24h | 7d | 30d

Overview

  • Fortinet
  • FortiManager

27 Jan 2026
Published
26 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.4)
EPSS
3.68%

Description

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.6.0 through 7.6.5, FortiOS 7.4.0 through 7.4.10, FortiOS 7.2.0 through 7.2.12, FortiOS 7.0.0 through 7.0.18, FortiProxy 7.6.0 through 7.6.4, FortiProxy 7.4.0 through 7.4.12, FortiProxy 7.2.0 through 7.2.15, FortiProxy 7.0.0 through 7.0.22, FortiWeb 8.0.0 through 8.0.3, FortiWeb 7.6.0 through 7.6.6, FortiWeb 7.4.0 through 7.4.11 may allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture fallback
~Cybergcca~ Critical auth bypass flaws in Fortinet SAML SSO are actively exploited, requiring immediate patching or disabling of the feature. - IOCs: CVE-2026-24858, CVE-2025-59718, CVE-2025-59719 - #Fortinet #ThreatIntel #Vulnerability
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • NVIDIA
  • Cumulus Linux GA

24 Feb 2026
Published
24 Feb 2026
Updated

CVSS v3.1
HIGH (8.0)
EPSS
0.07%

KEV

Description

NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE interface, where a low-privileged user could inject a command. A successful exploit of this vulnerability might lead to escalation of privileges.

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture fallback
NVIDIAのネットワークOSに複数の脆弱性 - アップデートが公開 www.security-next.com/181609 >「CVE-2025-33179」は、低い権限を持つ場合にコマンド実行でき、権限の昇格が可能。「CVE-2025-33180」「CVE-2025-33181」は、いずれもコマンドを挿入によって権限昇格につながるおそれ
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • n8n-io
  • n8n

08 Jan 2026
Published
08 Jan 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
16.06%

KEV

Description

n8n is an open source workflow automation platform. In versions 0.121.2 and below, an authenticated attacker may be able to execute malicious code using the n8n service. This could result in full compromise and can impact both self-hosted and n8n Cloud instances. This issue is fixed in version 1.121.3. Administrators can reduce exposure by disabling the Git node and limiting access for untrusted users, but upgrading to the latest version is recommended.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture fallback
~Cybergcca~ Multiple critical RCE vulnerabilities in n8n workflow software are being actively targeted with public PoCs. - IOCs: CVE-2026-21858, CVE-2026-21877, CVE-2025-68613 - #ThreatIntel #Vulnerability #n8n
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • n8n-io
  • n8n

07 Jan 2026
Published
12 Jan 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
7.06%

KEV

Description

n8n is an open source workflow automation platform. Versions starting with 1.65.0 and below 1.121.0 enable an attacker to access files on the underlying server through execution of certain form-based workflows. A vulnerable workflow could grant access to an unauthenticated remote attacker, resulting in exposure of sensitive information stored on the system and may enable further compromise depending on deployment configuration and workflow usage. This issue is fixed in version 1.121.0.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture fallback
~Cybergcca~ Multiple critical RCE vulnerabilities in n8n workflow software are being actively targeted with public PoCs. - IOCs: CVE-2026-21858, CVE-2026-21877, CVE-2025-68613 - #ThreatIntel #Vulnerability #n8n
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • n8n-io
  • n8n

19 Dec 2025
Published
04 Mar 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
78.98%

KEV

Description

n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. This issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0. Users are strongly advised to upgrade to a patched version, which introduces additional safeguards to restrict expression evaluation. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only; and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully eliminate the risk and should only be used as short-term measures.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture fallback
~Cybergcca~ Multiple critical RCE vulnerabilities in n8n workflow software are being actively targeted with public PoCs. - IOCs: CVE-2026-21858, CVE-2026-21877, CVE-2025-68613 - #ThreatIntel #Vulnerability #n8n
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Fortinet
  • FortiOS

09 Dec 2025
Published
26 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
1.97%

Description

A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture fallback
~Cybergcca~ Critical auth bypass flaws in Fortinet SAML SSO are actively exploited, requiring immediate patching or disabling of the feature. - IOCs: CVE-2026-24858, CVE-2025-59718, CVE-2025-59719 - #Fortinet #ThreatIntel #Vulnerability
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • NVIDIA
  • Cumulus Linux GA

24 Feb 2026
Published
24 Feb 2026
Updated

CVSS v3.1
HIGH (7.3)
EPSS
0.02%

KEV

Description

NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE interface, where a low-privileged user could inject a command. A successful exploit of this vulnerability might lead to escalation of privileges.

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture fallback
NVIDIAのネットワークOSに複数の脆弱性 - アップデートが公開 www.security-next.com/181609 >「CVE-2025-33179」は、低い権限を持つ場合にコマンド実行でき、権限の昇格が可能。「CVE-2025-33180」「CVE-2025-33181」は、いずれもコマンドを挿入によって権限昇格につながるおそれ
  • 0
  • 0
  • 0
  • 10h ago
Showing 71 to 77 of 77 CVEs