Real-time vulnerability trends from news, Mastodon, and Bluesky
Real-time vulnerability trends from news, Mastodon, and Bluesky
1,954
Tracked CVEs
1,424
News Articles
693
Mastodon Posts
1,180
Bluesky Posts
Vulnerability: A critical code injection vulnerability in Ivanti Endpoint Manager Mobile (EPMM) allows unauthenticated remote code execution (RCE). The vulnerability potentially enables attackers to execute arbitrary code without authentication on affected systems.
Trending: The vulnerability is trending due to active zero-day exploitation and significant attention from cybersecurity agencies like CISA, which added CVE-2026-1281 to its Known Exploited Vulnerabilities (KEV) catalog. Multiple social media posts highlight the critical nature of the vulnerability, with a CVSS score of 9.8.
Vulnerability: A code injection vulnerability in Ivanti Endpoint Manager Mobile (EPMM) enables unauthenticated remote code execution (RCE). The vulnerability affects the product's internal application distribution and Android file transfer configuration features.
Trending: The CVE is trending due to active zero-day exploitation, with multiple national cybersecurity agencies issuing alerts about the critical severity vulnerability. Security researchers and media outlets are highlighting the potential for unauthorized attackers to execute arbitrary code on vulnerable devices.
Vulnerability: A security feature bypass vulnerability in Microsoft Office allows unauthorized local attackers to exploit untrusted inputs, potentially compromising system security through crafted Office documents.
Trending: The vulnerability is trending due to active exploitation by threat actors like UAC-0001 (APT28), targeting Ukraine and EU countries. Multiple sources confirm Microsoft has released an emergency patch for this zero-day vulnerability, which has a CVSS score of 7.8.
Vulnerability: A critical authentication bypass vulnerability in Fortinet products affecting FortiAnalyzer, FortiManager, FortiOS, FortiProxy, and FortiWeb versions. The vulnerability allows an attacker with a FortiCloud account to log into devices registered to other accounts if FortiCloud SSO authentication is enabled.
Trending: Multiple social media sources report active zero-day exploits targeting this vulnerability, with U.S. authorities calling for investigations and Fortinet actively releasing security updates. The vulnerability has a high CVSS score of 9.4 and is generating significant cybersecurity discussion across platforms.
Vulnerability: A path traversal vulnerability in the Windows version of WinRAR allows attackers to execute arbitrary code by crafting malicious archive files. The vulnerability affects WinRAR users and was discovered by researchers from ESET.
Trending: Multiple threat actors, including nation-state and cybercriminal groups, are actively exploiting this vulnerability to gain initial access and deliver malicious payloads. The vulnerability continues to be a significant concern months after its initial patch, with ongoing exploitation by various hacking groups.
Vulnerability: GNU Inetutils telnetd through version 2.7 contains a critical remote authentication bypass vulnerability that allows attackers to authenticate as root by manipulating the USER environment variable with a "-f root" value. This flaw affects Telnet server implementations in the GNU Inetutils package.
Trending: The vulnerability is gaining significant attention due to confirmed exploit code availability from sources like CISA KEV and VulnCheck KEV. Multiple cybersecurity platforms are reporting on its potential impact, with some analyses suggesting nearly 800,000 exposed Telnet servers could be vulnerable to remote attacks.
Vulnerability: OpenSSL versions 3.6, 3.5, 3.4, 3.3, and 3.0 are vulnerable to a critical stack buffer overflow when parsing CMS AuthEnvelopedData messages with maliciously crafted AEAD parameters. The vulnerability can potentially lead to Denial of Service or remote code execution in applications using AEAD ciphers like AES-GCM.
Trending: The vulnerability is gaining significant attention due to being part of a set of 12 OpenSSL CVEs discovered through AI-assisted research, with multiple cybersecurity platforms and researchers highlighting its potential for pre-authentication remote code execution. Social media mentions emphasize the severity and potential impact of this OpenSSL vulnerability.
Vulnerability: OpenClaw (also known as clawdbot or Moltbot) before version 2026.1.29 contains a security vulnerability where it automatically obtains a gatewayUrl value from a query string and establishes a WebSocket connection without user prompting, potentially exposing authentication tokens.
Trending: The vulnerability is gaining attention in cybersecurity circles due to its high-risk rating of 8.8 and potential for unauthorized access. Social media platforms are discussing the potential for attackers to intercept authentication tokens and potentially execute arbitrary code on victim gateways.
