home.social

#vulnerability — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #vulnerability, aggregated by home.social.

  1. I'm almost inclined to gloat after the 4000 (mere change) layoffs because "look, we're drowning in money. Who needs people?"

    - CRITICAL: CVE-2026-20182: Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability sec.cloudapps.cisco.com/securi

    - CRITICAL: CVE-2026-20209, CVE-2026-20210 CVE-2026-20224: Cisco Catalyst SD-WAN Manager Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability

    @cR0w

  2. I'm almost inclined to gloat after the 4000 (mere change) layoffs because "look, we're drowning in money. Who needs people?"

    - CRITICAL: CVE-2026-20182: Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability sec.cloudapps.cisco.com/securi

    - CRITICAL: CVE-2026-20209, CVE-2026-20210 CVE-2026-20224: Cisco Catalyst SD-WAN Manager Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability

    @cR0w

  3. I'm almost inclined to gloat after the 4000 (mere change) layoffs because "look, we're drowning in money. Who needs people?"

    - CRITICAL: CVE-2026-20182: Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability sec.cloudapps.cisco.com/securi

    - CRITICAL: CVE-2026-20209, CVE-2026-20210 CVE-2026-20224: Cisco Catalyst SD-WAN Manager Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability

    @cR0w

  4. I'm almost inclined to gloat after the 4000 (mere change) layoffs because "look, we're drowning in money. Who needs people?"

    - CRITICAL: CVE-2026-20182: Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability sec.cloudapps.cisco.com/securi

    - CRITICAL: CVE-2026-20209, CVE-2026-20210 CVE-2026-20224: Cisco Catalyst SD-WAN Manager Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability

    @cR0w

  5. I'm almost inclined to gloat after the 4000 (mere change) layoffs because "look, we're drowning in money. Who needs people?"

    - CRITICAL: CVE-2026-20182: Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability sec.cloudapps.cisco.com/securi

    - CRITICAL: CVE-2026-20209, CVE-2026-20210 CVE-2026-20224: Cisco Catalyst SD-WAN Manager Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability

    @cR0w

  6. #Mythos finds a curl vulnerability
    daniel.haxx.se/blog/2026/05/11

    “AI powered code #analyzers are significantly better at finding security flaws and mistakes in #source code than any traditional code analyzers did in the past. All modern AI models are good at this now. Anyone with time and some experimental spirits can find #security problems now.”

    “We have not seen any AI so far report a #vulnerability that would somehow be of a novel kind or something totally new.”

    #AI #curl #code #flaws

  7. 📰 PraisonAI Auth Bypass (CVE-2026-44338) Exploited Within Four Hours of Disclosure

    The disclosure-to-exploit window has collapsed. ⏱️ A critical auth bypass in PraisonAI (CVE-2026-44338) was exploited by automated scanners in under 4 hours. A stark reminder to patch immediately. #CyberSecurity #Vulnerability #Automation #AI

    🔗 cyber.netsecops.io/articles/pr

  8. 📰 PraisonAI Auth Bypass (CVE-2026-44338) Exploited Within Four Hours of Disclosure

    The disclosure-to-exploit window has collapsed. ⏱️ A critical auth bypass in PraisonAI (CVE-2026-44338) was exploited by automated scanners in under 4 hours. A stark reminder to patch immediately. #CyberSecurity #Vulnerability #Automation #AI

    🔗 cyber.netsecops.io/articles/pr

  9. 📰 PraisonAI Auth Bypass (CVE-2026-44338) Exploited Within Four Hours of Disclosure

    The disclosure-to-exploit window has collapsed. ⏱️ A critical auth bypass in PraisonAI (CVE-2026-44338) was exploited by automated scanners in under 4 hours. A stark reminder to patch immediately. #CyberSecurity #Vulnerability #Automation #AI

    🔗 cyber.netsecops.io/articles/pr

  10. 📰 PraisonAI Auth Bypass (CVE-2026-44338) Exploited Within Four Hours of Disclosure

    The disclosure-to-exploit window has collapsed. ⏱️ A critical auth bypass in PraisonAI (CVE-2026-44338) was exploited by automated scanners in under 4 hours. A stark reminder to patch immediately. #CyberSecurity #Vulnerability #Automation #AI

    🔗 cyber.netsecops.io/articles/pr

  11. Me demoré una semana en terminar este artículo sobre #copyfail para el blog de JuncoTIC, levanto la cabeza, y me encuentro con #DirtyFrag y ahora #Fragnesia... así no se puede 😅

    Así que nada, que lo disfruten, y comenten si encuentran algún error, por si se me ha escapado algo 👇👇👇

    juncotic.com/copyfail-vulnerab

    #gnu #linux #copyfail #vulnerability #infosec #cybersecurity #ciberseguridad #crypto #encryption #cryptography #aead #cve #juncotic

