Activity
Latest CVE events and analysis as they emerge
CVE-2025-68613 11 Mar 2026, 00:00
n8nAdded to CISA KEV catalog
- Vulnerability name
- n8n Improper Control of Dynamically-Managed Code Resources Vulnerability
- Product
- n8n n8n
CVE-2025-68613 is a Remote Code Execution (RCE) vulnerability found in n8n, an open-source workflow automation platform. The vulnerability exists in versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0. It stems from the workflow expression evaluation system, where expressions supplied by authenticated users during workflow configuration might be evaluated in an execution context lacking sufficient isolation from the underlying runtime. An authenticated attacker could exploit this vulnerability to execute arbitrary code with the privileges of the n8n process. Successful exploitation could lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. The issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0.
critical 9.9
Hype score
6
CVE-2026-1603 09 Mar 2026, 00:00
web applicationServerZero-dayIvanti Endpoint ManagerAdded to CISA KEV catalog
- Vulnerability name
- Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability
- Product
- Ivanti Endpoint Manager (EPM)
CVE-2026-1603 is an authentication bypass vulnerability found in Ivanti Endpoint Manager (EPM) that allows a remote, unauthenticated attacker to extract specific stored credential data. This flaw arises from improper authentication mechanisms within the software, specifically through an alternate path or channel that fails to adequately enforce authentication requirements. Attackers can exploit this vulnerability to bypass standard authentication controls and gain unauthorized access to sensitive credential information stored within the Ivanti Endpoint Manager system. The vulnerability affects Ivanti Endpoint Manager versions prior to 2024 SU5.
high 8.6
Hype score
0
CVE-2021-22054 09 Mar 2026, 00:00
UEMweb applicationVMware Workspace ONE UEM consoleVMware Workspace ONEAdded to CISA KEV catalog
- Vulnerability name
- Omnissa Workspace ONE Server-Side Request Forgery
- Product
- Omnissa Workspace One UEM
CVE-2021-22054 is a Server-Side Request Forgery (SSRF) vulnerability found in various versions of the VMware Workspace ONE UEM console. This flaw allows a malicious actor with network access to the UEM console to send unauthenticated requests. Exploitation of this vulnerability could enable an attacker to gain access to sensitive information. Affected versions include VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.11.0.40, 21.2.0 prior to 21.2.0.27, and 21.5.0 prior to 21.5.0.37.
high 7.5
Hype score
0
CVE-2025-26399 09 Mar 2026, 00:00
Supply chainweb applicationSolarWinds Web Help DeskAdded to CISA KEV catalog
- Vulnerability name
- SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
- Product
- SolarWinds Web Help Desk
CVE-2025-26399 is a remote code execution vulnerability that affects SolarWinds Web Help Desk (WHD). The vulnerability stems from unsafe deserialization handling in the AjaxProxy component. Successful exploitation allows an unauthenticated attacker to run arbitrary commands on the host machine. The vulnerability is a patch bypass of CVE-2024-28988, which was itself a bypass of CVE-2024-28986. SolarWinds has released a hotfix to address the vulnerability.
critical 9.8
Hype score
1
CVE-2023-43000 05 Mar 2026, 00:00
Added to CISA KEV catalog
- Vulnerability name
- Apple Multiple products Use-After-Free Vulnerability
- Product
- Apple Multiple Products
CVE-2023-43000 is a use-after-free vulnerability stemming from improper memory management within WebKitGTK and Apple's WebKit. This flaw can be triggered by processing maliciously crafted web content, potentially leading to memory corruption. The vulnerability affects various Apple products, including macOS Ventura, iOS, iPadOS, and Safari, and has been addressed in macOS Ventura 13.5, iOS 16.6, iPadOS 16.6, and Safari 16.6. It has been listed in CISA's Known Exploited Vulnerabilities Catalog and was identified as part of the "Coruna" iOS exploit kit, which leveraged several WebKit vulnerabilities.
high 8.8
Hype score
0