The Lab · 2026-04-02 19:27:03 · GitHub Issues
A Trivy security scan has flagged five HIGH-severity vulnerabilities within a critical software component, exposing a potential attack surface for denial-of-service, arbitrary code execution, and information disclosure. The scan, conducted on April 2, 2026, targeted the `7002370412/news-feed:latest` container image, wh...
The Lab · 2026-04-13 08:22:31 · GitHub Issues
A critical security patch cycle for the FraiseQL project has resolved three high-severity vulnerabilities, but a significant TLS-related flaw in GnuTLS remains unaddressed, creating a mixed security posture. The fixed vulnerabilities include a heap buffer overread in util-linux (CVE-2025-14104), a stack buffer overflow...
The Lab · 2026-05-14 08:48:29 · Mastodon:mastodon.social:#infosec
A critical use-after-free vulnerability in Exim mail server software allows unauthenticated remote attackers to execute arbitrary code by sending specially crafted BDAT SMTP traffic. The flaw, tracked as CVE-2026-45185, exists specifically in Exim versions 4.97 through 4.99.2 when built with GnuTLS cryptographic suppor...
The Lab · 2026-05-14 12:48:31 · Mastodon:hachyderm.io:#cybersecurity
A密集的漏洞情报流正在冲击企业安全防线。三项最高严重度评级(CVSS 9.8)的远程代码执行(RCE)漏洞被同时标记为高危,分别影响GnuTLS、Exim邮件服务器以及Fortinet安全设备组合。安全团队面临紧迫的修复窗口。
GnuTLS库的BDAT功能存在释放后使用(use-after-free)漏洞,已确认CVSS 9.8评分,版本4.99.3为安全版本。Exim邮件服务器则存在无需身份验证的RCE路径。Fortinet方面,FortiAuthenticator与FortiSandbox两款产品均被标注为关键风险目标,安全通告已升级至最高响应级别。这三组漏洞的共同特点是利用门槛低、影响范围广,且均可被用于完全接管目标系统。
...