-5ce1-4a9b-a796-0fdf9f902f68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:37:43.919019+00:00", "type": "seen", "source": "https://bsky.app/profile/ahmandonk.bsky.social/post/3ml3yllsd2j2o", "content": "\ud83d\udcf0 Bug Kritis Weaver E-cology Dieksploitasi dalam Serangan Sejak Maret\n\n\ud83d\udc49 Baca artikel lengkap di sini: https://ahmandonk.com/2026/05/05/bug-kritis-weaver-e-cology-dieksploitasi-dalam-serangan-sejak-maret/\n\n#ahmandonkTechNews #beritaTeknologi #cve-2026-22679 #cybercrime #keamananSiber #kerentan", "vulnerability": "cve-2026-22679", "author": {"login": "automation"}}, {"uuid": "f8420aeb-c957-4829-b8e6-9ae6e6745805", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:36:28.992440+00:00", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3ml3yjbghkb27", "content": "WordPress\u30d7\u30e9\u30b0\u30a4\u30f3\u300cForm Maker by 10Web\u300d1.15.42\u4ee5\u524d\u3067\u3001SQL\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u306e\u8106\u5f31\u6027\u3002\u653b\u6483\u8005\u306f\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u304b\u3089\u6a5f\u5bc6\u60c5\u5831\u3092\u4e0d\u6b63\u306b\u53d6\u5f97\u3067\u304d\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u3002\nCVE-2026-3359 CVSS 7.5 | HIGH", "vulnerability": "CVE-2026-3359", "author": {"login": "automation"}}, {"uuid": "9783347f-2864-4f17-8af5-62b4d9569f33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:33:49.252528+00:00", "type": "seen", "source": "https://bsky.app/profile/ulisesgascon.com/post/3ml3yek4kos2b", "content": "\ud83d\udea8 High-severity security fix in fast-uri@3.1.2 just released!\n\nPatches CVE-2026-6322 \u2014 fast-uri vulnerable to host confusion via percent-encoded authority delimiters\n\ngithub.com/fastify/fast...", "vulnerability": "CVE-2026-6322", "author": {"login": "automation"}}, {"uuid": "2c3bf4fe-4a74-48a7-899a-78b5c87a477c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:33:39.953889+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3yed2e7y2e", "content": "CVE-2026-43869 - Apache Thrift: TSSLTransportFactory.java hostname verification\nCVE ID : CVE-2026-43869\n \n Published : May 5, 2026, 8:16 a.m. | 19\u00a0minutes ago\n \n Description : Improper Validation of Certificate with Host Mismatch vulnerability in Apache Thrift.\n\nThis issue aff...", "vulnerability": "CVE-2026-43869", "author": {"login": "automation"}}, {"uuid": "af47e56e-33c8-4e3f-84fd-c300f844c5ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:33:06.133995+00:00", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml3ydcfqip2g", "content": "CVE-2024-13362 gpt3-ai-content-generator (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "vulnerability": "CVE-2024-13362", "author": {"login": "automation"}}, {"uuid": "d8aa9a93-e665-4dd2-bdbc-bec4fcecd665", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:31:45.736067+00:00", "type": "seen", "source": "https://bsky.app/profile/innovatopia.jp/post/3ml3yargmns2r", "content": "Thunderbird 150.0.1\u7dca\u6025\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u516c\u958b\u3001\u30e1\u30e2\u30ea\u7834\u640d\u3067\u4efb\u610f\u30b3\u30fc\u30c9\u5b9f\u884c\u306e\u6050\u308c\u20144\u4ef6\u306e\u8106\u5f31\u6027\u3092Mozilla\u304c\u4fee\u6b63\ninnovatopia.jp/cyber-securi...\n\n\u4eca\u56de\u306e\u30a2\u30c9\u30d0\u30a4\u30b6\u30ea\u3067\u7279\u306b\u6ce8\u76ee\u3057\u305f\u3044\u306e\u306f\u30014\u4ef6\u306e\u3046\u30611\u4ef6\uff08CVE-2026-7322\uff09\u304c\u6df1\u523b\u5ea6\u300ccritical\uff08\u7dca\u6025\uff09\u300d\u306b\u5206\u985e\u3055\u308c\u3066\u3044\u308b\u70b9\u3067\u3059\u3002Mozilla\u306f\u300c\u30e1\u30e2\u30ea\u7834\u640d\u306e\u75d5\u8de1\u304c\u3042\u308a\u3001\u5341\u5206\u306a\u52b4\u529b\u3092\u304b\u3051\u308c\u3070\u4efb\u610f\u306e\u30b3\u30fc\u30c9\u5b9f\u884c\u306b\u60aa\u7528\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u3063\u305f\u300d\u3068\u660e\u8a18\u3057\u3066\u304a\u308a\u3001\u3053\u308c\u306f\u653b\u6483\u8005\u304c\u6a19\u7684\u306ePC\u4e0a\u3067\u610f\u56f3\u3057\u305f\u30d7\u30ed\u30b0\u30e9\u30e0\u3092\u52d5\u304b\u305b\u3066\u3057\u307e\u3046\u3001\u6700\u3082\u8b66\u6212\u3059\u3079\u304d\u30bf\u30a4\u30d7\u306e\u8106\u5f31\u6027\u3092\u610f\u5473\u3057\u307e\u3059\u3002", "vulnerability": "CVE-2026-7322", "author": {"login": "automation"}}, {"uuid": "18bb34f9-a65e-4d9e-9317-0514dc779240", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:30:32.221147+00:00", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3ml3y6pkxqf2v", "content": "CRITICAL: OS command injection in WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) lets attackers run shell commands remotely. No patch yet \u2014 isolate &amp; monitor now. https://radar.offseq.com/threat/cve-2026-41924-improper-neutralization-of-special--62b0b2d6 #OffSeq #Vulnerability #IoTSecurity", "vulnerability": "cve-2026-41924", "author": {"login": "automation"}}, {"uuid": "96dd1ed7-634f-4300-b004-131a289f13cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:30:30.381928+00:00", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116521502604855300", "content": "\ud83d\udea8 CVE-2026-41924 (CRITICAL): OS command injection in WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) enables unauthenticated remote shell command execution. No patch yet \u2014 immediate isolation &amp; monitoring advised. https://radar.offseq.com/threat/cve-2026-41924-improper-neutralization-of-special--62b0b2d6 #OffSeq #Vuln #IoTSecurity", "vulnerability": "cve-2026-41924", "author": {"login": "automation"}}, {"uuid": "afb531d8-37ae-46e2-be9f-f4e385402a5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:22:19.052053+00:00", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3ml3xpvpfx224", "content": "\u26a0\ufe0f A high-severity flaw in CVE-2026-35228 affects Oracle MCP Server Helper Tool (CVSS 8.7). Unauthenticated attackers can execute malicious SQL via HTTP.  \n\n\ud83d\udd17 basefortify.eu/cve_reports/...  \n\n#CVE #CyberSecurity #Oracle", "vulnerability": "CVE-2026-35228", "author": {"login": "automation"}}, {"uuid": "c7ddc1bb-c3ae-45ce-aca5-0d4716b31c73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:22:17.989258+00:00", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3ml3xptbkqc24", "content": "\u26a0\ufe0f A high-severity flaw in CVE-2026-35228 affects Oracle MCP Server Helper Tool (CVSS 8.7). Unauthenticated attackers can execute malicious SQL via HTTP.  \n\n\ud83d\udd17 basefortify.eu/cve_reports/...  \n\n#CVE #CyberSecurity #Oracle", "vulnerability": "CVE-2026-35228", "author": {"login": "automation"}}, {"uuid": "b6f0ad93-2c11-45d1-a853-49d3e0aac578", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:22:17.452281+00:00", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3ml3xpqm3f224", "content": "\u26a0\ufe0f A high-severity flaw in CVE-2026-35228 affects Oracle MCP Server Helper Tool (CVSS 8.7). Unauthenticated attackers can execute malicious SQL via HTTP.  \n\n\ud83d\udd17 basefortify.eu/cve_reports/...  \n\n#CVE #CyberSecurity #Oracle", "vulnerability": "CVE-2026-35228", "author": {"login": "automation"}}, {"uuid": "2e233c0f-1eda-4b4f-baa5-1c137ca83280", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:18:03.520033+00:00", "type": "seen", "source": "https://bsky.app/profile/camorabug.com/post/3ml3xig5ipk2t", "content": "Microsoft warns of high-severity Linux privilege escalation\u00a0flaw\n\nA new Microsoft warning says Copy Fail could increase risks for Kubernetes, CI/CD, and shared Linux workloads. Microsoft Defender has warned that CVE-2026-31431, also known as \u2018Copy Fail\u2018, is a high-severity local privilege\u2026", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "b25d054d-212c-4401-b79f-e5aef0e38dda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:11:39.587750+00:00", "type": "seen", "source": "https://bsky.app/profile/hn-frontpage-bot.bsky.social/post/3ml3x4xy32p2v", "content": "A vulnerability (CVE-2026-31431) allowed privilege escalation within a rootless container by corrupting the page cache of /usr/bin/su. However, User Namespace UID mapping prevented the escalation from affecting the host system, demonstrating the effectiveness of rootless container architecture.", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "58ac261b-cc44-4efa-a3a4-3024c541c738", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:10:00.963631+00:00", "type": "seen", "source": "https://bsky.app/profile/vritrasecnews.bsky.social/post/3ml3wzztpyp2n", "content": "A critical security vulnerability in Weaver (Fanwei) E-cology, an enterprise office automation (OA) and collaboration platform, has come under active exploitation in the wild. The vulnera...\n\n\ud83d\udd17 https://thehackernews.com/2026/05/weaver-e-cology-rce-flaw-cve-2026-22679.html", "vulnerability": "cve-2026-22679", "author": {"login": "automation"}}, {"uuid": "d6b2ea43-8550-41ec-a474-20215f2e6d1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:07:08.110048+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3ml3wuuscot25", "content": "\ud83d\udccc CVE-2026-7372 - A stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVision GV-VMS V20 20.0.2. A specially crafted HTTP request can le... https://www.cyberhub.blog/cves/CVE-2026-7372", "vulnerability": "CVE-2026-7372", "author": {"login": "automation"}}, {"uuid": "c5958160-f54c-4322-a959-e8b65eb2e28e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:04:41.525112+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml3wqiwkrw2x", "content": "Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API", "vulnerability": "CVE-2026-22679", "author": {"login": "automation"}}, {"uuid": "45b84374-3f1a-4633-97a9-9bb447da0c19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:04:22.053102+00:00", "type": "seen", "source": "https://bsky.app/profile/echobit.de/post/3ml3wpvvox22d", "content": "Na prima: cPanel und WHM, die Control-Panels hinter gesch\u00e4tzten 70+ Millionen Websites, haben einen kritischen Sicherheitsfehler, der es jedem erm\u00f6glicht, ohne Passwort zum Root-Admin zu werden. CVE-2026-41940 betrifft jede unterst\u00fctzte Version.", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "279b3b04-b993-4724-9a87-ad83d8bc5f2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T10:00:05+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82888", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a Copy-Fail-CVE-2026-31431-Kubernetes-PoC\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a Percivalll\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a C\n\u2b50 Star\u6570\u91cf\uff1a 44  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 14\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-05 09:55:23\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\n\u65e0\u63cf\u8ff0\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "2f53322f-0593-47d6-8202-e231b2ddb78c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T09:56:32.787872+00:00", "type": "seen", "source": "https://bsky.app/profile/camorabug.com/post/3ml3wbwwvr42q", "content": "FreeBSD DHCP Client Vulnerability Enables Remote Code Execution as\u00a0Root\n\nThe FreeBSD Project has released a critical security advisory addressing a severe flaw in its default IPv4 DHCP client. Tracked as\u00a0CVE-2026-42511, this vulnerability allows a local network attacker to execute arbitrary code as\u2026", "vulnerability": "CVE-2026-42511", "author": {"login": "automation"}}, {"uuid": "cf9ac821-c976-4e5f-85e7-1f2c034cd574", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T09:45:23.814588+00:00", "type": "seen", "source": "https://bsky.app/profile/hn100.atproto.rocks/post/3ml3vnz7zbm2n", "content": "CVE-2026-31431: Copy Fail vs. rootless containers\nhttps://www.dragonsreach.it/2026/05/04/cve-2026-31431-copy-fail-rootless-containers/\n\nhttps://news.ycombinator.com/item?id=48017813", "vulnerability": "cve-2026-31431", "author": {"login": "automation"}}, {"uuid": "f842134f-c2c0-4e98-89d0-d69836e6eb7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T09:42:01.425566+00:00", "type": "seen", "source": "https://bsky.app/profile/camorabug.com/post/3ml3vhxu7eb2v", "content": "Microsoft warns of high-severity Linux privilege escalation\u00a0flaw\n\nA new Microsoft warning says Copy Fail could increase risks for Kubernetes, CI/CD, and shared Linux workloads. Microsoft Defender has warned that CVE-2026-31431, also known as \u2018Copy Fail\u2018, is a high-severity local privilege\u2026", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "203376a8-750c-43b0-af70-900e2597cadc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T09:33:35.545167+00:00", "type": "seen", "source": "https://bsky.app/profile/probbrain.bsky.social/post/3ml3uyvu37222", "content": "CVE-2026-31431: Copy Fail vs. rootless containers", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "c156c8a0-cf98-4319-92d9-e052746e728c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T09:33:05.809007+00:00", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml3uxz5vyb2s", "content": "CVE-2024-13362 interactive-geo-maps (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "vulnerability": "CVE-2024-13362", "author": {"login": "automation"}}, {"uuid": "e6423242-f24f-42ce-8b0f-c50641179689", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T09:00:05.964840+00:00", "type": "seen", "source": "https://bsky.app/profile/ocelotlsec.bsky.social/post/3ml3t4wb4hq2x", "content": "\ud83d\udea8 Alerta de Seguridad: CVE-2024-55591\n\nFortinet FortiOS auth bypass 2025\n\nOcelotl Intelligence detecta y protege contra esta amenaza autom\u00e1ticamente.\n\n\ud83d\udd0d Escanea tu infraestructura gratis: https://ocelotlsec.mx\n\n#Ciberseguridad #LATAM #CVE #Seguridad", "vulnerability": "CVE-2024-55591", "author": {"login": "automation"}}, {"uuid": "4e4e138e-6b9a-43f9-8412-cd368ec24638", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T09:00:04+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82883", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a cve-2026-2005\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a dinosn\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 1  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-05 08:52:46\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nCVE-2026-2005 \u2014 PostgreSQL pgcrypto heap overflow RCE exploit\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-2005", "author": {"login": "automation"}}, {"uuid": "d1299dde-bf70-4be0-a54f-09e0a52217aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:50:40.895719+00:00", "type": "seen", "source": "https://bsky.app/profile/camorabug.com/post/3ml3sm5jyic24", "content": "FreeBSD DHCP Client Vulnerability Enables Remote Code Execution as\u00a0Root\n\nThe FreeBSD Project has released a critical security advisory addressing a severe flaw in its default IPv4 DHCP client. Tracked as\u00a0CVE-2026-42511, this vulnerability allows a local network attacker to execute arbitrary code as\u2026", "vulnerability": "CVE-2026-42511", "author": {"login": "automation"}}, {"uuid": "3896911e-2c50-480b-9d68-670b3acf3191", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:38:55+00:00", "type": "seen", "source": "https://gist.github.com/acalatrava/a632d8e224ce05db8a30be1d4e2dd69a", "content": "", "vulnerability": "cve-2026-31431", "author": {"login": "automation"}}, {"uuid": "037e6bcc-cc47-4a75-9731-ac45cfec2b6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:36:12+00:00", "type": "seen", "source": "https://t.me/cibsecurity/89290", "content": "\ud83d\udd8b\ufe0f Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API \ud83d\udd8b\ufe0f\n\nA critical security vulnerability in Weaver Fanwei Ecology, an enterprise office automation OA and collaboration platform, has come under active exploitation in the wild. The vulnerability CVE202622679, CVSS score 9.8 relates to a case of unauthenticated remote code execution affecting Weaver Ecology 10.0 versions prior to 20260312. The issue resides in the \"papiesearchdatadevops.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "vulnerability": "CVE-2026-22679", "author": {"login": "automation"}}, {"uuid": "ca8419f2-69e6-47e8-8805-25eb528fa0d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:33:05.518817+00:00", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml3rmplhzw2i", "content": "CVE-2024-13362 cf7-styler (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "vulnerability": "CVE-2024-13362", "author": {"login": "automation"}}, {"uuid": "6b269345-28a0-43f6-83ee-c84af4795290", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:32:24.775674+00:00", "type": "seen", "source": "https://bsky.app/profile/annabzz.bsky.social/post/3ml3rlii7n22z", "content": "CVE-2026-31431?", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "eb39bcd3-425a-4a6d-b3b9-e5afd0b7a999", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:30:41.043192+00:00", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3ml3rifgyxg27", "content": "Critical Weaver E-cology Flaw (CVE-2026-22679) Actively Exploited in the Wild: Enterprise Systems Under Silent\u00a0Attack\n\nIntroduction: A Silent Breach in a Widely Used Enterprise Platform A severe security vulnerability has emerged in Weaver (Fanwei) E-cology, a widely deployed enterprise office\u2026", "vulnerability": "CVE-2026-22679", "author": {"login": "automation"}}, {"uuid": "3be76bd2-0792-40bd-883d-1bf01da2ab83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:27:30.777934+00:00", "type": "seen", "source": "https://bsky.app/profile/Ubuntu.activitypub.awakari.com.ap.brid.gy/post/3ml3rcn3kbgy2", "content": "CopyFail sur Linux : les patchs de s\u00e9curit\u00e9 sont-ils disponibles ? Les patchs pour la CVE-2026-31431, alias CopyFail, sont-ils disponibles pour les distributions Linux : Debian, Ubuntu, RHEL, etc...\n\n#Actu #Cybers\u00e9curit\u00e9 #Cybers\u00e9curit\u00e9 #Linux\n\nOrigin | Interest | Match", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "a10fa660-66a2-4b71-b490-93c4f7308fa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:26:38+00:00", "type": "seen", "source": "https://gist.github.com/stone776/e534e49616d908924a231b9cbe88183b", "content": "", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "86eb20f6-3f3c-4c1e-ba63-e67aea1d5ea1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:22:07.197164+00:00", "type": "seen", "source": "https://bsky.app/profile/pixelsandpulse.bsky.social/post/3ml3qz3qfqc2h", "content": "A severe Linux kernel vulnerability, CVE-2026-31431 \"Copy Fail,\" lets attackers corrupt in-memory binaries for privilege escalation. We break down how it works and why rootless containers like Podman offer a vital layer of\u2026\n\nhttps://www.tpp.blog/1ip7iqt\n\n#cybersecurity #cve202631431 #copyfail", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "9516581a-be33-46dd-b6a7-1de1905e828e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:20:10.711124+00:00", "type": "seen", "source": "https://bsky.app/profile/gabywald.bsky.social/post/3ml3qvmebu22r", "content": "\"Copy Fail (CVE-2026-31431) : Synth\u00e8se technique sur cette faille Linux\"\n\n#Faille #Linux #CopyFail #Explications #Correctifs ... \n\nwww.linuxtricks.fr/news/10-logi...", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "38785b4f-0ce4-4901-9ba9-bad0b984b139", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:20:03+00:00", "type": "seen", "source": "https://gist.github.com/jfstenuit/7a90b1d6d1116863693907e6e1cd3de4", "content": "", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "24745e0e-83b8-42c9-8eb8-b435dcfd960c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:16:26.300561+00:00", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3ml3qowlvni2r", "content": "[RSS] pyghidra-mcp Meets Ghidra GUI: Drive Project-Wide RE with Local AI\n\n\n clearbluejar.github.io -&gt; \n\n+ CVE-2024-3273 analysis (D-Link\n\n\nOriginal-&gt;", "vulnerability": "CVE-2024-3273", "author": {"login": "automation"}}, {"uuid": "13135932-442e-4f54-905d-21fbd8d94ef5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:15:29.697939+00:00", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3ml3qn4uwqc2t", "content": "\ud83d\udea8 What if a Linux exploit never touched disk?\n\nCopy Fail (CVE-2026-31431) lets attackers become root by corrupting the page cache in memory.\n\nNo file changes  \nNo integrity alerts  \nHarder to detect\n\nCVSS 7.8 (High)\n\n\ud83d\udc49 basefortify.eu/posts/2026/0... \n\n#Linux #CyberSecurity #CopyFail", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "4411e3e7-5f2d-4894-a1a4-faceab439d74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:15:29.187832+00:00", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3ml3qmzggm22t", "content": "\ud83d\udea8 What if a Linux exploit never touched disk?\n\nCopy Fail (CVE-2026-31431) lets attackers become root by corrupting the page cache in memory.\n\nNo file changes  \nNo integrity alerts  \nHarder to detect\n\nCVSS 7.8 (High)\n\n\ud83d\udc49 basefortify.eu/posts/2026/0... \n\n#Linux #CyberSecurity #CopyFail", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "f1cea772-db3a-441d-89aa-36ec1cdd8401", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:15:28.544366+00:00", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3ml3qmxu3bk2t", "content": "\ud83d\udea8 What if a Linux exploit never touched disk?\n\nCopy Fail (CVE-2026-31431) lets attackers become root by corrupting the page cache in memory.\n\nNo file changes  \nNo integrity alerts  \nHarder to detect\n\nCVSS 7.8 (High)\n\n\ud83d\udc49 basefortify.eu/posts/2026/0... \n\n#Linux #CyberSecurity #CopyFail", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "8aecee66-6fef-4eca-853e-0c292102cdc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:08:24.713726+00:00", "type": "seen", "source": "https://bsky.app/profile/ninjaowl.ai/post/3ml3qal3teu2l", "content": "Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...", "vulnerability": "CVE-2026-22679", "author": {"login": "automation"}}, {"uuid": "74d0090b-d586-4d24-a437-449489d6edce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:06:13.663236+00:00", "type": "seen", "source": "https://bsky.app/profile/shortinfo.bsky.social/post/3ml3q4nxysg2i", "content": "CVE-2026-41940 in cPanel is being weaponized within hours of PoC release. Multiple actors hit Philippines and Laos military/government domains, MSPs in the US, Canada, and South Africa. 44,000 IPs are now conducting scans and brute-force attacks. Mirai variants and 'Sorry' ransomware deployed.", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "6d6c623f-b049-4845-be12-96afb3c86613", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:04:35+00:00", "type": "seen", "source": "https://t.me/ctinow/249738", "content": "Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API\nhttps://ift.tt/4ymdNMF", "vulnerability": "CVE-2026-22679", "author": {"login": "automation"}}, {"uuid": "5a0bcd3a-6f7c-4cd6-b2d8-46ffc24d4f63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:04:00+00:00", "type": "seen", "source": "https://t.me/TengkorakCyberCrewzz/10137", "content": "Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API \u2013 thehackernews.com\n\nTue, 05 May 2026 15:37:00", "vulnerability": "CVE-2026-22679", "author": {"login": "automation"}}, {"uuid": "9b20fb50-e842-4230-9d82-437d8faa64a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:01:19.761068+00:00", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3ml3ptvr53a2w", "content": "WebinarIgnition\u306eSQL\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u8106\u5f31\u6027\u306b\u3088\u308a\u3001\u653b\u6483\u8005\u306fWebinarIgnition\u306b\u767b\u9332\u3055\u308c\u305f\u60c5\u5831\u3092\u76d7\u307f\u51fa\u3059\u53ef\u80fd\u6027\u304c\u3042\u308b\u3002\nCVE-2026-40797 CVSS 9.3 | CRITICAL", "vulnerability": "CVE-2026-40797", "author": {"login": "automation"}}, {"uuid": "0c1c3d0e-c63a-4a08-ad90-bbdb546f61b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T08:00:05+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82877", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a mitigate-copy-fail.yml\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a deadRabbit92\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a None\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-05 07:57:21\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nMitigates CVE-2026-31431 (Copy Fail) by unloading and blacklisting algif_aead kernel module if it is loadable and has no active references.\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "f4391691-dc97-4926-ac5a-d5c170e573b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T07:59:09.222363+00:00", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3ml3ppzk6h22o", "content": "Weaver E-cology 10.0\uff0820260312\u4ee5\u524d\uff09\u306b\u672a\u8a8d\u8a3c\u306e\u30ea\u30e2\u30fc\u30c8\u30b3\u30fc\u30c9\u5b9f\u884c\u8106\u5f31\u6027(CVE-2026-22679)\u304c\u3042\u308a\u3001\u30c7\u30d0\u30c3\u30b0API\u7d4c\u7531\u3067\u653b\u6483\u3055\u308c\u3066\u3044\u307e\u3059\u3002", "vulnerability": "CVE-2026-22679", "author": {"login": "automation"}}, {"uuid": "238de6b6-1afe-40b2-8260-8f76df4ecfe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T07:53:12.341455+00:00", "type": "seen", "source": "https://bsky.app/profile/bagder.mastodon.social.ap.brid.gy/post/3ml3pf5ml3y62", "content": "AISLE boasts about their AI tooling and CVE-2025-42511:\n\n\"Our autonomous AI system found another critical vulnerability in the FreeBSD DHCP stack - an unauthenticated remote code execution vulnerability with root privileges.\n\nThis finding is significant not only because RCE as root is about as [\u2026]", "vulnerability": "CVE-2025-42511", "author": {"login": "automation"}}, {"uuid": "7fc08b02-8d0b-470f-a0d6-3e690dadb0a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T07:53:03.770743+00:00", "type": "seen", "source": "https://mastodon.social/users/bagder/statuses/116520883197857253", "content": "AISLE boasts about their AI tooling and CVE-2025-42511:\n\"Our autonomous AI system found another critical vulnerability in the FreeBSD DHCP stack - an unauthenticated remote code execution vulnerability with root privileges.\nThis finding is significant not only because RCE as root is about as severe as it gets, but also because FreeBSD was explicitly included in Anthropic\u2019s Mythos announcement, and Mythos did not identify this issue.\"", "vulnerability": "CVE-2025-42511", "author": {"login": "automation"}}, {"uuid": "0a5cd613-7daf-448f-bac5-3b7de73d1ca1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T07:46:09.940401+00:00", "type": "seen", "source": "https://bsky.app/profile/camorabug.com/post/3ml3oys7wsl2n", "content": "FreeBSD DHCP Client Vulnerability Enables Remote Code Execution as\u00a0Root\n\nThe FreeBSD Project has issued a critical security advisory concerning a severe vulnerability found in its default IPv4 DHCP client. Designated as CVE-2026-42511, this flaw enables a local network attacker to execute arbitrary\u2026", "vulnerability": "CVE-2026-42511", "author": {"login": "automation"}}, {"uuid": "6fbb47a4-43a7-4dba-94d8-01bb1b603d86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T07:45:05.207560+00:00", "type": "seen", "source": "https://bsky.app/profile/newsycombinatorbot.bsky.social/post/3ml3owv3i6f27", "content": "CVE-2026-31431: Copy Fail vs. rootless containers (www.dragonsreach.it)\n\nDiscussion | Main Link", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "69c28e41-dc6f-4697-ba7e-daf2304ec193", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T07:33:05.841469+00:00", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml3obgvq6r2h", "content": "CVE-2024-13362 primary-addon-for-elementor (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "vulnerability": "CVE-2024-13362", "author": {"login": "automation"}}, {"uuid": "0029d977-4c5f-40bb-902f-757831259d52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T07:30:31.144430+00:00", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3ml3o4sriyd2j", "content": "CRITICAL: Blind SQL Injection in WebinarIgnition (\u22644.08.253) allows remote data extraction \u2014 no patch yet. Mitigate: strengthen input validation, use WAF. Stay alert for updates. https://radar.offseq.com/threat/cve-2026-40797-cwe-89-improper-neutralization-of-s-1958ecd4 #OffSeq #SQLInjection #Web...", "vulnerability": "cve-2026-40797", "author": {"login": "automation"}}, {"uuid": "9cd352a8-8d7f-429f-a132-f00c7b2fc116", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T07:30:29.069409+00:00", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116520794744579709", "content": "\ud83d\udd34 CRITICAL: CVE-2026-40797 in WebinarIgnition (\u22644.08.253) enables unauthenticated Blind SQL Injection. No patch yet \u2014 use WAF, validate inputs, restrict DB perms. High confidentiality risk. Details: https://radar.offseq.com/threat/cve-2026-40797-cwe-89-improper-neutralization-of-s-1958ecd4 #OffSeq #SQLInjection #WebinarIgnition", "vulnerability": "cve-2026-40797", "author": {"login": "automation"}}, {"uuid": "aba2168d-5538-45e0-b291-8ed30cb50c7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T07:21:20+00:00", "type": "seen", "source": "https://gist.github.com/SagaieNet/a7ac63874bd4ab1636c8ff56d9ebfde4", "content": "", "vulnerability": "cve-2026-31431", "author": {"login": "automation"}}, {"uuid": "c70d4fe0-6664-4250-9836-566bea2e4849", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T07:21:16.132139+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3nmbtz2e2c", "content": "CVE-2026-7812 - 54yyyu code-mcp MCP Tool server.py git_operation command injection\nCVE ID : CVE-2026-7812\n \n Published : May 5, 2026, 5:16 a.m. | 1\u00a0hour, 5\u00a0minutes ago\n \n Description : A vulnerability was found in 54yyyu code-mcp up to 4cfc4643541a110c906d93635b391bf7e357f4a8....", "vulnerability": "CVE-2026-7812", "author": {"login": "automation"}}, {"uuid": "b98fd415-329e-42b1-9800-e2d2707051fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T07:16:48+00:00", "type": "seen", "source": "https://gist.github.com/SagaieNet/68a2d3a5ef28966ab7f6dbe83a6a0dd0", "content": "", "vulnerability": "cve-2026-31431", "author": {"login": "automation"}}, {"uuid": "5514fc04-876f-4995-ac26-659ab18d5faa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T07:16:15.403404+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3nddb5ow2o", "content": "CVE-2026-7822 - itsourcecode Courier Management System print_pdets.php sql injection\nCVE ID : CVE-2026-7822\n \n Published : May 5, 2026, 5:16 a.m. | 1\u00a0hour, 5\u00a0minutes ago\n \n Description : A vulnerability was identified in itsourcecode Courier Management System 1.0. This impacts...", "vulnerability": "CVE-2026-7822", "author": {"login": "automation"}}, {"uuid": "7eb0afe0-942e-4052-a925-eb002bee9731", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T07:11:15.052510+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3n2etbf52i", "content": "CVE-2026-7811 - 54yyyu code-mcp MCP File server.py is_safe_path path traversal\nCVE ID : CVE-2026-7811\n \n Published : May 5, 2026, 5:16 a.m. | 1\u00a0hour, 5\u00a0minutes ago\n \n Description : A vulnerability has been found in 54yyyu code-mcp up to 4cfc4643541a110c906d93635b391bf7e357f4a8...", "vulnerability": "CVE-2026-7811", "author": {"login": "automation"}}, {"uuid": "d93e97ee-07f4-491e-9352-31e24efb70eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T07:11:11.914328+00:00", "type": "seen", "source": "https://bsky.app/profile/kompetenztraining.bsky.social/post/3ml3n2bv73e27", "content": "Wir hatten lange kein sch\u00f6nes Linux Local Privilege Escalation mehr, oder? CVE-2026-31431 kombiniert AF_ALG-Sockets mit splice(), um beliebige Daten in den Page Cache von Systembinaries zu schreiben \u2014 konkret /usr/bin/su. Kernel &lt; 6.19.12 betroffen, gesamte 6.17.x-Linie ungepatcht.", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "9e25aed4-cb01-4d85-9826-5356a22e0b62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T07:06:14.842951+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3mrgdozp2n", "content": "CVE-2026-7823 - Totolink A8000RU cstecgi.cgi setAppFilterCfg os command injection\nCVE ID : CVE-2026-7823\n \n Published : May 5, 2026, 5:16 a.m. | 1\u00a0hour, 5\u00a0minutes ago\n \n Description : A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. Affected is the ...", "vulnerability": "CVE-2026-7823", "author": {"login": "automation"}}, {"uuid": "ac308d13-9fdc-4ec1-af9a-3473a95f90df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T07:01:14.137366+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3mihu7ej2k", "content": "CVE-2026-4803 - Royal Addons for Elementor\nCVE ID : CVE-2026-4803\n \n Published : May 5, 2026, 4:16 a.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : The Royal Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'status' parameter in the wpr_...", "vulnerability": "CVE-2026-4803", "author": {"login": "automation"}}, {"uuid": "7491549c-eff4-495b-87bb-2427c53674e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T07:00:24.772812+00:00", "type": "seen", "source": "https://bsky.app/profile/getpacketai.bsky.social/post/3ml3mgvclvd2c", "content": "CISA flags critical Linux privilege escalation bug under active attack. CVE-2026-31431 now on the KEV list\u2014patch your systems immediately.\n\nhttps://thehackernews.com/2026/05/cisa-adds-actively-exploited-linux-root.html\n\n#cybersecurity #infosec", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "bd979fc0-a3f7-4a85-94cb-37332f426a90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T07:00:05+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82871", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a copyfail-exploit\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a xeloxa\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 2  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-05 06:58:46\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nCopy Fail (CVE-2026-31431) LPE exploit. A clean, multi-arch Python reimplementation targeting the Linux kernel AF_ALG page cache vulnerability.\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "716a762f-9d83-432b-98d8-ffe6e7fd7765", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:56:13.718729+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3m7jdagg2n", "content": "CVE-2026-5957 - EmailKit\nCVE ID : CVE-2026-5957\n \n Published : May 5, 2026, 4:16 a.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : The EmailKit plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to and including 1.6.5. This is due to a flawed path traver...", "vulnerability": "CVE-2026-5957", "author": {"login": "automation"}}, {"uuid": "ad2f6c77-61e6-428f-8f34-c9bbc58a0b88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:51:55.848537+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3lxtflxw2p", "content": "CVE-2026-3456 - GeekyBot \u2014 Generate AI Content Without Prompt, Chatbot and Lead Generation\nCVE ID : CVE-2026-3456\n \n Published : May 5, 2026, 4:16 a.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : The GeekyBot \u2014 Generate AI Content Without Prompt, Chatbot and Lead Generation plug...", "vulnerability": "CVE-2026-3456", "author": {"login": "automation"}}, {"uuid": "3cd30f0d-665c-4a11-96ea-12ce6ba9c2c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:51:35.414527+00:00", "type": "seen", "source": "https://bsky.app/profile/Dunuq-Vumuc.technodon.org.ap.brid.gy/post/3ml3lwzmtutv2", "content": "Kriittinen cPanel-haavoittuvuus hy\u00f6dynnetty globaalissa kampanjassa Hy\u00f6kk\u00e4\u00e4j\u00e4t hy\u00f6dynt\u00e4v\u00e4t aktiivisesti CVE-2026-41940-haavoittuvuutta, joka on kriittinen cPanel-infrastruktuurin puute, vaarantaakseen valtion ja hallinnoitujen palveluntarjoajien", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "e76f3bff-0478-428f-8eea-5a6654608ccf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:48:10.617026+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3lr4hz2p2h", "content": "CVE-2026-5159 - Royal Addons for Elementor\nCVE ID : CVE-2026-5159\n \n Published : May 5, 2026, 4:16 a.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : The Royal Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Instagram Feed widget's 'i...", "vulnerability": "CVE-2026-5159", "author": {"login": "automation"}}, {"uuid": "54c52fe8-a3a8-4d6d-bd22-a7c54837df73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:44:50.785101+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3ll5eqic2p", "content": "CVE-2026-4362 - ElementsKit Elementor Addons\nCVE ID : CVE-2026-4362\n \n Published : May 5, 2026, 5:16 a.m. | 1\u00a0hour, 5\u00a0minutes ago\n \n Description : The ElementsKit Elementor Addons plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capabili...", "vulnerability": "CVE-2026-4362", "author": {"login": "automation"}}, {"uuid": "524afb0c-597d-4f20-9d38-6a9ab257e66b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:42:52.804851+00:00", "type": "seen", "source": "https://bsky.app/profile/pvynckier.bsky.social/post/3ml3lhjhr3c2c", "content": "Multiple threat actors actively exploit cPanel vulnerability (CVE-2026-41940) - Help Net Security www.helpnetsecurity.com/2026/05/04/m...", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "e0cecd5c-0ff4-4c8e-92a8-3799ef7fdf5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:41:49.713694+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3lfrenxf2n", "content": "CVE-2026-6700 - DX Sources\nCVE ID : CVE-2026-6700\n \n Published : May 5, 2026, 3:16 a.m. | 3\u00a0hours, 5\u00a0minutes ago\n \n Description : The DX Sources plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.1. This is due to missing...", "vulnerability": "CVE-2026-6700", "author": {"login": "automation"}}, {"uuid": "c13a5c4d-87d0-43b2-ac12-4c252e3b7637", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:40:30+00:00", "type": "seen", "source": "https://gist.github.com/alon710/a4832f5644ea33cbf9cc97531ba69607", "content": "", "vulnerability": "CVE-2026-42040", "author": {"login": "automation"}}, {"uuid": "fc609a07-7e3b-4c42-bb24-7d872a5706a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:40:30+00:00", "type": "seen", "source": "https://gist.github.com/alon710/a4832f5644ea33cbf9cc97531ba69607", "content": "", "vulnerability": "GHSA-xhjh-pmcv-23jw", "author": {"login": "automation"}}, {"uuid": "5326d362-27e0-49cb-87e2-37119aaec1e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:40:28+00:00", "type": "seen", "source": "https://gist.github.com/alon710/cc4d9b85509a9bc85167e4592e568bc8", "content": "", "vulnerability": "GHSA-w5hq-g745-h8pq", "author": {"login": "automation"}}, {"uuid": "3e27fa95-b4d8-4f90-aa82-cfd61b733415", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:40:28+00:00", "type": "seen", "source": "https://gist.github.com/alon710/cc4d9b85509a9bc85167e4592e568bc8", "content": "", "vulnerability": "CVE-2026-41907", "author": {"login": "automation"}}, {"uuid": "b5f41302-4235-43e3-84ad-a96c8c341cd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:39:06.599294+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3latu6zv2n", "content": "CVE-2026-6696 - Zingaya Click-to-Call\nCVE ID : CVE-2026-6696\n \n Published : May 5, 2026, 3:16 a.m. | 3\u00a0hours, 5\u00a0minutes ago\n \n Description : The Zingaya Click-to-Call plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'email', 'first_name', 'last_name...", "vulnerability": "CVE-2026-6696", "author": {"login": "automation"}}, {"uuid": "ad84749e-21f1-4ace-858f-5e5dd5bbe7bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:36:34.051981+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3l4eaeoq2q", "content": "CVE-2026-7810 - UsamaK98 python-notebook-mcp server.py add_cell path traversal\nCVE ID : CVE-2026-7810\n \n Published : May 5, 2026, 4:16 a.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : A flaw has been found in UsamaK98 python-notebook-mcp up to a05a232815809a7e425b5fa7be26e0d4369...", "vulnerability": "CVE-2026-7810", "author": {"login": "automation"}}, {"uuid": "68f9e02c-7529-49da-ab55-f997ab31a819", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:36:19.156130+00:00", "type": "seen", "source": "https://bsky.app/profile/ecrime.ch/post/3ml3l3vx55v2z", "content": "The cPanel Situation Is\u2026 - Censys\n\nOn April 29, 2026, CVE-2026-41940 was disclosed as a critical pre-authentication bypass affecting cPanel and WHM. The is\n\nRead more: https://censys.com/blog/the-cpanel-situation-is/", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "08760c5f-d42d-45f0-b34a-ee4734d0bb3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:34:15.540955+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3ky7tk2p2t", "content": "CVE-2026-4665 - WP Carousel Free\nCVE ID : CVE-2026-4665\n \n Published : May 5, 2026, 4:16 a.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : The WP Carousel Free plugin for WordPress is vulnerable to Stored Cross-Site Scripting via crafted fancybox `data-caption` attributes in all ...", "vulnerability": "CVE-2026-4665", "author": {"login": "automation"}}, {"uuid": "a941cb04-56df-4223-8699-703c2b80511d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:34:14.564667+00:00", "type": "seen", "source": "https://bsky.app/profile/hackernewsrobot.bsky.social/post/3ml3ky76ax42y", "content": "CVE-2026-31431: Copy Fail vs. rootless containers", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "285ebc9b-650a-4c10-8a3f-472a492a8c24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:33:05.435294+00:00", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml3kw5dyfo2s", "content": "CVE-2024-13362 widget-for-eventbrite-api (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "vulnerability": "CVE-2024-13362", "author": {"login": "automation"}}, {"uuid": "10902c89-3b95-4141-89be-22bcbf78f226", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:32:06.796035+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3kucjzlh2h", "content": "CVE-2026-6255 - Simple Owl Shortcodes\nCVE ID : CVE-2026-6255\n \n Published : May 5, 2026, 3:16 a.m. | 3\u00a0hours, 5\u00a0minutes ago\n \n Description : The Simple Owl Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'num' attribute of the 'owls_wrapper...", "vulnerability": "CVE-2026-6255", "author": {"login": "automation"}}, {"uuid": "d2899655-f745-4ef4-a625-4efdf65bf4f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:28:09.326170+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3kncuesy2r", "content": "CVE-2026-6704 - Blog Settings\nCVE ID : CVE-2026-6704\n \n Published : May 5, 2026, 3:16 a.m. | 3\u00a0hours, 5\u00a0minutes ago\n \n Description : The Blog Settings plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and inclu...", "vulnerability": "CVE-2026-6704", "author": {"login": "automation"}}, {"uuid": "4d60cc4b-6369-4011-bfef-6776ad945640", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:26:23.132605+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3kk5lcqb2k", "content": "CVE-2026-6702 - Publish 2 Ping.fm\nCVE ID : CVE-2026-6702\n \n Published : May 5, 2026, 3:16 a.m. | 3\u00a0hours, 5\u00a0minutes ago\n \n Description : The Publish 2 Ping.fm plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1. This is du...", "vulnerability": "CVE-2026-6702", "author": {"login": "automation"}}, {"uuid": "9a3a2636-2df0-461c-9de8-e2d52d00d0f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:24:42.574733+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3kh5qhtd2e", "content": "CVE-2026-5294 - GeekyBot\nCVE ID : CVE-2026-5294\n \n Published : May 5, 2026, 4:16 a.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : The Geeky Bot plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 1.2.2. This is due to a nopriv AJAX route...", "vulnerability": "CVE-2026-5294", "author": {"login": "automation"}}, {"uuid": "b1bd7a80-525e-4cd6-968c-84ef11d3bc18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:23:07.450973+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3ked22ae2p", "content": "CVE-2026-35228 - Oracle Open Source Projects Oracle MCP Server Helper Tool SQL Injection Vulnerability\nCVE ID : CVE-2026-35228\n \n Published : May 5, 2026, 4:16 a.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : Vulnerability in the Oracle MCP Server Helper Tool product of Oracle O...", "vulnerability": "CVE-2026-35228", "author": {"login": "automation"}}, {"uuid": "f5df385d-e523-4514-8639-b9af883d1a83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:21:43.393890+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3kbmoild2o", "content": "CVE-2026-2948 - Gutenverse \u2013 Ultimate WordPress FSE Blocks Addons &amp; Ecosystem\nCVE ID : CVE-2026-2948\n \n Published : May 5, 2026, 4:16 a.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : The Gutenverse \u2013 Ultimate WordPress FSE Blocks Addons &amp; Ecosystem plugin for WordPress is vu...", "vulnerability": "CVE-2026-2948", "author": {"login": "automation"}}, {"uuid": "ae9da22b-c74d-4b90-b459-28505fb94c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:10:28+00:00", "type": "seen", "source": "https://gist.github.com/alon710/0bdb9caf0575ab62bae42776ae4e7cf3", "content": "", "vulnerability": "GHSA-3w6x-2g7m-8v23", "author": {"login": "automation"}}, {"uuid": "af40b84e-39ab-4304-ae1a-1bbf460df7f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:10:28+00:00", "type": "seen", "source": "https://gist.github.com/alon710/0bdb9caf0575ab62bae42776ae4e7cf3", "content": "", "vulnerability": "CVE-2026-42044", "author": {"login": "automation"}}, {"uuid": "87e2cca0-e0d5-4c44-9e3b-338961286bc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:07:47.266378+00:00", "type": "seen", "source": "https://bsky.app/profile/samilaiho.com/post/3ml3jitnutk2d", "content": "Critical GitHub RCE Vulnerability CVE-2026-3854 Allows Arbitrary Commands\nURL: nvd.nist.gov/vuln/detail/...\nClassification: Critical, Solution: Official Fix, Exploit Maturity: Proof-of-Concept, CVSSv3.1: 8.8", "vulnerability": "CVE-2026-3854", "author": {"login": "automation"}}, {"uuid": "50399b73-3349-46b0-a8cf-c32c19615025", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:03:27.899508+00:00", "type": "seen", "source": "https://bsky.app/profile/ikkeT.mementomori.social.ap.brid.gy/post/3ml3j7no2ds62", "content": "Red Hat product updates to copy fail available https://access.redhat.com/security/cve/cve-2026-31431\n\n#cve202631431 #CopyFail", "vulnerability": "cve-2026-31431", "author": {"login": "automation"}}, {"uuid": "a1340ba9-47de-4ffb-8181-03d3e2ce98ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:00:30.568616+00:00", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3ml3j3upp6r26", "content": "Totolink A8000RU routers face CRITICAL OS command injection (CVE-2026-7823). No patch yet \u2014 restrict device access &amp; monitor for fixes. Remote attackers can fully compromise devices. https://radar.offseq.com/threat/cve-2026-7823-os-command-injection-in-totolink-a80-8f67ff3e #OffSeq #IoTSecurity", "vulnerability": "cve-2026-7823", "author": {"login": "automation"}}, {"uuid": "35734f90-6532-412b-a835-b25830741ce6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:00:30.222046+00:00", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116520440829606859", "content": "\ud83d\udea8 CRITICAL: OS command injection (CVE-2026-7823) in Totolink A8000RU v7.1cu.643_b20200521. Remote attackers can execute OS cmds \u2014 no auth needed. No patch yet; restrict access &amp; monitor updates. https://radar.offseq.com/threat/cve-2026-7823-os-command-injection-in-totolink-a80-8f67ff3e #OffSeq #Vulnerability #RouterSecurity", "vulnerability": "cve-2026-7823", "author": {"login": "automation"}}, {"uuid": "a1ee17b9-dfba-4750-83f9-576dd5c10df6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T06:00:05+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82866", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-41940\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a ZildanZ\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-05 05:59:31\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\n\u65e0\u63cf\u8ff0\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "ba15ab61-677e-40cf-88a3-d17d8c8833e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T05:59:06.105115+00:00", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3ml3izdlt4c2w", "content": "CVE-2026-31431: Copy Fail vs. rootless  www.dragonsreach.it/2026/05/04/c...", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "bfde45e6-5ba1-41d8-a3fb-c60024b1dd62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T05:51:03.207609+00:00", "type": "seen", "source": "https://bsky.app/profile/Dunuq-Vumuc.technodon.org.ap.brid.gy/post/3ml3ikt6roxr2", "content": "https://www.bleepingcomputer.com/news/security/weaver-e-cology-critical-bug-exploited-in-attacks-since-march/\nWeaver E-cologyn RCE-haavoittuvuutta hy\u00f6dynnettiin p\u00e4ivi\u00e4 p\u00e4ivityksen j\u00e4lkeen Kriittist\u00e4 todentamatonta RCE-haavoittuvuutta CVE-2026-22679", "vulnerability": "CVE-2026-22679", "author": {"login": "automation"}}, {"uuid": "b7971cfc-be54-415f-b0cb-431d1a391e52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T05:40:56.005186+00:00", "type": "seen", "source": "https://bsky.app/profile/betterhn50.e-work.xyz/post/3ml3hyutibb26", "content": "CVE-2026-31431: Copy Fail vs. rootless containers https://www.dragonsreach.it/2026/05/04/cve-2026-31431-copy-fail-rootless-containers/ (https://news.ycombinator.com/item?id=48017813)", "vulnerability": "cve-2026-31431", "author": {"login": "automation"}}, {"uuid": "65a0a7a2-34f3-46fc-827f-876325769f7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T05:40:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/1fe74fd0f0234822bdcb48ade706690f", "content": "", "vulnerability": "GHSA-pmwg-cvhr-8vh7", "author": {"login": "automation"}}, {"uuid": "c77a9054-ce49-424d-a082-9631d1b7e618", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T05:40:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/1fe74fd0f0234822bdcb48ade706690f", "content": "", "vulnerability": "CVE-2026-42043", "author": {"login": "automation"}}, {"uuid": "aa8cb2b9-a662-4ad9-96ad-c20cef9e3fb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T05:40:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/1fe74fd0f0234822bdcb48ade706690f", "content": "", "vulnerability": "CVE-2025-62718", "author": {"login": "automation"}}, {"uuid": "d0f19cd7-5f8a-4dbf-9a5e-f941a3512dd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T05:37:58.735788+00:00", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3ml3htlgwzg2f", "content": "WordPress Mentoring\u30d7\u30e9\u30b0\u30a4\u30f31.2.8\u4ee5\u524d\u306e\u30d0\u30fc\u30b8\u30e7\u30f3\u3067\u3001\u7ba1\u7406\u8005\u6a29\u9650\u3078\u306e\u6a29\u9650\u6607\u683c\u8106\u5f31\u6027\u3002 \u8a8d\u8a3c\u3055\u308c\u3066\u3044\u306a\u3044\u653b\u6483\u8005\u304c\u7ba1\u7406\u8005\u30a2\u30ab\u30a6\u30f3\u30c8\u3092\u767b\u9332\u53ef\u80fd\u3002\nCVE-2025-13618 CVSS 9.8 | CRITICAL", "vulnerability": "CVE-2025-13618", "author": {"login": "automation"}}, {"uuid": "05d41c02-0d68-49da-b5f2-ea4291a0f3ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T05:37:07.923869+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3ml3hs3742i2v", "content": "\ud83d\udccc CVE-2026-42365 - A guessable session cookie vulnerability exists in the Web Interface functionality of GeoVision LPC2011/LPC2211 1.10. A specially crafted series of HT... https://www.cyberhub.blog/cves/CVE-2026-42365", "vulnerability": "CVE-2026-42365", "author": {"login": "automation"}}, {"uuid": "9fab442a-672c-4a1a-9873-f8506e24385e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T05:37:00+00:00", "type": "seen", "source": "https://thehackernews.com/2026/05/weaver-e-cology-rce-flaw-cve-2026-22679.html", "content": "A critical security vulnerability in Weaver (Fanwei) E-cology, an enterprise office automation (OA) and collaboration platform, has come under active exploitation in the wild.\nThe vulnerability (CVE-2026-22679, CVSS score: 9.8) relates to a case of unauthenticated remote code execution affecting Weaver E-cology 10.0 versions prior to 20260312. The issue resides in the \"/papi/esearch/data/devops/", "vulnerability": "CVE-2026-22679", "author": {"login": "automation"}}, {"uuid": "4aff9dc0-09c7-4fb0-86f6-223c912359b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T05:36:20.128215+00:00", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3ml3hqno7pr2c", "content": "WordPress\u30d7\u30e9\u30b0\u30a4\u30f3MoreConvert Pro\uff08v1.9.14\u307e\u3067\uff09\u3067\u8a8d\u8a3c\u30d0\u30a4\u30d1\u30b9\u306e\u8106\u5f31\u6027\u3002\u653b\u6483\u8005\u306f\u3001\u5de7\u5999\u306a\u64cd\u4f5c\u3067\u672a\u8a8d\u8a3c\u3067\u3082\u7ba1\u7406\u8005\u6a29\u9650\u3092\u5f97\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u3002\nCVE-2026-5722 CVSS 9.8 | CRITICAL", "vulnerability": "CVE-2026-5722", "author": {"login": "automation"}}, {"uuid": "ad29dc6e-c0c5-49b1-9ed8-4f0d3782e604", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T05:33:06.193656+00:00", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml3hkugamy2h", "content": "CVE-2024-13362 bp-better-messages (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "vulnerability": "CVE-2024-13362", "author": {"login": "automation"}}, {"uuid": "1ed5e170-1259-4bb8-a52e-ea58d9d079cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T05:10:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/19dd0e73e4b7ccaafafb6dcbeaa878b0", "content": "", "vulnerability": "CVE-2026-42041", "author": {"login": "automation"}}, {"uuid": "f61bad6c-38f6-434d-99eb-be786b35a0d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T05:10:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/19dd0e73e4b7ccaafafb6dcbeaa878b0", "content": "", "vulnerability": "GHSA-w9j2-pvgh-6h63", "author": {"login": "automation"}}, {"uuid": "befe0098-76c0-4f5a-a8fc-f232d9372cfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T05:07:07.270374+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3ml3g4fqxku2y", "content": "\ud83d\udccc CVE-2026-42370 - A stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVision GV-VMS V20 20.0.2. A specially crafted HTTP request can le... https://www.cyberhub.blog/cves/CVE-2026-42370", "vulnerability": "CVE-2026-42370", "author": {"login": "automation"}}, {"uuid": "f33ced5b-bcb6-4c69-b44d-997e095e5154", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T04:58:54.707744+00:00", "type": "seen", "source": "https://bsky.app/profile/sagalinked.bsky.social/post/3ml3fnq4blf23", "content": "\ud83d\udcf0 CVE-2026-31431: Copy Fail vs. rootless containers\n\n\ud83d\udd17 https://www.dragonsreach.it/2026/05/04/cve-2026-31431-copy-fail-rootless-containers/\n\n#Tech #Dev", "vulnerability": "cve-2026-31431", "author": {"login": "automation"}}, {"uuid": "81ce4449-c496-4d23-b8a7-7960d93cabe9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T04:50:48.203979+00:00", "type": "seen", "source": "https://bsky.app/profile/betterhn20.e-work.xyz/post/3ml3f7a73fr2a", "content": "CVE-2026-31431: Copy Fail vs. rootless containers https://www.dragonsreach.it/2026/05/04/cve-2026-31431-copy-fail-rootless-containers/ (https://news.ycombinator.com/item?id=48017813)", "vulnerability": "cve-2026-31431", "author": {"login": "automation"}}, {"uuid": "51541328-7c95-463c-be00-59f5c914bed3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T04:46:59.242021+00:00", "type": "seen", "source": "https://bsky.app/profile/ai-nerd.bsky.social/post/3ml3eyg2azh2n", "content": "the safety filters fired. they flagged the prompt injection. the agent exfiltrated customer data anyway.\n\nthat's the corner CVE-2026-21520 (Copilot Studio) paints us into: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21520", "vulnerability": "CVE-2026-21520", "author": {"login": "automation"}}, {"uuid": "52951fa1-4bcb-4eab-8622-4216c94a0e9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T04:39:55.225415+00:00", "type": "seen", "source": "https://bsky.app/profile/infosecbot.bsky.social/post/3ml3elpzaql2c", "content": "This one is ours! CVE-2026-42511 was discovered by Joshua Rogers from our research team using \n@Aisle_Inc\n's AI system in FreeBSD, the same codebase Anthropic previously scanned with Mythos.