24h | 7d | 30d

Overview

  • n8n-io
  • n8n

19 Dec 2025
Published
22 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
8.42%

KEV

Description

n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. This issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0. Users are strongly advised to upgrade to a patched version, which introduces additional safeguards to restrict expression evaluation. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only; and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully eliminate the risk and should only be used as short-term measures.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 18 hours ago

Fediverse

Profile picture

Another video showing how incredibly easy the n8n RCE vulnerability (CVE-2025-68613) is.

Credit: youtube.com/@0xmrsecurity

  • 3
  • 0
  • 0
  • 18h ago

Overview

  • EFACEC
  • QC60/90/120

07 Jan 2026
Published
07 Jan 2026
Updated

CVSS v4.0
CRITICAL (9.2)
EPSS
Pending

KEV

Description

The massive sending of ARP requests causes a denial of service on one board of the charger that allows control of the EV interfaces. Since the board must be operating correctly for the charger to also function correctly.

Statistics

  • 1 Post
  • 7 Interactions

Last activity: 23 hours ago

Fediverse

Profile picture

DoS via ARP flood. In 2026. And this is the kind of shit people are putting on the Internet and connecting to home and industrial networks.

The massive sending of ARP requests causes a denial of service on one board of the charger that allows control of the EV interfaces. Since the board must be operating correctly for the charger to also function correctly, the denial of service (DoS) results in a restart of the charger functionalities.

cve.org/CVERecord?id=CVE-2026-

  • 2
  • 5
  • 0
  • 23h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 2 Posts

Last activity: 13 hours ago

Fediverse

Profile picture

🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions

CVE-2025-55125:

A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.

▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing

CVE-2025-59468:

A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.

▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing

CVE-2025-59469

A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.

▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing

CVE-2025-59470

A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.

▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing

Veeam: veeam.com/kb4738
Blog format: darkwebinformer.com/multiple-v

  • 0
  • 0
  • 0
  • 22h ago

Bluesky

Profile picture
📌 Critical RCE Flaw in Veeam Backup & Replication: CVE-2025-59470 with CVSS 9.0 https://www.cyberhub.blog/article/17746-critical-rce-flaw-in-veeam-backup-replication-cve-2025-59470-with-cvss-90
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post
  • 6 Interactions

Last activity: 18 hours ago

Fediverse

Profile picture

That's a weird thing to do intentionally.

An unused function in MicroServer can start a reverse SSH connection to a vendor registered domain, without mutual authentication. An attacker on the local network with admin access to the web server, and the ability to manipulate DNS responses, can redirect the SSH connection to an attacker controlled device.

cve.org/CVERecord?id=CVE-2025-

  • 1
  • 5
  • 0
  • 18h ago

Overview

  • zlib software
  • zlib

07 Jan 2026
Published
07 Jan 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
Pending

KEV

Description

zlib versions up to and including 1.3.1.2 contain a global buffer overflow in the untgz utility. The TGZfname() function copies an attacker-supplied archive name from argv[] into a fixed-size 1024-byte static global buffer using an unbounded strcpy() call without length validation. Supplying an archive name longer than 1024 bytes results in an out-of-bounds write that can lead to memory corruption, denial of service, and potentially code execution depending on compiler, build flags, architecture, and memory layout. The overflow occurs prior to any archive parsing or validation.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 17 hours ago

Fediverse

Profile picture

sev:CRIT BoF in zlib.

zlib versions up to and including 1.3.1.2 contain a global buffer overflow in the untgz utility. The TGZfname() function copies an attacker-supplied archive name from argv[] into a fixed-size 1024-byte static global buffer using an unbounded strcpy() call without length validation. Supplying an archive name longer than 1024 bytes results in an out-of-bounds write that can lead to memory corruption, denial of service, and potentially code execution depending on compiler, build flags, architecture, and memory layout. The overflow occurs prior to any archive parsing or validation.

cve.org/CVERecord?id=CVE-2026-

  • 1
  • 2
  • 0
  • 17h ago

Overview

  • EFACEC
  • QC 60/90/120

07 Jan 2026
Published
07 Jan 2026
Updated

CVSS v4.0
HIGH (8.6)
EPSS
Pending

KEV

Description

The absence of permissions control for the user XXX allows the current configuration in the sudoers file to escalate privileges without any restrictions

Statistics

  • 1 Post
  • 6 Interactions

Last activity: 19 hours ago

Fediverse

Profile picture

WTF kind of CVE is this? It doesn't even say what product is vulnerable.

nvd.nist.gov/vuln/detail/CVE-2

All it says is:

The absence of permissions control for the user XXX allows the current configuration in the sudoers file to escalate privileges without any restrictions

Slow clap for S21sec.

  • 0
  • 6
  • 0
  • 19h ago

Overview

  • SATO
  • S86-ex 203dpi

29 Sep 2025
Published
03 Nov 2025
Updated

CVSS v4.0
MEDIUM (6.8)
EPSS
0.02%

KEV

Description

The credentials required to access the device's web server are sent in base64 within the HTTP headers. Since base64 is not considered a strong cipher, an attacker could intercept the web request handling the login and obtain the credentials.

Statistics

  • 1 Post
  • 5 Interactions

Last activity: 20 hours ago

Overview

  • EFACEC
  • QC 60/90/120

07 Jan 2026
Published
07 Jan 2026
Updated

CVSS v4.0
CRITICAL (9.2)
EPSS
Pending

KEV

Description

An attacker with access to the system's internal network can cause a denial of service on the system by making two concurrent connections through the Telnet service.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 22 hours ago

Fediverse

Profile picture

RE: infosec.exchange/@cR0w/1158545

This one is even better. 🤣

An attacker with access to the system's internal network can cause a denial of service on the system by making two concurrent connections through the Telnet service.

Good luck with your Nessus scans.

cve.org/CVERecord?id=CVE-2026-

  • 0
  • 3
  • 0
  • 22h ago

Overview

  • EFACEC
  • QC 60/90/120

07 Jan 2026
Published
07 Jan 2026
Updated

CVSS v4.0
HIGH (8.2)
EPSS
Pending

KEV

Description

The massive sending of ICMP requests causes a denial of service on one of the boards from the EVCharger that allows control the EV interfaces. Since the board must be operating correctly for the charger to also function correctly.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 22 hours ago

Fediverse

Profile picture

RE: infosec.exchange/@cR0w/1158543

Ooh, this one only requires L3 access to DoS.

The massive sending of ICMP requests causes a denial of service on one of the boards from the EVCharger that allows control the EV interfaces. Since the board must be operating correctly for the charger to also function correctly.

cve.org/CVERecord?id=CVE-2026-

Edit to correct the link.

  • 0
  • 3
  • 0
  • 22h ago

Overview

  • anthropics
  • claude-code

21 Nov 2025
Published
24 Nov 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.09%

KEV

Description

Claude Code is an agentic coding tool. Prior to version 2.0.31, due to an error in sed command parsing, it was possible to bypass the Claude Code read-only validation and write to arbitrary files on the host system. This issue has been patched in version 2.0.31.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 12 hours ago

Bluesky

Profile picture
⚠️ Crypto users: Beware of increasingly sophisticated phishing attacks! Stay cautious of links & suspicious transactions. 🔗 Also, a privilege escalation vulnerability (CVE-2025-64755) exists in Anthropic’s Claude Code, with a public exploit available. Similar issue to Cursor. #security #crypto #AI
  • 0
  • 2
  • 0
  • 12h ago
Showing 11 to 20 of 80 CVEs