Vulnerability: CVE-2026-25201 is a critical vulnerability in Samsung MagicINFO 9 Server versions less than 21.1090.1, allowing unauthenticated users to upload arbitrary files and execute remote code, potentially leading to privilege escalation.
Trending: The vulnerability is gaining significant attention on social media platforms like Bluesky and Mastodon, with cybersecurity researchers highlighting its high severity (8.8 rating) and potential impact on organizations using MagicINFO 9 Server.
Vulnerability: vm2 is an open-source vm/sandbox for Node.js with a critical vulnerability that allows attackers to bypass sandbox protections. Prior to version 3.10.2, the library allows escaping the sandbox and executing arbitrary code by exploiting unsanitized callback functions in Promise prototypes.
Trending: The vulnerability is trending due to its critical severity and potential for remote code execution across Node.js projects. Social media and news outlets are highlighting the risk, with mentions emphasizing the sandbox escape capability and the potential for attackers to run unauthorized code on host systems.
Vulnerability: SmarterTools SmarterMail contains a critical authentication bypass vulnerability in the password reset API that allows unauthenticated attackers to reset system administrator accounts. Versions prior to build 9511 are affected, potentially enabling full administrative compromise of the SmarterMail instance.
Trending: Shadowserver reports over 6,000 vulnerable SmarterMail servers are currently exposed online, with confirmed exploit code available through sources like CISA KEV and Nuclei. The vulnerability has been actively discussed on social media due to its potential for remote code execution and widespread impact on email and collaboration services.
Vulnerability: A vulnerability in MagicInfo9 Server allows authorized users to upload HTML files without authentication, leading to Stored XSS. This issue affects MagicINFO 9 Server versions less than 21.1090.1.
Trending: The vulnerability is gaining significant attention in cybersecurity circles due to its critical severity rating of 9.8 and potential for account takeover. Multiple infosec platforms are actively sharing details about the vulnerability across social media channels like Bluesky and Mastodon.
Vulnerability: Multiple denial of service vulnerabilities exist in React Server Components, affecting packages like react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerabilities can be triggered by sending specially crafted HTTP requests to Server Function endpoints, potentially causing server crashes, out-of-memory exceptions, or excessive CPU usage.
Trending: The vulnerability is gaining significant attention in the cybersecurity community, with multiple social media posts highlighting its potential impact on Next.js and React applications. Security experts are recommending immediate version updates, and platforms like Vercel and Cloudflare have already released WAF rules to mitigate potential exploits.
Vulnerability: PiranhaCMS version 12.0 contains a stored Cross-Site Scripting (XSS) vulnerability in the Text content block of Standard and Standard Archive Pages. This vulnerability allows an authenticated user to inject malicious JavaScript code via the /manager/pages endpoint, which can then be executed in other users' browsers.
Trending: The vulnerability is currently trending in cybersecurity forums and exploit databases due to its recent publication on Exploit DB. Researchers and security professionals are discussing the potential impact of this XSS vulnerability in the Piranha CMS, with social media channels highlighting the technical details and potential risk.
Vulnerability: A cross-site scripting (XSS) vulnerability exists in MiczFlor RPi-Jukebox-RFID up to version 2.8.0, specifically in the /htdocs/userScripts.php file. The vulnerability allows remote attackers to manipulate the "Custom script" argument, potentially executing malicious scripts.
Trending: The vulnerability is gaining attention in cybersecurity communities due to the publicly available exploit and the vendor's lack of response to early disclosure. Exploit databases like ExploitDB have published details, increasing awareness among security researchers and potential attackers.
Vulnerability: A security flaw in D-Link DIR-825 router firmware up to version 2.10 allows remote attackers to execute a buffer overflow attack through manipulation of the countdown_time argument in the apply.cgi function. The vulnerability affects unsupported router models and can potentially lead to remote code execution.
Trending: The vulnerability is gaining attention in cybersecurity circles after being published on Exploit DB by researcher Beatriz Fresno Naumova, with multiple infosec platforms sharing details about the stack buffer overflow exploit. Social media mentions indicate active discussion around the potential impact on legacy D-Link router systems.
Vulnerability: A local information disclosure vulnerability in Windows Desktop Window Manager that allows an authorized attacker to expose sensitive information. The vulnerability affects Windows desktop systems running certain versions of the Desktop Window Manager.
