#vuln — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #vuln, aggregated by home.social.
-
🚨 CVE-2026-42281: CRITICAL SSRF in MagicMirror² (<2.36.0)! /cors endpoint lets unauthenticated attackers scan internal networks & exfiltrate environment secrets. Upgrade to 2.36.0+ now! https://radar.offseq.com/threat/cve-2026-42281-cwe-918-server-side-request-forgery-3c9e7191 #OffSeq #SSRF #MagicMirror #Vuln
-
🚨 CVE-2026-42281: CRITICAL SSRF in MagicMirror² (<2.36.0)! /cors endpoint lets unauthenticated attackers scan internal networks & exfiltrate environment secrets. Upgrade to 2.36.0+ now! https://radar.offseq.com/threat/cve-2026-42281-cwe-918-server-side-request-forgery-3c9e7191 #OffSeq #SSRF #MagicMirror #Vuln
-
🚨 CVE-2026-42281: CRITICAL SSRF in MagicMirror² (<2.36.0)! /cors endpoint lets unauthenticated attackers scan internal networks & exfiltrate environment secrets. Upgrade to 2.36.0+ now! https://radar.offseq.com/threat/cve-2026-42281-cwe-918-server-side-request-forgery-3c9e7191 #OffSeq #SSRF #MagicMirror #Vuln
-
🚨 CVE-2026-42281: CRITICAL SSRF in MagicMirror² (<2.36.0)! /cors endpoint lets unauthenticated attackers scan internal networks & exfiltrate environment secrets. Upgrade to 2.36.0+ now! https://radar.offseq.com/threat/cve-2026-42281-cwe-918-server-side-request-forgery-3c9e7191 #OffSeq #SSRF #MagicMirror #Vuln
-
🔴 CVE-2026-8181: Burst Statistics WP plugin (v3.4.0 – 3.4.1.1) suffers CRITICAL auth bypass. Attackers can impersonate admins using any password — immediate removal advised until a fix is released. Details: https://radar.offseq.com/threat/cve-2026-8181-cwe-287-improper-authentication-in-b-c577a44d #OffSeq #WordPress #Vuln
-
🔴 CVE-2026-8181: Burst Statistics WP plugin (v3.4.0 – 3.4.1.1) suffers CRITICAL auth bypass. Attackers can impersonate admins using any password — immediate removal advised until a fix is released. Details: https://radar.offseq.com/threat/cve-2026-8181-cwe-287-improper-authentication-in-b-c577a44d #OffSeq #WordPress #Vuln
-
🔴 CVE-2026-8181: Burst Statistics WP plugin (v3.4.0 – 3.4.1.1) suffers CRITICAL auth bypass. Attackers can impersonate admins using any password — immediate removal advised until a fix is released. Details: https://radar.offseq.com/threat/cve-2026-8181-cwe-287-improper-authentication-in-b-c577a44d #OffSeq #WordPress #Vuln
-
🔴 CVE-2026-8181: Burst Statistics WP plugin (v3.4.0 – 3.4.1.1) suffers CRITICAL auth bypass. Attackers can impersonate admins using any password — immediate removal advised until a fix is released. Details: https://radar.offseq.com/threat/cve-2026-8181-cwe-287-improper-authentication-in-b-c577a44d #OffSeq #WordPress #Vuln
-
🚨 CRITICAL: CVE-2026-6512 in InfusedWoo Pro (≤5.1.2) lets unauthenticated attackers delete posts, orders, and more on WordPress sites. No patch yet — restrict/disable plugin & monitor vendor advisories. https://radar.offseq.com/threat/cve-2026-6512-cwe-862-missing-authorization-in-inf-277015b0 #OffSeq #WordPress #Infosec #Vuln
-
🚨 CRITICAL: CVE-2026-6512 in InfusedWoo Pro (≤5.1.2) lets unauthenticated attackers delete posts, orders, and more on WordPress sites. No patch yet — restrict/disable plugin & monitor vendor advisories. https://radar.offseq.com/threat/cve-2026-6512-cwe-862-missing-authorization-in-inf-277015b0 #OffSeq #WordPress #Infosec #Vuln
-
🚨 CRITICAL: CVE-2026-6512 in InfusedWoo Pro (≤5.1.2) lets unauthenticated attackers delete posts, orders, and more on WordPress sites. No patch yet — restrict/disable plugin & monitor vendor advisories. https://radar.offseq.com/threat/cve-2026-6512-cwe-862-missing-authorization-in-inf-277015b0 #OffSeq #WordPress #Infosec #Vuln
-
🚨 CRITICAL: CVE-2026-6512 in InfusedWoo Pro (≤5.1.2) lets unauthenticated attackers delete posts, orders, and more on WordPress sites. No patch yet — restrict/disable plugin & monitor vendor advisories. https://radar.offseq.com/threat/cve-2026-6512-cwe-862-missing-authorization-in-inf-277015b0 #OffSeq #WordPress #Infosec #Vuln
-
🚨 CVE-2026-6510 (CRITICAL, CVSS 9.8) in InfusedWoo Pro ≤5.1.2: Missing authorization in iwar_save_recipe() lets attackers escalate privileges & gain admin access via crafted URLs. No patch yet — restrict/disable plugin. https://radar.offseq.com/threat/cve-2026-6510-cwe-862-missing-authorization-in-inf-3dc63846 #OffSeq #WordPress #Vuln
-
🚨 CVE-2026-6510 (CRITICAL, CVSS 9.8) in InfusedWoo Pro ≤5.1.2: Missing authorization in iwar_save_recipe() lets attackers escalate privileges & gain admin access via crafted URLs. No patch yet — restrict/disable plugin. https://radar.offseq.com/threat/cve-2026-6510-cwe-862-missing-authorization-in-inf-3dc63846 #OffSeq #WordPress #Vuln
-
🚨 CVE-2026-6510 (CRITICAL, CVSS 9.8) in InfusedWoo Pro ≤5.1.2: Missing authorization in iwar_save_recipe() lets attackers escalate privileges & gain admin access via crafted URLs. No patch yet — restrict/disable plugin. https://radar.offseq.com/threat/cve-2026-6510-cwe-862-missing-authorization-in-inf-3dc63846 #OffSeq #WordPress #Vuln
-
🚨 CVE-2026-6510 (CRITICAL, CVSS 9.8) in InfusedWoo Pro ≤5.1.2: Missing authorization in iwar_save_recipe() lets attackers escalate privileges & gain admin access via crafted URLs. No patch yet — restrict/disable plugin. https://radar.offseq.com/threat/cve-2026-6510-cwe-862-missing-authorization-in-inf-3dc63846 #OffSeq #WordPress #Vuln
-
🚨 CVE-2026-6510: InfusedWoo Pro ≤5.1.2 has a CRITICAL vuln (CVSS 9.8). Missing auth checks in iwar_save_recipe() lets attackers bypass auth & escalate to admin. No patch yet — disable plugin or restrict access now! https://radar.offseq.com/threat/cve-2026-6510-cwe-862-missing-authorization-in-inf-3dc63846 #OffSeq #WordPress #Vuln #CVE20266510
-
🚨 CVE-2026-6510: InfusedWoo Pro ≤5.1.2 has a CRITICAL vuln (CVSS 9.8). Missing auth checks in iwar_save_recipe() lets attackers bypass auth & escalate to admin. No patch yet — disable plugin or restrict access now! https://radar.offseq.com/threat/cve-2026-6510-cwe-862-missing-authorization-in-inf-3dc63846 #OffSeq #WordPress #Vuln #CVE20266510
-
🚨 CVE-2026-6510: InfusedWoo Pro ≤5.1.2 has a CRITICAL vuln (CVSS 9.8). Missing auth checks in iwar_save_recipe() lets attackers bypass auth & escalate to admin. No patch yet — disable plugin or restrict access now! https://radar.offseq.com/threat/cve-2026-6510-cwe-862-missing-authorization-in-inf-3dc63846 #OffSeq #WordPress #Vuln #CVE20266510
-
🚨 CVE-2026-6510: InfusedWoo Pro ≤5.1.2 has a CRITICAL vuln (CVSS 9.8). Missing auth checks in iwar_save_recipe() lets attackers bypass auth & escalate to admin. No patch yet — disable plugin or restrict access now! https://radar.offseq.com/threat/cve-2026-6510-cwe-862-missing-authorization-in-inf-3dc63846 #OffSeq #WordPress #Vuln #CVE20266510
-
⚠️ CRITICAL: OPNsense core < 26.1.7 vulnerable to argument injection (CVE-2026-44193). Remote code execution possible via XMLRPC method. Update to 26.1.7+ now! https://radar.offseq.com/threat/cve-2026-44193-cwe-88-improper-neutralization-of-a-d4d4bbb8 #OffSeq #OPNsense #Vuln #RCE
-
⚠️ CRITICAL: OPNsense core < 26.1.7 vulnerable to argument injection (CVE-2026-44193). Remote code execution possible via XMLRPC method. Update to 26.1.7+ now! https://radar.offseq.com/threat/cve-2026-44193-cwe-88-improper-neutralization-of-a-d4d4bbb8 #OffSeq #OPNsense #Vuln #RCE
-
⚠️ CRITICAL: OPNsense core < 26.1.7 vulnerable to argument injection (CVE-2026-44193). Remote code execution possible via XMLRPC method. Update to 26.1.7+ now! https://radar.offseq.com/threat/cve-2026-44193-cwe-88-improper-neutralization-of-a-d4d4bbb8 #OffSeq #OPNsense #Vuln #RCE
-
⚠️ CRITICAL: OPNsense core < 26.1.7 vulnerable to argument injection (CVE-2026-44193). Remote code execution possible via XMLRPC method. Update to 26.1.7+ now! https://radar.offseq.com/threat/cve-2026-44193-cwe-88-improper-neutralization-of-a-d4d4bbb8 #OffSeq #OPNsense #Vuln #RCE
-
🚨 CVE-2026-44194 (CVSS 9.1): OPNsense core <26.1.8 is vulnerable to OS command injection via sync_user.php. Authenticated users with user-management rights can gain root. Update to 26.1.8 ASAP. https://radar.offseq.com/threat/cve-2026-44194-cwe-78-improper-neutralization-of-s-a7008329 #OffSeq #OPNsense #Vuln #BlueTeam
-
🚨 CVE-2026-44194 (CVSS 9.1): OPNsense core <26.1.8 is vulnerable to OS command injection via sync_user.php. Authenticated users with user-management rights can gain root. Update to 26.1.8 ASAP. https://radar.offseq.com/threat/cve-2026-44194-cwe-78-improper-neutralization-of-s-a7008329 #OffSeq #OPNsense #Vuln #BlueTeam
-
🚨 CVE-2026-44194 (CVSS 9.1): OPNsense core <26.1.8 is vulnerable to OS command injection via sync_user.php. Authenticated users with user-management rights can gain root. Update to 26.1.8 ASAP. https://radar.offseq.com/threat/cve-2026-44194-cwe-78-improper-neutralization-of-s-a7008329 #OffSeq #OPNsense #Vuln #BlueTeam
-
🚨 CVE-2026-44194 (CVSS 9.1): OPNsense core <26.1.8 is vulnerable to OS command injection via sync_user.php. Authenticated users with user-management rights can gain root. Update to 26.1.8 ASAP. https://radar.offseq.com/threat/cve-2026-44194-cwe-78-improper-neutralization-of-s-a7008329 #OffSeq #OPNsense #Vuln #BlueTeam
-
🚨 CRITICAL: OPNsense core < 26.1.8 has CVE-2026-45158 — command injection in DHCP config allows root RCE. Upgrade to 26.1.8+ now to prevent full system compromise. Details: https://radar.offseq.com/threat/cve-2026-45158-cwe-88-improper-neutralization-of-a-59c85f26 #OffSeq #OPNsense #Vuln #Cybersecurity
-
🚨 CRITICAL: OPNsense core < 26.1.8 has CVE-2026-45158 — command injection in DHCP config allows root RCE. Upgrade to 26.1.8+ now to prevent full system compromise. Details: https://radar.offseq.com/threat/cve-2026-45158-cwe-88-improper-neutralization-of-a-59c85f26 #OffSeq #OPNsense #Vuln #Cybersecurity
-
🚨 CRITICAL: OPNsense core < 26.1.8 has CVE-2026-45158 — command injection in DHCP config allows root RCE. Upgrade to 26.1.8+ now to prevent full system compromise. Details: https://radar.offseq.com/threat/cve-2026-45158-cwe-88-improper-neutralization-of-a-59c85f26 #OffSeq #OPNsense #Vuln #Cybersecurity
-
🚨 CRITICAL: OPNsense core < 26.1.8 has CVE-2026-45158 — command injection in DHCP config allows root RCE. Upgrade to 26.1.8+ now to prevent full system compromise. Details: https://radar.offseq.com/threat/cve-2026-45158-cwe-88-improper-neutralization-of-a-59c85f26 #OffSeq #OPNsense #Vuln #Cybersecurity
-
🚨 CRITICAL vuln: ERPNext <16.9.1 (CVE-2026-44442) lets users with limited rights modify data due to missing authorization. Update ASAP to 16.9.1+ to fix. No known exploits yet. Details: https://radar.offseq.com/threat/cve-2026-44442-cwe-862-missing-authorization-in-fr-ebe7ec52 #OffSeq #ERPNext #Vuln #AppSec
-
🚨 CRITICAL vuln: ERPNext <16.9.1 (CVE-2026-44442) lets users with limited rights modify data due to missing authorization. Update ASAP to 16.9.1+ to fix. No known exploits yet. Details: https://radar.offseq.com/threat/cve-2026-44442-cwe-862-missing-authorization-in-fr-ebe7ec52 #OffSeq #ERPNext #Vuln #AppSec
-
🚨 CRITICAL vuln: ERPNext <16.9.1 (CVE-2026-44442) lets users with limited rights modify data due to missing authorization. Update ASAP to 16.9.1+ to fix. No known exploits yet. Details: https://radar.offseq.com/threat/cve-2026-44442-cwe-862-missing-authorization-in-fr-ebe7ec52 #OffSeq #ERPNext #Vuln #AppSec
-
🚨 CRITICAL vuln: ERPNext <16.9.1 (CVE-2026-44442) lets users with limited rights modify data due to missing authorization. Update ASAP to 16.9.1+ to fix. No known exploits yet. Details: https://radar.offseq.com/threat/cve-2026-44442-cwe-862-missing-authorization-in-fr-ebe7ec52 #OffSeq #ERPNext #Vuln #AppSec
