CVE PoC Search
https://ift.tt/USkQsBA
Submitted March 18, 2026 at 09:16PM by LumpyElk1604
via reddit https://ift.tt/8d213Iz
https://ift.tt/USkQsBA
Submitted March 18, 2026 at 09:16PM by LumpyElk1604
via reddit https://ift.tt/8d213Iz
WatchStack.io
AI Enriched PoC Intelligence | WatchStack.io
Track CVEs, CISA KEV, EPSS scores, and exploit intelligence in real time with WatchStack.io.
CVE-2026-32746 GNU telnetd Buffer Overflow PoC - Critical (9.8)
https://ift.tt/Owm2JQK
Submitted March 19, 2026 at 05:45AM by pwnguide
via reddit https://ift.tt/5g6q4rz
https://ift.tt/Owm2JQK
Submitted March 19, 2026 at 05:45AM by pwnguide
via reddit https://ift.tt/5g6q4rz
pwn.guide
CVE-2026-32746 GNU telnetd Buffer Overflow PoC
Learn about the CVE-2026-32746 pre-auth buffer overflow in GNU InetUtils telnetd with a hands-on exploit walkthrough.
Ubtuntu 24.04+ Snapd Local Privilege Escalation (CVE-2026-3888)
https://ift.tt/vMW2SUO
Submitted March 19, 2026 at 06:08AM by si9int
via reddit https://ift.tt/ZyHui2h
https://ift.tt/vMW2SUO
Submitted March 19, 2026 at 06:08AM by si9int
via reddit https://ift.tt/ZyHui2h
Qualys
CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root | Qualys
The Qualys Threat Research Unit has identified a Local Privilege Escalation (LPE) vulnerability affecting default installations of Ubuntu Desktop version 24.04 and later. This flaw (CVE-2026-3888)…
GlassWorm: Part 5 -- xorshift obfuscation, Chrome HMAC bypass, and cryptowallet seed phrase theft
https://ift.tt/PeS8atX
Submitted March 19, 2026 at 07:33AM by Willing_Monitor5855
via reddit https://ift.tt/GLiRb5x
https://ift.tt/PeS8atX
Submitted March 19, 2026 at 07:33AM by Willing_Monitor5855
via reddit https://ift.tt/GLiRb5x
[Tool] I built a CVE visualization tool for fun (VulnPath) -- would love and appreciate any feedback from this community!
http://vulnpath.vercel.app/app
Submitted March 19, 2026 at 08:45AM by yongsanghoon
via reddit https://ift.tt/Pk8x1Ff
http://vulnpath.vercel.app/app
Submitted March 19, 2026 at 08:45AM by yongsanghoon
via reddit https://ift.tt/Pk8x1Ff
From virtio-snd 0-Day to Hypervisor Escape: Exploiting QEMU with an Uncontrolled Heap Overflow
https://ift.tt/0rM6iPO
Submitted March 19, 2026 at 10:49AM by maurosoria
via reddit https://ift.tt/1KlPHMW
https://ift.tt/0rM6iPO
Submitted March 19, 2026 at 10:49AM by maurosoria
via reddit https://ift.tt/1KlPHMW
OtterSec
From virtio-snd 0-Day to Hypervisor Escape: Exploiting QEMU with an Uncontrolled Heap Overflow
Turning an uncontrolled heap overflow into a reliable QEMU guest-to-host escape using new glibc allocator behavior and QEMU-specific heap spray techniques.
CVE-2026-22730: SQL Injection in Spring AI’s MariaDB Vector Store
https://ift.tt/Rs3NUZW
Submitted March 19, 2026 at 02:17PM by appsec1337
via reddit https://ift.tt/HQNewlV
https://ift.tt/Rs3NUZW
Submitted March 19, 2026 at 02:17PM by appsec1337
via reddit https://ift.tt/HQNewlV
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
CVE-2026-22730: SQL Injection in Spring AI’s MariaDB Vector Store
Contributors: Sandeep Kamble, BugDazz Autonomous Pentest AI, Rabit0 ModelPublication Date: March 19, 2026Severity Rating: Critical (CVSS Score: 8.8)Vulnerability Status: Zero-day at...
