Overview
- Owen
- WebStack
Description
Statistics
- 1 Post
Fediverse
⚠️ CRITICAL: Owen WebStack WordPress theme (CVE-2026-1555) lets unauthenticated attackers upload arbitrary files, risking RCE. No patch yet — restrict uploads & monitor activity! CVSS 9.8. Details: https://radar.offseq.com/threat/cve-2026-1555-cwe-434-unrestricted-upload-of-file--be10bbcf #OffSeq #WordPress #Vulnerability
Overview
- Fortinet
- FortiOS
Description
Statistics
- 1 Post
Overview
- Microsoft
- Windows 10 Version 1607
Description
Statistics
- 3 Posts
- 2 Interactions
Bluesky
Overview
- Microsoft
- Windows 10 Version 1607
Description
Statistics
- 3 Posts
- 2 Interactions
Bluesky
Overview
- SAP_SE
- SAP ERP and SAP S/4 HANA (Private Cloud and On-Premise)
Description
Statistics
- 1 Post
Overview
- Fortinet
- FortiSandbox
Description
Statistics
- 1 Post
Fediverse
🚨 Fortinet just disclosed CVE-2026-39808 and CVE-2026-39813 - 2 critical vulnerabilities affecting FortiSandbox. No active exploitation itw reported as of yet.
Scan your infrastructure to find vulnerable instances:
CVE-2026-39808: https://github.com/rxerium/rxerium-templates/blob/main/2026/CVE-2026-39808.yaml
CVE-2026-39813: https://github.com/rxerium/rxerium-templates/blob/main/2026/CVE-2026-39813.yaml
CVE-2026-39808 (CVSS 9.1):
An Improper Neutralization of Special Elements used in an OS Command ('OS command injection') vulnerability [CWE-78] in FortiSandbox may allow an unauthenticated attacker to execute unauthorized code or commands via crafted HTTP requests.
CVE-2026-39813 (CVSS 9.1):
A Path Traversal vulnerability [CWE-24] in FortiSandbox JRPC API may allow an unauthenticated attacker to bypass authentication via specially crafted HTTP requests.
Patches are available as per vendor advisories:
https://fortiguard.fortinet.com/psirt/FG-IR-26-112
https://fortiguard.fortinet.com/psirt/FG-IR-26-100
Overview
- SAP_SE
- SAP Business Planning and Consolidation and SAP Business Warehouse
Description
Statistics
- 1 Post
Overview
- Fortinet
- FortiSandbox
Description
Statistics
- 1 Post
Fediverse
🚨 Fortinet just disclosed CVE-2026-39808 and CVE-2026-39813 - 2 critical vulnerabilities affecting FortiSandbox. No active exploitation itw reported as of yet.
Scan your infrastructure to find vulnerable instances:
CVE-2026-39808: https://github.com/rxerium/rxerium-templates/blob/main/2026/CVE-2026-39808.yaml
CVE-2026-39813: https://github.com/rxerium/rxerium-templates/blob/main/2026/CVE-2026-39813.yaml
CVE-2026-39808 (CVSS 9.1):
An Improper Neutralization of Special Elements used in an OS Command ('OS command injection') vulnerability [CWE-78] in FortiSandbox may allow an unauthenticated attacker to execute unauthorized code or commands via crafted HTTP requests.
CVE-2026-39813 (CVSS 9.1):
A Path Traversal vulnerability [CWE-24] in FortiSandbox JRPC API may allow an unauthenticated attacker to bypass authentication via specially crafted HTTP requests.
Patches are available as per vendor advisories:
https://fortiguard.fortinet.com/psirt/FG-IR-26-112
https://fortiguard.fortinet.com/psirt/FG-IR-26-100