\n\nRemote\u2026\n\n\ud83d\udd01 RT @stanislavfort | reposted by @thegrugq\nhttps://x.com/stanislavfort/status/2051374200078598606", "vulnerability": "CVE-2026-42511", "author": {"login": "automation"}}, {"uuid": "9d6cf38f-8b67-46ae-a51c-bbf90ab4406d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T04:37:07.398545+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3ml3egrddrp2v", "content": "\ud83d\udccc CVE-2018-25317 - Tenda W3002R/A302/W309R wireless routers version V5.07.64_en contain a cookie session weakness vulnerability that allows unauthenticated attackers to ... https://www.cyberhub.blog/cves/CVE-2018-25317", "vulnerability": "CVE-2018-25317", "author": {"login": "automation"}}, {"uuid": "e5d0434d-a4eb-4325-aeee-d60e8aa9dfd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T04:33:05.756032+00:00", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml3e7kzgrp2h", "content": "CVE-2024-13362 wp-books-gallery (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "vulnerability": "CVE-2024-13362", "author": {"login": "automation"}}, {"uuid": "b8423e49-7e75-4c41-a23c-649b2c14eb97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T04:31:31.613581+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3e4rhkvc2t", "content": "CVE-2025-13618 - Mentoring\nCVE ID : CVE-2025-13618\n \n Published : May 5, 2026, 3:15 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : The Mentoring plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.2.8. This is due to the plugin not...", "vulnerability": "CVE-2025-13618", "author": {"login": "automation"}}, {"uuid": "d4e809ea-3a5f-4dac-a168-53c7e4625eb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T04:30:28.329608+00:00", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3ml3e2ul6oy2l", "content": "Geeky Bot WP plugin (\u22641.2.2) has a CRITICAL flaw: unauth attackers can install plugins &amp; run code. Disable or remove plugin ASAP and watch for patches. https://radar.offseq.com/threat/cve-2026-5294-cwe-862-missing-authorization-in-ahm-a69c64e2 #OffSeq #WordPress #Security", "vulnerability": "cve-2026-5294", "author": {"login": "automation"}}, {"uuid": "af4181a2-ce64-4f81-add2-3350fca2afa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T04:30:26.688484+00:00", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116520086781199288", "content": "\ud83d\udea8 CRITICAL: CVE-2026-5294 in Geeky Bot WP plugin (\u22641.2.2) allows unauthenticated RCE by installing arbitrary plugins via an exposed AJAX endpoint. Disable or remove plugin &amp; monitor for patches. https://radar.offseq.com/threat/cve-2026-5294-cwe-862-missing-authorization-in-ahm-a69c64e2 #OffSeq #WordPress #Vuln #InfoSec", "vulnerability": "cve-2026-5294", "author": {"login": "automation"}}, {"uuid": "3616cc96-405c-4008-b7c3-34fd089bec79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T04:10:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/059ddc175def05e4e65c2e2b81657e9a", "content": "", "vulnerability": "cve-2026-42042", "author": {"login": "automation"}}, {"uuid": "868cf09a-4f67-4369-87a8-1b42e9b59bd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T04:10:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/059ddc175def05e4e65c2e2b81657e9a", "content": "", "vulnerability": "GHSA-xx6v-rp6x-q39c", "author": {"login": "automation"}}, {"uuid": "972af01d-8151-4f89-a307-a7f1ffcb9034", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T04:08:26.721217+00:00", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3ml3cthchsr2i", "content": "Critical Apache HTTP Server Flaw Exposes Millions of Servers to RCE Attacks: A Technical Deep Dive into CVE-2026-23918 +\u00a0Video\n\nIntroduction: A critical remote code execution (RCE) vulnerability, designated CVE-2026-23918 and rated High with a CVSS base score of 8.8, has been discovered in the\u2026", "vulnerability": "CVE-2026-23918", "author": {"login": "automation"}}, {"uuid": "5fffef79-c9d0-4289-991a-ec2b8b762e4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T04:07:08.709882+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3ml3cr4g2zt2s", "content": "\ud83d\udccc CVE-2026-42368 - A privilege escalation vulnerability exists in the Web Interface functionality of GeoVision LPC2011/LPC2211 1.10. A specially crafted HTTP request can... https://www.cyberhub.blog/cves/CVE-2026-42368", "vulnerability": "CVE-2026-42368", "author": {"login": "automation"}}, {"uuid": "691c5003-0f5e-49a3-ab96-de8cdad19e93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T04:03:12.555934+00:00", "type": "seen", "source": "https://bsky.app/profile/hackernewstop5.bsky.social/post/3ml3ck4uxpv25", "content": "CVE-2026-31431: Copy Fail vs. rootless containers\n\n#HackerNews\n\nhttps://www.dragonsreach.it/2026/05/04/cve-2026-31431-copy-fail-rootless-containers/", "vulnerability": "cve-2026-31431", "author": {"login": "automation"}}, {"uuid": "eeb366fa-1cff-4b5b-9888-2da439d3ade9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T04:00:28.051988+00:00", "type": "seen", "source": "https://bsky.app/profile/hnbot.gsuscs.xyz/post/3ml3cf7ds622l", "content": "CVE-2026-31431: Copy Fail vs. rootless containers\n\nhttps://www.dragonsreach.it/2026/05/04/cve-2026-31431-copy-fail-rootless-containers/", "vulnerability": "cve-2026-31431", "author": {"login": "automation"}}, {"uuid": "7b18b925-adf0-48b4-9b0c-9436236f4a6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T04:00:04.906235+00:00", "type": "seen", "source": "https://bsky.app/profile/hackernewsbot.bsky.social/post/3ml3cejzjvv2r", "content": "CVE-2026-31431: Copy Fail vs. rootless containers | Discussion", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "eb96f567-d73c-48ff-8769-7281df8f89ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T03:58:39.584441+00:00", "type": "seen", "source": "https://bsky.app/profile/opsmatters.com/post/3ml3cbyl6ef2g", "content": "The latest update for #CyCognito includes \"The Force Awakens Your Attack Surface\" and \"Emerging Threat: (CVE-2026-41940) cPanel &amp; WHM Authentication Bypass via CRLF Injection\".\n \n#cybersecurity #AttackSurfaceManagement #EASM https://opsmtrs.com/44Srq0X", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "a11a3aad-d765-40ba-9b96-663f6b461647", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T03:55:40.606098+00:00", "type": "seen", "source": "https://bsky.app/profile/hnws.bsky.social/post/3ml3c4mjmcr2t", "content": "CVE-2026-31431: Copy Fail vs. rootless containers\ncomments \u00b7 posted on 2026.05.04 at 23:43:08 (c=0, p=5)", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "dfeac0d1-be30-4514-aafb-5ecf92216094", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T03:55:39.111120+00:00", "type": "seen", "source": "https://bsky.app/profile/news.karthihegde.dev/post/3ml3c4k7d4v2t", "content": "CVE-2026-31431: Copy Fail vs. rootless containers\nDiscussion | hackernews | Author: averi", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "ef9cb3b7-5698-45cd-b125-3cb72ca7e9ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T03:52:06.371029+00:00", "type": "seen", "source": "https://bsky.app/profile/hn100.bsky.social/post/3ml3bwahx642o", "content": "CVE-2026-31431: Copy Fail vs. rootless containers\n\nDiscussion", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "f3acba63-d4d4-499d-bf81-ba69f4a9ab20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T03:40:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/fb31007c943aa5e039c51e3df605099e", "content": "", "vulnerability": "CVE-2026-42035", "author": {"login": "automation"}}, {"uuid": "245b4f79-d1d7-4968-b28a-4b42b817f472", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T03:38:22.766096+00:00", "type": "seen", "source": "https://bsky.app/profile/vritrasecnews.bsky.social/post/3ml3b5pqdn62j", "content": "Attackers exploit a critical cPanel flaw to target government and MSP networks across Southeast Asia and several countries, including the U.S. and Canada. A t...\n\n\ud83d\udd17 https://securityaffairs.com/191666/breaking-news/hackers-target-governments-and-msps-via-critical-cpanel-flaw-cve-2026-41940.html", "vulnerability": "cve-2026-41940", "author": {"login": "automation"}}, {"uuid": "8af8f5bb-0d8c-4c2e-8dd4-e4728350c8ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T03:33:06.126357+00:00", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml3aubnzwo24", "content": "CVE-2024-13362 woo-coupon-usage (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "vulnerability": "CVE-2024-13362", "author": {"login": "automation"}}, {"uuid": "6a5ff5f4-7e8d-4fce-8345-97ecfdc47644", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T03:10:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/207351104330f20458b16ad3e50712e0", "content": "", "vulnerability": "GHSA-pf86-5x62-jrwf", "author": {"login": "automation"}}, {"uuid": "f04c4caf-2f15-4bf4-8115-082c6678de75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T03:10:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/207351104330f20458b16ad3e50712e0", "content": "", "vulnerability": "cve-2026-42033", "author": {"login": "automation"}}, {"uuid": "ce8c3228-ef6b-43b0-9006-4b44beb33be3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T03:02:51.835121+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3767lnh32p", "content": "CVE-2026-7783 - CodeCanyon Perfex CRM Admin Kanban Endpoint AbstractKanban.php applySortQuery sql injection\nCVE ID : CVE-2026-7783\n \n Published : May 5, 2026, 12:16 a.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : A flaw has been found in CodeCanyon Perfex CRM up to 3.4.1. This ...", "vulnerability": "CVE-2026-7783", "author": {"login": "automation"}}, {"uuid": "94ddd3d2-c3f2-4910-9597-a5f86a4de98b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T03:00:30.105075+00:00", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116519732985387008", "content": "\ud83d\udea8 CVE-2026-5722 | CRITICAL auth bypass in MoreConvert Pro (\u22641.9.14, WordPress). Attackers can use flawed guest waitlist token logic to hijack accounts \u2014 even admin! Disable plugin or restrict access until patch. https://radar.offseq.com/threat/cve-2026-5722-cwe-287-improper-authentication-in-m-b66ead43 #OffSeq #WordPress #CVE20265722 #infosec", "vulnerability": "cve-2026-5722", "author": {"login": "automation"}}, {"uuid": "5869d918-9fa0-4fe7-8ac4-22e9f1faa433", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T03:00:30.058476+00:00", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3ml36zyame72f", "content": "\ud83d\udea8 MoreConvert Pro (WordPress \u22641.9.14) CRITICAL auth bypass lets attackers hijack accounts, incl. admins. Disable plugin or restrict access until patched. https://radar.offseq.com/threat/cve-2026-5722-cwe-287-improper-authentication-in-m-b66ead43 #OffSeq #WordPress #CVE20265722", "vulnerability": "cve-2026-5722", "author": {"login": "automation"}}, {"uuid": "f53138bc-360e-44d9-b91a-47a26a442d90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T03:00:05+00:00", "type": "seen", "source": "Telegram/iLUe8v0Uh0Sb6iiHrVVi_18OGPn_eI_21UJtbxqFwUVI_uE", "content": "", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "71b40aa2-2839-4704-bfa0-547342a84d32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T03:00:05+00:00", "type": "seen", "source": "Telegram/iLUe8v0Uh0Sb6iiHrVVi_18OGPn_eI_21UJtbxqFwUVI_uE", "content": "", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "0d5deb02-0c7d-41e0-95c7-5767c687ce8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T03:00:05+00:00", "type": "seen", "source": "Telegram/iLUe8v0Uh0Sb6iiHrVVi_18OGPn_eI_21UJtbxqFwUVI_uE", "content": "", "vulnerability": "CVE-2025-21298", "author": {"login": "automation"}}, {"uuid": "8882f3f2-837e-4afc-bf0f-97bca9eb9cdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T03:00:04+00:00", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/82846", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a Bili-cracker\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a HOMOonly9\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a None\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-05 02:59:38\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\n\u901a\u8fc7CVE-2026-350234\u7684\u6f0f\u6d1e\u83b7\u53d6bilibili \u5927\u4f1a\u5458\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-350234", "author": {"login": "automation"}}, {"uuid": "ff99bda4-74a3-476e-83fc-2cdf4c63d83b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:57:50.837015+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml36vb2ozt2k", "content": "CVE-2026-7782 - CodeCanyon Perfex CRM Tenant Clients.php project authorization\nCVE ID : CVE-2026-7782\n \n Published : May 4, 2026, 11:16 p.m. | 3\u00a0hours, 4\u00a0minutes ago\n \n Description : A vulnerability was detected in CodeCanyon Perfex CRM up to 3.4.1. This affects the function C...", "vulnerability": "CVE-2026-7782", "author": {"login": "automation"}}, {"uuid": "77296a00-8fbd-47e3-8c82-9d6fd4fe72c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:54:52.229959+00:00", "type": "seen", "source": "https://bsky.app/profile/opsmatters.com/post/3ml36pwp3cc2g", "content": "The latest update for #Tanium includes \"What is a software patch? How it works and why it matters\" and \"Copy Fail (CVE-2026-31431): What #Linux administrators need to know now\".\n \n#cybersecurity #EndpointProtection #EndpointSecurity https://opsmtrs.com/3DH5Ks9", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "c02ff841-1060-4307-b62b-38af10bc9aff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:53:15+00:00", "type": "seen", "source": "https://gist.github.com/hungson175/e602af034af17fc3f93c648f39f6431a", "content": "", "vulnerability": "cve-2025-32711", "author": {"login": "automation"}}, {"uuid": "cbd3bdac-69a7-432f-af1f-0a9efe6c9674", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:52:50.634071+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml36mcmqhs2e", "content": "CVE-2026-7788 - Axle-Bucamp MCP-Docusaurus document.py get_content path traversal\nCVE ID : CVE-2026-7788\n \n Published : May 5, 2026, 12:16 a.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : A security flaw has been discovered in Axle-Bucamp MCP-Docusaurus up to 404bc028e15ec304c9a...", "vulnerability": "CVE-2026-7788", "author": {"login": "automation"}}, {"uuid": "b2cc4fce-5041-4070-96f3-3767a8de68f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:47:50.601458+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml36de6u3m2k", "content": "CVE-2026-7785 - A-G-U-P-T-A wireshark-mcp pyshark_mcp.py quick_capture os command injection\nCVE ID : CVE-2026-7785\n \n Published : May 5, 2026, 12:16 a.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : A security flaw has been discovered in A-G-U-P-T-A wireshark-mcp edaf604416fbc94a...", "vulnerability": "CVE-2026-7785", "author": {"login": "automation"}}, {"uuid": "81d1e6d4-acb4-4000-a5ca-f5ce61bf4eae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:42:49.821277+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml362fquus2i", "content": "CVE-2026-7781 - Open5GS amf-3gpp-access Endpoint nudm-handler.c udm_nudm_uecm_handle_amf_registration_update denial of service\nCVE ID : CVE-2026-7781\n \n Published : May 4, 2026, 11:16 p.m. | 3\u00a0hours, 4\u00a0minutes ago\n \n Description : A security vulnerability has been detected in ...", "vulnerability": "CVE-2026-7781", "author": {"login": "automation"}}, {"uuid": "4f138a12-48d8-4312-a8ca-81875b624904", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:40:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/0c5e31af5ca396bb556703780eb15c80", "content": "", "vulnerability": "GHSA-5c9x-8gcm-mpgx", "author": {"login": "automation"}}, {"uuid": "fd9adaac-b165-401e-8753-27a0ae46ebca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:40:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/0c5e31af5ca396bb556703780eb15c80", "content": "", "vulnerability": "CVE-2026-42034", "author": {"login": "automation"}}, {"uuid": "19cf9103-9087-4926-b158-973d3e327d65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:37:49.403500+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml35rhb5wd2c", "content": "CVE-2026-44028 - Nix Lix Unbounded Recursion Stack-to-Heap Overflow\nCVE ID : CVE-2026-44028\n \n Published : May 5, 2026, 1:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : An issue was discovered in Nix before 2.34.7 and Lix before 2.95.2. Unbounded recursion in the NAR (Nix Ar...", "vulnerability": "CVE-2026-44028", "author": {"login": "automation"}}, {"uuid": "fe6926a3-2c6c-4b01-ba9d-229792a9adc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:33:31.935492+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml35jrpd752e", "content": "CVE-2026-7784 - RTGS2017 NagaAgent Skills Endpoint extensions.py path traversal\nCVE ID : CVE-2026-7784\n \n Published : May 5, 2026, 12:16 a.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : A vulnerability has been found in RTGS2017 NagaAgent up to 5.1.0. This issue affects some unk...", "vulnerability": "CVE-2026-7784", "author": {"login": "automation"}}, {"uuid": "9272aa7b-33d5-4836-b9ee-a646fcd504ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:33:06.580627+00:00", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml35izexw52s", "content": "CVE-2024-13362 share-this-image (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "vulnerability": "CVE-2024-13362", "author": {"login": "automation"}}, {"uuid": "f8241786-bc89-4e3e-888d-07c6ae9db8e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:29:53.558497+00:00", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3ml35daxrws2s", "content": "Top 3 CVE for last 7 days:\nCVE-2026-31431: 540 interactions\nCVE-2026-41940: 82 interactions\nCVE-2026-3854: 57 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-31431: 59 interactions\nCVE-2026-41940: 8 interactions\nCVE-2026-22679: 5 interactions\n", "vulnerability": "CVE-2026-22679", "author": {"login": "automation"}}, {"uuid": "f88a7db4-47e5-4eb0-82ec-59cc3aeb4fb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:29:53.425199+00:00", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3ml35daxrws2s", "content": "Top 3 CVE for last 7 days:\nCVE-2026-31431: 540 interactions\nCVE-2026-41940: 82 interactions\nCVE-2026-3854: 57 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-31431: 59 interactions\nCVE-2026-41940: 8 interactions\nCVE-2026-22679: 5 interactions\n", "vulnerability": "CVE-2026-3854", "author": {"login": "automation"}}, {"uuid": "81bd4702-1a8b-4923-84e8-d2fa9ae9dec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:29:53.289198+00:00", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3ml35daxrws2s", "content": "Top 3 CVE for last 7 days:\nCVE-2026-31431: 540 interactions\nCVE-2026-41940: 82 interactions\nCVE-2026-3854: 57 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-31431: 59 interactions\nCVE-2026-41940: 8 interactions\nCVE-2026-22679: 5 interactions\n", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "1e9dd049-9ebc-4dee-8c03-3bc26d84ac72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:29:52.980545+00:00", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3ml35daxrws2s", "content": "Top 3 CVE for last 7 days:\nCVE-2026-31431: 540 interactions\nCVE-2026-41940: 82 interactions\nCVE-2026-3854: 57 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-31431: 59 interactions\nCVE-2026-41940: 8 interactions\nCVE-2026-22679: 5 interactions\n", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "10aebc3d-5c4c-423a-acbe-e361f4ea6acf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:29:46.634710+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml35d2qrq62t", "content": "CVE-2026-5722 - MoreConvert Pro\nCVE ID : CVE-2026-5722\n \n Published : May 5, 2026, 1:24 a.m. | 56\u00a0minutes ago\n \n Description : The MoreConvert Pro plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.9.14. This is due to the guest...", "vulnerability": "CVE-2026-5722", "author": {"login": "automation"}}, {"uuid": "b25ddb95-9135-4953-ac54-327b53a78cc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:26:26.231258+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml3553mwuy2e", "content": "CVE-2026-44029 - Nix Directory Traversal Vulnerability\nCVE ID : CVE-2026-44029\n \n Published : May 5, 2026, 1:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : An issue was discovered in Nix before 2.34.7. Writing to arbitrary files can occur via \"nix-prefetch-url --unpack\" or \"...", "vulnerability": "CVE-2026-44029", "author": {"login": "automation"}}, {"uuid": "eb35b482-abe8-4324-afdc-469d52230db4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:24:36.569364+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml34zrwaps2n", "content": "\ud83d\udd34 CVE-2026-5722 - Critical (9.8)\n\nThe MoreConvert Pro plugin for WordPress is vulnerable to Authentication Bypass in all versions u...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-5722/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-5722", "author": {"login": "automation"}}, {"uuid": "44e30d85-1018-453a-9ca5-e9d602e7fa97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:21:27.957005+00:00", "type": "seen", "source": "https://bsky.app/profile/opsmatters.com/post/3ml34u76hg72r", "content": "The latest update for #SafeBreach includes \"'Copy Fail' Vulnerability (CVE-2026-31431): #Linux Kernel Privilege Escalation\" and \"Introducing SafeBreach Helm\".\n \n#Cybersecurity https://opsmtrs.com/41NWGuQ", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "d6c844a6-34c5-4afc-945b-dcc7ae75c78f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:15:11.787679+00:00", "type": "seen", "source": "https://bsky.app/profile/releaseport.com/post/3ml34iy25wv2c", "content": "Tautulli 2.17.1 patches CVE-2026-41065\nInvalidates sessions, requires Python 3.13, adds login authentication; fixes RCE and more.\nUpgrade carefully.\n\n\u2192 releaseport.com/r/tautulli-tautulli/v2-17-1", "vulnerability": "CVE-2026-41065", "author": {"login": "automation"}}, {"uuid": "33c9e71a-adc5-443b-a827-71b0548141d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:14:46+00:00", "type": "seen", "source": "https://gist.github.com/Elmagek404/f34fa60f48b04d8ca28886096ae5e05c", "content": "", "vulnerability": "GHSA-54g3-hfwv-qg7p", "author": {"login": "automation"}}, {"uuid": "1ec7a7f6-4e90-45c8-8559-8de2f7bdb076", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:11:32.555364+00:00", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3ml34cgusmh27", "content": "Amazon WorkSpaces for Windows\u306eSkylight Workspace Config Service\uff08\u30d0\u30fc\u30b8\u30e7\u30f32.6.2034.0\u672a\u6e80\uff09\u306b\u304a\u3044\u3066\u3001\u30ed\u30b0\u30ed\u30fc\u30c6\u30fc\u30b7\u30e7\u30f3\u30e1\u30ab\u30cb\u2026\nCVE-2026-7791 CVSS 7.8 | HIGH", "vulnerability": "CVE-2026-7791", "author": {"login": "automation"}}, {"uuid": "5550b0ca-19c0-4099-9183-8efc7baae0cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:10:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/80e5845ba30ef0e257e4add1fe792629", "content": "", "vulnerability": "CVE-2026-42039", "author": {"login": "automation"}}, {"uuid": "eed421f6-e549-40e3-863e-f17b7b13eb6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:10:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/80e5845ba30ef0e257e4add1fe792629", "content": "", "vulnerability": "GHSA-62hf-57xw-28j9", "author": {"login": "automation"}}, {"uuid": "e952594a-cb8c-47b3-ab48-66f5161509ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:09:50.690835+00:00", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3ml347g3gjk2c", "content": "Boundary Community Edition/Enterprise\u306b\u30b5\u30fc\u30d3\u30b9\u62d2\u5426\u306e\u8106\u5f31\u6027\u3002\u653b\u6483\u8005\u306fTLS\u30cf\u30f3\u30c9\u30b7\u30a7\u30a4\u30af\u4e2d\u306e\u8a3c\u660e\u66f8\u9045\u5ef6\u3067\u3001\u6b63\u898f\u306e\u63a5\u7d9a\u3092\u30d6\u30ed\u30c3\u30af\u3059\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u3002\nCVE-2026-7776 CVSS 7.5 | HIGH", "vulnerability": "CVE-2026-7776", "author": {"login": "automation"}}, {"uuid": "5cd01f6d-f53a-4934-a38d-f4eee996b13c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T02:02:56.470081+00:00", "type": "seen", "source": "https://bsky.app/profile/crustytldr.bsky.social/post/3ml33t3cxic2v", "content": "\ud83d\udd12 Weaver E-cology critical bug exploited in attacks since March\n\nHackers have been exploiting a critical vulnerability (CVE-2026-22679) in the Weaver E-cology office automation since mid-Ma...\n\nhttps://is.gd/m3Ibyb #CyberSecurity #InfoSec #CrustyTLDR", "vulnerability": "CVE-2026-22679", "author": {"login": "automation"}}, {"uuid": "3a5f4047-24a8-47b7-90fa-847224e4428e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:46:52+00:00", "type": "seen", "source": "https://gist.github.com/novalfaiq/9d01ab62f9c504321c5bebaf90d2fcab", "content": "", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "cc220784-dd5d-4efb-b1b8-d81e946e9dca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:45:35+00:00", "type": "seen", "source": "https://gist.github.com/schonbrennervertex/91ff31dfc9d8329e67faf7b023039fd4", "content": "", "vulnerability": "CVE-2026-34197", "author": {"login": "automation"}}, {"uuid": "dc92b765-097a-4e6b-b4ea-e052aa793dc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:45:35+00:00", "type": "seen", "source": "https://gist.github.com/schonbrennervertex/91ff31dfc9d8329e67faf7b023039fd4", "content": "", "vulnerability": "CVE-2015-7501", "author": {"login": "automation"}}, {"uuid": "f0c5f1b2-0507-4fad-9b65-1d98df5ce730", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:45:23.353840+00:00", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3ml32tnnq4k2s", "content": "A critical unauthenticated RCE (CVE-2026-22679) exploited since March in Weaver E-cology 10.0 via an exposed debug API allowed remote command execution. Patch released March 12 removes the vulnerable endpoint. #WeaverEcology #RemoteCodeExec #China", "vulnerability": "CVE-2026-22679", "author": {"login": "automation"}}, {"uuid": "52e11816-b73c-4089-b438-d14657725e19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:40:28+00:00", "type": "seen", "source": "https://gist.github.com/alon710/f7e9943ac304fddb338906da41495cb0", "content": "", "vulnerability": "CVE-2026-42038", "author": {"login": "automation"}}, {"uuid": "3287f397-c8e9-47bd-9265-eb09cee86d9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:40:28+00:00", "type": "seen", "source": "https://gist.github.com/alon710/f7e9943ac304fddb338906da41495cb0", "content": "", "vulnerability": "GHSA-m7pr-hjqh-92cm", "author": {"login": "automation"}}, {"uuid": "c94d85ad-d44d-4189-b2e1-d273d5206df0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:34:02.580224+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml327eqzfz2k", "content": "\ud83d\udfe0 CVE-2026-44028 - High (7.5)\n\nAn issue was discovered in Nix before 2.34.7 and Lix before 2.95.2. Unbounded recursion in the NA...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-44028/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-44028", "author": {"login": "automation"}}, {"uuid": "a5568338-0f93-4e5c-8895-2e60dcb11dab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:33:05.352894+00:00", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml325p4d762l", "content": "CVE-2024-13362 music-player-for-elementor (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "vulnerability": "CVE-2024-13362", "author": {"login": "automation"}}, {"uuid": "a0daaccc-d987-4ce9-bd21-f6a183e838df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:30:28.757652+00:00", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3ml2zyzafpz23", "content": "Major alert: CRITICAL OS command injection (CVE-2026-41926) in Shenzhen Yipu WDR201A WiFi Extender. Remote attackers can run persistent commands. Restrict firewall.cgi access &amp; monitor for patches. https://radar.offseq.com/threat/cve-2026-41926-improper-neutralization-of-special--58e4d954 #OffSeq...", "vulnerability": "cve-2026-41926", "author": {"login": "automation"}}, {"uuid": "3f5b3781-e53c-49dc-a4d2-f88b3ee9da90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:30:27.966902+00:00", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116519379011969410", "content": "\ud83d\udea8 CVE-2026-41926 (CRITICAL, CVSS 9.3): OS command injection in Shenzhen Yipu WDR201A WiFi Extender allows unauthenticated remote code execution via firewall.cgi. Persistent payloads survive reboots. Restrict access, monitor for fixes. https://radar.offseq.com/threat/cve-2026-41926-improper-neutralization-of-special--58e4d954 #OffSeq #IoTSecurity #CVE", "vulnerability": "cve-2026-41926", "author": {"login": "automation"}}, {"uuid": "947d1c34-e44f-49f4-8416-2715e3c59e4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:30:20.493579+00:00", "type": "seen", "source": "https://bsky.app/profile/linux.activitypub.awakari.com.ap.brid.gy/post/3ml2zynvoipa2", "content": "Debian LXD Critical Issues Denial of Service CVE-2026-40197 DSA-6247-1 Multiple security issues were discovered in LXD, a system container and virtual machine manager, which could result in denial ...\n\n#Debian #Linux #Distribution #- #Security #Advisories\n\nOrigin | Interest | Match", "vulnerability": "CVE-2026-40197", "author": {"login": "automation"}}, {"uuid": "555482ca-a451-4862-bf78-eee25510272e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:24:38.141087+00:00", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3ml2zokdr2d2j", "content": "Critical Linux Kernel \u201cCopy Fail\u201d Flaw Sparks Global Root Access Panic Across Major\u00a0Distros\n\nIntroduction: A Silent Kernel-Level Weakness With Explosive Consequences A newly identified Linux kernel vulnerability, tracked as CVE-2026-31431 and nicknamed \u201cCopy Fail,\u201d has triggered serious concern\u2026", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "0580e394-2dbb-4995-aec7-06e2515d1ab5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:23:45+00:00", "type": "seen", "source": "https://gist.github.com/novalfaiq/e6afa58d88747d77a302b80aa86088b2", "content": "", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "5738677f-3e6a-4ede-8dbc-1279eb1b19ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:21:55+00:00", "type": "seen", "source": "https://gist.github.com/limcheekin/49ca8210543fa6a982930a55e27a261c", "content": "", "vulnerability": "CVE-2025-66416", "author": {"login": "automation"}}, {"uuid": "4f6fcc6b-fc57-4538-8575-677c435de47e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:21:55+00:00", "type": "seen", "source": "https://gist.github.com/limcheekin/49ca8210543fa6a982930a55e27a261c", "content": "", "vulnerability": "CVE-2025-4565", "author": {"login": "automation"}}, {"uuid": "1d728967-1f30-4a74-b10e-5344cfa6b31d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:17:44.422371+00:00", "type": "seen", "source": "https://bsky.app/profile/gagadgetfr.bsky.social/post/3ml2zcadfnt2f", "content": "La vuln\u00e9rabilit\u00e9 CVE-2026-31431, activement exploit\u00e9e depuis fin avril, touche Ubuntu, RHEL, Amazon Linux et les environnements Kubernetes. Les op\u00e9rateurs cloud et h\u00e9bergeurs fran\u00e7ais doivent agir sans d\u00e9lai.", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "e7656cfb-a0b6-49eb-8610-4a7b2732e48e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:17:22.844627+00:00", "type": "seen", "source": "https://bsky.app/profile/gagadgetde.bsky.social/post/3ml2zbky4qb2v", "content": "CVE-2026-31431 betrifft nahezu alle g\u00e4ngigen Linux-Distributionen seit 2017 \u2013 Patches sind verf\u00fcgbar, aber noch nicht \u00fcberall eingespielt.", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "83a33e6b-9adb-4bdb-a74b-ba62bc2d0163", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:17:15.599393+00:00", "type": "seen", "source": "https://bsky.app/profile/gagadgetespana.bsky.social/post/3ml2zbestff2c", "content": "La vulnerabilidad CVE-2026-31431 afecta a la mayor\u00eda de distribuciones Linux modernas y ya est\u00e1 siendo explotada activamente. CERT-EU exige actuaciones inmediatas en operadores y administraciones.", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "c3c8fe7b-e0e3-4164-932a-4e7ab27283e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:10:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/f60cd3417122b17fedb1824de3dd0f54", "content": "", "vulnerability": "GHSA-445q-vr5w-6q77", "author": {"login": "automation"}}, {"uuid": "0cfac6ef-7676-476c-b9eb-e480cf5f99b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:10:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/f60cd3417122b17fedb1824de3dd0f54", "content": "", "vulnerability": "CVE-2026-42037", "author": {"login": "automation"}}, {"uuid": "cf8de654-d3bd-4e3d-b9b8-7a7431bbfea8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:07:07.734019+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3ml2ypb6sbs2v", "content": "\ud83d\udccc CVE-2026-6389 - IBM Turbonomic prometurbo agent 8.16.0 through 8.17.6 IBM Turbonomic Application Resource Management grants excessive cluster\u2011wide permissions, includ... https://www.cyberhub.blog/cves/CVE-2026-6389", "vulnerability": "CVE-2026-6389", "author": {"login": "automation"}}, {"uuid": "283cedf4-198e-4e8f-b87a-08125c7856d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T01:00:04+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82837", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-31431-Copy-Fail\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a rippsec\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Shell\n\u2b50 Star\u6570\u91cf\uff1a 1  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-05 00:47:33\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\n\u65e0\u63cf\u8ff0\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "4636fa85-d373-48f8-9583-2b9236f65c4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:48:57.390509+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2xorlhqv2s", "content": "CVE-2026-43869: Apache Thrift: TSSLTransportFactory.java hostname verification", "vulnerability": "CVE-2026-43869", "author": {"login": "automation"}}, {"uuid": "f2faf5c4-9f6b-4745-a854-3f606bb6f342", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:47:32.628598+00:00", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ml2xlqkigdo2", "content": "Weaver E-cology critical bug exploited in attacks since March BleepingComputer Hackers have been exploiting a critical vulnerability (CVE-2026-22679) in the Weaver E-cology office automation since ...\n\n#Security #News\n\nOrigin | Interest | Match", "vulnerability": "CVE-2026-22679", "author": {"login": "automation"}}, {"uuid": "22e2c83e-81d9-47c8-9b39-e95fc24a8257", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:43:56.005539+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2xfsewtz22", "content": "CVE-2026-43870: Apache Thrift: Node.js web_server.js multi-vulnerability", "vulnerability": "CVE-2026-43870", "author": {"login": "automation"}}, {"uuid": "7c1a287d-0fa9-4dde-9a40-250c92b7e7b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:40:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/0dfb4618501419ce7bdb20d2764642a8", "content": "", "vulnerability": "GHSA-vf2m-468p-8v99", "author": {"login": "automation"}}, {"uuid": "8b59b995-c377-4167-9733-82916ea12a6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:40:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/0dfb4618501419ce7bdb20d2764642a8", "content": "", "vulnerability": "CVE-2026-42036", "author": {"login": "automation"}}, {"uuid": "8ca80343-b68b-4f27-b499-fdf569d0d9c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:38:55.822278+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2x4tl2hn2e", "content": "CVE-2026-43868: Apache Thrift: Rust implementation vulnerable to CVE-2020-13949 pattern", "vulnerability": "CVE-2020-13949", "author": {"login": "automation"}}, {"uuid": "652df850-2089-419a-b790-04eea134af6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:38:55.481078+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2x4tl2hn2e", "content": "CVE-2026-43868: Apache Thrift: Rust implementation vulnerable to CVE-2020-13949 pattern", "vulnerability": "CVE-2026-43868", "author": {"login": "automation"}}, {"uuid": "7b32fe16-d793-47c2-b5e1-c8d2aaf836d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:33:05.914865+00:00", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml2wsftiia2s", "content": "CVE-2024-13362 events-addon-for-elementor (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "vulnerability": "CVE-2024-13362", "author": {"login": "automation"}}, {"uuid": "eb35bdc9-1f28-4637-86fb-796d0a387e68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:10:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/8bb704e5f538c265ec11484d13063fb4", "content": "", "vulnerability": "GHSA-GXXH-8VCJ-W2MH", "author": {"login": "automation"}}, {"uuid": "bb0b641c-46b8-4def-9b94-0a6a7fb1f6b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:07:00.037824+00:00", "type": "seen", "source": "https://bsky.app/profile/releaseport.com/post/3ml2vdqfofc2g", "content": "semaphore 2.18.1 patches CVE-2026-34986\nAdds AWS/Azure secret backends and fixes auth bypass in secret operations.\nUpgrade carefully.\n\n\u2192 releaseport.com/r/semaphoreui-semaphore/v2-18-1", "vulnerability": "CVE-2026-34986", "author": {"login": "automation"}}, {"uuid": "7b233e77-1920-4aab-a087-a187e4f75080", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:03:03.956033+00:00", "type": "seen", "source": "https://bsky.app/profile/rankednews.bsky.social/post/3ml2v4ownap23", "content": "U.S. government warns of severe CopyFail bug affecting major versions of Linux: The U.S. government has issued an urgent warning regarding \"CopyFail,\" a severe security vulnerability tracked as CVE-2026-31431 affecting Linux kernel versions 7.0 and earlier. Discovered\u2026 https://ranked.news/763195?u=b", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "302c819a-9dd1-4d78-872e-c69a2a9460a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:01:53.001722+00:00", "type": "seen", "source": "https://bsky.app/profile/slackers.it/post/3ml2v2l43l42x", "content": "8/11\n\nhttps://www.cve.org/CVERecord?id=CVE-2026-28780\n    https://www.cve.org/CVERecord?id=CVE-2026-24072\n    https://www.cve.org/CVERecord?id=CVE-2026-23918\n  (* Security fix *)\nn/krb5-1.22.2-x86_64-2.txz:  Rebuilt.\n  Harden perms on /usr/bin/ksu.", "vulnerability": "CVE-2026-23918", "author": {"login": "automation"}}, {"uuid": "f97a7984-64b7-4d11-942c-2a85036d7256", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:01:52.864957+00:00", "type": "seen", "source": "https://bsky.app/profile/slackers.it/post/3ml2v2l43l42x", "content": "8/11\n\nhttps://www.cve.org/CVERecord?id=CVE-2026-28780\n    https://www.cve.org/CVERecord?id=CVE-2026-24072\n    https://www.cve.org/CVERecord?id=CVE-2026-23918\n  (* Security fix *)\nn/krb5-1.22.2-x86_64-2.txz:  Rebuilt.\n  Harden perms on /usr/bin/ksu.", "vulnerability": "CVE-2026-24072", "author": {"login": "automation"}}, {"uuid": "d24b22df-7039-4bdc-a374-07bb2bc83856", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:01:52.722475+00:00", "type": "seen", "source": "https://bsky.app/profile/slackers.it/post/3ml2v2l43l42x", "content": "8/11\n\nhttps://www.cve.org/CVERecord?id=CVE-2026-28780\n    https://www.cve.org/CVERecord?id=CVE-2026-24072\n    https://www.cve.org/CVERecord?id=CVE-2026-23918\n  (* Security fix *)\nn/krb5-1.22.2-x86_64-2.txz:  Rebuilt.\n  Harden perms on /usr/bin/ksu.", "vulnerability": "CVE-2026-28780", "author": {"login": "automation"}}, {"uuid": "bb359e6b-546e-4e6a-b100-544c78d7b4fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:01:51.751871+00:00", "type": "seen", "source": "https://bsky.app/profile/slackers.it/post/3ml2v2k2mxj2q", "content": "7/11\n\nhttps://www.cve.org/CVERecord?id=CVE-2026-33523\n    https://www.cve.org/CVERecord?id=CVE-2026-33007\n    https://www.cve.org/CVERecord?id=CVE-2026-33006\n    https://www.cve.org/CVERecord?id=CVE-2026-29169\n    https://www.cve.org/CVERecord?id=CVE-2026-29168", "vulnerability": "CVE-2026-29168", "author": {"login": "automation"}}, {"uuid": "0d45344a-c521-4a78-9d57-89640a7a902e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:01:51.615049+00:00", "type": "seen", "source": "https://bsky.app/profile/slackers.it/post/3ml2v2k2mxj2q", "content": "7/11\n\nhttps://www.cve.org/CVERecord?id=CVE-2026-33523\n    https://www.cve.org/CVERecord?id=CVE-2026-33007\n    https://www.cve.org/CVERecord?id=CVE-2026-33006\n    https://www.cve.org/CVERecord?id=CVE-2026-29169\n    https://www.cve.org/CVERecord?id=CVE-2026-29168", "vulnerability": "CVE-2026-29169", "author": {"login": "automation"}}, {"uuid": "976579a0-e41a-48a9-b8e0-51b3704f8ac8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:01:51.483142+00:00", "type": "seen", "source": "https://bsky.app/profile/slackers.it/post/3ml2v2k2mxj2q", "content": "7/11\n\nhttps://www.cve.org/CVERecord?id=CVE-2026-33523\n    https://www.cve.org/CVERecord?id=CVE-2026-33007\n    https://www.cve.org/CVERecord?id=CVE-2026-33006\n    https://www.cve.org/CVERecord?id=CVE-2026-29169\n    https://www.cve.org/CVERecord?id=CVE-2026-29168", "vulnerability": "CVE-2026-33006", "author": {"login": "automation"}}, {"uuid": "cfd3edc2-5ea2-47ad-b5c1-76492d6e6087", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:01:51.356741+00:00", "type": "seen", "source": "https://bsky.app/profile/slackers.it/post/3ml2v2k2mxj2q", "content": "7/11\n\nhttps://www.cve.org/CVERecord?id=CVE-2026-33523\n    https://www.cve.org/CVERecord?id=CVE-2026-33007\n    https://www.cve.org/CVERecord?id=CVE-2026-33006\n    https://www.cve.org/CVERecord?id=CVE-2026-29169\n    https://www.cve.org/CVERecord?id=CVE-2026-29168", "vulnerability": "CVE-2026-33007", "author": {"login": "automation"}}, {"uuid": "78a43eae-ef1b-4e89-b89e-a5140bc75bd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:01:51.215596+00:00", "type": "seen", "source": "https://bsky.app/profile/slackers.it/post/3ml2v2k2mxj2q", "content": "7/11\n\nhttps://www.cve.org/CVERecord?id=CVE-2026-33523\n    https://www.cve.org/CVERecord?id=CVE-2026-33007\n    https://www.cve.org/CVERecord?id=CVE-2026-33006\n    https://www.cve.org/CVERecord?id=CVE-2026-29169\n    https://www.cve.org/CVERecord?id=CVE-2026-29168", "vulnerability": "CVE-2026-33523", "author": {"login": "automation"}}, {"uuid": "6d2d317f-a1ef-4a7d-83e2-c9bd8a4562a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:01:50.303390+00:00", "type": "seen", "source": "https://bsky.app/profile/slackers.it/post/3ml2v2iz7we2x", "content": "6/11\n\nFor more information, see:\n    https://downloads.apache.org/httpd/CHANGES_2.4.67\n    https://www.cve.org/CVERecord?id=CVE-2026-34059\n    https://www.cve.org/CVERecord?id=CVE-2026-34032\n    https://www.cve.org/CVERecord?id=CVE-2026-33857", "vulnerability": "CVE-2026-33857", "author": {"login": "automation"}}, {"uuid": "276a0fe9-be39-4718-92d9-18adbff55fcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:01:50.149329+00:00", "type": "seen", "source": "https://bsky.app/profile/slackers.it/post/3ml2v2iz7we2x", "content": "6/11\n\nFor more information, see:\n    https://downloads.apache.org/httpd/CHANGES_2.4.67\n    https://www.cve.org/CVERecord?id=CVE-2026-34059\n    https://www.cve.org/CVERecord?id=CVE-2026-34032\n    https://www.cve.org/CVERecord?id=CVE-2026-33857", "vulnerability": "CVE-2026-34032", "author": {"login": "automation"}}, {"uuid": "3c0d51de-31dc-4086-8973-27c2106b54de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:01:49.907937+00:00", "type": "seen", "source": "https://bsky.app/profile/slackers.it/post/3ml2v2iz7we2x", "content": "6/11\n\nFor more information, see:\n    https://downloads.apache.org/httpd/CHANGES_2.4.67\n    https://www.cve.org/CVERecord?id=CVE-2026-34059\n    https://www.cve.org/CVERecord?id=CVE-2026-34032\n    https://www.cve.org/CVERecord?id=CVE-2026-33857", "vulnerability": "CVE-2026-34059", "author": {"login": "automation"}}, {"uuid": "48d92cb9-22ae-4191-9819-1657508ecda8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:00:42.224154+00:00", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116519025945473134", "content": "\ud83d\udd25 CRITICAL: CVE-2026-42238 in 0xJacky nginx-ui (&lt;2.3.8) lets remote attackers gain root by exploiting an unauthenticated backup restore endpoint in the first 10 min. Patch to 2.3.8 now! https://radar.offseq.com/threat/cve-2026-42238-cwe-94-improper-control-of-generati-88b6fe8d #OffSeq #nginx #infosec #vuln", "vulnerability": "cve-2026-42238", "author": {"login": "automation"}}, {"uuid": "53f28ad9-ea20-4ae5-a88b-79d7505ecaa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-05T00:00:41.488271+00:00", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3ml2uyhgrmv2p", "content": "CRITICAL vuln in 0xJacky nginx-ui (&lt;2.3.8): Unauthenticated backup restore on fresh start enables remote code execution as root. Upgrade to 2.3.8 ASAP! \ud83d\udea8 https://radar.offseq.com/threat/cve-2026-42238-cwe-94-improper-control-of-generati-88b6fe8d #OffSeq #nginx #security", "vulnerability": "cve-2026-42238", "author": {"login": "automation"}}, {"uuid": "0f972096-645d-44fd-a02e-6987ae1f7088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T23:40:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/279687d56a2dbfb6a69dcdc1e458b314", "content": "", "vulnerability": "GHSA-FC86-6RV6-2JPM", "author": {"login": "automation"}}, {"uuid": "6a9f31f6-e6e8-4b75-afe6-d46a9a2de3d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T23:33:06.749942+00:00", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml2th5p7fl2u", "content": "CVE-2024-13362 spotlight-social-photo-feeds (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "vulnerability": "CVE-2024-13362", "author": {"login": "automation"}}, {"uuid": "daa6f426-adab-4044-bda4-93ab7b397747", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T23:31:29+00:00", "type": "seen", "source": "https://gist.github.com/limcheekin/b22dc88a260c8e395b6d84d05bd62a04", "content": "", "vulnerability": "GHSA-96vc-wcxf-jjff", "author": {"login": "automation"}}, {"uuid": "2a8a2066-2a39-4cdd-8e46-0974fe6232e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T23:31:29+00:00", "type": "seen", "source": "https://gist.github.com/limcheekin/b22dc88a260c8e395b6d84d05bd62a04", "content": "", "vulnerability": "GHSA-qg5c-hvr5-hjgr", "author": {"login": "automation"}}, {"uuid": "a157e6ba-5489-4a09-90aa-27b2bf8362e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T23:23:52.853138+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2swnj7rl2x", "content": "Re: Precise disclosure contents for copyfail (Re: [oss-security] CVE-2026-31431: CopyFail: linux local privilege scalation)", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "02bf9655-e3c7-43ca-94d4-40aafee114d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T23:21:34.674382+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2ssjl27w2p", "content": "CVE-2026-7779 - Open5GS authentication-subscription Endpoint nudr-handler.c udm_nudr_dr_handle_subscription_authentication denial of service\nCVE ID : CVE-2026-7779\n \n Published : May 4, 2026, 9:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A security flaw has been discovere...", "vulnerability": "CVE-2026-7779", "author": {"login": "automation"}}, {"uuid": "d5632dca-cdb8-40e6-a4ed-fb0d1c362f75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T23:16:34.134663+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2sjl3hup2h", "content": "CVE-2026-7780 - Open5GS smf-registrations Endpoint udm-sm.c udm_state_operational denial of service\nCVE ID : CVE-2026-7780\n \n Published : May 4, 2026, 10 p.m. | 20\u00a0minutes ago\n \n Description : A weakness has been identified in Open5GS up to 2.7.7. Affected by this vulnerabilit...", "vulnerability": "CVE-2026-7780", "author": {"login": "automation"}}, {"uuid": "645888fa-5c6b-48f8-a3a4-303361423f4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T23:14:37.784190+00:00", "type": "seen", "source": "https://bsky.app/profile/humanghostemoji.bsky.social/post/3ml2sg3y6vy23", "content": "US warns CopyFail bug (CVE-2026-31431) hits Linux 7.0 &amp; earlier, exploited in the wild. Patch by May 15. #Linux #security\ntechcrunch.com/2026/05/04/u...", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "675818fb-a8d8-4e62-8252-1c49ad1c98e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T23:11:33.611133+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2samn7ly2p", "content": "CVE-2026-7791 - Amazon WorkSpaces for Windows Skylight Workspace Config Service Privilege Escalation\nCVE ID : CVE-2026-7791\n \n Published : May 4, 2026, 10:07 p.m. | 13\u00a0minutes ago\n \n Description : Improper privilege management in the log rotation mechanism of the Skylight Work...", "vulnerability": "CVE-2026-7791", "author": {"login": "automation"}}, {"uuid": "082d7da5-5812-438a-a31b-8790fe23ca74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T23:10:28+00:00", "type": "seen", "source": "https://gist.github.com/alon710/8bd2dbffc6a75ce658a3738a2c5b48e0", "content": "", "vulnerability": "GHSA-G27R-R6PH-VF5R", "author": {"login": "automation"}}, {"uuid": "a3c6f18f-617b-4596-9843-78b9e9e77893", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T23:08:20.755818+00:00", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3ml2s2tbyd323", "content": "CVE-2026-20202 Exploit Exposed: How Bug Bounty Hunters Are Leveraging This Zero-Day \u2013 Full Technical Deep Dive +\u00a0Video\n\nIntroduction: A newly disclosed zero-day vulnerability, CVE-2026-20202, has emerged as a critical remote code execution (RCE) flaw affecting popular web application frameworks.\u2026", "vulnerability": "CVE-2026-20202", "author": {"login": "automation"}}, {"uuid": "007eb8a4-b59e-407a-bad4-5a2a473dfa12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T23:08:18.279401+00:00", "type": "seen", "source": "https://bsky.app/profile/dougmcvay.bsky.social/post/3ml2s2pqcbs2u", "content": "Over 40,000 Servers Compromised in Ongoing cPanel Exploitation\nThe attacks likely target CVE-2026-41940, a recently patched zero-day leading to administrative access.\nwww.securityweek.com/over-40000-s...", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "bfcded95-3f5f-48dc-95f4-e05e0498dda4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T23:06:33.153795+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2rxo7cyx2p", "content": "CVE-2026-7776 - Boundary Workers Vulnerable to Denial of Service During TLS Handshake\nCVE ID : CVE-2026-7776\n \n Published : May 4, 2026, 9:34 p.m. | 46\u00a0minutes ago\n \n Description : Boundary Community Edition and Boundary Enterprise (\u201cBoundary\u201d) workers are vulnerable to a deni...", "vulnerability": "CVE-2026-7776", "author": {"login": "automation"}}, {"uuid": "b578038d-1ae3-4f4a-8a0e-ad81a9db6c3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T23:01:32.650480+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2ropkdtu2p", "content": "CVE-2026-42220 - nginx-ui: Authenticated settings disclosure exposes node.secret and enables trusted-node authentication abuse, backup exfiltration, and restore-based nginx-ui state rollback\nCVE ID : CVE-2026-42220\n \n Published : May 4, 2026, 9:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n...", "vulnerability": "CVE-2026-42220", "author": {"login": "automation"}}, {"uuid": "9d73794b-aff0-4fc6-a234-69c65240594b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T23:00:27.076966+00:00", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3ml2rmqclgb2t", "content": "Active exploitation targets include cPanel flaw CVE-2026-41940 allowing authentication bypass, Linux Copy Fail CVE-2026-31431, and ongoing supply-chain attacks by TeamPCP impacting CI/CD and SaaS environments. #LinuxKernel #SupplyChain #USA", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "5f96c599-627c-41aa-aec2-8374498915fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T23:00:26.930022+00:00", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3ml2rmqclgb2t", "content": "Active exploitation targets include cPanel flaw CVE-2026-41940 allowing authentication bypass, Linux Copy Fail CVE-2026-31431, and ongoing supply-chain attacks by TeamPCP impacting CI/CD and SaaS environments. #LinuxKernel #SupplyChain #USA", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "0ddfe16c-eb9a-4399-a4e7-e5c89c882297", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T23:00:24+00:00", "type": "seen", "source": "Telegram/GTfIJoyF1Lt3B5gz7lJdoSnmGz0vERHomtjpDmxFXmb5k8w", "content": "", "vulnerability": "CVE-2026-31341", "author": {"login": "automation"}}, {"uuid": "3ac6708b-c48c-4148-a7dd-d92124372caa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T23:00:24+00:00", "type": "seen", "source": "Telegram/GTfIJoyF1Lt3B5gz7lJdoSnmGz0vERHomtjpDmxFXmb5k8w", "content": "", "vulnerability": "CVE-2026-31717", "author": {"login": "automation"}}, {"uuid": "b92aa46a-d94b-4a4b-bf20-dbac08b9029d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T23:00:05+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82820", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a check-copyfail-cve-2026-31431\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a Silent4Labs\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Shell\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-04 22:50:45\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nRead-only Linux Bash script to assess host exposure to CVE-2026-31431 (Copy Fail).\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "f6076c6a-f207-443c-b35f-4b5112853f3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:59:18.054454+00:00", "type": "seen", "source": "https://bsky.app/profile/dailyqiitatrends.bsky.social/post/3ml2rkp6deb2m", "content": "\u4eca\u65e5\u306eQiita\u30c8\u30ec\u30f3\u30c9\n\n\u3010\u7dca\u6025\u3011Cursor\u306b\u300cgit clone\u300d\u3059\u308b\u3060\u3051\u3067PC\u304c\u4e57\u3063\u53d6\u3089\u308c\u308b\u8106\u5f31\u6027\uff01CVSS 9.9\u306e\u30e4\u30d0\u3059\u304e\u308b\u653b\u6483\u624b\u6cd5\nCursor\u306e\u30d0\u30fc\u30b8\u30e7\u30f32.4\u4ee5\u524d\u306b\u3001\u30ea\u30dd\u30b8\u30c8\u30ea\u3092\u30af\u30ed\u30fc\u30f3\u3059\u308b\u3060\u3051\u3067PC\u304c\u4e57\u3063\u53d6\u3089\u308c\u308b\u81f4\u547d\u7684\u306a\u8106\u5f31\u6027\uff08CVE-2026-26268\uff09\u304c\u767a\u898b\u3055\u308c\u307e\u3057\u305f\u3002\nAI\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u304c\u81ea\u5f8b\u7684\u306bGit\u64cd\u4f5c\u3092\u884c\u3046\u4ed5\u7d44\u307f\u304c\u60aa\u7528\u3055\u308c\u308b\u305f\u3081\u3001CVSS 9.9\u3068\u3044\u3046\u975e\u5e38\u306b\u9ad8\u3044\u5371\u967a\u5ea6\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002\n\u5bfe\u7b56\u3068\u3057\u3066\u3001\u76f4\u3061\u306b\u30d0\u30fc\u30b8\u30e7\u30f32.5\u4ee5\u4e0a\u306b\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3057\u3066\u304f\u3060\u3055\u3044\u3002\n\u3042\u308f\u305b\u3066\u3001\u4fe1\u983c\u3067\u304d\u306a\u3044\u30ea\u30dd\u30b8\u30c8\u30ea\u306e\u30af\u30ed\u30fc\u30f3\u3092\u63a7\u3048\u308b\u306a\u3069\u306e\u6ce8\u610f\u304c\u63a8\u5968\u3055\u308c\u3066\u3044\u307e\u3059\u3002\n", "vulnerability": "CVE-2026-26268", "author": {"login": "automation"}}, {"uuid": "269827d3-9635-448f-bcb6-f8d7b5c7da63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:56:32.208675+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2rfr4mdo2n", "content": "CVE-2026-42222 - nginx-ui: Unauthenticated first-boot instance claim via POST /api/install allows remote bootstrap takeover\nCVE ID : CVE-2026-42222\n \n Published : May 4, 2026, 9:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : Nginx UI is a web user interface for the Nginx web...", "vulnerability": "CVE-2026-42222", "author": {"login": "automation"}}, {"uuid": "11e6a126-c731-45e2-85c1-40f2b124f3bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:52:14.667181+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2r63k5dk2e", "content": "CVE-2026-42223 - nginx-ui: Settings API Exposes Protected Secrets\nCVE ID : CVE-2026-42223\n \n Published : May 4, 2026, 9:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.8, the GetSettings API handl...", "vulnerability": "CVE-2026-42223", "author": {"login": "automation"}}, {"uuid": "2de6771c-9ae8-42cb-bd05-9b30569d1511", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:49:55+00:00", "type": "seen", "source": "https://t.me/realcodeb0ss/422", "content": "https://nvd.nist.gov/vuln/detail/CVE-2026-42167\n\n\nFofa : \"ProFTPD\" - 20,00,000 - Twenty Million Records.\n\n\nShodan : \"http.title:ProFTPD - \"220 ProFTPD\"", "vulnerability": "CVE-2026-42167", "author": {"login": "automation"}}, {"uuid": "fc75a946-d910-4eae-a40b-b87fe4dbcbe8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:49:52.289343+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2qzt3ddo26", "content": "\ud83d\udfe0 CVE-2026-7791 - High (7.8)\n\nImproper privilege management in the log rotation mechanism of the Skylight Workspace Config Serv...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-7791/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-7791", "author": {"login": "automation"}}, {"uuid": "d64e805f-24aa-44e7-891f-a027050f73a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:49:42.593139+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2qzjvh2626", "content": "\ud83d\udfe0 CVE-2026-7776 - High (7.5)\n\nBoundary Community Edition and Boundary Enterprise (\u201cBoundary\u201d) workers are vulnerable to a d...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-7776/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-7776", "author": {"login": "automation"}}, {"uuid": "3cf8a189-7afc-45bc-b212-62f55adfc699", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:48:29.253183+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2qxefyhg2p", "content": "CVE-2026-42238 - Unauthenticated Remote Code Execution via Backup Restore in nginx-ui\nCVE ID : CVE-2026-42238\n \n Published : May 4, 2026, 9:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.8, nginx...", "vulnerability": "CVE-2026-42238", "author": {"login": "automation"}}, {"uuid": "022ad4f7-6247-480f-a9d3-79671a5d8613", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:45:08.869866+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2qrfdljr2n", "content": "CVE-2026-7768 - @fastify/accepts-serializer vulnerable to Denial of Service via Unbounded Accept Header Cache Growth\nCVE ID : CVE-2026-7768\n \n Published : May 4, 2026, 8:16 p.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : @fastify/accepts-serializer cached serializer-selection r...", "vulnerability": "CVE-2026-7768", "author": {"login": "automation"}}, {"uuid": "3c4ba44c-889e-46f3-8c95-68e13f3b8623", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:42:07.941561+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2qlyqxfh2k", "content": "CVE-2026-43964 - Postfix Buffer Over-Read Vulnerability\nCVE ID : CVE-2026-43964\n \n Published : May 4, 2026, 7:16 p.m. | 3\u00a0hours, 4\u00a0minutes ago\n \n Description : Postfix before 3.8.16, 3.9 before 3.9.10, and 3.10 before 3.10.9 sometimes allows a buffer over-read and process cras...", "vulnerability": "CVE-2026-43964", "author": {"login": "automation"}}, {"uuid": "ec488d93-9288-411b-9f1f-642c4bd62c7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:39:23.716239+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2qh4cjwc2v", "content": "CVE-2026-41927 - WDR201A WiFi Extender Stack-Based Buffer Overflow via firewall.cgi\nCVE ID : CVE-2026-41927\n \n Published : May 4, 2026, 8:16 p.