Trending: The CVE is currently trending due to active exploitation in the wild, with multiple cybersecurity sources and news outlets highlighting its potential impact. Microsoft's January 2026 Patch Tuesday addressed this vulnerability, noting it as one of the actively exploited zero-day flaws in their monthly security update.
Vulnerability: CVE-2026-21858 is a critical security vulnerability in n8n, an open source workflow automation platform. The flaw allows unauthenticated remote attackers to access files on the underlying server through execution of certain form-based workflows, potentially exposing sensitive information and enabling system compromise.
Trending: The vulnerability, nicknamed "Ni8mare", is gaining significant attention due to its maximum severity CVSS score of 10.0 and potential global impact, estimated to affect around 100,000 servers. Multiple cybersecurity platforms and researchers are highlighting the critical nature of this remote code execution vulnerability and urging immediate patching to version 1.121.0 or later.
Vulnerability: An integer overflow flaw was discovered in the Linux kernel's create_elf_tables() function that could allow an unprivileged local user to escalate privileges on systems running kernel versions 2.6.x, 3.10.x, and 4.14.x by exploiting a vulnerability in SUID binaries.
Trending: The vulnerability has gained recent attention after being added to the CISA Known Exploited Vulnerabilities (KEV) catalog, with multiple sources confirming the existence of exploit code through platforms like ExploitDB and VulnCheck KEV.
Vulnerability: A type confusion vulnerability exists in OpenSSL's TimeStamp Response verification code, potentially causing a Denial of Service (DoS) when processing malformed TimeStamp Response files. Affects OpenSSL versions 3.6, 3.5, 3.4, 3.3, 3.0, and 1.1.1.
Trending: Security researchers have highlighted this vulnerability as part of a broader set of OpenSSL security issues, with social media mentions noting its potential impact and the need for patches. Multiple platforms are discussing the vulnerability, including FreeBSD update recommendations and infosec forums.
Vulnerability: A vulnerability in huggingface/text-generation-inference version 3.3.6 allows unauthenticated remote attackers to exploit unbounded external image fetching during input validation in VLM mode. The flaw can lead to resource exhaustion, including network bandwidth saturation, memory inflation, and CPU overutilization.
Trending: The vulnerability is gaining attention in cybersecurity circles due to its potential for significant system disruption, with social media posts highlighting its high severity rating of 7.5 and the risk of potential system crashes. Infosec communities are actively discussing the implications of this exploit in open-source AI inference infrastructure.
Vulnerability: A high-severity vulnerability in parisneo/lollms version 5.9.0 allows unauthenticated access to sensitive Socket.IO events through the lollms_generation_events.py component. The flaw enables malicious clients to execute resource-intensive operations and manipulate server state without authentication.
Trending: The vulnerability is gaining attention in cybersecurity circles due to its high severity rating of 8.2 and potential for denial of service and state corruption. Multiple infosec platforms like Mastodon and Bluesky are discussing the CVE, highlighting its significant impact on the lollms system.
Vulnerability: A critical vulnerability in foreman_kubevirt allows remote attackers to potentially conduct Man-in-the-Middle (MITM) attacks by exploiting the default SSL verification behavior when configuring OpenShift connections. The flaw enables network traffic interception and potential sensitive information disclosure if a Certificate Authority (CA) certificate is not explicitly set.
Trending: The vulnerability is gaining attention in cybersecurity circles due to its high severity rating of 8.1 and potential for significant security breaches. Multiple infosec platforms are discussing the CVE, highlighting its implications for organizations using foreman_kubevirt and OpenShift configurations.
Vulnerability: A flaw in fog-kubevirt allows remote attackers to perform a Man-in-the-Middle (MITM) attack due to disabled certificate validation. The vulnerability affects communications between Satellite and OpenShift, potentially enabling information disclosure and data integrity compromise.
Trending: The vulnerability is gaining attention in cybersecurity circles with a high severity rating of 8.1. Social media posts are highlighting the potential risks and spreading awareness across infosec platforms like Bluesky and Mastodon.
Vulnerability: RaspAP raspap-webgui versions prior to 3.3.6 contain an OS command injection vulnerability that allows an authenticated user to execute arbitrary OS commands. The vulnerability affects RaspAP web interface users who can log into the system.
