24h | 7d | 30d

Overview

  • n8n-io
  • n8n

07 Jan 2026
Published
08 Jan 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.03%

KEV

Description

n8n is an open source workflow automation platform. Versions starting with 1.65.0 and below 1.121.0 enable an attacker to access files on the underlying server through execution of certain form-based workflows. A vulnerable workflow could grant access to an unauthenticated remote attacker, resulting in exposure of sensitive information stored on the system and may enable further compromise depending on deployment configuration and workflow usage. This issue is fixed in version 1.121.0.

Statistics

  • 5 Posts
  • 1 Interaction

Last activity: Last hour

Bluesky

Profile picture
Scan results for n8n CVE-2026-21858 (CVSS 10.0 RCE) for 2026-01-09: 105,753 vulnerable instances by unique IP found - out of 230,562 IPs with n8n we see that day. Dashboard Tree Map view: dashboard.shadowserver.org/statistics/c... IP data in Vulnerable HTTP: www.shadowserver.org/what-we-do/n...
  • 0
  • 1
  • 0
  • 1h ago
Profile picture
The latest update for #ArcticWolf includes "CVE-2026-21858: Critical Unauthenticated File Access Vulnerability in n8n 'Ni8mare'" and "2025 Year in Review: Building the Future of #SecurityOperations". #cybersecurity #infosec #networks https://opsmtrs.com/2ZFbaTl
  • 0
  • 0
  • 0
  • 14h ago
Profile picture
Thank you to Validin for the collaboration on the scan! Dashboard World Map view: dashboard.shadowserver.org/statistics/c... CVE-2026-21858 Tracker: dashboard.shadowserver.org/statistics/c... Advisory with patch info: github.com/n8n-io/n8n/s... NVD entry: nvd.nist.gov/vuln/detail/...
  • 0
  • 0
  • 0
  • 1h ago
Profile picture
The NI8MARE Nightmare: How a Perfect 100 CVSS in n8n Exposes Your Automation to Total Takeover + Video Introduction: A critical vulnerability, dubbed "NI8MARE" and tracked as CVE-2026-21858, has been disclosed in the popular workflow automation platform n8n, earning the maximum severity rating of…
  • 0
  • 0
  • 0
  • 1h ago
Profile picture
Deconstructing the n8n Critical RCE (CVE-2026-21858) and the Death of Implicit Trust. www.linkedin.com/pulse/invisi...
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Hewlett Packard Enterprise (HPE)
  • HPE OneView

16 Dec 2025
Published
08 Jan 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
81.31%

Description

A remote code execution issue exists in HPE OneView.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 7 hours ago

Fediverse

Profile picture

CISA urges emergency patching after a critical HPE OneView vulnerability (CVE-2025-37164) with active exploitation - Check your versions and update to OneView v11.00 or later now.

Read: hackread.com/cisa-emergency-pa

#Cybersecurity #HPE #OneView #CISA #Vulnerability

  • 0
  • 0
  • 0
  • 7h ago

Bluesky

Profile picture
CISA urges emergency patching after a critical HPE OneView vulnerability (CVE-2025-37164) with active exploitation - Check your versions and update to OneView v11.00 or later now. Read: hackread.com/cisa-emergen... #Cybersecurity #HPE #OneView #CISA #Vulnerability
  • 0
  • 1
  • 0
  • 7h ago
Profile picture
📌 Critical RCE Flaw in HPE OneView (CVE-2025-37164) Actively Exploited https://www.cyberhub.blog/article/17839-critical-rce-flaw-in-hpe-oneview-cve-2025-37164-actively-exploited
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • MongoDB Inc.
  • MongoDB Server

19 Dec 2025
Published
31 Dec 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
69.62%

Description

Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Server v4.4 versions prior to 4.4.30, MongoDB Server v4.2 versions greater than or equal to 4.2.0, MongoDB Server v4.0 versions greater than or equal to 4.0.0, and MongoDB Server v3.6 versions greater than or equal to 3.6.0.

Statistics

  • 2 Posts

Last activity: 13 hours ago

Bluesky

Profile picture
The latest update for #Sentrium includes "The Boardroom Case for #PenetrationTesting: Risk, Responsibility, and Resilience" and "MongoBleed: unauthenticated memory disclosure in #MongoDB (CVE-2025-14847)". #Cybersecurity #PenTesting #infosec https://opsmtrs.com/3aPKkxS
  • 0
  • 0
  • 0
  • 16h ago
Profile picture
A zlib decompression flaw (CVE-2025-14847, MongoBleed) allows unauthenticated remote attackers to leak uninitialized memory and exfiltrate credentials from exposed MongoDB servers.
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • The GNU C Library
  • glibc

16 May 2025
Published
03 Nov 2025
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).

Statistics

  • 1 Post
  • 5 Interactions

Last activity: 12 hours ago

Fediverse

Profile picture

Cool bug 🐞

CVE-2025-4802: Arbitrary library path in static setuid binary in

hackyboiz.github.io/2025/12/03

  • 2
  • 3
  • 0
  • 12h ago

Overview

  • vercel
  • next.js

21 Mar 2025
Published
08 Apr 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
92.90%

KEV

Description

Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.