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains a stack-based buffer over...", "vulnerability": "CVE-2026-41927", "author": {"login": "automation"}}, {"uuid": "10c2cdd4-7d84-4ad9-a5ae-05f8c01733ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:36:53.716507+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2qcmt5sh2i", "content": "CVE-2025-67796 - IKUS Rdiffweb Improper Authorization Vulnerability\nCVE ID : CVE-2025-67796\n \n Published : May 4, 2026, 8:16 p.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : IKUS Rdiffweb before 2.10.5 has an improper authorization flaw that allows an attacker with any valid or ...", "vulnerability": "CVE-2025-67796", "author": {"login": "automation"}}, {"uuid": "6afc1a36-3e92-4dff-b8dc-3822061340b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:34:34.623378+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2q6iggjf2e", "content": "CVE-2026-6321 - fast-uri vulnerable to path traversal via percent-encoded dot segments\nCVE ID : CVE-2026-6321\n \n Published : May 4, 2026, 8:16 p.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : fast-uri decoded percent-encoded path separators and dot segments before applying dot-s...", "vulnerability": "CVE-2026-6321", "author": {"login": "automation"}}, {"uuid": "85501c91-a7c0-4e27-936e-e548cca2c538", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:33:05.655712+00:00", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml2q3tjkdc2i", "content": "CVE-2024-13362 yet-another-stars-rating (CVSS Score 6.1) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "vulnerability": "CVE-2024-13362", "author": {"login": "automation"}}, {"uuid": "863af5f3-458b-4f1c-a36c-fc186905edb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:32:25.525214+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2q2ndiwr2i", "content": "CVE-2026-42221 - nginx-ui: Unauthenticated First-Run Installer Allows Remote Initial Admin Claim\nCVE ID : CVE-2026-42221\n \n Published : May 4, 2026, 9:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : Nginx UI is a web user interface for the Nginx web server. From version 2.0.0...", "vulnerability": "CVE-2026-42221", "author": {"login": "automation"}}, {"uuid": "03c7ed3f-4d7e-4943-a9b5-3440f1e8098b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:32:09+00:00", "type": "seen", "source": "https://gist.github.com/ef-edulog/d40a1dc8ac4ee266441c61907c67812d", "content": "", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "b4e69f2f-af8a-46a1-adea-3f201bede997", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:31:20.717487+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2pyphieb2p", "content": "CVE-2026-34882 - Apache XSS\nCVE ID : CVE-2026-34882\n \n Published : May 4, 2026, 8:16 p.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2026-6074. Reason: This record is a reservation duplicate of CVE-2026-6074. Notes: A...", "vulnerability": "CVE-2026-6074", "author": {"login": "automation"}}, {"uuid": "15f82401-a257-429a-98c2-dc0bce2bad21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:31:20.551307+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2pyphieb2p", "content": "CVE-2026-34882 - Apache XSS\nCVE ID : CVE-2026-34882\n \n Published : May 4, 2026, 8:16 p.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2026-6074. Reason: This record is a reservation duplicate of CVE-2026-6074. Notes: A...", "vulnerability": "CVE-2026-34882", "author": {"login": "automation"}}, {"uuid": "20696e9a-7c5c-4d89-ab84-c7fd3acedae8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:28:31.417832+00:00", "type": "seen", "source": "https://bsky.app/profile/cybersecurity.poliverso.org.ap.brid.gy/post/3ml2pti65lur2", "content": "# **Falla in cPanel e WHM mette a rischio gli account amministrativi sui server di hosting**\n\n\n@informatica\nLa pubblicazione di un PoC per la CVE-2026-41940 espone cPanel &amp; WHM e WP Squared a rischi concreti di takeover. L\u2019authentication bypass pu\u00f2 compromettere server hosting e siti WordPress [\u2026]", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "21e4d72e-2422-463d-bb87-1f1efce4a224", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:28:21.364084+00:00", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-1269-f91d-0ae6-a2f645320851", "content": "Falla in cPanel e WHM mette a rischio gli account amministrativi sui server di hosting\n@informaticaLa pubblicazione di un PoC per la CVE-2026-41940 espone cPanel &amp; WHM e WP Squared a rischi concreti di takeover. L\u2019authentication bypass pu\u00f2 compromettere server hosting e siti WordPress. Analisi tecnica, impatti e contromisure per", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "8d2ed99f-76bb-48be-aa2c-80610f15d69b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:20:51.012837+00:00", "type": "seen", "source": "https://bsky.app/profile/PostgreSQL.activitypub.awakari.com.ap.brid.gy/post/3ml2pfmiu7ud2", "content": "Hackers target governments and MSPs via critical cPanel flaw CVE-2026-41940 Attackers exploit a critical cPanel flaw to target government and MSP networks across Southeast Asia and several countrie...\n\n#Breaking #News #Hacking #Security #cPanel [\u2026] \n\n[Original post on securityaffairs.com]", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "eb33228c-ccbb-4923-8fb0-6740763aea64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:20:50.087595+00:00", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ml2pf3ek4p52", "content": "MOVEit automation flaws could enable full system compromise Progress fixes critical MOVEit Automation flaws, including an authentication bypass bug that could let attackers gain unauthorized access...\n\n#Breaking #News #Security #CVE-2026-4670 #CVE-2026-5174 #Hacking #hacking #news #information [\u2026]", "vulnerability": "CVE-2026-5174", "author": {"login": "automation"}}, {"uuid": "298ed445-1fd5-4761-8269-54a059bd30ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:20:49.769029+00:00", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ml2pf3ek4p52", "content": "MOVEit automation flaws could enable full system compromise Progress fixes critical MOVEit Automation flaws, including an authentication bypass bug that could let attackers gain unauthorized access...\n\n#Breaking #News #Security #CVE-2026-4670 #CVE-2026-5174 #Hacking #hacking #news #information [\u2026]", "vulnerability": "CVE-2026-4670", "author": {"login": "automation"}}, {"uuid": "126054d7-adab-4769-a87d-2400490e2a49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:18:08.903462+00:00", "type": "seen", "source": "https://bsky.app/profile/linuxbp.bsky.social/post/3ml2pb4a44c2j", "content": "Vulnerabilidad cr\u00edtica en Linux \ud83d\udea8 Copy Fail (CVE-2026-31431) permite escalar a root desde un usuario sin privilegios. Silenciosa, potente y presente desde 2017. Actualizar el kernel es clave para protegerte. #Linux #Ciberseguridad #Kernel Mas info en mi blog", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "50eb758e-64dc-4349-95a3-154812ab389a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:14:37+00:00", "type": "seen", "source": "https://t.me/BleepingComputer/24602", "content": "\u200aWeaver E-cology critical bug exploited in attacks since March\n\nHackers have been exploiting a critical vulnerability (CVE-2026-22679) in the Weaver E-cology office automation since mid-March to run discovery commands. [...]\n\nhttps://www.bleepingcomputer.com/news/security/weaver-e-cology-critical-bug-exploited-in-attacks-since-march/", "vulnerability": "CVE-2026-22679", "author": {"login": "automation"}}, {"uuid": "e8ae8002-6384-40de-aa64-22910eb66028", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:13:13.995897+00:00", "type": "seen", "source": "https://bsky.app/profile/bleepingcomputer.com/post/3ml2oyd3p4u2f", "content": "Hackers have been exploiting a critical vulnerability (CVE-2026-22679) in the Weaver E-cology office automation since mid-March to run discovery commands.", "vulnerability": "CVE-2026-22679", "author": {"login": "automation"}}, {"uuid": "db6965e5-fef2-421b-89e1-3f46e67aacf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:10:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/15d45700e9c417f92716ddfa05ebc56f", "content": "", "vulnerability": "GHSA-G38R-8GMR-GHRF", "author": {"login": "automation"}}, {"uuid": "44e098f1-53eb-4074-82e4-c3060578f974", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:07:07.664951+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3ml2onfnxmq2v", "content": "\ud83d\udccc CVE-2018-25318 - Tenda FH303/A300 firmware V5.07.68_EN contains a session weakness vulnerability that allows unauthenticated attackers to modify DNS settings by exploi... https://www.cyberhub.blog/cves/CVE-2018-25318", "vulnerability": "CVE-2018-25318", "author": {"login": "automation"}}, {"uuid": "b4305e6e-f412-40fe-975a-4e81825a8bff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:03:54.946750+00:00", "type": "seen", "source": "https://bsky.app/profile/Kubernetes.activitypub.awakari.com.ap.brid.gy/post/3ml2ohkc2bk62", "content": "InfoSec News Nuggets 05/04/2026 Over 40,000 Servers Compromised in Ongoing cPanel Exploitation Attackers are exploiting CVE-2026-41940, a critical cPanel and WHM authentication bypass flaw that can...\n\n#InfoSec #News #Nuggets #AboutDFIR #Itron #news #nuggets #Trellix\n\nOrigin | Interest | Match", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "6d88a1e2-6328-4766-98ca-3711e572fad3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:00:49.674428+00:00", "type": "seen", "source": "https://bsky.app/profile/jcastanedacano.bsky.social/post/3ml2oc5iwhx2t", "content": "CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "1c454b11-5a33-4025-adf8-fdb4fb7912cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:00:05.730271+00:00", "type": "seen", "source": "https://bsky.app/profile/mineabot.xyz/post/3ml2oat3m3g25", "content": "Cve-2026-31431, dubbed Copy Fail, is drawing attention from the selfhosted community. Worth a closer look for teams relying on clipboard-based workflows or any tooling where copy operations cross trust boundaries. Patch management discipline matters here.\n\n#devops #cloud #k8s", "vulnerability": "Cve-2026-31431", "author": {"login": "automation"}}, {"uuid": "38faa0b7-3794-4921-b183-d809f8618ea8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T22:00:04+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82814", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-31431\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a KhaosFarbauti\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-04 21:54:27\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nPoC for CVE-2026-31431 (Copy Fail)\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "c2d75ad8-1551-430c-9873-45facf579028", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:59:19.009743+00:00", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116518548369466985", "content": "There is a new vulnerability with elevated criticality in Qualcomm Snapdragon Auto (CVE-2026-25293) https://vuldb.com/vuln/361066", "vulnerability": "CVE-2026-25293", "author": {"login": "automation"}}, {"uuid": "24e09031-a73f-4f7e-b301-2337f3d147b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:50:34.957948+00:00", "type": "seen", "source": "https://bsky.app/profile/intel.overresearched.net/post/3ml2nps2yxc2j", "content": "- cPanel CVE-2026-41940 \u2192 'Sorry' ransomware (44k+ IPs) - GitHub RCE CVE-2026-3854 (88% GHES unpatched) \n- APT28 Windows zero-day (KEV) \n- Linux 'Copy Fail' LPE \n- ShinyHunters: Instructure 275M  intel.overresearched.net/2026/05/04/c...  \n\n#Weekly #ThreatIntel #Infosec", "vulnerability": "CVE-2026-3854", "author": {"login": "automation"}}, {"uuid": "08530c4c-3986-434a-9106-08e8179ef42c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:50:34.830914+00:00", "type": "seen", "source": "https://bsky.app/profile/intel.overresearched.net/post/3ml2nps2yxc2j", "content": "- cPanel CVE-2026-41940 \u2192 'Sorry' ransomware (44k+ IPs) - GitHub RCE CVE-2026-3854 (88% GHES unpatched) \n- APT28 Windows zero-day (KEV) \n- Linux 'Copy Fail' LPE \n- ShinyHunters: Instructure 275M  intel.overresearched.net/2026/05/04/c...  \n\n#Weekly #ThreatIntel #Infosec", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "ffec2d95-fb83-4121-a6a0-ba183394cf5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:45:38.113179+00:00", "type": "seen", "source": "https://bsky.app/profile/philbraun.org/post/3ml2ngwlppc22", "content": "April 8, 2026 - France's Interministerial Directorate for Digital Affairs Switched from Microsoft to Linux\nApril 29, 2026 - CVE-2026-31431 bug is disclosed with capability to get root access on nearly every major Linux distro\nMay 20, 2026 - Bill Gates Buys France to Stop Economic Collapse\n#copyfail", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "5a7a243e-632b-422e-8659-c68d5001bf52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:45:34.433052+00:00", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116518494795011826", "content": "There is a new vulnerability with elevated criticality in Qualcomm Snapdragon Auto and other products (CVE-2026-24082) https://vuldb.com/vuln/361056", "vulnerability": "CVE-2026-24082", "author": {"login": "automation"}}, {"uuid": "fd0d860b-8e04-430b-b833-67155eb0986a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:35:23.455106+00:00", "type": "seen", "source": "https://bsky.app/profile/byroniac.bsky.social/post/3ml2mulryyc2q", "content": "\"CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments\" www.microsoft.com/en-us/securi...", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "bcbe7ab0-a207-44a2-a4b9-5da0b6620cb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:35:22.351977+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2mumidmi2n", "content": "\ud83d\udfe0 CVE-2026-42222 - High (8.1)\n\nNginx UI is a web user interface for the Nginx web server. In version 2.3.5, an unauthenticated b...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42222/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42222", "author": {"login": "automation"}}, {"uuid": "b1f2f088-7e5c-43a5-a5f7-4b049cf0f0c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:35:14.556444+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2mueqssi2e", "content": "\ud83d\udfe0 CVE-2026-42221 - High (8.1)\n\nNginx UI is a web user interface for the Nginx web server. From version 2.0.0 to before version 2...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42221/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42221", "author": {"login": "automation"}}, {"uuid": "e8e94894-fa81-460e-a522-c0b35b67d1d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:33:06.191957+00:00", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml2mqksokp2i", "content": "CVE-2026-2509 pagelayer (CVSS Score 6.4) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "vulnerability": "CVE-2026-2509", "author": {"login": "automation"}}, {"uuid": "d44b0521-d3bc-4d0d-afe5-400eb2fc8902", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:19:28.502731+00:00", "type": "seen", "source": "https://bsky.app/profile/hakksaww.bsky.social/post/3ml2ly6ysgp25", "content": "Already on our IOC corpus before launch:\n\n@iflow-mcp/watercrawl-watercrawl-mcp v1.3.0-1.3.4 = GlassWorm (Aikido)\n20+ MCP-named repos serving SmartLoader (URLhaus)\nCVE-2025-59528: mcpServerConfig exploit\n\nThe ecosystem's been targeted, just not counted.", "vulnerability": "CVE-2025-59528", "author": {"login": "automation"}}, {"uuid": "76d54b4c-b01c-44a8-8d0b-4092a67285d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:11:42.192045+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2lkclquk2r", "content": "CVE-2026-42235 - n8n: XSS via MCP OAuth client\nCVE ID : CVE-2026-42235\n \n Published : May 4, 2026, 7:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, an unauthenticated attacker...", "vulnerability": "CVE-2026-42235", "author": {"login": "automation"}}, {"uuid": "2a8e5e39-13dc-4112-b972-389c9739e507", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:11:15.038146+00:00", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3ml2ljesytc2o", "content": "Apache HTTP Server\u306e\u8106\u5f31\u6027(Important: CVE-2026-23918, Moderate: CVE-2026-24072, CVE-2026-33006, Low:\u8907\u6570)\u30682.4.67\u30ea\u30ea\u30fc\u30b9\n\n#sios_tech #security #vulnerability #\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 #\u8106\u5f31\u6027 #apache #struts\n\nsecurity.sios.jp/vulnerabilit...", "vulnerability": "CVE-2026-33006", "author": {"login": "automation"}}, {"uuid": "724fa0d9-de5f-4fbe-ad08-8c439e56b6f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:11:14.764355+00:00", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3ml2ljesytc2o", "content": "Apache HTTP Server\u306e\u8106\u5f31\u6027(Important: CVE-2026-23918, Moderate: CVE-2026-24072, CVE-2026-33006, Low:\u8907\u6570)\u30682.4.67\u30ea\u30ea\u30fc\u30b9\n\n#sios_tech #security #vulnerability #\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 #\u8106\u5f31\u6027 #apache #struts\n\nsecurity.sios.jp/vulnerabilit...", "vulnerability": "CVE-2026-24072", "author": {"login": "automation"}}, {"uuid": "71374c87-71f4-42dd-90f7-2dad8c556b5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:11:14.606959+00:00", "type": "seen", "source": "https://bsky.app/profile/omo.bsky.social/post/3ml2ljesytc2o", "content": "Apache HTTP Server\u306e\u8106\u5f31\u6027(Important: CVE-2026-23918, Moderate: CVE-2026-24072, CVE-2026-33006, Low:\u8907\u6570)\u30682.4.67\u30ea\u30ea\u30fc\u30b9\n\n#sios_tech #security #vulnerability #\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 #\u8106\u5f31\u6027 #apache #struts\n\nsecurity.sios.jp/vulnerabilit...", "vulnerability": "CVE-2026-23918", "author": {"login": "automation"}}, {"uuid": "d0c2b9f9-24e6-4eac-acc4-e147e48be012", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:09:36.083618+00:00", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116518353292182657", "content": "It is possible to see elevated activities targeting Ollama (CVE-2026-7482) https://vuldb.com/vuln/360957/cti", "vulnerability": "CVE-2026-7482", "author": {"login": "automation"}}, {"uuid": "895a79c7-ced5-4f09-b32d-11a04109e42c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:06:42.142325+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2lbe4trm2t", "content": "CVE-2026-42232 - n8n: XML Node Prototype Pollution to RCE\nCVE ID : CVE-2026-42232\n \n Published : May 4, 2026, 7:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, an authenticated...", "vulnerability": "CVE-2026-42232", "author": {"login": "automation"}}, {"uuid": "2d78f06b-56ef-4a49-a172-f38a504de24e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:01:41.808892+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2kyfnef32k", "content": "CVE-2026-41926 - WDR201A WiFi Extender OS Command Injection via firewall.cgi\nCVE ID : CVE-2026-41926\n \n Published : May 4, 2026, 7:17 p.m. | 1\u00a0hour, 2\u00a0minutes ago\n \n Description : WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerabi...", "vulnerability": "CVE-2026-41926", "author": {"login": "automation"}}, {"uuid": "27d31829-a011-4ef9-8d58-7d28f9554a5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:00:26.723958+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberveille-ch.bsky.social/post/3ml2kw6d2nq2x", "content": "\ud83d\udce2 Entit\u00e9s militaires sud-est asiatiques cibl\u00e9es via CVE-2026-41940 (cPanel) avec exfiltration de donn\u00e9es chinoises\n\ud83d\udcdd ## \ud83d\udd0d C\u2026\nhttps://cyberveille.ch/posts/2026-05-04-entites-militaires-sud-est-asiatiques-ciblees-via-cve-2026-41940-cpanel-avec-exfiltration-de-donnees-chinoises/ #AdaptixC2 #Cyberveille", "vulnerability": "cve-2026-41940", "author": {"login": "automation"}}, {"uuid": "2967e78f-bdff-4d92-9b12-ed6d0ef3dfbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:00:04+00:00", "type": "seen", "source": "Telegram/rPnY3cDOMvKcPFRcx6QsxUGiZwWHKwUb91xptawBtUQTSW0", "content": "", "vulnerability": "CVE-2026-21510", "author": {"login": "automation"}}, {"uuid": "8749263d-ebc7-4d3e-b481-fb2b01e020b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:00:04+00:00", "type": "seen", "source": "Telegram/rPnY3cDOMvKcPFRcx6QsxUGiZwWHKwUb91xptawBtUQTSW0", "content": "", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "93b0a60f-23aa-4678-b3a6-981f0650e8b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:00:04+00:00", "type": "seen", "source": "Telegram/rPnY3cDOMvKcPFRcx6QsxUGiZwWHKwUb91xptawBtUQTSW0", "content": "", "vulnerability": "CVE-2026-21514", "author": {"login": "automation"}}, {"uuid": "b600e2b3-6bfd-49b1-a67d-abd19b87acf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:00:04+00:00", "type": "seen", "source": "Telegram/rPnY3cDOMvKcPFRcx6QsxUGiZwWHKwUb91xptawBtUQTSW0", "content": "", "vulnerability": "CVE-2026-33320", "author": {"login": "automation"}}, {"uuid": "6ae00bc9-2c21-4511-a849-75e32a703982", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T21:00:04+00:00", "type": "seen", "source": "Telegram/rPnY3cDOMvKcPFRcx6QsxUGiZwWHKwUb91xptawBtUQTSW0", "content": "", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "1d9505bf-9afd-409d-9a68-85f3ce54f27a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:56:41.255690+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2kph5rca2h", "content": "CVE-2026-42236 - n8n: Unauthenticated Denial of Service via MCP Client Registration\nCVE ID : CVE-2026-42236\n \n Published : May 4, 2026, 7:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, an...", "vulnerability": "CVE-2026-42236", "author": {"login": "automation"}}, {"uuid": "f7c8a9ee-1e93-4961-b254-db9a8b65e390", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:51:45.689886+00:00", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116518282534275711", "content": "The severity is increased for this new vulnerability affecting Google Android (CVE-2026-0073) https://vuldb.com/vuln/361009", "vulnerability": "CVE-2026-0073", "author": {"login": "automation"}}, {"uuid": "58d73408-d36e-431e-8efe-2ab156abb333", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:51:43.492861+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2kgiomm52p", "content": "CVE-2026-42231 - n8n: Prototype Pollution in XML Webhook Body Parser Leads to RCE\nCVE ID : CVE-2026-42231\n \n Published : May 4, 2026, 7:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and ...", "vulnerability": "CVE-2026-42231", "author": {"login": "automation"}}, {"uuid": "5a0243dc-6c01-480e-aba0-2a907c654e32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:46:40.509619+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2k5k7ruc2p", "content": "CVE-2026-41924 - WDR201A WiFi Extender OS Command Injection via makeRequest.cgi\nCVE ID : CVE-2026-41924\n \n Published : May 4, 2026, 7:12 p.m. | 1\u00a0hour, 8\u00a0minutes ago\n \n Description : WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulner...", "vulnerability": "CVE-2026-41924", "author": {"login": "automation"}}, {"uuid": "63815c0c-71ca-429c-b1a0-a5ca63e205b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:42:22.817142+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2jvukepv2v", "content": "CVE-2026-41925 - WDR201A WiFi Extender OS Command Injection via adm.cgi (reboot_time)\nCVE ID : CVE-2026-41925\n \n Published : May 4, 2026, 7:15 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection ...", "vulnerability": "CVE-2026-41925", "author": {"login": "automation"}}, {"uuid": "5aae6060-f6b3-41d4-a030-4905c34831b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:40:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/b60926baf5e2d9d70756e13d5032afa9", "content": "", "vulnerability": "GHSA-x3h8-jrgh-p8jx", "author": {"login": "automation"}}, {"uuid": "eb63f30e-f094-43e3-a479-2fe430891e83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:38:36.781235+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2jp52qbe2p", "content": "CVE-2026-42084 - OpenC3 COSMOS: Hijacked session token can be used to reset password for persistence\nCVE ID : CVE-2026-42084\n \n Published : May 4, 2026, 6:16 p.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : OpenC3 COSMOS provides the functionality needed to send commands to and ...", "vulnerability": "CVE-2026-42084", "author": {"login": "automation"}}, {"uuid": "c0588f88-c579-4f0b-9469-b0eb28a84e37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:35:16.368184+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2jj5y23l2t", "content": "CVE-2026-25863 - Conditional Fields for Contact Form 7\nCVE ID : CVE-2026-25863\n \n Published : May 4, 2026, 7:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : Conditional Fields for Contact Form 7 WordPress plugin through version 2.6.7 contains an uncontrolled resource consumpt...", "vulnerability": "CVE-2026-25863", "author": {"login": "automation"}}, {"uuid": "ce5a3746-05e5-4d9d-b774-6854c95c2d35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:34:09.194938+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2jh52yqi2m", "content": "Hackers target governments and MSPs via critical cPanel flaw CVE-2026-41940", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "88589415-a6a8-41f1-a406-70782d928eea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:33:06.526811+00:00", "type": "seen", "source": "https://bsky.app/profile/atomicedge.bsky.social/post/3ml2jfc5xde2l", "content": "CVE-2026-3396 wc-ajax-product-filter (CVSS Score 7.5) #WordPress plugin #vulnerability #cybersecurity #wordpressfirewall #wordpresssecurity #hacking #wpsecurity #atomicedge", "vulnerability": "CVE-2026-3396", "author": {"login": "automation"}}, {"uuid": "75f207ad-3b36-4208-a5d2-5b310571b820", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:32:15.970360+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2jdrriv32c", "content": "CVE-2026-41923 - WDR201A WiFi Extender OS Command Injection via internet.cgi\nCVE ID : CVE-2026-41923\n \n Published : May 4, 2026, 7:10 p.m. | 1\u00a0hour, 9\u00a0minutes ago\n \n Description : WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerabi...", "vulnerability": "CVE-2026-41923", "author": {"login": "automation"}}, {"uuid": "e15c499b-613c-4fda-bd89-b4de3501ee8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:29:31.696911+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2j6vdkut2p", "content": "CVE-2026-41922 - WDR201A WiFi Extender OS Command Injection via wireless.cgi\nCVE ID : CVE-2026-41922\n \n Published : May 4, 2026, 7:04 p.m. | 1\u00a0hour, 16\u00a0minutes ago\n \n Description : WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerab...", "vulnerability": "CVE-2026-41922", "author": {"login": "automation"}}, {"uuid": "458a157b-9282-4ea8-b038-8a1606b108f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:29:30.832424+00:00", "type": "seen", "source": "https://bsky.app/profile/dietpi.com/post/3ml2j6tyr6222", "content": "We gathered all info about how to mitigate the recently disclosed CVE-2026-31431 aka \"Copy Fail\" on #DietPi systems.\n\nPlease read through this, to assure your system is not vulnerable: github.com/MichaIng/Die...\n\nThe same applies to every other Linux system!\n\n#CopyFail #Security #Linux", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "e14d95ec-46d4-458c-afed-2a5f662d1c9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:28:15.075113+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2j4lknee2z", "content": "\ud83d\udfe0 CVE-2026-29199 - High (8.1)\n\nphpBB before 3.3.16 is vulnerable to Host Header Injection that can lead to password rest link po...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-29199/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-29199", "author": {"login": "automation"}}, {"uuid": "44a1b56e-b23f-4660-a722-6b42d6f48f59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:27:24.885816+00:00", "type": "seen", "source": "https://bsky.app/profile/dietpi.com/post/3ml2j33d3wc2r", "content": "We gathered all info about how to mitigate the recently disclosed CVE-2026-31431 aka \"Copy Fail\" on #DietPi systems.\n\nPlease read through this, to assure your system is not vulnerable: github.com/MichaIng/Die...\n\nThe same applies to every other Linux system!\n\n#CopyFail #Security #Linux", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "eade647c-e2e1-4ed6-aac9-d7ed11af4cdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:27:01.410867+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2j2fwzwb2e", "content": "CVE-2026-41571 - Note Mark: OIDC-registered users authenticated by submitting password \"null\"\nCVE ID : CVE-2026-41571\n \n Published : May 4, 2026, 6:16 p.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : Note Mark is an open-source note-taking application. In version 0.19.2, IsPassw...", "vulnerability": "CVE-2026-41571", "author": {"login": "automation"}}, {"uuid": "e5b5e349-e05d-4ff8-86af-63fbe777914d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:20:04+00:00", "type": "seen", "source": "Telegram/K4RyqB3lPTzk-mogtjZXo7azFUUE-GW1zmkFm_VX_sT8T4ti", "content": "", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "c72ac245-7213-4d5a-9558-e2dd9da6945e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:18:36.989936+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2ilegyf52n", "content": "\ud83d\udfe0 CVE-2026-37459 - High (7.5)\n\nAn integer underflow in FRRouting (FRR) stable/10.0 to stable/10.6 allows attackers to cause a De...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-37459/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-37459", "author": {"login": "automation"}}, {"uuid": "6b1672a9-373a-48fa-9658-60b3cbd10585", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:18:29.263055+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2il54ya22q", "content": "\ud83d\udfe0 CVE-2026-6321 - High (7.5)\n\nfast-uri decoded percent-encoded path separators and dot segments before applying dot-segment rem...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-6321/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-6321", "author": {"login": "automation"}}, {"uuid": "fe0ee129-dd61-4624-8186-a2871a9f2402", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:18:21.971434+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2ikvmow326", "content": "\ud83d\udfe0 CVE-2026-7768 - High (7.5)\n\n@fastify/accepts-serializer cached serializer-selection results keyed by the request Accept heade...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-7768/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-7768", "author": {"login": "automation"}}, {"uuid": "06e703e1-dcfb-4c56-ac3d-718e69afee13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:14:36+00:00", "type": "seen", "source": "https://t.me/ctinow/249720", "content": "Hackers target governments and MSPs via critical cPanel flaw CVE-2026-41940\nhttps://ift.tt/iqZJnH6", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "af965a54-8cf5-47f4-9680-89382f811630", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:12:36.531872+00:00", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116518129197995419", "content": "Our CTI team identified a lot of activities targeting Apache HTTP Server (CVE-2026-34059) https://vuldb.com/vuln/360955/cti", "vulnerability": "CVE-2026-34059", "author": {"login": "automation"}}, {"uuid": "5a47bb63-3a06-4801-82bb-6f70b6e4825c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:12:36.348730+00:00", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116518129175813131", "content": "Attention, elevated activities detected targeting mutt (CVE-2026-43864) https://vuldb.com/vuln/360948/cti", "vulnerability": "CVE-2026-43864", "author": {"login": "automation"}}, {"uuid": "ef150ce2-e667-4c8e-b705-9196bd158c8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:11:04+00:00", "type": "seen", "source": "https://gist.github.com/Sagreras/8b433fc36ef0b27726c0ff435a8a5638", "content": "", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "7981d8f6-4bbb-4ea5-8597-1ed3cef928ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:10:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/e5f670283b66e1c583d8b3f3f9d1efba", "content": "", "vulnerability": "GHSA-q49m-57vm-c8cc", "author": {"login": "automation"}}, {"uuid": "056620e3-ab0e-4825-879a-868a27bfaa92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:10:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/e5f670283b66e1c583d8b3f3f9d1efba", "content": "", "vulnerability": "CVE-2026-41326", "author": {"login": "automation"}}, {"uuid": "b03c7e77-3578-4451-905b-009c6e5823fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:07:07.934982+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3ml2hwtgnyv2p", "content": "\ud83d\udccc CVE-2018-25316 - Tenda W308R v2 V5.07.48 contains a cookie session weakness vulnerability that allows unauthenticated attackers to modify DNS settings by exploiting in... https://www.cyberhub.blog/cves/CVE-2018-25316", "vulnerability": "CVE-2018-25316", "author": {"login": "automation"}}, {"uuid": "81ca314b-5f6f-4c8b-92be-a1169c7b65db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:02:07.900836+00:00", "type": "seen", "source": "https://bsky.app/profile/euvd-bot.bsky.social/post/3ml2hnvchcj26", "content": "\ud83d\udea8 EUVD-2026-27113\n\ud83d\udcca 5.3/10\n\ud83c\udfe2 n8n-io\n\n\ud83d\udcdd n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, the fix for GHSA-f3f2-mcxc-pwjx did not cover the Snowf...\n\n\ud83d\udd17 https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-27113\n\n#cybersecurity #infosec #cve #euvd", "vulnerability": "GHSA-f3f2-mcxc-pwjx", "author": {"login": "automation"}}, {"uuid": "865bc2c3-e827-4c10-b59a-4ad5d227969a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:00:41.690261+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2hlcwygd2z", "content": "\ud83d\udfe0 CVE-2026-24072 - High (8.8)\n\nAn escalation of privilege bug in various modules in Apache HTTP 2.4.66 and earlier allows local ...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-24072/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-24072", "author": {"login": "automation"}}, {"uuid": "eaa653c5-54fc-4d55-9a10-1f42d338328c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:00:33.792077+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2hl2mb3f2f", "content": "\ud83d\udfe0 CVE-2026-0073 - High (8.8)\n\nIn adbd_tls_verify_cert of auth.cpp, there is a possible bypass of wireless ADB mutual authentica...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-0073/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-0073", "author": {"login": "automation"}}, {"uuid": "d3921cf3-4b15-4212-92b7-47accdaea69e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T20:00:04+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82805", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-41940\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a itsismarcos\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-04 19:44:29\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nExploit CVE-2026-41940 auto exploit \n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "38b840b2-9cb5-42c7-872a-94f42c5ae298", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:39:49.302500+00:00", "type": "seen", "source": "https://bsky.app/profile/Kubernetes.activitypub.awakari.com.ap.brid.gy/post/3ml2gfw3csci2", "content": "CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments A high-severity Linux vulnerability, \u201cCopy Fail\u201d (CVE-2026-31431), enables root privile...\n\n#Linux\n\nOrigin | Interest | Match", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "f0c2f21a-9b16-4ed8-9e01-3edab523cc2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:37:07.990248+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3ml2gb6s2oq2w", "content": "\ud83d\udccc CVE-2026-43003 - An issue was discovered in OpenStack ironic-python-agent 1.0.0 through 11.5.0. Ironic Python Agent (IPA) sometimes executes grub-install from within a... https://www.cyberhub.blog/cves/CVE-2026-43003", "vulnerability": "CVE-2026-43003", "author": {"login": "automation"}}, {"uuid": "f2e611e6-1dae-4802-b314-10a2673fee55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:36:47.625608+00:00", "type": "seen", "source": "https://bsky.app/profile/ulisesgascon.com/post/3ml2gaeaaas2n", "content": "\ud83d\udea8 High-severity security fix in fast-uri@3.1.1 just released!\n\nPatches CVE-2026-6321 \u2014 fast-uri vulnerable to path traversal via percent-encoded dot segments\n\ngithub.com/fastify/fast...", "vulnerability": "CVE-2026-6321", "author": {"login": "automation"}}, {"uuid": "31020fd0-9ee4-48ba-b5fb-985f1f61b9e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:28:44.590700+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2fs6mh6j2e", "content": "\ud83d\udfe0 CVE-2026-25863 - High (7.5)\n\nConditional Fields for Contact Form 7 WordPress plugin through version 2.6.7 contains an uncontro...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-25863/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-25863", "author": {"login": "automation"}}, {"uuid": "b88808cd-6538-45d4-8df9-7a043c02538a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:28:36.473943+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2frwvvqg2l", "content": "\ud83d\udfe0 CVE-2026-42154 - High (7.5)\n\nPrometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 ...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42154/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42154", "author": {"login": "automation"}}, {"uuid": "8d3eff9b-22f4-4997-9883-5e52d946c3e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:28:28.940611+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2frpcll426", "content": "\ud83d\udfe0 CVE-2026-42151 - High (7.5)\n\nPrometheus is an open-source monitoring system and time series database. Prior to versions 3.5.3 ...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42151/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42151", "author": {"login": "automation"}}, {"uuid": "7785bb17-33e2-47cb-8026-64bd315a55e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:26:31.598153+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2foaah4a2q", "content": "CVE-2026-42811 - Apache Polaris: could broaden vended GCS credentials through unescaped identifier content in access-boundary CEL conditions\nCVE ID : CVE-2026-42811\n \n Published : May 4, 2026, 5:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : In plain terms, Apache Polaris is...", "vulnerability": "CVE-2026-42811", "author": {"login": "automation"}}, {"uuid": "4d2ba79b-3e86-461c-99b2-4b1726f00a47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:21:31.044107+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2ffbqa2m2r", "content": "CVE-2026-42810 - Apache Polaris: could broaden vended S3 credentials through wildcard-bearing namespace or table names\nCVE ID : CVE-2026-42810\n \n Published : May 4, 2026, 5:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : Apache Polaris accepts literal `*` characters in namesp...", "vulnerability": "CVE-2026-42810", "author": {"login": "automation"}}, {"uuid": "45751499-19fc-4d7b-9382-0fdd49ea2a93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:21:22.667103+00:00", "type": "seen", "source": "https://bsky.app/profile/ulisesgascon.com/post/3ml2fex7c4s2n", "content": "\ud83d\udea8 High-severity security fix in @fastify/accepts-serializer@6.0.4 just released!\n\nPatches CVE-2026-7768 \u2014 vulnerable to Denial of Service via Unbounded Accept Header Cache Growth\n\ngithub.com/fastify/fast...", "vulnerability": "CVE-2026-7768", "author": {"login": "automation"}}, {"uuid": "c65fa793-64f7-41d9-9890-02421db6224d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:17:05.887495+00:00", "type": "seen", "source": "https://bsky.app/profile/pixelsandpulse.bsky.social/post/3ml2f5ehni52s", "content": "Progress's MOVEit Automation has a new critical authentication bypass (CVE-2026-4670) allowing unauthenticated admin access. This isn't just another patch; it's a recurring pattern threatening sensitive data across supply\u2026\n\nhttps://www.tpp.blog/qsb4rda\n\n#cybersecurity #progress #moveitautomation", "vulnerability": "CVE-2026-4670", "author": {"login": "automation"}}, {"uuid": "661c07fb-fd9e-43a0-be73-01f2950ab222", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:16:30.895202+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2f4db6kr2i", "content": "CVE-2026-42812 - Apache Polaris: No protection on `write.metadata.path`\nCVE ID : CVE-2026-42812\n \n Published : May 4, 2026, 5:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : In Apache Iceberg, the table's metadata files are control files: they tell readers\nwhich data files be...", "vulnerability": "CVE-2026-42812", "author": {"login": "automation"}}, {"uuid": "5e7f91d3-0dde-4491-9a19-c039d468119b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:15:20.825862+00:00", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3ml2f27kjle2s", "content": "Progress patches critical MOVEit Automation flaws CVE-2026-4670 (auth bypass, CVSS 9.8) and CVE-2026-5174 (input validation, CVSS 7.7) allowing unauthorized admin access. Fixes released for versions &lt;=2025.1.4. #MOVEit #Airbus #Vulnerability", "vulnerability": "CVE-2026-5174", "author": {"login": "automation"}}, {"uuid": "2997a028-8042-4202-9ec5-6b7975f2eba4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:15:20.678919+00:00", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3ml2f27kjle2s", "content": "Progress patches critical MOVEit Automation flaws CVE-2026-4670 (auth bypass, CVSS 9.8) and CVE-2026-5174 (input validation, CVSS 7.7) allowing unauthorized admin access. Fixes released for versions &lt;=2025.1.4. #MOVEit #Airbus #Vulnerability", "vulnerability": "CVE-2026-4670", "author": {"login": "automation"}}, {"uuid": "d4c65382-45db-4690-9bdc-49d9a13fb9f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:11:30.615439+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2etetguo2q", "content": "CVE-2026-29004 - BusyBox DHCPv6 Client Heap Buffer Overflow via DNS_SERVERS\nCVE ID : CVE-2026-29004\n \n Published : May 4, 2026, 6:05 p.m. | 15\u00a0minutes ago\n \n Description : BusyBox before commit 42202bf contains a heap buffer overflow vulnerability in the DHCPv6 client (udhcpc6...", "vulnerability": "CVE-2026-29004", "author": {"login": "automation"}}, {"uuid": "7303ae7b-2f36-48dd-82d9-31879d41be01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:08:02.050060+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2en5bdbq2c", "content": "\ud83d\udfe0 CVE-2025-70069 - High (7.5)\n\nAn issue in Assimp v.6.0.2 allows a remote attacker to cause a denial of service via the FBXConve...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2025-70069/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2025-70069", "author": {"login": "automation"}}, {"uuid": "30893d0c-03e7-4475-be60-80c9c376770e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:07:54.039090+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2emvwpnx2w", "content": "\ud83d\udfe0 CVE-2026-29169 - High (7.5)\n\nA NULL pointer dereference in mod_dav_lock in Apache HTTP Server 2.4.66 and earlier may allow an ...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-29169/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-29169", "author": {"login": "automation"}}, {"uuid": "1531114e-b6f0-4f54-89b5-71a5f2745203", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:07:46.447234+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2emokys72g", "content": "\ud83d\udfe0 CVE-2025-47405 - High (7.8)\n\nMemory corruption when processing camera sensor input/output control codes with invalid output bu...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2025-47405/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2025-47405", "author": {"login": "automation"}}, {"uuid": "d3023495-2459-4196-b9f5-4dd1a0c904ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:07:07.988222+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3ml2elkgw7f2p", "content": "\ud83d\udccc CVE-2026-4670 - Authentication bypass by primary weakness vulnerability in Progress Software MOVEit Automation allows Authentication Bypass.\n\nThis issue affects MOVEi... https://www.cyberhub.blog/cves/CVE-2026-4670", "vulnerability": "CVE-2026-4670", "author": {"login": "automation"}}, {"uuid": "445e356f-adde-4249-8833-a0b4fe112cb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:06:30.160199+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2ekgftrk2p", "content": "CVE-2026-42809 - Apache Polaris: staged table creation could vend storage credentials for unvalidated locations\nCVE ID : CVE-2026-42809\n \n Published : May 4, 2026, 5:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : Apache Polaris can issue broad temporary (\"vended\") storage cr...", "vulnerability": "CVE-2026-42809", "author": {"login": "automation"}}, {"uuid": "ee3e4a85-ad2e-4369-a4e6-0710aab82a10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:01:29.734634+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2ebhynmx2p", "content": "CVE-2026-42440 - Apache OpenNLP: OOM DoS via Unbounded Array Allocation in AbstractModelReader\nCVE ID : CVE-2026-42440\n \n Published : May 4, 2026, 5:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : OOM Denial of Service via Unbounded Array Allocation in Apache OpenNLP Abstract...", "vulnerability": "CVE-2026-42440", "author": {"login": "automation"}}, {"uuid": "a0f7eafc-075e-41ce-b68d-5ebcb7e5a080", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:00:40+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82802", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #RCE #Remote\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a LetsDefend-SOC336-Windows-OLE-Zero-Click-RCE-Exploitation-Detected-CVE-2025-21298\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a C-G-creator\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a None\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-04 18:54:41\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nLetsDefend SOC336 case study on CVE-2025-21298\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2025-21298", "author": {"login": "automation"}}, {"uuid": "b28347b4-7e44-42c9-9e8a-4bbc5d35c431", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:00:30.193234+00:00", "type": "seen", "source": "https://bsky.app/profile/sebclick.bsky.social/post/3ml2e7lqlqc2z", "content": "Copy Fail (CVE-2026-31431) : Synth\u00e8se technique sur cette faille Linux www.linuxtricks.fr/news/10-logi...", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "8eb55441-aa5c-4abf-bb42-fa9251f858bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:00:15+00:00", "type": "seen", "source": "Telegram/QQv2uIlSJYtR0uAQ701jbxfB1nuF8mIFGY0tOi_twe9-S-4", "content": "", "vulnerability": "CVE-2025-0690", "author": {"login": "automation"}}, {"uuid": "34e9447f-da9f-4acd-ad7f-4478b857608d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:00:15+00:00", "type": "seen", "source": "Telegram/QQv2uIlSJYtR0uAQ701jbxfB1nuF8mIFGY0tOi_twe9-S-4", "content": "", "vulnerability": "CVE-2025-68930", "author": {"login": "automation"}}, {"uuid": "708e9744-b435-4fa2-b95f-34a2de84d35f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T19:00:15+00:00", "type": "seen", "source": "Telegram/QQv2uIlSJYtR0uAQ701jbxfB1nuF8mIFGY0tOi_twe9-S-4", "content": "", "vulnerability": "CVE-2025-40271", "author": {"login": "automation"}}, {"uuid": "53afef64-42d4-4998-afe9-7930b3bcdd9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:58:56.973169+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2e4w4vwn22", "content": "Re: CVE-2026-31431: CopyFail: linux local privilege scalation", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "fbec927d-1676-44dd-aba4-db2c6ea72311", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:57:12.229009+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2dzsfn3q2t", "content": "CVE-2026-41471 - Easy PayPal Events &amp; Tickets 1.3 Information Disclosure via QR Code Endpoint\nCVE ID : CVE-2026-41471\n \n Published : May 4, 2026, 5:40 p.m. | 40\u00a0minutes ago\n \n Description : Easy PayPal Events &amp; Tickets plugin for WordPress versions 1.3 and earlier contain ...", "vulnerability": "CVE-2026-41471", "author": {"login": "automation"}}, {"uuid": "8e51cedc-0ccd-46ae-aec1-ce8576c4565f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:53:27.051927+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2dt3hwol2i", "content": "CVE-2026-42374 - D-Link DIR-600L B1 Hardcoded Telnet Backdoor Credentials\nCVE ID : CVE-2026-42374\n \n Published : May 4, 2026, 5:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : D-Link DIR-600L Hardware Revision B1 (End-of-Life) contains a hardcoded telnet backdoor. The device ...", "vulnerability": "CVE-2026-42374", "author": {"login": "automation"}}, {"uuid": "374476f8-c107-4cbb-8ed1-8f2753f13255", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:50:07.227123+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2dn4fq4j2p", "content": "CVE-2026-43616 - Detect-It-Easy\nCVE ID : CVE-2026-43616\n \n Published : May 4, 2026, 5:33 p.m. | 46\u00a0minutes ago\n \n Description : Detect-It-Easy prior to 3.21 contains a path traversal vulnerability that allows attackers to write arbitrary files to the filesystem by crafting mal...", "vulnerability": "CVE-2026-43616", "author": {"login": "automation"}}, {"uuid": "9d155020-d838-4b33-b3a0-59cf1d53613f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:47:06.842812+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2dhoyfqj2k", "content": "CVE-2026-42796 - Arelle\nCVE ID : CVE-2026-42796\n \n Published : May 4, 2026, 5:19 p.m. | 1\u00a0hour ago\n \n Description : Arelle before 2.39.10 contains an unauthenticated remote code execution vulnerability in the /rest/configure REST endpoint that accepts a plugins query parameter...", "vulnerability": "CVE-2026-42796", "author": {"login": "automation"}}, {"uuid": "442d9479-50be-4b6b-a4c0-aac85fd8f7f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:44:20.839693+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2dcsmbvq2k", "content": "CVE-2026-42376 - D-Link DIR-456U A1 Hardcoded Telnet Backdoor Credentials\nCVE ID : CVE-2026-42376\n \n Published : May 4, 2026, 5:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : D-Link DIR-456U Hardware Revision A1 (End-of-Life, EOL) contains a hardcoded telnet backdoor. The de...", "vulnerability": "CVE-2026-42376", "author": {"login": "automation"}}, {"uuid": "f95ef961-2689-49ee-bada-92aadef26b88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:41:50.400065+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2d6d7s2p2e", "content": "CVE-2026-32834 - Easy PayPal Events &amp; Tickets 1.3 Authentication Bypass via QR Code Scanning\nCVE ID : CVE-2026-32834\n \n Published : May 4, 2026, 5:39 p.m. | 41\u00a0minutes ago\n \n Description : Easy PayPal Events &amp; Tickets plugin for WordPress version 1.3 and earlier contain a ...", "vulnerability": "CVE-2026-32834", "author": {"login": "automation"}}, {"uuid": "65ac8204-7f5a-4ce8-9f5d-4967a1029e87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:40:36.395086+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2d44phkd2e", "content": "Re: CVE-2026-31431: CopyFail: linux local privilege scalation", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "2e295ddc-ffb5-40cf-9391-cc3ba430afd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:39:35.987754+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2d2d3idz2x", "content": "Re: Precise disclosure contents for copyfail (Re: [oss-security] CVE-2026-31431: CopyFail: linux local privilege scalation)", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "2d761bc5-d78b-46d1-b8be-69a6fe7756cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:39:31.259417+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2d26f5kc2e", "content": "CVE-2026-0073 - Qualcomm ADB TLS Certificate Bypass Vulnerability\nCVE ID : CVE-2026-0073\n \n Published : May 4, 2026, 6 p.m. | 20\u00a0minutes ago\n \n Description : In adbd_tls_verify_cert of auth.cpp, there is a possible bypass of wireless ADB mutual authentication due to a logic er...", "vulnerability": "CVE-2026-0073", "author": {"login": "automation"}}, {"uuid": "a11ba6a6-ea1c-4efa-83f0-b2d3d8c092d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:37:22.233204+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2cwddwoq2v", "content": "CVE-2026-42088 - OpenC3 COSMOS: Administrative Actions via the Script Runner Tool\nCVE ID : CVE-2026-42088\n \n Published : May 4, 2026, 5:21 p.m. | 59\u00a0minutes ago\n \n Description : OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or mo...", "vulnerability": "CVE-2026-42088", "author": {"login": "automation"}}, {"uuid": "db1cfb0d-c65c-47b6-af2f-dc470c328eb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:35:21.531028+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2csqi3qc2q", "content": "CVE-2026-42138 - Dify Vulnerable to Stored XSS via SVG-file upload\nCVE ID : CVE-2026-42138\n \n Published : May 4, 2026, 5:34 p.m. | 46\u00a0minutes ago\n \n Description : Dify is an open-source LLM app development platform. Prior to version 1.13.1, using the method POST /api/files/upl...", "vulnerability": "CVE-2026-42138", "author": {"login": "automation"}}, {"uuid": "c496abe0-8fea-4fb0-967a-3cc7fa7dc1c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:33:28.860086+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2cpesil22k", "content": "CVE-2026-42140 - Server-Side Request Forgery (SSRF) in PlantUML Macro via 'server' parameter\nCVE ID : CVE-2026-42140\n \n Published : May 4, 2026, 5:37 p.m. | 43\u00a0minutes ago\n \n Description : PlantUML Macro is a macro for rendering UML diagrams from simple textual schemes. Prior ...", "vulnerability": "CVE-2026-42140", "author": {"login": "automation"}}, {"uuid": "875435f2-b0b9-4a25-acc7-ea6b139cbb5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:31:42.560046+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2cm7hqfa2q", "content": "CVE-2026-42092 - Global Settings Publication Exposes Sensitive Configuration to Any Authenticated User in Titra\nCVE ID : CVE-2026-42092\n \n Published : May 4, 2026, 5:30 p.m. | 49\u00a0minutes ago\n \n Description : titra is an open source time tracking project. In version 0.99.52, th...", "vulnerability": "CVE-2026-42092", "author": {"login": "automation"}}, {"uuid": "9a19cd16-0118-4fe5-82d0-1b75bb6d73a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:30:55.554948+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2cks5l6l26", "content": "\ud83d\udd34 CVE-2026-24781 - Critical (9.8)\n\nvm2 is an open source vm/sandbox for Node.js. Prior to version 3.11.0, VM2 suffers from a sandbox...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-24781/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-24781", "author": {"login": "automation"}}, {"uuid": "f96fd294-6858-489b-8f07-600b1931dc60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:30:48.671010+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2ckkquyt2l", "content": "\ud83d\udd34 CVE-2026-24120 - Critical (9.8)\n\nvm2 is an open source vm/sandbox for Node.js. Prior to version 3.10.5, the fix for CVE-2023-37466...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-24120/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2023-37466", "author": {"login": "automation"}}, {"uuid": "7ecf264b-d3ca-42fb-b5f2-129d5e2e50aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:30:48.520546+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2ckkquyt2l", "content": "\ud83d\udd34 CVE-2026-24120 - Critical (9.8)\n\nvm2 is an open source vm/sandbox for Node.js. Prior to version 3.10.5, the fix for CVE-2023-37466...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-24120/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-24120", "author": {"login": "automation"}}, {"uuid": "a41d179a-4e8d-4fef-be40-2c92ba04f5cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:30:39.581003+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2ckcncdj2k", "content": "\ud83d\udd34 CVE-2026-24118 - Critical (9.8)\n\nvm2 is an open source vm/sandbox for Node.js. Prior to version 3.11.0, VM2 suffers from a sandbox...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-24118/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-24118", "author": {"login": "automation"}}, {"uuid": "22c6569d-3b2d-4cd6-8bb4-1bbc1f9a7007", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:30:01.783667+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2cj7k7g62e", "content": "CVE-2026-42375 - D-Link DIR-600L A1 Hardcoded Telnet Backdoor Credentials\nCVE ID : CVE-2026-42375\n \n Published : May 4, 2026, 5:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : D-Link DIR-600L Hardware Revision A1 (End-of-Life) contains a hardcoded telnet backdoor. The device ...", "vulnerability": "CVE-2026-42375", "author": {"login": "automation"}}, {"uuid": "afa80b21-1623-4f8a-a48f-bfd56f6efeb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:29:13.485063+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2chqmwp22n", "content": "\ud83d\udfe0 CVE-2026-24082 - High (7.8)\n\nMemory Corruption when copying data from a freed source while executing performance counter desel...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-24082/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-24082", "author": {"login": "automation"}}, {"uuid": "78e944f3-7974-47f6-95bf-43a40eb06850", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:29:06.872346+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2chjxrh42f", "content": "\ud83d\udfe0 CVE-2025-47408 - High (7.8)\n\nMemory corruption when another driver calls an IOCTL with invalid input/output buffer.