-
🚨 CVE-2026-42193 (CVSS 9.1, CRITICAL): useplunk plunk < 0.9.0 fails to verify SNS signatures at /webhooks/sns, allowing spoofed webhook attacks. Patched in 0.9.0 — verify your version & check vendor advisory. https://radar.offseq.com/threat/cve-2026-42193-cwe-347-improper-verification-of-cr-fc4beea9 #OffSeq #Vuln #EmailSecurity #CVE202642193
-
🚨 CVE-2026-42193 (CVSS 9.1, CRITICAL): useplunk plunk < 0.9.0 fails to verify SNS signatures at /webhooks/sns, allowing spoofed webhook attacks. Patched in 0.9.0 — verify your version & check vendor advisory. https://radar.offseq.com/threat/cve-2026-42193-cwe-347-improper-verification-of-cr-fc4beea9 #OffSeq #Vuln #EmailSecurity #CVE202642193
-
🚨 CVE-2026-42193 (CVSS 9.1, CRITICAL): useplunk plunk < 0.9.0 fails to verify SNS signatures at /webhooks/sns, allowing spoofed webhook attacks. Patched in 0.9.0 — verify your version & check vendor advisory. https://radar.offseq.com/threat/cve-2026-42193-cwe-347-improper-verification-of-cr-fc4beea9 #OffSeq #Vuln #EmailSecurity #CVE202642193
-
🚨 CVE-2026-42193 (CVSS 9.1, CRITICAL): useplunk plunk < 0.9.0 fails to verify SNS signatures at /webhooks/sns, allowing spoofed webhook attacks. Patched in 0.9.0 — verify your version & check vendor advisory. https://radar.offseq.com/threat/cve-2026-42193-cwe-347-improper-verification-of-cr-fc4beea9 #OffSeq #Vuln #EmailSecurity #CVE202642193
-
Rien ne dit “bon week-end” comme trois CVE cPanel annoncées un vendredi, avec les détails techniques livrés pile au moment du patch -->c’est-à-dire à 18h, l’heure sacrée de l’apéro.
Santé aux admins qui vont lancer /scripts/upcp avec une main sur le clavier et l’autre sur le verre.
👇
" To help protect customers prior to patch availability, technical details about vulnerabilities will be released alongside the patches. Full technical details will be published on our support page at the same time the patch is released. The CVE IDs are CVE-2026-29201, CVE-2026-29202, and CVE-2026-29203.Patch & Affected Versions
The patch will be available on May 08 at 12:00pm EST and will be distributed through the standard cPanel automatic update process and through the manual update process. We strongly recommend performing a manual update with /scripts/upcp once the patch is made available. "
👇
https://www.reddit.com/r/cpanel/comments/1t6wf5n/cpanel_whm_security_update_cve202629201/ -
🚨 CVE-2026-42826 (CRITICAL, CVSS 10.0) in Azure DevOps exposes sensitive data to unauthorized actors remotely. Microsoft has released a fix — ensure your environment is fully updated. More info: https://radar.offseq.com/threat/cve-2026-42826-cwe-200-exposure-of-sensitive-infor-a9bb0e45 #OffSeq #AzureDevOps #Vuln #InfoSec
-
🚨 CVE-2026-42826 (CRITICAL, CVSS 10.0) in Azure DevOps exposes sensitive data to unauthorized actors remotely. Microsoft has released a fix — ensure your environment is fully updated. More info: https://radar.offseq.com/threat/cve-2026-42826-cwe-200-exposure-of-sensitive-infor-a9bb0e45 #OffSeq #AzureDevOps #Vuln #InfoSec
-
🚨 CVE-2026-42826 (CRITICAL, CVSS 10.0) in Azure DevOps exposes sensitive data to unauthorized actors remotely. Microsoft has released a fix — ensure your environment is fully updated. More info: https://radar.offseq.com/threat/cve-2026-42826-cwe-200-exposure-of-sensitive-infor-a9bb0e45 #OffSeq #AzureDevOps #Vuln #InfoSec
-
🚨 CVE-2026-42826 (CRITICAL, CVSS 10.0) in Azure DevOps exposes sensitive data to unauthorized actors remotely. Microsoft has released a fix — ensure your environment is fully updated. More info: https://radar.offseq.com/threat/cve-2026-42826-cwe-200-exposure-of-sensitive-infor-a9bb0e45 #OffSeq #AzureDevOps #Vuln #InfoSec