Overview
- Red Hat
- Red Hat Ansible Automation Platform 2.5 for RHEL 8
- automation-gateway
Description
Statistics
- 2 Posts
- 2 Interactions
Fediverse
A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 API Tokens in AAP, are enforced at the Gateway level for Gateway-specific operations. However, this vulnerability allows read-only tokens to perform write operations on backend services (e.g., Controller, Hub, EDA). If this flaw were exploited, an attacker‘s capabilities would only be limited by role based access controls (RBAC).
🟠 CVE-2025-14025 - High (8.5)
A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 API Tokens in AAP, are enforced at the Gateway level for Gateway-specific operations. However, this vulnerability allows read-only tokens to perform write operations on...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14025/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
Overview
Description
Statistics
- 1 Post
- 13 Interactions
Overview
Description
Statistics
- 4 Posts
- 17 Interactions
Fediverse
🚨 Kritische Schwachstellen in n8n
In den letzten drei Wochen wurden vier kritische Schwachstellen (CVE-2025-68613, CVE-2025-68668, CVE-2026-21858, CVE-2026-21877) in der Open-Source Workflow-Automatisierungsplattform n8n gemeldet, die von Angreifenden ausgenutzt werden können, um beliebigen Programmcode auszuführen und die Systeme ggf. vollständig zu kompromittieren.
Betroffene Systeme sollten zeitnah auf eine aktuelle Version gebracht werden.
Nutzt wer die "Automatisierungs-Plattform" n8n? Die ist sicherheitstechnisch löchrig wie ein Schweizer Käse. Liste des CVE-Grauens (Base Score bis 10.0) der letzten Tage. #n8mare
Details zu den einzelnen Schwachstellen:
CVE-2025-68613 (betrifft Versionen vor 1.20.4)
https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp
CVE-2025-68668 (betrifft Versionen vor 2.0.0)
https://github.com/n8n-io/n8n/security/advisories/GHSA-62r4-hw23-cc8v
CVE-2026-21858 (betrifft Versionen vor 1.121.0)
https://github.com/n8n-io/n8n/security/advisories/GHSA-v4pr-fm98-w9pg
CVE-2026-21877 (betrifft Versionen vor 1.121.3)
https://github.com/n8n-io/n8n/security/advisories/GHSA-v364-rw7m-3263
Overview
Description
Statistics
- 4 Posts
- 15 Interactions
Fediverse
🚨 Kritische Schwachstellen in n8n
In den letzten drei Wochen wurden vier kritische Schwachstellen (CVE-2025-68613, CVE-2025-68668, CVE-2026-21858, CVE-2026-21877) in der Open-Source Workflow-Automatisierungsplattform n8n gemeldet, die von Angreifenden ausgenutzt werden können, um beliebigen Programmcode auszuführen und die Systeme ggf. vollständig zu kompromittieren.
Betroffene Systeme sollten zeitnah auf eine aktuelle Version gebracht werden.
Details zu den einzelnen Schwachstellen:
CVE-2025-68613 (betrifft Versionen vor 1.20.4)
https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp
CVE-2025-68668 (betrifft Versionen vor 2.0.0)
https://github.com/n8n-io/n8n/security/advisories/GHSA-62r4-hw23-cc8v
CVE-2026-21858 (betrifft Versionen vor 1.121.0)
https://github.com/n8n-io/n8n/security/advisories/GHSA-v4pr-fm98-w9pg
CVE-2026-21877 (betrifft Versionen vor 1.121.3)
https://github.com/n8n-io/n8n/security/advisories/GHSA-v364-rw7m-3263
Bluesky
Overview
- Veeam
- Backup and Recovery
Description
Statistics
- 2 Posts
- 3 Interactions
Fediverse
🔴 CVE-2025-59469 - Critical (9)
This vulnerability allows a Backup or Tape Operator to write files as root.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59469/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
Overview
- Veeam
- Backup And Recovery
Description
Statistics
- 2 Posts
- 3 Interactions
Fediverse
🟠 CVE-2025-55125 - High (7.8)
This vulnerability allows a Backup or Tape Operator to perform remote code execution (RCE) as root by creating a malicious
backup configuration file.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-55125/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
Overview
- Veeam
- Backup and Recovery
Description
Statistics
- 2 Posts
- 3 Interactions
Fediverse
🔴 CVE-2025-59468 - Critical (9)
This vulnerability allows a Backup Administrator to perform remote code execution (RCE) as the postgres user by sending a
malicious password parameter.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59468/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
Overview
- wolfSSL
- wolfSSL-py
- wolfssl
Description
Statistics
- 1 Post
- 3 Interactions
Fediverse
No awoo for you.
https://www.cve.org/CVERecord?id=CVE-2025-15346
A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced. Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided. This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake. The issue affects versions up to and including 5.8.2.
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
Explotación PoC publicada para vulnerabilidad del kernel de Android/Linux CVE-2025-38352
https://blog.elhacker.net/2026/01/explotacion-poc-publicada-para.html
Overview
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
🔴 CVE-2025-66916 - Critical (9.4)
The snailjob component in RuoYi-Vue-Plus versions 5.5.1 and earlier, interface /snail-job/workflow/check-node-expression can execute QLExpress expressions, but it does not filter user input, allowing attackers to use the File class to perform arbi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66916/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda