##
Updated at UTC 2025-07-18T23:00:50.340070
CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
---|---|---|---|---|---|---|---|
CVE-2025-54309 | 9.0 | 0.00% | 2 | 0 | 2025-07-18T19:15:25.353000 | CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is | |
CVE-2025-32463 | 9.4 | 0.25% | 1 | 40 | 2025-07-18T18:31:28 | Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswi | |
CVE-2025-7783 | 0 | 0.00% | 2 | 1 | 2025-07-18T17:15:44.747000 | Use of Insufficiently Random Values vulnerability in form-data allows HTTP Param | |
CVE-2025-53762 | 8.7 | 0.00% | 4 | 0 | 2025-07-18T17:15:44.400000 | Permissive list of allowed inputs in Microsoft Purview allows an authorized atta | |
CVE-2025-49747 | 9.9 | 0.00% | 2 | 0 | 2025-07-18T17:15:43.503000 | Missing authorization in Azure Machine Learning allows an authorized attacker to | |
CVE-2025-49746 | 9.9 | 0.00% | 4 | 0 | 2025-07-18T17:15:43.300000 | Improper authorization in Azure Machine Learning allows an authorized attacker t | |
CVE-2025-47995 | 6.5 | 0.00% | 2 | 0 | 2025-07-18T17:15:33.497000 | Weak authentication in Azure Machine Learning allows an authorized attacker to e | |
CVE-2025-47158 | 9.0 | 0.00% | 4 | 0 | 2025-07-18T17:15:31.363000 | Authentication bypass by assumed-immutable data in Azure DevOps allows an unauth | |
CVE-2025-37104 | 7.1 | 0.02% | 1 | 0 | 2025-07-18T15:15:26.397000 | A security vulnerability has been identified in HPE Telco Service Orchestrator s | |
CVE-2025-6023 | 7.6 | 0.01% | 2 | 0 | 2025-07-18T09:30:42 | An open redirect vulnerability has been identified in Grafana OSS that can be ex | |
CVE-2025-6197 | 4.2 | 0.01% | 2 | 0 | 2025-07-18T09:30:42 | An open redirect vulnerability has been identified in Grafana OSS organization s | |
CVE-2025-7444 | 9.8 | 0.14% | 1 | 0 | 2025-07-18T09:30:42 | The LoginPress Pro plugin for WordPress is vulnerable to authentication bypass i | |
CVE-2025-23266 | 9.1 | 0.02% | 9 | 0 | 2025-07-17T21:32:27 | NVIDIA Container Toolkit for all platforms contains a vulnerability in some hook | |
CVE-2025-4657 | 6.7 | 0.01% | 1 | 0 | 2025-07-17T21:32:27 | A buffer overflow vulnerability was reported in the Lenovo Protection Driver, pr | |
CVE-2025-3753 | 7.8 | 0.02% | 1 | 0 | 2025-07-17T21:32:27 | A code execution vulnerability has been identified in the Robot Operating System | |
CVE-2025-7433 | 8.8 | 0.01% | 1 | 0 | 2025-07-17T21:32:27 | A local privilege escalation vulnerability in Sophos Intercept X for Windows wit | |
CVE-2025-23269 | 4.7 | 0.01% | 1 | 0 | 2025-07-17T21:32:27 | NVIDIA Jetson Linux contains a vulnerability in the kernel where an attacker may | |
CVE-2024-41921 | 7.8 | 0.02% | 1 | 0 | 2025-07-17T21:32:22 | A code injection vulnerability has been discovered in the Robot Operating System | |
CVE-2024-41148 | 7.8 | 0.02% | 1 | 0 | 2025-07-17T21:32:22 | A code injection vulnerability has been discovered in the Robot Operating System | |
CVE-2025-7472 | 7.6 | 0.01% | 1 | 0 | 2025-07-17T21:32:14 | A local privilege escalation vulnerability in the Intercept X for Windows instal | |
CVE-2025-25257 | 9.8 | 0.13% | 17 | 8 | 2025-07-17T21:15:50.197000 | An improper neutralization of special elements used in an SQL command ('SQL Inje | |
CVE-2025-23267 | 8.5 | 0.04% | 3 | 0 | 2025-07-17T21:15:50.197000 | NVIDIA Container Toolkit for all platforms contains a vulnerability in the updat | |
CVE-2024-39289 | 7.8 | 0.02% | 1 | 0 | 2025-07-17T21:15:50.197000 | A code execution vulnerability has been discovered in the Robot Operating System | |
CVE-2024-13972 | 8.8 | 0.01% | 1 | 0 | 2025-07-17T21:15:50.197000 | A vulnerability related to registry permissions in the Intercept X for Windows u | |
CVE-2025-54068 | 0 | 0.25% | 1 | 0 | 2025-07-17T21:15:50.197000 | Livewire is a full-stack framework for Laravel. In Livewire v3 up to and includi | |
CVE-2025-20284 | 6.5 | 0.07% | 1 | 0 | 2025-07-17T21:15:50.197000 | A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an | |
CVE-2025-20285 | 4.1 | 0.03% | 1 | 0 | 2025-07-17T21:15:50.197000 | A vulnerability in the IP Access Restriction feature of Cisco ISE and Cisco ISE- | |
CVE-2025-40777 | 7.5 | 0.02% | 1 | 0 | 2025-07-17T21:15:50.197000 | If a `named` caching resolver is configured with `serve-stale-enable` `yes`, and | |
CVE-2025-23270 | 7.1 | 0.02% | 1 | 0 | 2025-07-17T21:15:50.197000 | NVIDIA Jetson Linux contains a vulnerability in UEFI Management mode, where an u | |
CVE-2025-20337 | 10.0 | 0.16% | 12 | 0 | 2025-07-17T20:42:07.780000 | A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an | |
CVE-2025-23263 | 7.6 | 0.02% | 1 | 0 | 2025-07-17T18:31:24 | NVIDIA DOCA-Host and Mellanox OFED contain a vulnerability in the VGT+ feature, | |
CVE-2025-20274 | 6.3 | 0.20% | 1 | 0 | 2025-07-16T18:32:46 | A vulnerability in the web-based management interface of Cisco Unified Intellige | |
CVE-2025-20288 | 5.8 | 0.02% | 1 | 0 | 2025-07-16T18:32:46 | A vulnerability in the web-based management interface of Cisco Unified Intellige | |
CVE-2025-20283 | 6.5 | 0.07% | 1 | 0 | 2025-07-16T18:32:38 | A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an | |
CVE-2025-20272 | 4.3 | 0.03% | 1 | 0 | 2025-07-16T18:32:38 | A vulnerability in a subset of REST APIs of Cisco Prime Infrastructure and Cisco | |
CVE-2025-49706 | 6.3 | 0.03% | 1 | 0 | 2025-07-16T17:41:44.517000 | Improper authentication in Microsoft Office SharePoint allows an authorized atta | |
CVE-2025-5994 | None | 0.02% | 1 | 0 | 2025-07-16T15:32:40 | A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been | |
CVE-2025-40776 | 8.6 | 0.01% | 1 | 0 | 2025-07-16T15:32:33 | A `named` caching resolver that is configured to send ECS (EDNS Client Subnet) o | |
CVE-2025-3871 | 5.3 | 0.06% | 1 | 0 | 2025-07-16T15:32:32 | Broken access control in Fortra's GoAnywhere MFT prior to 7.8.1 allows an attack | |
CVE-2025-52689 | 9.8 | 0.08% | 1 | 1 | 2025-07-16T15:32:27 | Successful exploitation of the vulnerability could allow an unauthenticated atta | |
CVE-2025-52690 | 8.1 | 0.06% | 1 | 0 | 2025-07-16T15:15:32.133000 | Successful exploitation of the vulnerability could allow an attacker to execute | |
CVE-2025-34300 | 0 | 2.73% | 1 | 0 | template | 2025-07-16T15:15:26.410000 | A template injection vulnerability exists in Sawtooth Software’s Lighthouse Stud |
CVE-2025-49828 | 0 | 0.34% | 1 | 0 | 2025-07-16T14:59:23.707000 | Conjur provides secrets management and application identity for infrastructure. | |
CVE-2025-6058 | 9.8 | 0.09% | 1 | 2 | 2025-07-16T14:57:37.827000 | The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to | |
CVE-2025-7657 | 8.8 | 0.18% | 1 | 0 | 2025-07-16T14:27:43.883000 | Use after free in WebRTC in Google Chrome prior to 138.0.7204.157 allowed a remo | |
CVE-2025-6043 | 8.1 | 0.21% | 1 | 0 | 2025-07-16T09:31:15 | The Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal plugin fo | |
CVE-2025-24294 | 5.3 | 0.02% | 1 | 0 | 2025-07-15T22:56:20 | A denial of service vulnerability has been discovered in the resolv gem bundled | |
CVE-2025-52377 | 5.4 | 0.82% | 1 | 0 | 2025-07-15T21:32:49 | Command injection vulnerability in Nexxt Solutions NCM-X1800 Mesh Router version | |
CVE-2025-6558 | 8.8 | 0.14% | 11 | 1 | 2025-07-15T21:32:48 | Insufficient validation of untrusted input in ANGLE and GPU in Google Chrome pri | |
CVE-2025-7656 | 8.8 | 0.10% | 1 | 0 | 2025-07-15T21:32:47 | Integer overflow in V8 in Google Chrome prior to 138.0.7204.157 allowed a remote | |
CVE-2025-52379 | 5.4 | 0.18% | 1 | 0 | 2025-07-15T21:32:47 | Nexxt Solutions NCM-X1800 Mesh Router firmware UV1.2.7 and below contains an aut | |
CVE-2025-41237 | 9.4 | 0.02% | 4 | 0 | 2025-07-15T21:31:43 | VMware ESXi, Workstation, and Fusion contain an integer-underflow in VMCI (Virtu | |
CVE-2025-41236 | 9.4 | 0.02% | 4 | 0 | 2025-07-15T21:31:43 | VMware ESXi, Workstation, and Fusion contain an integer-overflow vulnerability i | |
CVE-2025-41238 | 9.4 | 0.02% | 2 | 0 | 2025-07-15T21:31:43 | VMware ESXi, Workstation, and Fusion contain a heap-overflow vulnerability in th | |
CVE-2025-53020 | 7.5 | 0.05% | 2 | 0 | 2025-07-15T21:31:27 | Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Ser | |
CVE-2025-53825 | 9.4 | 0.24% | 1 | 0 | 2025-07-15T20:15:50.550000 | Dokploy is a free, self-hostable Platform as a Service (PaaS). Prior to version | |
CVE-2025-41239 | 7.1 | 0.01% | 2 | 0 | 2025-07-15T20:07:28.023000 | VMware ESXi, Workstation, Fusion, and VMware Tools contains an information discl | |
CVE-2025-6971 | 7.8 | 0.01% | 1 | 0 | 2025-07-15T20:07:28.023000 | Use After Free vulnerability exists in the CATPRODUCT file reading procedure in | |
CVE-2025-52378 | 5.4 | 0.03% | 1 | 0 | 2025-07-15T20:07:28.023000 | Cross-Site Scripting (XSS) vulnerability in Nexxt Solutions NCM-X1800 Mesh Route | |
CVE-2025-53890 | 9.8 | 0.26% | 1 | 0 | 2025-07-15T15:38:13 | #### Summary An unsafe JavaScript evaluation vulnerability in pyLoad’s CAPTCHA p | |
CVE-2025-6965 | None | 0.04% | 3 | 0 | 2025-07-15T15:31:07 | There exists a vulnerability in SQLite versions before 3.50.2 where the number o | |
CVE-2025-6973 | 7.8 | 0.01% | 1 | 0 | 2025-07-15T15:31:07 | Use After Free vulnerability exists in the JT file reading procedure in SOLIDWOR | |
CVE-2025-7042 | 7.8 | 0.01% | 1 | 0 | 2025-07-15T15:31:07 | Use After Free vulnerability exists in the IPT file reading procedure in SOLIDWO | |
CVE-2025-6974 | 7.8 | 0.01% | 1 | 0 | 2025-07-15T15:31:07 | Use of Uninitialized Variable vulnerability exists in the JT file reading proced | |
CVE-2025-6972 | 7.8 | 0.01% | 1 | 0 | 2025-07-15T15:31:07 | Use After Free vulnerability exists in the CATPRODUCT file reading procedure in | |
CVE-2025-0831 | 7.8 | 0.01% | 1 | 0 | 2025-07-15T15:31:07 | Out-Of-Bounds Read vulnerability exists in the JT file reading procedure in SOLI | |
CVE-2025-52376 | 9.8 | 0.09% | 1 | 0 | 2025-07-15T15:31:06 | An authentication bypass vulnerability in the /web/um_open_telnet.cgi endpoint i | |
CVE-2025-50121 | 0 | 0.92% | 1 | 0 | 2025-07-15T13:14:49.980000 | A CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS | |
CVE-2025-30402 | 8.1 | 0.05% | 1 | 0 | 2025-07-15T13:14:49.980000 | A heap-buffer-overflow vulnerability in the loading of ExecuTorch methods can ca | |
CVE-2025-7574 | 9.8 | 0.10% | 1 | 0 | 2025-07-15T13:14:24.053000 | A vulnerability, which was classified as critical, was found in LB-LINK BL-AC190 | |
CVE-2025-7012 | 0 | 0.02% | 1 | 0 | 2025-07-15T13:14:24.053000 | An issue in Cato Networks' CatoClient for Linux, before version 5.5, allows a lo | |
CVE-2025-6265 | 7.2 | 0.08% | 1 | 0 | 2025-07-15T03:30:37 | A path traversal vulnerability in the file_upload-cgi CGI program of Zyxel NWA50 | |
CVE-2025-53833 | 10.0 | 11.92% | 1 | 1 | template | 2025-07-15T00:34:45 | ### Impact Attackers could: 1. Execute arbitrary commands on the server 2. Acces |
CVE-2025-5777 | 7.5 | 19.05% | 13 | 14 | template | 2025-07-14T21:09:06.773000 | Insufficient input validation leading to memory overread when the NetScaler is c |
CVE-2025-47812 | 10.0 | 83.38% | 10 | 8 | template | 2025-07-14T18:31:44 | In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0 |
CVE-2024-26293 | None | 0.04% | 1 | 0 | 2025-07-14T12:30:28 | The Avid Nexis Agent uses a vulnerable gSOAP version. An undocumented vulnerabil | |
CVE-2024-58258 | 7.2 | 0.99% | 1 | 0 | 2025-07-14T00:31:13 | SugarCRM before 13.0.4 and 14.x before 14.0.1 allows SSRF in the API module beca | |
CVE-2025-38001 | None | 0.02% | 2 | 1 | 2025-07-13T21:30:32 | In the Linux kernel, the following vulnerability has been resolved: net_sched: | |
CVE-2025-30403 | 8.1 | 0.04% | 1 | 0 | 2025-07-11T21:31:11 | A heap-buffer-overflow vulnerability is possible in mvfst via a specially crafte | |
CVE-2025-6691 | 8.1 | 0.34% | 1 | 0 | 2025-07-11T21:31:04 | The SureForms – Drag and Drop Form Builder for WordPress plugin for WordPress is | |
CVE-2025-6019 | 7.0 | 0.02% | 1 | 4 | 2025-07-10T15:32:17 | A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Gener | |
CVE-2025-48384 | 8.0 | 0.02% | 1 | 18 | 2025-07-10T13:18:53.830000 | Git is a fast, scalable, distributed revision control system with an unusually r | |
CVE-2025-32462 | 2.8 | 0.16% | 1 | 9 | 2025-07-09T18:30:40 | Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that i | |
CVE-2025-48976 | None | 0.06% | 1 | 2 | 2025-07-09T18:15:39 | Allocation of resources for multipart headers with insufficient limits enabled a | |
CVE-2025-6514 | 9.7 | 0.05% | 4 | 1 | 2025-07-09T18:08:46 | mcp-remote is exposed to OS command injection when connecting to untrusted MCP s | |