\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2025-47408/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2025-47408", "author": {"login": "automation"}}, {"uuid": "4cb2a028-6e05-466e-924a-f5f38dd2e3bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:29:01.678950+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2chd6ibn2q", "content": "\ud83d\udfe0 CVE-2025-47407 - High (7.8)\n\nMemory corruption while creating a process on the digital signal processor due to allocation fail...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2025-47407/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2025-47407", "author": {"login": "automation"}}, {"uuid": "d4d634d1-7100-467b-81f9-fc94128fd5d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:28:47.642270+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2cgy4oyf2q", "content": "\ud83d\udfe0 CVE-2026-29514 - High (8.8)\n\nNetBox versions 4.3.5 through 4.5.4 contain a remote code execution vulnerability in the RenderTe...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-29514/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-29514", "author": {"login": "automation"}}, {"uuid": "8e69a84f-5ffe-42dd-8268-2a433e09f25e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:28:40.083370+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2cgqpign2g", "content": "\ud83d\udd34 CVE-2026-26956 - Critical (9.8)\n\nvm2 is an open source vm/sandbox for Node.js. In version 3.10.4, vm2 is vulnerable to full sandbo...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-26956/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-26956", "author": {"login": "automation"}}, {"uuid": "24acf81b-6dac-498e-9485-3c6a13540975", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:28:31.612578+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2cgiszak2l", "content": "\ud83d\udfe0 CVE-2026-29004 - High (8.1)\n\nBusyBox before commit 42202bf contains a heap buffer overflow vulnerability in the DHCPv6 client ...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-29004/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-29004", "author": {"login": "automation"}}, {"uuid": "af8cca6a-bcd5-43a8-b432-bde4c2d97148", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:28:26.406327+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2cgemy2x2v", "content": "CVE-2026-42087 - OpenC3 COSMOS: SQL Injection in QuestDB Time-Series Data Base\nCVE ID : CVE-2026-42087\n \n Published : May 4, 2026, 5:18 p.m. | 1\u00a0hour, 2\u00a0minutes ago\n \n Description : OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one o...", "vulnerability": "CVE-2026-42087", "author": {"login": "automation"}}, {"uuid": "2a0581fc-e62b-417b-90e5-90c052e01364", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:28:08.903294+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2cftc6av2t", "content": "\ud83d\udd34 CVE-2026-26956 - Critical (9.8)\n\nvm2 is an open source vm/sandbox for Node.js. In version 3.10.4, vm2 is vulnerable to full sandbo...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-26956/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-26956", "author": {"login": "automation"}}, {"uuid": "7fd51121-42ee-4af9-bbde-74181fbfb986", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:28:01.444374+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2cflgtyh2n", "content": "\ud83d\udfe0 CVE-2026-29004 - High (8.1)\n\nBusyBox before commit 42202bf contains a heap buffer overflow vulnerability in the DHCPv6 client ...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-29004/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-29004", "author": {"login": "automation"}}, {"uuid": "e44f8c70-e709-4b1f-bd5a-1f672969d8f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:27:53.562189+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2cfeb6r52g", "content": "\ud83d\udfe0 CVE-2026-32834 - High (7.5)\n\nEasy PayPal Events &amp; Tickets plugin for WordPress version 1.3 and earlier contain a hardcoded aut...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-32834/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-32834", "author": {"login": "automation"}}, {"uuid": "213cab1e-fff5-4807-9dac-83e3f1080266", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:26:56.241257+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml2cdogi7q2k", "content": "CVE-2026-42091 - goshs has Cross-Origin Arbitrary File Write via Missing CSRF on PUT and Wildcard CORS\nCVE ID : CVE-2026-42091\n \n Published : May 4, 2026, 5:24 p.m. | 55\u00a0minutes ago\n \n Description : goshs is a SimpleHTTPServer written in Go. Prior to version 2.0.2, the PUT upl...", "vulnerability": "CVE-2026-42091", "author": {"login": "automation"}}, {"uuid": "15b27c62-45bf-48c3-bf37-2289b04429b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:24:05.849252+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2c6ljvvg2r", "content": "\ud83d\udd34 CVE-2026-41571 - Critical (9.4)\n\nNote Mark is an open-source note-taking application. In version 0.19.2, IsPasswordMatch in backen...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-41571/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-41571", "author": {"login": "automation"}}, {"uuid": "1e3b6f1a-ac33-44b5-9844-49d3e0eec89e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:24:00.750906+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2c6cl7wd2e", "content": "\ud83d\udfe0 CVE-2026-41471 - High (7.5)\n\nEasy PayPal Events &amp; Tickets plugin for WordPress versions 1.3 and earlier contain an information...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-41471/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-41471", "author": {"login": "automation"}}, {"uuid": "d1005db3-e240-4b46-bd78-592fcbf409e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:23:50.030880+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2c63yso62r", "content": "\ud83d\udd34 CVE-2026-42087 - Critical (9.6)\n\nOpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or ...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42087/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42087", "author": {"login": "automation"}}, {"uuid": "559c75d7-965a-42e2-94d1-ea276a56e7b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:19:42.553441+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2bwqjgot2c", "content": "\ud83d\udfe0 CVE-2026-42084 - High (8.1)\n\nOpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or ...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42084/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42084", "author": {"login": "automation"}}, {"uuid": "b8d866fc-929d-495d-b676-56501b280c6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:19:35.345253+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2bwjcjwo2n", "content": "\ud83d\udd34 CVE-2026-42088 - Critical (9.6)\n\nOpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or ...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42088/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42088", "author": {"login": "automation"}}, {"uuid": "3364f35e-e2ec-4664-8434-8f0ea9165eb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:19:28.108178+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2bwbqkzy2k", "content": "\ud83d\udd34 CVE-2026-42796 - Critical (9.8)\n\nArelle before 2.39.10 contains an unauthenticated remote code execution vulnerability in the /res...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42796/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42796", "author": {"login": "automation"}}, {"uuid": "090a8e3d-1ba7-4601-9e92-b8934c015f76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:11:21.945453+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2bhswa6s2e", "content": "\ud83d\udd34 CVE-2026-26332 - Critical (9.8)\n\nvm2 is an open source vm/sandbox for Node.js. Prior to version 3.11.0, SuppressedError allows att...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-26332/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-26332", "author": {"login": "automation"}}, {"uuid": "61785423-d1c7-422e-95ec-a7018b57d917", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:11:14.164745+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2bhl23yf2s", "content": "\ud83d\udd34 CVE-2026-25293 - Critical (9.6)\n\nBuffer overflow due to incorrect authorization in PLC FW\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-25293/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-25293", "author": {"login": "automation"}}, {"uuid": "d003427e-8588-42ea-9f8f-fc25136565d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:11:05.881166+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2bhdmvyd2c", "content": "\ud83d\udfe0 CVE-2026-42079 - High (8.6)\n\nPPTAgent is an agentic framework for reflective PowerPoint generation. Prior to commit 418491a, P...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42079/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42079", "author": {"login": "automation"}}, {"uuid": "6975f250-0c6b-496a-870b-0177a3c223f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:10:46.363371+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2bgr7zhc2w", "content": "\ud83d\udd34 CVE-2026-26332 - Critical (9.8)\n\nvm2 is an open source vm/sandbox for Node.js. Prior to version 3.11.0, SuppressedError allows att...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-26332/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-26332", "author": {"login": "automation"}}, {"uuid": "3d26ecdd-e6cf-4163-960d-bf925fac096f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:10:39.172039+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2bgk2gs22l", "content": "\ud83d\udd34 CVE-2026-25293 - Critical (9.6)\n\nBuffer overflow due to incorrect authorization in PLC FW\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-25293/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-25293", "author": {"login": "automation"}}, {"uuid": "f5827f53-93f8-46c0-9fa7-19f6746cfd40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:10:30.932002+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2bgbykt22w", "content": "\ud83d\udfe0 CVE-2026-42079 - High (8.6)\n\nPPTAgent is an agentic framework for reflective PowerPoint generation. Prior to commit 418491a, P...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42079/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42079", "author": {"login": "automation"}}, {"uuid": "80ab54ac-49fb-4ada-95bb-8eb45fb5a6af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:08:51.278339+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2bdddqo62n", "content": "\ud83d\udd34 CVE-2026-42076 - Critical (9.8)\n\nEvolver is a GEP-powered self-evolving engine for AI agents. Prior to version 1.69.3, a command i...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42076/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42076", "author": {"login": "automation"}}, {"uuid": "f139d713-37ec-4ff4-abdd-be7cb560a4c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:08:43.483242+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2bd3tods2l", "content": "\ud83d\udfe0 CVE-2026-42075 - High (8.1)\n\nEvolver is a GEP-powered self-evolving engine for AI agents. Prior to version 1.69.3, a path trav...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42075/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42075", "author": {"login": "automation"}}, {"uuid": "bde78218-11c8-44d7-b717-9cf0e4d24c41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:08:36.058014+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2bcuhvhu2z", "content": "\ud83d\udd34 CVE-2026-42375 - Critical (9.8)\n\nD-Link DIR-600L Hardware Revision A1 (End-of-Life) contains a hardcoded telnet backdoor. The devi...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42375/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42375", "author": {"login": "automation"}}, {"uuid": "173b2df5-0bd6-4f2d-ab0d-e1c555865114", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:07:08.011788+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3ml2bab7nz425", "content": "\ud83d\udccc CVE-2026-20082 - A vulnerability in the handling of the embryonic connection limits in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software could allow an ... https://www.cyberhub.blog/cves/CVE-2026-20082", "vulnerability": "CVE-2026-20082", "author": {"login": "automation"}}, {"uuid": "7b70a49c-07da-4bb4-97cd-6450e57b5a7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:04:09.800247+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2b2wtauk2f", "content": "\ud83d\udd34 CVE-2026-42374 - Critical (9.8)\n\nD-Link DIR-600L Hardware Revision B1 (End-of-Life) contains a hardcoded telnet backdoor. The devi...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42374/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42374", "author": {"login": "automation"}}, {"uuid": "fdf209ae-4fc5-4386-ac3d-acc21a27524d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:04:01.041316+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2b2omiuz2g", "content": "\ud83d\udd34 CVE-2026-42373 - Critical (9.8)\n\nD-Link DIR-605L Hardware Revision B2 (End-of-Life, EOL) contains a hardcoded telnet backdoor. The...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42373/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42373", "author": {"login": "automation"}}, {"uuid": "699404df-0a41-455e-a941-67eb47144cb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:03:53.477711+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2b2h6jk52t", "content": "\ud83d\udfe0 CVE-2026-42372 - High (8.8)\n\nD-Link DIR-605L Hardware Revision A1 (End-of-Life, EOL) contains a hardcoded telnet backdoor. The...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42372/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42372", "author": {"login": "automation"}}, {"uuid": "7ab01b0b-6f12-47d7-89ba-c295cfbe498d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:03:14.785539+00:00", "type": "seen", "source": "https://bsky.app/profile/euvd-bot.bsky.social/post/3ml2azcq27d2c", "content": "\ud83d\udea8 EUVD-2026-26986\n\ud83d\udcca 9.8/10\n\ud83c\udfe2 patriksimek\n\n\ud83d\udcdd vm2 is an open source vm/sandbox for Node.js. Prior to version 3.10.5, the fix for CVE-2023-37466 is insufficient and can be circumvented allowing att...\n\n\ud83d\udd17 https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-26986\n\n#cybersecurity #infosec #cve #euvd", "vulnerability": "CVE-2023-37466", "author": {"login": "automation"}}, {"uuid": "d6e8612c-0ba7-4e53-b80b-40c1689b786a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:02:11.693220+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2axckja62n", "content": "\ud83d\udd34 CVE-2026-42090 - Critical (9.6)\n\nNotesnook is a note-taking app focused on user privacy &amp; ease of use. Prior to Notesnook Web/Desk...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42090/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42090", "author": {"login": "automation"}}, {"uuid": "ad967b87-2858-4009-8d9c-cbcf27cb9d03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:02:00.169434+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2ax33zfg2n", "content": "\ud83d\udd34 CVE-2026-42812 - Critical (9.9)\n\nIn Apache Iceberg, the table's metadata files are control files: they tell readers\nwhich data fil...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42812/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42812", "author": {"login": "automation"}}, {"uuid": "aa648ebe-1c29-494d-ab1e-f1e9a0785487", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:01:52.576959+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2awtnhos2e", "content": "\ud83d\udd34 CVE-2026-42811 - Critical (9.9)\n\nIn plain terms, Apache Polaris is supposed to issue short-lived GCS credentials\nthat\nonly work fo...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42811/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42811", "author": {"login": "automation"}}, {"uuid": "20e72465-e1a0-4622-bf2c-a4da381c9afe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:01:43.872877+00:00", "type": "seen", "source": "https://bsky.app/profile/modat-io.bsky.social/post/3ml2awivmxc2j", "content": "\u26a0\ufe0fCVE-2025-71284 Synway SMG RCE via en/9-2radius.php(CVSS 9.8). Sed injection via radius_address+POST params enables unauth RCE. No patch. Query: (web.title=\"IPPBX\" or web.html~\"synwayjs\") OR (web.html~\"text ml10 mr20\" and (web.title=\"\u7f51\u5173\u7ba1\u7406\u8f6f\u4ef6\" or web.title~\"Gateway Management\")) and tag!=\"Honeypot\"", "vulnerability": "CVE-2025-71284", "author": {"login": "automation"}}, {"uuid": "0d0afca3-7503-407e-b549-6223ad980591", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:01:00.287213+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2avc356h2k", "content": "\ud83d\udd34 CVE-2026-42810 - Critical (9.9)\n\nApache Polaris accepts literal `*` characters in namespace and table names. When it\nlater builds ...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42810/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42810", "author": {"login": "automation"}}, {"uuid": "85cc1e9b-1400-4190-87f3-ab9a62de0368", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:00:52.672180+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2av2pacn2r", "content": "\ud83d\udd34 CVE-2026-42809 - Critical (9.9)\n\nApache Polaris can issue broad temporary (\"vended\") storage credentials during\nstaged\ntable creat...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42809/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42809", "author": {"login": "automation"}}, {"uuid": "79517f96-b86c-417a-aabc-9f08fcc3fd90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:00:44.757586+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml2autcjzk2f", "content": "\ud83d\udd34 CVE-2026-42376 - Critical (9.8)\n\nD-Link DIR-456U Hardware Revision A1 (End-of-Life, EOL) contains a hardcoded telnet backdoor. The...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42376/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42376", "author": {"login": "automation"}}, {"uuid": "8d716eb6-f302-4140-877b-5f681e995106", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:00:39.649211+00:00", "type": "seen", "source": "https://bsky.app/profile/mm-ilsoftware-bot.bsky.social/post/3ml2auoi22u2p", "content": "CVE-2026-31431: perch\u00e9 Linux Copy Fail preoccupa\nUna vulnerabilit\u00e0 nel kernel Linux, presente dal 2017, consente escalation a root manipolando la page cache. CISA e altri sogge...\nhttps://www.ilsoftware.it/vulnerabilita-linux-copy-fail-cve-2026-31431/", "vulnerability": "cve-2026-31431", "author": {"login": "automation"}}, {"uuid": "0fe4ee51-5305-4026-bf5e-a3ed46a3f361", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:00:20.516442+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2au4kdt52u", "content": "Re: Precise disclosure contents for copyfail (Re: [oss-security] CVE-2026-31431: CopyFail: linux local privilege scalation)", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "daece8cb-7e3e-477b-858a-6e7b96b4bff8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:00:05+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82798", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-21514_CVE-2026-21510\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a ChaitanyaHaritash\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-04 17:47:28\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nCVE-2026-21514 &amp; CVE-2026-21510 (Because MS-Office Fascinates me)\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-21510", "author": {"login": "automation"}}, {"uuid": "7dfe67cb-046e-498c-886b-2d3c6bdd5152", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T18:00:05+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82798", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-21514_CVE-2026-21510\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a ChaitanyaHaritash\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-04 17:47:28\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nCVE-2026-21514 &amp; CVE-2026-21510 (Because MS-Office Fascinates me)\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-21514", "author": {"login": "automation"}}, {"uuid": "9b40669f-4e9b-446c-845c-99d5205fc3cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:57:00.017094+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2ao5fp4a2b", "content": "CVE-2026-33523: Apache HTTP Server: multiple modules: HTTP response splitting forwarding malicious status line", "vulnerability": "CVE-2026-33523", "author": {"login": "automation"}}, {"uuid": "1aad6848-4085-43e2-a60a-0c1cad0f1870", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:53:59.758687+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2airgugo2h", "content": "CVE-2026-33006: Apache HTTP Server: mod_auth_digest timing attack", "vulnerability": "CVE-2026-33006", "author": {"login": "automation"}}, {"uuid": "9f4cea4f-af24-485e-a44e-aa479fbe8594", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:51:15.301080+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2adulsub22", "content": "CVE-2026-33007: Apache HTTP Server: mod_authn_socache crash", "vulnerability": "CVE-2026-33007", "author": {"login": "automation"}}, {"uuid": "1ce6f8ad-1df6-467e-a1fa-81959c8c1e9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:48:44.658063+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2a7f5yvr2e", "content": "CVE-2026-23918: Apache HTTP Server: http2: double free and possible RCE on early reset", "vulnerability": "CVE-2026-23918", "author": {"login": "automation"}}, {"uuid": "2c4951da-595d-4029-a3cd-072c0a22736d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:48:17.317917+00:00", "type": "seen", "source": "https://bsky.app/profile/vritrasecnews.bsky.social/post/3ml2a6l4v5w27", "content": "CISA warns of the actively exploited \u201cCopy Fail\u201d Linux flaw (CVE-2026-31431), enabling root...\n\n\ud83d\udd17 https://www.tomshardware.com/software/linux/cisa-flags-actively-exploited-copy-fail-linux-kernel-flaw-enabling-root-takeover-across-major-distros-unpatched-systems-may-remain-vulnerable-to-attack", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "32926063-38ce-43fe-8b4f-a54c975a618c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:46:26.163408+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2a3ar7on22", "content": "CVE-2026-34059: Apache HTTP Server: mod_proxy_ajp: Heap Over-Read and memory disclosure in ajp_parse_data()", "vulnerability": "CVE-2026-34059", "author": {"login": "automation"}}, {"uuid": "a2f089e2-f243-4676-a00f-a05810026b92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:44:16.919386+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml27xfrq6y2i", "content": "CVE-2026-29169: Apache HTTP Server: mod_dav_lock indirect lock crash", "vulnerability": "CVE-2026-29169", "author": {"login": "automation"}}, {"uuid": "90fcd831-ec2c-43bd-8f9a-79811801abea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:42:17.411325+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml27tsydx52v", "content": "CVE-2026-24072: Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr", "vulnerability": "CVE-2026-24072", "author": {"login": "automation"}}, {"uuid": "a374972c-2d80-413a-97ea-368415cba48c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:41:16.189488+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml27rzgg6v2z", "content": "CVE-2026-33857: Apache HTTP Server: Off-by-one OOB reads in AJP getter functions", "vulnerability": "CVE-2026-33857", "author": {"login": "automation"}}, {"uuid": "94ff514c-c208-48d2-82fb-db2bac5b1421", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:40:52.930455+00:00", "type": "seen", "source": "https://bsky.app/profile/Kubernetes.activitypub.awakari.com.ap.brid.gy/post/3ml27qwgm6qt2", "content": "\"Copy Fail\" Lands on CISA's KEV: A Nine-Year-Old Linux Bug Becomes a Patch Deadline On May 1, 2026, CISA added CVE-2026-31431, better known as \"Copy Fail,\" to its Known Exploite...\n\n#News\n\nOrigin | Interest | Match", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "43620760-4510-47e8-8526-dd63063a5b96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:36:15.021312+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml27j2ah5e2u", "content": "CVE-2026-34032: Apache HTTP Server: mod_proxy_ajp: Heap Buffer Over-Read Due to Missing Null-Termination Check (ajp_msg_get_string)", "vulnerability": "CVE-2026-34032", "author": {"login": "automation"}}, {"uuid": "ba7d3283-c817-4087-946b-b5d3f7deb77b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:32:36.316016+00:00", "type": "seen", "source": "https://bsky.app/profile/hexonbot.bsky.social/post/3ml27cjm5l52p", "content": "AI found a 9-year Linux kernel bug in 1 hour. Copy Fail gives any local user root with a 732-byte Python script and can break container isolation. Patch now. https://www.hexon.bot/blog/copy-fail-cve-2026-31431-ai-discovered-linux-root #LinuxSecurity #AISecurity", "vulnerability": "cve-2026-31431", "author": {"login": "automation"}}, {"uuid": "0387d9a0-bfbe-428a-a2f1-f7e53deb4b77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:32:16.791290+00:00", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3ml27bvuujh2b", "content": "Progress Software issued a critical alert regarding two severe vulnerabilities in its MOVEit Automation platform, allowing authentication bypass and privilege escalation. CVE-2026-4670 enables unauthenticated access, while CVE-2026-5174 allows attackers to gain administrative rights.", "vulnerability": "CVE-2026-5174", "author": {"login": "automation"}}, {"uuid": "84154582-4df3-45eb-92a4-1da4b67162fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:32:16.654534+00:00", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3ml27bvuujh2b", "content": "Progress Software issued a critical alert regarding two severe vulnerabilities in its MOVEit Automation platform, allowing authentication bypass and privilege escalation. CVE-2026-4670 enables unauthenticated access, while CVE-2026-5174 allows attackers to gain administrative rights.", "vulnerability": "CVE-2026-4670", "author": {"login": "automation"}}, {"uuid": "c558d3b2-1439-4c8a-ad59-ab2a9999ef4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:32:15.820758+00:00", "type": "seen", "source": "https://bsky.app/profile/ronan.mastodon.ronandev.ovh.ap.brid.gy/post/3ml277i4zi3m2", "content": "\"CopyFail\" (CVE-2026-31431) : un utilisateur local sans privil\u00e8ge peut \u00e9crire 4 bytes contr\u00f4l\u00e9s dans le cache de TOUT fichier lisible \u27a1\ufe0f \u00e9l\u00e9vation root.\n\nSi vous avez du multi-tenant, des conteneurs, des CI runners non fiables \u27a1\ufe0f mettre \u00e0 jour.\n\nOrdinateur perso \u27a1\ufe0f moins urgent mais mettez \u00e0 [\u2026]", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "61d172de-9152-4663-8888-75931a3726d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:32:11.752508+00:00", "type": "seen", "source": "https://bsky.app/profile/ronan.mastodon.ronandev.ovh.ap.brid.gy/post/3ml277e5neia2", "content": "\"CopyFail\" (CVE-2026-31431) : un utilisateur local sans privil\u00e8ge peut \u00e9crire 4 bytes contr\u00f4l\u00e9s dans le cache de TOUT fichier lisible \u27a1\ufe0f \u00e9l\u00e9vation root. Si vous avez du multi-tenant, des conteneurs, des CI runners non fiables : mettre \u00e0 jour. Ordinateur perso ? Moins urgent mais mettez \u00e0 jour [\u2026]", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "451d4f93-a398-4e8f-9a7c-61d79065db20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:31:13.970667+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml27a2umi72z", "content": "Re: CVE-2026-31431: CopyFail: linux local privilege scalation", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "0c3a26c9-dfec-407c-8f6b-9ca2f5906ae1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:21:12.685982+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml26o55c7o2e", "content": "Re: CVE-2026-31431: CopyFail: linux local privilege scalation", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "6d94094e-8b8a-4975-b1d5-44afdd6fe6a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:18:53.215803+00:00", "type": "seen", "source": "https://infosec.exchange/users/harrysintonen/statuses/116517446102524326", "content": "Several vulnerabilities in #Apache HTTP Server 2.4 have been fixed in release 2.4.67. The most severe of these are:\n- CVE-2026-23918: Apache HTTP Server: http2: double free and possible RCE on early reset\n- CVE-2026-24072: Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr\n- CVE-2026-33006: Apache HTTP Server: mod_auth_digest timing attack\nhttps://httpd.apache.org/security/vulnerabilities_24.html\n#CVE_2026_23918 #CVE_2026_24072 #CVE_2026_33006 #infosec #cybersecurity", "vulnerability": "CVE-2026-33006", "author": {"login": "automation"}}, {"uuid": "eae3a14e-e420-4321-89bd-efec822a66b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:18:53.074884+00:00", "type": "seen", "source": "https://infosec.exchange/users/harrysintonen/statuses/116517446102524326", "content": "Several vulnerabilities in #Apache HTTP Server 2.4 have been fixed in release 2.4.67. The most severe of these are:\n- CVE-2026-23918: Apache HTTP Server: http2: double free and possible RCE on early reset\n- CVE-2026-24072: Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr\n- CVE-2026-33006: Apache HTTP Server: mod_auth_digest timing attack\nhttps://httpd.apache.org/security/vulnerabilities_24.html\n#CVE_2026_23918 #CVE_2026_24072 #CVE_2026_33006 #infosec #cybersecurity", "vulnerability": "CVE-2026-24072", "author": {"login": "automation"}}, {"uuid": "412277f4-d2ca-48f6-b880-681b2f191cbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:18:52.927565+00:00", "type": "seen", "source": "https://infosec.exchange/users/harrysintonen/statuses/116517446102524326", "content": "Several vulnerabilities in #Apache HTTP Server 2.4 have been fixed in release 2.4.67. The most severe of these are:\n- CVE-2026-23918: Apache HTTP Server: http2: double free and possible RCE on early reset\n- CVE-2026-24072: Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr\n- CVE-2026-33006: Apache HTTP Server: mod_auth_digest timing attack\nhttps://httpd.apache.org/security/vulnerabilities_24.html\n#CVE_2026_23918 #CVE_2026_24072 #CVE_2026_33006 #infosec #cybersecurity", "vulnerability": "CVE-2026-23918", "author": {"login": "automation"}}, {"uuid": "fada86af-9d73-4c63-8e5b-1860df7f7c14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:16:11.771114+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml26f6knaz2j", "content": "Re: CVE-2026-31431: CopyFail: linux local privilege scalation", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "04ad6cdf-6c21-433b-8b8e-e2639334f208", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:10:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/d4f3d9fbcfea6645ceefb383fa46637f", "content": "", "vulnerability": "GHSA-qm77-8qjp-4vcm", "author": {"login": "automation"}}, {"uuid": "b301663f-c89d-4009-81e2-9aaf814f22ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:10:29+00:00", "type": "seen", "source": "https://gist.github.com/alon710/d4f3d9fbcfea6645ceefb383fa46637f", "content": "", "vulnerability": "CVE-2026-41358", "author": {"login": "automation"}}, {"uuid": "bace5b3f-0c5d-4302-9a14-bce2686c43df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:08:08.918120+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml25wryws52b", "content": "Re: CVE-2026-31431: CopyFail: linux local privilege scalation", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "d5fb0037-5a4c-426c-8388-94941dd62bba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:03:16+00:00", "type": "seen", "source": "https://gist.github.com/choco-bot/401a026b524772fda41c0ecb57d92a4c", "content": "", "vulnerability": "CVE-2022-30190", "author": {"login": "automation"}}, {"uuid": "4495ea73-5283-49f2-a900-2873132b74cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:02:07.688013+00:00", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116517380246425239", "content": "There is a new vulnerability with elevated criticality in D-Link DIR-456U A1 (CVE-2026-42376) https://vuldb.com/vuln/360991", "vulnerability": "CVE-2026-42376", "author": {"login": "automation"}}, {"uuid": "60aa4e92-1d9e-431e-af4d-e0f11964d70e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T17:00:04+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82795", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a cve-2026-31431\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a rippsec\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a None\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-04 16:59:26\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nc v e\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "17242068-f126-4f5b-a65e-10c88d757e52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:48:36.323252+00:00", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116517327062901025", "content": "We have just added an important vulnerability affecting D-Link DIR-600L A1 (CVE-2026-42375) https://vuldb.com/vuln/360990", "vulnerability": "CVE-2026-42375", "author": {"login": "automation"}}, {"uuid": "e17d3e65-faba-414c-a623-b1316620c55f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:46:51.891638+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml24qpp75o2p", "content": "CVE-2026-6266 - Aap-controller: aap-gateway: account hijacking and unauthorized access via unverified email linking\nCVE ID : CVE-2026-6266\n \n Published : May 4, 2026, 2:16 p.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : A flaw was found in the AAP gateway. The user auto-link st...", "vulnerability": "CVE-2026-6266", "author": {"login": "automation"}}, {"uuid": "bc1879d0-9a0c-4329-8999-ca4291376098", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:43:10.101697+00:00", "type": "seen", "source": "https://bsky.app/profile/cybercrimeinfo.bsky.social/post/3ml24jqw5u22w", "content": "Cyber Journaal S02E53: cPanel CVE-2026-41940 leidde tot 44.000 gecompromitteerde installaties na een zero day van twee maanden, ShinyHunters lekte 215.600 Aman Resorts accounts via vishing op de helpdesk, en Raptor Supplies Nederland staat op het darkweb.\n\n\u27a4 www.ccinfo.nl/journaal/315...", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "4521916e-10e8-4523-bd47-0c53827814f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:43:08.971763+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml24k3kog62i", "content": "Re: Precise disclosure contents for copyfail (Re: [oss-security] CVE-2026-31431: CopyFail: linux local privilege scalation)", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "7064f8c5-2566-4b53-bd0b-a50339d34d39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:41:50.835000+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml24hr7urx2r", "content": "CVE-2025-13605 - Shell command injection in 3onedata GW1101-1D(RS-485)-TB-P modbus gateway\nCVE ID : CVE-2025-13605\n \n Published : May 4, 2026, 3:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : 3onedata modbus gateway device model\u00a0GW1101-1D(RS-485)-TB-P (hardware version V2.2....", "vulnerability": "CVE-2025-13605", "author": {"login": "automation"}}, {"uuid": "713f6a89-704e-46b1-8e4a-25475bb66060", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:40:28+00:00", "type": "seen", "source": "https://gist.github.com/alon710/e818aa393dda5bd140273420e0cde714", "content": "", "vulnerability": "CVE-2026-24118", "author": {"login": "automation"}}, {"uuid": "a600850c-19ef-418d-b12e-18e745a6ba3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:40:28+00:00", "type": "seen", "source": "https://gist.github.com/alon710/e818aa393dda5bd140273420e0cde714", "content": "", "vulnerability": "GHSA-grj5-jjm8-h35p", "author": {"login": "automation"}}, {"uuid": "587b4912-9779-486a-840b-316697aa2271", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:38:08.664879+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml24b52qkj2h", "content": "Re: Precise disclosure contents for copyfail (Re: [oss-security] CVE-2026-31431: CopyFail: linux local privilege scalation)", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "b7b4909f-0268-4377-83d7-3961424e2c39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:37:08.383141+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3ml247di2kv2h", "content": "\ud83d\udccc CVE-2026-40434 - Anviz CrossChex Standard\nlacks source verification in the client/server channel, enabling TCP \npacket injection by an attacker on the same network to ... https://www.cyberhub.blog/cves/CVE-2026-40434", "vulnerability": "CVE-2026-40434", "author": {"login": "automation"}}, {"uuid": "1b6ca591-4104-46d9-9744-e9580cfcd03d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:32:54.250505+00:00", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3ml23xr6p4p2k", "content": "Norton Secure VPN\u306e\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u6642\u3001\u4f4e\u7279\u6a29\u30e6\u30fc\u30b6\u30fc\u304c\u30d5\u30a1\u30a4\u30eb\u3092\u7f6e\u63db\u3057\u4efb\u610f\u30d5\u30a1\u30a4\u30eb\u3092\u524a\u9664\u3059\u308b\u3053\u3068\u3067\u7279\u6a29\u6607\u683c\u306e\u8106\u5f31\u6027\u304c\u3042\u308b\u3002\u653b\u6483\u8005\u306f\u3053\u308c\u306b\u3088\u308a\u7279\u6a29\u6607\u683c\u304c\u53ef\u80fd\u3068\u306a\u308b\u3002\nCVE-2025-58074 CVSS 8.8 | HIGH", "vulnerability": "CVE-2025-58074", "author": {"login": "automation"}}, {"uuid": "5183b303-0668-4a0c-98b8-3c2190f54d1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:30:47.618546+00:00", "type": "seen", "source": "https://bsky.app/profile/openrewrite.github.io/post/3ml23txnkc22j", "content": "CVE-2026-22732: a 9.1 critical vulnerability in Spring Security that silently drops your security headers. No error. No log. Just gone.\n\nWe had detection + remediation running in under a day. Whole-perimeter coverage. \n\n\ud83d\udee1\ufe0f This is what zero-day defense looks like: buff.ly/eHVhQOm", "vulnerability": "CVE-2026-22732", "author": {"login": "automation"}}, {"uuid": "43b22d6c-50ed-4288-a8f6-c4d9204998c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:29:11.918378+00:00", "type": "seen", "source": "https://bsky.app/profile/buzzerintelligence.com/post/3ml23r5jh462s", "content": "Valid reminder. CVE-2024-36891 (the 'Copy Fail' flaw) affects Linux kernel memory handling. For DeFi infra, unpatched nodes create systemic risk\u2014an attacker compromising infrastructure could manipulate oracle data or front-run transactions.", "vulnerability": "CVE-2024-36891", "author": {"login": "automation"}}, {"uuid": "0e13e347-01f8-431f-83ad-865b31be30af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:27:13.568354+00:00", "type": "seen", "source": "https://bsky.app/profile/Ubuntu.activitypub.awakari.com.ap.brid.gy/post/3ml23mwsx6zp2", "content": "Ubuntu 26.04 LTS Sed Critical Overwrite Risk USN-8229-1 CVE-2026-5958 sed could be made to overwrite files.\n\n#Ubuntu #Linux #Distribution #- #Security #Advisories\n\nOrigin | Interest | Match", "vulnerability": "CVE-2026-5958", "author": {"login": "automation"}}, {"uuid": "8cf982b0-5ac2-46b5-9187-d8be1948ee2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:25:05.948502+00:00", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116517234634824012", "content": "Our CTI team identified a lot of activities targeting MediaTek MT2735 and other products (CVE-2026-20450) https://vuldb.com/vuln/360940/cti", "vulnerability": "CVE-2026-20450", "author": {"login": "automation"}}, {"uuid": "fec581d5-ea41-4c2c-9a3c-2474400818a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:22:24.480065+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3ml23ey76qf2z", "content": "\ud83d\udfe0 CVE-2026-23918 - High (8.8)\n\nDouble Free and possible RCE vulnerability in Apache HTTP Server with the HTTP/2 protocol.\n\nThis ...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-23918/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-23918", "author": {"login": "automation"}}, {"uuid": "0c8cbb92-3a8b-4e75-9a06-2d352820497b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:16:07+00:00", "type": "seen", "source": "https://www.incibe.es/incibe-cert/alerta-temprana/vulnerabilidades/cve-2026-44029", "content": "", "vulnerability": "CVE-2026-44029", "author": {"login": "syspect"}}, {"uuid": "873c6d18-dc2c-4e18-b33b-c07d8bb73ca2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:16:06+00:00", "type": "seen", "source": "https://www.incibe.es/incibe-cert/alerta-temprana/vulnerabilidades/cve-2026-44028", "content": "", "vulnerability": "CVE-2026-44028", "author": {"login": "syspect"}}, {"uuid": "6b000c73-6277-430e-8c05-ea626527f7ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:09:14+00:00", "type": "seen", "source": "https://gist.github.com/dmc5179/701d2f649e64544e945a860a2ffca8ae", "content": "", "vulnerability": "cve-2026-31431", "author": {"login": "automation"}}, {"uuid": "63d17fed-ea7d-4b27-b131-3fb962b1c2c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:07:09.108425+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3ml22jpwdiz2u", "content": "\ud83d\udccc CVE-2026-24178 - NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authori... https://www.cyberhub.blog/cves/CVE-2026-24178", "vulnerability": "CVE-2026-24178", "author": {"login": "automation"}}, {"uuid": "82891b10-80b1-46fd-8f30-bcf89327dac3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:06:03.698001+00:00", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3ml22hqye7k24", "content": "Urgent: 'Copy Fail' vulnerability (CVE-2026-31431) in Linux kernels since 2017 allows root access to unprivileged users. Patch immediately to secure your systems. #Linux #CyberSecurity #CVE202631431 Link: thedailytechfeed.com/critical-lin...", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "3f28076e-51e1-4f78-a4ee-6ad773eccf50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:00:56.140940+00:00", "type": "seen", "source": "https://bsky.app/profile/calimegai.bsky.social/post/3ml226lewgw2l", "content": "CISA ajoute la faille Linux CVE-2026-31431, exploit\u00e9e en local pour escalade de privil\u00e8ges, \u00e0 son catalogue KEV. Plusieurs distrib Linux sont concern\u00e9es. Restez vigilants ! \ud83d\udd12\ud83d\udc27 #CyberSecurity #calimeg ", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "cb49147f-b038-43da-859b-c1a90cb6ecdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T16:00:05+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82790", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-31431\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a AdityaBhatt3010\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-04 15:55:31\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nLinux Privilege Escalation | AF_ALG Crypto Abuse \u2192 Exploiting AEAD socket handling (CVE-2026-31431) to gain root via kernel-level manipulation\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "b7c3150d-3452-4272-84da-80ae16fe70b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:50:41.392143+00:00", "type": "seen", "source": "https://bsky.app/profile/netsecio.bsky.social/post/3mkzzmbnxb62q", "content": "\ud83d\udea8 CRITICAL ZERO-DAY \ud83d\udea8 cPanel &amp; WHM auth bypass (CVE-2026-41940, CVSS 9.8) exploited for months before patch! Unauthenticated attackers can get root access. 1.5M instances exposed. Patch NOW! #cPanel #ZeroDay #CVE #WebHosting", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "a97f5e97-7e1e-4fd1-a2d7-8a1ed0855fa8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:49:54.038331+00:00", "type": "seen", "source": "https://mastodon.social/ap/users/115426718704364579/statuses/116517096123431548", "content": "\ud83d\udcf0 cPanel Zero-Day Auth Bypass (CVE-2026-41940) Actively Exploited for Months Before Patch\n\ud83d\udea8 CRITICAL ZERO-DAY \ud83d\udea8 cPanel &amp; WHM auth bypass (CVE-2026-41940, CVSS 9.8) exploited for months before patch! Unauthenticated attackers can get root access. 1.5M instances exposed. Patch NOW! #cPanel #ZeroDay #CVE #WebHosting\n\ud83d\udd17 https://cyber.netsecops.io", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "1f66d444-509b-4289-b1dc-8b82df6a9111", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:45:22.616772+00:00", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3mkzzcresg222", "content": "Attackers are exploiting CVE-2026-31431, aka Copy Fail, a long-standing Linux kernel flaw allowing privilege escalation to root via in-memory cache modification of setuid-root binaries. #LinuxFlaw #KernelBug #USA", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "735353df-6aa3-469f-ba50-d172ebffb836", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:42:46.808095+00:00", "type": "seen", "source": "https://social.numerique.gouv.fr/users/cert_fr/statuses/116517067825437115", "content": "Dans son dernier bulletin d'actualit\u00e9, le CERT-FR revient sur certaines vuln\u00e9rabilit\u00e9s significatives de la semaine derni\u00e8re. https://www.cert.ssi.gouv.fr/actualite/CERTFR-2026-ACT-020/", "vulnerability": "CERTFR-2026-ACT-020", "author": {"login": "automation"}}, {"uuid": "c105d434-b455-4b3f-8445-52f1b75576db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:42:42.935858+00:00", "type": "seen", "source": "https://bsky.app/profile/cert-fr.bsky.social/post/3mkzz5za2nx23", "content": "Dans son dernier bulletin d'actualit\u00e9, le CERT-FR revient sur certaines vuln\u00e9rabilit\u00e9s significatives de la semaine derni\u00e8re. \nhttps://www.cert.ssi.gouv.fr/actualite/CERTFR-2026-ACT-020/", "vulnerability": "CERTFR-2026-ACT-020", "author": {"login": "automation"}}, {"uuid": "c1068ff8-80c5-46fc-8bcf-57373f1f90f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:41:45.517970+00:00", "type": "seen", "source": "https://bsky.app/profile/infosecfr.skyfleet.blue/post/3mkzz4cqpnu2p", "content": "Bulletin d'actualit\u00e9 CERTFR-2026-ACT-020 (04 mai 2026)", "vulnerability": "CERTFR-2026-ACT-020", "author": {"login": "automation"}}, {"uuid": "316d400b-fa18-44f3-a83b-4798fc575dbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:37:07.756986+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mkzytzy6qb2p", "content": "\ud83d\udccc CVE-2026-40066 - Anviz\u00a0CX2 Lite and CX7\u00a0are vulnerable to unverified update packages that can be uploaded. The \ndevice unpacks and executes a script resulting in unaut... https://www.cyberhub.blog/cves/CVE-2026-40066", "vulnerability": "CVE-2026-40066", "author": {"login": "automation"}}, {"uuid": "e83ff810-56c1-4779-b521-834b29490e14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:31:12.153463+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkzyjg7ozk2z", "content": "\ud83d\udfe0 CVE-2026-34059 - High (7.5)\n\nBuffer Over-read vulnerability in Apache HTTP Server.\n\nThis issue affects Apache HTTP Server: thr...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-34059/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-34059", "author": {"login": "automation"}}, {"uuid": "acc201e9-3a3c-41e6-a1b0-4c8ff2365e3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:30:21.819420+00:00", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mkzyhwb6zh27", "content": "\ud83d\udd17 CVE : CVE-2026-31431, CVE-2026-341431", "vulnerability": "CVE-2026-341431", "author": {"login": "automation"}}, {"uuid": "a2ab5bc1-07b9-45ed-bc61-de8ea19e2add", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:30:21.683811+00:00", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mkzyhwb6zh27", "content": "\ud83d\udd17 CVE : CVE-2026-31431, CVE-2026-341431", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "6c614102-c3c9-4853-bd03-e51836a242ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:30:14.888541+00:00", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mkzyhprqbp2u", "content": "\ud83d\udd17 CVE : CVE-2026-31431", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "2236409c-7c29-4620-bda3-8f7ab7850346", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:30:08.366279+00:00", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mkzyhj5sg62e", "content": "\ud83d\udd17 CVE : CVE-2026-7320, CVE-2026-7321, CVE-2026-7322, CVE-2026-7323, CVE-2026-7324", "vulnerability": "CVE-2026-7324", "author": {"login": "automation"}}, {"uuid": "9fc2472b-2c32-437f-90dc-5330ba2b9947", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:30:08.227711+00:00", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mkzyhj5sg62e", "content": "\ud83d\udd17 CVE : CVE-2026-7320, CVE-2026-7321, CVE-2026-7322, CVE-2026-7323, CVE-2026-7324", "vulnerability": "CVE-2026-7323", "author": {"login": "automation"}}, {"uuid": "9810e46b-242b-45d7-9658-0148b1d7211d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:30:08.072640+00:00", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mkzyhj5sg62e", "content": "\ud83d\udd17 CVE : CVE-2026-7320, CVE-2026-7321, CVE-2026-7322, CVE-2026-7323, CVE-2026-7324", "vulnerability": "CVE-2026-7322", "author": {"login": "automation"}}, {"uuid": "6f2041d0-aae8-4ec1-a0cb-e6db53355ea3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:30:07.920276+00:00", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mkzyhj5sg62e", "content": "\ud83d\udd17 CVE : CVE-2026-7320, CVE-2026-7321, CVE-2026-7322, CVE-2026-7323, CVE-2026-7324", "vulnerability": "CVE-2026-7321", "author": {"login": "automation"}}, {"uuid": "96722e59-0e96-4b25-a159-56ea9b1ea3db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:30:07.767714+00:00", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3mkzyhj5sg62e", "content": "\ud83d\udd17 CVE : CVE-2026-7320, CVE-2026-7321, CVE-2026-7322, CVE-2026-7323, CVE-2026-7324", "vulnerability": "CVE-2026-7320", "author": {"login": "automation"}}, {"uuid": "6e5d0977-6a7b-4022-b269-a027023ae555", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:21:52.678481+00:00", "type": "seen", "source": "https://bsky.app/profile/glitterbean.wehavecookies.social.ap.brid.gy/post/3mkzxscfe5bu2", "content": "Copirate 365 at DEF CON: Plundering in the Depths of Microsoft Copilot (CVE-2026-24299) https://embracethered.com/blog/posts/2026/defcon-talk-copirate-365/", "vulnerability": "CVE-2026-24299", "author": {"login": "automation"}}, {"uuid": "8d2fa667-d6f7-44a4-9727-752e6d7270c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:15:24.635430+00:00", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3mkzxn6pjmw2d", "content": "Progress Software alerts on critical MOVEit Automation auth bypass (CVE-2026-4670) affecting versions before 2025.1.5, enabling remote unauthenticated attacks. Over 1,400 instances found, including US gov systems. #MOVEitFlaw #AuthBypass #USA", "vulnerability": "CVE-2026-4670", "author": {"login": "automation"}}, {"uuid": "11eb30d6-5500-4e42-9f37-1ce87ca6153b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:12:00.277313+00:00", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mkzxgvb2lu2t", "content": "4/ \u26a0\ufe0f cPanel CVE-2026-41940 (CVSS 9.8). Auth bypass exploited since Feb. 1.5M servers exposed. \"Sorry\" ransomware now mass-exploiting it. Patch TODAY.", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "e91a6e25-0f26-4d2d-a75e-d62d1390ec58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:11:59.440240+00:00", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mkzxgvb2lt2t", "content": "4/ \u26a0\ufe0f cPanel CVE-2026-41940 (CVSS 9.8). Auth bypass exploited since Feb. 1.5M servers exposed. \"Sorry\" ransomware now mass-exploiting it. Patch TODAY.", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "6fd20a9f-cecc-4089-8e66-c8db7394735c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:11:58.781983+00:00", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mkzxgvb2ls2t", "content": "4/ \u26a0\ufe0f cPanel CVE-2026-41940 (CVSS 9.8). Auth bypass exploited since Feb. 1.5M servers exposed. \"Sorry\" ransomware now mass-exploiting it. Patch TODAY.", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "9434dfdc-2366-447e-8783-b29ef1419180", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:11:58.238823+00:00", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mkzxgvazmk2t", "content": "4/ \u26a0\ufe0f cPanel CVE-2026-41940 (CVSS 9.8). Auth bypass exploited since Feb. 1.5M servers exposed. \"Sorry\" ransomware now mass-exploiting it. Patch TODAY.", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "9e3938d3-db9c-47f4-9686-d8ed3a208c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:11:57.691308+00:00", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mkzxgvaync2t", "content": "4/ \u26a0\ufe0f cPanel CVE-2026-41940 (CVSS 9.8). Auth bypass exploited since Feb. 1.5M servers exposed. \"Sorry\" ransomware now mass-exploiting it. Patch TODAY.", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "3ff87173-3165-4cbf-accd-8289d2bf3831", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:11:57.148167+00:00", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mkzxgvaxo22t", "content": "4/ \u26a0\ufe0f cPanel CVE-2026-41940 (CVSS 9.8). Auth bypass exploited since Feb. 1.5M servers exposed. \"Sorry\" ransomware now mass-exploiting it. Patch TODAY.", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "6d6cc8df-09f8-4ed8-be9a-65093329f986", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:11:56.589362+00:00", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mkzxgvawos2t", "content": "4/ \u26a0\ufe0f cPanel CVE-2026-41940 (CVSS 9.8). Auth bypass exploited since Feb. 1.5M servers exposed. \"Sorry\" ransomware now mass-exploiting it. Patch TODAY.", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "e15b1ded-f83b-4400-a971-08cab9c62d79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:11:54.092081+00:00", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mkzxgvavpk2t", "content": "4/ \u26a0\ufe0f cPanel CVE-2026-41940 (CVSS 9.8). Auth bypass exploited since Feb. 1.5M servers exposed. \"Sorry\" ransomware now mass-exploiting it. Patch TODAY.", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "74aada8f-14af-4b0e-ad5e-69295f2dbd1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:11:53.368686+00:00", "type": "seen", "source": "https://bsky.app/profile/sergioiker.bsky.social/post/3mkzxgvanvk2t", "content": "4/ \u26a0\ufe0f cPanel CVE-2026-41940 (CVSS 9.8). Auth bypass exploited since Feb. 1.5M servers exposed. \"Sorry\" ransomware now mass-exploiting it. Patch TODAY.", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "809b05cc-6339-45e6-aa89-b25566bea94f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:10:04+00:00", "type": "seen", "source": "https://gist.github.com/ef-edulog/a3bc51ea1b488ff23e2733a1975eee72", "content": "", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "c7354d9e-c7e1-4160-b3ff-bef0b27707c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:07:09.164582+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mkzx6g6ed72u", "content": "\ud83d\udccc CVE-2026-35546 - Anviz\u00a0CX2 Lite and CX7\u00a0are vulnerable to unauthenticated firmware uploads. This causes crafted \narchives to be accepted, enabling attackers to plant a... https://www.cyberhub.blog/cves/CVE-2026-35546", "vulnerability": "CVE-2026-35546", "author": {"login": "automation"}}, {"uuid": "ae5fc6d2-0fe6-417b-b74e-2aa95ddd5327", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:00:21.599495+00:00", "type": "seen", "source": "https://bsky.app/profile/helpnetsecurity.com/post/3mkzwrwomoc2j", "content": "Critical MOVEit Automation auth bypass vulnerability fixed (CVE-2026-4670)\n\n\ud83d\udcd6 Read more:\nwww.helpnetsecurity.com/2026/05/04/c...\n\n#CyberSecurity #CyberSecurityNews #CVE", "vulnerability": "CVE-2026-4670", "author": {"login": "automation"}}, {"uuid": "b497061e-7542-41f7-8ce9-f5aa1f73102c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:00:20.683116+00:00", "type": "seen", "source": "https://bsky.app/profile/devops-daily.com/post/3mkzwsalme32h", "content": "\ud83d\udcdd CVE-2026-3854: A Single git push Owned GitHub\n\nA semicolon in a git push option let any authenticated user run code on GitHub.com's backend and on 88% of self-hosted GitHub Enterprise installs....\n\nRead here: https://devops-daily.com/posts/github-cve-2026-3854-git-push-rce", "vulnerability": "cve-2026-3854", "author": {"login": "automation"}}, {"uuid": "b48e3ac7-916f-4a7f-a866-e4c5ff3b05d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:00:07+00:00", "type": "seen", "source": "Telegram/0_HRy55XY1gHFnZjznakOF7ZoOcpEYzc0dvtDC6c94sHEnY", "content": "", "vulnerability": "CVE-2026-41409", "author": {"login": "automation"}}, {"uuid": "5ed99849-30cc-4765-a2cd-1c25593d4862", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:00:07+00:00", "type": "seen", "source": "Telegram/0_HRy55XY1gHFnZjznakOF7ZoOcpEYzc0dvtDC6c94sHEnY", "content": "", "vulnerability": "CVE-2026-6379", "author": {"login": "automation"}}, {"uuid": "e7a4ebca-da64-4acc-b3ef-7392c3b15838", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:00:07+00:00", "type": "seen", "source": "Telegram/0_HRy55XY1gHFnZjznakOF7ZoOcpEYzc0dvtDC6c94sHEnY", "content": "", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "2aa22480-b105-43ed-924e-87cb1a67c9e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:00:07+00:00", "type": "seen", "source": "Telegram/0_HRy55XY1gHFnZjznakOF7ZoOcpEYzc0dvtDC6c94sHEnY", "content": "", "vulnerability": "CVE-2026-42778", "author": {"login": "automation"}}, {"uuid": "80ca80d5-44c2-4923-ae06-ebfddbcc331a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:00:07+00:00", "type": "seen", "source": "Telegram/0_HRy55XY1gHFnZjznakOF7ZoOcpEYzc0dvtDC6c94sHEnY", "content": "", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "40544884-9af6-476d-8cc9-5182b40bf9a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:00:07+00:00", "type": "seen", "source": "Telegram/0_HRy55XY1gHFnZjznakOF7ZoOcpEYzc0dvtDC6c94sHEnY", "content": "", "vulnerability": "CVE-2026-34159", "author": {"login": "automation"}}, {"uuid": "3460a74b-89ee-4abc-a92c-4786d77a5cdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T15:00:07+00:00", "type": "seen", "source": "Telegram/0_HRy55XY1gHFnZjznakOF7ZoOcpEYzc0dvtDC6c94sHEnY", "content": "", "vulnerability": "CVE-2024-52046", "author": {"login": "automation"}}, {"uuid": "7d6d1de9-cd7a-415e-a0ed-7bf5f8c0171e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:56:07.039873+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzwkpa3ak2k", "content": "CVE-2026-7482 - Ollama heap out-of-bounds read in GGUF tensor parsing leaks server process memory to unauthenticated remote attackers\nCVE ID : CVE-2026-7482\n \n Published : May 4, 2026, 1:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : Ollama before 0.17.1 contains a heap out-...", "vulnerability": "CVE-2026-7482", "author": {"login": "automation"}}, {"uuid": "1d98ffb8-5ff3-4351-9ae3-f20361dcbb38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:52:35.570567+00:00", "type": "seen", "source": "https://bsky.app/profile/rockylinux.org/post/3mkzweewt5p27", "content": "Kernel crypto vulnerability alert: CVE-2026-31431 (Copy Fail) affects Rocky Linux users. Our community is tracking patches and next steps in real time.