#CVE-2026-1580, CVE-2026-24512, CVE-2026-24513, and CVE-2026-24514.
We recommend that you migrate to F5's NGINX Ingress: buff.ly/vqTJvPK
If you can’t migrate yet, update to v1.14.3.
More details on each CVE below.
#CVE-2026-1580, CVE-2026-24512, CVE-2026-24513, and CVE-2026-24514.
We recommend that you migrate to F5's NGINX Ingress: buff.ly/vqTJvPK
If you can’t migrate yet, update to v1.14.3.
More details on each CVE below.
👉 Read about it: buff.ly/9e55Xgy
👉 Read about it: buff.ly/9e55Xgy
Details, mitigations, context for making risk-based decisions all on our blog: buff.ly/xL4NKOg
#React #NodeJS #Java #pnpm #npm #CVE #Vulnerability
Details, mitigations, context for making risk-based decisions all on our blog: buff.ly/xL4NKOg
#React #NodeJS #Java #pnpm #npm #CVE #Vulnerability
Visit buff.ly/Ao3m5kC and click on the "Subscribe" control at the bottom.
Visit buff.ly/Ao3m5kC and click on the "Subscribe" control at the bottom.
‼️ if you haven't yet upgraded your Redis installs, you should increase the priority of that.
#CVE #ApplicationSecurity #ProductSecurity
‼️ if you haven't yet upgraded your Redis installs, you should increase the priority of that.
#CVE #ApplicationSecurity #ProductSecurity
#Malware #SupplyChainSecurity
#Malware #SupplyChainSecurity
Unless something changes with #NVD's capacity (which seems unlikely given NIST's current priorities), we as an industry need to find a different path. This isn't sustainable.
👉 should you worry? read: buff.ly/ATRNVz3
#AppSec #ProductSecurity #DevSecOps #DevOps
👉 should you worry? read: buff.ly/ATRNVz3
#AppSec #ProductSecurity #DevSecOps #DevOps
CVE-2026-22687: #SQLi in the Agent service DB query tool. Due to insufficient backend checks an attacker can use prompt‑based bypass to avoid query restrictions and obtain sensitive information from the server and DB. buff.ly/kQXicrG
CVE-2026-22687: #SQLi in the Agent service DB query tool. Due to insufficient backend checks an attacker can use prompt‑based bypass to avoid query restrictions and obtain sensitive information from the server and DB. buff.ly/kQXicrG
See: buff.ly/KNzcahw
See: buff.ly/KNzcahw
#VSCode #Malware #AppSec #Developer #Solidity
#VSCode #Malware #AppSec #Developer #Solidity
📑 READ more: buff.ly/xbVornQ
#JavaScript #npm #MongoDB #React #Rust
📑 READ more: buff.ly/xbVornQ
#JavaScript #npm #MongoDB #React #Rust
Authenticated users may upload crafted files that could trigger remote code execution, potentially leading to full instance compromise, affecting both self-hosted and cloud instances.
Patch version 1.121.3+.
More information:
👉 buff.ly/1vNZNbv
👉 buff.ly/1vNZNbv
#AppSec #MongoDB
Auth users can craft workflow expressions that escape isolation and execute code as the n8n process risking full instance compromise.
Patch: upgrade to v1.122.0+ (1.120.4/1.121.1/1.122.0).
More info: devhub.checkmarx.com/cve-details/...
Auth users can craft workflow expressions that escape isolation and execute code as the n8n process risking full instance compromise.
Patch: upgrade to v1.122.0+ (1.120.4/1.121.1/1.122.0).
More info: devhub.checkmarx.com/cve-details/...
#AI #SoftwareSupplyChain #LLM #ModelConfusion #ModelJacking #SupplyChainRisk #HuggingFace
#AI #SoftwareSupplyChain #LLM #ModelConfusion #ModelJacking #SupplyChainRisk #HuggingFace
Details: buff.ly/xexR3dP
Details: buff.ly/xexR3dP
Details and mitigation: buff.ly/x6gPiPf 🧵 1/4
Details and mitigation: buff.ly/x6gPiPf 🧵 1/4
#ElysiaJS #CVE202566456 #RCE #AppSec #NodeSecurity #TypeScript 🧵1/5
#ElysiaJS #CVE202566456 #RCE #AppSec #NodeSecurity #TypeScript 🧵1/5
#SupplyChainSecrity #Vulnerability #ProductSecurity #InformationSecurity #CyberSecurity #Patch #Zitadel
#SupplyChainSecrity #Vulnerability #ProductSecurity #InformationSecurity #CyberSecurity #Patch #Zitadel
Read "Inside Shai-Hulud's Maw": buff.ly/N5Men7d
Read "Inside Shai-Hulud's Maw": buff.ly/N5Men7d
Malicious SVG/HTML in Markdown notes can execute JavaScript when downloaded as PDF, enabling session token theft. All users are at risk. Affects versions < 0.6.37.
buff.ly/EVaSAOB
buff.ly/RFK4ZIl
Malicious SVG/HTML in Markdown notes can execute JavaScript when downloaded as PDF, enabling session token theft. All users are at risk. Affects versions < 0.6.37.
buff.ly/EVaSAOB
buff.ly/RFK4ZIl