CVE-2019-5418 | 7.5 | 94.31% | 1 | 12 | template | 2025-07-09T15:23:23.357000 | There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6 |
CVE-2025-49704 | 8.8 | 0.19% | 1 | 0 | 2025-07-08T18:31:58 | Improper control of generation of code ('code injection') in Microsoft Office Sh | |
CVE-2025-47981 | 9.8 | 0.10% | 1 | 0 | 2025-07-08T18:31:51 | Heap-based buffer overflow in Windows SPNEGO Extended Negotiation allows an unau | |
CVE-2025-3648 | None | 0.04% | 2 | 0 | 2025-07-08T18:31:49 | A vulnerability has been identified in the Now Platform that could result in dat | |
CVE-2025-5333 | 0 | 0.43% | 1 | 0 | 2025-07-08T16:18:34.923000 | Remote attackers can execute arbitrary code in the context of the vulnerable ser | |
CVE-2025-6543 | 9.8 | 3.54% | 1 | 3 | 2025-07-01T18:30:34 | Memory overflow vulnerability leading to unintended control flow and Denial of S | |
CVE-2025-6554 | 8.1 | 0.52% | 4 | 5 | 2025-07-01T15:32:11 | Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote at | |
CVE-2025-20281 | 9.8 | 0.06% | 3 | 4 | 2025-06-26T21:31:20 | A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an | |
CVE-2025-20282 | 10.0 | 0.14% | 2 | 0 | 2025-06-26T21:31:13 | A vulnerability in an internal API of Cisco ISE and Cisco ISE-PIC could allow an | |
CVE-2023-48795 | 5.9 | 61.27% | 1 | 4 | template | 2025-06-24T17:47:50 | ### Summary Terrapin is a prefix truncation attack targeting the SSH protocol. |
CVE-2025-49132 | 10.0 | 33.56% | 2 | 7 | template | 2025-06-23T20:16:21.633000 | Pterodactyl is a free, open-source game server management panel. Prior to versio |
CVE-2023-4969 | 6.5 | 1.98% | 2 | 0 | 2025-06-20T18:15:22.740000 | A GPU kernel can read sensitive data from another GPU kernel (even from another | |
CVE-2025-6192 | 8.8 | 0.11% | 1 | 0 | 2025-06-18T21:30:30 | Use after free in Metrics in Google Chrome prior to 137.0.7151.119 allowed a rem | |
CVE-2025-2884 | 6.6 | 0.01% | 2 | 0 | 2025-06-13T18:15:21.710000 | TCG TPM2.0 Reference implementation's CryptHmacSign helper function is vulnerabl | |
CVE-2025-49127 | 0 | 0.17% | 1 | 0 | 2025-06-09T16:15:44.833000 | Kafbat UI is a web user interface for managing Apache Kafka clusters. An unsafe | |
CVE-2025-5068 | 8.8 | 0.13% | 1 | 0 | 2025-06-05T14:11:10.430000 | Use after free in Blink in Google Chrome prior to 137.0.7151.68 allowed a remote | |
CVE-2025-2500 | 7.4 | 0.05% | 1 | 0 | 2025-05-30T15:30:39 | A vulnerability exists in the SOAP Web services of the Asset Suite versions lis | |
CVE-2025-48927 | 5.3 | 11.39% | 3 | 0 | 2025-05-28T18:33:28 | The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with | |
CVE-2025-5281 | 5.4 | 0.07% | 1 | 0 | 2025-05-28T15:35:30 | Inappropriate implementation in BFCache in Google Chrome prior to 137.0.7151.55 | |
CVE-2025-4919 | 8.8 | 0.04% | 3 | 0 | 2025-05-28T14:08:29.293000 | An attacker was able to perform an out-of-bounds read or write on a JavaScript o | |
CVE-2025-42999 | 9.1 | 18.14% | 1 | 1 | 2025-05-13T18:31:57 | SAP NetWeaver Visual Composer Metadata Uploader is vulnerable when a privileged | |
CVE-2025-22457 | 9.0 | 35.17% | 3 | 5 | 2025-05-03T01:00:02.097000 | A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, | |
CVE-2025-31324 | 10.0 | 63.77% | 1 | 18 | template | 2025-05-02T15:31:16 | SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper a |
CVE-2025-24016 | 9.9 | 91.65% | 1 | 8 | template | 2025-04-22T16:53:42 | ### Summary An unsafe deserialization vulnerability allows for remote code execu |
CVE-2012-0217 | None | 88.86% | 1 | 0 | 2025-04-11T03:59:22 | The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in | |
CVE-2025-32461 | 10.0 | 0.11% | 1 | 0 | 2025-04-09T04:18:30 | wikiplugin_includetpl in lib/wiki-plugins/wikiplugin_includetpl.php in Tiki befo | |
CVE-2024-4577 | 9.8 | 94.41% | 1 | 66 | template | 2025-03-28T15:12:44.513000 | In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, wh |
CVE-2019-9082 | 8.8 | 94.14% | 1 | 0 | 2025-02-07T18:31:59 | ThinkPHP before 3.2.4, as used in Open Source BMS v1.1.1 and other products, all | |
CVE-2025-0282 | 9.1 | 93.24% | 3 | 11 | 2025-01-28T18:32:27 | A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, | |
CVE-2024-57727 | 7.5 | 94.05% | 1 | 1 | template | 2025-01-16T21:32:03 | SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple p |
CVE-2024-20439 | 9.8 | 88.88% | 2 | 0 | template | 2024-09-13T21:31:22 | A vulnerability in Cisco Smart Licensing Utility could allow an unauthenticated, |
CVE-2024-39385 | 5.5 | 0.06% | 1 | 0 | 2024-09-13T09:31:32 | Premiere Pro versions 24.5, 23.6.8 and earlier are affected by a Use After Free | |
CVE-2024-42009 | 9.3 | 88.04% | 1 | 4 | 2024-09-07T00:32:35 | A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x throug | |
CVE-2024-22122 | 3.0 | 0.35% | 1 | 0 | 2024-08-12T15:30:49 | Zabbix allows to configure SMS notifications. AT command injection occurs on "Za | |
CVE-2024-22120 | 9.1 | 93.88% | 1 | 4 | template | 2024-05-17T12:30:59 | Zabbix server can perform command execution for configured scripts. After comman |
CVE-2024-3721 | 6.3 | 61.78% | 1 | 0 | 2024-04-13T12:30:30 | A vulnerability was found in TBK DVR-4104 and DVR-4216 up to 20240412 and classi | |
CVE-2017-18370 | 8.8 | 75.83% | 2 | 0 | 2024-04-11T21:16:45 | The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline ha | |
CVE-2023-34634 | 9.8 | 26.00% | 1 | 1 | 2024-04-04T06:28:11 | Greenshot 1.2.10 and below allows arbitrary code execution because .NET content | |
CVE-2023-2868 | 9.4 | 90.10% | 1 | 4 | 2024-04-04T05:46:09 | A remote command injection vulnerability exists in the Barracuda Email Security | |
CVE-2025-27212 | 0 | 0.00% | 2 | 0 | N/A | ||
CVE-2024-21969 | 0 | 0.00% | 2 | 0 | N/A | ||
CVE-2025-53816 | 0 | 0.02% | 1 | 0 | N/A | ||
CVE-2025-53906 | 0 | 0.01% | 1 | 0 | N/A | ||
CVE-2025-27210 | 0 | 0.00% | 1 | 2 | N/A | ||
CVE-2025-53895 | 0 | 0.04% | 1 | 0 | N/A | ||
CVE-2024-47065 | 0 | 0.06% | 1 | 0 | N/A |
updated 2025-07-18T19:15:25.353000
2 posts
🚨CrushFTP has an active 0-Day with a CVSS score of 9.0
CVE-2025-54309: CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025.
https://www.crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025
##🚨CrushFTP has an active 0-Day with a CVSS score of 9.0
CVE-2025-54309: CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025.
https://www.crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025
##updated 2025-07-18T18:31:28
1 posts
40 repos
https://github.com/FreeDurok/CVE-2025-32463-PoC
https://github.com/junxian428/CVE-2025-32463
https://github.com/9Insomnie/CVE-2025-32463
https://github.com/CIA911/sudo_patch_CVE-2025-32463
https://github.com/zinzloun/CVE-2025-32463
https://github.com/lowercasenumbers/CVE-2025-32463_sudo_chroot
https://github.com/abrewer251/CVE-2025-32463_Sudo_PoC
https://github.com/san8383/CVE-2025-32463
https://github.com/mirchr/CVE-2025-32463-sudo-chwoot
https://github.com/B1ack4sh/Blackash-CVE-2025-32463
https://github.com/SysMancer/CVE-2025-32463
https://github.com/SpongeBob-369/cve-2025-32463
https://github.com/Chocapikk/CVE-2025-32463-lab
https://github.com/morgenm/sudo-chroot-CVE-2025-32463
https://github.com/Mikivirus0/sudoinjection
https://github.com/krypton-0x00/CVE-2025-32463-Chwoot-POC
https://github.com/pr0v3rbs/CVE-2025-32463_chwoot
https://github.com/MohamedKarrab/CVE-2025-32463
https://github.com/SkylerMC/CVE-2025-32463
https://github.com/dbarquero/cve-2025-32463-lab
https://github.com/Adonijah01/cve-2025-32463-lab
https://github.com/ill-deed/CVE-2025-32463_illdeed
https://github.com/cyberpoul/CVE-2025-32463-POC
https://github.com/robbert1978/CVE-2025-32463_POC
https://github.com/K3ysTr0K3R/CVE-2025-32463-EXPLOIT
https://github.com/0xb0rn3/CVE-2025-32463-EXPLOIT
https://github.com/MGunturG/CVE-2025-32463
https://github.com/toohau/CVE-2025-32462-32463-Detection-Script-
https://github.com/K1tt3h/CVE-2025-32463-POC
https://github.com/nflatrea/CVE-2025-32463
https://github.com/pevinkumar10/CVE-2025-32463
https://github.com/Rajneeshkarya/CVE-2025-32463
https://github.com/zhaduchanhzz/CVE-2025-32463_POC
https://github.com/0xAkarii/CVE-2025-32463
https://github.com/yeremeu/CVE-2025-32463_chwoot
https://github.com/neko205-mx/CVE-2025-32463_Exploit
https://github.com/MAAYTHM/CVE-2025-32462_32463-Lab
https://github.com/Floodnut/CVE-2025-32463
updated 2025-07-18T17:15:44.747000
2 posts
1 repos
HTTP Parameter Pollution in form-data with PoC.
https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4
sev:CRIT 9.4 - CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
##Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js. This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.
HTTP Parameter Pollution in form-data with PoC.
https://github.com/form-data/form-data/security/advisories/GHSA-fjxv-7rqg-78g4
sev:CRIT 9.4 - CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
##Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP). This vulnerability is associated with program files lib/form_data.Js. This issue affects form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.
updated 2025-07-18T17:15:44.400000
4 posts
Microsoft security updates listing four maximum severity vulnerabilities, as in 'we're competing with Cisco'.
- CVE-2025-53762: Microsoft Purview Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53762
- CVE-2025-47158: Azure DevOps Server Elevation of Privilege Vulnerability New https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47158
- CVE-2025-47995: Azure Machine Learning Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47995
- CVE-2025-49746: Azure Machine Learning Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49746 #Microsoft #cybersecurity #infosec #AI #Azure
##There was also an EoP in Purview. Also not exploited, no action required.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53762
##Microsoft security updates listing four maximum severity vulnerabilities, as in 'we're competing with Cisco'.
- CVE-2025-53762: Microsoft Purview Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53762
- CVE-2025-47158: Azure DevOps Server Elevation of Privilege Vulnerability New https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47158
- CVE-2025-47995: Azure Machine Learning Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47995
- CVE-2025-49746: Azure Machine Learning Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49746 #Microsoft #cybersecurity #infosec #AI #Azure
##There was also an EoP in Purview. Also not exploited, no action required.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53762
##updated 2025-07-18T17:15:43.503000
2 posts
Microsoft published two sev:CRIT
CVEs in Azure Machine Learning and one sev:CRIT
in ADO.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49746
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49747
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47158
All of them are listed as not publicly disclosed and not exploited.
##The vulnerability documented by this CVE requires no customer action to resolve
Microsoft published two sev:CRIT
CVEs in Azure Machine Learning and one sev:CRIT
in ADO.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49746
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49747
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47158
All of them are listed as not publicly disclosed and not exploited.
##The vulnerability documented by this CVE requires no customer action to resolve
updated 2025-07-18T17:15:43.300000
4 posts
Microsoft security updates listing four maximum severity vulnerabilities, as in 'we're competing with Cisco'.
- CVE-2025-53762: Microsoft Purview Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53762
- CVE-2025-47158: Azure DevOps Server Elevation of Privilege Vulnerability New https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47158
- CVE-2025-47995: Azure Machine Learning Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47995
- CVE-2025-49746: Azure Machine Learning Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49746 #Microsoft #cybersecurity #infosec #AI #Azure
##Microsoft published two sev:CRIT
CVEs in Azure Machine Learning and one sev:CRIT
in ADO.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49746
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49747
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47158
All of them are listed as not publicly disclosed and not exploited.