  12. Me demoré una semana en terminar este artículo sobre #copyfail para el blog de JuncoTIC, levanto la cabeza, y me encuentro con #DirtyFrag y ahora #Fragnesia... así no se puede 😅

    Así que nada, que lo disfruten, y comenten si encuentran algún error, por si se me ha escapado algo 👇👇👇

    juncotic.com/copyfail-vulnerab

    #gnu #linux #copyfail #vulnerability #infosec #cybersecurity #ciberseguridad #crypto #encryption #cryptography #aead #cve #juncotic

  13. Me demoré una semana en terminar este artículo sobre #copyfail para el blog de JuncoTIC, levanto la cabeza, y me encuentro con #DirtyFrag y ahora #Fragnesia... así no se puede 😅

    Así que nada, que lo disfruten, y comenten si encuentran algún error, por si se me ha escapado algo 👇👇👇

    juncotic.com/copyfail-vulnerab

    #gnu #linux #copyfail #vulnerability #infosec #cybersecurity #ciberseguridad #crypto #encryption #cryptography #aead #cve #juncotic

  14. Me demoré una semana en terminar este artículo sobre #copyfail para el blog de JuncoTIC, levanto la cabeza, y me encuentro con #DirtyFrag y ahora #Fragnesia... así no se puede 😅

    Así que nada, que lo disfruten, y comenten si encuentran algún error, por si se me ha escapado algo 👇👇👇

    juncotic.com/copyfail-vulnerab

    #gnu #linux #copyfail #vulnerability #infosec #cybersecurity #ciberseguridad #crypto #encryption #cryptography #aead #cve #juncotic

  15. Me demoré una semana en terminar este artículo sobre #copyfail para el blog de JuncoTIC, levanto la cabeza, y me encuentro con #DirtyFrag y ahora #Fragnesia... así no se puede 😅

    Así que nada, que lo disfruten, y comenten si encuentran algún error, por si se me ha escapado algo 👇👇👇

    juncotic.com/copyfail-vulnerab

    #gnu #linux #copyfail #vulnerability #infosec #cybersecurity #ciberseguridad #crypto #encryption #cryptography #aead #cve #juncotic

  16. #Fragnesia Made Public As Latest #Linux Local #PrivilegeEscalation #Vulnerability

    A new Linux local privilege escalation flaw called Fragnesia has been disclosed as a Dirty Frag-like vulnerability, allowing arbitrary byte writes into the #kernel page cache of read-only files through a separate ESP/XFRM logic bug.
    #dirtyfrag #security

    linux.slashdot.org/story/26/05

  17. #Fragnesia Made Public As Latest #Linux Local #PrivilegeEscalation #Vulnerability

    A new Linux local privilege escalation flaw called Fragnesia has been disclosed as a Dirty Frag-like vulnerability, allowing arbitrary byte writes into the #kernel page cache of read-only files through a separate ESP/XFRM logic bug.
    #dirtyfrag #security

    linux.slashdot.org/story/26/05

  18. #Fragnesia Made Public As Latest #Linux Local #PrivilegeEscalation #Vulnerability

    A new Linux local privilege escalation flaw called Fragnesia has been disclosed as a Dirty Frag-like vulnerability, allowing arbitrary byte writes into the #kernel page cache of read-only files through a separate ESP/XFRM logic bug.
    #dirtyfrag #security

    linux.slashdot.org/story/26/05

  19. Made Public As Latest Local

    A new Linux local privilege escalation flaw called Fragnesia has been disclosed as a Dirty Frag-like vulnerability, allowing arbitrary byte writes into the page cache of read-only files through a separate ESP/XFRM logic bug.

    linux.slashdot.org/story/26/05

  20. #Fragnesia Made Public As Latest #Linux Local #PrivilegeEscalation #Vulnerability

    A new Linux local privilege escalation flaw called Fragnesia has been disclosed as a Dirty Frag-like vulnerability, allowing arbitrary byte writes into the #kernel page cache of read-only files through a separate ESP/XFRM logic bug.
    #dirtyfrag #security

    linux.slashdot.org/story/26/05

  21. #Linux bitten by second severe #vulnerability in as many weeks

    Linux users have been bitten by yet another vulnerability that gives #containers and untrusted users the ability to gain #root access, marking the second time in as many weeks that a severe threat has caught defenders off guard.
    #security #privacy

    arstechnica.com/security/2026/

  22. Resulting from funding gaps and idiotic shifts in priorities the U.S.A. is now woefully under investing in our core CyberDefense Ecosystem....

