24h | 7d | 30d

Overview

  • eigent-ai
  • eigent

27 Dec 2025
Published
27 Dec 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
Pending

KEV

Description

Eigent is a multi-agent Workforce. In version 0.0.60, a 1-click Remote Code Execution (RCE) vulnerability has been identified in Eigent. This vulnerability allows an attacker to execute arbitrary code on the victim's machine or server through a specific interaction (1-click). This issue has been patched in version 0.0.61.

Statistics

  • 1 Post

Last activity: 2 hours ago

Fediverse

Profile picture

CRITICAL: CVE-2025-68952 in eigent-ai Eigent v0.0.60 enables unauthenticated RCE over the network. Patch to 0.0.61 now! Impact: full system compromise, data loss. 🛡️ radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Palo Alto Networks
  • PAN-OS

14 May 2025
Published
14 May 2025
Updated

CVSS v4.0
MEDIUM (5.1)
EPSS
5.30%

KEV

Description

A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user's browser when they click on a specially crafted link. The primary risk is phishing attacks that can lead to credential theft—particularly if you enabled Clientless VPN. There is no availability impact to GlobalProtect features or GlobalProtect users. Attackers cannot use this vulnerability to tamper with or modify contents or configurations of the GlobalProtect portal or gateways. The integrity impact of this vulnerability is limited to enabling an attacker to create phishing and credential-stealing links that appear to be hosted on the GlobalProtect portal. For GlobalProtect users with Clientless VPN enabled, there is a limited impact on confidentiality due to inherent risks of Clientless VPN that facilitate credential theft. You can read more about this risk in the informational bulletin PAN-SA-2025-0005 https://security.paloaltonetworks.com/PAN-SA-2025-0005 https://security.paloaltonetworks.com/PAN-SA-2025-0005 . There is no impact to confidentiality for GlobalProtect users if you did not enable (or you disable) Clientless VPN.

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture
How I Used Shodan to Hack a Major Bank and Discovered CVE-2025-0133 + Video Introduction: A single misconfigured search parameter on a major banking portal served as the gateway for a critical vulnerability. This case study details the discovery of CVE-2025-0133, a reflected Cross-Site Scripting…
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Pending

26 Dec 2025
Published
26 Dec 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

Incorrect access control in DEV Systemtechnik GmbH DEV 7113 RF over Fiber Distribution System 32-0078 H.01 allows unauthenticated attackers to access an administrative endpoint.

Statistics

  • 1 Post

Last activity: 12 hours ago

Fediverse

Profile picture

🟠 CVE-2025-67014 - High (7.5)

Incorrect access control in DEV Systemtechnik GmbH DEV 7113 RF over Fiber Distribution System 32-0078 H.01 allows unauthenticated attackers to access an administrative endpoint.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

  • 0
  • 0
  • 0
  • 12h ago

Overview

  • n8n-io
  • n8n

19 Dec 2025
Published
22 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
3.55%

KEV

Description

n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. This issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0. Users are strongly advised to upgrade to a patched version, which introduces additional safeguards to restrict expression evaluation. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only; and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully eliminate the risk and should only be used as short-term measures.

Statistics

  • 3 Posts

Last activity: 15 hours ago

Bluesky

Profile picture
The latest update for #Indusface includes "CVE-2025-68613: Critical n8n RCE Vulnerability Enables Full Server Compromise" and "Apache Commons Text Code Injection Vulnerability (CVE-2025-46295)". #cybersecurity #infosec https://opsmtrs.com/3ySs2VF
  • 0
  • 0
  • 0
  • 15h ago
Profile picture
🚨 New plugin: N8nPlugin (CVE-2025-68613, CVE-2025-65964, CVE-2025-62726). n8n Workflow Automation multiple vulnerabilities detection. Results: https://leakix.net/search?q=%2Bplugin%3AN8nPlugin&scope=leak
  • 0
  • 0
  • 1
  • 16h ago

Overview

  • PostgreSQL

13 Nov 2025
Published
13 Nov 2025
Updated

CVSS v3.1
MEDIUM (5.9)
EPSS
0.06%

KEV

Description

Integer wraparound in multiple PostgreSQL libpq client library functions allows an application input provider or network peer to cause libpq to undersize an allocation and write out-of-bounds by hundreds of megabytes. This results in a segmentation fault for the application using libpq. Versions before PostgreSQL 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23 are affected.