##The vulnerability documented by this CVE requires no customer action to resolve
Microsoft security updates listing four maximum severity vulnerabilities, as in 'we're competing with Cisco'.
- CVE-2025-53762: Microsoft Purview Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53762
- CVE-2025-47158: Azure DevOps Server Elevation of Privilege Vulnerability New https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47158
- CVE-2025-47995: Azure Machine Learning Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47995
- CVE-2025-49746: Azure Machine Learning Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49746 #Microsoft #cybersecurity #infosec #AI #Azure
##Microsoft published two sev:CRIT
CVEs in Azure Machine Learning and one sev:CRIT
in ADO.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49746
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49747
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47158
All of them are listed as not publicly disclosed and not exploited.
##The vulnerability documented by this CVE requires no customer action to resolve
updated 2025-07-18T17:15:33.497000
2 posts
Microsoft security updates listing four maximum severity vulnerabilities, as in 'we're competing with Cisco'.
- CVE-2025-53762: Microsoft Purview Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53762
- CVE-2025-47158: Azure DevOps Server Elevation of Privilege Vulnerability New https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47158
- CVE-2025-47995: Azure Machine Learning Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47995
- CVE-2025-49746: Azure Machine Learning Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49746 #Microsoft #cybersecurity #infosec #AI #Azure
##Microsoft security updates listing four maximum severity vulnerabilities, as in 'we're competing with Cisco'.
- CVE-2025-53762: Microsoft Purview Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53762
- CVE-2025-47158: Azure DevOps Server Elevation of Privilege Vulnerability New https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47158
- CVE-2025-47995: Azure Machine Learning Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47995
- CVE-2025-49746: Azure Machine Learning Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49746 #Microsoft #cybersecurity #infosec #AI #Azure
##updated 2025-07-18T17:15:31.363000
4 posts
Microsoft security updates listing four maximum severity vulnerabilities, as in 'we're competing with Cisco'.
- CVE-2025-53762: Microsoft Purview Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53762
- CVE-2025-47158: Azure DevOps Server Elevation of Privilege Vulnerability New https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47158
- CVE-2025-47995: Azure Machine Learning Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47995
- CVE-2025-49746: Azure Machine Learning Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49746 #Microsoft #cybersecurity #infosec #AI #Azure
##Microsoft published two sev:CRIT
CVEs in Azure Machine Learning and one sev:CRIT
in ADO.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49746
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49747
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47158
All of them are listed as not publicly disclosed and not exploited.
##The vulnerability documented by this CVE requires no customer action to resolve
Microsoft security updates listing four maximum severity vulnerabilities, as in 'we're competing with Cisco'.
- CVE-2025-53762: Microsoft Purview Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53762
- CVE-2025-47158: Azure DevOps Server Elevation of Privilege Vulnerability New https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47158
- CVE-2025-47995: Azure Machine Learning Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47995
- CVE-2025-49746: Azure Machine Learning Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49746 #Microsoft #cybersecurity #infosec #AI #Azure
##Microsoft published two sev:CRIT
CVEs in Azure Machine Learning and one sev:CRIT
in ADO.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49746
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49747
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47158
All of them are listed as not publicly disclosed and not exploited.
##The vulnerability documented by this CVE requires no customer action to resolve
updated 2025-07-18T15:15:26.397000
1 posts
Post-auth SQLi in HPE Telco Service Orchestrator.
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04875en_us&docLocale=en_US
##updated 2025-07-18T09:30:42
2 posts
XSS and open redirect in Grafana.
##XSS and open redirect in Grafana.
##updated 2025-07-18T09:30:42
2 posts
XSS and open redirect in Grafana.
##XSS and open redirect in Grafana.
##updated 2025-07-18T09:30:42
1 posts
🔥 CRITICAL vuln: LoginPress Pro (all versions ≤5.0.1) lets attackers bypass auth with social login token, gaining admin access (CVE-2025-7444, CVSS 9.8). No fix yet—monitor for suspicious logins! https://radar.offseq.com/threat/cve-2025-7444-cwe-288-authentication-bypass-using--4768c321 #OffSeq #WordPress #CVE20257444 #infosec
##updated 2025-07-17T21:32:27
9 posts
WIZ, from yesterday: NVIDIAScape - Critical NVIDIA AI Vulnerability: A Three-Line Container Escape in NVIDIA Container Toolkit (CVE-2025-23266)
More:
The Hacker News: Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services https://thehackernews.com/2025/07/critical-nvidia-container-toolkit-flaw.html @thehackernews #Nvidia #cybersecurity #infosec #AI
##The vulnerability, tracked as CVE-2025-23266, carries a CVSS score of 9.0 out of 10.0. It has been codenamed NVIDIAScape by Google-owned cloud security company Wiz. https://thehackernews.com/2025/07/critical-nvidia-container-toolkit-flaw.html
##NVIDIA reports container escape vulnerabilities in Container Toolkit
NVIDIA has disclosed two critical vulnerabilities in its Container Toolkit and GPU Operator (CVE-2025-23266, CVE-2025-23267) that enable container escape attacks against AI infrastructure used by major cloud providers. The most severe flaw is dubbed "NVIDIAScape" and is exploitable through a simple three-line Dockerfile.
**If you're running NVIDIA Container Toolkit or GPU Operator for AI workloads, either upgrade to Container Toolkit version 1.17.8 and GPU Operator version 25.3.1 or disable the vulnerable enable-cuda-compat hook by setting the disable-cuda-compat-lib-hook flag to true in your configuration files. The exploit is trivial, and attackers will find your systems, one way or another.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/nvidia-reports-container-escape-vulnerabilities-in-container-toolkit-7-b-j-c-e/gD2P6Ple2L
WIZ, from yesterday: NVIDIAScape - Critical NVIDIA AI Vulnerability: A Three-Line Container Escape in NVIDIA Container Toolkit (CVE-2025-23266)
More:
The Hacker News: Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services https://thehackernews.com/2025/07/critical-nvidia-container-toolkit-flaw.html @thehackernews #Nvidia #cybersecurity #infosec #AI
##The vulnerability, tracked as CVE-2025-23266, carries a CVSS score of 9.0 out of 10.0. It has been codenamed NVIDIAScape by Google-owned cloud security company Wiz. https://thehackernews.com/2025/07/critical-nvidia-container-toolkit-flaw.html
##NVIDIA reports container escape vulnerabilities in Container Toolkit
NVIDIA has disclosed two critical vulnerabilities in its Container Toolkit and GPU Operator (CVE-2025-23266, CVE-2025-23267) that enable container escape attacks against AI infrastructure used by major cloud providers. The most severe flaw is dubbed "NVIDIAScape" and is exploitable through a simple three-line Dockerfile.
**If you're running NVIDIA Container Toolkit or GPU Operator for AI workloads, either upgrade to Container Toolkit version 1.17.8 and GPU Operator version 25.3.1 or disable the vulnerable enable-cuda-compat hook by setting the disable-cuda-compat-lib-hook flag to true in your configuration files. The exploit is trivial, and attackers will find your systems, one way or another.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/nvidia-reports-container-escape-vulnerabilities-in-container-toolkit-7-b-j-c-e/gD2P6Ple2L
Go hack the robots!
https://www.ros.org/blog/noetic-eol/
After May 31st, 2025 ROS 1 Noetic users may find themselves exposed to un-patched security vulnerabilities and bugs, with few avenues of support short of fixing these issues themselves and recompiling Noetic from source.
https://www.cve.org/CVERecord?id=CVE-2024-39289
https://www.cve.org/CVERecord?id=CVE-2024-39385
https://www.cve.org/CVERecord?id=CVE-2024-41148
https://www.cve.org/CVERecord?id=CVE-2024-41921
Edit to add a couple more.
##Go hack more AI shit please. Now.
https://www.wiz.io/blog/nvidia-ai-vulnerability-cve-2025-23266-nvidiascape
##New.
Nvidia product advisories:
- NVIDIA Jetson Orin, IGX Orin and Xavier Devices - CVE-2025-23270 and CVE-2025-23269 https://nvidia.custhelp.com/app/answers/detail/a_id/5662
- NVIDIA Container Toolkit - CVE-2025-23266 and CVE-2025-23267 https://nvidia.custhelp.com/app/answers/detail/a_id/5659
- NVIDIA DOCA-Host and Mellanox OFED - CVE-2025-23263 https://nvidia.custhelp.com/app/answers/detail/a_id/5654 #Nvidia #cybersecurity #infosec
##updated 2025-07-17T21:32:27
1 posts
Critical Lenovo Driver Flaw Exposes Millions: CVE-2025-4657 Enables Full System Takeover
A Dangerous Threat Hiding in Plain Sight In July 2025, security researchers uncovered a critical buffer overflow vulnerability—CVE-2025-4657—embedded in Lenovo’s lrtp.sys Protection Driver, used widely in Lenovo PC Manager, Browser, and App Store utilities. This vulnerability, if exploited, allows attackers with local access to gain full system privileges on millions of Lenovo…
##updated 2025-07-17T21:32:27
1 posts
Go hack the robots!
https://www.ros.org/blog/noetic-eol/
After May 31st, 2025 ROS 1 Noetic users may find themselves exposed to un-patched security vulnerabilities and bugs, with few avenues of support short of fixing these issues themselves and recompiling Noetic from source.
https://www.cve.org/CVERecord?id=CVE-2024-39289
https://www.cve.org/CVERecord?id=CVE-2024-39385
https://www.cve.org/CVERecord?id=CVE-2024-41148
https://www.cve.org/CVERecord?id=CVE-2024-41921
Edit to add a couple more.
##updated 2025-07-17T21:32:27
1 posts
Three LPEs in Sophos Intercept X for Windows (CVE-2024-13972, CVE-2025-7433, CVE-2025-7472).
https://www.sophos.com/en-us/security-advisories/sophos-sa-20250717-cix-lpe
##updated 2025-07-17T21:32:27
1 posts
New.
Nvidia product advisories:
- NVIDIA Jetson Orin, IGX Orin and Xavier Devices - CVE-2025-23270 and CVE-2025-23269 https://nvidia.custhelp.com/app/answers/detail/a_id/5662
- NVIDIA Container Toolkit - CVE-2025-23266 and CVE-2025-23267 https://nvidia.custhelp.com/app/answers/detail/a_id/5659
- NVIDIA DOCA-Host and Mellanox OFED - CVE-2025-23263 https://nvidia.custhelp.com/app/answers/detail/a_id/5654 #Nvidia #cybersecurity #infosec
##updated 2025-07-17T21:32:22
1 posts
Go hack the robots!
https://www.ros.org/blog/noetic-eol/
After May 31st, 2025 ROS 1 Noetic users may find themselves exposed to un-patched security vulnerabilities and bugs, with few avenues of support short of fixing these issues themselves and recompiling Noetic from source.
https://www.cve.org/CVERecord?id=CVE-2024-39289
https://www.cve.org/CVERecord?id=CVE-2024-39385
https://www.cve.org/CVERecord?id=CVE-2024-41148
https://www.cve.org/CVERecord?id=CVE-2024-41921
Edit to add a couple more.
##updated 2025-07-17T21:32:22
1 posts
Go hack the robots!
https://www.ros.org/blog/noetic-eol/
After May 31st, 2025 ROS 1 Noetic users may find themselves exposed to un-patched security vulnerabilities and bugs, with few avenues of support short of fixing these issues themselves and recompiling Noetic from source.
https://www.cve.org/CVERecord?id=CVE-2024-39289
https://www.cve.org/CVERecord?id=CVE-2024-39385
https://www.cve.org/CVERecord?id=CVE-2024-41148
https://www.cve.org/CVERecord?id=CVE-2024-41921
Edit to add a couple more.
##updated 2025-07-17T21:32:14
1 posts
Three LPEs in Sophos Intercept X for Windows (CVE-2024-13972, CVE-2025-7433, CVE-2025-7472).
https://www.sophos.com/en-us/security-advisories/sophos-sa-20250717-cix-lpe
##updated 2025-07-17T21:15:50.197000
17 posts
8 repos
https://github.com/0xgh057r3c0n/CVE-2025-25257
https://github.com/adilburaksen/CVE-2025-25257-Exploit-Tool
https://github.com/secwatch92/fortiweb_rce_toolkit
https://github.com/B1ack4sh/Blackash-CVE-2025-25257
https://github.com/imbas007/CVE-2025-25257
https://github.com/watchtowrlabs/watchTowr-vs-FortiWeb-CVE-2025-25257
CVE ID: CVE-2025-25257
Vendor: Fortinet
Product: FortiWeb
Date Added: 2025-07-18
Notes: https://fortiguard.fortinet.com/psirt/FG-IR-25-151 ; https://nvd.nist.gov/vuln/detail/CVE-2025-25257
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-25257
CISA has added Fortinet FortiWeb SQL Injection Vulnerability to the KEV catalogue. That's CVE-2025-25257 https://www.cve.org/CVERecord?id=CVE-2025-25257
CISA KEV catalogue: https://www.cisa.gov/known-exploited-vulnerabilities-catalog #CISA #cybersecurity #infosec #Fortinet
##CVE ID: CVE-2025-25257
Vendor: Fortinet
Product: FortiWeb
Date Added: 2025-07-18
Notes: https://fortiguard.fortinet.com/psirt/FG-IR-25-151 ; https://nvd.nist.gov/vuln/detail/CVE-2025-25257
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-25257
CISA has added Fortinet FortiWeb SQL Injection Vulnerability to the KEV catalogue. That's CVE-2025-25257 https://www.cve.org/CVERecord?id=CVE-2025-25257
CISA KEV catalogue: https://www.cisa.gov/known-exploited-vulnerabilities-catalog #CISA #cybersecurity #infosec #Fortinet
##It gets better. Its into MySQL... running as root. They just INTO OUTFILE, lil bit of fiddling with some python-vs-cgibin into unauth'd RCE. :ablobcatnodfast: so savage 💗
##CVE-2025-25257 Vulnerability: Critical SQL Injection in Fortinet FortiWeb Enables Unauthenticated Remote Code Execution – Source: socprime.com https://ciso2ciso.com/cve-2025-25257-vulnerability-critical-sql-injection-in-fortinet-fortiweb-enables-unauthenticated-remote-code-execution-source-socprime-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #Latestthreats #Vulnerability #socprimecom #socprime #Blog #CVE #rce
##Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257) https://www.helpnetsecurity.com/2025/07/14/exploits-for-unauthenticated-fortiweb-rce-are-public-so-patch-quickly-cve-2025-25257/ #webapplicationsecurity #vulnerability #Don'tmiss #WatchTowr #Hotstuff #Fortinet #exploit #Rapid7 #News #PoC
##Critical Vulnerability Exposes Fortinet FortiWeb to Full Takeover (CVE-2025-25257) – Source:hackread.com https://ciso2ciso.com/critical-vulnerability-exposes-fortinet-fortiweb-to-full-takeover-cve-2025-25257-sourcehackread-com/ #1CyberSecurityNewsPost #CyberSecurityNews #cybersecurity #Vulnerability #Fortinet #FortiWeb #Hackread #security #SQL
##Critical Vulnerability Exposes Fortinet FortiWeb to Full Takeover (CVE-2025-25257) https://hackread.com/critical-vulnerability-fortinet-fortiweb-cve-2025-25257/
##Critical Vulnerability Exposes Fortinet FortiWeb to Full Takeover (CVE-2025-25257) https://hackread.com/critical-vulnerability-fortinet-fortiweb-cve-2025-25257/ #Cybersecurity #Vulnerability #Security #Fortinet #FortiWeb #SQL
##Patch immediately: CVE-2025-25257 PoC enables remote code execution on Fortinet FortiWeb https://securityaffairs.com/179874/security/patch-immediately-cve-2025-25257-poc-enables-remote-code-execution-on-fortinet-fortiweb.html
##WatchTowr Labs has published a write-up and a PoC for a dangerous pre-auth SQL injection in the web interface of Fortinet devices. The bug is tracked as CVE-2025-25257 and was patched last week.
##Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257) https://thehackernews.com/2025/07/fortinet-releases-patch-for-critical.html
##Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257) – Source:thehackernews.com https://ciso2ciso.com/fortinet-releases-patch-for-critical-sql-injection-flaw-in-fortiweb-cve-2025-25257-sourcethehackernews-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #TheHackerNews #Fortinet
##🚨 Critical alert: A pre-auth RCE exploit (CVE-2025-25257) targeting Fortinet FortiWeb is now public. Patch to 7.6.4+/7.4.8+ immediately or disable HTTP admin interfaces. Unpatched systems are at high risk. Details: https://redteamnews.com/red-team/cve/critical-pre-auth-rce-exploit-released-for-fortinet-fortiweb-patch-immediately/
##🚨CVE-2025-25257: Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector
PoC: https://github.com/watchtowrlabs/watchTowr-vs-FortiWeb-CVE-2025-25257
##updated 2025-07-17T21:15:50.197000
3 posts
NVIDIA reports container escape vulnerabilities in Container Toolkit
NVIDIA has disclosed two critical vulnerabilities in its Container Toolkit and GPU Operator (CVE-2025-23266, CVE-2025-23267) that enable container escape attacks against AI infrastructure used by major cloud providers. The most severe flaw is dubbed "NVIDIAScape" and is exploitable through a simple three-line Dockerfile.
**If you're running NVIDIA Container Toolkit or GPU Operator for AI workloads, either upgrade to Container Toolkit version 1.17.8 and GPU Operator version 25.3.1 or disable the vulnerable enable-cuda-compat hook by setting the disable-cuda-compat-lib-hook flag to true in your configuration files. The exploit is trivial, and attackers will find your systems, one way or another.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/nvidia-reports-container-escape-vulnerabilities-in-container-toolkit-7-b-j-c-e/gD2P6Ple2L
NVIDIA reports container escape vulnerabilities in Container Toolkit
NVIDIA has disclosed two critical vulnerabilities in its Container Toolkit and GPU Operator (CVE-2025-23266, CVE-2025-23267) that enable container escape attacks against AI infrastructure used by major cloud providers. The most severe flaw is dubbed "NVIDIAScape" and is exploitable through a simple three-line Dockerfile.
**If you're running NVIDIA Container Toolkit or GPU Operator for AI workloads, either upgrade to Container Toolkit version 1.17.8 and GPU Operator version 25.3.1 or disable the vulnerable enable-cuda-compat hook by setting the disable-cuda-compat-lib-hook flag to true in your configuration files. The exploit is trivial, and attackers will find your systems, one way or another.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/nvidia-reports-container-escape-vulnerabilities-in-container-toolkit-7-b-j-c-e/gD2P6Ple2L
New.
Nvidia product advisories:
- NVIDIA Jetson Orin, IGX Orin and Xavier Devices - CVE-2025-23270 and CVE-2025-23269 https://nvidia.custhelp.com/app/answers/detail/a_id/5662
- NVIDIA Container Toolkit - CVE-2025-23266 and CVE-2025-23267 https://nvidia.custhelp.com/app/answers/detail/a_id/5659
- NVIDIA DOCA-Host and Mellanox OFED - CVE-2025-23263 https://nvidia.custhelp.com/app/answers/detail/a_id/5654 #Nvidia #cybersecurity #infosec
##updated 2025-07-17T21:15:50.197000
1 posts
Go hack the robots!
https://www.ros.org/blog/noetic-eol/
After May 31st, 2025 ROS 1 Noetic users may find themselves exposed to un-patched security vulnerabilities and bugs, with few avenues of support short of fixing these issues themselves and recompiling Noetic from source.
https://www.cve.org/CVERecord?id=CVE-2024-39289
https://www.cve.org/CVERecord?id=CVE-2024-39385
https://www.cve.org/CVERecord?id=CVE-2024-41148
https://www.cve.org/CVERecord?id=CVE-2024-41921
Edit to add a couple more.
##updated 2025-07-17T21:15:50.197000
1 posts
Three LPEs in Sophos Intercept X for Windows (CVE-2024-13972, CVE-2025-7433, CVE-2025-7472).
https://www.sophos.com/en-us/security-advisories/sophos-sa-20250717-cix-lpe
##updated 2025-07-17T21:15:50.197000
1 posts
RCE in Livewire.
https://github.com/livewire/livewire/security/advisories/GHSA-29cq-5w36-x7w3
sev:CRIT 9.2 - CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
##In Livewire v3 (≤ 3.6.3), a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property updates are hydrated. This vulnerability is unique to Livewire v3 and does not affect prior major versions. Exploitation requires a component to be mounted and configured in a particular way, but does not require authentication or user interaction.
updated 2025-07-17T21:15:50.197000
1 posts
Cisco posted five vulnerability updates yesterday:
- Critical, affects CVE-2025-20281; CVE-2025-20282; and CVE-2025-20337 Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
- High, CVE-2025-20274: Cisco Unified Intelligence Center Arbitrary File Upload Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-file-upload-UhNEtStm
- Medium, CVE-2025-20272: Cisco Prime Infrastructure and Evolved Programmable Network Manager Blind SQL Injection Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-piepnm-bsi-25JJqsbb
- CVE-2025-20283; CVE-2025-20284; and CVE-2025-20285: Cisco Identity Services Engine Authenticated Remote Code Execution and Authorization Bypass Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-3VpsXOxO
- CVE-2025-20288: Cisco Unified Intelligence Center Server-Side Request Forgery Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-ssrf-JSuDjeV @TalosSecurity #cybersecurity #Infosec #Cisco
##updated 2025-07-17T21:15:50.197000
1 posts
Cisco posted five vulnerability updates yesterday:
- Critical, affects CVE-2025-20281; CVE-2025-20282; and CVE-2025-20337 Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
- High, CVE-2025-20274: Cisco Unified Intelligence Center Arbitrary File Upload Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-file-upload-UhNEtStm
- Medium, CVE-2025-20272: Cisco Prime Infrastructure and Evolved Programmable Network Manager Blind SQL Injection Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-piepnm-bsi-25JJqsbb
- CVE-2025-20283; CVE-2025-20284; and CVE-2025-20285: Cisco Identity Services Engine Authenticated Remote Code Execution and Authorization Bypass Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-3VpsXOxO
- CVE-2025-20288: Cisco Unified Intelligence Center Server-Side Request Forgery Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-ssrf-JSuDjeV @TalosSecurity #cybersecurity #Infosec #Cisco
##updated 2025-07-17T21:15:50.197000
1 posts
CVE isn't published yet but ISC published another advisory for BIND.
https://kb.isc.org/docs/cve-2025-40777
sev:HIGH 7.5 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
If a named caching resolver is configured with serve-stale-enable yes, and with stale-answer-client-timeout set to 0 (the only allowable value other than disabled), and if the resolver, in the process of resolving a query, encounters a CNAME chain involving a specific combination of cached or authoritative records, the daemon will abort with an assertion failure.
https://www.cve.org/CVERecord?id=CVE-2025-40777
Edit: The CVE is now published.
##updated 2025-07-17T21:15:50.197000
1 posts
New.
Nvidia product advisories:
- NVIDIA Jetson Orin, IGX Orin and Xavier Devices - CVE-2025-23270 and CVE-2025-23269 https://nvidia.custhelp.com/app/answers/detail/a_id/5662
- NVIDIA Container Toolkit - CVE-2025-23266 and CVE-2025-23267 https://nvidia.custhelp.com/app/answers/detail/a_id/5659
- NVIDIA DOCA-Host and Mellanox OFED - CVE-2025-23263 https://nvidia.custhelp.com/app/answers/detail/a_id/5654 #Nvidia #cybersecurity #infosec
##updated 2025-07-17T20:42:07.780000
12 posts
🚨 Third critical Cisco ISE flaw in a month. Another perfect 10 CVSS score, another no-workaround RCE. If you’re still running ISE 3.3 or 3.4 without the latest patches, you’re leaving the door wide open for remote root access via a crafted API request.
TL;DR
⚠️ CVE-2025-20337 = unauthenticated RCE
🚨 Exploit = remote root with no workaround
🛠️ Fix = Patch 3.3.7 or 3.4.2
🔍 No active exploitation... yet
https://www.theregister.com/2025/07/17/critical_cisco_bug/
#Cisco #InfoSec #VulnerabilityManagement #ZeroDay #security #privacy #cloud #infosec #cybersecurity
CVE-2025-20337 is a vulnerability in Cisco's Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) products, which the company said in a security advisory https://www.darkreading.com/application-security/cisco-cvss-10-flaw-ise-ise-pic-patch-now
##🚨 Third critical Cisco ISE flaw in a month. Another perfect 10 CVSS score, another no-workaround RCE. If you’re still running ISE 3.3 or 3.4 without the latest patches, you’re leaving the door wide open for remote root access via a crafted API request.
TL;DR
⚠️ CVE-2025-20337 = unauthenticated RCE
🚨 Exploit = remote root with no workaround
🛠️ Fix = Patch 3.3.7 or 3.4.2
🔍 No active exploitation... yet
https://www.theregister.com/2025/07/17/critical_cisco_bug/
#Cisco #InfoSec #VulnerabilityManagement #ZeroDay #security #privacy #cloud #infosec #cybersecurity
CVE-2025-20337 is a vulnerability in Cisco's Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) products, which the company said in a security advisory https://www.darkreading.com/application-security/cisco-cvss-10-flaw-ise-ise-pic-patch-now
##New Cisco Bugs Rated CVSS 10.0, Patch Immediately https://thecyberexpress.com/cisco-cve-2025-20337-and-ise-pic-flaws/ #TheCyberExpressNews #Ciscovulnerability #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202520281 #CVE202520337 #CyberNews #ISE #PIC
##Cisco reports another critical vulnerability in Cisco ISE that enable enable unauthenticated root code execution
Cisco has disclosed a third critical vulnerability (CVE-2025-20337) affecting its Identity Services Engine platforms that allows unauthenticated remote attackers to execute arbitrary commands with root privileges. Organizations must upgrade to ISE 3.3 Patch 7 or ISE 3.4 Patch 2 for full protection. Previous patches do not fix this flaw.
**If you haven't patched your Cisco Identity Services Engine (ISE), DO IT NOW! Even if you already patched, you probably need to patch again. There are three maximum severity flaws that will harm your ISE. Cisco ISE usually controls network access to a lot of the infrastructure, so you don't want it to be hacked.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/cisco-reports-another-critical-vulnerability-in-cisco-ise-that-enable-enable-unauthenticated-root-code-execution-8-f-i-p-v/gD2P6Ple2L
🚨CVE-2025-20337: A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root.
CVSS: 10
The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input.
An attacker could exploit this vulnerability by submitting a crafted API request. A successful exploit could allow the attacker to obtain root privileges on an affected device.
##Cisco patches critical CVE-2025-20337 bug in Identity Services Engine with CVSS 10 Severity – Source: securityaffairs.com https://ciso2ciso.com/cisco-patches-critical-cve-2025-20337-bug-in-identity-services-engine-with-cvss-10-severity-source-securityaffairs-com/ #CiscoIdentityServicesEngine #rssfeedpostgeneratorecho #informationsecuritynews #ITInformationSecurity #SecurityAffairscom #CyberSecurityNews #PierluigiPaganini #SecurityAffairs #SecurityAffairs #BreakingNews #SecurityNews #hackingnews
##Max severity Cisco ISE bug allows pre-auth command execution, patch now
A critical vulnerability (CVE-2025-20337) in Cisco's Identity Services Engine (ISE) could be exploited to let an unauthenticated attacker store...
🔗️ [Bleepingcomputer] https://link.is.it/dI2LDo
##Cisco posted five vulnerability updates yesterday:
- Critical, affects CVE-2025-20281; CVE-2025-20282; and CVE-2025-20337 Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
- High, CVE-2025-20274: Cisco Unified Intelligence Center Arbitrary File Upload Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-file-upload-UhNEtStm
- Medium, CVE-2025-20272: Cisco Prime Infrastructure and Evolved Programmable Network Manager Blind SQL Injection Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-piepnm-bsi-25JJqsbb
- CVE-2025-20283; CVE-2025-20284; and CVE-2025-20285: Cisco Identity Services Engine Authenticated Remote Code Execution and Authorization Bypass Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-3VpsXOxO
- CVE-2025-20288: Cisco Unified Intelligence Center Server-Side Request Forgery Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-ssrf-JSuDjeV @TalosSecurity #cybersecurity #Infosec #Cisco
##Tracked as CVE-2025-20337, the shortcoming carries a CVSS score of 10.0 and is similar to CVE-2025-20281, which was patched by the networking equipment major late last month. https://thehackernews.com/2025/07/cisco-warns-of-critical-ise-flaw.html
##Cisco added a new CVE to that perfect 10 in ISE from a couple weeks ago: CVE-2025-20337
They also published a sev:HIGH
in Unified Intelligence Center:
And a couple sev:MED
advisories:
updated 2025-07-17T18:31:24
1 posts
New.
