Overview
Description
Statistics
- 4 Posts
- 1 Interaction
Fediverse
Bluesky
Overview
Description
Statistics
- 4 Posts
Fediverse
Bluesky
Overview
- parallax
- jsPDF
Description
Statistics
- 3 Posts
Bluesky
Overview
- adonisjs
- core
Description
Statistics
- 3 Posts
Bluesky
Overview
- Microsoft
- Windows 10 Version 1809
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
https://blog.0patch.com/2026/01/micropatches-released-for-credential.html
Overview
- IBM
- API Connect
Description
Statistics
- 3 Posts
Fediverse
The Cyber Security Agency of Singapore has issued an alert for a critical vulnerability (CVE-2025-13915) in IBM API Connect, which allows for authentication bypass and has a CVSS score of 9.8. IBM has released fixes for affected versions, and while there's no evidence of active exploitation, immediate remediation is strongly recommended.
https://cyble.com/blog/cve-2025-13915-ibm-api-connect-vulnerability/
Bluesky
Overview
Description
Statistics
- 1 Post
- 13 Interactions
Fediverse
Another perfect 10 in n8n? LMFAO. 🥳
https://github.com/n8n-io/n8n/security/advisories/GHSA-v364-rw7m-3263
Edit to add the link to the CVE. It's not published at this time though.
Overview
Description
Statistics
- 2 Posts
- 2 Interactions
Fediverse
🔴 CVE-2025-60262 - Critical (9.8)
An issue in H3C M102G HM1A0V200R010 wireless controller and BA1500L SWBA1A0V100R006 wireless access point, there is a misconfiguration vulnerability about vsftpd. Through this vulnerability, all files uploaded anonymously via the FTP protocol is a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-60262/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
Overview
Description
Statistics
- 2 Posts
- 2 Interactions
Fediverse
🟠 CVE-2026-0640 - High (8.8)
A weakness has been identified in Tenda AC23 16.03.07.52. This affects the function sscanf of the file /goform/PowerSaveSet. Executing a manipulation of the argument Time can lead to buffer overflow. The attack can be launched remotely. The exploi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0640/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
Overview
- wolfSSL
- wolfSSH
Description
Statistics
- 1 Post
- 11 Interactions
Fediverse
Oops.
wolfSSH’s key exchange state machine can be manipulated to leak the client’s password in the clear, trick the client to send a bogus signature, or trick the client into skipping user authentication. This affects client applications with wolfSSH version 1.4.21 and earlier. Users of wolfSSH must update or apply the fix patch and it’s recommended to update credentials used. This fix is also recommended for wolfSSH server applications. While there aren’t any specific attacks on server applications, the same defect is present. Thanks to Aina Toky Rasoamanana of Valeo and Olivier Levillain of Telecom SudParis for the report.
sev:CRIT 9.4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/U:Red