Kanboard Authenticated SQL Injection CVE-2026-33058 Writeup
https://ift.tt/Eh6Yc1R
Submitted March 19, 2026 at 02:48PM by _cydave
via reddit https://ift.tt/4Cqwajx
https://ift.tt/Eh6Yc1R
Submitted March 19, 2026 at 02:48PM by _cydave
via reddit https://ift.tt/4Cqwajx
0dave
Kanboard CVE-2026-33058 Writeup
Walkthrough of the discovery of an authenticated SQL injection in Kanboard version <= 1.2.50 tracked as CVE-2026-33058
A timeline of MCP security breaches: Tool poisoning, RCE via mcp-remote, sandbox escapes, and 7,000+ exposed servers
https://brightbean.xyz/blog/mcp-backdoor-zero-trust-architecture-security/
Submitted March 19, 2026 at 06:25PM by Ok-Constant6488
via reddit https://ift.tt/qw5vKTG
https://brightbean.xyz/blog/mcp-backdoor-zero-trust-architecture-security/
Submitted March 19, 2026 at 06:25PM by Ok-Constant6488
via reddit https://ift.tt/qw5vKTG
brightbean.xyz
MCP Is the Backdoor Your Zero-Trust Architecture Missed
The Model Context Protocol connects AI agents to enterprise tools — but it ships without authentication, authorization, or audit trails. With 7,000+ exposed servers and a growing list of CVEs, MCP has become the blind spot in your zero-trust perimeter. Here's…
CVE-2026-22729: JSONPath Injection in Spring AI’s PgVectorStore
https://ift.tt/lRTBg74
Submitted March 19, 2026 at 06:05PM by appsec1337
via reddit https://ift.tt/BFQzqPV
https://ift.tt/lRTBg74
Submitted March 19, 2026 at 06:05PM by appsec1337
via reddit https://ift.tt/BFQzqPV
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
CVE-2026-22729: JSONPath Injection in Spring AI’s PgVectorStore
Contributors: Sandeep Kamble, BugDazz Autonomous Pentest AI, Rabit0 ModelPublication Date: March 19, 2026Severity Rating: High (CVSS Score: 8.6)Vulnerability Status: Zero-day at time of discovery...
Deep dive into how OS-level age verification systems can be bypassed
https://ift.tt/OXDc38w
Submitted March 19, 2026 at 05:54PM by raptorhunter22
via reddit https://ift.tt/gEZQ34V
https://ift.tt/OXDc38w
Submitted March 19, 2026 at 05:54PM by raptorhunter22
via reddit https://ift.tt/gEZQ34V
The CyberSec Guru
How to Bypass OS Age Verification Laws | The CyberSec Guru
Discover how the tech community uses VPNs, Ageless Linux, and self-hosted AI to bypass invasive OS age verification laws in California and Brazil
A Copy-Paste Bug That Broke PSpice® AES-256 Encryption
https://ift.tt/Z3NagJS
Submitted March 19, 2026 at 07:28PM by jtsylve
via reddit https://ift.tt/dhpB2FY
https://ift.tt/Z3NagJS
Submitted March 19, 2026 at 07:28PM by jtsylve
via reddit https://ift.tt/dhpB2FY
jtsylve.blog
A Copy-Paste Bug That Broke PSpice® AES-256 Encryption
PSpice is a SPICE circuit simulator from Cadence Design Systems that encrypts proprietary semiconductor model files to protect vendor IP and prevent reuse in third-party SPICE simulators. The encryption scheme is proprietary and undocumented.
OpenSIPS SQL Injection to Authentication Bypass (CVE-2026-25554)
https://ift.tt/jFiHvxo
Submitted March 19, 2026 at 07:14PM by MegaManSec2
via reddit https://ift.tt/k6rIQGu
https://ift.tt/jFiHvxo
Submitted March 19, 2026 at 07:14PM by MegaManSec2
via reddit https://ift.tt/k6rIQGu
AISLE
OpenSIPS SQL Injection to Authentication Bypass (CVE-2026-25554)
The AISLE analyzer discovered a high-severity vulnerability that enables SQL injection in OpenSIPS, a pillar of global communications used by over ...
BYOUD - Bring Your Own Unwind Data - By KlezVirus
https://klezvirus.github.io/posts/Byoud/
Submitted March 19, 2026 at 06:58PM by R3dCr0wn
via reddit https://ift.tt/BsZV7fM
https://klezvirus.github.io/posts/Byoud/
Submitted March 19, 2026 at 06:58PM by R3dCr0wn
via reddit https://ift.tt/BsZV7fM
klezVirus
Fantastic unwind information and where to find them
Foreword
I built a zero-knowledge CLI password manager from scratch. AES-256-GCM, Argon2id, 22 secret types, MCP support....
https://aaravmaloo.github.io/apm
Submitted March 19, 2026 at 06:46PM by aaravmaloo
via reddit https://ift.tt/l3DFnu6
https://aaravmaloo.github.io/apm
Submitted March 19, 2026 at 06:46PM by aaravmaloo
via reddit https://ift.tt/l3DFnu6
aaravmaloo.github.io
APM Documentation
Documentation for APM — a professional-grade, zero-knowledge CLI password manager.