Nvidia product advisories:
- NVIDIA Jetson Orin, IGX Orin and Xavier Devices - CVE-2025-23270 and CVE-2025-23269 https://nvidia.custhelp.com/app/answers/detail/a_id/5662
- NVIDIA Container Toolkit - CVE-2025-23266 and CVE-2025-23267 https://nvidia.custhelp.com/app/answers/detail/a_id/5659
- NVIDIA DOCA-Host and Mellanox OFED - CVE-2025-23263 https://nvidia.custhelp.com/app/answers/detail/a_id/5654 #Nvidia #cybersecurity #infosec
##updated 2025-07-16T18:32:46
1 posts
Cisco posted five vulnerability updates yesterday:
- Critical, affects CVE-2025-20281; CVE-2025-20282; and CVE-2025-20337 Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
- High, CVE-2025-20274: Cisco Unified Intelligence Center Arbitrary File Upload Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-file-upload-UhNEtStm
- Medium, CVE-2025-20272: Cisco Prime Infrastructure and Evolved Programmable Network Manager Blind SQL Injection Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-piepnm-bsi-25JJqsbb
- CVE-2025-20283; CVE-2025-20284; and CVE-2025-20285: Cisco Identity Services Engine Authenticated Remote Code Execution and Authorization Bypass Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-3VpsXOxO
- CVE-2025-20288: Cisco Unified Intelligence Center Server-Side Request Forgery Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-ssrf-JSuDjeV @TalosSecurity #cybersecurity #Infosec #Cisco
##updated 2025-07-16T18:32:46
1 posts
Cisco posted five vulnerability updates yesterday:
- Critical, affects CVE-2025-20281; CVE-2025-20282; and CVE-2025-20337 Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
- High, CVE-2025-20274: Cisco Unified Intelligence Center Arbitrary File Upload Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-file-upload-UhNEtStm
- Medium, CVE-2025-20272: Cisco Prime Infrastructure and Evolved Programmable Network Manager Blind SQL Injection Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-piepnm-bsi-25JJqsbb
- CVE-2025-20283; CVE-2025-20284; and CVE-2025-20285: Cisco Identity Services Engine Authenticated Remote Code Execution and Authorization Bypass Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-3VpsXOxO
- CVE-2025-20288: Cisco Unified Intelligence Center Server-Side Request Forgery Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-ssrf-JSuDjeV @TalosSecurity #cybersecurity #Infosec #Cisco
##updated 2025-07-16T18:32:38
1 posts
Cisco posted five vulnerability updates yesterday:
- Critical, affects CVE-2025-20281; CVE-2025-20282; and CVE-2025-20337 Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
- High, CVE-2025-20274: Cisco Unified Intelligence Center Arbitrary File Upload Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-file-upload-UhNEtStm
- Medium, CVE-2025-20272: Cisco Prime Infrastructure and Evolved Programmable Network Manager Blind SQL Injection Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-piepnm-bsi-25JJqsbb
- CVE-2025-20283; CVE-2025-20284; and CVE-2025-20285: Cisco Identity Services Engine Authenticated Remote Code Execution and Authorization Bypass Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-3VpsXOxO
- CVE-2025-20288: Cisco Unified Intelligence Center Server-Side Request Forgery Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-ssrf-JSuDjeV @TalosSecurity #cybersecurity #Infosec #Cisco
##updated 2025-07-16T18:32:38
1 posts
Cisco posted five vulnerability updates yesterday:
- Critical, affects CVE-2025-20281; CVE-2025-20282; and CVE-2025-20337 Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
- High, CVE-2025-20274: Cisco Unified Intelligence Center Arbitrary File Upload Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-file-upload-UhNEtStm
- Medium, CVE-2025-20272: Cisco Prime Infrastructure and Evolved Programmable Network Manager Blind SQL Injection Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-piepnm-bsi-25JJqsbb
- CVE-2025-20283; CVE-2025-20284; and CVE-2025-20285: Cisco Identity Services Engine Authenticated Remote Code Execution and Authorization Bypass Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-3VpsXOxO
- CVE-2025-20288: Cisco Unified Intelligence Center Server-Side Request Forgery Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-ssrf-JSuDjeV @TalosSecurity #cybersecurity #Infosec #Cisco
##updated 2025-07-16T17:41:44.517000
1 posts
We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by @_l0gg to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to @mwulftange
##updated 2025-07-16T15:32:40
1 posts
Looks like unbound was also impacted by this.
##updated 2025-07-16T15:32:33
1 posts
Haven't heard about a birthday attack for a while. This one impacts BIND versions with ECS.
https://kb.isc.org/docs/cve-2025-40776
sev:HIGH 8.6 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
##A resolver configured to send ECS options to authoritative servers can be compelled to make queries that slightly increase the odds of guessing the source port and other details necessary to bypass the original birthday cache poisoning attack mitigations. As a result of this weakness, a resolver with ECS enabled is more vulnerable to successful cache poisoning via spoofed query responses than one that does not implement this feature.
updated 2025-07-16T15:32:32
1 posts
Weird DoS in Fortra GoAnywhere.
https://www.fortra.com/security/advisories/product-security/fi-2025-009
##Broken access control in Fortra's GoAnywhere MFT prior to 7.8.1 allows an attacker to create a denial of service situation when configured to use GoAnywhere One-Time Password (GOTP) email two-factor authentication (2FA) and the user has not set an email address. In this scenario, the attacker may enter the email address of a known user when prompted and the user will be disabled if that user has configured GOTP.
updated 2025-07-16T15:32:27
1 posts
1 repos
Auth bypass and command injection in Alcatel-Lucent WAPs.
https://github.com/UltimateHG/CVE-2025-52689-PoC
##updated 2025-07-16T15:15:32.133000
1 posts
Auth bypass and command injection in Alcatel-Lucent WAPs.
https://github.com/UltimateHG/CVE-2025-52689-PoC
##updated 2025-07-16T15:15:26.410000
1 posts
Perfect 10 template injection in Sawtooth Lighthouse Studio. 🥳
sev:CRIT 10.0 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
##A template injection vulnerability exists in Sawtooth Software’s Lighthouse Studio versions prior to 9.16.14 via the ciwweb.pl http://ciwweb.pl/ Perl web application. Exploitation allows an unauthenticated attacker can execute arbitrary commands.
updated 2025-07-16T14:59:23.707000
1 posts
Post-auth RCE in CyberArk Conjur.
https://github.com/cyberark/conjur/security/advisories/GHSA-93hx-v9pv-qrm4
sev:HIGH 8.6 - CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
##An authenticated attacker who can inject secrets or templates into the Secrets Manager, Self-Hosted database could take advantage of an exposed API endpoint to execute arbitrary Ruby code within the Secrets Manager process. This issue affects both Secrets Manager, Self-Hosted (formerly Conjur Enterprise) and Conjur OSS. CyberArk thanks Yarden Porat and Shahar Tal of Cyata Security for responsibly disclosing this issue.
updated 2025-07-16T14:57:37.827000
1 posts
2 repos
EUVD: Critical WPBookit plugin for WP vulnerability CVE-2025-6058 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-21201 @enisa_eu #cybersecurity #infosec #WordPress
##updated 2025-07-16T14:27:43.883000
1 posts
Microsoft listed three vulnerabilities yesterday, all affecting Chromium-based Edge.
Microsoft security guide:
- Chromium: CVE-2025-7657 Use after free in WebRTC https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-7657
- Chromium: CVE-2025-7656 Integer overflow in V8 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-7656
- Chromium: CVE-2025-6558 Incorrect validation of untrusted input in ANGLE and GPU https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6558 #Microsoft #Chromium #cybersecurity #infosec
##updated 2025-07-16T09:31:15
1 posts
WordPress Security Alert: CVE-2025-6043 Enables Remote File Deletion via Malcure Plugin https://thecyberexpress.com/malcure-vulnerability-cve-2025-6043/ #MalcureMalwareScanner #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE20256043 #CyberNews #Wordfence #WordPress
##updated 2025-07-15T22:56:20
1 posts
updated 2025-07-15T21:32:49
1 posts
PoCs for Nexxt Solutions NCM-X1800 Mesh Router Vulnerabilities (CVE-2025-52379) - (CVE-2025-52378) - (CVE-2025-52377) - (CVE-2025-52376)
https://github.com/Vagebondcur/nexxt-solutions-NCM-X1800-exploits
##updated 2025-07-15T21:32:48
11 posts
1 repos
@AAKL FYI: CVE-2025-6558 is EITW.
##Microsoft listed three vulnerabilities yesterday, all affecting Chromium-based Edge.
Microsoft security guide:
- Chromium: CVE-2025-7657 Use after free in WebRTC https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-7657
- Chromium: CVE-2025-7656 Integer overflow in V8 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-7656
- Chromium: CVE-2025-6558 Incorrect validation of untrusted input in ANGLE and GPU https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6558 #Microsoft #Chromium #cybersecurity #infosec
##The vulnerability is identified as CVE-2025-6558 and received a high-severity rating of 8.8. It was discovered by researchers at Google’s Threat Analysis Group (TAG) on June 23. https://www.bleepingcomputer.com/news/security/google-fixes-actively-exploited-sandbox-escape-zero-day-in-chrome/
##CVE-2025-6558 Vulnerability: Google Chrome Zero-Day Under Active Exploitation – Source: socprime.com https://ciso2ciso.com/cve-2025-6558-vulnerability-google-chrome-zero-day-under-active-exploitation-source-socprime-com/ #GoogleChromeVulnerability #rssfeedpostgeneratorecho #CyberSecurityNews #CVE-2025-6558 #Latestthreats #Vulnerability #GoogleChrome #socprimecom #socprime #Blog #CVE
##Update Google Chrome to fix actively exploited zero-day (CVE-2025-6558) https://www.helpnetsecurity.com/2025/07/16/update-google-chrome-to-fix-actively-exploited-zero-day-cve-2025-6558/ #securityupdate #MicrosoftEdge #Don'tmiss #Hotstuff #Chrome #0-day #News
##Google releases urgent patch for Chrome, fixes actively exploited flaw
Google has released an urgent Chrome security update addressing six vulnerabilities, including a critical zero-day sandbox escape flaw (CVE-2025-6558) that is being actively exploited in the wild. The flaw is discovered by Google's Threat Analysis Group, suggesting potential nation-state involvement.
**Once again - an urgent patch for Chrome - Google is patching an actively exploited flaw in Chrome, and exploitation is just a visit to a malicious site. DONT WAIT! Update all your Chrome and Chromium browsers (Edge, Opera, Brave, Vivaldi...). Updating the browser is easy, all your tabs reopen after the patch.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/google-releases-urgent-patch-for-chrome-fixes-actively-exploited-flaw-d-g-f-0-h/gD2P6Ple2L
Urgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild – Source:thehackernews.com https://ciso2ciso.com/urgent-google-releases-critical-chrome-update-for-cve-2025-6558-exploit-active-in-the-wild-sourcethehackernews-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #TheHackerNews #Urgent
##Urgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild https://thehackernews.com/2025/07/urgent-google-releases-critical-chrome.html
##Urgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild https://thehackernews.com/2025/07/urgent-google-releases-critical-chrome.html
##Siehe auch
##Patch your Chrome. Three sev:HIGH
fixes released today for Chrome Desktop and Android, including CVE-2025-6558 which Google says has an ITW exploit.
https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html
##updated 2025-07-15T21:32:47
1 posts
Microsoft listed three vulnerabilities yesterday, all affecting Chromium-based Edge.
Microsoft security guide:
- Chromium: CVE-2025-7657 Use after free in WebRTC https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-7657
- Chromium: CVE-2025-7656 Integer overflow in V8 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-7656
- Chromium: CVE-2025-6558 Incorrect validation of untrusted input in ANGLE and GPU https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6558 #Microsoft #Chromium #cybersecurity #infosec
##updated 2025-07-15T21:32:47
1 posts
PoCs for Nexxt Solutions NCM-X1800 Mesh Router Vulnerabilities (CVE-2025-52379) - (CVE-2025-52378) - (CVE-2025-52377) - (CVE-2025-52376)
https://github.com/Vagebondcur/nexxt-solutions-NCM-X1800-exploits
##updated 2025-07-15T21:31:43
4 posts
CSA Issues Alert on Critical VMware Vulnerabilities: Patch Now, Experts Warn
Broadcom and CSA warn of critical VMware Vulnerabilities ilties flaws, including CVE-2025-41236 and CVE-2025-41237. Update ESXi, Workstation, and...
🔗️ [Cyble] https://link.is.it/TPjvMC
##CSA Issues Alert on Critical VMware Vulnerabilities: Patch Now, Experts Warn
Broadcom and CSA warn of critical VMware Vulnerabilities ilties flaws, including CVE-2025-41236 and CVE-2025-41237. Update ESXi, Workstation, and...
🔗️ [Cyble] https://link.is.it/TPjvMC
##There are bunch of critical vulnerabilities in #VMWare - "VMSA-2025-0013: VMware ESXi, Workstation, Fusion, and Tools updates address multiple vulnerabilities (CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239)" https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877
The best part? softwareupdate.broadcom.com is still down, so for example VMWare Workstation or Fusion are blissfully ignorant of any update being available.
##sev:CRIT
advisory from VMWare in a bunch of their stuff. Probably worth checking out the impact matrix in the advisory.
##VMSA-2025-0013: VMware ESXi, Workstation, Fusion, and Tools updates address multiple vulnerabilities (CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239)
updated 2025-07-15T21:31:43
4 posts
CSA Issues Alert on Critical VMware Vulnerabilities: Patch Now, Experts Warn
Broadcom and CSA warn of critical VMware Vulnerabilities ilties flaws, including CVE-2025-41236 and CVE-2025-41237. Update ESXi, Workstation, and...
🔗️ [Cyble] https://link.is.it/TPjvMC
##CSA Issues Alert on Critical VMware Vulnerabilities: Patch Now, Experts Warn
Broadcom and CSA warn of critical VMware Vulnerabilities ilties flaws, including CVE-2025-41236 and CVE-2025-41237. Update ESXi, Workstation, and...
🔗️ [Cyble] https://link.is.it/TPjvMC
##There are bunch of critical vulnerabilities in #VMWare - "VMSA-2025-0013: VMware ESXi, Workstation, Fusion, and Tools updates address multiple vulnerabilities (CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239)" https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877
The best part? softwareupdate.broadcom.com is still down, so for example VMWare Workstation or Fusion are blissfully ignorant of any update being available.
##sev:CRIT
advisory from VMWare in a bunch of their stuff. Probably worth checking out the impact matrix in the advisory.
##VMSA-2025-0013: VMware ESXi, Workstation, Fusion, and Tools updates address multiple vulnerabilities (CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239)
updated 2025-07-15T21:31:43
2 posts
There are bunch of critical vulnerabilities in #VMWare - "VMSA-2025-0013: VMware ESXi, Workstation, Fusion, and Tools updates address multiple vulnerabilities (CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239)" https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877
The best part? softwareupdate.broadcom.com is still down, so for example VMWare Workstation or Fusion are blissfully ignorant of any update being available.
