Aggregator
VoidLink Rootkit Uses eBPF and Kernel Modules to Hide Deep Inside Linux Systems
1 month ago
A new and technically advanced rootkit called VoidLink has emerged as a serious threat to Linux systems, blending Loadable Kernel Modules (LKMs) with extended Berkeley Packet Filter (eBPF) programs to hide deep inside the operating system’s core. First documented by Check Point Research in January 2026, VoidLink is a cloud-native Linux malware framework written in […]
The post VoidLink Rootkit Uses eBPF and Kernel Modules to Hide Deep Inside Linux Systems appeared first on Cyber Security News.
Tushar Subhra Dutta
Aqua Security security advisory (AV26-283) – Update 1
1 month ago
Canadian Centre for Cyber Security
CISA: New Langflow flaw actively exploited to hijack AI workflows
1 month ago
The Cybersecurity and Infrastructure Security Agency (CISA) is warning that hackers are actively exploiting a critical vulnerability identified as CVE-2026-33017, which affects the Langflow framework for building AI agents. [...]
Bill Toulas
Squid security advisory (AV26-284)
1 month ago
Canadian Centre for Cyber Security
Critical Flaw in Langflow AI Platform Under Attack
1 month ago
Threats actors pounced on the code injection vulnerability within hours of its disclosure, demonstrating that organizations have little time to address critical bugs.
Rob Wright
CVE-2026-33634 | aquasecurity setup-trivy/trivy-action/trivy up to 0.2.5 malicious code (GHSA-69fq-xp46-6x23)
1 month ago
A vulnerability marked as critical has been reported in aquasecurity setup-trivy, trivy-action and trivy up to 0.2.5. Impacted is an unknown function. The manipulation leads to embedded malicious code.
This vulnerability is listed as CVE-2026-33634. The attack may be initiated remotely. In addition, an exploit is available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2025-43520 | Apple macOS/tvOS/visionOS/watchOS/iOS/iPadOS up to 26.0 memory corruption
1 month ago
A vulnerability labeled as critical has been found in Apple macOS, tvOS, visionOS, watchOS, iOS and iPadOS up to 26.0. This issue affects some unknown processing. The manipulation results in memory corruption.
This vulnerability was named CVE-2025-43520. The attack needs to be approached locally. In addition, an exploit is available.
The affected component should be upgraded.
vuldb.com
Coruna exploit reveals evolution of Triangulation iOS exploitation framework
1 month ago
Kaspersky found Coruna iOS exploits reuse updated code from the 2023 Operation Triangulation attacks, suggesting a possible link. Kaspersky researchers discovered that the Coruna iOS exploit kit uses an updated version of the same kernel exploit seen in the 2023 Operation Triangulation campaign. While early evidence didn’t clearly link the two, the code similarities now […]
Pierluigi Paganini
FCC pushes new rules to crack down on robocallers, foreign call centers
1 month ago
Two measures aim to make it harder for robocallers to obtain valid U.S. phone numbers and pressure companies to onshore call center services.
The post FCC pushes new rules to crack down on robocallers, foreign call centers appeared first on CyberScoop.
djohnson
CVE-2025-13651 | Microcom ZeusWeb 6.1.31 exposure of sensitive system information to an unauthorized control sphere
1 month ago
A vulnerability classified as problematic was found in Microcom ZeusWeb 6.1.31. The affected element is an unknown function. The manipulation results in exposure of sensitive system information to an unauthorized control sphere.
This vulnerability is known as CVE-2025-13651. It is possible to launch the attack remotely. No exploit is available.
vuldb.com
CVE-2026-3849 | wolfSSL up to 5.8.4 ECH wc_HpkeLabeledExtract out-of-bounds write (Nessus ID 303183)
1 month ago
A vulnerability, which was classified as critical, has been found in wolfSSL up to 5.8.4. This affects the function wc_HpkeLabeledExtract of the component ECH Handler. This manipulation causes out-of-bounds write.
This vulnerability appears as CVE-2026-3849. The attack may be initiated remotely. There is no available exploit.
It is suggested to install a patch to address this issue.
vuldb.com
CVE-2026-3549 | wofSSL up to 5.8.x ECH Parser heap-based overflow (Nessus ID 303180)
1 month ago
A vulnerability was found in wofSSL up to 5.8.x. It has been classified as critical. Affected by this issue is some unknown functionality of the component ECH Parser. This manipulation causes heap-based buffer overflow.
The identification of this vulnerability is CVE-2026-3549. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-4485 | itsourcecode College Management System 1.0 search_student.php Search sql injection
1 month ago
A vulnerability was found in itsourcecode College Management System 1.0. It has been classified as critical. The impacted element is an unknown function of the file /admin/search_student.php. The manipulation of the argument Search leads to sql injection.
This vulnerability is uniquely identified as CVE-2026-4485. The attack is possible to be carried out remotely. Moreover, an exploit is present.
vuldb.com
CVE-2026-4486 | D-Link DIR-513 1.10 Web Service formEasySetPassword curTime stack-based overflow
1 month ago
A vulnerability was found in D-Link DIR-513 1.10. It has been declared as critical. This affects the function formEasySetPassword of the file /goform/formEasySetPassword of the component Web Service. The manipulation of the argument curTime results in stack-based buffer overflow. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability was named CVE-2026-4486. The attack may be performed from remote. In addition, an exploit is available.
vuldb.com
CVE-2026-33372 | Zimbra Collaboration Suite 10.0/10.1 Request Header cross-site request forgery (EUVD-2026-13698)
1 month ago
A vulnerability marked as problematic has been reported in Zimbra Collaboration Suite 10.0/10.1. The affected element is an unknown function of the component Request Header Handler. Performing a manipulation results in cross-site request forgery.
This vulnerability was named CVE-2026-33372. The attack may be initiated remotely. There is no available exploit.
vuldb.com
CVE-2026-3230 | wolfSSL up to 5.8.x TLS 1.3 client HelloRetryRequest Handshake improper authentication (Nessus ID 303244)
1 month ago
A vulnerability described as critical has been identified in wolfSSL up to 5.8.x. This affects an unknown part of the component TLS 1.3 client HelloRetryRequest Handshake. Executing a manipulation can lead to improper authentication.
This vulnerability appears as CVE-2026-3230. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-4395 | wolfssl up to 5.8.4 wc_ecc_import_x963_ex heap-based overflow (Nessus ID 303174)
1 month ago
A vulnerability classified as critical has been found in wolfssl up to 5.8.4. This vulnerability affects the function wc_ecc_import_x963_ex. The manipulation leads to heap-based buffer overflow.
This vulnerability is traded as CVE-2026-4395. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2026-1801 | GNOME libsoup Chunked soup_filter_input_stream_read_line request smuggling (Nessus ID 297750)
1 month ago
A vulnerability categorized as problematic has been discovered in GNOME libsoup. Affected is the function soup_filter_input_stream_read_line of the component Chunked Handler. Such manipulation leads to http request smuggling.
This vulnerability is documented as CVE-2026-1801. The attack can be executed remotely. There is not any exploit available.
vuldb.com
CVE-2020-37131 | Nsauditor Product Key Explorer 4.2.2.0 Registration buffer overflow (Exploit 48284 / EUVD-2020-31033)
1 month ago
A vulnerability was found in Nsauditor Product Key Explorer 4.2.2.0. It has been declared as critical. Affected by this issue is some unknown functionality of the component Registration Handler. The manipulation of the argument Key results in buffer overflow.
This vulnerability is reported as CVE-2020-37131. The attack requires a local approach. Moreover, an exploit is present.
vuldb.com