Trending: The vulnerability is currently generating attention in cybersecurity circles due to its high severity rating of 8.8 and potential for remote command execution. Multiple infosec platforms are sharing details about the CVE, raising awareness about the need for users to update to version 3.3.6 or later.
Vulnerability: A critical vulnerability in MagicINFO 9 Server versions less than 21.1090.1 involves hardcoded database account credentials, enabling unauthorized login and potential database manipulation.
Trending: The vulnerability is generating significant cybersecurity discussion due to its high critical rating of 9.8 and potential for database compromise. Social media channels are actively sharing the CVE details across infosec platforms to raise awareness.
Vulnerability: OpenSSL versions 3.6, 3.5, and 3.4 are vulnerable to a stack-based buffer overflow and potential NULL pointer dereference when processing PKCS#12 files with PBMAC1 parameters. The vulnerability can potentially cause a Denial of Service and may enable code execution depending on platform mitigations.
Trending: Security researchers have highlighted this vulnerability as part of a broader discovery of 12 OpenSSL security flaws, with some sources noting that artificial intelligence systems were used to identify these issues. Multiple social media platforms are discussing the vulnerability, including mentions in Japanese security forums and cybersecurity news channels.
Vulnerability: OpenSSL versions 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1, and 1.0.2 are vulnerable to a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function when processing malformed PKCS#12 files, which can trigger a Denial of Service (DoS) crash.
Trending: The vulnerability is being widely discussed across social media platforms like Bluesky, with multiple posts referencing CVE-2025-69421 in the context of broader OpenSSL security updates. German tech news site Heise Security has also reported on the vulnerability as part of a larger set of OpenSSL security issues discovered by researchers.
Vulnerability: In Eclipse Jersey versions 2.45, 3.0.16, 3.1.9, a race condition can cause ignoring of critical SSL configurations, potentially leading to unauthorized trust in insecure servers and compromising SSL/TLS security settings during authentication processes.
Trending: The vulnerability is being mentioned in multiple security advisories, particularly in the context of the Pilz PIT User Authentication Service, which includes multiple CVEs in its third-party components. Current social media discussions appear to be tracking its potential impact across different systems and networks.
Vulnerability: OpenSSL versions 3.6, 3.5, 3.4, 3.3, 3.0, and 1.1.1 contain a low-severity vulnerability in the low-level OCB encryption API where inputs not a multiple of 16 bytes can leave the final partial block unencrypted and unauthenticated. The issue primarily affects applications directly calling CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions on hardware-accelerated builds.
Trending: The vulnerability is being discussed across cybersecurity platforms due to its inclusion in a recent batch of OpenSSL security disclosures, with multiple platforms and researchers highlighting its presence among 12 recently discovered OpenSSL vulnerabilities. Social media mentions indicate widespread awareness among system administrators and security professionals, particularly in FreeBSD and Linux environments.
Vulnerability: OpenSSL versions 3.6, 3.5, 3.4, 3.3, 3.0, and 1.1.1 contain a memory corruption vulnerability in the PKCS12_get_friendlyname() function. The issue involves a one-byte out-of-bounds write when parsing maliciously crafted PKCS#12 files with specific UTF-16BE friendly names.
Trending: Multiple security platforms and social media channels are discussing this vulnerability as part of a broader set of OpenSSL security issues. FreeBSD and other systems are preparing updates, with some sources highlighting that AI systems were used to discover these vulnerabilities.
Vulnerability: A SQL Injection vulnerability in Kodmatic Computer Software's Online Exam and Assessment system allows attackers to inject malicious SQL commands. The issue affects the product through version 30012026.
Trending: Exploit code for CVE-2025-4686 has been confirmed on GitHub, indicating potential active exploitation. Social media mentions highlight the vulnerability's high severity rating of 8.6 and are circulating information across cybersecurity networks.
Vulnerability: A critical security flaw in Fortinet FortiOS, FortiProxy, and FortiSwitchManager allows an unauthenticated attacker to bypass FortiCloud SSO login authentication by manipulating a SAML response message. Affected versions span multiple releases from 7.0.0 to 7.6.3 across different Fortinet products.
Trending: The vulnerability is gaining significant attention due to active exploitation by threat actors, including an observed attack by Arctic Wolf where attackers created new administrator accounts and attempted to steal configuration files. Fortinet has taken emergency measures, temporarily disabling the cloud authentication service globally to mitigate ongoing attacks.