##sev:CRIT
advisory from VMWare in a bunch of their stuff. Probably worth checking out the impact matrix in the advisory.
##VMSA-2025-0013: VMware ESXi, Workstation, Fusion, and Tools updates address multiple vulnerabilities (CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239)
updated 2025-07-15T21:31:27
2 posts
Good write-up on CVE-2025-53020 above.
https://github.com/icing/blog/blob/main/hpack-bombing-apache.md
##A detailed description of CVE-2025-53020, a DoS vulnerability in the HTTP/2 implementation of Apache httpd. Fixed in 2.4.64.
#apache #httpd #http2
https://github.com/icing/blog/blob/main/hpack-bombing-apache.md
##updated 2025-07-15T20:15:50.550000
1 posts
Dokploy Preview Deployments are vulnerable to Remote Code Execution. PoC in the advisory.
https://github.com/Dokploy/dokploy/security/advisories/GHSA-h67g-mpq5-6ph5
sev:CRIT 9.4 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
##An unauthenticated preview deployment vulnerability in Dokploy allows any user to execute arbitrary code and access sensitive environment variables by simply opening a pull request on a public repository. This exposes secrets and potentially enables remote code execution, putting all public Dokploy users using these preview deployments at risk.
updated 2025-07-15T20:07:28.023000
2 posts
There are bunch of critical vulnerabilities in #VMWare - "VMSA-2025-0013: VMware ESXi, Workstation, Fusion, and Tools updates address multiple vulnerabilities (CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239)" https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877
The best part? softwareupdate.broadcom.com is still down, so for example VMWare Workstation or Fusion are blissfully ignorant of any update being available.
##sev:CRIT
advisory from VMWare in a bunch of their stuff. Probably worth checking out the impact matrix in the advisory.
##VMSA-2025-0013: VMware ESXi, Workstation, Fusion, and Tools updates address multiple vulnerabilities (CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239)
updated 2025-07-15T20:07:28.023000
1 posts
But wait, there's more.
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6971
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6972
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6973
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6974
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-7042
##updated 2025-07-15T20:07:28.023000
1 posts
PoCs for Nexxt Solutions NCM-X1800 Mesh Router Vulnerabilities (CVE-2025-52379) - (CVE-2025-52378) - (CVE-2025-52377) - (CVE-2025-52376)
https://github.com/Vagebondcur/nexxt-solutions-NCM-X1800-exploits
##updated 2025-07-15T15:38:13
1 posts
Remote code execution through js2py onCaptchaResult
https://github.com/pyload/pyload/security/advisories/GHSA-8w3f-4r8f-pf53
sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
##pyload is an open-source Download Manager written in pure Python. An unsafe JavaScript evaluation vulnerability in pyLoad’s CAPTCHA processing code allows unauthenticated remote attackers to execute arbitrary code in the client browser and potentially the backend server. Exploitation requires no user interaction or authentication and can result in session hijacking, credential theft, and full system remote code execution. Commit 909e5c97885237530d1264cfceb5555870eb9546, the patch for the issue, is included in version 0.5.0b3.dev89.
updated 2025-07-15T15:31:07
3 posts
Google says ‘Big Sleep’ AI tool found bug hackers planned to use
On Tuesday, Google said Big Sleep managed to discover CVE-2025-6965 — a critical security flaw that Google said was “only known to threat actors...
🔗️ [Therecord] https://link.is.it/NuePCK
##Google said its LLM known as Big Sleep managed to discover CVE-2025-6965 — a critical security flaw that was “only known to threat actors and was at risk of being exploited.”
##SQLite isn't used in very many systems, is it?
https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8
sev:HIGH 7.2 - CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/S:N/AU:N/R:U/V:D/RE:L/U:Green
##There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms could exceed the number of columns available. This could lead to a memory corruption issue. We recommend upgrading to version 3.50.2 or above.
updated 2025-07-15T15:31:07
1 posts
But wait, there's more.
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6971
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6972
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6973
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6974
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-7042
##updated 2025-07-15T15:31:07
1 posts
But wait, there's more.
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6971
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6972
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6973
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6974
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-7042
##updated 2025-07-15T15:31:07
1 posts
But wait, there's more.
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6971
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6972
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6973
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6974
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-7042
##updated 2025-07-15T15:31:07
1 posts
But wait, there's more.
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6971
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6972
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6973
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-6974
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-7042
##updated 2025-07-15T15:31:07
1 posts
Isn't SOLIDWORKS one of those things a bunch of you nerds like to put random Internet downloads into?
https://www.3ds.com/trust-center/security/security-advisories/cve-2025-0831
##updated 2025-07-15T15:31:06
1 posts
PoCs for Nexxt Solutions NCM-X1800 Mesh Router Vulnerabilities (CVE-2025-52379) - (CVE-2025-52378) - (CVE-2025-52377) - (CVE-2025-52376)
https://github.com/Vagebondcur/nexxt-solutions-NCM-X1800-exploits
##updated 2025-07-15T13:14:49.980000
1 posts
Multiple flaws in Schneider Electric EcoStruxure IT Data Center Expert, at least one critical
Schneider Electric reports multiple vulnerabilities in its EcoStruxure IT Data Center Expert platform, including a CVSS 10.0 flaw (CVE-2025-50121) that enables unauthenticated remote code execution. The company released version 9.0 to patch all vulnerabilities.
**If you have Schneider Electric EcoStruxure IT Data Center Expert, make sure it's isolated from the internet and accesible from trusted networks only. Then plan an update cycle to version 9.0 available through Schneider's Customer Care Center with proper testing.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/multiple-flaws-in-schneider-electric-ecostruxure-it-data-center-expert-at-least-one-critical-f-7-2-q-w/gD2P6Ple2L
updated 2025-07-15T13:14:49.980000
1 posts
A Friday advisory from Facebook? Nice.
https://www.facebook.com/security/advisories/cve-2025-30402
##Description: A heap-buffer-overflow vulnerability in the loading of ExecuTorch methods can cause the runtime to crash and potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit 93b1a0c15f7eda49b2bc46b5b4c49557b4e9810f
updated 2025-07-15T13:14:24.053000
1 posts
LB-LINK routers (BL-AC1900 & more, ≤20250702) face CRITICAL risk: CVE-2025-7574 allows remote, unauthenticated reboot/restore via /cgi-bin/lighttpd.cgi. Public exploit, no patch yet. Restrict access & monitor! https://radar.offseq.com/threat/cve-2025-7574-improper-authentication-in-lb-link-b-84743308 #OffSeq #RouterSecurity #CVE20257574
##updated 2025-07-15T13:14:24.053000
1 posts
LPE in Cato Linux client.
sev:HIGH 8.6 - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/AU:Y/R:U/RE:M/U:Green
##An issue in Cato Networks' CatoClient for Linux, before version 5.5, allows a local attacker to escalate privileges to root by exploiting improper symbolic link handling.
updated 2025-07-15T03:30:37
1 posts
../ in Zyxel access points.
sev:HIGH 7.2 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
##The path traversal vulnerability in the file_upload-cgi CGI program of certain AP firmware versions could allow an authenticated attacker with administrator privileges to access specific directories and delete files—such as the configuration file—on a vulnerable device. It is important to note that AP management interfaces are typically accessed within a LAN environment, and this attack would only be successful if strong, unique administrator passwords had already been compromised.
updated 2025-07-15T00:34:45
1 posts
1 repos
Critical template Injection flaw in LaRecipe Documentation Package enables remote code execution
A critical Server-Side Template Injection (SSTI) vulnerability (CVE-2025-53833) in LaRecipe PHP documentation package allows attackers to execute arbitrary code with minimal technical expertise by injecting malicious template syntax into user-controlled data.
**If you're using LaRecipe PHP documentation package, it's time to update. Isolation of the web application may help but usually these systems are built to have a lot of users. So don't delay, patch to version 2.8.1 or later. Aheck your access logs for exploitation attempts and consider adding a Web Application Firewall (WAF) for additional protection.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-template-injection-flaw-in-larecipe-documentation-package-enables-remote-code-execution-g-a-g-7-h/gD2P6Ple2L
updated 2025-07-14T21:09:06.773000
13 posts
14 repos
https://github.com/FrenzisRed/CVE-2025-5777
https://github.com/bughuntar/CVE-2025-5777
https://github.com/win3zz/CVE-2025-5777
https://github.com/idobarel/CVE-2025-5777
https://github.com/nocerainfosec/cve-2025-5777
https://github.com/SleepNotF0und/CVE-2025-5777
https://github.com/Chocapikk/CVE-2025-5777
https://github.com/orange0Mint/CitrixBleed-2-CVE-2025-5777
https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-
https://github.com/0xgh057r3c0n/CVE-2025-5777
https://github.com/cyberleelawat/ExploitVeer
https://github.com/B1ack4sh/Blackash-CVE-2025-5777
Updated #CitrixBleed2 scans https://github.com/GossiTheDog/scanning/blob/main/CVE-2025-5777-CitrixBleed2-ElectricBoogaloo-patching.txt
Fields - IP, SSL certification hostnames, Netscaler firmware, if vulnerable to CVE-2025-5777
I've had a few orgs contest that they're not vulnerable and the scan is wrong. I've assisted each org, and in each case they've been wrong - they'd patched the wrong Netscaler, the passive HA node etc.
##Updated #CitrixBleed2 scans https://github.com/GossiTheDog/scanning/blob/main/CVE-2025-5777-CitrixBleed2-ElectricBoogaloo-patching.txt
Fields - IP, SSL certification hostnames, Netscaler firmware, if vulnerable to CVE-2025-5777
I've had a few orgs contest that they're not vulnerable and the scan is wrong. I've assisted each org, and in each case they've been wrong - they'd patched the wrong Netscaler, the passive HA node etc.
##“A critical Citrix NetScaler vulnerability, tracked as CVE-2025-5777 and dubbed "CitrixBleed 2," was actively exploited nearly two weeks before proof-of-concept (PoC) exploits were made public, despite Citrix stating that there was no evidence of attacks.”
##Citrix Bleed 2 exploited weeks before PoCs as Citrix denied attacks
A critical Citrix NetScaler vulnerability, tracked as CVE-2025-5777 and dubbed "CitrixBleed 2," was actively exploited nearly two weeks before...
🔗️ [Bleepingcomputer] https://link.is.it/eX1RbT
##Citrix have a blog out about hunting for #CitrixBleed2
It's what was in my earlier blog - look for invalid characters in the username field and duplicate sessions with different IPs
##I've created a pull request to detect CitrixBleed 2 into Burp's Bcheck repository: https://github.com/PortSwigger/BChecks/pull/253
The code is here if you want to give it a try:
https://github.com/felmoltor/BChecks/blob/main/vulnerabilities-CVEd/CVE-2025-5777%20-%20CitrixBleed%202.bcheck
GreyNoise blog just out about #CitrixBleed2, they see exploitation from IPs in China from June 23rd targeting specifically Netscaler appliances https://www.greynoise.io/blog/exploitation-citrixbleed-2-cve-2025-5777-before-public-poc
##🩸& #threatintel | We (@greynoise) just published a quick note (https://www.greynoise.io/blog/exploitation-citrixbleed-2-cve-2025-5777-before-public-poc) regarding CVE-2025-5777 - CitrixBleed 2
The main takeaway is we, first hand, observed exploitation almost two weeks before the POC was released, so ensure all retro threat hunting goes back at LEAST a month, but ideally further.
1/2
@GossiTheDog 🧐 are you referring to CVE-2025-5777 or did I miss yet another? We hadn’t planned on it but what are you thinking?
##New CitrixBleed 2 scan data:
+7000 extra hosts added this round, host list is so large you need to use the raw view to see it.
Next set of data publication likely Friday, a month since the patch became available.
3832 orgs/hosts still unpatched.
##Updated CitrixBleed 2 scan results: https://github.com/GossiTheDog/scanning/blob/main/CVE-2025-5777-CitrixBleed2-ElectricBoogaloo-patching.txt
It's down from 24% unpatched to 17% unpatched
The results are partial still, the actual numbers still vuln will be higher.
##Citrix NetScaler Memory Leak Exploit https://github.com/bughuntar/CVE-2025-5777
##If you ask Citrix support for IOCs for CVE-2025-5777 and they send you a script to run that looks for .php files - they’ve sent you an unrelated script, which has nothing to do with session hijacking or memory overread.
