Overview
- Oracle Corporation
- Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in
Description
Statistics
- 2 Posts
Fediverse
Odd WebLogic Request. Possible CVE-2026-21962 Exploit Attempt or AI Slop? #vulnerability #exploit #cve #ai https://isc.sans.edu/diary/rss/32662
Overview
- SolarWinds
- Web Help Desk
Description
Statistics
- 3 Posts
Fediverse
đš 2 critical authentication bypass and remote command execution vulnerabilities in Solarwinds WHD have been disclosed.
Vulnerability detection scripts can be found below:
CVE-2025-40552:
https://github.com/rxerium/rxerium-templates/blob/main/2025/CVE-2025-40552.yaml
CVE-2025-40554:
https://github.com/rxerium/rxerium-templates/blob/main/2025/CVE-2025-40554.yaml
At the time of writing there are no signs of active exploitation in the wild but it is strongly recommended that you patch as per Solarwind's security advisory:
https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm
SolarWinds has just announced four high-severity vulnerabilities in its Web Help Desk (WHD) software that could lead to full system takeover.
These flaws include unauthenticated Remote Code Execution (RCE) via insecure deserialization and multiple Authentication Bypasses, allowing attackers to execute protected methods without any credentials.
CVE-2025-40551 & CVE-2025-40553 (Unauthenticated RCE)
CVE-2025-40552 & CVE-2025-40554 (Auth Bypass)
Overview
- SolarWinds
- Web Help Desk
Description
Statistics
- 3 Posts
Fediverse
đš 2 critical authentication bypass and remote command execution vulnerabilities in Solarwinds WHD have been disclosed.
Vulnerability detection scripts can be found below:
CVE-2025-40552:
https://github.com/rxerium/rxerium-templates/blob/main/2025/CVE-2025-40552.yaml
CVE-2025-40554:
https://github.com/rxerium/rxerium-templates/blob/main/2025/CVE-2025-40554.yaml
At the time of writing there are no signs of active exploitation in the wild but it is strongly recommended that you patch as per Solarwind's security advisory:
https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm
SolarWinds has just announced four high-severity vulnerabilities in its Web Help Desk (WHD) software that could lead to full system takeover.
These flaws include unauthenticated Remote Code Execution (RCE) via insecure deserialization and multiple Authentication Bypasses, allowing attackers to execute protected methods without any credentials.
CVE-2025-40551 & CVE-2025-40553 (Unauthenticated RCE)
CVE-2025-40552 & CVE-2025-40554 (Auth Bypass)
Overview
Description
Statistics
- 2 Posts
Fediverse
đ CVE-2025-58150 - High (8.8)
Shadow mode tracing code uses a set of per-CPU variables to avoid
cumbersome parameter passing. Some of these variables are written to
with guest controlled data, of guest controllable size. That size can
be larger than the variable, and boundin...
đ https://www.thehackerwire.com/vulnerability/CVE-2025-58150/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
Description
Statistics
- 3 Posts
Fediverse
đš 2 new vulnerability scripts created for the n8n vulnerabilities disclosed today:
CVE-2026-1470:
https://github.com/rxerium/rxerium-templates/blob/main/2026/CVE-2026-1470.yaml
CVE-2026-0863:
https://github.com/rxerium/rxerium-templates/blob/main/2026/CVE-2026-0863.yaml
Happy hunting.
n8n â CVE-2026-1470 et CVE-2026-0863 : deux nouvelles failles patchĂ©es, comment se protĂ©ger ? https://www.it-connect.fr/n8n-cve-2026-1470-et-cve-2026-0863-patchs-de-securite/ #ActuCybersĂ©curitĂ© #CybersĂ©curitĂ© #VulnĂ©rabilitĂ©
Overview
- SolarWinds
- Web Help Desk
Description
Statistics
- 2 Posts
Fediverse
SolarWinds has just announced four high-severity vulnerabilities in its Web Help Desk (WHD) software that could lead to full system takeover.
These flaws include unauthenticated Remote Code Execution (RCE) via insecure deserialization and multiple Authentication Bypasses, allowing attackers to execute protected methods without any credentials.
CVE-2025-40551 & CVE-2025-40553 (Unauthenticated RCE)
CVE-2025-40552 & CVE-2025-40554 (Auth Bypass)
Overview
- symfony
- symfony
Description
Statistics
- 2 Posts
- 4 Interactions
Fediverse
đ CVE-2026-24739: Incorrect argument escaping under MSYS2/Git Bash on Windows can lead to destructive file operations
âĄïž https://symfony.com/blog/cve-2026-24739-incorrect-argument-escaping-under-msys2-git-bash-on-windows-can-lead-to-destructive-file-operations
Overview
- nmedia
- Frontend File Manager Plugin
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
đ CVE-2026-1280 - High (7.5)
The Frontend File Manager Plugin for WordPress is vulnerable to unauthorized file sharing due to a missing capability check on the 'wpfm_send_file_in_email' AJAX action in all versions up to, and including, 23.5. This makes it possible for unauthe...
đ https://www.thehackerwire.com/vulnerability/CVE-2026-1280/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
đ CVE-2025-69420 - High (7.5)
Issue summary: A type confusion vulnerability exists in the TimeStamp Response
verification code where an ASN1_TYPE union member is accessed without first
validating the type, causing an invalid or NULL pointer dereference when
processing a malfor...
đ https://www.thehackerwire.com/vulnerability/CVE-2025-69420/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
âŒïžAISLE Goes 12-for-12 on OpenSSL Vulnerability Detection
CVEs Published: January 27th, 2026
High and Moderate Severity Flaws:
âȘïžCVE-2025-15467: Stack Buffer Overflow in CMS AuthEnvelopedData Parsing (High): A vulnerability with the potential to enable remote code execution under specific conditions
âȘïžCVE-2025-11187: PBMAC1 Parameter Validation in PKCS#12 (Moderate): Missing validation that could trigger a stack-based buffer overflow
Low Severity Flaws:
âȘïžCVE-2025-15468: Crash in QUIC protocol cipher handling
âȘïžCVE-2025-15469: Silent truncation bug affecting post-quantum signature algorithms (ML-DSA)
âȘïžCVE-2025-66199: Memory exhaustion via TLS 1.3 certificate compression
âȘïžCVE-2025-68160: Memory corruption in line-buffering (affects code back to OpenSSL 1.0.2)
âȘïžCVE-2025-69418: Encryption flaw in OCB mode on hardware-accelerated paths
âȘïžCVE-2025-69419: Memory corruption in PKCS#12 character encoding
âȘïžCVE-2025-69420: Crash in TimeStamp Response verification
âȘïžCVE-2025-69421: Crash in PKCS#12 decryption
âȘïžCVE-2026-22795: Crash in PKCS#12 parsing
âȘïžCVE-2026-22796: Crash in PKCS#7 signature verification (affects code back to OpenSSL 1.0.2)
"When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs.
Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."
Writeup: https://aisle.com/blog/aisle-discovered-12-out-of-12-openssl-vulnerabilities
Overview
Description
Statistics
- 1 Post
- 3 Interactions