    National Institute of Standards and Technology (NIST) is no longer enhancing all Common Vulnerabilities and Exposures (CVEs) with analysis and severity indicators, and instead NIST will prioritize enriching a much narrower set of security vulnerabilities.

    Related: In April 2025, a funding gap by in DHS appropriations threatened to cease CVE operations entirely —which would have creating systemic risk for global vulnerability management. An emergency funding extension was implemented to avoid a full on crisis. justsecurity.org/136914/nist-c #NIST #MITRE #CVEs #NVD #Security #Risk #CyberSecurity #CyberDefence #CyberInfrastructure #AI #AISecurity #CISA #DHS #Vulnerability #ThreatIntelligence

  23. Resulting from funding gaps and idiotic shifts in priorities the U.S.A. is now woefully under investing in our core CyberDefense Ecosystem....

    National Institute of Standards and Technology (NIST) is no longer enhancing all Common Vulnerabilities and Exposures (CVEs) with analysis and severity indicators, and instead NIST will prioritize enriching a much narrower set of security vulnerabilities.

    Related: In April 2025, a funding gap by in DHS appropriations threatened to cease CVE operations entirely —which would have creating systemic risk for global vulnerability management. An emergency funding extension was implemented to avoid a full on crisis. justsecurity.org/136914/nist-c #NIST #MITRE #CVEs #NVD #Security #Risk #CyberSecurity #CyberDefence #CyberInfrastructure #AI #AISecurity #CISA #DHS #Vulnerability #ThreatIntelligence

  24. Resulting from funding gaps and idiotic shifts in priorities the U.S.A. is now woefully under investing in our core CyberDefense Ecosystem....

    National Institute of Standards and Technology (NIST) is no longer enhancing all Common Vulnerabilities and Exposures (CVEs) with analysis and severity indicators, and instead NIST will prioritize enriching a much narrower set of security vulnerabilities.

    Related: In April 2025, a funding gap by in DHS appropriations threatened to cease CVE operations entirely —which would have creating systemic risk for global vulnerability management. An emergency funding extension was implemented to avoid a full on crisis. justsecurity.org/136914/nist-c #NIST #MITRE #CVEs #NVD #Security #Risk #CyberSecurity #CyberDefence #CyberInfrastructure #AI #AISecurity #CISA #DHS #Vulnerability #ThreatIntelligence

  25. Resulting from funding gaps and idiotic shifts in priorities the U.S.A. is now woefully under investing in our core CyberDefense Ecosystem....

    National Institute of Standards and Technology (NIST) is no longer enhancing all Common Vulnerabilities and Exposures (CVEs) with analysis and severity indicators, and instead NIST will prioritize enriching a much narrower set of security vulnerabilities.

    Related: In April 2025, a funding gap by in DHS appropriations threatened to cease CVE operations entirely —which would have creating systemic risk for global vulnerability management. An emergency funding extension was implemented to avoid a full on crisis. justsecurity.org/136914/nist-c #NIST #MITRE #CVEs #NVD #Security #Risk #CyberSecurity #CyberDefence #CyberInfrastructure #AI #AISecurity #CISA #DHS #Vulnerability #ThreatIntelligence

  26. Resulting from funding gaps and idiotic shifts in priorities the U.S.A. is now woefully under investing in our core CyberDefense Ecosystem....

    National Institute of Standards and Technology (NIST) is no longer enhancing all Common Vulnerabilities and Exposures (CVEs) with analysis and severity indicators, and instead NIST will prioritize enriching a much narrower set of security vulnerabilities.

    Related: In April 2025, a funding gap by in DHS appropriations threatened to cease CVE operations entirely —which would have creating systemic risk for global vulnerability management. An emergency funding extension was implemented to avoid a full on crisis. justsecurity.org/136914/nist-c

  27. 🟠 CVE-2026-44548 - High (8.1)

    ChurchCRM is an open-source church management system. Prior to 7.3.2, top-level cross-site GET navigation from an attacker-controlled page to FundRaiserDelete.php, PropertyTypeDelete.php, or NoteDelete.php causes a logged-in ChurchCRM user with th...

    🔗 thehackerwire.com/vulnerabilit

    #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  28. 🔴 CVE-2026-44547 - Critical (9.6)

    ChurchCRM is an open-source church management system. From 7.2.0 to 7.2.2, The fix for CVE-2026-4058 is incomplete. The hardening commit was merged and then silently stripped from src/api/routes/public/public-user.php by an unrelated PR before any...

    🔗 thehackerwire.com/vulnerabilit

    #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  29. 🟠 CVE-2026-8108 - High (7.8)

    The installation of Fuji Tellus adds a driver to the kernel which grants all users read and write permissions.

    🔗 thehackerwire.com/vulnerabilit

    #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack