{"vulnerability": "CVE-2026-42246", "sightings": [{"uuid": "36c49c20-dbf9-43f9-8912-b050a81082f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42246", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mlhb56mffj2q", "content": "CVE-2026-42246 - net-imap vulnerable to STARTTLS stripping via invalid response timing\nCVE ID : CVE-2026-42246\n \n Published : May 9, 2026, 8:16 p.m. | 33\u00a0minutes ago\n \n Description : Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Pri...", "creation_timestamp": "2026-05-09T22:10:04.766614Z"}, {"uuid": "79b6604f-fb91-4fd6-af2c-599740d73a1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42246", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116547690805808920", "content": "\ud83d\udd0e CVE-2026-42246 (HIGH): ruby net-imap (&lt;0.3.10, &lt;0.4.24, &lt;0.5.14, &lt;0.6.4) fails to report TLS handshake errors, risking plaintext IMAP traffic under MITM. Patch now to protect email integrity! https://radar.offseq.com/threat/cve-2026-42246-cwe-392-missing-report-of-error-con-229e609d #OffSeq #Ruby #Infosec #EmailSecurity", "creation_timestamp": "2026-05-10T01:30:32.237220Z"}, {"uuid": "fb22469e-dd1c-4524-bfeb-aaa07f12be20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-42246", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mlhmdq52mi23", "content": "HIGH severity flaw in ruby net-imap (&lt;0.3.10, &lt;0.4.24, &lt;0.5.14, &lt;0.6.4): attackers can bypass TLS, exposing email data. Update to a fixed version now! \ud83d\udd12 https://radar.offseq.com/threat/cve-2026-42246-cwe-392-missing-report-of-error-con-229e609d #OffSeq #Ruby #EmailSecurity", "creation_timestamp": "2026-05-10T01:30:32.439646Z"}, {"uuid": "0ed4f154-873a-473a-a3c9-9379ef92b1d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-42246", "type": "seen", "source": "https://bsky.app/profile/lambdawatchdog.bsky.social/post/3mliplsspcm2d", "content": "\n\ud83d\udea8 New HIGH CVE detected in AWS Lambda \ud83d\udea8\nCVE-2026-42246 impacts net-imap in 4 Lambda base images.\n\nDetails: https://github.com/aws/aws-lambda-base-images/issues/514\nMore: https://lambdawatchdog.com/\n\n#AWS #Lambda #CVE #CloudSecurity #Serverless", "creation_timestamp": "2026-05-10T12:01:24.164092Z"}]}