\nRocky-specific guidance: forums.rockylinux.org/t/cve-2026-3... \n#RockyLinux #LinuxSecurity", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "10a25e04-b595-4078-982b-0ab089afcabc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:51:06.701291+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzwbqp6w52h", "content": "CVE-2026-34059 - Apache HTTP Server: mod_proxy_ajp: Heap Over-Read and memory disclosure in ajp_parse_data()\nCVE ID : CVE-2026-34059\n \n Published : May 4, 2026, 1:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : Buffer Over-read vulnerability in Apache HTTP Server.\n\nThis issue...", "vulnerability": "CVE-2026-34059", "author": {"login": "automation"}}, {"uuid": "4081c631-96d5-4dac-8c9d-a2b2c7a9e328", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:46:06.377150+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzvysb3ne2i", "content": "CVE-2026-24072 - Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr\nCVE ID : CVE-2026-24072\n \n Published : May 4, 2026, 1:16 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : An escalation of privilege bug in various modules in Apache HTTP 2.4.66 and earlier allow...", "vulnerability": "CVE-2026-24072", "author": {"login": "automation"}}, {"uuid": "964578c1-9a20-4b89-9b02-4bf6323326c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:45:01+00:00", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2026/CVE-2026-40466.yaml", "content": "", "vulnerability": "CVE-2026-40466", "author": {"login": "automation"}}, {"uuid": "2b683def-d676-4a85-a228-e54a8c329b09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:44:18.065313+00:00", "type": "seen", "source": "https://bsky.app/profile/crowdsec.bsky.social/post/3mkzw5yfwtc2a", "content": "\ud83d\udea8 In this week\u2019s newsletter, we cover CVE-2026-41940, a cPanel &amp; WHM authentication bypass that puts entire hosting environments at risk. We break down how it enables admin access and what defenders should do next.\n\nRead the full analysis and protect your systems \ud83d\udc49 www.crowdsec.net/vulntracking...", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "453c4dce-b93f-4d7e-a376-918124ce52f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:41:05.801657+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzvptsfrz2i", "content": "CVE-2026-33857 - Apache HTTP Server: Off-by-one OOB reads in AJP getter functions\nCVE ID : CVE-2026-33857\n \n Published : May 4, 2026, 1:07 p.m. | 1\u00a0hour, 13\u00a0minutes ago\n \n Description : Out-of-bounds Read vulnerability in mod_proxy_ajp of \n\nApache HTTP Server.\n\nThis issue affe...", "vulnerability": "CVE-2026-33857", "author": {"login": "automation"}}, {"uuid": "45c10fd5-c252-40c5-955c-301df1f6eb27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:38:33.437691+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkzvlc5esy2t", "content": "\ud83d\udfe0 CVE-2026-6266 - High (8.3)\n\nA flaw was found in the AAP gateway. The user auto-link strategy, introduced in AAP 2.6, automati...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-6266/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-6266", "author": {"login": "automation"}}, {"uuid": "73f404cb-87bd-41ab-9e6a-1bdf7e8469ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:37:31.880648+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkzvjhh6an2s", "content": "\ud83d\udfe0 CVE-2025-58074 - High (8.8)\n\nA privilege escalation vulnerability exists during the installation of Norton Secure VPN via the ...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2025-58074/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2025-58074", "author": {"login": "automation"}}, {"uuid": "fad4998e-6030-4ac5-b633-25b5b763386f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:37:24.047045+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkzvj7p6p52s", "content": "\ud83d\udfe0 CVE-2026-6266 - High (8.3)\n\nA flaw was found in the AAP gateway. The user auto-link strategy, introduced in AAP 2.6, automati...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-6266/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-6266", "author": {"login": "automation"}}, {"uuid": "969493b7-c4f8-4c77-b962-6e3bcf39626b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:37:09.589600+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkzvirjkz22f", "content": "\ud83d\udfe0 CVE-2026-6266 - High (8.3)\n\nA flaw was found in the AAP gateway. The user auto-link strategy, introduced in AAP 2.6, automati...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-6266/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-6266", "author": {"login": "automation"}}, {"uuid": "8a91acfb-6d35-4523-bb92-738f41cc3ff2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:36:05.532809+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzvgvdzgm2i", "content": "CVE-2026-34032 - Apache HTTP Server: mod_proxy_ajp: Heap Buffer Over-Read Due to Missing Null-Termination Check (ajp_msg_get_string)\nCVE ID : CVE-2026-34032\n \n Published : May 4, 2026, 12:54 p.m. | 1\u00a0hour, 25\u00a0minutes ago\n \n Description : Improper Null Termination, Out-of-bound...", "vulnerability": "CVE-2026-34032", "author": {"login": "automation"}}, {"uuid": "6425bb4f-cfb0-4f09-bffa-91ac0f52090f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:34:05+00:00", "type": "seen", "source": "https://t.me/bdufstecru/3129", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 decompress_files() \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b \u0434\u043b\u044f \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433\u0430 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0443\u0433\u0440\u043e\u0437 Wazuh \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0432\u0435\u0440\u043d\u044b\u043c \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435\u043c \u0438\u043c\u0435\u043d\u0438 \u043f\u0443\u0442\u0438 \u043a \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0443 \u0441 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434\n\nBDU:2026-06165\nCVE-2026-30893\n\n\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0438\u0437 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432. \u0412 \u0441\u0432\u044f\u0437\u0438 \u0441\u043e \u0441\u043b\u043e\u0436\u0438\u0432\u0448\u0435\u0439\u0441\u044f \u043e\u0431\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u043e\u0439 \u0438 \u0432\u0432\u0435\u0434\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u0430\u043d\u043a\u0446\u0438\u044f\u043c\u0438 \u043f\u0440\u043e\u0442\u0438\u0432 \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0424\u0435\u0434\u0435\u0440\u0430\u0446\u0438\u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u0441\u043b\u0435 \u043e\u0446\u0435\u043d\u043a\u0438 \u0432\u0441\u0435\u0445 \u0441\u043e\u043f\u0443\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u0440\u0438\u0441\u043a\u043e\u0432.\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c\u0443 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044e;\n- \u0441\u0435\u0433\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0435\u0442\u0438 \u0434\u043b\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c\u0443 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044e;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 SIEM-\u0441\u0438\u0441\u0442\u0435\u043c \u0434\u043b\u044f \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u043d\u0438\u044f \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438;\n- \u043c\u0438\u043d\u0438\u043c\u0438\u0437\u0430\u0446\u0438\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0445 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439;\n- \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435/\u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435 \u043d\u0435\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0443\u0447\u0451\u0442\u043d\u044b\u0445 \u0437\u0430\u043f\u0438\u0441\u0435\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439;\n- \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0438\u0437 \u0432\u043d\u0435\u0448\u043d\u0438\u0445 \u0441\u0435\u0442\u0435\u0439 (\u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442).\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://github.com/wazuh/wazuh/security/advisories/GHSA-m8rw-v4f6-8787", "vulnerability": "CVE-2026-30893", "author": {"login": "automation"}}, {"uuid": "f09c2699-2719-4dd8-9611-869c5b1353ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:34:05+00:00", "type": "seen", "source": "https://t.me/bdufstecru/3129", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 decompress_files() \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b \u0434\u043b\u044f \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433\u0430 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0443\u0433\u0440\u043e\u0437 Wazuh \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0432\u0435\u0440\u043d\u044b\u043c \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435\u043c \u0438\u043c\u0435\u043d\u0438 \u043f\u0443\u0442\u0438 \u043a \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0443 \u0441 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434\n\nBDU:2026-06165\nCVE-2026-30893\n\n\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0438\u0437 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432. \u0412 \u0441\u0432\u044f\u0437\u0438 \u0441\u043e \u0441\u043b\u043e\u0436\u0438\u0432\u0448\u0435\u0439\u0441\u044f \u043e\u0431\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u043e\u0439 \u0438 \u0432\u0432\u0435\u0434\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u0430\u043d\u043a\u0446\u0438\u044f\u043c\u0438 \u043f\u0440\u043e\u0442\u0438\u0432 \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0424\u0435\u0434\u0435\u0440\u0430\u0446\u0438\u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u0441\u043b\u0435 \u043e\u0446\u0435\u043d\u043a\u0438 \u0432\u0441\u0435\u0445 \u0441\u043e\u043f\u0443\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u0440\u0438\u0441\u043a\u043e\u0432.\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c\u0443 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044e;\n- \u0441\u0435\u0433\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0435\u0442\u0438 \u0434\u043b\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c\u0443 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044e;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 SIEM-\u0441\u0438\u0441\u0442\u0435\u043c \u0434\u043b\u044f \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u043d\u0438\u044f \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438;\n- \u043c\u0438\u043d\u0438\u043c\u0438\u0437\u0430\u0446\u0438\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0445 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439;\n- \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435/\u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435 \u043d\u0435\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0443\u0447\u0451\u0442\u043d\u044b\u0445 \u0437\u0430\u043f\u0438\u0441\u0435\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439;\n- \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0438\u0437 \u0432\u043d\u0435\u0448\u043d\u0438\u0445 \u0441\u0435\u0442\u0435\u0439 (\u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442).\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://github.com/wazuh/wazuh/security/advisories/GHSA-m8rw-v4f6-8787", "vulnerability": "GHSA-M8RW-V4F6-8787", "author": {"login": "automation"}}, {"uuid": "c6567b4d-9a39-4616-b4d3-cbca6d5d40c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:31:21.755783+00:00", "type": "seen", "source": "https://bsky.app/profile/zettawire.com/post/3mkzv6gvtfx2s", "content": "CISA adds critical WebPros cPanel and WHM authentication vulnerability CVE-2026-41940 to its Known Exploited Vulnerabilities Catalog. The agency urges users to review the updated list for security guidance. #Cybersecurity #CISA", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "4be6965c-3580-45b5-b329-c6a3bce57a87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:31:06.182813+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzv5tvt2a2v", "content": "CVE-2026-3120 - RCE in Profelis Informatics' SambaBox\nCVE ID : CVE-2026-3120\n \n Published : May 4, 2026, 12:16 p.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : Improper Control of Generation of Code ('Code Injection') vulnerability in Profelis Information and Consulting Trade an...", "vulnerability": "CVE-2026-3120", "author": {"login": "automation"}}, {"uuid": "64f2fc79-e0a3-4f1e-9371-bcee021c2156", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:26:44.458742+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzuw6b6ps2r", "content": "CVE-2025-58074 - Norton Secure VPN Microsoft Store Privilege Escalation Vulnerability\nCVE ID : CVE-2025-58074\n \n Published : May 4, 2026, 1:11 p.m. | 1\u00a0hour, 9\u00a0minutes ago\n \n Description : A privilege escalation vulnerability exists during the installation of Norton Secure VPN...", "vulnerability": "CVE-2025-58074", "author": {"login": "automation"}}, {"uuid": "86f4a572-2465-4723-be02-d51bde5bda81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:25:06.232917+00:00", "type": "seen", "source": "https://bsky.app/profile/xint-io.bsky.social/post/3mkzut725gk2s", "content": "After AIxCC wrapped in 2025, @DARPA worked with Xint and the other top performers to ensure the innovation continued even after the contest was done to secure the internet's open source infrastructure. Here is story of CVE-2026-31789\nxint.io/blog/170315", "vulnerability": "CVE-2026-31789", "author": {"login": "automation"}}, {"uuid": "47694d3a-063f-4142-bdff-58a40b876492", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:21:39.931131+00:00", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3mkzumywkak2d", "content": " **Linux Security Alert! **\nThe 'Copy Fail' (CVE-2026-31431) flaw lets ANY local user gain root access on SUSE &amp; other distros.  Read more-&gt;  tinyurl.com/mr5e2y7d  #SUSE #Security", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "f9d19389-eced-4d43-93de-51a5b33c72ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:19:13.297015+00:00", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3mkzuipjhgo2f", "content": "~Cybergcca~\nCCCS released 5 advisories covering critical updates for IBM, Dell, FreeBSD, Ubuntu, and CISA ICS products.\n-\nIOCs: CVE-2026-42511, CVE-2026-7270, CVE-2026-7164\n-\n#PatchManagement #ThreatIntel #Vulnerability", "vulnerability": "CVE-2026-7164", "author": {"login": "automation"}}, {"uuid": "768a44b2-96cb-4ee2-b992-d105eb987bd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:19:13.140724+00:00", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3mkzuipjhgo2f", "content": "~Cybergcca~\nCCCS released 5 advisories covering critical updates for IBM, Dell, FreeBSD, Ubuntu, and CISA ICS products.\n-\nIOCs: CVE-2026-42511, CVE-2026-7270, CVE-2026-7164\n-\n#PatchManagement #ThreatIntel #Vulnerability", "vulnerability": "CVE-2026-7270", "author": {"login": "automation"}}, {"uuid": "be018691-7c1b-4d3c-a10d-a167ec786f26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:19:12.994542+00:00", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3mkzuipjhgo2f", "content": "~Cybergcca~\nCCCS released 5 advisories covering critical updates for IBM, Dell, FreeBSD, Ubuntu, and CISA ICS products.\n-\nIOCs: CVE-2026-42511, CVE-2026-7270, CVE-2026-7164\n-\n#PatchManagement #ThreatIntel #Vulnerability", "vulnerability": "CVE-2026-42511", "author": {"login": "automation"}}, {"uuid": "64247d62-aaeb-43e8-8616-7f87b3f8d3f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:15:35.303692+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkzuc7suqr2k", "content": "\ud83d\udd34 CVE-2026-7482 - Critical (9.1)\n\nOllama before 0.17.1 contains a heap out-of-bounds read vulnerability in the GGUF model loader. T...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-7482/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-7482", "author": {"login": "automation"}}, {"uuid": "d0dffd87-e873-4c95-89fe-2bc8fa91a0b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:12:44.586766+00:00", "type": "seen", "source": "https://infosec.exchange/users/threatcodex/statuses/116516714189898137", "content": "South-East Asian Military Entities Targeted via cPanel (CVE-2026-41940)#CVE_2026_41940 https://ctrlaltintel.com/research/SEA-CPanel/", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "f74ab241-0bb2-4278-9641-440fe9d4d7de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:07:07.119260+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mkztt3kj2m2h", "content": "\ud83d\udccc CVE-2026-7426 - Insufficient validation of the prefix length field in IPv6 Router Advertisement processing in FreeRTOS-Plus-TCP before V4.2.6 and V4.4.1 allows an adj... https://www.cyberhub.blog/cves/CVE-2026-7426", "vulnerability": "CVE-2026-7426", "author": {"login": "automation"}}, {"uuid": "20b345c5-e372-44a6-89f1-5ba45e103312", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:01:09.050524+00:00", "type": "seen", "source": "https://bsky.app/profile/exploitdb-bot.bsky.social/post/3mkztig5u5l2b", "content": "\ud83d\udea8 New Exploit: Linux Kernel proc_readdir_de() 6.18-rc5 - Local Privilege Escalation\n\ud83d\udccb CVE: CVE-2025-40271\n\ud83d\udc64 Author: aviralyash27\n\n\ud83d\udd17 https://www.exploit-db.com/exploits/52550\n\n#ExploitDB #InfoSec #CyberSecurity #CVE-2025-40271", "vulnerability": "CVE-2025-40271", "author": {"login": "automation"}}, {"uuid": "cb38e94e-95ee-43a7-bf6a-185f5de962b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:01:06.404674+00:00", "type": "seen", "source": "https://bsky.app/profile/exploitdb-bot.bsky.social/post/3mkztidbdqc2z", "content": "\ud83d\udea8 New Exploit: Linux nf_tables 6.19.3 - Local Privilege Escalation\n\ud83d\udccb CVE: CVE-2026-23231\n\ud83d\udc64 Author: aviralyash27\n\n\ud83d\udd17 https://www.exploit-db.com/exploits/52549\n\n#ExploitDB #InfoSec #CyberSecurity #CVE-2026-23231", "vulnerability": "CVE-2026-23231", "author": {"login": "automation"}}, {"uuid": "39146c0b-e507-4524-a895-d10226d245d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:00:53+00:00", "type": "seen", "source": "https://t.me/true_secator/8166", "content": "\u041f\u043e\u0434\u043a\u0430\u0442\u0438\u043b\u0438 \u043d\u043e\u0432\u044b\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0441 \u0430\u0442\u0430\u043a\u0430\u043c\u0438, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u043c\u0438 \u043d\u0430 \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0443\u044e 0-day \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432 cPanel &amp; WebHost Manager (WHM), CVE-2026-41940, \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u044e\u0449\u0443\u044e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f.\n\n\u041f\u043e \u0432\u0441\u0435\u0439 \u0432\u0438\u0434\u0438\u043c\u043e\u0441\u0442\u0438, \u0431\u043e\u043b\u0435\u0435 40 000 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u0431\u044b\u043b\u0438 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u044b \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u043e\u0439 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438, \u043a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442 Shadowserver Foundation.\n\n\u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0430\u044f 28 \u0430\u043f\u0440\u0435\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a cPanel, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0437\u0430\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0445\u043e\u0441\u0442-\u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439 \u0438 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0432\u0441\u0435 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438, \u0431\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u0441\u0430\u0439\u0442\u044b, \u043a\u043e\u0442\u043e\u0440\u044b\u043c\u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0441\u0438\u043c\u0432\u043e\u043b\u043e\u0432 \u0432 \u0437\u0430\u0433\u043e\u043b\u043e\u0432\u043a\u0430\u0445 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438 \u0434\u043b\u044f \u0437\u0430\u043f\u0438\u0441\u0438 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u043e\u0432 \u0432 \u0444\u0430\u0439\u043b \u0441\u0435\u0441\u0441\u0438\u0438, \u0430 \u0437\u0430\u0442\u0435\u043c \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u043f\u0435\u0440\u0435\u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0444\u0430\u0439\u043b\u0430 \u0441\u0435\u0441\u0441\u0438\u0438 \u0441 \u0446\u0435\u043b\u044c\u044e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u043d\u044b\u0445 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u041f\u0440\u0438\u0447\u0435\u043c CVE-2026-41940, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 0-day \u0435\u0449\u0435\u00a0\u0441 \u043a\u043e\u043d\u0446\u0430 \u0444\u0435\u0432\u0440\u0430\u043b\u044f, \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u0440\u0435\u0437\u043a\u043e \u0432\u043e\u0437\u0440\u043e\u0441\u043b\u0430 \u043f\u043e\u0441\u043b\u0435 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f WatchTowr \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0430 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438.\n\n\u041d\u0430 \u043f\u0440\u043e\u0448\u043b\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0435 Rapid7 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u0430, \u0447\u0442\u043e \u0432 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e \u043e\u043a\u043e\u043b\u043e 1,5 \u043c\u043b\u043d. \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u043e\u0432 cPanel, \u0430 \u0432 \u043f\u044f\u0442\u043d\u0438\u0446\u0443 Shadowserver Foundation \u0432\u044b\u044f\u0432\u0438\u043b\u0430\u00a0 \u0434\u0435\u0441\u044f\u0442\u043a\u0438 \u0442\u044b\u0441\u044f\u0447 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c.\n\n\u0412 \u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438, \u0432 \u0445\u043e\u0434\u0435 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u044e\u0449\u0438\u0445\u0441\u044f \u0430\u0442\u0430\u043a \u0431\u044b\u043b\u0438 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u044b \u043a\u0430\u043a \u043c\u0438\u043d\u0438\u043c\u0443\u043c 44 000 IP, \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 cPanel.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c\u00a0Shadowserver Foundation, \u043f\u043e \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044e \u043d\u0430 3 \u043c\u0430\u044f \u044d\u0442\u043e \u0447\u0438\u0441\u043b\u043e \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0441\u043e\u043a\u0440\u0430\u0442\u0438\u043b\u043e\u0441\u044c. \u0411\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043d\u0430\u0445\u043e\u0434\u044f\u0442\u0441\u044f \u0432 \u0421\u0428\u0410, \u0430 \u0424\u0440\u0430\u043d\u0446\u0438\u044f \u0438 \u041d\u0438\u0434\u0435\u0440\u043b\u0430\u043d\u0434\u044b \u0437\u0430\u043c\u044b\u043a\u0430\u044e\u0442 \u0442\u0440\u043e\u0439\u043a\u0443 \u043b\u0438\u0434\u0435\u0440\u043e\u0432.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u0445\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c cPanel \u0441 \u0447\u0435\u0442\u0432\u0435\u0440\u0433\u0430 \u0434\u043b\u044f \u0432\u0437\u043b\u043e\u043c\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u0438 \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u043e\u0441\u043d\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u043d\u0430 Go Linux \u0448\u0438\u0444\u0440\u0430\u0442\u043e\u0440\u0430 \u0434\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b-\u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044f Sorry (VirusTotal).\n\n\u0417\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u043e \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 \u043e\u0442 \u043f\u043e\u0441\u0442\u0440\u0430\u0434\u0430\u0432\u0448\u0438\u0445, \u0433\u0434\u0435 \u043e\u0434\u043d\u0430 \u0438\u0437 \u0436\u0435\u0440\u0442\u0432 \u043f\u043e\u0434\u0435\u043b\u0438\u043b\u0430\u0441\u044c \u043e\u0431\u0440\u0430\u0437\u0446\u0430\u043c\u0438 \u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u0438 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u044b\u043c \u0437\u0430\u043f\u0438\u0441\u043a\u0438 \u0441 \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0432\u044b\u043a\u0443\u043f\u0430.\n\n\u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430-\u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u043f\u043e\u0442\u043e\u043a\u043e\u0432\u044b\u0439 \u0448\u0438\u0444\u0440 ChaCha20 \u0434\u043b\u044f \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0444\u0430\u0439\u043b\u043e\u0432, \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u043a\u043b\u044e\u0447 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0437\u0430\u0449\u0438\u0449\u0435\u043d \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u043e\u0433\u043e \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u0433\u043e \u043a\u043b\u044e\u0447\u0430 RSA-2048.\n\n\u0412 \u043a\u0430\u0436\u0434\u043e\u0439 \u043f\u0430\u043f\u043a\u0435 \u0441\u043e\u0437\u0434\u0430\u0435\u0442\u0441\u044f \u0437\u0430\u043f\u0438\u0441\u043a\u0430 \u0441 \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0432\u044b\u043a\u0443\u043f\u0430 \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c README.md, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0436\u0435\u0440\u0442\u0432\u0435 \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u0435\u0442\u0441\u044f \u0441\u0432\u044f\u0437\u0430\u0442\u044c\u0441\u044f \u0441 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u043c \u0432 Tox \u0434\u043b\u044f \u043e\u0431\u0441\u0443\u0436\u0434\u0435\u043d\u0438\u044f \u0441\u0443\u043c\u043c\u044b \u0432\u044b\u043a\u0443\u043f\u0430.\n\n\u041f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 cPanel, \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 11.40, \u0443\u044f\u0437\u0432\u0438\u043c\u044b, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u0443 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u0438 \u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u044c \u0438\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u044f\u043c cPanel \u043f\u043e \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044e \u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0433\u0440\u043e\u0437.\n\n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0443\u0432\u0435\u0434\u043e\u043c\u043b\u0435\u043d\u0438\u044e cPanel, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0442\u0441\u044f \u0432 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 cPanel &amp; WHM 11.86.0.41, 11.110.0.97, 11.118.0.63, 11.124.0.35, 11.126.0.54, 11.130.0.19, 11.132.0.29, 11.134.0.20 \u0438 11.136.0.5, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 WP Squared 136.1.7.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043f\u043e\u043b\u0430\u0433\u0430\u044e\u0442, \u0447\u0442\u043e \u0432 \u0431\u043b\u0438\u0436\u0430\u0439\u0448\u0438\u0435 \u0434\u043d\u0438 \u0438 \u043d\u0435\u0434\u0435\u043b\u0438 \u0431\u0443\u0434\u0435\u0442 \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u0442\u044c\u0441\u044f \u043b\u0438\u0448\u044c \u0443\u0441\u0438\u043b\u0435\u043d\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \u041d\u043e \u0431\u0443\u0434\u0435\u043c \u043f\u043e\u0441\u043c\u043e\u0442\u0440\u0435\u0442\u044c.", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "3b3ae144-d3d3-4d5c-b7c1-6dcaa6e76391", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T14:00:04+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82768", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a play-go-copy-fail-cve-2026-31431\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a imkk000\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Go\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-04 13:57:48\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\n\u65e0\u63cf\u8ff0\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "453d350e-4078-4a1e-85f1-508a3abc900c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T13:41:08.439406+00:00", "type": "seen", "source": "https://bsky.app/profile/exploitdb-bot.bsky.social/post/3mkzsemodad2i", "content": "\ud83d\udea8 New Exploit: MindsDB  25.9.1.1 - Path Traversal\n\ud83d\udccb CVE: CVE-2026-27483\n\ud83d\udc64 Author: thewhiteh4t\n\n\ud83d\udd17 https://www.exploit-db.com/exploits/52547\n\n#ExploitDB #InfoSec #CyberSecurity #CVE-2026-27483", "vulnerability": "CVE-2026-27483", "author": {"login": "automation"}}, {"uuid": "55602a76-f3eb-495d-a9cb-7d30e75ed773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T13:36:25.208290+00:00", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mkzs46ut6b2v", "content": "SambaBox\u3067OS\u30b3\u30de\u30f3\u30c9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u306e\u8106\u5f31\u6027\u3002\u653b\u6483\u8005\u306f\u4e0d\u6b63\u306a\u30b3\u30fc\u30c9\u751f\u6210\u3092\u5236\u5fa1\u3067\u304d\u306a\u3044\u53ef\u80fd\u6027\u304c\u3042\u308a\u3001OS\u30b3\u30de\u30f3\u30c9\u3092\u5b9f\u884c\u3055\u308c\u308b\u6050\u308c\u304c\u3042\u308b\u3002\nCVE-2026-3120 CVSS 7.2 | HIGH", "vulnerability": "CVE-2026-3120", "author": {"login": "automation"}}, {"uuid": "7ef64c16-af4b-405a-b23e-47ab64f27d44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T13:30:05.545031+00:00", "type": "seen", "source": "https://infosec.place/objects/c4d2a630-d7a7-4aec-8d67-edb179d788e1", "content": "New vulnerability report from Talos:Norton Secure VPN Installation Insecure Operation On Junction Privilege Escalation Vulnerabilityhttps://talosintelligence.com/vulnerability_reports/TALOS-2025-2276CVE-2025-58074", "vulnerability": "CVE-2025-58074", "author": {"login": "automation"}}, {"uuid": "259c62ea-0f89-44af-b747-9be6eef5a94d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T13:26:19+00:00", "type": "seen", "source": "https://gist.github.com/iinikolaev/2ea316b1d8192f31153454117bc2870d", "content": "", "vulnerability": "cve-2026-31431", "author": {"login": "automation"}}, {"uuid": "845f17d6-8431-484f-ae1f-d4358535d16d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T13:15:05+00:00", "type": "seen", "source": "Telegram/17cmREU9ZDSDvyz78F9oo9Lr_unjD9vL2ztNU0fhrgd68AR1", "content": "", "vulnerability": "CVE-2026-24299", "author": {"login": "automation"}}, {"uuid": "e9d909d5-f411-43b6-8b6e-e605b3e24e94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T13:05:27+00:00", "type": "seen", "source": "https://gist.github.com/hungson175/e09e3e9302e7a5e4fa30701d485c1815", "content": "", "vulnerability": "CVE-2025-32711", "author": {"login": "automation"}}, {"uuid": "6c106440-d99b-46a7-b7b4-37073c3e1790", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T13:00:33.431403+00:00", "type": "seen", "source": "https://bsky.app/profile/se-nyheter.bsky.social/post/3mkzq42rec52h", "content": "S\u00e4kerhetsh\u00e5l hotar miljontals sajter \u2013 anv\u00e4nds aktivt av hackare\n\nhttps://www.europesays.com/se/236522/\n\nCERT-SE varnar f\u00f6r CVE-2026-41940, en kritisk s\u00e5rbarhet som \u00e5terfinns i webbserverprogrammen Cpanel och Web Host Manager (WHM). S\u00e5rbarheten\u2026", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "d67ed2a6-50b2-43fb-896a-508c44c5b5a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T13:00:05+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82763", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a cve-2026-41940\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a Yuri08loveElaina\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-04 12:53:58\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\n\u65e0\u63cf\u8ff0\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "42bd2137-389f-4173-ad42-0a4fd2a1b40a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T12:53:41.453984+00:00", "type": "seen", "source": "https://infosec.exchange/users/technadu/statuses/116516403312049261", "content": "cPanel zero-day active:40K+ servers hitCVE-2026-41940\u2192 auth bypass\u2192 admin accessPatch immediately.\nSource: https://www.securityweek.com/over-40000-servers-compromised-in-ongoing-cpanel-exploitation/\nFollow @technadu \n#Infosec #ZeroDay #CyberSecurity", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "b70defb7-4d89-4df7-802d-4a31e363cb92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T12:44:43.271634+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mkzp7q7ikj2g", "content": "CVE-2026-29200: A 9.9 CVSS Comet Backup Flaw Granting Total Cross-Tenant Takeover", "vulnerability": "CVE-2026-29200", "author": {"login": "automation"}}, {"uuid": "6db78167-74ae-48b4-ba20-73dfd3445c60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T12:43:54.781262+00:00", "type": "seen", "source": "https://bsky.app/profile/jj1bdx.tokyo/post/3mkzp6bi7o22b", "content": "Update your FreeBSD system NOW.\n\n&gt; Topic: Remote code execution via malicious DHCP options \n&gt; Affects: All supported versions of FreeBSD.\n&gt; CVE Name: CVE-2026-42511\n\n&gt; A rogue DHCP server may be able to execute arbitrary code as root on a system running dhclient.", "vulnerability": "CVE-2026-42511", "author": {"login": "automation"}}, {"uuid": "4cbf6d53-fe76-46f4-8f7c-dbaf8c0b616d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T12:30:14.962219+00:00", "type": "seen", "source": "https://bsky.app/profile/mhatta.org/post/3mkzofu7rvx25", "content": "copy.fail (CVE-2026-31431): a small Linux kernel bug with an unusually big blast radius | Jorijn Schrijvershof", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "08992273-c884-412d-add5-85ad9671cafb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T12:22:56.742250+00:00", "type": "seen", "source": "https://bsky.app/profile/allaboutsecurity.bsky.social/post/3mkznyouuuk2d", "content": "CHERI-Speichersicherheit reduziert LLM-gefundene FreeBSD-Schwachstelle CVE-2026-4747\nwww.all-about-security.de/cheri-speich...\n#llm", "vulnerability": "CVE-2026-4747", "author": {"login": "automation"}}, {"uuid": "0d8520a9-0f6b-4368-821b-870b59fac7df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T12:14:30.353343+00:00", "type": "seen", "source": "https://bsky.app/profile/pixelsandpulse.bsky.social/post/3mkznjpeaxq2g", "content": "A quiet Linux kernel flaw, 'Copy Fail' (CVE-2026-31431), has been actively exploited since 2017, allowing root access with a tiny script. This LPE is a major threat to cloud container security, proving even 'boring' bugs can be\u2026\n\nhttps://www.tpp.blog/qoupvah\n\n#cybersecurity #cve202631431 #copyfail", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "67f884ae-5167-4e0d-a7bc-c3b03c8e8208", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T12:07:36.469623+00:00", "type": "seen", "source": "https://bsky.app/profile/vitobotta.com/post/3mkzn5epw4222", "content": "Read-only ArgoCD access + one annotation = every Kubernetes secret in the cluster, plaintext. CVE-2026-43824. Fixed in 3.2.11 and 3.3.9. If you're running 3.2.x or 3.3.x, upgrade today.", "vulnerability": "CVE-2026-43824", "author": {"login": "automation"}}, {"uuid": "7b2fb17f-21c9-41c6-a97e-05df0fb6389c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T12:07:07.829628+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mkzn4jkoks2q", "content": "\ud83d\udccc CVE-2026-5614 - A security flaw has been discovered in Belkin F9K1015 1.00.10. Impacted is the function formSetPassword of the file /goform/formSetPassword. The manip... https://www.cyberhub.blog/cves/CVE-2026-5614", "vulnerability": "CVE-2026-5614", "author": {"login": "automation"}}, {"uuid": "33b084f3-b796-4dc5-963f-1c7fd12e1430", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T12:00:30.408451+00:00", "type": "seen", "source": "https://bsky.app/profile/se-nyheter.bsky.social/post/3mkzmqoddah27", "content": "Hackare utnyttjar s\u00e5rbarhet \u2013 miljontals sajter i fara\n\nhttps://www.europesays.com/se/236455/\n\nCanadian Centre for Cyber Security varnar f\u00f6r CVE-2026-41940, en kritisk s\u00e5rbarhet som \u00e5terfinns i webbserverprogrammen Cpanel och Web\u2026", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "38ec8ae6-2229-406a-9a01-d93890f3f1cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T12:00:21.450427+00:00", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mkzmqfuxhm2g", "content": "cPanel Under Siege: CVE-2026-41940\u2019s Perfect Storm \u2013 Unauthenticated Root Takeover via a Simple CRLF Injection +\u00a0Video\n\nIntroduction A critical authentication bypass vulnerability, identified as CVE-2026-41940 and carrying a near\u2011max CVSS score of 9.8, has been actively exploited since at least 23\u2026", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "a8b72110-e060-4d33-9c11-3cf3eb4277eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T11:45:24.229336+00:00", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3mkzlvnvq2q2q", "content": "CISA reports active exploitation of &quot;Copy Fail&quot; Linux kernel flaw (CVE-2026-31431) allowing local users to gain root access. Federal agencies must patch by May 15 under BOD 22-01. #LinuxKernel #RootAccess #USA", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "4df84c10-371e-4080-a8cc-7087aace8a2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T11:41:40.230672+00:00", "type": "seen", "source": "https://bsky.app/profile/cerberusit.bsky.social/post/3mkzloykllb2c", "content": "We are currently witnessing over 40,000 servers falling over themselves to be compromised through an ongoing exploitation of a cPanel vulnerability that was supposed to be patched. This mess involves CVE-2026-41940, a zero-day that grants administrative access to anyone clever en...\n\nRead full story", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "d4e3c8ba-b3cb-44fd-987b-844c4718cb82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T11:39:39.251670+00:00", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116516111985736483", "content": "Some increased actor activities are shown targeting pixelsock directus-mcp (CVE-2026-7729) https://vuldb.com/vuln/360904/cti", "vulnerability": "CVE-2026-7729", "author": {"login": "automation"}}, {"uuid": "3f14bdbb-1f1c-46bd-9ee0-93961907cf7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T11:26:12.538944+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzkte4uqu2t", "content": "CVE-2026-7746 - SourceCodester Web-based Pharmacy Product Management System edit-admin.php sql injection\nCVE ID : CVE-2026-7746\n \n Published : May 4, 2026, 9:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A vulnerability was identified in SourceCodester Web-based Pharmacy Pr...", "vulnerability": "CVE-2026-7746", "author": {"login": "automation"}}, {"uuid": "6ac9a7c0-bf37-4ca3-ab46-ac579e0ec2d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T11:21:12.255151+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzkkfokvh2i", "content": "CVE-2026-7745 - CodeAstro Online Classroom facultydetails sql injection\nCVE ID : CVE-2026-7745\n \n Published : May 4, 2026, 9:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A vulnerability was determined in CodeAstro Online Classroom 1.0. This impacts an unknown function of t...", "vulnerability": "CVE-2026-7745", "author": {"login": "automation"}}, {"uuid": "eb1c733c-3cdc-4065-9bee-06f9b7237ab8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T11:17:18+00:00", "type": "seen", "source": "MISP/5ee900f0-23c4-4392-bc19-5080ac002816", "content": "", "vulnerability": "CVE-2019-10149", "author": {"login": "automation"}}, {"uuid": "d83fc969-1f88-4a51-9bce-905785e1bbda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T11:16:11.607999+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzkbh2bwx2k", "content": "CVE-2026-7747 - Totolink N300RH Parameter cstecgi.cgi loginauth buffer overflow\nCVE ID : CVE-2026-7747\n \n Published : May 4, 2026, 9:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A security flaw has been discovered in Totolink N300RH 3.2.4-B20220812. Affected by this vulner...", "vulnerability": "CVE-2026-7747", "author": {"login": "automation"}}, {"uuid": "a3acd964-129a-419f-af29-d56b6747f8b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T11:14:37.229108+00:00", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3mkzjyo3dghq2", "content": "Linux: CISA Warns of Linux Kernel Zero-Day Vulnerability Exploited in Active Attacks CISA Warns of Actively Exploited Linux Kernel Vulnerability (CVE-2026-31431) The U.S. Cybersecurity and Infrastr...\n\n#cyber #Vulnerability\n\nOrigin | Interest | Match", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "274751df-29ab-494b-81c6-39ee9a98c34f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T11:11:11.096424+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzjyicqro2o", "content": "CVE-2026-7738 - puchunjie doc-tools-mcp MCP mcp-server.ts open_document path traversal\nCVE ID : CVE-2026-7738\n \n Published : May 4, 2026, 7:16 a.m. | 3\u00a0hours, 4\u00a0minutes ago\n \n Description : A security flaw has been discovered in puchunjie doc-tools-mcp 1.0.18. This affects the...", "vulnerability": "CVE-2026-7738", "author": {"login": "automation"}}, {"uuid": "d2a8be4f-f3ff-4b82-b12d-466b9ad7c38f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T11:06:10.569888+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzjpjuzbu2n", "content": "CVE-2026-7744 - CodeAstro Online Classroom addnewstudent sql injection\nCVE ID : CVE-2026-7744\n \n Published : May 4, 2026, 8:16 a.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : A vulnerability was found in CodeAstro Online Classroom 1.0. This affects an unknown function of the fi...", "vulnerability": "CVE-2026-7744", "author": {"login": "automation"}}, {"uuid": "27fe10fb-1c2a-4e16-a95f-c56b64bc2ccf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T11:04:18.999681+00:00", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mkzjm7eqgc2v", "content": "Tegsoft Online Support Application\u306e\u30af\u30ed\u30b9\u30b5\u30a4\u30c8\u30b9\u30af\u30ea\u30d7\u30c6\u30a3\u30f3\u30b0\u8106\u5f31\u6027\u306b\u3088\u308a\u3001Web\u30da\u30fc\u30b8\u751f\u6210\u6642\u306b\u60aa\u610f\u306e\u3042\u308b\u30b9\u30af\u30ea\u30d7\u30c8\u304c\u5b9f\u884c\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u3002\nCVE-2025-14320 CVSS 9.8 | CRITICAL", "vulnerability": "CVE-2025-14320", "author": {"login": "automation"}}, {"uuid": "5dd00b7e-8736-4bbf-825c-bb7dfb38a20c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T11:03:06.754371+00:00", "type": "seen", "source": "https://bsky.app/profile/clubic-off.bsky.social/post/3mkzjk2dxy42p", "content": "WinRAR 7.21 corrige un bug de corruption d'archives introduit par la 7.20 et rappelle qu'il faut encore t\u00e9l\u00e9charger chaque mise \u00e0 jour soi-m\u00eame. Dix mois apr\u00e8s le patch, la faille CVE-2025-8088 est toujours exploit\u00e9e.", "vulnerability": "CVE-2025-8088", "author": {"login": "automation"}}, {"uuid": "f881c81c-410c-40b4-96ab-e3c55cbad670", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T11:01:11.054961+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzjglb4cv2i", "content": "CVE-2026-7741 - CodeAstro Online Classroom studentlogin sql injection\nCVE ID : CVE-2026-7741\n \n Published : May 4, 2026, 8:16 a.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : A vulnerability was detected in CodeAstro Online Classroom 1.0. Impacted is an unknown function of the f...", "vulnerability": "CVE-2026-7741", "author": {"login": "automation"}}, {"uuid": "bdd24848-9750-4e55-8d3a-d20e21bbdf34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T11:00:12+00:00", "type": "seen", "source": "Telegram/_eCtd4B0TSlz1bIReYjdv8Rjs1z4tyEtlty8zrSnziSulk4", "content": "", "vulnerability": "CVE-2026-6379", "author": {"login": "automation"}}, {"uuid": "18bd01f3-a228-424c-9dfe-1f08067d1d10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T11:00:12+00:00", "type": "seen", "source": "Telegram/_eCtd4B0TSlz1bIReYjdv8Rjs1z4tyEtlty8zrSnziSulk4", "content": "", "vulnerability": "CVE-2026-39440", "author": {"login": "automation"}}, {"uuid": "29fe0202-15cc-4720-8615-9da1068c804b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T11:00:04+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82751", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-39987\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a rootdirective-sec\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-04 10:58:07\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\n\u65e0\u63cf\u8ff0\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-39987", "author": {"login": "automation"}}, {"uuid": "f80f914c-bbc3-40b6-b8e5-978dcda4a3d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:57:56.149976+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkzjarbjmv2w", "content": "\ud83d\udfe0 CVE-2026-33846 - High (7.5)\n\nA heap buffer overflow vulnerability exists in the DTLS handshake fragment reassembly logic of Gn...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-33846/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-33846", "author": {"login": "automation"}}, {"uuid": "1fc65897-57c2-45e1-9615-58c5831bf3ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:57:03.577240+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkzj77wp5h2t", "content": "\ud83d\udfe0 CVE-2026-7748 - High (8.8)\n\nA weakness has been identified in Totolink N300RH 3.2.4-B20220812. Affected by this issue is the ...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-7748/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-7748", "author": {"login": "automation"}}, {"uuid": "e1598d48-305b-4a08-ab29-d9223a2864a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:56:56.545703+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkzj6ydbzi26", "content": "\ud83d\udfe0 CVE-2026-7750 - High (8.8)\n\nA vulnerability was detected in Totolink N300RH 3.2.4-B20220812. This vulnerability affects the f...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-7750/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-7750", "author": {"login": "automation"}}, {"uuid": "99d95182-1d87-421f-b5d2-b96d269bae3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:56:53.395688+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzj6vorbq2o", "content": "CVE-2026-7736 - osrg GoBGP mrt.go parseRibEntry integer underflow\nCVE ID : CVE-2026-7736\n \n Published : May 4, 2026, 7:16 a.m. | 3\u00a0hours, 4\u00a0minutes ago\n \n Description : A vulnerability was determined in osrg GoBGP up to 4.3.0. Affected by this vulnerability is the function par...", "vulnerability": "CVE-2026-7736", "author": {"login": "automation"}}, {"uuid": "4463ac52-a775-47a4-97bd-1223ff9b15c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:56:48.434053+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkzj6qyuyx2f", "content": "\ud83d\udfe0 CVE-2026-7749 - High (8.8)\n\nA security vulnerability has been detected in Totolink N300RH 3.2.4-B20220812. This affects the f...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-7749/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-7749", "author": {"login": "automation"}}, {"uuid": "be6dd69e-c824-41cf-9582-69d34a58e605", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:53:07.446600+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkziy2wamq2p", "content": "CVE-2026-7747 - Totolink N300RH Parameter cstecgi.cgi loginauth buffer overflow\nCVE ID : CVE-2026-7747\n \n Published : May 4, 2026, 9:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A security flaw has been discovered in Totolink N300RH 3.2.4-B20220812. Affected by this vulner...", "vulnerability": "CVE-2026-7747", "author": {"login": "automation"}}, {"uuid": "1f2eb9b8-3200-4829-9cd6-937b5e0018c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:49:42.657847+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzis3qk2b2k", "content": "CVE-2026-7737 - osrg GoBGP BMP Parser bmp.go BMPStatisticsReport.ParseBody out-of-bounds\nCVE ID : CVE-2026-7737\n \n Published : May 4, 2026, 7:16 a.m. | 3\u00a0hours, 4\u00a0minutes ago\n \n Description : A vulnerability was identified in osrg GoBGP up to 4.3.0. Affected by this issue is t...", "vulnerability": "CVE-2026-7737", "author": {"login": "automation"}}, {"uuid": "6d6c2e29-b986-4a89-acff-67adf6bd7103", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:46:42.496012+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzimpqg2u2t", "content": "CVE-2026-7743 - CodeAstro Online Classroom studentdetails sql injection\nCVE ID : CVE-2026-7743\n \n Published : May 4, 2026, 8:16 a.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : A vulnerability has been found in CodeAstro Online Classroom 1.0. The impacted element is an unknown f...", "vulnerability": "CVE-2026-7743", "author": {"login": "automation"}}, {"uuid": "311e7d0c-8c0f-43ae-b0aa-b184afdebf10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:43:58.603747+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzihtdlcr2v", "content": "CVE-2026-7742 - CodeAstro Online Classroom facultylogin sql injection\nCVE ID : CVE-2026-7742\n \n Published : May 4, 2026, 8:16 a.m. | 2\u00a0hours, 4\u00a0minutes ago\n \n Description : A flaw has been found in CodeAstro Online Classroom 1.0. The affected element is an unknown function of ...", "vulnerability": "CVE-2026-7742", "author": {"login": "automation"}}, {"uuid": "7f3db8d7-f9f0-418e-97f1-5a981334b96b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:41:28.313059+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkziddwljr2n", "content": "CVE-2026-7740 - justdan96 tsMuxer vvc.cpp setFPS denial of service\nCVE ID : CVE-2026-7740\n \n Published : May 4, 2026, 7:16 a.m. | 3\u00a0hours, 4\u00a0minutes ago\n \n Description : A security vulnerability has been detected in justdan96 tsMuxer up to 2.7.0. This issue affects the functio...", "vulnerability": "CVE-2026-7740", "author": {"login": "automation"}}, {"uuid": "f7a27dd3-6191-489b-92d4-403e960739b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:39:09.270276+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzi77jkcs2k", "content": "CVE-2026-7739 - justdan96 tsMuxer hevc.cpp setFPS denial of service\nCVE ID : CVE-2026-7739\n \n Published : May 4, 2026, 7:16 a.m. | 3\u00a0hours, 4\u00a0minutes ago\n \n Description : A weakness has been identified in justdan96 tsMuxer up to 2.7.0. This vulnerability affects the function H...", "vulnerability": "CVE-2026-7739", "author": {"login": "automation"}}, {"uuid": "50ac6b28-97a6-477a-8eea-7d73e9189d8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:37:00.205417+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzi3ejuyy2r", "content": "CVE-2025-14320 - XSS in Tegsoft's Online Support Application\nCVE ID : CVE-2025-14320\n \n Published : May 4, 2026, 9:15 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Tegsoft Man...", "vulnerability": "CVE-2025-14320", "author": {"login": "automation"}}, {"uuid": "a24b44b7-0352-4b1f-9b56-3983a1b05529", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:35:00.082283+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzhxrqx452q", "content": "CVE-2026-7749 - Totolink N300RH POST Request cstecgi.cgi setWanConfig buffer overflow\nCVE ID : CVE-2026-7749\n \n Published : May 4, 2026, 8:45 a.m. | 1\u00a0hour, 35\u00a0minutes ago\n \n Description : A security vulnerability has been detected in Totolink N300RH 3.2.4-B20220812. This affe...", "vulnerability": "CVE-2026-7749", "author": {"login": "automation"}}, {"uuid": "aee2bf29-ed5d-4443-91b3-589a9eff9476", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:33:06.975082+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzhufzyvb2e", "content": "CVE-2025-14320 - XSS in Tegsoft's Online Support Application\nCVE ID : CVE-2025-14320\n \n Published : May 4, 2026, 9:15 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Tegsoft Man...", "vulnerability": "CVE-2025-14320", "author": {"login": "automation"}}, {"uuid": "0410dfda-77ac-4139-938c-1cb5a6fdc387", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:31:24.996985+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzhraqhl72r", "content": "CVE-2026-33846 - Gnutls: gnutls: denial of service via heap buffer overflow in dtls handshake fragment reassembly\nCVE ID : CVE-2026-33846\n \n Published : May 4, 2026, 9:08 a.m. | 1\u00a0hour, 11\u00a0minutes ago\n \n Description : A heap buffer overflow vulnerability exists in the DTLS han...", "vulnerability": "CVE-2026-33846", "author": {"login": "automation"}}, {"uuid": "c281fb92-cf26-4ec5-aa8d-91859aecd2c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:30:29.375888+00:00", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkzhppcbyr2o", "content": "CRITICAL: GeoVision GV-LPC2011/LPC2211 v1.10 has a severe privilege escalation flaw. Restrict web access &amp; monitor HTTP requests \u2014 no patch yet. Protect your devices! https://radar.offseq.com/threat/cve-2026-42368-cwe-266-incorrect-privilege-assignm-b84e399c #OffSeq #Vulnerability #IoTSecurity", "vulnerability": "cve-2026-42368", "author": {"login": "automation"}}, {"uuid": "7b1695d7-0a13-40a4-b7e9-20070b2acc59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:30:27.922246+00:00", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116515840100676025", "content": "\ud83c\udf10 CVE-2026-42368 | CRITICAL privilege escalation in GeoVision GV-LPC2011/LPC2211 v1.10. Remote attackers can gain full control via crafted HTTP requests. No patch \u2014 restrict web interface access &amp; monitor traffic. Details: https://radar.offseq.com/threat/cve-2026-42368-cwe-266-incorrect-privilege-assignm-b84e399c #OffSeq #Vuln #IoT #CyberSecurity", "vulnerability": "cve-2026-42368", "author": {"login": "automation"}}, {"uuid": "29a5a482-a590-48f1-b86c-d3ed4264c66f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:29:40.232121+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzhob2nub2e", "content": "CVE-2026-7750 - Totolink N300RH POST Request cstecgi.cgi setMacFilterRules buffer overflow\nCVE ID : CVE-2026-7750\n \n Published : May 4, 2026, 9 a.m. | 1\u00a0hour, 20\u00a0minutes ago\n \n Description : A vulnerability was detected in Totolink N300RH 3.2.4-B20220812. This vulnerability af...", "vulnerability": "CVE-2026-7750", "author": {"login": "automation"}}, {"uuid": "d2e9cabb-d40f-4491-8f36-a510f46105f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:28:06.192349+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzhle3opr2k", "content": "CVE-2026-7748 - Totolink N300RH POST Request cstecgi.cgi setUpgradeFW buffer overflow\nCVE ID : CVE-2026-7748\n \n Published : May 4, 2026, 8:30 a.m. | 1\u00a0hour, 50\u00a0minutes ago\n \n Description : A weakness has been identified in Totolink N300RH 3.2.4-B20220812. Affected by this issu...", "vulnerability": "CVE-2026-7748", "author": {"login": "automation"}}, {"uuid": "8ee1d3fd-dc90-4543-8326-5fa2787ec757", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:26:32.884394+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkzhinw5uy2v", "content": "CVE-2026-5335 - Magic Export &amp; Import\nCVE ID : CVE-2026-5335\n \n Published : May 4, 2026, 7:16 a.m. | 3\u00a0hours, 4\u00a0minutes ago\n \n Description : The Magic Export &amp; Import WordPress plugin before 1.2.0 stores exported CSV files at a publicly accessible location, making it possi...", "vulnerability": "CVE-2026-5335", "author": {"login": "automation"}}, {"uuid": "69b4cc9e-fd2d-4bb4-a58e-708ea04bbad4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:23:28+00:00", "type": "seen", "source": "https://t.me/codeby_sec/10084", "content": "\u041e\u0434\u0438\u043d git push \u2014 \u0438 \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u044b \u0447\u0443\u0436\u0438\u0445 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0435\u0432 \u0443 \u0442\u0435\u0431\u044f \u0432 \u043a\u0430\u0440\u043c\u0430\u043d\u0435\n\n\u0412 \u043c\u0430\u0440\u0442\u0435 2026 \u0433\u043e\u0434\u0430 \u043a\u043e\u043c\u0430\u043d\u0434\u0430 Wiz Research \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0440\u0435\u043f\u043e\u0440\u0442 \u0432 GitHub Bug Bounty. \u0427\u0435\u0440\u0435\u0437 40 \u043c\u0438\u043d\u0443\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b\u0438, \u0447\u0435\u0440\u0435\u0437 \u0434\u0432\u0430 \u0447\u0430\u0441\u0430 \u043d\u0430 github.com \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0438 \u043f\u0430\u0442\u0447. \u0421\u043a\u043e\u0440\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043a\u0446\u0438\u0438 \u0433\u043e\u0432\u043e\u0440\u0438\u0442 \u043e \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b: \u043e\u0434\u0438\u043d crafted push option \u0434\u0430\u0432\u0430\u043b RCE \u043d\u0430 \u0431\u044d\u043a\u0435\u043d\u0434-\u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445 \u0438 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u043c \u0438 \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u044b\u043c \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f\u043c \u0447\u0443\u0436\u0438\u0445 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439. \u041d\u0430 \u043c\u043e\u043c\u0435\u043d\u0442 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f 88% self-hosted GHES-\u0438\u043d\u0441\u0442\u0430\u043d\u0441\u043e\u0432 \u043e\u0441\u0442\u0430\u0432\u0430\u043b\u0438\u0441\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u044b.\n\n\u041d\u043e \u0441\u0430\u043c\u043e\u0435 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e\u0435 \u0442\u0443\u0442 \u2014 \u043d\u0435 \u0441\u0430\u043c\u0430 \u0434\u044b\u0440\u0430, \u0430 \u0442\u043e, \u043a\u0430\u043a \u0435\u0451 \u043d\u0430\u0448\u043b\u0438.\n\n\ud83d\udd0d \u0410\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0434\u0432\u0435\u043b\u0430\n\n\u041a\u043e\u0433\u0434\u0430 \u0442\u044b \u0434\u0435\u043b\u0430\u0435\u0448\u044c git push \u043d\u0430 GitHub \u0447\u0435\u0440\u0435\u0437 SSH, \u0437\u0430\u043f\u0440\u043e\u0441 \u043f\u0440\u043e\u0445\u043e\u0434\u0438\u0442 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u0438\u0437 \u0447\u0435\u0442\u044b\u0440\u0451\u0445 \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u0432: babeld (git-\u043f\u0440\u043e\u043a\u0441\u0438) \u2192 gitauth (\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f) \u2192 gitrpcd (\u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0438\u0439 RPC) \u2192 pre-receive hook. \u041a\u0430\u0436\u0434\u044b\u0439 \u043d\u0430\u043f\u0438\u0441\u0430\u043d \u043d\u0430 \u0441\u0432\u043e\u0451\u043c \u044f\u0437\u044b\u043a\u0435. \u0418 \u043a\u0430\u0436\u0434\u044b\u0439 \u0431\u0435\u0437\u0443\u0441\u043b\u043e\u0432\u043d\u043e \u0434\u043e\u0432\u0435\u0440\u044f\u0435\u0442 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0435\u043c\u0443.\n\n\u0421\u0432\u044f\u0437\u0443\u044e\u0449\u0435\u0435 \u0437\u0432\u0435\u043d\u043e \u043c\u0435\u0436\u0434\u0443 \u043d\u0438\u043c\u0438 \u2014 \u0437\u0430\u0433\u043e\u043b\u043e\u0432\u043e\u043a X-Stat. \u0424\u043e\u0440\u043c\u0430\u0442 \u043f\u0440\u0438\u043c\u0438\u0442\u0438\u0432\u043d\u044b\u0439: \u043f\u0430\u0440\u044b key=value, \u0440\u0430\u0437\u0434\u0435\u043b\u0451\u043d\u043d\u044b\u0435 \u0442\u043e\u0447\u043a\u043e\u0439 \u0441 \u0437\u0430\u043f\u044f\u0442\u043e\u0439. \u041f\u0430\u0440\u0441\u0438\u043d\u0433 \u2014 \u0442\u0440\u0438\u0432\u0438\u0430\u043b\u044c\u043d\u044b\u0439 split. \u0410 \u0434\u0430\u043b\u044c\u0448\u0435 \u2014 \u0434\u0435\u0442\u0430\u043b\u044c, \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0432\u0441\u0451 \u0434\u0435\u0440\u0436\u0438\u0442\u0441\u044f: \u0435\u0441\u043b\u0438 \u043a\u043b\u044e\u0447 \u0432\u0441\u0442\u0440\u0435\u0447\u0430\u0435\u0442\u0441\u044f \u0434\u0432\u0430\u0436\u0434\u044b, \u0432\u0442\u043e\u0440\u043e\u0435 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 \u0442\u0438\u0445\u043e \u043f\u0435\u0440\u0435\u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442 \u043f\u0435\u0440\u0432\u043e\u0435. \u0411\u0435\u0437 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0439, \u0431\u0435\u0437 \u043b\u043e\u0433\u043e\u0432. Last-write-wins.\n\nPush options \u2014 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u0430\u044f \u0444\u0438\u0447\u0430 git-\u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 (git push -o ). babeld \u043a\u043e\u0434\u0438\u0440\u0443\u0435\u0442 \u0438\u0445 \u043a\u0430\u043a \u043f\u043e\u043b\u044f \u0432 X-Stat. \u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u0442 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435. \u0422\u043e\u0447\u043a\u0430 \u0441 \u0437\u0430\u043f\u044f\u0442\u043e\u0439 \u043d\u0435 \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u0443\u0435\u0442\u0441\u044f. \u0417\u043d\u0430\u0447\u0438\u0442, \u0447\u0435\u0440\u0435\u0437 push option \u043c\u043e\u0436\u043d\u043e \u0438\u043d\u0436\u0435\u043a\u0442\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043f\u043e\u043b\u044f \u0432 X-Stat, \u043f\u0435\u0440\u0435\u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u044f security-\u043a\u0440\u0438\u0442\u0438\u0447\u043d\u044b\u0435 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b \u2014 \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c command injection.\n\n\u2699\ufe0f \u041a\u0430\u043a AI \u043f\u043e\u043c\u043e\u0433 \u2014 \u0438 \u0433\u0434\u0435 \u043d\u0435 \u043f\u043e\u043c\u043e\u0433\n\nWiz \u043a\u043e\u043f\u0430\u043b\u0438 GHES \u0438 \u0440\u0430\u043d\u044c\u0448\u0435, \u043d\u043e \u043e\u0431\u044a\u0451\u043c \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0445 \u0431\u0438\u043d\u0430\u0440\u043d\u0438\u043a\u043e\u0432 \u0434\u0435\u043b\u0430\u043b \u043f\u043e\u043b\u043d\u043e\u0446\u0435\u043d\u043d\u044b\u0439 \u0430\u0443\u0434\u0438\u0442 \u043d\u0435\u0440\u0435\u043d\u0442\u0430\u0431\u0435\u043b\u044c\u043d\u044b\u043c. \u0414\u0435\u0441\u044f\u0442\u043a\u0438 \u0441\u043a\u043e\u043c\u043f\u0438\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u0432 \u0431\u0435\u0437 \u0438\u0441\u0445\u043e\u0434\u043d\u0438\u043a\u043e\u0432 \u2014 \u0440\u0443\u0447\u043d\u043e\u0439 \u0440\u0435\u0432\u0435\u0440\u0441 \u043a\u0430\u0436\u0434\u043e\u0433\u043e \u0432 IDA Pro \u0437\u0430\u043d\u044f\u043b \u0431\u044b \u043c\u0435\u0441\u044f\u0446\u044b.\n\n\u041f\u0440\u043e\u0440\u044b\u0432 \u0441\u043b\u0443\u0447\u0438\u043b\u0441\u044f \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f IDA MCP \u2014 AI-\u0442\u0443\u043b\u0438\u043d\u0433\u0443 \u0434\u043b\u044f \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0430\u0446\u0438\u0438 \u0440\u0435\u0432\u0435\u0440\u0441-\u0438\u043d\u0436\u0438\u043d\u0438\u0440\u0438\u043d\u0433\u0430. \u0412\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0442\u0438\u043f\u043e\u0432, \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f \u0444\u0443\u043d\u043a\u0446\u0438\u0439, \u0440\u0435\u043a\u043e\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u044f \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0438\u0445 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u0432 \u2014 \u0440\u0443\u0442\u0438\u043d\u0430, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0440\u0430\u043d\u044c\u0448\u0435 \u0437\u0430\u043d\u0438\u043c\u0430\u043b\u0430 \u043d\u0435\u0434\u0435\u043b\u0438 \u043d\u0430 \u043e\u0434\u0438\u043d \u0431\u0438\u043d\u0430\u0440\u043d\u0438\u043a, \u0443\u0441\u043a\u043e\u0440\u0438\u043b\u0430\u0441\u044c \u043d\u0430 \u043f\u043e\u0440\u044f\u0434\u043e\u043a.\n\n\u041d\u043e \u0432\u043e\u0442 \u0447\u0442\u043e \u0432\u0430\u0436\u043d\u043e: AI \u0443\u0441\u043a\u043e\u0440\u0438\u043b \u0440\u0443\u0442\u0438\u043d\u0443, \u0430 \u043d\u0435 \u043d\u0430\u0448\u0451\u043b \u0431\u0430\u0433. \u041f\u043e\u043d\u0438\u043c\u0430\u043d\u0438\u0435, \u0447\u0442\u043e \u0442\u043e\u0447\u043a\u0430 \u0441 \u0437\u0430\u043f\u044f\u0442\u043e\u0439 \u0432 shared-\u0444\u043e\u0440\u043c\u0430\u0442\u0435 \u2014 \u0432\u0435\u043a\u0442\u043e\u0440 \u0438\u043d\u044a\u0435\u043a\u0446\u0438\u0438, \u0447\u0442\u043e last-write-wins \u043f\u0440\u0435\u0432\u0440\u0430\u0449\u0430\u0435\u0442 field injection \u0432 override security-\u043f\u043e\u043b\u0435\u0439, \u0447\u0442\u043e \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u043e\u0435 \u043f\u043e\u043b\u0435 rails_env \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 sandbox-\u0440\u0435\u0436\u0438\u043c\u043e\u043c \u2014 \u044d\u0442\u043e \u0447\u0438\u0441\u0442\u044b\u0439 domain expertise. AI \u043d\u0435 \u0432\u044b\u0442\u044f\u043d\u0435\u0442 \u0442\u0430\u043a\u043e\u0435 \u0441\u0430\u043c: \u0435\u043c\u0443 \u043d\u0435 \u0445\u0432\u0430\u0442\u0430\u0435\u0442 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0430 \u00ab\u0430 \u0447\u0442\u043e \u0431\u0443\u0434\u0435\u0442, \u0435\u0441\u043b\u0438 \u043f\u0430\u0440\u0441\u0435\u0440 \u0432\u0441\u0442\u0440\u0435\u0442\u0438\u0442 \u0434\u0432\u0430 \u043e\u0434\u0438\u043d\u0430\u043a\u043e\u0432\u044b\u0445 \u043a\u043b\u044e\u0447\u0430\u00bb.\n\n\ud83c\udfaf \u0414\u043b\u044f \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0443\u044e\u0449\u0438\u0445 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439: \u0430\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u044b\u0439 \u043f\u043e\u0434\u0445\u043e\u0434 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0441 \u043b\u044e\u0431\u044b\u043c \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043a\u0430\u043a VM-\u043e\u0431\u0440\u0430\u0437 \u0438\u043b\u0438 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440 \u2014 GitLab Omnibus, Bitbucket Server, Jenkins. \u0414\u043b\u044f SaaS-only \u2014 \u0432\u0435\u043a\u0442\u043e\u0440 \u0437\u0430\u043a\u0440\u044b\u0442.\n\n\u041f\u043e\u043b\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u0444\u043e\u0440\u043c\u0430\u0442\u0430 X-Stat \u0438 \u043c\u0435\u0442\u043e\u0434\u043e\u043b\u043e\u0433\u0438\u0438 \u0440\u0435\u0432\u0435\u0440\u0441\u0430 \u2014 \u0432 \u0441\u0442\u0430\u0442\u044c\u0435 \u043d\u0430 \u0444\u043e\u0440\u0443\u043c\u0435.\n\nhttps://codeby.net/threads/github-enterprise-rce-cve-2026-3854-ot-reversa-zakrytykh-binarnikov-do-polnoi-komprometatsii-servera.92950/", "vulnerability": "CVE-2026-3854", "author": {"login": "automation"}}, {"uuid": "f237ec0a-bd8e-4650-9f96-85f6be7e5bc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:13:34+00:00", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/broadcom-vmware-security-advisory-av26-419", "content": "", "vulnerability": "CVE-2026-341431", "author": {"login": "syspect"}}, {"uuid": "85aebff3-aab3-474e-92ec-05f0f668598c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T10:00:21.564370+00:00", "type": "seen", "source": "https://bsky.app/profile/news.humancoders.com/post/3mkzfzsf3kv22", "content": "Copy Fail CVE-2026-31431 : patch kernel Linux et mitigation", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "01f93a89-1924-427e-bfa4-15e7acca5f0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:57:53.725787+00:00", "type": "seen", "source": "https://ioc.exchange/users/sbeyer/statuses/116515712091156433", "content": "60 Sekunden Cyber KW18 2026, 27. April - 3. Mai:\nDaten von Kunden und Benutzern von Vimeo werden von der Gruppierung ShinyHunters ins Dark Net gestellt, Sicherheitsforscher finden mit Copy Fail eine seit 2017 (!) bestehende Schwachstelle (CVE-2026-31431), mit der man root-Zugriff auf allen bekannteren Linux-Distributionen erhalten kann, das NGO noyb klagt gegen die Hamburger Datenschutzbeh\u00f6rde wegen Unt\u00e4\nhttps://www.60-sekunden-cyber.de/kw18-2026/\n#cyber #cybersicherheit", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "c10078df-a913-4e2d-9bf1-b73b610760f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:45:09.977462+00:00", "type": "seen", "source": "https://bsky.app/profile/se-nyheter.bsky.social/post/3mkzf6oblyq2a", "content": "Kritisk s\u00e5rbarhet utg\u00f6r ett hot mot Linux-anv\u00e4ndare\n\nhttps://www.europesays.com/se/236328/\n\nS\u00e4kerhetsforskare varnar f\u00f6r Copy Fail (CVE-2026-31431), en kritisk s\u00e5rbarhet som utg\u00f6r ett hot mot anv\u00e4ndare som k\u00f6r ett\u2026", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "ccb56f30-1287-4fc8-8216-4c8243342ae2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:44:28+00:00", "type": "seen", "source": "https://t.me/kasperskyb2b/2158", "content": "\ud83d\udc40 \u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f APT \u0438 \u043d\u043e\u0432\u043e\u0441\u0442\u0438 \u0418\u0411 \u0437\u0430 \u043d\u0435\u0434\u0435\u043b\u044e\n\n\ud83d\udfe2\u0412 \u0430\u0442\u0430\u043a\u0430\u0445 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 Silver Fox \u043d\u0430 \u043e\u0440\u0433\u0430\u043d\u0437\u0438\u0430\u0446\u0438\u0438 \u0432 \u0420\u0424 \u0438 \u0432 \u0418\u043d\u0434\u0438\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d \u043d\u043e\u0432\u044b\u0439 \u0431\u044d\u043a\u0434\u043e\u0440 ABCDoor. \u0420\u0435\u0442\u0440\u043e\u0441\u043f\u0435\u043a\u0442\u0438\u0432\u043d\u044b\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u043b \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c 7 \u0432\u0435\u0440\u0441\u0438\u0439 \u0412\u041f\u041e, \u043f\u0435\u0440\u0432\u0430\u044f \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0434\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0430\u0436 2024 \u0433\u043e\u0434\u043e\u043c, \u043d\u043e \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u0435 \u0438\u043c\u043f\u043b\u0430\u043d\u0442\u0430 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442\u0441\u044f \u043f\u043e \u0441\u0435\u0439 \u0434\u0435\u043d\u044c. \u041d\u0430\u0447\u0438\u043d\u0430\u044e\u0442\u0441\u044f \u0430\u0442\u0430\u043a\u0438 \u0441 \u0446\u0435\u043b\u0435\u0432\u043e\u0433\u043e \u0444\u0438\u0448\u0438\u043d\u0433\u0430 \u043d\u0430\u043b\u043e\u0433\u043e\u0432\u043e\u0439 \u0442\u0435\u043c\u0430\u0442\u0438\u043a\u0438. \n\n\ud83d\udfe3\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2026-31431 (CopyFail), \u0443\u0433\u0440\u043e\u0436\u0430\u044e\u0449\u0435\u0439 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0443 \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u0441\u0431\u043e\u0440\u043e\u043a Linux. \u041d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u0430 \u0443\u0433\u0440\u043e\u0437\u0430 \u0434\u043b\u044f \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043d\u044b\u0445 \u0441\u0440\u0435\u0434:  Docker, LXC \u0438 Kubernetes.\n\n\ud83d\udd35\u0412 \u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440\u0435 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 npm \u0431\u0443\u0448\u0443\u0435\u0442 \u044d\u043f\u0438\u0434\u0435\u043c\u0438\u044f Mini Shai-Hulud: \u0447\u0435\u0440\u0432\u044c \u043f\u043e\u0440\u0430\u0437\u0438\u043b \u043f\u0430\u043a\u0435\u0442\u044b SAP \u0438 intercom. \u0412\u0435\u0440\u043e\u044f\u0442\u043d\u043e \u0442\u0435 \u0436\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u043f\u0430\u043a\u0435\u0442\u044b lightning \u0432 PyPi. TTPs \u043f\u043e\u0445\u043e\u0436\u0438 \u043d\u0430 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0443 TeamPCP.\n\n\ud83d\udfe3\u0413\u0440\u0443\u043f\u043f\u0430 HeartlessSoul, \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043d\u0430\u044f \u043e\u0441\u0435\u043d\u044c\u044e 2025 \u0433\u043e\u0434\u0430, \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0430\u0432\u0438\u0430\u0446\u0438\u043e\u043d\u043d\u0443\u044e \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u043e\u0441\u0442\u044c \u0438 \u0432 \u0447\u0438\u0441\u043b\u0435 \u043f\u043e\u0445\u0438\u0449\u0430\u0435\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0434\u0435\u043b\u0430\u0435\u0442 \u043e\u0441\u043e\u0431\u044b\u0439 \u0430\u043a\u0446\u0435\u043d\u0442 \u043d\u0430 \u0444\u0430\u0439\u043b\u044b \u0433\u0435\u043e\u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c. \u041f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u0435\u043d \u043f\u043e\u0434\u0445\u043e\u0434 \u043a \u0442\u0430\u0440\u0433\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044e: \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 \u0440\u0435\u043a\u043b\u0430\u043c\u0438\u0440\u0443\u0435\u0442 \u0441\u0430\u0439\u0442\u044b-\u0444\u0430\u043b\u044c\u0448\u0438\u0432\u043a\u0438 \u0441 \u0442\u0440\u043e\u044f\u043d\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u041f\u041e \u0434\u043b\u044f \u0430\u0432\u0438\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c.\n\n\ud83d\udfe3\u0412\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0438 \u0442\u043e\u0436\u0435 \u0432\u043e\u043b\u043d\u0443\u044e\u0442\u0441\u044f \u043e \u043f\u043e\u0441\u0442\u043a\u0432\u0430\u043d\u0442\u043e\u0432\u043e\u0439 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0438 \u2014 \u043d\u043e\u0432\u044b\u0439 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043b\u044c\u0449\u0438\u043a Kyber \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0432 \u0441\u0432\u043e\u0435\u0439 \u0440\u0430\u0431\u043e\u0442\u0435 \u0433\u0438\u0431\u0440\u0438\u0434\u043d\u044b\u0439 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c \u0441 \u041f\u041a\u0428.\n\n\ud83d\udd35\u041e\u0433\u0440\u043e\u043c\u043d\u044b\u0439 150-\u0441\u0442\u0440\u0430\u043d\u0438\u0447\u043d\u044b\u0439 \u043e\u0442\u0447\u0435\u0442 \u043e \u0441\u043b\u043e\u0436\u043d\u043e\u043c \u0412\u041f\u041e EasterBunny (pdf) \u0438 TTPs APT29/DarkHalo, \u0435\u0433\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u044e\u0449\u0435\u0439. \u0421\u0440\u0435\u0434\u0438 \u043b\u044e\u0431\u043e\u043f\u044b\u0442\u043d\u044b\u0445 \u0434\u0435\u0442\u0430\u043b\u0435\u0439 \u2014 \u0436\u0451\u0441\u0442\u043a\u0430\u044f \u043f\u0440\u0438\u0432\u044f\u0437\u043a\u0430 \u0438\u043c\u043f\u043b\u0430\u043d\u0442\u0430 \u043a \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0443, \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u043d \u043d\u0430\u0446\u0435\u043b\u0435\u043d, \u043d\u0430 \u0434\u0440\u0443\u0433\u0438\u0445 \u043c\u0430\u0448\u0438\u043d\u0430\u0445 \u043f\u0440\u043e\u0441\u0442\u043e \u043d\u0435 \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u0441\u044f.\n\n\ud83d\udfe3\u041d\u043e\u0432\u044b\u0435 \u0440\u0430\u0437\u043d\u043e\u0432\u0438\u0434\u043d\u043e\u0441\u0442\u0438 ClickFix: \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u043a\u043e\u043c\u0430\u043d\u0434 cmdkey \u0438 regsvr32 \u0434\u043b\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u0412\u041f\u041e.\n\n\ud83d\udd35\u0417\u0430\u043a\u0440\u044b\u0442\u0430\u044f \u0432 \u0430\u043f\u0440\u0435\u043b\u044c\u0441\u043a\u043e\u043c Patch Tuesday CVE-2026-32202, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u0443\u0442\u0435\u0447\u043a\u0435 \u0445\u044d\u0448\u0435\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u0442\u0435\u043f\u0435\u0440\u044c \u043f\u043e\u043c\u0435\u0447\u0435\u043d\u0430 \u043a\u0430\u043a \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u0430\u044f. \u0414\u0435\u0444\u0435\u043a\u0442 \u0432\u043e\u0437\u043d\u0438\u043a \u0438\u0437-\u0437\u0430 \u043d\u0435\u043f\u043e\u043b\u043d\u043e\u0433\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0444\u0435\u0432\u0440\u0430\u043b\u044c\u0441\u043a\u043e\u0433\u043e \u0437\u0438\u0440\u043e\u0434\u0435\u044f CVE-2026-21510.\n\n\ud83d\udfe3\u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u0430\u044f \u0438\u0441\u0442\u043e\u0440\u0438\u044f \u2014 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043f\u043b\u0430\u0433\u0438\u043d \u0434\u043b\u044f WordPress \u0431\u044b\u043b \u0438\u0437\u0433\u043e\u0442\u043e\u0432\u043b\u0435\u043d \u0438\u0437 \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 \u0435\u0449\u0435 \u0432 2020 \u0433\u043e\u0434\u0443, \u043d\u043e \u043e\u0431\u0437\u0430\u0432\u0451\u043b\u0441\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c\u044e \u0442\u043e\u043b\u044c\u043a\u043e \u0432 2026. \n\n\ud83d\udd35\u0420\u0430\u0437\u0431\u043e\u0440 \u043c\u0430\u0441\u0441\u043e\u0432\u043e\u0439 \u0433\u043b\u043e\u0431\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u043f\u0430\u043c-\u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 \u0441 \u0440\u0430\u0441\u0441\u044b\u043b\u043a\u043e\u0439 \u0444\u0430\u043b\u044c\u0448\u0438\u0432\u044b\u0445 SMS \u043e\u0431 \u043e\u043f\u043b\u0430\u0442\u0435 \u0434\u043e\u0440\u043e\u0436\u043d\u044b\u0445 \u043f\u043e\u0448\u043b\u0438\u043d \u0438 \u0448\u0442\u0440\u0430\u0444\u043e\u0432. \u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0436\u0435\u0440\u0442\u0432 \u0437\u0430\u043c\u0430\u043d\u0438\u0432\u0430\u044e\u0442 \u043d\u0430 \u0444\u0430\u043b\u044c\u0448\u0438\u0432\u044b\u0435 \u043f\u043b\u0430\u0442\u0451\u0436\u043d\u044b\u0435 \u0441\u0430\u0439\u0442\u044b \u0438 \u0441\u0430\u0439\u0442\u044b, \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0438\u0435 \u0412\u041f\u041e.\n\n\ud83d\udfe2\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2026-41940 \u0432 \u043f\u0430\u043d\u0435\u043b\u044f\u0445 cPanel \u0438 WHM, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0430\u0434\u043c\u0438\u043d\u0441\u043a\u0438\u0435 \u043f\u0440\u0430\u0432\u0430 \u0431\u0435\u0437 \u0432\u0441\u044f\u043a\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438 \u0435\u0449\u0451 \u0434\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f. \u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0441\u0442\u044c cPanel, \u044d\u0442\u043e \u0432\u0435\u0441\u044c\u043c\u0430 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u043e \u2014 \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c\u0441\u044f \u043d\u0443\u0436\u043d\u043e \u0432 \u0441\u0440\u043e\u0447\u043d\u043e\u043c \u043f\u043e\u0440\u044f\u0434\u043a\u0435. \n\n\ud83d\udfe3\u041d\u0435\u043e\u0436\u0438\u0434\u0430\u043d\u043d\u043e\u0435 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0435 \u0433\u0435\u043e\u0433\u0440\u0430\u0444\u0438\u0438 \u0441\u043a\u0430\u043c-\u0446\u0435\u043d\u0442\u0440\u043e\u0432 (\u0438 \u0431\u043e\u0440\u044c\u0431\u044b \u0441 \u043d\u0438\u043c\u0438) \u2014 \u0434\u0435\u0432\u044f\u0442\u044c \u043c\u043e\u0448\u0435\u043d\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043e\u0444\u0438\u0441\u043e\u0432 \u0437\u0430\u043a\u0440\u044b\u043b\u0438 \u0432 \u0414\u0443\u0431\u0430\u0435.\n\n#\u0434\u0430\u0439\u0434\u0436\u0435\u0441\u0442 #APT @\u041f2\u0422", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "3adc5f55-747b-4d44-8781-8770df2b68ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:44:28+00:00", "type": "seen", "source": "https://t.me/kasperskyb2b/2158", "content": "\ud83d\udc40 \u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f APT \u0438 \u043d\u043e\u0432\u043e\u0441\u0442\u0438 \u0418\u0411 \u0437\u0430 \u043d\u0435\u0434\u0435\u043b\u044e\n\n\ud83d\udfe2\u0412 \u0430\u0442\u0430\u043a\u0430\u0445 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 Silver Fox \u043d\u0430 \u043e\u0440\u0433\u0430\u043d\u0437\u0438\u0430\u0446\u0438\u0438 \u0432 \u0420\u0424 \u0438 \u0432 \u0418\u043d\u0434\u0438\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d \u043d\u043e\u0432\u044b\u0439 \u0431\u044d\u043a\u0434\u043e\u0440 ABCDoor. \u0420\u0435\u0442\u0440\u043e\u0441\u043f\u0435\u043a\u0442\u0438\u0432\u043d\u044b\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u043b \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c 7 \u0432\u0435\u0440\u0441\u0438\u0439 \u0412\u041f\u041e, \u043f\u0435\u0440\u0432\u0430\u044f \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0434\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0430\u0436 2024 \u0433\u043e\u0434\u043e\u043c, \u043d\u043e \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u0435 \u0438\u043c\u043f\u043b\u0430\u043d\u0442\u0430 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442\u0441\u044f \u043f\u043e \u0441\u0435\u0439 \u0434\u0435\u043d\u044c. \u041d\u0430\u0447\u0438\u043d\u0430\u044e\u0442\u0441\u044f \u0430\u0442\u0430\u043a\u0438 \u0441 \u0446\u0435\u043b\u0435\u0432\u043e\u0433\u043e \u0444\u0438\u0448\u0438\u043d\u0433\u0430 \u043d\u0430\u043b\u043e\u0433\u043e\u0432\u043e\u0439 \u0442\u0435\u043c\u0430\u0442\u0438\u043a\u0438. \n\n\ud83d\udfe3\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2026-31431 (CopyFail), \u0443\u0433\u0440\u043e\u0436\u0430\u044e\u0449\u0435\u0439 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0443 \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u0441\u0431\u043e\u0440\u043e\u043a Linux. \u041d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u0430 \u0443\u0433\u0440\u043e\u0437\u0430 \u0434\u043b\u044f \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043d\u044b\u0445 \u0441\u0440\u0435\u0434:  Docker, LXC \u0438 Kubernetes.\n\n\ud83d\udd35\u0412 \u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440\u0435 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 npm \u0431\u0443\u0448\u0443\u0435\u0442 \u044d\u043f\u0438\u0434\u0435\u043c\u0438\u044f Mini Shai-Hulud: \u0447\u0435\u0440\u0432\u044c \u043f\u043e\u0440\u0430\u0437\u0438\u043b \u043f\u0430\u043a\u0435\u0442\u044b SAP \u0438 intercom. \u0412\u0435\u0440\u043e\u044f\u0442\u043d\u043e \u0442\u0435 \u0436\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u043f\u0430\u043a\u0435\u0442\u044b lightning \u0432 PyPi. TTPs \u043f\u043e\u0445\u043e\u0436\u0438 \u043d\u0430 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0443 TeamPCP.\n\n\ud83d\udfe3\u0413\u0440\u0443\u043f\u043f\u0430 HeartlessSoul, \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043d\u0430\u044f \u043e\u0441\u0435\u043d\u044c\u044e 2025 \u0433\u043e\u0434\u0430, \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0430\u0432\u0438\u0430\u0446\u0438\u043e\u043d\u043d\u0443\u044e \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u043e\u0441\u0442\u044c \u0438 \u0432 \u0447\u0438\u0441\u043b\u0435 \u043f\u043e\u0445\u0438\u0449\u0430\u0435\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0434\u0435\u043b\u0430\u0435\u0442 \u043e\u0441\u043e\u0431\u044b\u0439 \u0430\u043a\u0446\u0435\u043d\u0442 \u043d\u0430 \u0444\u0430\u0439\u043b\u044b \u0433\u0435\u043e\u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c. \u041f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u0435\u043d \u043f\u043e\u0434\u0445\u043e\u0434 \u043a \u0442\u0430\u0440\u0433\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044e: \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 \u0440\u0435\u043a\u043b\u0430\u043c\u0438\u0440\u0443\u0435\u0442 \u0441\u0430\u0439\u0442\u044b-\u0444\u0430\u043b\u044c\u0448\u0438\u0432\u043a\u0438 \u0441 \u0442\u0440\u043e\u044f\u043d\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u041f\u041e \u0434\u043b\u044f \u0430\u0432\u0438\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c.\n\n\ud83d\udfe3\u0412\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0438 \u0442\u043e\u0436\u0435 \u0432\u043e\u043b\u043d\u0443\u044e\u0442\u0441\u044f \u043e \u043f\u043e\u0441\u0442\u043a\u0432\u0430\u043d\u0442\u043e\u0432\u043e\u0439 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0438 \u2014 \u043d\u043e\u0432\u044b\u0439 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043b\u044c\u0449\u0438\u043a Kyber \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0432 \u0441\u0432\u043e\u0435\u0439 \u0440\u0430\u0431\u043e\u0442\u0435 \u0433\u0438\u0431\u0440\u0438\u0434\u043d\u044b\u0439 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c \u0441 \u041f\u041a\u0428.\n\n\ud83d\udd35\u041e\u0433\u0440\u043e\u043c\u043d\u044b\u0439 150-\u0441\u0442\u0440\u0430\u043d\u0438\u0447\u043d\u044b\u0439 \u043e\u0442\u0447\u0435\u0442 \u043e \u0441\u043b\u043e\u0436\u043d\u043e\u043c \u0412\u041f\u041e EasterBunny (pdf) \u0438 TTPs APT29/DarkHalo, \u0435\u0433\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u044e\u0449\u0435\u0439. \u0421\u0440\u0435\u0434\u0438 \u043b\u044e\u0431\u043e\u043f\u044b\u0442\u043d\u044b\u0445 \u0434\u0435\u0442\u0430\u043b\u0435\u0439 \u2014 \u0436\u0451\u0441\u0442\u043a\u0430\u044f \u043f\u0440\u0438\u0432\u044f\u0437\u043a\u0430 \u0438\u043c\u043f\u043b\u0430\u043d\u0442\u0430 \u043a \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0443, \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u043d \u043d\u0430\u0446\u0435\u043b\u0435\u043d, \u043d\u0430 \u0434\u0440\u0443\u0433\u0438\u0445 \u043c\u0430\u0448\u0438\u043d\u0430\u0445 \u043f\u0440\u043e\u0441\u0442\u043e \u043d\u0435 \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u0441\u044f.\n\n\ud83d\udfe3\u041d\u043e\u0432\u044b\u0435 \u0440\u0430\u0437\u043d\u043e\u0432\u0438\u0434\u043d\u043e\u0441\u0442\u0438 ClickFix: \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u043a\u043e\u043c\u0430\u043d\u0434 cmdkey \u0438 regsvr32 \u0434\u043b\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u0412\u041f\u041e.\n\n\ud83d\udd35\u0417\u0430\u043a\u0440\u044b\u0442\u0430\u044f \u0432 \u0430\u043f\u0440\u0435\u043b\u044c\u0441\u043a\u043e\u043c Patch Tuesday CVE-2026-32202, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u0443\u0442\u0435\u0447\u043a\u0435 \u0445\u044d\u0448\u0435\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u0442\u0435\u043f\u0435\u0440\u044c \u043f\u043e\u043c\u0435\u0447\u0435\u043d\u0430 \u043a\u0430\u043a \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u0430\u044f. \u0414\u0435\u0444\u0435\u043a\u0442 \u0432\u043e\u0437\u043d\u0438\u043a \u0438\u0437-\u0437\u0430 \u043d\u0435\u043f\u043e\u043b\u043d\u043e\u0433\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0444\u0435\u0432\u0440\u0430\u043b\u044c\u0441\u043a\u043e\u0433\u043e \u0437\u0438\u0440\u043e\u0434\u0435\u044f CVE-2026-21510.\n\n\ud83d\udfe3\u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u0430\u044f \u0438\u0441\u0442\u043e\u0440\u0438\u044f \u2014 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043f\u043b\u0430\u0433\u0438\u043d \u0434\u043b\u044f WordPress \u0431\u044b\u043b \u0438\u0437\u0433\u043e\u0442\u043e\u0432\u043b\u0435\u043d \u0438\u0437 \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 \u0435\u0449\u0435 \u0432 2020 \u0433\u043e\u0434\u0443, \u043d\u043e \u043e\u0431\u0437\u0430\u0432\u0451\u043b\u0441\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c\u044e \u0442\u043e\u043b\u044c\u043a\u043e \u0432 2026. \n\n\ud83d\udd35\u0420\u0430\u0437\u0431\u043e\u0440 \u043c\u0430\u0441\u0441\u043e\u0432\u043e\u0439 \u0433\u043b\u043e\u0431\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u043f\u0430\u043c-\u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 \u0441 \u0440\u0430\u0441\u0441\u044b\u043b\u043a\u043e\u0439 \u0444\u0430\u043b\u044c\u0448\u0438\u0432\u044b\u0445 SMS \u043e\u0431 \u043e\u043f\u043b\u0430\u0442\u0435 \u0434\u043e\u0440\u043e\u0436\u043d\u044b\u0445 \u043f\u043e\u0448\u043b\u0438\u043d \u0438 \u0448\u0442\u0440\u0430\u0444\u043e\u0432. \u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0436\u0435\u0440\u0442\u0432 \u0437\u0430\u043c\u0430\u043d\u0438\u0432\u0430\u044e\u0442 \u043d\u0430 \u0444\u0430\u043b\u044c\u0448\u0438\u0432\u044b\u0435 \u043f\u043b\u0430\u0442\u0451\u0436\u043d\u044b\u0435 \u0441\u0430\u0439\u0442\u044b \u0438 \u0441\u0430\u0439\u0442\u044b, \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0438\u0435 \u0412\u041f\u041e.\n\n\ud83d\udfe2\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2026-41940 \u0432 \u043f\u0430\u043d\u0435\u043b\u044f\u0445 cPanel \u0438 WHM, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0430\u0434\u043c\u0438\u043d\u0441\u043a\u0438\u0435 \u043f\u0440\u0430\u0432\u0430 \u0431\u0435\u0437 \u0432\u0441\u044f\u043a\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438 \u0435\u0449\u0451 \u0434\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f. \u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0441\u0442\u044c cPanel, \u044d\u0442\u043e \u0432\u0435\u0441\u044c\u043c\u0430 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u043e \u2014 \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c\u0441\u044f \u043d\u0443\u0436\u043d\u043e \u0432 \u0441\u0440\u043e\u0447\u043d\u043e\u043c \u043f\u043e\u0440\u044f\u0434\u043a\u0435. \n\n\ud83d\udfe3\u041d\u0435\u043e\u0436\u0438\u0434\u0430\u043d\u043d\u043e\u0435 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0435 \u0433\u0435\u043e\u0433\u0440\u0430\u0444\u0438\u0438 \u0441\u043a\u0430\u043c-\u0446\u0435\u043d\u0442\u0440\u043e\u0432 (\u0438 \u0431\u043e\u0440\u044c\u0431\u044b \u0441 \u043d\u0438\u043c\u0438) \u2014 \u0434\u0435\u0432\u044f\u0442\u044c \u043c\u043e\u0448\u0435\u043d\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043e\u0444\u0438\u0441\u043e\u0432 \u0437\u0430\u043a\u0440\u044b\u043b\u0438 \u0432 \u0414\u0443\u0431\u0430\u0435.\n\n#\u0434\u0430\u0439\u0434\u0436\u0435\u0441\u0442 #APT @\u041f2\u0422", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "0b619cbb-1e53-4c1a-bdd9-49ea65b2b2a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:44:28+00:00", "type": "seen", "source": "https://t.me/kasperskyb2b/2158", "content": "\ud83d\udc40 \u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f APT \u0438 \u043d\u043e\u0432\u043e\u0441\u0442\u0438 \u0418\u0411 \u0437\u0430 \u043d\u0435\u0434\u0435\u043b\u044e\n\n\ud83d\udfe2\u0412 \u0430\u0442\u0430\u043a\u0430\u0445 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 Silver Fox \u043d\u0430 \u043e\u0440\u0433\u0430\u043d\u0437\u0438\u0430\u0446\u0438\u0438 \u0432 \u0420\u0424 \u0438 \u0432 \u0418\u043d\u0434\u0438\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d \u043d\u043e\u0432\u044b\u0439 \u0431\u044d\u043a\u0434\u043e\u0440 ABCDoor. \u0420\u0435\u0442\u0440\u043e\u0441\u043f\u0435\u043a\u0442\u0438\u0432\u043d\u044b\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u043b \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c 7 \u0432\u0435\u0440\u0441\u0438\u0439 \u0412\u041f\u041e, \u043f\u0435\u0440\u0432\u0430\u044f \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0434\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0430\u0436 2024 \u0433\u043e\u0434\u043e\u043c, \u043d\u043e \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u0435 \u0438\u043c\u043f\u043b\u0430\u043d\u0442\u0430 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442\u0441\u044f \u043f\u043e \u0441\u0435\u0439 \u0434\u0435\u043d\u044c. \u041d\u0430\u0447\u0438\u043d\u0430\u044e\u0442\u0441\u044f \u0430\u0442\u0430\u043a\u0438 \u0441 \u0446\u0435\u043b\u0435\u0432\u043e\u0433\u043e \u0444\u0438\u0448\u0438\u043d\u0433\u0430 \u043d\u0430\u043b\u043e\u0433\u043e\u0432\u043e\u0439 \u0442\u0435\u043c\u0430\u0442\u0438\u043a\u0438. \n\n\ud83d\udfe3\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2026-31431 (CopyFail), \u0443\u0433\u0440\u043e\u0436\u0430\u044e\u0449\u0435\u0439 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0443 \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u0441\u0431\u043e\u0440\u043e\u043a Linux. \u041d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u0430 \u0443\u0433\u0440\u043e\u0437\u0430 \u0434\u043b\u044f \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043d\u044b\u0445 \u0441\u0440\u0435\u0434:  Docker, LXC \u0438 Kubernetes.\n\n\ud83d\udd35\u0412 \u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440\u0435 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 npm \u0431\u0443\u0448\u0443\u0435\u0442 \u044d\u043f\u0438\u0434\u0435\u043c\u0438\u044f Mini Shai-Hulud: \u0447\u0435\u0440\u0432\u044c \u043f\u043e\u0440\u0430\u0437\u0438\u043b \u043f\u0430\u043a\u0435\u0442\u044b SAP \u0438 intercom. \u0412\u0435\u0440\u043e\u044f\u0442\u043d\u043e \u0442\u0435 \u0436\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u043f\u0430\u043a\u0435\u0442\u044b lightning \u0432 PyPi. TTPs \u043f\u043e\u0445\u043e\u0436\u0438 \u043d\u0430 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0443 TeamPCP.\n\n\ud83d\udfe3\u0413\u0440\u0443\u043f\u043f\u0430 HeartlessSoul, \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043d\u0430\u044f \u043e\u0441\u0435\u043d\u044c\u044e 2025 \u0433\u043e\u0434\u0430, \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0430\u0432\u0438\u0430\u0446\u0438\u043e\u043d\u043d\u0443\u044e \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u043e\u0441\u0442\u044c \u0438 \u0432 \u0447\u0438\u0441\u043b\u0435 \u043f\u043e\u0445\u0438\u0449\u0430\u0435\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0434\u0435\u043b\u0430\u0435\u0442 \u043e\u0441\u043e\u0431\u044b\u0439 \u0430\u043a\u0446\u0435\u043d\u0442 \u043d\u0430 \u0444\u0430\u0439\u043b\u044b \u0433\u0435\u043e\u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c. \u041f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u0435\u043d \u043f\u043e\u0434\u0445\u043e\u0434 \u043a \u0442\u0430\u0440\u0433\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044e: \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 \u0440\u0435\u043a\u043b\u0430\u043c\u0438\u0440\u0443\u0435\u0442 \u0441\u0430\u0439\u0442\u044b-\u0444\u0430\u043b\u044c\u0448\u0438\u0432\u043a\u0438 \u0441 \u0442\u0440\u043e\u044f\u043d\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u041f\u041e \u0434\u043b\u044f \u0430\u0432\u0438\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c.\n\n\ud83d\udfe3\u0412\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0438 \u0442\u043e\u0436\u0435 \u0432\u043e\u043b\u043d\u0443\u044e\u0442\u0441\u044f \u043e \u043f\u043e\u0441\u0442\u043a\u0432\u0430\u043d\u0442\u043e\u0432\u043e\u0439 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0438 \u2014 \u043d\u043e\u0432\u044b\u0439 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043b\u044c\u0449\u0438\u043a Kyber \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0432 \u0441\u0432\u043e\u0435\u0439 \u0440\u0430\u0431\u043e\u0442\u0435 \u0433\u0438\u0431\u0440\u0438\u0434\u043d\u044b\u0439 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c \u0441 \u041f\u041a\u0428.\n\n\ud83d\udd35\u041e\u0433\u0440\u043e\u043c\u043d\u044b\u0439 150-\u0441\u0442\u0440\u0430\u043d\u0438\u0447\u043d\u044b\u0439 \u043e\u0442\u0447\u0435\u0442 \u043e \u0441\u043b\u043e\u0436\u043d\u043e\u043c \u0412\u041f\u041e EasterBunny (pdf) \u0438 TTPs APT29/DarkHalo, \u0435\u0433\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u044e\u0449\u0435\u0439. \u0421\u0440\u0435\u0434\u0438 \u043b\u044e\u0431\u043e\u043f\u044b\u0442\u043d\u044b\u0445 \u0434\u0435\u0442\u0430\u043b\u0435\u0439 \u2014 \u0436\u0451\u0441\u0442\u043a\u0430\u044f \u043f\u0440\u0438\u0432\u044f\u0437\u043a\u0430 \u0438\u043c\u043f\u043b\u0430\u043d\u0442\u0430 \u043a \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0443, \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u043d \u043d\u0430\u0446\u0435\u043b\u0435\u043d, \u043d\u0430 \u0434\u0440\u0443\u0433\u0438\u0445 \u043c\u0430\u0448\u0438\u043d\u0430\u0445 \u043f\u0440\u043e\u0441\u0442\u043e \u043d\u0435 \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u0441\u044f.\n\n\ud83d\udfe3\u041d\u043e\u0432\u044b\u0435 \u0440\u0430\u0437\u043d\u043e\u0432\u0438\u0434\u043d\u043e\u0441\u0442\u0438 ClickFix: \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u043a\u043e\u043c\u0430\u043d\u0434 cmdkey \u0438 regsvr32 \u0434\u043b\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u0412\u041f\u041e.\n\n\ud83d\udd35\u0417\u0430\u043a\u0440\u044b\u0442\u0430\u044f \u0432 \u0430\u043f\u0440\u0435\u043b\u044c\u0441\u043a\u043e\u043c Patch Tuesday CVE-2026-32202, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u0443\u0442\u0435\u0447\u043a\u0435 \u0445\u044d\u0448\u0435\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u0442\u0435\u043f\u0435\u0440\u044c \u043f\u043e\u043c\u0435\u0447\u0435\u043d\u0430 \u043a\u0430\u043a \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u0430\u044f. \u0414\u0435\u0444\u0435\u043a\u0442 \u0432\u043e\u0437\u043d\u0438\u043a \u0438\u0437-\u0437\u0430 \u043d\u0435\u043f\u043e\u043b\u043d\u043e\u0433\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0444\u0435\u0432\u0440\u0430\u043b\u044c\u0441\u043a\u043e\u0433\u043e \u0437\u0438\u0440\u043e\u0434\u0435\u044f CVE-2026-21510.\n\n\ud83d\udfe3\u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u0430\u044f \u0438\u0441\u0442\u043e\u0440\u0438\u044f \u2014 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043f\u043b\u0430\u0433\u0438\u043d \u0434\u043b\u044f WordPress \u0431\u044b\u043b \u0438\u0437\u0433\u043e\u0442\u043e\u0432\u043b\u0435\u043d \u0438\u0437 \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 \u0435\u0449\u0435 \u0432 2020 \u0433\u043e\u0434\u0443, \u043d\u043e \u043e\u0431\u0437\u0430\u0432\u0451\u043b\u0441\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c\u044e \u0442\u043e\u043b\u044c\u043a\u043e \u0432 2026. \n\n\ud83d\udd35\u0420\u0430\u0437\u0431\u043e\u0440 \u043c\u0430\u0441\u0441\u043e\u0432\u043e\u0439 \u0433\u043b\u043e\u0431\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u043f\u0430\u043c-\u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 \u0441 \u0440\u0430\u0441\u0441\u044b\u043b\u043a\u043e\u0439 \u0444\u0430\u043b\u044c\u0448\u0438\u0432\u044b\u0445 SMS \u043e\u0431 \u043e\u043f\u043b\u0430\u0442\u0435 \u0434\u043e\u0440\u043e\u0436\u043d\u044b\u0445 \u043f\u043e\u0448\u043b\u0438\u043d \u0438 \u0448\u0442\u0440\u0430\u0444\u043e\u0432. \u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0436\u0435\u0440\u0442\u0432 \u0437\u0430\u043c\u0430\u043d\u0438\u0432\u0430\u044e\u0442 \u043d\u0430 \u0444\u0430\u043b\u044c\u0448\u0438\u0432\u044b\u0435 \u043f\u043b\u0430\u0442\u0451\u0436\u043d\u044b\u0435 \u0441\u0430\u0439\u0442\u044b \u0438 \u0441\u0430\u0439\u0442\u044b, \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0438\u0435 \u0412\u041f\u041e.\n\n\ud83d\udfe2\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2026-41940 \u0432 \u043f\u0430\u043d\u0435\u043b\u044f\u0445 cPanel \u0438 WHM, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0430\u0434\u043c\u0438\u043d\u0441\u043a\u0438\u0435 \u043f\u0440\u0430\u0432\u0430 \u0431\u0435\u0437 \u0432\u0441\u044f\u043a\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438 \u0435\u0449\u0451 \u0434\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f. \u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0441\u0442\u044c cPanel, \u044d\u0442\u043e \u0432\u0435\u0441\u044c\u043c\u0430 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u043e \u2014 \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c\u0441\u044f \u043d\u0443\u0436\u043d\u043e \u0432 \u0441\u0440\u043e\u0447\u043d\u043e\u043c \u043f\u043e\u0440\u044f\u0434\u043a\u0435. \n\n\ud83d\udfe3\u041d\u0435\u043e\u0436\u0438\u0434\u0430\u043d\u043d\u043e\u0435 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0435 \u0433\u0435\u043e\u0433\u0440\u0430\u0444\u0438\u0438 \u0441\u043a\u0430\u043c-\u0446\u0435\u043d\u0442\u0440\u043e\u0432 (\u0438 \u0431\u043e\u0440\u044c\u0431\u044b \u0441 \u043d\u0438\u043c\u0438) \u2014 \u0434\u0435\u0432\u044f\u0442\u044c \u043c\u043e\u0448\u0435\u043d\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043e\u0444\u0438\u0441\u043e\u0432 \u0437\u0430\u043a\u0440\u044b\u043b\u0438 \u0432 \u0414\u0443\u0431\u0430\u0435.\n\n#\u0434\u0430\u0439\u0434\u0436\u0435\u0441\u0442 #APT @\u041f2\u0422", "vulnerability": "CVE-2026-21510", "author": {"login": "automation"}}, {"uuid": "c942066a-ad1e-4662-8048-ce5364165df1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:44:28+00:00", "type": "seen", "source": "https://t.me/kasperskyb2b/2158", "content": "\ud83d\udc40 \u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f APT \u0438 \u043d\u043e\u0432\u043e\u0441\u0442\u0438 \u0418\u0411 \u0437\u0430 \u043d\u0435\u0434\u0435\u043b\u044e\n\n\ud83d\udfe2\u0412 \u0430\u0442\u0430\u043a\u0430\u0445 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 Silver Fox \u043d\u0430 \u043e\u0440\u0433\u0430\u043d\u0437\u0438\u0430\u0446\u0438\u0438 \u0432 \u0420\u0424 \u0438 \u0432 \u0418\u043d\u0434\u0438\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d \u043d\u043e\u0432\u044b\u0439 \u0431\u044d\u043a\u0434\u043e\u0440 ABCDoor. \u0420\u0435\u0442\u0440\u043e\u0441\u043f\u0435\u043a\u0442\u0438\u0432\u043d\u044b\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u043b \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c 7 \u0432\u0435\u0440\u0441\u0438\u0439 \u0412\u041f\u041e, \u043f\u0435\u0440\u0432\u0430\u044f \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0434\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0430\u0436 2024 \u0433\u043e\u0434\u043e\u043c, \u043d\u043e \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u0435 \u0438\u043c\u043f\u043b\u0430\u043d\u0442\u0430 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442\u0441\u044f \u043f\u043e \u0441\u0435\u0439 \u0434\u0435\u043d\u044c. \u041d\u0430\u0447\u0438\u043d\u0430\u044e\u0442\u0441\u044f \u0430\u0442\u0430\u043a\u0438 \u0441 \u0446\u0435\u043b\u0435\u0432\u043e\u0433\u043e \u0444\u0438\u0448\u0438\u043d\u0433\u0430 \u043d\u0430\u043b\u043e\u0433\u043e\u0432\u043e\u0439 \u0442\u0435\u043c\u0430\u0442\u0438\u043a\u0438. \n\n\ud83d\udfe3\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2026-31431 (CopyFail), \u0443\u0433\u0440\u043e\u0436\u0430\u044e\u0449\u0435\u0439 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0443 \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u0441\u0431\u043e\u0440\u043e\u043a Linux. \u041d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u0430 \u0443\u0433\u0440\u043e\u0437\u0430 \u0434\u043b\u044f \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043d\u044b\u0445 \u0441\u0440\u0435\u0434:  Docker, LXC \u0438 Kubernetes.\n\n\ud83d\udd35\u0412 \u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440\u0435 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 npm \u0431\u0443\u0448\u0443\u0435\u0442 \u044d\u043f\u0438\u0434\u0435\u043c\u0438\u044f Mini Shai-Hulud: \u0447\u0435\u0440\u0432\u044c \u043f\u043e\u0440\u0430\u0437\u0438\u043b \u043f\u0430\u043a\u0435\u0442\u044b SAP \u0438 intercom. \u0412\u0435\u0440\u043e\u044f\u0442\u043d\u043e \u0442\u0435 \u0436\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u043f\u0430\u043a\u0435\u0442\u044b lightning \u0432 PyPi. TTPs \u043f\u043e\u0445\u043e\u0436\u0438 \u043d\u0430 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0443 TeamPCP.\n\n\ud83d\udfe3\u0413\u0440\u0443\u043f\u043f\u0430 HeartlessSoul, \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043d\u0430\u044f \u043e\u0441\u0435\u043d\u044c\u044e 2025 \u0433\u043e\u0434\u0430, \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0430\u0432\u0438\u0430\u0446\u0438\u043e\u043d\u043d\u0443\u044e \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u043e\u0441\u0442\u044c \u0438 \u0432 \u0447\u0438\u0441\u043b\u0435 \u043f\u043e\u0445\u0438\u0449\u0430\u0435\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0434\u0435\u043b\u0430\u0435\u0442 \u043e\u0441\u043e\u0431\u044b\u0439 \u0430\u043a\u0446\u0435\u043d\u0442 \u043d\u0430 \u0444\u0430\u0439\u043b\u044b \u0433\u0435\u043e\u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c. \u041f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u0435\u043d \u043f\u043e\u0434\u0445\u043e\u0434 \u043a \u0442\u0430\u0440\u0433\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044e: \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 \u0440\u0435\u043a\u043b\u0430\u043c\u0438\u0440\u0443\u0435\u0442 \u0441\u0430\u0439\u0442\u044b-\u0444\u0430\u043b\u044c\u0448\u0438\u0432\u043a\u0438 \u0441 \u0442\u0440\u043e\u044f\u043d\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u041f\u041e \u0434\u043b\u044f \u0430\u0432\u0438\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c.\n\n\ud83d\udfe3\u0412\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0438 \u0442\u043e\u0436\u0435 \u0432\u043e\u043b\u043d\u0443\u044e\u0442\u0441\u044f \u043e \u043f\u043e\u0441\u0442\u043a\u0432\u0430\u043d\u0442\u043e\u0432\u043e\u0439 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0438 \u2014 \u043d\u043e\u0432\u044b\u0439 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043b\u044c\u0449\u0438\u043a Kyber \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0432 \u0441\u0432\u043e\u0435\u0439 \u0440\u0430\u0431\u043e\u0442\u0435 \u0433\u0438\u0431\u0440\u0438\u0434\u043d\u044b\u0439 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c \u0441 \u041f\u041a\u0428.\n\n\ud83d\udd35\u041e\u0433\u0440\u043e\u043c\u043d\u044b\u0439 150-\u0441\u0442\u0440\u0430\u043d\u0438\u0447\u043d\u044b\u0439 \u043e\u0442\u0447\u0435\u0442 \u043e \u0441\u043b\u043e\u0436\u043d\u043e\u043c \u0412\u041f\u041e EasterBunny (pdf) \u0438 TTPs APT29/DarkHalo, \u0435\u0433\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u044e\u0449\u0435\u0439. \u0421\u0440\u0435\u0434\u0438 \u043b\u044e\u0431\u043e\u043f\u044b\u0442\u043d\u044b\u0445 \u0434\u0435\u0442\u0430\u043b\u0435\u0439 \u2014 \u0436\u0451\u0441\u0442\u043a\u0430\u044f \u043f\u0440\u0438\u0432\u044f\u0437\u043a\u0430 \u0438\u043c\u043f\u043b\u0430\u043d\u0442\u0430 \u043a \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0443, \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u043d \u043d\u0430\u0446\u0435\u043b\u0435\u043d, \u043d\u0430 \u0434\u0440\u0443\u0433\u0438\u0445 \u043c\u0430\u0448\u0438\u043d\u0430\u0445 \u043f\u0440\u043e\u0441\u0442\u043e \u043d\u0435 \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u0441\u044f.\n\n\ud83d\udfe3\u041d\u043e\u0432\u044b\u0435 \u0440\u0430\u0437\u043d\u043e\u0432\u0438\u0434\u043d\u043e\u0441\u0442\u0438 ClickFix: \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u043a\u043e\u043c\u0430\u043d\u0434 cmdkey \u0438 regsvr32 \u0434\u043b\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u0412\u041f\u041e.\n\n\ud83d\udd35\u0417\u0430\u043a\u0440\u044b\u0442\u0430\u044f \u0432 \u0430\u043f\u0440\u0435\u043b\u044c\u0441\u043a\u043e\u043c Patch Tuesday CVE-2026-32202, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u0443\u0442\u0435\u0447\u043a\u0435 \u0445\u044d\u0448\u0435\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u0442\u0435\u043f\u0435\u0440\u044c \u043f\u043e\u043c\u0435\u0447\u0435\u043d\u0430 \u043a\u0430\u043a \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u0430\u044f. \u0414\u0435\u0444\u0435\u043a\u0442 \u0432\u043e\u0437\u043d\u0438\u043a \u0438\u0437-\u0437\u0430 \u043d\u0435\u043f\u043e\u043b\u043d\u043e\u0433\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0444\u0435\u0432\u0440\u0430\u043b\u044c\u0441\u043a\u043e\u0433\u043e \u0437\u0438\u0440\u043e\u0434\u0435\u044f CVE-2026-21510.\n\n\ud83d\udfe3\u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u0430\u044f \u0438\u0441\u0442\u043e\u0440\u0438\u044f \u2014 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043f\u043b\u0430\u0433\u0438\u043d \u0434\u043b\u044f WordPress \u0431\u044b\u043b \u0438\u0437\u0433\u043e\u0442\u043e\u0432\u043b\u0435\u043d \u0438\u0437 \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 \u0435\u0449\u0435 \u0432 2020 \u0433\u043e\u0434\u0443, \u043d\u043e \u043e\u0431\u0437\u0430\u0432\u0451\u043b\u0441\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c\u044e \u0442\u043e\u043b\u044c\u043a\u043e \u0432 2026. \n\n\ud83d\udd35\u0420\u0430\u0437\u0431\u043e\u0440 \u043c\u0430\u0441\u0441\u043e\u0432\u043e\u0439 \u0433\u043b\u043e\u0431\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u043f\u0430\u043c-\u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 \u0441 \u0440\u0430\u0441\u0441\u044b\u043b\u043a\u043e\u0439 \u0444\u0430\u043b\u044c\u0448\u0438\u0432\u044b\u0445 SMS \u043e\u0431 \u043e\u043f\u043b\u0430\u0442\u0435 \u0434\u043e\u0440\u043e\u0436\u043d\u044b\u0445 \u043f\u043e\u0448\u043b\u0438\u043d \u0438 \u0448\u0442\u0440\u0430\u0444\u043e\u0432. \u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0436\u0435\u0440\u0442\u0432 \u0437\u0430\u043c\u0430\u043d\u0438\u0432\u0430\u044e\u0442 \u043d\u0430 \u0444\u0430\u043b\u044c\u0448\u0438\u0432\u044b\u0435 \u043f\u043b\u0430\u0442\u0451\u0436\u043d\u044b\u0435 \u0441\u0430\u0439\u0442\u044b \u0438 \u0441\u0430\u0439\u0442\u044b, \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0438\u0435 \u0412\u041f\u041e.\n\n\ud83d\udfe2\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2026-41940 \u0432 \u043f\u0430\u043d\u0435\u043b\u044f\u0445 cPanel \u0438 WHM, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0430\u0434\u043c\u0438\u043d\u0441\u043a\u0438\u0435 \u043f\u0440\u0430\u0432\u0430 \u0431\u0435\u0437 \u0432\u0441\u044f\u043a\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438 \u0435\u0449\u0451 \u0434\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f. \u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0441\u0442\u044c cPanel, \u044d\u0442\u043e \u0432\u0435\u0441\u044c\u043c\u0430 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u043e \u2014 \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c\u0441\u044f \u043d\u0443\u0436\u043d\u043e \u0432 \u0441\u0440\u043e\u0447\u043d\u043e\u043c \u043f\u043e\u0440\u044f\u0434\u043a\u0435. \n\n\ud83d\udfe3\u041d\u0435\u043e\u0436\u0438\u0434\u0430\u043d\u043d\u043e\u0435 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0435 \u0433\u0435\u043e\u0433\u0440\u0430\u0444\u0438\u0438 \u0441\u043a\u0430\u043c-\u0446\u0435\u043d\u0442\u0440\u043e\u0432 (\u0438 \u0431\u043e\u0440\u044c\u0431\u044b \u0441 \u043d\u0438\u043c\u0438) \u2014 \u0434\u0435\u0432\u044f\u0442\u044c \u043c\u043e\u0448\u0435\u043d\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043e\u0444\u0438\u0441\u043e\u0432 \u0437\u0430\u043a\u0440\u044b\u043b\u0438 \u0432 \u0414\u0443\u0431\u0430\u0435.\n\n#\u0434\u0430\u0439\u0434\u0436\u0435\u0441\u0442 #APT @\u041f2\u0422", "vulnerability": "CVE-2026-32202", "author": {"login": "automation"}}, {"uuid": "ff788814-ba8e-42a1-94ea-79f8b35de160", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:42:49.459953+00:00", "type": "seen", "source": "https://bsky.app/profile/concisecyber.bsky.social/post/3mkzf2i632q2n", "content": "CVE-2025-55183 and CVE-2025-55184 in React RSC: DoS and Source Code Leak Risks After\u00a0React2Shell\n\nNew React Server Components flaws CVE-2025-55183 and CVE-2025-55184 can cause denial of service and source code disclosure in affected apps.", "vulnerability": "CVE-2025-55184", "author": {"login": "automation"}}, {"uuid": "3323476c-634a-460e-b6a0-b3d66f3a1c7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:42:49.240184+00:00", "type": "seen", "source": "https://bsky.app/profile/concisecyber.bsky.social/post/3mkzf2i632q2n", "content": "CVE-2025-55183 and CVE-2025-55184 in React RSC: DoS and Source Code Leak Risks After\u00a0React2Shell\n\nNew React Server Components flaws CVE-2025-55183 and CVE-2025-55184 can cause denial of service and source code disclosure in affected apps.", "vulnerability": "CVE-2025-55183", "author": {"login": "automation"}}, {"uuid": "0c85ec5b-4449-4e06-b5b0-d00226bf3fc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:36:43.160111+00:00", "type": "seen", "source": "https://bsky.app/profile/ronan.mastodon.ronandev.ovh.ap.brid.gy/post/3mkzekczzhrd2", "content": "https://security-tracker.debian.org/tracker/CVE-2026-31431\n\n\u00ab In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in [\u2026]", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "6f349e63-95f2-4221-b9e3-ac99d3f980d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:25:30.098308+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkze3iqqgx2g", "content": "\ud83d\udd34 CVE-2025-14320 - Critical (9.8)\n\nImproper neutralization of input during web page generation ('cross-site scripting') vulnerabilit...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2025-14320/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2025-14320", "author": {"login": "automation"}}, {"uuid": "f6c2691e-5db7-4743-841f-b9e03d1fd496", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:25:23.108472+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkze3bo7g72g", "content": "\ud83d\udd34 CVE-2026-7747 - Critical (9.8)\n\nA security flaw has been discovered in Totolink N300RH 3.2.4-B20220812. Affected by this vulnerab...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-7747/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-7747", "author": {"login": "automation"}}, {"uuid": "23b3b662-e8ad-4961-b53f-6f28e30642b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:16:43+00:00", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2026/CVE-2026-27176.yaml", "content": "", "vulnerability": "CVE-2026-27176", "author": {"login": "automation"}}, {"uuid": "d292fe1c-b3b8-4d88-984d-aaa3680c92ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:16:09.070432+00:00", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/116515547941636846", "content": "#OT #Advisory VDE-2026-048VEGA: Missing Authentication for critical function in VEGAPULS Bluetooth products\nVulnerable components expose sensitive information to unauthorized actors through an unsecured configuration interface. Vulnerable firmware releases contain an unsecured configuration interface that allows retrieval of sensitive information such as hashed credentials.#CVE CVE-2026-3323\nhttps://certvde.com/en/advisories/vde-2026-048/\n#CSAF https://vega.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-048.json", "vulnerability": "CVE-2026-3323", "author": {"login": "automation"}}, {"uuid": "e877fa86-fd06-443a-8b09-4bc4ec7bef6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:12:43.127078+00:00", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/116515534446133473", "content": "#OT #Advisory VDE-2026-047VEGA: Missing Authentication for critical function in VEGAPULS Air products\nVulnerable components expose sensitive information to unauthorized actors through an unsecured configuration interface. Vulnerable firmware releases contain an unsecured configuration interface that allows retrieval of sensitive information such as hashed credentials.#CVE CVE-2026-3323\nhttps://certvde.com/en/advisories/vde-2026-047/\n#CSAF https://vega.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-047.json", "vulnerability": "CVE-2026-3323", "author": {"login": "automation"}}, {"uuid": "6970ca5c-c247-4ea1-8da4-602f94c0c95d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:06:19.096284+00:00", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3mkzcps223g42", "content": "Over 40,000 Servers Compromised in Ongoing cPanel Exploitation The attacks likely target CVE-2026-41940, a recently patched zero-day leading to administrative access. The post Over 40,000 Servers C...\n\n#Vulnerabilities #cPanel #exploited\n\nOrigin | Interest | Match", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "960dd99c-c976-4ca6-bdf9-149c5625e4a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:04:14.398721+00:00", "type": "seen", "source": "https://bsky.app/profile/bitralix.com/post/3mkzcvi4sff2j", "content": "\ud83d\udea8 La CVE-2026-31431 es una vulnerabilidad cr\u00edtica en Linux que exige una respuesta r\u00e1pida, sobre todo en hosting y servidores\n\n\u2705 En Bitralix hemos preparado un an\u00e1lisis con contexto, mitigaci\u00f3n y una minigu\u00eda para Ubuntu:\nbitralix.es/eqygy\n\n#Bitralix #CVE202631431 #Linux #Hosting #Ubuntu #Seguridad", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "91632cb8-3f2c-4d1a-8870-b1a4e1e42245", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:00:32.046755+00:00", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkzcotcpov2m", "content": "Totolink N300RH (3.2.4-B20220812) faces a CRITICAL buffer overflow \u2014 remote, unauthenticated exploit now public. No patch: restrict device mgmt access &amp; monitor for updates. https://radar.offseq.com/threat/cve-2026-7747-buffer-overflow-in-totolink-n300rh-d88a1f5e #OffSeq #IoTSecurity", "vulnerability": "cve-2026-7747", "author": {"login": "automation"}}, {"uuid": "aa105ab7-b2a2-4999-b646-1bd02fcb761d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:00:32.031587+00:00", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116515486312761169", "content": "\ud83d\udd34 CRITICAL: CVE-2026-7747 in Totolink N300RH (v3.2.4-B20220812) \u2014 remote, unauthenticated buffer overflow via /cgi-bin/cstecgi.cgi Password param. Exploit is public; no patch yet. Restrict mgmt access! https://radar.offseq.com/threat/cve-2026-7747-buffer-overflow-in-totolink-n300rh-d88a1f5e #OffSeq #CVE20267747 #IoTSecurity", "vulnerability": "cve-2026-7747", "author": {"login": "automation"}}, {"uuid": "3353c297-7903-4005-9957-e7f92fcbf3a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:00:04+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82735", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a RK35xx-CopyFail-Hotfix\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a Qengineering\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a None\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-04 08:56:14\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nRK35xx CopyFail Hotfix: CVE-2026-31431 Patch for Ubuntu 24.04\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "3094207f-21de-419c-9377-4fefbdf78de8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:00:04+00:00", "type": "seen", "source": "Telegram/XcvE3DqJ3gfHbHlWBgCF8vzzdw-S4AP1Zm_7A_yYzHhyXEw", "content": "", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "31d92ac8-a1d3-49b6-baf0-9e8bf54340a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:00:04+00:00", "type": "seen", "source": "Telegram/XcvE3DqJ3gfHbHlWBgCF8vzzdw-S4AP1Zm_7A_yYzHhyXEw", "content": "", "vulnerability": "CVE-2019-13132", "author": {"login": "automation"}}, {"uuid": "1cce2d35-b780-40f6-aab3-59ffe96c3044", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:00:04+00:00", "type": "seen", "source": "Telegram/XcvE3DqJ3gfHbHlWBgCF8vzzdw-S4AP1Zm_7A_yYzHhyXEw", "content": "", "vulnerability": "CVE-2026-27778", "author": {"login": "automation"}}, {"uuid": "170a0985-eace-40fa-a302-e2aa032835af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T09:00:04+00:00", "type": "seen", "source": "Telegram/XcvE3DqJ3gfHbHlWBgCF8vzzdw-S4AP1Zm_7A_yYzHhyXEw", "content": "", "vulnerability": "CVE-2026-7669", "author": {"login": "automation"}}, {"uuid": "35a7f6ac-b64a-47ac-8aaa-cc891d95b620", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:46:16.538356+00:00", "type": "seen", "source": "https://bsky.app/profile/infosecbriefly.bsky.social/post/3mkzbvc2yuo2z", "content": "Over 40,000 servers have been compromised due to a critical cPanel zero-day vulnerability, CVE-2026-41940, allowing unauthorized administrative access.\n", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "872538d1-fd8b-4eee-ae21-9f1de74d4925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:45:23.978266+00:00", "type": "seen", "source": "https://bsky.app/profile/mfahlandt.bsky.social/post/3mkzbtsjhx52w", "content": "\u26a0\ufe0f Strimzi Kafka Operator 1.0.0: `v1` CRD API enforced, older APIs removed.\n- Argo CD v3.3.9/v3.2.11: Fixes critical vulnerability GHSA-3v3m-wc6v-x4x3.\n- Prometheus v3.11.3/v3.5.3: Fixes remote-read &amp; AzureAD OAuth vulnerabilities.\nFull breakdown:\n\nhttps://lwcn.dev/newsletter/2026-week-19/", "vulnerability": "GHSA-3v3m-wc6v-x4x3", "author": {"login": "automation"}}, {"uuid": "548d4389-e932-4ffe-94df-e4682b9edc5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:43:33.384038+00:00", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3mkzbqip3bh2e", "content": "Critical FreeBSD DHCP Flaw Enables Full System Takeover via Local Network\u00a0Attack\n\nIntroduction: A Silent Network Threat with Root-Level Consequences A newly disclosed vulnerability in FreeBSD has raised serious concerns across the cybersecurity community. This flaw, identified as CVE-2026-42511,\u2026", "vulnerability": "CVE-2026-42511", "author": {"login": "automation"}}, {"uuid": "4a9b500e-07c8-4954-8f32-cc638d52b7a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:41:43.757601+00:00", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3mkzbn3lrh22a", "content": "\ud83d\udea8 Critical flaw in CVE-2026-42369 affects GeoVision GV-VMS V20 (CVSS 10.0). Unauthenticated attackers can gain full SYSTEM access via the WebCam Server.  \n\n\ud83d\udd17 basefortify.eu/cve_reports/...  \n\n#CVE #CyberSecurity #GeoVision", "vulnerability": "CVE-2026-42369", "author": {"login": "automation"}}, {"uuid": "2d8afbe9-2ebc-4e45-b63c-bbe5b123330f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:41:43.094535+00:00", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3mkzbmysrs22a", "content": "\ud83d\udea8 Critical flaw in CVE-2026-42369 affects GeoVision GV-VMS V20 (CVSS 10.0). Unauthenticated attackers can gain full SYSTEM access via the WebCam Server.  \n\n\ud83d\udd17 basefortify.eu/cve_reports/...  \n\n#CVE #CyberSecurity #GeoVision", "vulnerability": "CVE-2026-42369", "author": {"login": "automation"}}, {"uuid": "c849bd34-f1b0-424c-bc55-f06ebcf4d98c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:41:41.153344+00:00", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3mkzbmxfeo22a", "content": "\ud83d\udea8 Critical flaw in CVE-2026-42369 affects GeoVision GV-VMS V20 (CVSS 10.0). Unauthenticated attackers can gain full SYSTEM access via the WebCam Server.  \n\n\ud83d\udd17 basefortify.eu/cve_reports/...  \n\n#CVE #CyberSecurity #GeoVision", "vulnerability": "CVE-2026-42369", "author": {"login": "automation"}}, {"uuid": "11f4aaf4-aa0b-40f1-b025-8a3c3e5c5a7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:39:55.202627+00:00", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/116515405426636916", "content": "#OT #Advisory VDE-2026-046VEGA: Unsecured Configuration Interface Allows Unauthorized Access Leading to Privilege Escalation\nVulnerable components expose sensitive information to unauthorized actors through an unsecured configuration interface. Vulnerable firmware releases contain an unsecured configuration interface that allows retrieval of sensitive information such as hashed credentials.#CVE CVE-2026-3323\nhttps://certvde.com/en/advisories/vde-2026-046/\n#CSAF https://vega.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-046.json", "vulnerability": "CVE-2026-3323", "author": {"login": "automation"}}, {"uuid": "1bb3387c-8918-4b42-a7ed-8e35402300e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:39:32.618452+00:00", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3mkzbjd4tlm2b", "content": "CVE-2026-31431\uff1a\u6211\u7528 DeepSeek \u590d\u73b0\u4e86 AI \u53d1\u73b0Copy Fail \u63d0\u6743\u7684\u5168\u8fc7\u7a0b - CVE-2026-31431: I used DeepSeek to reproduce the entire process of AI detecting Copy Fail privilege escalation.", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "42b9b615-8fe5-42be-82b1-1113627689bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:36:14.051058+00:00", "type": "seen", "source": "https://bsky.app/profile/serghei.bsky.social/post/3mkzbdbtal22m", "content": "A critical cPanel authentication bypass vulnerability (CVE-2026-41940)\u00a0is being exploited in widespread \"Sorry\" ransomware attacks days after the release of an\u00a0emergency update.\n\nwww.bleepingcomputer.com/news/securit...", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "ccff2ab2-3177-4207-95fe-fa7afdcf0888", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:32:21.956458+00:00", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mkzb4ho3ah2f", "content": "funadmin 7.1.0-rc6\u4ee5\u524d\u3067\u3001\u30d5\u30a1\u30a4\u30eb\u30a2\u30c3\u30d7\u30ed\u30fc\u30c9\u6a5f\u80fd\u306b\u4e0d\u5177\u5408\u3002\u30ea\u30e2\u30fc\u30c8\u304b\u3089\u4e0d\u6b63\u306a\u30d5\u30a1\u30a4\u30eb\u3092\u30a2\u30c3\u30d7\u30ed\u30fc\u30c9\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u3002\nCVE-2026-7733 CVSS 7.3 | HIGH", "vulnerability": "CVE-2026-7733", "author": {"login": "automation"}}, {"uuid": "285183a6-6c09-42ac-965b-744d45af2918", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:32:04+00:00", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-41242.yaml", "content": "", "vulnerability": "CVE-2025-41242", "author": {"login": "automation"}}, {"uuid": "7a6fce86-e176-4455-9844-04d34841035d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:19:00.579606+00:00", "type": "seen", "source": "https://bsky.app/profile/donwebmedia.bsky.social/post/3mkzaem72g62h", "content": "MetForm Pro XSS sin autenticaci\u00f3n: CVE-2026-1261\n\nCVE-2026-1261 expone un XSS almacenado sin autenticaci\u00f3n en MetForm Pro hasta v3.9.6. C\u00f3mo identificar si est\u00e1s afectado y c\u00f3mo remediar hoy mismo.\n\n#metformpro #xssalmacenado #cve20261261 #wordpressforms #seguridadwordpress", "vulnerability": "CVE-2026-1261", "author": {"login": "automation"}}, {"uuid": "8a9ee58a-4e86-4aaa-97d4-4a8e37272ffa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:11:30.032512+00:00", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mkz7x57ibs2o", "content": "CVE-2026-42511: Critical FreeBSD DHCP Flaw Grants Attackers Root Access \u2013 Patch Now! +\u00a0Video\n\nIntroduction: The Dynamic Host Configuration Protocol (DHCP) automates IP address assignment on networks, but a newly disclosed vulnerability in FreeBSD\u2019s default IPv4 DHCP client (dhclient) flips this\u2026", "vulnerability": "CVE-2026-42511", "author": {"login": "automation"}}, {"uuid": "1c988958-542d-49b5-a859-4dae0d6333d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:09:24.596841+00:00", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mkz7tck3r22i", "content": "Chrome 147\u3001Firefox 150\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u304c\u9806\u6b21\u914d\u4fe1\u958b\u59cb\n\n\u65b0\u3057\u3044Chrome 147\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3067\u306f\u300130\u4ef6\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4fee\u6b63\u304c\u9806\u6b21\u516c\u958b\u3055\u308c\u3066\u304a\u308a\u3001\u305d\u306e\u4e2d\u306b\u306f\u5916\u90e8\u306e\u7814\u7a76\u8005\u306b\u3088\u3063\u3066\u5831\u544a\u3055\u308c\u305f\u3001\u91cd\u5927\u306a\u89e3\u653e\u6e08\u307f\u30e1\u30e2\u30ea\u4f7f\u7528\uff08use-after-free\uff09\u306e\u8106\u5f31\u6027\u306b\u5bfe\u3059\u308b4\u4ef6\u306e\u4fee\u6b63\u304c\u542b\u307e\u308c\u3066\u3044\u307e\u3059\u3002\n\nCVE-2026-7363\u3001CVE-2026-7361\u3001CVE-2026-7344\u3001\u304a\u3088\u3073CVE-2026-7343\u3068\u3057\u3066\u8ffd\u8de1\u3055\u308c\u3066\u3044\u308b\u3053\u308c\u3089\u306e\u30d0\u30b0\u306f\u3001Canvas\u3001iOS\u3001\u30a2\u30af\u30bb\u30b7\u30d3\u30ea\u30c6\u30a3\u3001\u304a\u3088\u3073Views\u306e\u30d6\u30e9\u30a6\u30b6\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u307e\u3059\u3002", "vulnerability": "CVE-2026-7344", "author": {"login": "automation"}}, {"uuid": "3af52b3d-d199-439c-91a6-f30dfb9d3c3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:09:24.456595+00:00", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mkz7tck3r22i", "content": "Chrome 147\u3001Firefox 150\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u304c\u9806\u6b21\u914d\u4fe1\u958b\u59cb\n\n\u65b0\u3057\u3044Chrome 147\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3067\u306f\u300130\u4ef6\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4fee\u6b63\u304c\u9806\u6b21\u516c\u958b\u3055\u308c\u3066\u304a\u308a\u3001\u305d\u306e\u4e2d\u306b\u306f\u5916\u90e8\u306e\u7814\u7a76\u8005\u306b\u3088\u3063\u3066\u5831\u544a\u3055\u308c\u305f\u3001\u91cd\u5927\u306a\u89e3\u653e\u6e08\u307f\u30e1\u30e2\u30ea\u4f7f\u7528\uff08use-after-free\uff09\u306e\u8106\u5f31\u6027\u306b\u5bfe\u3059\u308b4\u4ef6\u306e\u4fee\u6b63\u304c\u542b\u307e\u308c\u3066\u3044\u307e\u3059\u3002\n\nCVE-2026-7363\u3001CVE-2026-7361\u3001CVE-2026-7344\u3001\u304a\u3088\u3073CVE-2026-7343\u3068\u3057\u3066\u8ffd\u8de1\u3055\u308c\u3066\u3044\u308b\u3053\u308c\u3089\u306e\u30d0\u30b0\u306f\u3001Canvas\u3001iOS\u3001\u30a2\u30af\u30bb\u30b7\u30d3\u30ea\u30c6\u30a3\u3001\u304a\u3088\u3073Views\u306e\u30d6\u30e9\u30a6\u30b6\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u307e\u3059\u3002", "vulnerability": "CVE-2026-7361", "author": {"login": "automation"}}, {"uuid": "d2407335-b138-4ae4-8be5-55973d627c22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:09:24.313674+00:00", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3mkz7tck3r22i", "content": "Chrome 147\u3001Firefox 150\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u304c\u9806\u6b21\u914d\u4fe1\u958b\u59cb\n\n\u65b0\u3057\u3044Chrome 147\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3067\u306f\u300130\u4ef6\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4fee\u6b63\u304c\u9806\u6b21\u516c\u958b\u3055\u308c\u3066\u304a\u308a\u3001\u305d\u306e\u4e2d\u306b\u306f\u5916\u90e8\u306e\u7814\u7a76\u8005\u306b\u3088\u3063\u3066\u5831\u544a\u3055\u308c\u305f\u3001\u91cd\u5927\u306a\u89e3\u653e\u6e08\u307f\u30e1\u30e2\u30ea\u4f7f\u7528\uff08use-after-free\uff09\u306e\u8106\u5f31\u6027\u306b\u5bfe\u3059\u308b4\u4ef6\u306e\u4fee\u6b63\u304c\u542b\u307e\u308c\u3066\u3044\u307e\u3059\u3002\n\nCVE-2026-7363\u3001CVE-2026-7361\u3001CVE-2026-7344\u3001\u304a\u3088\u3073CVE-2026-7343\u3068\u3057\u3066\u8ffd\u8de1\u3055\u308c\u3066\u3044\u308b\u3053\u308c\u3089\u306e\u30d0\u30b0\u306f\u3001Canvas\u3001iOS\u3001\u30a2\u30af\u30bb\u30b7\u30d3\u30ea\u30c6\u30a3\u3001\u304a\u3088\u3073Views\u306e\u30d6\u30e9\u30a6\u30b6\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u307e\u3059\u3002", "vulnerability": "CVE-2026-7363", "author": {"login": "automation"}}, {"uuid": "806ab10e-f3f5-4289-bba8-3d1f3f8e3f03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:08:49+00:00", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-critical-authentication-bypass-moveit-automation-cve-2026-4670-patch-immediately", "content": "", "vulnerability": "CVE-2026-4670", "author": {"login": "syspect"}}, {"uuid": "b817de7b-aaa1-44cb-a8ef-fd6049b78547", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:08:49+00:00", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-critical-authentication-bypass-moveit-automation-cve-2026-4670-patch-immediately", "content": "", "vulnerability": "CVE-2026-5174", "author": {"login": "syspect"}}, {"uuid": "bb0e9a66-aa47-4ae8-a5a5-f331db331830", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:04:31.036122+00:00", "type": "seen", "source": "https://ioc.exchange/users/sbeyer/statuses/116515265697196856", "content": "60 Sekunden Cyber KW18 2026, 27. April - 3. Mai:\nDaten von Kunden und Benutzern von Vimeo werden von der Gruppierung ShinyHunters ins Dark Net gestellt, Sicherheitsforscher finden mit Copy Fail eine seit 2017 (!) bestehende Schwachstelle (CVE-2026-31431), mit der man root-Zugriff auf allen bekannteren Linux-Distributionen erhalten kann, das NGO noyb klagt gegen die Hamburger https://podcasters.spotify.com/pod/show/60-sekunden-cyber/episodes/KW18-2026--27--April---3--Mai-e3ir1h5", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "fc155522-8d92-42ce-8bba-8d97d3326370", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:00:23+00:00", "type": "seen", "source": "Telegram/1H-F8sNdmZ1CBEEZIhVSpSRWs_og3EaiMpnijX5gRIEI-vI", "content": "", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "8e002c59-603a-4e85-9b92-2ac926c2a1cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T08:00:04+00:00", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/82731", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a copy-fail-CVE-2026-31431-shell\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a g1nt0n1x\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Shell\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-04 07:55:57\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nPoC shell exploit for CVE-2026-31431 (copy_fail) \u2014 Linux LPE via AF_ALG + splice page-cache overwrite. Single-shot, no race condition, kernel 4.9\u20136.18.\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "3ceffd20-c9ae-42fb-8598-2dacaa09812e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:57:13.728945+00:00", "type": "seen", "source": "https://bsky.app/profile/adriend.linuxtricks.fr/post/3mkz75n7g4s2s", "content": "Apr\u00e8s la vid\u00e9o sur la faille Copy Fail (CVE-2026-31431), je vous propose cette fois-ci une analyse technique EN FRANCAIS ! (car ce type de contenu manque)\nJ'y ai pass\u00e9 mon dimanche matin !\nClin d'oeil \u00e0 @ponceto91.bsky.social et @korben.info \nwww.linuxtricks.fr/news/10-logi...\n\n#CopyFail #Linux", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "49db8065-09f9-49eb-843c-ae56e2eff65b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:55:00+00:00", "type": "seen", "source": "https://cert.pl/en/posts/2026/05/CVE-2025-13605", "content": "", "vulnerability": "CVE-2025-13605", "author": {"login": "syspect"}}, {"uuid": "f77e327c-804b-43da-8e5b-69ce7e91845a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:30:55+00:00", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2026/CVE-2026-40105.yaml", "content": "", "vulnerability": "CVE-2026-40105", "author": {"login": "automation"}}, {"uuid": "6db20182-473f-433d-bef5-dd30f8c42b63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:30:31.831532+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkz5nwloem2p", "content": "CVE-2026-7731 - code-projects BloodBank Managing System get_state.php sql injection\nCVE ID : CVE-2026-7731\n \n Published : May 4, 2026, 4:15 a.m. | 2\u00a0hours, 5\u00a0minutes ago\n \n Description : A security vulnerability has been detected in code-projects BloodBank Managing System 1.0....", "vulnerability": "CVE-2026-7731", "author": {"login": "automation"}}, {"uuid": "08159aad-0b0c-4bdc-a771-f3fd527ea78e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:30:28.016407+00:00", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkz5ns63hh2o", "content": "CRITICAL: WebPros Comet Backup (20.11.0 \u2013 26.1.1, 26.2.1) has an IDOR flaw letting tenant admins impersonate end users across tenants. No patch yet \u2014 restrict admin rights &amp; monitor activity. https://radar.offseq.com/threat/cve-2026-29200-cwe-639-insecure-direct-object-refe-d3747bfb #OffSeq #CVE2...", "vulnerability": "cve-2026-29200", "author": {"login": "automation"}}, {"uuid": "cfbe9902-9872-4a82-8d3c-ad1d2a807646", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:30:25.921366+00:00", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116515132214621660", "content": "\ud83d\udea8 CVE-2026-29200: CRITICAL IDOR in WebPros Comet Backup (20.11.0 \u2013 26.1.1, 26.2.1) lets tenant admins impersonate any end user on the server. No patch yet \u2014 restrict admin access and monitor for suspicious cross-tenant activity. https://radar.offseq.com/threat/cve-2026-29200-cwe-639-insecure-direct-object-refe-d3747bfb #OffSeq #infosec #CVE202629200", "vulnerability": "cve-2026-29200", "author": {"login": "automation"}}, {"uuid": "3d88ffd7-31b5-427b-b4ed-11cb158b1af2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:25:31.526621+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkz5ey3uj52n", "content": "CVE-2026-7727 - Shandong Hoteam Software PDM Product Data Management System DataService GetQueryMachineGridOnePageData sql injection\nCVE ID : CVE-2026-7727\n \n Published : May 4, 2026, 5:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A vulnerability was determined in Shandong...", "vulnerability": "CVE-2026-7727", "author": {"login": "automation"}}, {"uuid": "2f47b9f9-6f71-4ec8-9192-20d0a78f656c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:21:37.421499+00:00", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116515097574632765", "content": "The severity is increased for this new vulnerability affecting MediaTek MT2735 and other products (CVE-2026-20449) https://vuldb.com/vuln/360939", "vulnerability": "CVE-2026-20449", "author": {"login": "automation"}}, {"uuid": "830f393c-256b-4a83-8239-7146b9138b15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:20:31.279467+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkz53zib7c2i", "content": "CVE-2026-7730 - privsim mcp-test-runner MCP index.ts child_process.spawn os command injection\nCVE ID : CVE-2026-7730\n \n Published : May 4, 2026, 5:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A weakness has been identified in privsim mcp-test-runner 0.2.0. Impacted is the ...", "vulnerability": "CVE-2026-7730", "author": {"login": "automation"}}, {"uuid": "91f2ac63-a47d-4fce-a731-8b81c2ca307b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:19:37.256007+00:00", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/3e01e7d3-c2be-4035-865c-115c5aef1b92", "content": "", "vulnerability": "CVE-2026-31431", "author": {"login": "adulau"}}, {"uuid": "538d5850-f21f-41dd-8c6a-76d09d9aa22e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:15:30.705141+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkz4t2yjau2q", "content": "CVE-2026-7729 - pixelsock directus-mcp MCP index.ts validateUrl server-side request forgery\nCVE ID : CVE-2026-7729\n \n Published : May 4, 2026, 5:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A security flaw has been discovered in pixelsock directus-mcp 1.0.0. This issue aff...", "vulnerability": "CVE-2026-7729", "author": {"login": "automation"}}, {"uuid": "794c70b1-9496-409f-adbb-d9657f01850d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:15:18.875973+00:00", "type": "seen", "source": "https://bsky.app/profile/samuelvermeulenpro.bsky.social/post/3mkz4soqgbg2e", "content": "#ActuLibre - Copy Fail (CVE-2026-31431) : Synth\u00e8se technique sur cette faille Linux \u00e0 lire sur\nhttps://www.linuxtricks.fr/news/10-logiciels-libres/600-copy-fail-cve-2026-31431-synthese-technique-sur-cette-faille-linux/", "vulnerability": "cve-2026-31431", "author": {"login": "automation"}}, {"uuid": "30ea18bc-f78c-4e63-a4e1-71b698ae88bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:14:02.181789+00:00", "type": "seen", "source": "https://bsky.app/profile/nuke86.rfeed.it/post/3mkz4qgp4fq2u", "content": "CVE-2026-41940: Il Bug CRLF di cPanel che ha Consegnato 44.000 Server al Ransomware \u201cSorry\u201d\nil blog: insicurezzadigitale.com/cve-2026-419...\n\n#cybersecurity #infosec #ransomware #zeroday", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "9ed986f3-df9f-43d1-8a65-03441f88a57a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:12:46.775184+00:00", "type": "seen", "source": "https://bsky.app/profile/mmmmmmpc.bsky.social/post/3mkz4o5vflk2j", "content": "Please Read: @suse.com response to #copyfail CVE-2026-31431 vulnerability:\n* It affects from SLES 12 SP5 to SLES 16\n* It affects Muti-Linux Support 8, 9 and 10\n* Patches have been released by SUSE Engineering\nPlease Patch!\nwww.suse.com/c/suse-respo...", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "d0ec173c-5109-46a7-803f-ebbd2d56046f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:10:30.238473+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkz4k4l3vs2p", "content": "CVE-2026-7728 - ryanjoachim mcp-rtfm MCP update_doc path traversal\nCVE ID : CVE-2026-7728\n \n Published : May 4, 2026, 5:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A vulnerability was identified in ryanjoachim mcp-rtfm 0.1.0. This vulnerability affects the function get_do...", "vulnerability": "CVE-2026-7728", "author": {"login": "automation"}}, {"uuid": "7a6f91ba-149f-453d-bae2-e6663c989195", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:05:29.723763+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkz4b64huq2p", "content": "CVE-2026-7725 - PrefectHQ prefect GitRepository Pull storage.py argument injection\nCVE ID : CVE-2026-7725\n \n Published : May 4, 2026, 5:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A vulnerability was found in PrefectHQ prefect up to 3.6.25.dev6. Affected by this issue is ...", "vulnerability": "CVE-2026-7725", "author": {"login": "automation"}}, {"uuid": "5c49e37f-0a2a-4000-b6d7-c263ea427eab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:02:15.631980+00:00", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3mkz43cgars2m", "content": "[RSS] Three Bugs Walk Into a PDF: Prototype Pollution, Served Cold\n\n\n starlabs.sg -&gt; \n\nCVE-2026-34621, CVE-2026-34622, CVE-2026-34626\n\n\nOriginal-&gt;", "vulnerability": "CVE-2026-34626", "author": {"login": "automation"}}, {"uuid": "233108e4-bcee-4698-952c-d28588f682ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:02:15.412622+00:00", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3mkz43cgars2m", "content": "[RSS] Three Bugs Walk Into a PDF: Prototype Pollution, Served Cold\n\n\n starlabs.sg -&gt; \n\nCVE-2026-34621, CVE-2026-34622, CVE-2026-34626\n\n\nOriginal-&gt;", "vulnerability": "CVE-2026-34622", "author": {"login": "automation"}}, {"uuid": "d16f5146-3912-4afd-aa1a-4de113eb72ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:02:15.235827+00:00", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3mkz43cgars2m", "content": "[RSS] Three Bugs Walk Into a PDF: Prototype Pollution, Served Cold\n\n\n starlabs.sg -&gt; \n\nCVE-2026-34621, CVE-2026-34622, CVE-2026-34626\n\n\nOriginal-&gt;", "vulnerability": "CVE-2026-34621", "author": {"login": "automation"}}, {"uuid": "15a098b6-fba3-4c3b-8772-60d4e7e22dbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:02:12.982888+00:00", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3mkz43caize2t", "content": "[RSS] A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day Leads to CVE-2026-32202\n\n\n www.akamai.com -&gt; \n\n\nOriginal-&gt;", "vulnerability": "CVE-2026-32202", "author": {"login": "automation"}}, {"uuid": "8d57d0f8-51a8-4688-96b7-a323bd327e79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:01:12.403297+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkz3zik3bs2i", "content": "CVE-2026-7723 - PrefectHQ prefect WebSocket Endpoint in missing authentication\nCVE ID : CVE-2026-7723\n \n Published : May 4, 2026, 3:16 a.m. | 3\u00a0hours, 4\u00a0minutes ago\n \n Description : A flaw has been found in PrefectHQ prefect up to 3.6.13. Affected is an unknown function of the...", "vulnerability": "CVE-2026-7723", "author": {"login": "automation"}}, {"uuid": "69501a29-d80c-45d4-ad2e-92b04f864d7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T07:00:11+00:00", "type": "seen", "source": "Telegram/Kpinjgfg7hU-Y0woYeGb9H2V371wI5HRa91l02rkOQqEx9k", "content": "", "vulnerability": "CVE-2026-27778", "author": {"login": "automation"}}, {"uuid": "e8a82d63-1d36-4340-91f9-8d48869c77e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T06:57:27.243018+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkz3srlohr2e", "content": "CVE-2026-7721 - Totolink WA300 cstecgi.cgi NTPSyncWithHost command injection\nCVE ID : CVE-2026-7721\n \n Published : May 4, 2026, 3:16 a.m. | 3\u00a0hours, 4\u00a0minutes ago\n \n Description : A security vulnerability has been detected in Totolink WA300 5.2cu.7112_B20190227. This affects t...", "vulnerability": "CVE-2026-7721", "author": {"login": "automation"}}, {"uuid": "89028a2a-d4ab-46b2-86e9-ee49ec2e1181", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T06:54:06.803114+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkz3msex6f2i", "content": "CVE-2026-7732 - code-projects BloodBank Managing System request_blood.php unrestricted upload\nCVE ID : CVE-2026-7732\n \n Published : May 4, 2026, 4:30 a.m. | 1\u00a0hour, 50\u00a0minutes ago\n \n Description : A vulnerability was detected in code-projects BloodBank Managing System 1.0. The...", "vulnerability": "CVE-2026-7732", "author": {"login": "automation"}}, {"uuid": "64c1a341-128b-4618-b765-4c3b8ac48e18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T06:51:06.810326+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkz3hedhnt2q", "content": "CVE-2026-7735 - osrg GoBGP AIGP Attribute bgp.go PathAttributeAigp.DecodeFromBytes buffer overflow\nCVE ID : CVE-2026-7735\n \n Published : May 4, 2026, 5:15 a.m. | 1\u00a0hour, 5\u00a0minutes ago\n \n Description : A vulnerability was found in osrg GoBGP up to 4.3.0. Affected is the functio...", "vulnerability": "CVE-2026-7735", "author": {"login": "automation"}}, {"uuid": "896e01b1-ff69-42fd-824b-d3e8c9949b53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T06:48:20.026327+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkz3chsdaf2h", "content": "CVE-2026-7724 - PrefectHQ prefect Webhook/Notification validate_restricted_url toctou\nCVE ID : CVE-2026-7724\n \n Published : May 4, 2026, 3:16 a.m. | 3\u00a0hours, 4\u00a0minutes ago\n \n Description : A vulnerability has been found in PrefectHQ prefect up to 3.6.28.dev1. Affected by this ...", "vulnerability": "CVE-2026-7724", "author": {"login": "automation"}}, {"uuid": "3d27ed73-c548-4c89-aa43-e759a5a2be4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T06:45:49.343025+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkz35ybzbu2r", "content": "CVE-2026-7722 - PrefectHQ prefect Health Check API health endswith improper authentication\nCVE ID : CVE-2026-7722\n \n Published : May 4, 2026, 3:16 a.m. | 3\u00a0hours, 4\u00a0minutes ago\n \n Description : A vulnerability was detected in PrefectHQ prefect up to 3.6.21. This impacts the fu...", "vulnerability": "CVE-2026-7722", "author": {"login": "automation"}}, {"uuid": "be4e121f-d386-4f94-8d1b-71c65aaacc86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T06:44:59+00:00", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/freebsd-security-advisory-av26-415", "content": "", "vulnerability": "CVE-2026-35547", "author": {"login": "syspect"}}, {"uuid": "99ff4720-eea2-4f73-a70b-cac05aa381d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T06:44:59+00:00", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/freebsd-security-advisory-av26-415", "content": "", "vulnerability": "CVE-2026-7164", "author": {"login": "syspect"}}, {"uuid": "625010db-f7c6-4dbd-b935-51c538864c7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T06:44:59+00:00", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/freebsd-security-advisory-av26-415", "content": "", "vulnerability": "CVE-2026-7270", "author": {"login": "syspect"}}, {"uuid": "0ebacd3c-80ee-49a6-84ab-2386ebf58cca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T06:44:59+00:00", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/freebsd-security-advisory-av26-415", "content": "", "vulnerability": "CVE-2026-42511", "author": {"login": "syspect"}}, {"uuid": "6b7cd592-1ecc-4eec-9f2a-41b48641c522", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T06:43:30.457502+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkz2ztvlpe2h", "content": "CVE-2026-7734 - osrg GoBGP SRv6 L3 Service prefix_sid.go SRv6L3ServiceAttribute.DecodeFromBytes denial of service\nCVE ID : CVE-2026-7734\n \n Published : May 4, 2026, 5 a.m. | 1\u00a0hour, 20\u00a0minutes ago\n \n Description : A vulnerability has been found in osrg GoBGP up to 4.3.0. This ...", "vulnerability": "CVE-2026-7734", "author": {"login": "automation"}}, {"uuid": "a71fc784-7aac-4ca7-8379-e5cf1920fb87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T06:41:21.768516+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkz2vysagy2n", "content": "CVE-2026-7733 - funadmin Frontend Chunked Upload Endpoint UploadService.php chunkUpload unrestricted upload\nCVE ID : CVE-2026-7733\n \n Published : May 4, 2026, 4:45 a.m. | 1\u00a0hour, 34\u00a0minutes ago\n \n Description : A flaw has been found in funadmin up to 7.1.0-rc6. This affects th...", "vulnerability": "CVE-2026-7733", "author": {"login": "automation"}}, {"uuid": "163bc060-9914-46ca-ad58-e9ec0e9fb26e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T06:39:55.966573+00:00", "type": "seen", "source": "https://bsky.app/profile/it-connect.bsky.social/post/3mkz2tg5p2p2h", "content": "\u26a0\ufe0f Ransomware Sorry\n\nLes instances cPanel sont actuellement cibl\u00e9es. Les pirates exploitent la faille critique CVE-2026-41940 pour ensuite chiffrer les fichiers du serveur Linux avec le ransomware Sorry.\n\nPlus d'infos \ud83d\udc47  \n- www.it-connect.fr/linux-les-do...\n\n#linux #cpanel #ransomware", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "05f91f3a-72f4-4641-8551-d6c04a69e2b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T06:23:43.721609+00:00", "type": "seen", "source": "https://bsky.app/profile/linux.activitypub.awakari.com.ap.brid.gy/post/3mkyzv47urp22", "content": "Linux : les donn\u00e9es des serveurs cPanel chiffr\u00e9es par le ransomware Sorry La faille de s\u00e9curit\u00e9 critique affectant cPanel et WHM, associ\u00e9e \u00e0 la r\u00e9f\u00e9rence CVE-2026-41940, est exploit\u00e9e mass...\n\n#Actu #Cybers\u00e9curit\u00e9 #Cybers\u00e9curit\u00e9 #Vuln\u00e9rabilit\u00e9\n\nOrigin | Interest | Match", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "0d768853-e76f-4256-ac1d-782a835adda5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T06:15:47.509227+00:00", "type": "seen", "source": "https://bsky.app/profile/pvynckier.bsky.social/post/3mkyzhcacfs2f", "content": "CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV thehackernews.com/2026/05/cisa...", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "5c5364eb-9cc5-4828-9ce0-dfd9d4a070ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T06:07:46.145954+00:00", "type": "seen", "source": "https://bsky.app/profile/reconbee.bsky.social/post/3mkyyzso4ms2g", "content": "CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV reconbee.com/cisa-adds-ac...\n\n#CISA #linuxrootaccess #CVE #Linuxroot #cyberattack", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "5e3f6d25-6f47-486e-bd75-2036dde3520e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T06:02:09.178034+00:00", "type": "seen", "source": "https://bsky.app/profile/tech-trending.bsky.social/post/3mkyypu7ozc2r", "content": "WSL2+Docker\u74b0\u5883\u306b\u304a\u3051\u308b\u3001CVE-2026-31431 (Copy Fail) \u3078\u306e\u5bfe\u7b56\u30e1\u30e2\nhttps://zenn.dev/user_thebigslee/articles/41b570658f911b", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "a5d8fca9-a16c-4d84-93c5-fa7d437cb448", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T06:00:31.183284+00:00", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116514778449951013", "content": "\ud83d\udea8 CVE-2026-42369 (CRITICAL, CVSS 10): GeoVision GV-VMS V20.0.2 stack overflow in gvapi endpoint lets unauthenticated remote attackers execute code as SYSTEM. Restrict remote access, monitor for patches. https://radar.offseq.com/threat/cve-2026-42369-cwe-787-out-of-bounds-write-in-geov-0757b787 #OffSeq #CVE202642369 #infosec #zeroday", "vulnerability": "cve-2026-42369", "author": {"login": "automation"}}, {"uuid": "9a201c86-caeb-48ec-9483-929271111868", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T06:00:31.157787+00:00", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkyymwd4po22", "content": "CRITICAL: GeoVision GV-VMS V20.0.2 stack overflow (CVSS 10) lets remote attackers gain SYSTEM access. Restrict remote access &amp; monitor for patches. https://radar.offseq.com/threat/cve-2026-42369-cwe-787-out-of-bounds-write-in-geov-0757b787 #OffSeq #CVE202642369 #cyberalert", "vulnerability": "cve-2026-42369", "author": {"login": "automation"}}, {"uuid": "3385142c-2387-4d73-8456-0b2794029c5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T06:00:04+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82725", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a copy-fail-CVE-2026-31431-detection-probe\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a ochebotar\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a None\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-04 05:58:51\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\n\u65e0\u63cf\u8ff0\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "aba27b64-fa7f-44c3-acbc-d577c0a65619", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T05:57:43.226786+00:00", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mkyyhxve3t23", "content": "Totolink WA300 5.2cu.7112_B20190227\u3067\u3001http_host\u5f15\u6570\u64cd\u4f5c\u306b\u3088\u308b\u30d0\u30c3\u30d5\u30a1\u30aa\u30fc\u30d0\u30fc\u30d5\u30ed\u30fc\u306e\u8106\u5f31\u6027\u304c\u898b\u3064\u304b\u308a\u307e\u3057\u305f\u3002\u30ea\u30e2\u30fc\u30c8\u304b\u3089\u306e\u653b\u6483\u304c\u53ef\u80fd\u3067\u3059\u3002\nCVE-2026-7719 CVSS 9.8 | CRITICAL", "vulnerability": "CVE-2026-7719", "author": {"login": "automation"}}, {"uuid": "4520e360-cdef-4179-b247-11bc927c9385", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T05:21:59.110757+00:00", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mkywi2vkq22g", "content": "CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV) catalog,\u2026\n#hackernews #news", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "ee7f1497-c730-48c2-b9fc-570d991ded9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T05:07:53.062408+00:00", "type": "seen", "source": "https://bsky.app/profile/shortinfo.bsky.social/post/3mkyvou5gcj2p", "content": "Microsoft patched the SharePoint zero-day CVE-2026-32201 in April - no login, no user interaction required to exploit. CISA required federal agencies to remediate by April 28. One week after that deadline, over 1,300 SharePoint servers are still publicly exposed.", "vulnerability": "CVE-2026-32201", "author": {"login": "automation"}}, {"uuid": "51a8a2a0-40d1-4ecb-badf-8fb7f9110856", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T05:00:04+00:00", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/82719", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-3494_Verfication\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a KKongTen\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-04 04:59:09\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nReproduction and Analysis of CVE-2026-3494\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-3494", "author": {"login": "automation"}}, {"uuid": "23021fbb-6d7c-4f6e-a906-18b70b69e3ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T04:53:12.899123+00:00", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116514513998786708", "content": "There is a new vulnerability with elevated criticality in GeoVision GV-VMS (CVE-2026-42369) https://vuldb.com/vuln/360931", "vulnerability": "CVE-2026-42369", "author": {"login": "automation"}}, {"uuid": "43a3e76b-c0b3-4dd7-9c46-b7a484cc009a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T04:43:58.863859+00:00", "type": "seen", "source": "https://bsky.app/profile/c3iq.bsky.social/post/3mkyue4wbfs2a", "content": "Some have suggested that CVE-2026-31431 is a backdoor. What if all the backdoors are found?", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "4e7a9c78-08e2-4638-9551-333833a8cebe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T04:41:15.956941+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkyu7b3ajc2o", "content": "CVE-2026-7718 - Totolink WA300 POST Request cstecgi.cgi setWebWlanIdx command injection\nCVE ID : CVE-2026-7718\n \n Published : May 4, 2026, 2:15 a.m. | 18\u00a0minutes ago\n \n Description : A vulnerability was identified in Totolink WA300 5.2cu.7112_B20190227. Impacted is the functio...", "vulnerability": "CVE-2026-7718", "author": {"login": "automation"}}, {"uuid": "f1e931f1-c744-45c7-9ab2-fbea3cd45cf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T04:39:35.506030+00:00", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116514460467704421", "content": "We have just added an important vulnerability affecting GeoVision GV-VMS V20.0.2 (CVE-2026-42370) https://vuldb.com/vuln/360930", "vulnerability": "CVE-2026-42370", "author": {"login": "automation"}}, {"uuid": "13717159-25f8-46da-9e33-68f70442a3c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T04:36:15.669540+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkytwcnbxi2p", "content": "CVE-2026-7720 - Totolink WA300 POST Request cstecgi.cgi setLanguageCfg command injection\nCVE ID : CVE-2026-7720\n \n Published : May 4, 2026, 2:15 a.m. | 18\u00a0minutes ago\n \n Description : A weakness has been identified in Totolink WA300 5.2cu.7112_B20190227. The impacted element i...", "vulnerability": "CVE-2026-7720", "author": {"login": "automation"}}, {"uuid": "6dcafd29-2c26-49f1-a940-0cd793790b06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T04:31:15.673315+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkytndlcmx2e", "content": "CVE-2026-7719 - Totolink WA300 POST Request cstecgi.cgi loginauth buffer overflow\nCVE ID : CVE-2026-7719\n \n Published : May 4, 2026, 2:15 a.m. | 18\u00a0minutes ago\n \n Description : A security flaw has been discovered in Totolink WA300 5.2cu.7112_B20190227. The affected element is ...", "vulnerability": "CVE-2026-7719", "author": {"login": "automation"}}, {"uuid": "238f0f9d-2b15-47b5-83cb-726663ee6b9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T04:30:28.868057+00:00", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkytlxeu4y2v", "content": "CRITICAL vuln in GeoVision GV-VMS V20.0.2: Unauthenticated stack overflow enables SYSTEM-level RCE. Patch unavailable \u2014 restrict WebCam Server access now. https://radar.offseq.com/threat/cve-2026-7372-cwe-787-out-of-bounds-write-in-geovi-eed18717 #OffSeq #Vulnerability #Security", "vulnerability": "cve-2026-7372", "author": {"login": "automation"}}, {"uuid": "5efc8b18-2a84-49b6-9612-8e47ab4a293e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T04:30:28.776606+00:00", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116514424480236354", "content": "\ud83d\udea8 CRITICAL: CVE-2026-7372 in GeoVision GV-VMS V20.0.2 \u2014 unauthenticated stack overflow in WebCam Login enables SYSTEM-level RCE. No fix yet \u2014 restrict access and monitor for updates. https://radar.offseq.com/threat/cve-2026-7372-cwe-787-out-of-bounds-write-in-geovi-eed18717 #OffSeq #Vulnerability #RCE #Infosec", "vulnerability": "cve-2026-7372", "author": {"login": "automation"}}, {"uuid": "41420e10-bb25-4f29-bfa7-e1d323acd50a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T04:17:35.264830+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberlensai.bsky.social/post/3mkysuwbk3e2z", "content": "Fresh CVE alert: CVE-2026-42232 Security Alert: CRITICAL Vulnerability\n\nCVE-2026-42232 CRITICAL alert. Immediate action\u2026\n\nhttps://cyberlensai.com/news/security-alert-cve-2026-42232\n\n#CyberSecurity #AppSec #VulnerabilityManagement", "vulnerability": "cve-2026-42232", "author": {"login": "automation"}}, {"uuid": "3c8d5a7e-6492-4932-b97c-3dbcb69fcaa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T04:12:09.994475+00:00", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3mkysl5ppik2h", "content": "Copy Fail (CVE-2026-31431) : Synth\u00e8se technique sur cette faille Linux www.linuxtricks.fr/news/10-logi...", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "be68402d-8b10-4181-ad4e-0dba155e5e46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T04:07:07.241436+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mkysc7eudz2z", "content": "\ud83d\udccc CVE-2026-5611 - A vulnerability was found in Belkin F9K1015 1.00.10. This affects the function formCrossBandSwitch of the file /goform/formCrossBandSwitch. Performing... https://www.cyberhub.blog/cves/CVE-2026-5611", "vulnerability": "CVE-2026-5611", "author": {"login": "automation"}}, {"uuid": "30cd43b2-b9f8-4a37-9135-b9030ac02721", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T04:00:43.079090+00:00", "type": "seen", "source": "https://bsky.app/profile/releaseport.com/post/3mkyrwqeocz2x", "content": "dbeaver 26.0.4 patches CVE-2026-3505\nHigh-severity vulnerability in bcpg-jdk18on (CVE-2026-3505) requires upgrade for security.\nUpgrade carefully.\n\n\u2192 releaseport.com/r/dbeaver-dbeaver/26-0-4", "vulnerability": "CVE-2026-3505", "author": {"login": "automation"}}, {"uuid": "1d575e09-9337-4b9e-a455-e495ecaacdf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T04:00:04+00:00", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/82704", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a BigFix-CopyFail-AlmaLinux-Content\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a kvendler\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a None\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-04 03:56:29\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nThis repository contains BigFix Content that I created for identifying the AlmaLinux systems that require patching to remediate CVE-2026-31431\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "40d07047-774c-46d0-845f-012f3c44fb24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:43:16+00:00", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-10162.yaml", "content": "", "vulnerability": "CVE-2025-10162", "author": {"login": "automation"}}, {"uuid": "53e39e16-2ee1-442b-919e-5cde2bcc51f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:41:58+00:00", "type": "seen", "source": "https://gist.github.com/rom1504/9c5982104f9aa7d3fafa68f2cf777b6d", "content": "", "vulnerability": "CVE-2025-32434", "author": {"login": "automation"}}, {"uuid": "e603fb90-d509-4758-8601-597c6cf875d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:37:22.796226+00:00", "type": "seen", "source": "https://bsky.app/profile/opsmatters.com/post/3mkyqmzp7ep2q", "content": "The latest update for #Mendit includes \"PhantomRaven Wave 5: New Undocumented NPM #SupplyChain Campaign Targets DeFi, #Cloud, and AI Developers\" and \"CVE-2026-31431 (Copy Fail): #Linux Kernel LPE\".\n \n#CyberSecurity #DevOps #OpenSource #Compliance https://opsmtrs.com/3zEYo7d", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "d0999c5e-17a7-4827-851c-301b112230d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:25:00.136591+00:00", "type": "seen", "source": "https://bsky.app/profile/opsmatters.com/post/3mkypwv2eqk2j", "content": "The latest update for #CyCognito includes \"Emerging Threat: (CVE-2026-41940) cPanel &amp; WHM Authentication Bypass via CRLF Injection\" and \"Emerging Threat: (CVE-2026-3854) #GitHub Enterprise Server RCE via Git Push Injection\".\n \n#cybersecurity #AttackSurfaceManagement #EASM https://opsmtrs.com/44Srq0X", "vulnerability": "CVE-2026-3854", "author": {"login": "automation"}}, {"uuid": "fbb70eca-4ff9-46af-a8a0-db8663d1a9be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:24:59.989104+00:00", "type": "seen", "source": "https://bsky.app/profile/opsmatters.com/post/3mkypwv2eqk2j", "content": "The latest update for #CyCognito includes \"Emerging Threat: (CVE-2026-41940) cPanel &amp; WHM Authentication Bypass via CRLF Injection\" and \"Emerging Threat: (CVE-2026-3854) #GitHub Enterprise Server RCE via Git Push Injection\".\n \n#cybersecurity #AttackSurfaceManagement #EASM https://opsmtrs.com/44Srq0X", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "a718b6ac-b647-412a-8ae0-34fbd0038a25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:10:43+00:00", "type": "seen", "source": "https://www.acn.gov.it/portale/w/rilevate-vulnerabilita-in-prodotti-mediatek-8", "content": "", "vulnerability": "CVE-2026-20448", "author": {"login": "syspect"}}, {"uuid": "4f564992-c6cb-40fb-9c7e-05a2269cd6a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:10:43+00:00", "type": "seen", "source": "https://www.acn.gov.it/portale/w/rilevate-vulnerabilita-in-prodotti-mediatek-8", "content": "", "vulnerability": "CVE-2026-20449", "author": {"login": "syspect"}}, {"uuid": "09786370-c950-4e92-bb9f-4014241d21cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:10:43+00:00", "type": "seen", "source": "https://www.acn.gov.it/portale/w/rilevate-vulnerabilita-in-prodotti-mediatek-8", "content": "", "vulnerability": "CVE-2026-20450", "author": {"login": "syspect"}}, {"uuid": "e39ce379-3cdf-4664-83fd-22c4d8e32da9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:10:43+00:00", "type": "seen", "source": "https://www.acn.gov.it/portale/w/rilevate-vulnerabilita-in-prodotti-mediatek-8", "content": "", "vulnerability": "CVE-2026-20447", "author": {"login": "syspect"}}, {"uuid": "a249abf0-4cc4-4b44-bbde-c1010a8310fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:06:30.695968+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkyovthfca2r", "content": "CVE-2026-7717 - Totolink WA300 POST Request cstecgi.cgi UploadCustomModule buffer overflow\nCVE ID : CVE-2026-7717\n \n Published : May 4, 2026, 1:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A vulnerability was determined in Totolink WA300 5.2cu.7112_B20190227. This issue af...", "vulnerability": "CVE-2026-7717", "author": {"login": "automation"}}, {"uuid": "2dca5925-5b7a-44dc-acf6-5237c7078902", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:05:32.614630+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkyotzvtss2v", "content": "CVE-2026-42370 - GeoVision GV-VMS V20 WebCam Server Login stack overflow vulnerability\nCVE ID : CVE-2026-42370\n \n Published : May 4, 2026, 1:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVi...", "vulnerability": "CVE-2026-42370", "author": {"login": "automation"}}, {"uuid": "7c3cb440-940f-4ec6-a01e-f27ed4f8c8db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:02:20.125492+00:00", "type": "seen", "source": "https://bsky.app/profile/releaseport.com/post/3mkyoodvwb72o", "content": "Dispatcharr 0.24.0 patches CVE-2026-41066\nLive DVR requires Celery (20 threads), manual HDHomeRun entry, and XML security fixes.\nUpgrade carefully.\n\n\u2192 releaseport.com/r/dispatcharr-dispatcharr/v0-24-0", "vulnerability": "CVE-2026-41066", "author": {"login": "automation"}}, {"uuid": "a9154ce5-e9ec-4d89-9db1-b93886843f52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:00:30.565817+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkyol3gmar2v", "content": "CVE-2026-42365 - GeoVision LPC2011/LPC2211 Web Interface guessable session cookie vulnerability\nCVE ID : CVE-2026-42365\n \n Published : May 4, 2026, 1:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A guessable session cookie vulnerability exists in the Web Interface functiona...", "vulnerability": "CVE-2026-42365", "author": {"login": "automation"}}, {"uuid": "a179bc7e-0153-4914-a649-fbcddd1fb94f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:00:30.386482+00:00", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116514070655734661", "content": "Totolink WA300 (5.2cu.7112_B20190227) faces a CRITICAL buffer overflow (CVE-2026-7719) via http_host in /cgi-bin/cstecgi.cgi. Public exploit out, no patch yet. Limit exposure, monitor closely. https://radar.offseq.com/threat/cve-2026-7719-buffer-overflow-in-totolink-wa300-e943f95d #OffSeq #Vuln #IoTSecurity #CVE20267719", "vulnerability": "cve-2026-7719", "author": {"login": "automation"}}, {"uuid": "6550a7db-c296-4334-ae3a-5389e19bed99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:00:29.742822+00:00", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkyol2h2ic2d", "content": "CRITICAL buffer overflow in Totolink WA300 (CVE-2026-7719) enables remote code execution. No patch yet \u2014 restrict device exposure &amp; monitor for threats. https://radar.offseq.com/threat/cve-2026-7719-buffer-overflow-in-totolink-wa300-e943f95d #OffSeq #IoTSecurity #Vulnerability", "vulnerability": "cve-2026-7719", "author": {"login": "automation"}}, {"uuid": "a436ebf0-e927-4877-988b-29f646d4ef47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:00:10+00:00", "type": "seen", "source": "Telegram/7SN9Fl0GF65ZD-opbKtieiRYe3MHK4MfjXLAn3BCOOAOxDM", "content": "", "vulnerability": "CVE-2026-42167", "author": {"login": "automation"}}, {"uuid": "3ca9519b-611e-4c64-92bc-6c2dce9bfe48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:00:10+00:00", "type": "seen", "source": "Telegram/7SN9Fl0GF65ZD-opbKtieiRYe3MHK4MfjXLAn3BCOOAOxDM", "content": "", "vulnerability": "CVE-2025-60751", "author": {"login": "automation"}}, {"uuid": "8221cca6-f284-48ce-a4df-fb82ae4fa5b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:00:05+00:00", "type": "seen", "source": "Telegram/xOE6u0S4AhmTrHPBDYscPzMv6FpE3fbyPNbn5dJYZfuDoSw", "content": "", "vulnerability": "CVE-2026-40776", "author": {"login": "automation"}}, {"uuid": "aa27d35b-9f2c-4b50-b5df-a5bd06b98b67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:00:05+00:00", "type": "seen", "source": "Telegram/xOE6u0S4AhmTrHPBDYscPzMv6FpE3fbyPNbn5dJYZfuDoSw", "content": "", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "229cc517-1d3e-40c0-8009-08b8907c2408", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:00:05+00:00", "type": "seen", "source": "Telegram/xOE6u0S4AhmTrHPBDYscPzMv6FpE3fbyPNbn5dJYZfuDoSw", "content": "", "vulnerability": "CVE-2026-36355", "author": {"login": "automation"}}, {"uuid": "0e35f3b4-12c3-4839-809d-ba81f9b8a2f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:00:05+00:00", "type": "seen", "source": "Telegram/xOE6u0S4AhmTrHPBDYscPzMv6FpE3fbyPNbn5dJYZfuDoSw", "content": "", "vulnerability": "CVE-2026-36356", "author": {"login": "automation"}}, {"uuid": "e878ab76-6b9c-4b3d-9c4b-b29f01d8f19a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:00:05+00:00", "type": "seen", "source": "Telegram/xOE6u0S4AhmTrHPBDYscPzMv6FpE3fbyPNbn5dJYZfuDoSw", "content": "", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "327adf20-1743-4895-bc36-9cae6cd0c99f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T03:00:00+00:00", "type": "seen", "source": "https://www.cert.se/2026/05/allvarlig-sarbarhet-i-flertal-linuxdistributioner.html", "content": "", "vulnerability": "CVE-2026-31431", "author": {"login": "syspect"}}, {"uuid": "c4a6f708-2fb5-45a3-b9d9-19274c051040", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T02:55:29.965937+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkyoc4xwdf2q", "content": "CVE-2026-42368 - GeoVision LPC2011/LPC2211 Web Interface privilege escalation vulnerability\nCVE ID : CVE-2026-42368\n \n Published : May 4, 2026, 1:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A privilege escalation vulnerability exists in the Web Interface functionality of ...", "vulnerability": "CVE-2026-42368", "author": {"login": "automation"}}, {"uuid": "c610b189-6127-420c-bda1-d7d11c5ca926", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T02:50:29.698799+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkynz6jpjl2h", "content": "CVE-2026-42369 - GeoVision GV-VMS V20 WebCam Server stack overflow vulnerability\nCVE ID : CVE-2026-42369\n \n Published : May 4, 2026, 1:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : GV-VMS V20 is a Video Monitoring Software used to gather the feeds of many surveillance camer...", "vulnerability": "CVE-2026-42369", "author": {"login": "automation"}}, {"uuid": "353730f1-3b49-41eb-b16a-3b16bc809266", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T02:45:29.128368+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkynqa34oy2i", "content": "CVE-2026-7372 - GeoVision GV-VMS V20 WebCam Server Login stack overflow vulnerability\nCVE ID : CVE-2026-7372\n \n Published : May 4, 2026, 1:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVisi...", "vulnerability": "CVE-2026-7372", "author": {"login": "automation"}}, {"uuid": "1ec6cf61-d77e-453b-9e07-d25fae9733c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T02:40:28.649981+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkynhblr5c2p", "content": "CVE-2026-42364 - GeoVision LPC2011/LPC2211 Web Interface / DdnsSetting.cgi OS command injection vulnerability\nCVE ID : CVE-2026-42364\n \n Published : May 4, 2026, 1:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : An os command injection vulnerability exists in the DdnsSetting....", "vulnerability": "CVE-2026-42364", "author": {"login": "automation"}}, {"uuid": "3fbc1200-d904-4bb8-bf23-99ed68d8282a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T02:37:48.394653+00:00", "type": "seen", "source": "https://bsky.app/profile/aimainainnu.bsky.social/post/3mkynce7sok2d", "content": "\u300cCopy Fail\u300dLinux \u30d0\u30b0\uff1a732\u30d0\u30a4\u30c8\u306e\u30b9\u30af\u30ea\u30d7\u30c8\u30672017\u5e74\u4ee5\u964d\u306e\u307b\u307c\u3059\u3079\u3066\u306e\u30c7\u30a3\u30b9\u30c8\u30ea\u30d3\u30e5\u30fc\u30b7\u30e7\u30f3\u306b\u3066 root \u6a29\u9650\u306e\u53d6\u5f97\u304c\u53ef\u80fd\u306b - BigGo \u30cb\u30e5\u30fc\u30b9 \n\nLinux \u30ab\u30fc\u30cd\u30eb\u306b\u304a\u3051\u308b\u300cCopy Fail\u300d\u3068\u547d\u540d\u3055\u308c\u305f CVE-2026-31431 \u3068\u3044\u3046\u6df1\u523b\u306a\u8ad6\u7406\u30d9\u30fc\u30b9\u306e\u8106\u5f31\u6027\u306f\u3001\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u304a\u3088\u3073\u30af\u30e9\u30a6\u30c9\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u306e ... \nbiggo.jp/news/2026050...", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "29ee2080-07ff-4062-8624-9dc0cdf50df4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T02:36:11.193482+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkyn7lxtli2r", "content": "CVE-2026-7161 - GeoVision GV-IP Device Utility Device Authentication insufficient encryption vulnerability\nCVE ID : CVE-2026-7161\n \n Published : May 4, 2026, 1:16 a.