Discussion
Loading...

#Tag

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Clemens boosted
Pyrzout :vm:
Pyrzout :vm:
@jos1264@social.skynetcloud.site  ·  activity timestamp 3 days ago

n8n Users Urged to Patch CVSS 10.0 Full System Takeover Vulnerability https://hackread.com/n8n-users-patch-full-system-takeover-vulnerability/ #ApplicationSecurity #Cybersecurity #Vulnerability #Security #database #Upwind #n8n

  • Copy link
  • Flag this post
  • Block
Pyrzout :vm:
Pyrzout :vm:
@jos1264@social.skynetcloud.site  ·  activity timestamp 3 days ago

n8n Users Urged to Patch CVSS 10.0 Full System Takeover Vulnerability https://hackread.com/n8n-users-patch-full-system-takeover-vulnerability/ #ApplicationSecurity #Cybersecurity #Vulnerability #Security #database #Upwind #n8n

  • Copy link
  • Flag this post
  • Block
C_ristina boosted
Nightfighter 🛡️
Nightfighter 🛡️
@Optimus@social.tchncs.de  ·  activity timestamp last week

Einbruch bei der #ESA.

#hacking #vulnerability

https://www.bleepingcomputer.com/news/security/european-space-agency-confirms-breach-of-external-servers/

BleepingComputer

European Space Agency confirms breach of "external servers"

The European Space Agency (ESA) confirmed that attackers recently breached servers outside its corporate network, which contained what it described as "unclassified" information on collaborative engineering activities.
  • Copy link
  • Flag this post
  • Block
Alexandre Dulaunoy
Alexandre Dulaunoy
@adulau@infosec.exchange  ·  activity timestamp 6 days ago

"WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce authentication for Bluetooth connections. An attacker within range can pair with the device and issue movement commands, override speed restrictions, and manipulate configuration profiles without any credentials or user interaction."

No comments...

🔗 https://vulnerability.circl.lu/vuln/cve-2025-14346

#wheelchair #cybersecurity #vulnerability #hybridthreats

cvelistv5 - cve-2025-14346Create a notification for this product.Create a notification for this product.

Vulnerability-Lookup - Fast vulnerability lookup correlation from different sources.

Summary WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce authentication for Bluetooth connections. An attacker within
range can pair with the device and issue movement commands, override speed restrictions, and manipulate configuration profiles without any
credentials or user interaction.
i
Summary WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce authentication for Bluetooth connections. An attacker within range can pair with the device and issue movement commands, override speed restrictions, and manipulate configuration profiles without any credentials or user interaction. i
Summary WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce authentication for Bluetooth connections. An attacker within range can pair with the device and issue movement commands, override speed restrictions, and manipulate configuration profiles without any credentials or user interaction. i
1
  • Copy link
  • Flag this post
  • Block

Kakapo Social

Kakapo Social: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.1-beta.22 no JS en
Automatic federation enabled
Log in
  • Explore
  • About
  • Members
  • Code of Conduct