Overview
- discourse
- discourse
Description
Statistics
- 1 Post
Fediverse
🟠 CVE-2026-23743 - High (7.5)
Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, permalinks pointing to access-restricted resources (private topics, categories, posts, or hidden tags) were redirecting users to URLs ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23743/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
Description
Statistics
- 1 Post
Fediverse
🟠 CVE-2026-21418 - High (7.8)
Dell Unity, version(s) 5.5.2 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerabilit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21418/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
Description
Statistics
- 1 Post
Bluesky
Overview
- Codriapp Innovation and Software Technologies Inc.
- HeyGarson
Description
Statistics
- 1 Post
Fediverse
🟠 CVE-2025-1395 - High (8.2)
Generation of Error Message Containing Sensitive Information vulnerability in Codriapp Innovation and Software Technologies Inc. HeyGarson allows Fuzzing for application mapping.This issue affects HeyGarson: through 30012026.
NOTE: The vendor was...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-1395/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
Description
Statistics
- 1 Post
Fediverse
🔴 CVE-2025-51958 - Critical (9.8)
aelsantex runcommand 2014-04-01, a plugin for DokuWiki, allows unauthenticated attackers to execute arbitrary system commands via lib/plugins/runcommand/postaction.php.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-51958/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
- Salt Project
- Salt
- salt
Description
Statistics
- 1 Post
Fediverse
🟠 CVE-2025-62348 - High (7.8)
Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-62348/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
- backstage
- backstage
Description
Statistics
- 1 Post
Fediverse
🟠 CVE-2026-25153 - High (7.7)
Backstage is an open framework for building developer portals, and @backstage/plugin-techdocs-node provides common node.js functionalities for TechDocs. In versions of @backstage/plugin-techdocs-node prior to 1.13.11 and 1.14.1, when TechDocs is c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25153/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
- NaturalIntelligence
- fast-xml-parser
Description
Statistics
- 1 Post
Fediverse
🟠 CVE-2026-25128 - High (7.5)
fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 4.3.6 through 5.3.3, a RangeError vulnerability exists in the numeric entity processing of...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25128/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
Description
Statistics
- 1 Post
Fediverse
🟠 CVE-2026-24854 - High (8.8)
ChurchCRM is an open-source church management system. A SQL Injection vulnerability exists in endpoint `/PaddleNumEditor.php` in ChurchCRM prior to version 6.7.2. Any authenticated user, including one with zero assigned permissions, can exploit SQ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24854/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
Description
Statistics
- 1 Post
Fediverse
🔥 A vulnerability in AWStats sitting in a cPanel tree... H I D I N G?
We discovered it.
CVE-2025-63261 (or as we call it: PTT-2025-021) is what happens when "legacy meets lazy":
A single "|" in an HTTP GET param leads straight to RCE via Perl’s unsafe open() call.
And yes, this was sitting in AWStats.
Why it matters:
🔹 It’s already 2026, and we’re still finding bugs from 2000s-era web tools
🔹 Attack surface doesn’t disappear, it just ages quietly
🔹 RCE doesn’t need zero-days when it has zero hygiene
📝 We have a very comprehensive Part 1 article, written by Matei Badanoiu, who walks us through:
✅ How we found the bug
✅ How we turned it into a working exploit
✅ Why these “boring” vulns still matter
Read the article here: https://pentest-tools.com/blog/cpanel-cve-ptt-2025-021-part-1