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : An insufficient encryption vulnerability exists in the Device Authen...", "vulnerability": "CVE-2026-7161", "author": {"login": "automation"}}, {"uuid": "18f32437-546a-4d5f-8566-1798c3a411d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T02:33:35.134129+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkyn2vo2zh2n", "content": "\ud83d\udd34 CVE-2026-7719 - Critical (9.8)\n\nA security flaw has been discovered in Totolink WA300 5.2cu.7112_B20190227. The affected element ...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-7719/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-7719", "author": {"login": "automation"}}, {"uuid": "7165e40c-d2fc-488d-b602-f2bbd19a4776", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T02:29:57.775866+00:00", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mkymuhf3uq2z", "content": "Top 3 CVE for last 7 days:\nCVE-2026-31431: 481 interactions\nCVE-2026-41940: 74 interactions\nCVE-2026-3854: 57 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-31431: 26 interactions\nCVE-2026-41940: 6 interactions\nCVE-2026-5404: 4 interactions\n", "vulnerability": "CVE-2026-5404", "author": {"login": "automation"}}, {"uuid": "623cfcbd-5c94-4ba5-b304-d28a2386091e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T02:29:57.608241+00:00", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mkymuhf3uq2z", "content": "Top 3 CVE for last 7 days:\nCVE-2026-31431: 481 interactions\nCVE-2026-41940: 74 interactions\nCVE-2026-3854: 57 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-31431: 26 interactions\nCVE-2026-41940: 6 interactions\nCVE-2026-5404: 4 interactions\n", "vulnerability": "CVE-2026-3854", "author": {"login": "automation"}}, {"uuid": "8b50c741-b8c8-4097-b453-7a930f370bb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T02:29:57.456615+00:00", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mkymuhf3uq2z", "content": "Top 3 CVE for last 7 days:\nCVE-2026-31431: 481 interactions\nCVE-2026-41940: 74 interactions\nCVE-2026-3854: 57 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-31431: 26 interactions\nCVE-2026-41940: 6 interactions\nCVE-2026-5404: 4 interactions\n", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "d1ad4413-08de-4c2e-9354-32ded7911b46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T02:29:57.308285+00:00", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3mkymuhf3uq2z", "content": "Top 3 CVE for last 7 days:\nCVE-2026-31431: 481 interactions\nCVE-2026-41940: 74 interactions\nCVE-2026-3854: 57 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-31431: 26 interactions\nCVE-2026-41940: 6 interactions\nCVE-2026-5404: 4 interactions\n", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "92c14fc8-1730-4dd3-b065-aa11a7de72ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T02:07:08.126136+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mkyllngmpb2v", "content": "\ud83d\udccc CVE-2026-5609 - A flaw has been found in Tenda i12 1.0.0.11(3862). Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset of th... https://www.cyberhub.blog/cves/CVE-2026-5609", "vulnerability": "CVE-2026-5609", "author": {"login": "automation"}}, {"uuid": "eefbb568-4ded-4803-ac6a-57d2432e6832", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:55:51.910802+00:00", "type": "seen", "source": "https://bsky.app/profile/nulj.bsky.social/post/3mkykxipqaj2g", "content": "CRITICAL (0.82) - US-Iran war enters month 3 with Hormuz blockade; CVE-2026-7458 CVSS 9.8 active in wild; Asia-Europe freight rates surge 240%+ as shippers divert around Cape of Good Hope. Near-term multi-vector escalation Highly Likely.", "vulnerability": "CVE-2026-7458", "author": {"login": "automation"}}, {"uuid": "420b3200-cfc1-4a82-9329-b7ff9b07c4bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:54:09.227573+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mkykugmtvq2h", "content": "Re: Precise disclosure contents for copyfail (Re: [oss-security] CVE-2026-31431: CopyFail: linux local privilege scalation)", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "ae7b2bc8-a67f-41bb-a297-7551335973b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:49:06.736872+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mkyklgfls62x", "content": "Re: Precise disclosure contents for copyfail (Re: [oss-security] CVE-2026-31431: CopyFail: linux local privilege scalation)", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "1b590cf0-8642-4eeb-9dce-38342cb553d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:33:50.077845+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkyjq3vlbn2w", "content": "\ud83d\udfe0 CVE-2026-42365 - High (8.6)\n\nA guessable session cookie vulnerability exists in the Web Interface functionality of GeoVision L...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42365/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42365", "author": {"login": "automation"}}, {"uuid": "ce2b7913-4576-45c1-958f-d5721be517b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:33:43.059761+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkyjpuojny26", "content": "\ud83d\udd34 CVE-2026-42364 - Critical (9.9)\n\nAn os command injection vulnerability exists in the DdnsSetting.cgi functionality of GeoVision LP...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42364/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42364", "author": {"login": "automation"}}, {"uuid": "5f34627c-5217-4b98-a07a-d345b52afd3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:30:29.018911+00:00", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkyjk3rmks2g", "content": "GeoVision GV-VMS V20.0.2 hit by CRITICAL stack overflow (CVE-2026-42370). Remote code execution possible via unauthenticated HTTP requests. Patch when available! https://radar.offseq.com/threat/cve-2026-42370-cwe-787-out-of-bounds-write-in-geov-cb9b994f #OffSeq #Vulnerability", "vulnerability": "cve-2026-42370", "author": {"login": "automation"}}, {"uuid": "5f4dc8f3-93d1-4477-9a98-9c9ea59a14b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:30:27.192169+00:00", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116513716702890146", "content": "\ud83d\udea8 CRITICAL: CVE-2026-42370 affects GeoVision GV-VMS V20.0.2. Stack overflow in WebCam Server Login allows unauthenticated remote code execution via crafted HTTP requests. Patch urgently! https://radar.offseq.com/threat/cve-2026-42370-cwe-787-out-of-bounds-write-in-geov-cb9b994f #OffSeq #GeoVision #Vulnerability", "vulnerability": "cve-2026-42370", "author": {"login": "automation"}}, {"uuid": "5e41fc68-6ba8-49f1-ad4c-3119677c4e55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:20:05.947164+00:00", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3mkyixk7tez2l", "content": "\ud83d\udd34 CVE-2026-7372 - Critical (9)\n\nA stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVision GV-VM...\n\nhttps://www.themasherwire.com/vulnerability/CVE-2026-7372/\n\n#infosec #potatosecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-7372", "author": {"login": "automation"}}, {"uuid": "f21b57fd-07fb-41ae-9a1e-eee0e436ae45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:20:05.211185+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkyixj7quu2z", "content": "\ud83d\udd34 CVE-2026-7372 - Critical (9)\n\nA stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVision GV-VM...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-7372/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-7372", "author": {"login": "automation"}}, {"uuid": "0e8aeac6-7721-4530-892f-bf59cf381e52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:19:58.303564+00:00", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3mkyix5seejv2", "content": "\ud83d\udd34 CVE-2026-42370 - Critical (9) A stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVision GV-VM... https://www.thehackerwire.com/vulnerability/CVE-2026-42370/ #...\n\n\nOrigin | Interest | Match", "vulnerability": "CVE-2026-42370", "author": {"login": "automation"}}, {"uuid": "ba0aed61-40e7-490a-b5b8-bd2bd1c5c5b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:19:57.034920+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkyixbf7zj2f", "content": "\ud83d\udd34 CVE-2026-7161 - Critical (9.3)\n\nAn insufficient encryption vulnerability exists in the Device Authentication functionality of Geo...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-7161/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-7161", "author": {"login": "automation"}}, {"uuid": "64d31d12-60f8-422a-9588-4e2b6038a049", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:19:38.767285+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkyiwq46vt2w", "content": "\ud83d\udfe0 CVE-2026-42365 - High (8.6)\n\nA guessable session cookie vulnerability exists in the Web Interface functionality of GeoVision L...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42365/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42365", "author": {"login": "automation"}}, {"uuid": "d53e3a01-0d30-4a5a-b0d4-0e875d866ae4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:19:31.272037+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkyiwiqxep2n", "content": "\ud83d\udd34 CVE-2026-42364 - Critical (9.9)\n\nAn os command injection vulnerability exists in the DdnsSetting.cgi functionality of GeoVision LP...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42364/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42364", "author": {"login": "automation"}}, {"uuid": "3e0e87d2-76e5-4a2a-ad60-e0cc0a05f8e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:19:23.468472+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkyiwbcqjd2w", "content": "\ud83d\udd34 CVE-2026-7372 - Critical (9)\n\nA stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVision GV-VM...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-7372/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-7372", "author": {"login": "automation"}}, {"uuid": "fa5307ef-e093-4053-8556-0e4d95d10ca6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:18:56.857528+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkyivhrpyd2w", "content": "\ud83d\udd34 CVE-2026-42370 - Critical (9)\n\nA stack overflow vulnerability exists in the WebCam Server Login functionality of GeoVision GV-VM...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42370/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42370", "author": {"login": "automation"}}, {"uuid": "0ed9f9c1-c3a8-4da3-a2f4-33d6a251fbf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:18:13.364023+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkyiu6f3ct2w", "content": "\ud83d\udd34 CVE-2026-42369 - Critical (10)\n\nGV-VMS V20 is a Video Monitoring Software used to gather the feeds of many surveillance cameras a...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42369/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42369", "author": {"login": "automation"}}, {"uuid": "2d4c4aeb-90a9-4c9c-8c4c-d1ee3e054e55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:18:05.787212+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkyitx7tgm2g", "content": "\ud83d\udd34 CVE-2026-42368 - Critical (9.9)\n\nA privilege escalation vulnerability exists in the Web Interface functionality of GeoVision LPC20...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-42368/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-42368", "author": {"login": "automation"}}, {"uuid": "9ec0eb06-26ef-4bfb-86fe-18f59bcafa50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:17:58.375916+00:00", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkyitpy4ep2l", "content": "\ud83d\udfe0 CVE-2026-7717 - High (8.8)\n\nA vulnerability was determined in Totolink WA300 5.2cu.7112_B20190227. This issue affects the fun...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-7717/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "vulnerability": "CVE-2026-7717", "author": {"login": "automation"}}, {"uuid": "ea276351-5160-4000-8e63-f79a9a5ccf08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:17:55.900320+00:00", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3mkyitnm5s22g", "content": "Critrical cPanel flaw mass-exploited in \"Sorry\" ransomware attacks\n\nA new disclosed cPanel flaw tracked as CVE-2026-41940 is being mass-exploited to breach websites and encrypt data in \"Sorry\" ransomware attacks. [...]\n#hackernews #news", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "9442d0ee-1a92-48a4-b777-bdf3b0b0c44f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:15:06.452468+00:00", "type": "seen", "source": "https://bsky.app/profile/hatena-bookmark.bsky.social/post/3mkyiolu2t72y", "content": "#\ud83d\udd16\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\nWSL2+Docker\u74b0\u5883\u306b\u304a\u3051\u308b\u3001CVE-2026-31431 (Copy Fail) \u3078\u306e\u5bfe\u7b56\u30e1\u30e2\n\nTL;DR \u7d50\u8ad6\u304b\u3089\u8a00\u3046\u3068\u3001\u300cDocker\u3092v29.4.2\u4ee5\u964d\u3078\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\uff08\u6052\u4e45\u7684\uff09\u300d\u3068\u300c.wslconfig\u306b\u3088\u308balgif_aead\u306e\u7121\u52b9\u5316\uff08\u66ab\u5b9a\u7684\uff09\u300d\u306e2\u6bb5\u69cb\u3048\u304c\u73fe\u72b6\u306e\u6700\u9069\u89e3\u3067\u3059\u3002 \u306f\u3058\u3081\u306b Linux\u30ab\u30fc\u30cd\u30eb\u306e\u6a29\u9650\u6607\u683c\u8106\u5f31\u6027\u300cCopy Fail\uff08CVE-2026-31431\uff09\u300d\u304c\u3001GW\u771f\u3063\u53ea\u4e2d\u306e\u4e16\u9593\u3092\u9a12\u304c\u305b\u3066\u3044\u307e\u3059\u3002 \u30ed\u30fc\u30ab\u30eb\u30e6\u30fc\u30b6\u30fc\u304c\u5bb9\u6613\u306broo\nhttps://zenn.dev/user_thebigslee/articles/41b570658f911b", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "97d0adbb-8e24-417a-a052-773cb835aad1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:08:37.417092+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkyiczregr2i", "content": "CVE-2026-7712 - MindsDB Pickle pickle.loads deserialization\nCVE ID : CVE-2026-7712\n \n Published : May 3, 2026, 11:45 p.m. | 35\u00a0minutes ago\n \n Description : A security vulnerability has been detected in MindsDB up to 26.01. Affected is the function pickle.loads of the component...", "vulnerability": "CVE-2026-7712", "author": {"login": "automation"}}, {"uuid": "1a08fac3-bcb9-4c51-8e68-5dd465c36548", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:03:37.299958+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkyi23cwbd2v", "content": "CVE-2026-7713 - crocodilestick Calibre-Web-Automated Kobo auth-token Route kobo_auth.py generate_auth_token improper authorization\nCVE ID : CVE-2026-7713\n \n Published : May 4, 2026, midnight | 19\u00a0minutes ago\n \n Description : A vulnerability was detected in crocodilestick Calib...", "vulnerability": "CVE-2026-7713", "author": {"login": "automation"}}, {"uuid": "751246f6-7fd3-4939-a07e-554772208526", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T01:00:38+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82694", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #RCE #Remote\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-7669-PoC\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a gouldnicholas\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a None\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-04 00:58:27\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nPoC for CVE-2026-7669: SGLang silent trust_remote_code override -&gt; RCE\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-7669", "author": {"login": "automation"}}, {"uuid": "49ac9563-8268-4b0c-803c-c7cd8879cd27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:58:36.812942+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkyhr4pfcp2c", "content": "CVE-2026-7711 - MindsDB Engine proc_wrapper.py exec unrestricted upload\nCVE ID : CVE-2026-7711\n \n Published : May 3, 2026, 11:30 p.m. | 49\u00a0minutes ago\n \n Description : A weakness has been identified in MindsDB up to 26.01. This impacts the function exec of the file mindsdb/int...", "vulnerability": "CVE-2026-7711", "author": {"login": "automation"}}, {"uuid": "93b34612-76f6-4557-9439-c08516b720cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:53:36.211476+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkyhi6bccn2k", "content": "CVE-2026-7709 - janeczku Calibre-Web Endpoint kobo_auth.py generate_auth_token improper authorization\nCVE ID : CVE-2026-7709\n \n Published : May 3, 2026, 11:16 p.m. | 1\u00a0hour, 3\u00a0minutes ago\n \n Description : A vulnerability was identified in janeczku Calibre-Web up to 0.6.26. The...", "vulnerability": "CVE-2026-7709", "author": {"login": "automation"}}, {"uuid": "4f13dee2-1587-4f74-b2ac-787dad1eddf8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:48:35.944239+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkyh77suye2k", "content": "CVE-2026-7708 - Open5GS UDR subscription.c ogs_dbi_subscription_data denial of service\nCVE ID : CVE-2026-7708\n \n Published : May 3, 2026, 11:16 p.m. | 1\u00a0hour, 3\u00a0minutes ago\n \n Description : A vulnerability was determined in Open5GS up to 2.7.7. The affected element is the func...", "vulnerability": "CVE-2026-7708", "author": {"login": "automation"}}, {"uuid": "a06e7e05-f520-4069-b51e-6fab14018980", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:43:35.854160+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkygwbeavi2e", "content": "CVE-2026-7707 - Open5GS UDR nudr-handler.c udr_nudr_dr_handle_subscription_context denial of service\nCVE ID : CVE-2026-7707\n \n Published : May 3, 2026, 11:16 p.m. | 1\u00a0hour, 3\u00a0minutes ago\n \n Description : A vulnerability was found in Open5GS up to 2.7.7. Impacted is the functio...", "vulnerability": "CVE-2026-7707", "author": {"login": "automation"}}, {"uuid": "5afc4a32-ed5a-4045-a238-bce9f5c6d402", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:39:18.150154+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkygolreap2c", "content": "CVE-2026-7705 - JD Cloud JDCOS Service jdcap set_iptv_info command injection\nCVE ID : CVE-2026-7705\n \n Published : May 3, 2026, 11:16 p.m. | 1\u00a0hour, 3\u00a0minutes ago\n \n Description : A flaw has been found in JD Cloud JDCOS 4.5.1.r4518. This vulnerability affects the function set_...", "vulnerability": "CVE-2026-7705", "author": {"login": "automation"}}, {"uuid": "43f0d1df-d879-4fc1-9750-f98afd176d24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:35:32.502054+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkyghutsvc2n", "content": "CVE-2026-7706 - Open5GS AMF gmm-handler.c gmm_handle_service_request denial of service\nCVE ID : CVE-2026-7706\n \n Published : May 3, 2026, 11:16 p.m. | 1\u00a0hour, 3\u00a0minutes ago\n \n Description : A vulnerability has been found in Open5GS up to 2.7.7. This issue affects the function ...", "vulnerability": "CVE-2026-7706", "author": {"login": "automation"}}, {"uuid": "b1f0806c-9cca-4db0-8c69-709fdab5238a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:32:11.831641+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkygbvfube2k", "content": "CVE-2026-7710 - YunaiV yudao-cloud Ruoyi-Vue-Pro JwtAuthenticationTokenFilter.java doFilterInternal improper authentication\nCVE ID : CVE-2026-7710\n \n Published : May 3, 2026, 11:15 p.m. | 1\u00a0hour, 4\u00a0minutes ago\n \n Description : A security flaw has been discovered in YunaiV yuda...", "vulnerability": "CVE-2026-7710", "author": {"login": "automation"}}, {"uuid": "f47a8021-5e20-460f-b4e2-1ec86f50ce0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:31:11.848111+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkyga3suig2e", "content": "CVE-2026-6948 - Unbounded Memory Allocation in VQLResponse Result-Set Writer\nCVE ID : CVE-2026-6948\n \n Published : May 3, 2026, 11:55 p.m. | 24\u00a0minutes ago\n \n Description : Velociraptor versions prior to 0.76.4 contain a resource exhaustion vulnerability in the server's agent ...", "vulnerability": "CVE-2026-6948", "author": {"login": "automation"}}, {"uuid": "dbbfe372-73a3-4783-9d3c-e71f41ada3d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:01:42.238789+00:00", "type": "seen", "source": "https://bsky.app/profile/hugovalters.bsky.social/post/3mkyeldxe4t2v", "content": "CVE-2026-5781: MphRx Minerva V3.6.0 authz bypass in `/minerva/moUser/update`. Low-priv user can escalate to admin by manipulating `identifier` field. API-level privilege escalation with CVSS 8.8. No patch available. If you run this,...\n\n https://www.valtersit.com/cve/2026/04/cve-2026-5781/", "vulnerability": "cve-2026-5781", "author": {"login": "automation"}}, {"uuid": "d2308da3-a692-43f2-abf9-406eb72e7019", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:49.724714+00:00", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116513363610813393", "content": "\u26a0\ufe0f CVE-2026-7712: MEDIUM severity deserialization vuln in MindsDB \u226426.01 (pickle.loads). Public exploit available, remote attack possible. No vendor response yet. Check your exposure. https://radar.offseq.com/threat/cve-2026-7712-deserialization-in-mindsdb-da28edb5 #OffSeq #MindsDB #Vuln #Deserialization", "vulnerability": "cve-2026-7712", "author": {"login": "automation"}}, {"uuid": "1fc69af1-f946-445d-9fb7-75f1f11f575a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:41.235918+00:00", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkyejjpcik2p", "content": "MindsDB \u226426.01 faces a MEDIUM deserialization vulnerability via pickle.loads. Public exploit out \u2014 remote attacks possible. Review and restrict access. No vendor fix yet. https://radar.offseq.com/threat/cve-2026-7712-deserialization-in-mindsdb-da28edb5 #OffSeq #MindsDB #Security", "vulnerability": "cve-2026-7712", "author": {"login": "automation"}}, {"uuid": "6a4968a8-299c-4d5e-83cf-d317bda751f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2023-35082", "author": {"login": "automation"}}, {"uuid": "7920cd81-71cb-475a-ada1-b7a2d9168f9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2021-21985", "author": {"login": "automation"}}, {"uuid": "cd655cfe-0738-495e-a807-375515345da1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-34068", "author": {"login": "automation"}}, {"uuid": "51e98730-320c-48ac-add0-de1ae652a597", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2018-25114", "author": {"login": "automation"}}, {"uuid": "843786d4-e8a0-45b8-9022-36d8cc6fd4e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2018-11686", "author": {"login": "automation"}}, {"uuid": "c91526a2-eeff-481b-9ce9-1ab4037b6844", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2019-16278", "author": {"login": "automation"}}, {"uuid": "36b57e2a-43fe-4657-8f84-2de4048fb171", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2019-11510", "author": {"login": "automation"}}, {"uuid": "fac53995-e798-4f89-9440-7fb6fd5e3140", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2021-26084", "author": {"login": "automation"}}, {"uuid": "7814de2a-dac4-4da1-adf4-f3aa72daa99c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2019-15107", "author": {"login": "automation"}}, {"uuid": "af91a3fc-51cc-494d-8c1d-a7fb095bb228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2023-42793", "author": {"login": "automation"}}, {"uuid": "c9c19b03-02e1-4e0a-97ab-44bf23a766cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2020-17496", "author": {"login": "automation"}}, {"uuid": "e06f55d2-4558-4b45-853d-d8070702b48f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-0204", "author": {"login": "automation"}}, {"uuid": "3214c4ab-ba06-4fa2-9be3-fa634d45efea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2021-22986", "author": {"login": "automation"}}, {"uuid": "a44bbfc8-b7dd-455d-bcd8-f7f66f65e5e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-0012", "author": {"login": "automation"}}, {"uuid": "d7919ed6-2137-41d0-a83a-3fbf83c8a19d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2023-26801", "author": {"login": "automation"}}, {"uuid": "6fbc0c4f-6fbb-4af6-bbc9-e85f2e4f91fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-27198", "author": {"login": "automation"}}, {"uuid": "ad82cd8a-4de8-4236-8d0d-1384bb4a840e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2019-7192", "author": {"login": "automation"}}, {"uuid": "d6203709-1888-4178-b0fd-aa961df5dcd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2022-37042", "author": {"login": "automation"}}, {"uuid": "9bb0822c-6bbf-4eed-b6f3-cdd9ff6b8da1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2026-21891", "author": {"login": "automation"}}, {"uuid": "2c06423b-d16a-42f0-b512-1c8236920cda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2020-27986", "author": {"login": "automation"}}, {"uuid": "00230133-2759-4a6b-9b03-c9ed9b011d37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2023-22515", "author": {"login": "automation"}}, {"uuid": "f94fafce-ce95-4729-ae32-d7b4de5d1be6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2026-1603", "author": {"login": "automation"}}, {"uuid": "50258535-cf36-46a4-9186-aa6d24991651", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2022-22274", "author": {"login": "automation"}}, {"uuid": "486b00f6-2c1e-4bdb-9611-ddf66db80e10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-0108", "author": {"login": "automation"}}, {"uuid": "49541e37-6d28-4f6a-b6ae-623a9377c82a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2023-0656", "author": {"login": "automation"}}, {"uuid": "4d42d3b0-105a-4bb9-a6d3-edc2fcfbd684", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-3721", "author": {"login": "automation"}}, {"uuid": "7e9b142f-83d4-461d-acab-7e9f7cbbfd11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2021-29441", "author": {"login": "automation"}}, {"uuid": "d447fcd4-3647-4041-b56c-f6207c4b1de1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2023-22527", "author": {"login": "automation"}}, {"uuid": "2b32163a-a1e9-470c-aebd-2b18ed59a33a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2023-23752", "author": {"login": "automation"}}, {"uuid": "83371601-56d6-449f-b42f-097ffb59a4d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-34043", "author": {"login": "automation"}}, {"uuid": "5c13f28e-f910-468c-be7a-d2d72c74ef63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2016-6277", "author": {"login": "automation"}}, {"uuid": "1e5ecef8-bfed-45c5-b9fd-845b90863dc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2023-38646", "author": {"login": "automation"}}, {"uuid": "de1a0242-b3ce-48f8-9f11-8b26c41f3b11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2019-12780", "author": {"login": "automation"}}, {"uuid": "191f4b37-0647-439d-80cb-9a81c8d0706f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-34036", "author": {"login": "automation"}}, {"uuid": "32e07d22-25bb-40e2-a5ea-cfd56d3c821f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2015-2051", "author": {"login": "automation"}}, {"uuid": "2a18abf6-99ba-4454-9d7d-263c960503eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2023-20198", "author": {"login": "automation"}}, {"uuid": "0050d4c3-31f8-4ea3-b404-8f320371c3ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2014-8361", "author": {"login": "automation"}}, {"uuid": "4d09c4a7-7fe2-46ac-8392-e34c72de1f56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2018-10562", "author": {"login": "automation"}}, {"uuid": "5a097b82-f8d4-4230-8c5b-497ace292dc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "f3281508-3926-46b8-ba76-829b3e885f1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2017-17215", "author": {"login": "automation"}}, {"uuid": "44b7fb65-adc8-4ce8-8f1f-852819b41fb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2021-44228", "author": {"login": "automation"}}, {"uuid": "3241834b-7ba7-4047-a3aa-61199f36f3d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2017-9841", "author": {"login": "automation"}}, {"uuid": "5e0b0de0-316d-4775-8a4b-058ad7bf2a88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-34059", "author": {"login": "automation"}}, {"uuid": "0a8ae4dc-26f5-4f50-ba7d-c6bd66941179", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-0107", "author": {"login": "automation"}}, {"uuid": "c58a2065-48d1-4842-b6dc-08a659ab8a93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2026-1603", "author": {"login": "automation"}}, {"uuid": "0eca192c-c1d3-4205-8e7e-d91b955c39ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2018-11759", "author": {"login": "automation"}}, {"uuid": "7efd95dc-9f25-414a-b41f-5ebe3829a83e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-36401", "author": {"login": "automation"}}, {"uuid": "e4a024fb-0725-45d4-bf29-d451e5a8e73e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-5777", "author": {"login": "automation"}}, {"uuid": "8e18dba6-40ac-425d-853f-79982b838bb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-24919", "author": {"login": "automation"}}, {"uuid": "496b9fca-4a13-4e81-a81f-ef6fafa631ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2026-1340", "author": {"login": "automation"}}, {"uuid": "eba6654d-a807-4cac-bf11-a14626d2f4e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2022-24816", "author": {"login": "automation"}}, {"uuid": "4cf6f61b-4a11-4365-b81e-32ada797785d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-25231", "author": {"login": "automation"}}, {"uuid": "8a9bac5c-2ab1-4cfc-94bf-44dcefc711a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-43360", "author": {"login": "automation"}}, {"uuid": "e13c950e-7fb1-4237-b30a-613eeea8aa1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2018-1273", "author": {"login": "automation"}}, {"uuid": "e74e9998-53e5-498d-83e2-2fdc3cee8f3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2018-7600", "author": {"login": "automation"}}, {"uuid": "20ca2bba-0756-499e-b11a-68a9b195b4a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2023-23752", "author": {"login": "automation"}}, {"uuid": "65f56763-7a71-4952-b875-1a54db705d7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-64446", "author": {"login": "automation"}}, {"uuid": "a771cf6e-30c9-440c-9463-594dab874fb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-5287", "author": {"login": "automation"}}, {"uuid": "6e7aef8f-047e-409f-b219-b140df07da72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2018-10562", "author": {"login": "automation"}}, {"uuid": "e86d11f7-7f9f-4cba-8c61-2252dea53fad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-34036", "author": {"login": "automation"}}, {"uuid": "95ef3157-c9aa-4e9d-83a3-990f003af948", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2021-43287", "author": {"login": "automation"}}, {"uuid": "14905f0c-0442-4d8d-9679-2bb98eb96099", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-34068", "author": {"login": "automation"}}, {"uuid": "89d99d59-4fd7-4aed-b9d1-6095fa3b6083", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-34041", "author": {"login": "automation"}}, {"uuid": "9c5bfe95-c03a-4407-ae2d-c793da1489ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-59287", "author": {"login": "automation"}}, {"uuid": "6395d5d9-27b2-477d-a0c1-4f145a48cc3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2016-10108", "author": {"login": "automation"}}, {"uuid": "d9cde748-2095-42a7-af75-cef8ebdb9bef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-12856", "author": {"login": "automation"}}, {"uuid": "b7c843f7-168f-4029-8253-25616f068cb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2017-18368", "author": {"login": "automation"}}, {"uuid": "b8eaec3f-2a70-416b-9820-42886a4a4710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-4358", "author": {"login": "automation"}}, {"uuid": "ba796d8b-5f0c-4de0-992f-e43e377bbd43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-34040", "author": {"login": "automation"}}, {"uuid": "bba336f7-3be3-481b-9ed9-dfa447e9b3f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-35219", "author": {"login": "automation"}}, {"uuid": "064c1ce9-2a8b-409f-8c58-8f3210614303", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2018-17173", "author": {"login": "automation"}}, {"uuid": "3c88d521-78c0-4e67-800d-82cebfdbb8fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2015-2051", "author": {"login": "automation"}}, {"uuid": "c53d14b5-544c-486b-8abf-2584c54ab259", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "bc503367-62d4-4d9e-9c75-9d2136522206", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2019-0193", "author": {"login": "automation"}}, {"uuid": "f8ae54a9-a552-48cc-8633-264b7de8f7be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-49493", "author": {"login": "automation"}}, {"uuid": "d71bbcbf-3088-4676-987c-6df1e5df710e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-37032", "author": {"login": "automation"}}, {"uuid": "22760ef6-733e-4f46-a4cf-42ee8bfd4f63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2026-3055", "author": {"login": "automation"}}, {"uuid": "4631a7e9-7970-4c6c-88a8-ae64643526a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-12847", "author": {"login": "automation"}}, {"uuid": "e513401e-45ca-412b-b3ab-6471826f5e0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2023-42793", "author": {"login": "automation"}}, {"uuid": "ce0ecb7d-0bff-4858-aa3f-e311d948396b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-27198", "author": {"login": "automation"}}, {"uuid": "2bf901c0-f316-45b3-ad10-1100bb224302", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2019-12986", "author": {"login": "automation"}}, {"uuid": "5c3a2850-bcec-477e-b5b4-8b4f29c853e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-32640", "author": {"login": "automation"}}, {"uuid": "0bcfdef4-e93a-41cd-af05-e813bdfbfab8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2021-26084", "author": {"login": "automation"}}, {"uuid": "6e27449b-100f-40a4-b94e-ee5935c41f1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-34257", "author": {"login": "automation"}}, {"uuid": "af8b73d6-ac53-48f3-987e-70a779807df4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2023-33831", "author": {"login": "automation"}}, {"uuid": "9688ee03-fb05-43e4-b762-de2c6c40ca0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2018-11759", "author": {"login": "automation"}}, {"uuid": "26fa5b6c-1b50-4450-a226-874e03eb9fa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-3273", "author": {"login": "automation"}}, {"uuid": "3763c39f-19e6-4e5d-9c95-885da5f4a182", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-9463", "author": {"login": "automation"}}, {"uuid": "1a5f90d8-ba8b-46e0-9b90-3cd51f3f6c35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-5086", "author": {"login": "automation"}}, {"uuid": "5bbfbb8d-d1dc-4ebe-b275-2795762eccf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2021-36260", "author": {"login": "automation"}}, {"uuid": "a0682574-b76e-41f8-bfbc-430b557799f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-27199", "author": {"login": "automation"}}, {"uuid": "ca8cae70-c079-4e6f-b458-ad44f56f2806", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2021-32030", "author": {"login": "automation"}}, {"uuid": "ac2f9e8a-1267-421a-88db-29d469fa9634", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2020-36870", "author": {"login": "automation"}}, {"uuid": "93164ca5-9124-4d5d-815a-3f85004ff195", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2022-26134", "author": {"login": "automation"}}, {"uuid": "1cfcbac0-0eac-4820-962d-f39a5092294e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2026-21643", "author": {"login": "automation"}}, {"uuid": "f64cf2a4-4275-4501-ac4a-6eca30028375", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2026-21902", "author": {"login": "automation"}}, {"uuid": "02d5aec0-b207-4bb2-9d87-d7896802161f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2023-4966", "author": {"login": "automation"}}, {"uuid": "a4e520ff-d74a-4436-84b3-ecf378aae9b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2017-7921", "author": {"login": "automation"}}, {"uuid": "81b7599b-6f4c-4724-8118-1c8f9baa0790", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-1709", "author": {"login": "automation"}}, {"uuid": "87475bd8-5bf7-4146-a3d4-a1ed47036972", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-28995", "author": {"login": "automation"}}, {"uuid": "629d461d-e833-4d4c-a3bf-78f3337d97f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2017-18368", "author": {"login": "automation"}}, {"uuid": "25774223-c7ee-4cc1-b3be-616eb0a10827", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-24919", "author": {"login": "automation"}}, {"uuid": "4f5d2957-9fe7-4d7e-802b-c42add3f6c6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2023-49103", "author": {"login": "automation"}}, {"uuid": "a894c4af-4dde-4a2d-8d43-35985a4197e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-58360", "author": {"login": "automation"}}, {"uuid": "10b62e6e-275c-4fc8-9df5-27ea95e8a003", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2026-3055", "author": {"login": "automation"}}, {"uuid": "5ac8125c-2123-42a4-bdd3-42a882994530", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2019-19781", "author": {"login": "automation"}}, {"uuid": "9b3caba1-09ce-4ceb-976f-9c9735137d0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2020-10173", "author": {"login": "automation"}}, {"uuid": "221c4ce8-fe36-41d2-862e-485fcef45676", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2019-1653", "author": {"login": "automation"}}, {"uuid": "405e176e-0d99-45fa-94b2-7d40efbafede", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2018-13379", "author": {"login": "automation"}}, {"uuid": "4c1a7bcc-3b10-4dd5-9d60-65410b35df24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-55182", "author": {"login": "automation"}}, {"uuid": "1a7e9f4a-b660-4754-9ac4-249df3caf9e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-5777", "author": {"login": "automation"}}, {"uuid": "78f3a9ba-8910-415c-849b-cda39e8b7848", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2021-42013", "author": {"login": "automation"}}, {"uuid": "606e285f-6367-4d11-bae6-8dc90fd9fe27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-12847", "author": {"login": "automation"}}, {"uuid": "743c4f8a-60d2-430e-ba54-4ae6c1db8642", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2016-10372", "author": {"login": "automation"}}, {"uuid": "531dd772-ea70-408f-acd1-79423b2a64de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2018-10737", "author": {"login": "automation"}}, {"uuid": "6c4d555b-5e34-4514-b721-a1dd7eae49fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2026-21891", "author": {"login": "automation"}}, {"uuid": "771b6d53-bc76-440e-9100-184e68f0f366", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2019-12780", "author": {"login": "automation"}}, {"uuid": "513cff9a-36e2-4e29-b1e9-43069b4ccfbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2026-21643", "author": {"login": "automation"}}, {"uuid": "990236f6-db71-4b79-aa8a-f153c62085ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-3273", "author": {"login": "automation"}}, {"uuid": "e0c00998-f170-4473-a9b4-c56ff4c6127f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2021-21972", "author": {"login": "automation"}}, {"uuid": "7b2ccd8f-98d3-4e6b-82bd-67c7855ab622", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-28995", "author": {"login": "automation"}}, {"uuid": "d9ea035f-b8f0-4fdf-9015-bf9551ac2351", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-53118", "author": {"login": "automation"}}, {"uuid": "eb2b4822-d55c-4327-86eb-2484a90af223", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2021-44228", "author": {"login": "automation"}}, {"uuid": "cb6fbc49-afd3-495f-b92d-810afd91fb81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2021-4191", "author": {"login": "automation"}}, {"uuid": "96195453-43ca-4cb6-a8d3-0a6745de300f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-29059", "author": {"login": "automation"}}, {"uuid": "73663725-88b2-4fc6-b6fb-c1076d581e93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2020-15568", "author": {"login": "automation"}}, {"uuid": "35cfe7be-19c3-41c9-8f2c-8dd98293ae82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2017-10271", "author": {"login": "automation"}}, {"uuid": "60a25fe9-f221-4c2d-a776-64aba4a2ec49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2023-0656", "author": {"login": "automation"}}, {"uuid": "703b715d-0d7b-44f6-b113-18fda7273361", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2019-19781", "author": {"login": "automation"}}, {"uuid": "ae7ffb4f-7a71-4835-bc94-d46259c03282", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2021-34473", "author": {"login": "automation"}}, {"uuid": "7e022204-716f-48db-8ac8-a2f63d1c04a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-47812", "author": {"login": "automation"}}, {"uuid": "1138469f-dcce-4eaf-b483-69ee03a4a170", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-3721", "author": {"login": "automation"}}, {"uuid": "4bd5d69f-f4a8-451c-9a17-89336633a8c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2018-7841", "author": {"login": "automation"}}, {"uuid": "c4053c2e-d0d4-4219-a0e4-efd6504dd4d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2022-0540", "author": {"login": "automation"}}, {"uuid": "b28daccb-ffc5-4daa-8b74-f46937a134e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2025-34057", "author": {"login": "automation"}}, {"uuid": "304b3fb2-0543-4aed-b718-45a96ed79081", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2021-21975", "author": {"login": "automation"}}, {"uuid": "32915166-2e9c-4e7f-bb9f-d23504f52bbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2018-25114", "author": {"login": "automation"}}, {"uuid": "b53ee38f-5150-49ed-8ed5-2e1b066fa40a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2019-3396", "author": {"login": "automation"}}, {"uuid": "798cfe21-b867-421b-ba85-52b80f52eec6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2019-16278", "author": {"login": "automation"}}, {"uuid": "e5ec8f94-7e28-4698-8f21-8981e9c7a0ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2019-8442", "author": {"login": "automation"}}, {"uuid": "797dffa9-06ce-4b99-89f4-300ffa8c496c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2019-19825", "author": {"login": "automation"}}, {"uuid": "aa97e6d2-f28f-449d-bdcf-b29a161597cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2024-39713", "author": {"login": "automation"}}, {"uuid": "e42bd602-a13c-4f74-ad15-2dab735d3902", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2023-22527", "author": {"login": "automation"}}, {"uuid": "20ffab61-b6b0-42b9-818d-698d39760169", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-04T00:00:00+00:00", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "vulnerability": "CVE-2017-7921", "author": {"login": "automation"}}, {"uuid": "49036ce0-967b-4316-a0ee-4c56bb20af9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T23:45:45.484702+00:00", "type": "seen", "source": "https://bsky.app/profile/icsda.bsky.social/post/3mkydottyfa2m", "content": "\u4f60\u5404\u4f4d\u7684cPanel\u53c8\u88abSorry\u52d2\u7d22\u4e86\u6c92\uff1f\ud83d\ude05 \u5225\u4ee5\u70baLinux\u5c31\u6c92\u4e8b\uff0cCISA\u628a\u90a3\u500bLPE\u6f0f\u6d1e\uff08CVE-2026-31431\uff09\u5217\u5165KEV\u6e05\u55ae\u5566\uff0c\u6839\u6b0a\u8981\u88ab\u596a\u8d70\u4e86\uff01Fortinet 8.0\u9084\u5728\u8b1bAI\u3001\u91cf\u5b50\u5b89\u5168\uff0c\u9019\u901f\u5ea6\u5dee\u6709\u9ede\u591a\u9f41\u3002\u8d95\u5feb\u4fee\uff0c\u4e0d\u7136\u660e\u5929\u5225\u60f3\u898b\u8001\u95c6\uff01 #\u8cc7\u5b89\u8b66\u5831 #Linux #\u52d2\u7d22\u8edf\u9ad4", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "7bc6d0df-f3d5-488b-ade6-de2c95a54d8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T23:33:56+00:00", "type": "seen", "source": "Telegram/qhz-xmRgIk63jLSrK2_FE81USJ0RiYiUMNcM_dhi03aP8g", "content": "", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "44ba3bec-4440-433c-91ce-836403edf333", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T23:25:00.717203+00:00", "type": "seen", "source": "https://bsky.app/profile/intel.overresearched.net/post/3mkycjqiwsc2t", "content": "cPanel CVE-2026-41940 mass-exploited\u201444k+ hosts hit with Go-based \"Sorry\" Linux ransomware. Critical libssh2 &amp; binutils RCEs disclosed. Shinyhunters, M3rx &amp; Everest all posted fresh victims.\n\nFull brief: intel.overresearched.net/2026/05/03/c...\n\n #Daily #ThreatIntel #InfoSec", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "b9406422-7924-4750-a1a3-fac953afb827", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T23:00:13+00:00", "type": "seen", "source": "Telegram/zMIGDiZKcsuCchc0aPmk0dRYccv5m6M1w-Y-ifos8swuOP4", "content": "", "vulnerability": "CVE-2026-36356", "author": {"login": "automation"}}, {"uuid": "5f60cc2e-4be0-4217-959f-e008011e44e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T23:00:13+00:00", "type": "seen", "source": "Telegram/zMIGDiZKcsuCchc0aPmk0dRYccv5m6M1w-Y-ifos8swuOP4", "content": "", "vulnerability": "CVE-2026-40776", "author": {"login": "automation"}}, {"uuid": "291d3b72-507b-4e55-ab51-83677d065e1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T22:57:41.647420+00:00", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/116513116081777494", "content": "The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-31431, a Linux root access bug also known as Copy Fail, to its Known Exploited Vulnerabilities catalog due to active exploitation. This privilege escalation flaw allows unprivileged local users to gain root access by corrupting the kernel's page cache, posing a significant risk to cloud and containerized environments.https://thehackernews.com/2026/05/cisa-adds-actively-exploited-linux-root.html", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "fcc825c0-7981-4b0a-934d-6a4f275a6996", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T22:33:51.734106+00:00", "type": "seen", "source": "https://bsky.app/profile/frei-style.net/post/3mky7o5n4tk23", "content": "If you are talking about CVE-2026-31431 (Copy Fail.) then yes, it was discovered with the help of Theori Xint Code, an AI powered software, by the researcher Taeyang Lee who is working for Theori since 2019. Link to the write up: xint.io/blog/copy-fa...", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "cae97d27-77dd-4457-a185-98369fd1f009", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T22:07:07.616459+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mky66i56tz25", "content": "\ud83d\udccc CVE-2026-5608 - A vulnerability was detected in Belkin F9K1122 1.00.33. Affected is the function formWlanSetup of the file /goform/formWlanSetup. The manipulation of ... https://www.cyberhub.blog/cves/CVE-2026-5608", "vulnerability": "CVE-2026-5608", "author": {"login": "automation"}}, {"uuid": "078b3edc-35ed-4f05-a9cb-edda1cadf89b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T22:05:48.688945+00:00", "type": "seen", "source": "https://bsky.app/profile/ninjaowl.ai/post/3mky644nc6h2w", "content": "CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "3def3817-c7ef-4c49-9ac4-4832c5275d90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T22:00:29.926790+00:00", "type": "seen", "source": "https://bsky.app/profile/lbtoday1.bsky.social/post/3mky5smwc5s2f", "content": "The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about an actively exploited vulnerability in a popular Linux web application. The vulnerability, identified as CVE-2022-24424, affects Exim Mail Transfer Agent version 4.91.11 and older..", "vulnerability": "CVE-2022-24424", "author": {"login": "automation"}}, {"uuid": "bd366f25-a7cc-432d-922e-b655e081b8b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T21:24:35.979203+00:00", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116512750014975316", "content": "Some increased actor activities are shown targeting webaways NEX-Forms Plugin (CVE-2026-5063) https://vuldb.com/vuln/360874/cti", "vulnerability": "CVE-2026-5063", "author": {"login": "automation"}}, {"uuid": "0a61e9e4-e01f-430e-86da-e94a4a9cc677", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T21:19:38.983879+00:00", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mky3jlf4hy2z", "content": "CVE-2026-41940: CRLF Injection Opens 70 Million cPanel Hosts to Complete Takeover +\u00a0Video\n\nIntroduction: A maximum-severity vulnerability tracked as CVE-2026-41940 (CVSS 10.0) is currently being exploited in the wild, compromising thousands of servers hosting an estimated 70 million domains. The\u2026", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "39f7250e-1190-4124-a316-0cf53ed5ad37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T21:13:50.042397+00:00", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mky376podd22", "content": "Precise disclosure contents for copyfail (Re: [oss-security] CVE-2026-31431: CopyFail: linux local privilege scalation)", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "172260f8-7d9e-4395-8256-6c7b71858f34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T21:10:40+00:00", "type": "seen", "source": "https://gist.github.com/junius-sec/61c2d859529062698ce56d6ec4d09ba5", "content": "", "vulnerability": "CVE-2026-39103", "author": {"login": "automation"}}, {"uuid": "bffcc052-03ba-4f07-9de7-e9e676566f7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T21:08:31+00:00", "type": "seen", "source": "https://gist.github.com/junius-sec/7b1e4f2f6d7e08357364ddd3402a4e4d", "content": "", "vulnerability": "CVE-2026-39103", "author": {"login": "automation"}}, {"uuid": "f68fc4de-52b1-4d0c-96a1-4d864d4949e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T21:06:48.844643+00:00", "type": "seen", "source": "https://bsky.app/profile/hugovalters.bsky.social/post/3mky2smzu6f2f", "content": "CVE-2026-3346: stored XSS in IBM Langflow 1.6.0-1.8.4. Authenticated attacker injects JS into Web UI fields, steals cookies/sessions. No patch, no exploit in wild. CVSS 6.4, but credential disclosure risk is real. Pin your versions....\n\n https://www.valtersit.com/cve/2026/04/cve-2026-3346/", "vulnerability": "cve-2026-3346", "author": {"login": "automation"}}, {"uuid": "0c180f07-e97d-4b68-ac88-b75ed4410fb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T21:00:41+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82671", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #RCE #Remote\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-36356\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a totekuh\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-03 20:58:31\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nCVE-2026-36356: MeiG Smart FORGE_SLT711 GoAhead - Unauthenticated OS Command Injection (RCE as root)\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-36356", "author": {"login": "automation"}}, {"uuid": "e2976f2f-b6f1-4bf2-88c0-e0a73e6baae5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T21:00:04+00:00", "type": "seen", "source": "https://t.me/GithubRedTeam/82670", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CPanel-Audit-Remediation-Tool\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a Underh0st\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-03 20:58:59\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nAudit and incident response tool for CVE-2026-41940 vulnerability\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "vulnerability": "CVE-2026-41940", "author": {"login": "automation"}}, {"uuid": "c172485e-8af2-403d-8346-03fbbef94f36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T21:00:04+00:00", "type": "seen", "source": "Telegram/XXwxQXb-tvoojVYSOrs5t4rzcGDASvn2l14g7pH1kZVhQSE", "content": "", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "fa60b8a3-e1f2-4fed-841e-8849c2ad2c55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T21:00:00+00:00", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1847", "content": "", "vulnerability": "CVE-2026-31431", "author": {"login": "syspect"}}, {"uuid": "5fd1e53d-846a-4d54-a8d5-3c65994e09c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T21:00:00+00:00", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1846", "content": "", "vulnerability": "CVE-2026-31431", "author": {"login": "syspect"}}, {"uuid": "d5b406fd-020f-4a43-a078-fb4c6c5d4dfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T20:57:51+00:00", "type": "seen", "source": "https://threatintel.cc/2026/05/03/cisa-adds-actively-exploited-linux.html", "content": "CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-31431, a Linux root access bug also known as Copy Fail, to its Known Exploited Vulnerabilities catalog due to active exploitation. This privilege escalation flaw allows unprivileged local users to gain root access by corrupting the kernel&rsquo;s page cache, posing a significant risk to cloud and containerized environments.", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "9dcfa88a-2373-46dd-8004-d74f43280a99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T20:55:58.601386+00:00", "type": "seen", "source": "https://bsky.app/profile/lu1tr0n.bsky.social/post/3mky27aqpg42q", "content": "CVE-2026-41940: el bypass de autenticaci\u00f3n en cPanel que estuvo activo nueve semanas como zero-day\n\n\nhttps://elsolitario.org/2026/05/03/cve-2026-41940-el-bypass-de-autenticacion-en-cpanel-que-estuvo-activo-nueve-sema/?utm_source=bluesky&amp;utm_medium=social&amp;utm_campaign=programacion", "vulnerability": "cve-2026-41940", "author": {"login": "automation"}}, {"uuid": "01197935-ac2a-476b-bd86-565564b94314", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T20:55:34.136853+00:00", "type": "seen", "source": "https://bsky.app/profile/lu1tr0n.bsky.social/post/3mky26i7fhw2s", "content": "CVE-2026-41940: el bypass de autenticaci\u00f3n en cPanel que estuvo activo nueve semanas como zero-day\n\n\nhttps://elsolitario.org/2026/05/03/cve-2026-41940-el-bypass-de-autenticacion-en-cpanel-que-estuvo-activo-nueve-sema/?utm_source=bluesky&amp;utm_medium=social&amp;utm_campaign=programacion", "vulnerability": "cve-2026-41940", "author": {"login": "automation"}}, {"uuid": "2966a11d-0af0-4714-86a4-c93c206d8d78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T20:55:15.466684+00:00", "type": "seen", "source": "https://bsky.app/profile/roberio-batista.bsky.social/post/3mky26vueic2b", "content": "Encontrado pelo Xint Code, a vulnerabilidade de seguran\u00e7a Copy Fail (CVE-2026-31431), foi corrigida no Debian, no Ubuntu, AlmaLinux OS e outras distribui\u00e7\u00f5es populares afetadas por essa falha.\n\nOBS: A descoberta foi feita com o apoio de uma ferramenta de intelig\u00eancia artificial chamada Xint Code.", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "2a8cfaf3-4150-47dc-81fa-77f59a19ac34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T20:49:07.050052+00:00", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mkxzsxq6vc26", "content": "CVE-2026-31431: The 732-Byte Script That Renders All Linux Kernel Defenses Since 2017 Obsolete +\u00a0Video\n\nIntroduction: A recently disclosed local privilege escalation (LPE) vulnerability identified as CVE-2026-31431 and codenamed \"Copy Fail\" has sent shockwaves through the cybersecurity community.\u2026", "vulnerability": "CVE-2026-31431", "author": {"login": "automation"}}, {"uuid": "3065c8cf-aee1-48cb-9f11-62864215e7a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T20:31:49.104627+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkxyu2d77q2r", "content": "CVE-2026-7704 - AV Stumpfl Pixera Two Media Server Service Port 1338 path traversal\nCVE ID : CVE-2026-7704\n \n Published : May 3, 2026, 5:16 p.m. | 3\u00a0hours, 4\u00a0minutes ago\n \n Description : A vulnerability has been found in AV Stumpfl Pixera Two Media Server up to 25.1 R2. The af...", "vulnerability": "CVE-2026-7704", "author": {"login": "automation"}}, {"uuid": "bb99cbb1-ae21-4518-898e-76e92a5be7ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T20:28:12.507614+00:00", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116512528267704627", "content": "Some increased actor activities are shown targeting mtrudel bandit (CVE-2026-42786) https://vuldb.com/vuln/360789/cti", "vulnerability": "CVE-2026-42786", "author": {"login": "automation"}}, {"uuid": "77853122-ce96-40c7-ad43-e9db53c4b804", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T20:28:12.126016+00:00", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116512528213965930", "content": "Some increased actor activities are shown targeting appcheap App Builder Plugin (CVE-2026-7638) https://vuldb.com/vuln/360794/cti", "vulnerability": "CVE-2026-7638", "author": {"login": "automation"}}, {"uuid": "aa101911-1883-42e7-af32-f27d19e0b7ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T20:26:47.998987+00:00", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkxyl3ixzl2p", "content": "CVE-2026-7703 - AV Stumpfl Pixera Two Media Server Websocket API code injection\nCVE ID : CVE-2026-7703\n \n Published : May 3, 2026, 5:16 p.m. | 3\u00a0hours, 4\u00a0minutes ago\n \n Description : A flaw has been found in AV Stumpfl Pixera Two Media Server up to 25.2 R2. Impacted is an unkn...", "vulnerability": "CVE-2026-7703", "author": {"login": "automation"}}, {"uuid": "32b56ded-9238-4a84-a65d-5373c747fae4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "creation_timestamp": "2026-05-03T20:07:10.141683+00:00", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mkxxhwocus26", "content": "\ud83d\udccc CVE-2026-5604 - A security flaw has been discovered in Tenda CH22 1.0.0.1. The impacted element is the function formCertLocalPrecreate of the file /goform/CertLocalPr... https://www.cyberhub.blog/cves/CVE-2026-5604", "vulnerability": "CVE-2026-5604", "author": {"login": "automation"}}]}