##updated 2025-07-14T18:31:44
10 posts
8 repos
https://github.com/blindma1den/CVE-2025-47812
https://github.com/rxerium/CVE-2025-47812
https://github.com/pevinkumar10/CVE-2025-47812
https://github.com/4m3rr0r/CVE-2025-47812-poc
https://github.com/ill-deed/WingFTP-CVE-2025-47812-illdeed
https://github.com/0xgh057r3c0n/CVE-2025-47812
I've created a passive detection script to detect instances that are vulnerable to critical RCE tagged as CVE-2025-47812:
https://github.com/rxerium/CVE-2025-47812/tree/main
Around ~4000 instances exposed to the internet as of 25.07.16
`http.favicon.hash:963565804`
🟥𝐋𝐂𝐒𝐂-𝐈𝐄 𝐃𝐚𝐢𝐥𝐲 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐅𝐢𝐧𝐝𝐢𝐧𝐠𝐬-𝟏𝟓 𝐉𝐮𝐥𝐲 𝟐𝟎𝟐𝟓🟥
News:
1. Ireland's National Treasury Management Agency to review security protocols after losing 5 million euros in phishing attack
2. Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
3. Federal IT Contractor Pays $14.75 Million Fine to Settle Cyber Fraud Charges
https://thecyberexpress.com/federal-contractor-pays-14m-to-settle-fraud/
4. How Trump's Cyber Cuts Dismantle Federal Information Sharing
https://www.bankinfosecurity.com/how-trumps-cyber-cuts-dismantle-federal-information-sharing-a-28964
5. New White House cyber executive order pushes rules as code
https://cyberscoop.com/new-white-house-cyber-executive-order-pushes-rules-as-code-op-ed/
6. PoC Released for High-Severity Git CLI Vulnerability Allowing Arbitrary File Writes
https://securitylabs.datadoghq.com/articles/git-arbitrary-file-write/
---
Global Breaches and Data Leaks:
1. Flutter Entertainment (Paddy Power and Betfair) users warned of 'email danger' after breach
https://www.bbc.com/news/articles/cz7l29zved9o
---
Tactical Reports with IOCs:
1. Heavy metal: the new group of Telemancon attacks industrial organizations
https://www.f6.ru/blog/telemancon/
2. GLOBAL GROUP: Emerging Ransomware-as-a-Service, Supporting AI Driven Negotiation and Mobile Control Panel for Their Affiliates
https://blog.eclecticiq.com/global-group-emerging-ransomware-as-a-service
3. KongTuke FileFix Leads to New Interlock RAT Variant
https://thedfirreport.com/2025/07/14/kongtuke-filefix-leads-to-new-interlock-rat-variant/
4. BlackSuit: A Hybrid Approach with Data Exfiltration and Encryption
https://www.cybereason.com/blog/blacksuit-data-exfil
5. Likely Belarus-Nexus Threat Actor Delivers Downloader to Poland
https://dmpdump.github.io/posts/Belarus-nexus_Threat_Actor_Target_Poland/
6. OCTALYN Stealer
https://www.cyfirma.com/research/octalyn-stealer-unmasked/
7. Finding Fake/Phishing Domains with HTML Features in Validin
https://www.validin.com/blog/http_feature_pivoting/
8. Crypto Wallets Continue to be Drained in Elaborate Social Media Scam
https://www.darktrace.com/blog/crypto-wallets-continue-to-be-drained-in-elaborate-social-media-scam
9. Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication
https://unit42.paloaltonetworks.com/windows-backdoor-for-novel-c2-communication/
10. Evolving Tactics of SLOW#TEMPEST: A Deep Dive Into Advanced Malware Techniques
https://unit42.paloaltonetworks.com/slow-tempest-malware-obfuscation/
11. Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader
https://socket.dev/blog/contagious-interview-campaign-escalates-67-malicious-npm-packages
12. Wing FTP Server Remote Code Execution (CVE-2025-47812) Exploited in the Wild
https://www.huntress.com/blog/wing-ftp-server-remote-code-execution-cve-2025-47812-exploited-in-wild
13. Matanbuchus 3.0 Loader
https://github.com/prodaft/malware-ioc/tree/master/Matanbuchus
14. CoreSecThree Framework
https://github.com/prodaft/malware-ioc/tree/master/CoreSecThree
15. Malware Found in Official GravityForms Plugin Indicating Supply Chain Breach
https://patchstack.com/articles/critical-malware-found-in-gravityforms-official-plugin-site/
---
APT IOCs:
1. Possible Scattered Spider
cca039482a104d5d9b04bd2e20f6bb64[.]apm[.]us-west-2[.]aws[.]msicrosoft[.]com
outlook[.]msicrosoft[.]com
usa[.]msicrosoft[.]com
ftp[.]msicrosoft[.]com
logincdn[.]msicrosoft[.]com
ulgroup[.]msicrosoft[.]com
login1[.]msicrosoft[.]com
img6[.]msicrosoft[.]com
vn3hg[.]msicrosoft[.]com
msalaunch[.]msicrosoft[.]com
dotfoods[.]msicrosoft[.]com
sso4[.]msicrosoft[.]com
login[.]msicrosoft[.]com
js[.]msicrosoft[.]com
browser[.]msicrosoft[.]com
o[.]msicrosoft[.]com
help[.]msicrosoft[.]com
img1[.]msicrosoft[.]com
fpt2[.]msicrosoft[.]com
authh[.]msicrosoft[.]com
secure[.]msicrosoft[.]com
msfed[.]msicrosoft[.]com
sp[.]authpoint[.]usa1[.]msicrosoft[.]com
res[.]msicrosoft[.]com
mmcapi[.]msicrosoft[.]com
wcpstatic[.]msicrosoft[.]com
account[.]msicrosoft[.]com
ssoo[.]msicrosoft[.]com
gui[.]msicrosoft[.]com
office[.]msicrosoft[.]com
ads[.]msicrosoft[.]com
sso3[.]msicrosoft[.]com
sci[.]msicrosoft[.]com
winsscp[.]org
146.70.87[.]184
www-mlcrosoft[.]com
account.www-mlcrosoft[.]com
sso.www-mlcrosoft[.]com
ssoo.www-mlcrosoft[.]com
18.219.115[.]252
18.117.173[.]7
188.166.149[.]50
kennedywilsoninc[.]com
2. Kimsuky
144[.]172[.]104[.]10
docsdeliver[.]mydns[.]jp
hometxdoc[.]mydns[.]bz
userinfoblg[.]o-r[.]kr
binfo[.]userinfoblg[.]o-r[.]kr
docinfo[.]docsdeliver[.]mydns[.]jp
usr[.]hometxdoc[.]mydns[.]bz
a-info[.]userinfoblg[.]o-r[.]kr
b-info[.]userinfoblg[.]o-r[.]kr
c-info[.]userinfoblg[.]o-r[.]kr
d-info[.]userinfoblg[.]o-r[.]kr
e-info[.]userinfoblg[.]o-r[.]kr
f-info[.]userinfoblg[.]o-r[.]kr
g-info[.]userinfoblg[.]o-r[.]kr
h-info[.]userinfoblg[.]o-r[.]kr
i-info[.]userinfoblg[.]o-r[.]kr
j-info[.]userinfoblg[.]o-r[.]kr
k-info[.]userinfoblg[.]o-r[.]kr
l-info[.]userinfoblg[.]o-r[.]kr
m-info[.]userinfoblg[.]o-r[.]kr
n-info[.]userinfoblg[.]o-r[.]kr
o-info[.]userinfoblg[.]o-r[.]kr
p-info[.]userinfoblg[.]o-r[.]kr
q-info[.]userinfoblg[.]o-r[.]kr
r-info[.]userinfoblg[.]o-r[.]kr
s-info[.]userinfoblg[.]o-r[.]kr
t-info[.]userinfoblg[.]o-r[.]kr
u-info[.]userinfoblg[.]o-r[.]kr
v-info[.]userinfoblg[.]o-r[.]kr
w-info[.]userinfoblg[.]o-r[.]kr
x-info[.]userinfoblg[.]o-r[.]kr
y-info[.]userinfoblg[.]o-r[.]kr
z-info[.]userinfoblg[.]o-r[.]kr
2. bluenoroff
us05zoom[.]com
us05zoom[.]us[.]com
---
Threat Hunting / DFIR/ Malware:
1. Researchers foil $10M DeFi backdoor in thousands of smart contracts
https://x.com/deeberiroz/status/1943041785476894996
2. Chasing Ghosts Over RDP: Lateral Movement in Tiny Bitmaps
3. Threat Actor Intelligence Report: 1ucif3r / Lucifer
4. Breaking down the UserAssist artifact structure
https://securelist.com/userassist-artifact-forensic-value-for-incident-response/116911/
5. Unlocking Advanced Android Capabilities Without Root
6. ClickFix Chaos: A Deep Dive into Rhadamanthys Infostealer’s Stealth and Steal Tactics
7. Threat Actor Spotlight: Pryx
https://www.morado.io/blog-posts/threat-actor-spotlight-pryx
8. Phishing For Gemini
https://0din.ai/blog/phishing-for-gemini
9. Exploiting Public APP_KEY Leaks to Achieve RCE in Hundreds of Laravel Applications
https://blog.gitguardian.com/exploiting-public-app_key-leaks/
10. [Project 001] Operation Wall Breach: Sysmon Threat Hunt — A Scout Regiment Case File
11. 195. Hunting for Interlock RAT PHP Based Variant
https://www.knowyouradversary.ru/2025/07/195-hunting-for-interlock-rat-php-based.html
12. Brewing Trouble — Dissecting a macOS Malware Campaign
https://medium.com/deriv-tech/brewing-trouble-dissecting-a-macos-malware-campaign-90c2c24de5dc
---
Light Reading:
1. Russia-linked group spoofing European journalists to spread disinformation
https://substack.com/@gnidaproject/p-167032916
2. Can identity systems survive geopolitical cyberwar? Israel’s security test
3. From Tanks to TikTok: Adapting Article 5 for Graduated Responses to Hybrid Warfare
https://smallwarsjournal.com/2025/07/15/adapting-article-5-responses-to-hybrid-warfare/
4. Russia Uses Slovak Cyber Firm to Expose Ukrainian Soldiers Online
https://thedefensepost.com/2025/07/15/russia-slovakia-ukrainian-soldiers/
---
##New.
CISA has added to the KEV catalogue.
- CVE-2025-47812: Wing FTP Server Improper Neutralization of Null Byte or NUL Character Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-47812 #CISA #cybersecurity #infosec
##CVE ID: CVE-2025-47812
Vendor: Wing FTP Server
Product: Wing FTP Server
Date Added: 2025-07-14
Notes: https://www.wftpserver.com/serverhistory.htm ; https://nvd.nist.gov/vuln/detail/CVE-2025-47812
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-47812
Twas nice of KEV to catch up to us in caring about the Wing FTP RCE
##Critical remote code execution flaw in Wing FTP Server actively exploited
Huntress researchers report active exploitation of a critical perfect 10 CVSS vulnerability (CVE-2025-47812) in Wing FTP Server that allows attackers to execute arbitrary system commands with highest privileges through Lua code injection via malicious HTTP POST requests to the web interface. The exploitation campaign, observed since July 1, 2025, targets approximately 5,000 internet-accessible Wing FTP servers with exposed web interfaces, with attackers creating persistence, downloading malicious files, and installing remote access tools.
**One more reminder that this is an URGENT patch! If you're running Wing FTP Server (any version up to 7.4.3), update NOW, because hackers are already attacking your Wing FTP Server.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/critical-remote-code-execution-flaw-in-wing-ftp-server-actively-exploited-n-m-3-i-c/gD2P6Ple2L
Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild https://thehackernews.com/2025/07/critical-wing-ftp-server-vulnerability.html
##We're seeing the opportunistic exploitation attempts hitting the WingFTP bug that the fine folks over at @huntress discovered.
Small # of IPs for now. All with malicious intent.
##Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild – Source:thehackernews.com https://ciso2ciso.com/critical-wing-ftp-server-vulnerability-cve-2025-47812-actively-being-exploited-in-the-wild-sourcethehackernews-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #TheHackerNews #Critical
##updated 2025-07-14T12:30:28
1 posts
This looks like an older disclosure of some vulns in Avid Nexis Agent but it includes a ../ that, at least at the time, was undocumented in gSOAP. That CVE was just published today.
##updated 2025-07-14T00:31:13
1 posts
[CVE-2024-58258] SugarCRM <= 14.0.0 (css/preview) LESS Code Injection Vulnerability https://karmainsecurity.com/KIS-2025-04
##updated 2025-07-13T21:30:32
2 posts
1 repos
Obscure kernel bug use-after-free and then the VLAI severity told me "maybe important" before I read the drama https://syst3mfailure.io/rbtree-family-drama/
#kernel #linux #exploitation #vulnerability
🔗 https://vulnerability.circl.lu/vuln/CVE-2025-38001#sightings
##[CVE-2025-38001] #Exploiting All Google #kernelCTF Instances And Debian 12 With A #0Day For $82k: A RBTree Family Drama (Part One: LTS & COS)
##updated 2025-07-11T21:31:11
1 posts
And another one.
https://www.facebook.com/security/advisories/cve-2025-30403
##A heap-buffer-overflow vulnerability is possible in mvfst via a specially crafted message during a QUIC session. This issue affects mvfst versions prior to v2025.07.07.00.
updated 2025-07-11T21:31:04
1 posts
SureForms WordPress Plugin flaw enables unauthenticated file deletion, potential site takeover
A vulnerabilityin the SureForms WordPress plugin (CVE-2025-6691) allows unauthenticated attackers to delete arbitrary files, including the wp-config.php file, which can force sites into setup mode and enable complete website takeover. Patches are available in multiple updated versions.
**If you have the SureForms WordPress plugin installed, immediately check your version and update to the latest patched release (1.7.4 or appropriate version for your branch). Don't delay this one, because you can't really hide the form, and updating the plugin is nearly trivial.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/sureforms-wordpress-plugin-flaw-enables-unauthenticated-file-deletion-potential-site-takeover-e-k-3-m-q/gD2P6Ple2L
updated 2025-07-10T15:32:17
1 posts
4 repos
https://github.com/neko205-mx/CVE-2025-6019_Exploit
https://github.com/dreysanox/CVE-2025-6019_Poc
Ahn Lab: Linux libblockdev Package Security Update Advisory (CVE-2025-6019) https://asec.ahnlab.com/en/89042/ #Linux #cybersecurity #infosec
##updated 2025-07-10T13:18:53.830000
1 posts
18 repos
https://github.com/ppd520/CVE-2025-48384
https://github.com/admin-ping/CVE-2025-48384-RCE
https://github.com/altm4n/cve-2025-48384
https://github.com/simplyfurious/CVE-2025-48384-submodule_test
https://github.com/liamg/CVE-2025-48384
https://github.com/acheong08/CVE-2025-48384
https://github.com/greatyy/CVE-2025-48384-p
https://github.com/NigelX/CVE-2025-48384
https://github.com/fishyyh/CVE-2025-48384-POC
https://github.com/nguyentranbaotran/cve-2025-48384-poc
https://github.com/ECHO6789/CVE-2025-48384-submodule
https://github.com/altm4n/cve-2025-48384-hub
https://github.com/p1026/CVE-2025-48384
https://github.com/vinieger/vinieger-CVE-2025-48384-Dockerfile
https://github.com/fishyyh/CVE-2025-48384
https://github.com/kallydev/cve-2025-48384-hook
From yesterday. Promo toward the end.
Arctic Wolf: PoC Available for High-Severity Arbitrary File Write in Git CLI (CVE-2025-48384) https://arcticwolf.com/resources/blog/poc-available-for-high-severity-arbitrary-file-write-in-git-cli-cve-2025-48384/ #cybersecurity #infosec
##updated 2025-07-09T18:30:40
1 posts
9 repos
https://github.com/Hacksparo/CVE-2025-32462
https://github.com/SpongeBob-369/cve-2025-32462
https://github.com/mylovem313/CVE-2025-32462
https://github.com/atomicjjbod/CVE-2025-32462
https://github.com/cyberpoul/CVE-2025-32462-POC
https://github.com/toohau/CVE-2025-32462-32463-Detection-Script-
https://github.com/cybersentinelx1/CVE-2025-32462-Exploit
updated 2025-07-09T18:15:39
1 posts
2 repos
https://github.com/nankuo/CVE-2025-48976_CVE-2025-48988
https://github.com/Samb102/POC-CVE-2025-48988-CVE-2025-48976
DoS in Apache Commons FileUpload. It impacts some F5 gear. And other things, I'm sure.
https://my.f5.com/manage/s/article/K000152614
##Allocation of resources for multipart headers with insufficient limits enabled a DoS vulnerability in Apache Commons FileUpload. This issue affects Apache Commons FileUpload: from 1.0 before 1.6; from 2.0.0-M1 before 2.0.0-M4. Users are recommended to upgrade to versions 1.6 or 2.0.0-M4, which fix the issue.
updated 2025-07-09T18:08:46
4 posts
1 repos
Critical RCE Vulnerability in mcp-remote: CVE-2025-6514 Threatens LLM Clients https://jfrog.com/blog/2025-6514-critical-mcp-remote-rce-vulnerability/
##Critical RCE Vulnerability in mcp-remote: CVE-2025-6514 Threatens LLM Clients https://jfrog.com/blog/2025-6514-critical-mcp-remote-rce-vulnerability/
##Critical RCE Vulnerability in mcp-remote: CVE-2025-6514 Threatens LLM Clients https://jfrog.com/blog/2025-6514-critical-mcp-remote-rce-vulnerability/
##Critical remote code execution flaw in mcp-remote exposes AI Systems to compromise
JFrog Security Research discovered a critical vulnerability (CVE-2025-6514) in the widely-used mcp-remote project that allows attackers to execute arbitrary operating system commands through OAuth authentication manipulation.
