Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1153 articles · 105240 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-4851EXPLOITED
null · grid::machine

Remote-to-local code execution in GRID::Machine

Description

GRID::Machine is a module for the Perl programming language that implements Remote Procedure Calls (RPC) over SSH. The module has a security flaw that allows an untrusted remote to execute arbitrary code on the client.

Affected Products

VendorProductVersions
nullgrid::machine0.127, likely all released versions

Related News (2 articles)

Tier C
VulDB4h ago
CVE-2026-4851 | GRID::Machine 0.127 code injection
→ No new info (linked only)
Tier C
oss-security15h ago
CVE-2026-4851: remote-to-local code execution in GRID::Machine
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-94
Published3/26/2026
Last enriched3h agov3
Trending Score60
Source articles2
Independent2
Info Completeness8/14
Missing: cvss, epss, kev, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Version History

v3
Last enriched 3h ago
v3Tier C3h ago

Updated severity to CRITICAL based on new information from the article.

severity
via VulDB
v2Tier C3h ago

Updated product name to GRID::Machine and marked exploit availability as true and actively exploited.

exploitAvailableactivelyExploited
via oss-security
v110h ago

Initial creation