🟢 New security advisory:

CVE-2026-0300 affects multiple systems.

• Impact: Security weakness that could be exploited
• Risk: Potential for targeted attacks
• Mitigation: Schedule patching in your next maintenance window

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-0300-pan-os-unauth-rce-exploited-in-the-wild-poc

#CVE #PatchNow #InfoSecCommunity

PAN-OS unauth RCE exploited in the wild (CVE-2026-0300) [PoC]

CVE-2026-0300: PAN-OS Captive Portal buffer overflow allows unauthenticated RCE as root. Actively exploited. CISA KEV. Restrict access to trusted IPs per KB.

Yazoul Security

🟢 New security advisory:

CVE-2026-0300 affects multiple systems.

• Impact: Security weakness that could be exploited
• Risk: Potential for targeted attacks
• Mitigation: Schedule patching in your next maintenance window

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-0300-pan-os-unauth-rce-exploited-in-the-wild-poc

#CVE #PatchNow #InfoSecCommunity

PAN-OS unauth RCE exploited in the wild (CVE-2026-0300) [PoC]

CVE-2026-0300: PAN-OS Captive Portal buffer overflow allows unauthenticated RCE as root. Actively exploited. CISA KEV. Restrict access to trusted IPs per KB.

Yazoul Security

🔴 New security advisory:

CVE-2026-24118 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-24118-vm2-sandbox-breakout-host-rce

#CVE #PatchNow #InfoSecCommunity

VM2 sandbox breakout, host RCE (CVE-2026-24118)

CVE-2026-24118: VM2 sandbox escape lets attackers execute arbitrary commands on the host (CVSS 9.8). Update to version 3.11.0 immediately.

Yazoul Security

🔴 New security advisory:

CVE-2026-24118 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-24118-vm2-sandbox-breakout-host-rce

#CVE #PatchNow #InfoSecCommunity

VM2 sandbox breakout, host RCE (CVE-2026-24118)

CVE-2026-24118: VM2 sandbox escape lets attackers execute arbitrary commands on the host (CVSS 9.8). Update to version 3.11.0 immediately.

Yazoul Security

🔴 New security advisory:

CVE-2026-24120 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-24120-vm2-sandbox-escape-rce

#CVE #PatchNow #InfoSecCommunity

vm2 sandbox escape RCE (CVE-2026-24120)

CVE-2026-24120: crtical vm2 sandbox escape grants attackers host RCE (CVSS 9.8). The CVE-2023-37466 fix is insufficient. Update vm2 to 3.10.5 immediately.

Yazoul Security

🔴 New security advisory:

CVE-2026-24120 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-24120-vm2-sandbox-escape-rce

#CVE #PatchNow #InfoSecCommunity

vm2 sandbox escape RCE (CVE-2026-24120)

CVE-2026-24120: crtical vm2 sandbox escape grants attackers host RCE (CVSS 9.8). The CVE-2023-37466 fix is insufficient. Update vm2 to 3.10.5 immediately.

Yazoul Security

🚨 New security advisory:

CVE-2026-26332 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-26332-vm2-sandbox-escape-rce

#CVE #PatchNow #InfoSecCommunity

vm2 sandbox escape RCE (CVE-2026-26332)

CVE-2026-26332: vm2 <3.11.0 sandbox escape lets attackers run arbitrary code on host via SuppressedError (CVSS 9.8). Update to 3.11.0 immediately.

Yazoul Security

🚨 New security advisory:

CVE-2026-26332 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-26332-vm2-sandbox-escape-rce

#CVE #PatchNow #InfoSecCommunity

vm2 sandbox escape RCE (CVE-2026-26332)

CVE-2026-26332: vm2 <3.11.0 sandbox escape lets attackers run arbitrary code on host via SuppressedError (CVSS 9.8). Update to 3.11.0 immediately.

Yazoul Security
MoveIT, encore dans l'actualité. Progress vient de corriger une faille critique dans MoveIT Automation — un rappel que les outils de transfert de fichiers restent une surface d'attaque très surveillée, des deux côtés. Si vous utilisez MoveIT, le calendrier de mise à jour mérite un coup d'œil rapide aujourd'hui plutôt que demain. ☕ #infosec #CVE #patchnow
https://www.lemondeinformatique.fr/actualites/lire-progress-comble-une-faille-critique-dans-moveit-automation-100094.html
Progress comble une faille critique dans MoveIT Automation - Le Monde Informatique

Spécialiste en solutions de développement et déploiement d'applications, Progress Software a alerté sur deux failles dont une critique dans son outil...

LeMondeInformatique

🚨 New security advisory:

CVE-2026-42811 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-42811-polaris-bucket-wide-credential-leak

#CVE #PatchNow #InfoSecCommunity

Polaris bucket-wide credential leak (CVE-2026-42811)

CVE-2026-42811: Apache Polaris 1.4.0 GCS credential bypass lets attackers gain bucket-wide access via crafted table names. Update to 1.5.0 or apply patch from the Apache advisory.

Yazoul Security