Exploiting a PHP Object Injection in Profile Builder Pro in the era of AI
https://ift.tt/9UPyCfX
Submitted March 19, 2026 at 09:02PM by theMiddleBlue
via reddit https://ift.tt/qXNCHPT
https://ift.tt/9UPyCfX
Submitted March 19, 2026 at 09:02PM by theMiddleBlue
via reddit https://ift.tt/qXNCHPT
Sicuranext Blog
Exploiting a PHP Object Injection in Profile Builder Pro in the era of AI
WordPress plugin "Profile Builder Pro" (versions before 3.14.5) is susceptible to Unauthenticated PHP Object Injection. In this blog post, we discuss how we discovered and exploited the vulnerability using a novel POP chain, how AI helped in the process,…
Roundcube Webmail: three more sanitizer bypasses enable email tracking and phishing
https://ift.tt/bmZEs7U
Submitted March 19, 2026 at 02:08AM by [deleted]
via reddit https://ift.tt/O34fKgo
https://ift.tt/bmZEs7U
Submitted March 19, 2026 at 02:08AM by [deleted]
via reddit https://ift.tt/O34fKgo
NULL CATHEDRAL
Roundcube round two: three more sanitizer bypasses
Three more bypasses in Roundcube's HTML sanitizer: SMIL animation attributes load remote resources, unquoted body backgrounds enable CSS injection, and position:fixed !important enables phishing overlays.
we found a memory exhaustion CVE in a library downloaded 29 million times a month. AWS, DataHub, and Lightning AI are in the blast radius.
https://ift.tt/uCdXMEG
Submitted March 19, 2026 at 11:16PM by tobywilmox
via reddit https://ift.tt/pnLA0iX
https://ift.tt/uCdXMEG
Submitted March 19, 2026 at 11:16PM by tobywilmox
via reddit https://ift.tt/pnLA0iX
www.periphery.security
CVE-2026-33155 - 40 Bytes to Chaos - Periphery
CVE-2026-33155 - 40 Bytes to Chaos - Read the latest insights from Periphery on securing AI hardware, embedded systems, and critical infrastructure.
Sandboxing AI coding agents with kernel-level enforcement: built-in profiles for Claude Code, Codex, and OpenCode
https://ift.tt/TGNVnte
Submitted March 19, 2026 at 10:34PM by Remote_Parsnip_5827
via reddit https://ift.tt/3ApdLiV
https://ift.tt/TGNVnte
Submitted March 19, 2026 at 10:34PM by Remote_Parsnip_5827
via reddit https://ift.tt/3ApdLiV
nono.sh
How to Build nono Sandbox Profiles for AI Agents
Learn how to use nono learn, policy, and profile commands to build production-ready sandbox profiles for AI agents like Claude Code.
22 security advisories covering AI/ML infrastructure: 40 CVEs, 94 Sigma detection rules (MLflow, vLLM, PyTorch, Flowise, MCP servers, LangGraph, HuggingFace tooling)
https://ift.tt/KpRWndA
Submitted March 20, 2026 at 01:07AM by cyberamyntas
via reddit https://ift.tt/CapgrWA
https://ift.tt/KpRWndA
Submitted March 20, 2026 at 01:07AM by cyberamyntas
via reddit https://ift.tt/CapgrWA
raxe.ai
RAXE — Runtime AI Security Platform
Runtime AI security across network, host, and application layers. 1,000+ threat signatures with 100% local processing — zero data leaves your environment.
A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746) - watchTowr Labs
https://ift.tt/HrkBAY6
Submitted March 20, 2026 at 01:53AM by dx7r__
via reddit https://ift.tt/Hs0QhSo
https://ift.tt/HrkBAY6
Submitted March 20, 2026 at 01:53AM by dx7r__
via reddit https://ift.tt/Hs0QhSo
watchTowr Labs
A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746 Pre-Auth RCE)
A long, long time ago, in a land free of binary exploit mitigations, when Unix still roamed the Earth, there lived a pre-authentication Telnetd vulnerability.
In fact, this vulnerability was born so long ago (way back in 1994) that it may even be older than…
In fact, this vulnerability was born so long ago (way back in 1994) that it may even be older than…