Statistics

  • 2 Posts
  • 7 Interactions

Last activity: 6 hours ago

Bluesky

Profile picture
Previous from HackTheBox features CVE-2025-29927 (NextJS middleware auth bypass), directory traversal for file read, and three ways to abuse a Terraform sudo rule with !env_reset to get root.
  • 1
  • 6
  • 1
  • 6h ago

Overview

  • Cisco
  • Cisco Identity Services Engine Software

07 Jan 2026
Published
07 Jan 2026
Updated

CVSS v3.1
MEDIUM (4.9)
EPSS
0.03%

KEV

Description

A vulnerability in the licensing features of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information.  This vulnerability is due to improper parsing of XML that is processed by the web-based management interface of Cisco ISE and Cisco ISE-PIC. An attacker could exploit this vulnerability by uploading a malicious file to the application. A successful exploit could allow the attacker to read arbitrary files from the underlying operating system that could include sensitive data that should otherwise be inaccessible even to administrators. To exploit this vulnerability, the attacker must have valid administrative credentials.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 10 hours ago

Bluesky

Profile picture
Cisco released updates for a medium-severity ISE and Snort 3 flaws, including CVE-2026-20029 with a public PoC, and reports no exploitation so far.
  • 0
  • 1
  • 0
  • 10h ago

Overview

  • The Tcpdump Group
  • libpcap

31 Dec 2025
Published
02 Jan 2026
Updated

CVSS v3.1
LOW (1.9)
EPSS
Pending

KEV

Description

pcap_ether_aton() is an auxiliary function in libpcap, it takes a string argument and returns a fixed-size allocated buffer. The string argument must be a well-formed MAC-48 address in one of the supported formats, but this requirement has been poorly documented. If an application calls the function with an argument that deviates from the expected format, the function can read data beyond the end of the provided string and write data beyond the end of the allocated buffer.

Statistics

  • 1 Post

Last activity: Last hour

Bluesky

Profile picture
🚨 THREAD: Critical libpcap vulnerability CVE-2025-11961 threatens network security infrastructure. Read more: 👉 tinyurl.com/wurd46hn #Security #Mageia
  • 0
  • 0
  • 0
  • Last hour

Overview

  • net-snmp
  • net-snmp

22 Dec 2025
Published
09 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.04%

KEV

Description

net-snmp is a SNMP application library, tools and daemon. Prior to versions 5.9.5 and 5.10.pre2, a specially crafted packet to an net-snmp snmptrapd daemon can cause a buffer overflow and the daemon to crash. This issue has been patched in versions 5.9.5 and 5.10.pre2.

Statistics

  • 1 Post

Last activity: 21 hours ago

Bluesky

Profile picture
SIOSセキュリティブログを更新しました。 Net-SNMPdのRCE脆弱性(Critical: CVE-2025-68615) #sios_tech #security #vulnerability #セキュリティ #脆弱性 #linux #snmp #rce security.sios.jp/vulnerabilit...
  • 0
  • 0
  • 0
  • 21h ago

Overview

  • remix-run
  • react-router

10 Jan 2026
Published
10 Jan 2026
Updated

CVSS v3.1
HIGH (7.6)
EPSS
0.04%

KEV

Description

React Router is a router for React. In @remix-run/react versions 1.15.0 through 2.17.0. and react-router versions 7.0.0 through 7.8.2, a XSS vulnerability exists in in React Router's meta()/<Meta> APIs in Framework Mode when generating script:ld+json tags which could allow arbitrary JavaScript execution during SSR if untrusted content is used to generate the tag. There is no impact if the application is being used in Declarative Mode (<BrowserRouter>) or Data Mode (createBrowserRouter/<RouterProvider>). This issue has been patched in @remix-run/react version 2.17.1 and react-router version 7.9.0.

Statistics

  • 1 Post

Last activity: 18 hours ago

Fediverse

Profile picture

🟠 CVE-2025-59057 - High (7.6)

React Router is a router for React. In @remix-run/react versions 1.15.0 through 2.17.0. and react-router versions 7.0.0 through 7.8.2, a XSS vulnerability exists in in React Router's meta()/ APIs in Framework Mode when generating script:ld+json ta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Google
  • Chrome

06 Jan 2026
Published
08 Jan 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7499.192 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: High)

Statistics

  • 1 Post

Last activity: 5 hours ago

Bluesky

Profile picture
微软紧急修复 Edge 浏览器高危安全漏洞 👉 https://windiscover.com/posts/microsoft-edge-security-fix-cve-2026-0628.html
  • 0
  • 0
  • 0
  • 5h ago
Showing 1 to 10 of 58 CVEs