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture
🚨 #PostgreSQL 13 users: Patch immediately! CVE-2025-12817 (auth bypass) & CVE-2025-12818 (libpq crash) can cause DoS. Fixed in Debian LTS DLA-4420-1. Guide: Read more: 👉 tinyurl.com/3tyec75a #Security
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Claris
  • FileMaker Server

16 Dec 2025
Published
17 Dec 2025
Updated

CVSS
Pending
EPSS
0.33%

KEV

Description

Apache Commons Text versions prior to 1.10.0 included interpolation features that could be abused when applications passed untrusted input into the text-substitution API. Because some interpolators could trigger actions like executing commands or accessing external resources, an attacker could potentially achieve remote code execution. This vulnerability has been fully addressed in FileMaker Server 22.0.4.

Statistics

  • 1 Post

Last activity: 15 hours ago

Bluesky

Profile picture
The latest update for #Indusface includes "CVE-2025-68613: Critical n8n RCE Vulnerability Enables Full Server Compromise" and "Apache Commons Text Code Injection Vulnerability (CVE-2025-46295)". #cybersecurity #infosec https://opsmtrs.com/3ySs2VF
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • n8n-io
  • n8n

08 Dec 2025
Published
09 Dec 2025
Updated

CVSS v4.0
CRITICAL (9.4)
EPSS
0.02%

KEV

Description

n8n is an open source workflow automation platform. Versions 0.123.1 through 1.119.1 do not have adequate protections to prevent RCE through the project's pre-commit hooks. The Add Config operation allows workflows to set arbitrary Git configuration values, including core.hooksPath, which can point to a malicious Git hook that executes arbitrary commands on the n8n host during subsequent Git operations. Exploitation requires the ability to create or modify an n8n workflow using the Git node. This issue is fixed in version 1.119.2. Workarounds include excluding the Git Node (Docs) and avoiding cloning or interacting with untrusted repositories using the Git Node.

Statistics

  • 2 Posts

Last activity: 16 hours ago

Bluesky

Profile picture
🚨 New plugin: N8nPlugin (CVE-2025-68613, CVE-2025-65964, CVE-2025-62726). n8n Workflow Automation multiple vulnerabilities detection. Results: https://leakix.net/search?q=%2Bplugin%3AN8nPlugin&scope=leak
  • 0
  • 0
  • 1
  • 16h ago

Overview

  • n8n-io
  • n8n

30 Oct 2025
Published
31 Oct 2025
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.09%

KEV

Description

n8n is an open source workflow automation platform. Prior to 1.113.0, a remote code execution vulnerability exists in the Git Node component available in both Cloud and Self-Hosted versions of n8n. When a malicious actor clones a remote repository containing a pre-commit hook, the subsequent use of the Commit operation in the Git Node can inadvertently trigger the hook’s execution. This allows attackers to execute arbitrary code within the n8n environment, potentially compromising the system and any connected credentials or workflows. This vulnerability is fixed in 1.113.0.

Statistics

  • 2 Posts

Last activity: 16 hours ago

Bluesky

Profile picture
🚨 New plugin: N8nPlugin (CVE-2025-68613, CVE-2025-65964, CVE-2025-62726). n8n Workflow Automation multiple vulnerabilities detection. Results: https://leakix.net/search?q=%2Bplugin%3AN8nPlugin&scope=leak
  • 0
  • 0
  • 1
  • 16h ago

Overview

  • Tenda
  • CH22

25 Dec 2025
Published
26 Dec 2025
Updated

CVSS v4.0
MEDIUM (6.9)
EPSS
0.06%

KEV

Description

A weakness has been identified in Tenda CH22 1.0.0.1. Impacted is an unknown function of the file /public/. Executing manipulation can lead to path traversal. The attack can be launched remotely. The exploit has been made available to the public and could be exploited.

Statistics

  • 1 Post
  • 6 Interactions

Last activity: 15 hours ago

Overview

  • JD
  • Cloud BE6500

25 Dec 2025
Published
26 Dec 2025
Updated

CVSS v4.0
MEDIUM (5.3)
EPSS
0.84%

KEV

Description

A vulnerability has been found in JD Cloud BE6500 4.4.1.r4308. This issue affects the function sub_4780 of the file /jdcapi. Such manipulation of the argument ddns_name leads to command injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post
  • 6 Interactions

Last activity: 15 hours ago
Showing 31 to 40 of 44 CVEs