Vulnerability: VMware vCenter Server contains a heap-overflow vulnerability in the DCERPC protocol implementation. A malicious actor with network access can send a specially crafted network packet that may lead to remote code execution.
Trending: CISA has added CVE-2024-37079 to its Known Exploited Vulnerabilities (KEV) catalog after confirming active exploitation in the wild. Multiple sources, including social media and cybersecurity alerts, are highlighting the critical nature of this vulnerability with a high CVSS score.
Vulnerability: A critical vulnerability in Cisco Unified Communications Manager, Unified CM SME, Unified CM IM&P, Unity Connection, and Webex Calling Dedicated Instance allows unauthenticated remote attackers to execute arbitrary commands on the underlying operating system by sending crafted HTTP requests to the web-based management interface.
Trending: The vulnerability is gaining significant attention due to active mass scanning, potential zero-day exploitation, and Cisco's critical security rating. Multiple social media platforms and cybersecurity news sources are reporting on the vulnerability's potential for complete system takeover and widespread impact.
Vulnerability: An allocation of resources without limits or throttling vulnerability in Apache Tomcat affecting versions 11.0.0-M1 through 11.0.7, 10.1.0-M1 through 10.1.41, 9.0.0.M1 through 9.0.105, and potentially EOL versions 8.5.0 through 8.5.100.
Trending: Currently mentioned in advisory VDE-2026-006 by CERT-VDE, which highlights multiple vulnerabilities in the Pilz PIT User Authentication Service involving third-party components. The CVE is being tracked alongside other vulnerability identifiers as part of a broader security assessment.
Vulnerability: A Denial of Service (DoS) vulnerability in Apache Tomcat affecting versions 11.0.0-M1 through 11.0.11, 10.1.0-M1 through 10.1.46, 9.0.0.M1 through 9.0.109, and EOL versions 8.5.0 through 8.5.100. The issue involves improper cleanup of temporary multipart upload files, potentially leading to resource exhaustion.
Trending: Currently being mentioned in advisory posts by CERT-VDE as part of a broader set of vulnerabilities affecting the Pilz PIT User Authentication Service. Social media mentions are limited and primarily focused on technical advisory listings.
Vulnerability: Apache Tomcat versions 9.0.76-102, 10.1.10-39, and 11.0.0-M2 to 11.0.5 contain an improper input validation vulnerability that can cause memory leaks through invalid HTTP priority headers, potentially leading to a denial of service via OutOfMemoryException.
Trending: Currently mentioned in advisory notices by CERT-VDE as part of a broader set of vulnerabilities affecting Pilz PIT User Authentication Service, with cross-references to multiple CVEs in a comprehensive security advisory.
Vulnerability: A pre-authentication remote code execution (RCE) vulnerability exists in React Server Components versions 19.0.0-19.2.0, affecting packages like react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerability allows unsafe deserialization of HTTP request payloads to Server Function endpoints.
Trending: The vulnerability, dubbed "React2Shell", is generating significant attention due to active exploitation attempts by threat actors, including state-sponsored groups like China-nexus cyber threat groups Earth Lamia and Jackpot Panda. Security researchers and platforms are rapidly discussing its potential impact on React and Next.js applications.
Vulnerability: SolarWinds Web Help Desk is vulnerable to an authentication bypass vulnerability that could allow an attacker to invoke specific actions within the Web Help Desk application without proper authentication credentials.
Trending: The vulnerability is gaining attention due to SolarWinds disclosing multiple critical CVEs in their Web Help Desk product, including this authentication bypass, which could potentially allow unauthorized system access. Security teams and IT professionals are discussing the urgent need to upgrade to the patched version 2026.1.
Vulnerability: SolarWinds Web Help Desk contains an untrusted data deserialization vulnerability that enables unauthenticated remote code execution. An attacker could exploit this flaw to run commands on the host machine without requiring authentication credentials.
Trending: Security researchers and media outlets are highlighting this vulnerability due to its critical nature and potential for widespread system compromise. Multiple sources, including Horizon3.ai and SolarWinds' own disclosure, are emphasizing the urgent need for organizations to patch their Web Help Desk systems to prevent potential attacks.
