Overview
- TYPO3
- Extension "E-Mail MFA Provider"
- ralffreit/mfa-email
Description
Statistics
- 1 Post
Fediverse
⚠️ HIGH severity: CVE-2026-4208 in TYPO3 "E-Mail MFA Provider" lets attackers bypass MFA by reusing/omitting codes due to faulty state reset. Patch or disable the extension and monitor logs for abuse. https://radar.offseq.com/threat/cve-2026-4208-cwe-639-in-typo3-extension-e-mail-mf-74236ea3 #OffSeq #TYPO3 #MFA #Vuln
Overview
- SolaX Power
- Pocket WiFi 3.0
Description
Statistics
- 1 Post
Fediverse
Dans mon expérimentation solaire à la maison, je découvre que mon onduleur SolaX X1-Micro 2 en 1 est une petite merguez :
- qui n'expose pas API (voila pourquoi l'app est bancale)
- les settings ne sont pas accessibles
- probablement incapable de ce mettre à jour
- force l'utilisation du cloud SolaX et son MQTT pas très sécurisé (CVE-2025-15573) et avec une métrique toutes les 5 minutes.
J'ai trouvé ces deux ressources pour le moment :
- https://github.com/squishykid/solax/issues/191
- https://forum.hacf.fr/t/integration-pour-onduleurs-solaires-plug-and-play-solax-x1-micro-mqtt-local-sans-cloud/77398
Overview
Description
Statistics
- 1 Post
Overview
- Mobatek
- MobaXterm
Description
Statistics
- 1 Post
Overview
- elemntor
- Ally – Web Accessibility & Usability
Description
Statistics
- 1 Post
Fediverse
SQL Injection Vulnerability in Elementor Ally Plugin Affects Over 250,000 WordPress Websites #wordpress
A critical SQL injection vulnerability in the Elementor Ally plugin could affect over 250,000 WordPress sites. Upgrade to Ally 4.1.0 and update WordPress to 6.9.2 to mitigate CVE-2026-2413 and related risks. Learn more: https://ift.tt/VzNblEM
Source: https://ift.tt/VzNblEM | Image: https://ift.tt/ONFHV64
Overview
- LiteSpeed Technologies
- OpenLiteSpeed
Description
Statistics
- 1 Post
Overview
Description
Statistics
- 1 Post
Fediverse
Internal redteam, 8h, no tools except one exploit.
Result: VP account, full AD control. SOC: 0 alerts.
https://github.com/toxy4ny/semetsky---VP
Why it matters: PXE-boot Linux, unmonitored, unpatched since 2023.
CVE-2025-32463 → bash_history with plaintext creds → RDP hop →
custom AD delegation. All "legitimate" actions, no SOC triggers.
What's your "Yuri Semetsky" story? (obfuscated, of course)