Vulnerability: SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability that if exploited, could allow an unauthenticated attacker to gain access to certain restricted functionality. The vulnerability affects SolarWinds Web Help Desk and could potentially enable unauthorized system access.
Trending: The CVE is gaining significant attention due to SolarWinds releasing patches for multiple critical vulnerabilities in their Web Help Desk product, including authentication bypass and potential remote code execution risks. Security teams and researchers are actively discussing the implications of these vulnerabilities and the need for immediate software updates.
Vulnerability: SolarWinds Web Help Desk is vulnerable to an untrusted data deserialization vulnerability that enables remote code execution without authentication. An attacker could potentially run commands on the host machine by exploiting this critical security flaw.
Trending: The vulnerability is gaining significant attention due to SolarWinds' history of security incidents and the critical nature of the RCE vulnerability. Multiple social media channels and security news outlets are highlighting the urgent need for organizations using Web Help Desk to update to version 2026.1 to mitigate potential system compromise.
Vulnerability: A heap-based out-of-bounds write vulnerability in OpenSSL's line-buffering BIO filter that can cause memory corruption and potential Denial of Service. Affects OpenSSL versions 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1, and 1.0.2, though assessed as Low severity due to unlikely attack scenarios.
Trending: OpenSSL security updates are generating attention, with SUSE releasing a patch addressing multiple vulnerabilities including this CVE. Social media mentions highlight the detection of 12 OpenSSL security flaws, with some researchers using AI systems to identify the vulnerabilities.
Vulnerability: SolarWinds Web Help Desk contains an authentication bypass vulnerability that allows malicious actors to execute protected actions without proper authentication. This vulnerability affects the SolarWinds Web Help Desk product and could potentially compromise system security.
Trending: The vulnerability is trending due to SolarWinds disclosing multiple critical CVEs (including CVE-2025-40552) that enable unauthenticated remote code execution and authentication bypass. Security researchers and news outlets are highlighting the potential severity and urging immediate patching of affected systems.
Vulnerability: A type confusion vulnerability exists in OpenSSL's PKCS#12 parsing code that can cause an invalid or NULL pointer dereference when processing a malformed PKCS#12 file. Versions OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, and 1.1.1 are vulnerable, with only 1.0.2 being unaffected.
Trending: The vulnerability is part of a larger set of 12 OpenSSL security issues discovered by researchers, which has drawn attention in cybersecurity circles. While this specific CVE is assessed as low severity, it is being mentioned alongside other more critical vulnerabilities in social media and security discussions.
Vulnerability: n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Authenticated attackers can execute arbitrary code with n8n process privileges, potentially leading to full system compromise.
Trending: Social media and news outlets are highlighting this vulnerability due to its critical CVSS score of 9.9 and the potential for authenticated users to achieve remote code execution on n8n workflow automation platform instances. Multiple cybersecurity sources, including JFrog, have reported on the sandbox escape flaws.
Vulnerability: SolarWinds Web Help Desk contains a hardcoded credentials vulnerability that could potentially allow unauthorized access to administrative functions in certain situations. The vulnerability affects the SolarWinds Web Help Desk product.
Trending: The vulnerability is trending due to SolarWinds releasing patches for multiple critical security flaws in their Web Help Desk software, including authentication bypasses and remote code execution risks. Multiple cybersecurity news sources and platforms are discussing the potential impact and urging immediate upgrades to version 2026.1.
Vulnerability: The OpenSSL 'openssl dgst' command-line tool silently truncates input data to 16MB when using one-shot signing algorithms like Ed25519, Ed448, and ML-DSA. This can lead to potential integrity issues where trailing data beyond 16MB remains unauthenticated, affecting OpenSSL versions 3.5 and 3.6.
Trending: The vulnerability is part of a broader set of 12 security issues discovered in OpenSSL, which have gained attention in cybersecurity circles. While the specific CVE is mentioned in social media discussions, there are no immediate reports of active exploits or widespread attacks.
Vulnerability: A type confusion vulnerability in OpenSSL affects signature verification of signed PKCS#7 data, potentially causing a NULL pointer dereference and Denial of Service when processing malformed data. Vulnerable versions include OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2.
Trending: The vulnerability is part of a larger set of 12 OpenSSL security issues discovered by researchers, with some sources highlighting the use of AI systems in identifying these vulnerabilities. The impact is considered low severity, primarily affecting legacy PKCS#7 API implementations.