**If you use the mcp-remote npm package for connecting local LLM hosts to remote MCP servers, plan an urgent update to version 0.1.16. The flaw allows malicious MCP servers can push back commands to your computer and hack you. Also, make sure to only connect to trusted MCP servers using HTTPS connections.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-remote-code-execution-flaw-in-mcp-remote-exposes-ai-systems-to-compromise-g-r-q-n-e/gD2P6Ple2L
updated 2025-07-09T15:23:23.357000
1 posts
12 repos
https://github.com/ztgrace/CVE-2019-5418-Rails3
https://github.com/omarkurt/CVE-2019-5418
https://github.com/kailing0220/CVE-2019-5418
https://github.com/mpgn/CVE-2019-5418
https://github.com/mpgn/Rails-doubletap-RCE
https://github.com/random-robbie/CVE-2019-5418
https://github.com/takeokunn/CVE-2019-5418
https://github.com/daehyeok0618/CVE-2019-5418
https://github.com/brompwnie/CVE-2019-5418-Scanner
https://github.com/W01fh4cker/Serein
updated 2025-07-08T18:31:58
1 posts
We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by @_l0gg to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to @mwulftange
##updated 2025-07-08T18:31:51
1 posts
The weekly Cyber Intel Brief by AJ Nash is out! ⚠️
A suspected North American APT, NightEagle, targets Chinese tech sectors. Meanwhile, AI-powered impersonation attacks hit high-profile U.S. figures like Secretary of State Marco Rubio.
🔧 Microsoft patches 137 vulnerabilities including a wormable SPNEGO flaw (CVE-2025-47981).
🛡️ CISA adds 6 more to the KEV catalog—compliance due July 28–31.
Dive into the full brief ⬇️
https://bit.ly/4lKU9M9
updated 2025-07-08T18:31:49
2 posts
The Varonis team has published a write-up on a ServiceNow bug they found and got patched last week. Tracked as CVE-2025-3648, the vulnerability allows threat actors to infer data from the Now Platform without authentication.
##ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs https://thehackernews.com/2025/07/servicenow-flaw-cve-2025-3648-could.html
##updated 2025-07-08T16:18:34.923000
1 posts
CVE-2025-5333 - CVSS 9.5: Remote Code Execution in Broadcom Symantec Endpoint Management Suite (Altiris) https://www.lrqa.com/en/cyber-labs/remote-code-execution-in-broadcom-altiris-irm/
##updated 2025-07-01T18:30:34
1 posts
3 repos
https://github.com/abrewer251/CVE-2025-6543_CitrixNetScaler_PoC
@GossiTheDog this one is for CVE-2025-6543
##updated 2025-07-01T15:32:11
4 posts
5 repos
https://github.com/gmh5225/CVE-2025-6554-2
https://github.com/windz3r0day/CVE-2025-6554
https://github.com/PwnToday/CVE-2025-6554
CVE-2025-6554 marks the fifth actively exploited Chrome Zero-Day patched by Google in 2025 – Source: securityaffairs.com https://ciso2ciso.com/cve-2025-6554-marks-the-fifth-actively-exploited-chrome-zero-day-patched-by-google-in-2025-source-securityaffairs-com/ #rssfeedpostgeneratorecho #informationsecuritynews #ITInformationSecurity #SecurityAffairscom #CyberSecurityNews #PierluigiPaganini #SecurityAffairs #SecurityAffairs #BreakingNews #SecurityNews #hackingnews #Security #hacking #zeroday
##CVE-2025-6554 marks the fifth actively exploited Chrome Zero-Day patched by Google in 2025 https://securityaffairs.com/180001/hacking/cve-2025-6554-marks-the-fifth-actively-exploited-chrome-zero-day-patched-by-google-in-2025.html
##Google posted this yesterday. It affects critical CVE-2025-6192 and CVE-2025-5068, CVE-2025-5281, CVE-2025-6554.
Long Term Support Channel Update for ChromeOS https://chromereleases.googleblog.com/2025/07/long-term-support-channel-update-for.html #Google #cybersecurity #infosec #Chrome
##updated 2025-06-26T21:31:20
3 posts
4 repos
https://github.com/abrewer251/CVE-2025-20281-2-Cisco-ISE-RCE
https://github.com/B1ack4sh/Blackash-CVE-2025-20281
Yet another perfect 10 from Cisco!
##The vulnerability was added via an update to the security bulletin for CVE-2025-20281 and CVE-2025-20282, two similar RCE vulnerabilities that also received the maximum severity score, that impact ISE and ISE-PIC versions 3.4 and 3.3.
Cisco posted five vulnerability updates yesterday:
- Critical, affects CVE-2025-20281; CVE-2025-20282; and CVE-2025-20337 Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
- High, CVE-2025-20274: Cisco Unified Intelligence Center Arbitrary File Upload Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-file-upload-UhNEtStm
- Medium, CVE-2025-20272: Cisco Prime Infrastructure and Evolved Programmable Network Manager Blind SQL Injection Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-piepnm-bsi-25JJqsbb
- CVE-2025-20283; CVE-2025-20284; and CVE-2025-20285: Cisco Identity Services Engine Authenticated Remote Code Execution and Authorization Bypass Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-3VpsXOxO
- CVE-2025-20288: Cisco Unified Intelligence Center Server-Side Request Forgery Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-ssrf-JSuDjeV @TalosSecurity #cybersecurity #Infosec #Cisco
##Tracked as CVE-2025-20337, the shortcoming carries a CVSS score of 10.0 and is similar to CVE-2025-20281, which was patched by the networking equipment major late last month. https://thehackernews.com/2025/07/cisco-warns-of-critical-ise-flaw.html
##updated 2025-06-26T21:31:13
2 posts
Yet another perfect 10 from Cisco!
##The vulnerability was added via an update to the security bulletin for CVE-2025-20281 and CVE-2025-20282, two similar RCE vulnerabilities that also received the maximum severity score, that impact ISE and ISE-PIC versions 3.4 and 3.3.
Cisco posted five vulnerability updates yesterday:
- Critical, affects CVE-2025-20281; CVE-2025-20282; and CVE-2025-20337 Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
- High, CVE-2025-20274: Cisco Unified Intelligence Center Arbitrary File Upload Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-file-upload-UhNEtStm
- Medium, CVE-2025-20272: Cisco Prime Infrastructure and Evolved Programmable Network Manager Blind SQL Injection Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-piepnm-bsi-25JJqsbb
- CVE-2025-20283; CVE-2025-20284; and CVE-2025-20285: Cisco Identity Services Engine Authenticated Remote Code Execution and Authorization Bypass Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multi-3VpsXOxO
- CVE-2025-20288: Cisco Unified Intelligence Center Server-Side Request Forgery Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-ssrf-JSuDjeV @TalosSecurity #cybersecurity #Infosec #Cisco
##updated 2025-06-24T17:47:50
1 posts
4 repos
https://github.com/Dr0xharakiri/CVE-2023-48795
https://github.com/sameeralam3127/rhel8_cve_2023_48795
Am I reading this right in that it took PAN a year and a half to determine that PAN-OS 10.1 is impacted by Terrapin?
##updated 2025-06-23T20:16:21.633000
2 posts
7 repos
https://github.com/63square/CVE-2025-49132
https://github.com/uxieltc/CVE-2025-49132
https://github.com/nfoltc/CVE-2025-49132
https://github.com/melonlonmeo/CVE-2025-49132
https://github.com/Zen-kun04/CVE-2025-49132
🔥 CVE-2025-49132 (Pterodactyl Panel RCE) (10/10 RCE)
Active exploitation observed within days of disclosure.
https://viz.greynoise.io/tags/pterodactyl-panel-remote-code-execution-cve-2025-49132-attempt?days=10
2/4
🫖 & #threatintel - noticing a few other spikes orgs should be mindful of:
🔥 CVE-2025-49132 (Pterodactyl Panel RCE) (10/10 RCE)
⚡ CVE-2024-20439 (Cisco Smart Licensing Utility) (9.8/10, KEV)
📝 CVE-2017-18370 (Zyxel P660HN)
1/4
updated 2025-06-20T18:15:22.740000
2 posts
New. AMD security advisories:
- TPM Reference Implementation - CVE-2025-2884 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4011.html
- Uninitialized GPU Register Access - CVE-2024-21969 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6013.html
- GPU Memory Leaks - CVE-2023-4969 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6010.html #AMD #cybersecurity #infosec
##New. AMD security advisories:
- TPM Reference Implementation - CVE-2025-2884 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4011.html
- Uninitialized GPU Register Access - CVE-2024-21969 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6013.html
- GPU Memory Leaks - CVE-2023-4969 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6010.html #AMD #cybersecurity #infosec
##updated 2025-06-18T21:30:30
1 posts
Google posted this yesterday. It affects critical CVE-2025-6192 and CVE-2025-5068, CVE-2025-5281, CVE-2025-6554.
Long Term Support Channel Update for ChromeOS https://chromereleases.googleblog.com/2025/07/long-term-support-channel-update-for.html #Google #cybersecurity #infosec #Chrome
##updated 2025-06-13T18:15:21.710000
2 posts
New. AMD security advisories:
- TPM Reference Implementation - CVE-2025-2884 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4011.html
- Uninitialized GPU Register Access - CVE-2024-21969 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6013.html
- GPU Memory Leaks - CVE-2023-4969 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6010.html #AMD #cybersecurity #infosec
##New. AMD security advisories:
- TPM Reference Implementation - CVE-2025-2884 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4011.html
- Uninitialized GPU Register Access - CVE-2024-21969 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6013.html
- GPU Memory Leaks - CVE-2023-4969 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6010.html #AMD #cybersecurity #infosec
##updated 2025-06-09T16:15:44.833000
1 posts
Remote code execution flaw reported in Kafbat UI
A vulnerability in Kafbat UI version 1.0.0 (CVE-2025-49127) allows unauthenticated attackers to execute arbitrary code by exploiting the dynamic cluster configuration feature that fails to properly validate user-provided JMX endpoints. Organizations should immediately upgrade to version 1.1.0 or disable the dynamic configuration feature by setting DYNAMIC_CONFIG_ENABLED: 'false' to prevent exploitation through malicious HTTP PUT requests to the /api/config endpoint.
**If you're using Kafbat UI version 1.0.0, be aware that there's an attack vector that allows attackers to execute code without authentication. Isolate the API endpoints to only be accesible from trusted networks and communicate only with known servers. Disable the dynamic configuration feature by setting DYNAMIC_CONFIG_ENABLED: 'false' in your application configuration and then plan a patch.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/remote-code-execution-flaw-reported-in-kafbat-ui-p-3-3-y-l/gD2P6Ple2L
updated 2025-06-05T14:11:10.430000
1 posts
Google posted this yesterday. It affects critical CVE-2025-6192 and CVE-2025-5068, CVE-2025-5281, CVE-2025-6554.
Long Term Support Channel Update for ChromeOS https://chromereleases.googleblog.com/2025/07/long-term-support-channel-update-for.html #Google #cybersecurity #infosec #Chrome
##updated 2025-05-30T15:30:39
1 posts
Multiple vulnerabilities reported in Hitachi Energy Asset Suite, at least one critical
Hitachi Energy has disclosed multiple vulnerabilities in its Asset Suite platform affecting critical energy infrastructure, including a critical plaintext password storage flaw (CVE-2025-2500) that could enable unauthorized access and system compromise.
**If you're using Hitachi Energy Asset Suite, make sure the systems are isolated from the internet and used only for the dedicated purpose (no web browsing, email, or instant messaging.). Then contact the vendor for patches.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/multiple-vulnerabilities-reported-in-hitachi-energy-asset-suite-at-least-one-critical-u-e-h-o-t/gD2P6Ple2L
updated 2025-05-28T18:33:28
3 posts
Signal Clone App Under Attack: TeleMessage SGNL Vulnerability Exposes Sensitive Data in Massive Cybersecurity Breach
Hidden Dangers in Secure Messaging: The TeleMessage SGNL Vulnerability Unmasked In a world increasingly reliant on encrypted messaging, the discovery of a serious vulnerability in TeleMessage SGNL — a clone of the widely used Signal platform — is raising alarms across the cybersecurity landscape. Known officially as CVE-2025-48927, this flaw allows…
##Hackers scanning for TeleMessage Signal clone flaw exposing passwords
Researchers are seeing exploitation attempts for the CVE-2025-48927 vulnerability in the TeleMessage SGNL app, which allows retrieving usernames,...
🔗️ [Bleepingcomputer] https://link.is.it/p3UBhM
##Hackers scanning for TeleMessage Signal clone flaw exposing passwords
Researchers are seeing exploitation attempts for the CVE-2025-48927 vulnerability in the TeleMessage SGNL app, which allows retrieving usernames,...
🔗️ [Bleepingcomputer] https://link.is.it/p3UBhM
##updated 2025-05-28T15:35:30
1 posts
Google posted this yesterday. It affects critical CVE-2025-6192 and CVE-2025-5068, CVE-2025-5281, CVE-2025-6554.
Long Term Support Channel Update for ChromeOS https://chromereleases.googleblog.com/2025/07/long-term-support-channel-update-for.html #Google #cybersecurity #infosec #Chrome
##updated 2025-05-28T14:08:29.293000
3 posts
updated 2025-05-13T18:31:57
1 posts
1 repos
https://github.com/Onapsis/Onapsis-Mandiant-CVE-2025-31324-Vuln-Compromise-Assessment
"Convergence" around SAP NetWeaver vulnerabilities as entry specifically CVE-2025-31324 sometimes chained with CVE-2025-42999.
2025-07-14: (kudelskisecurity.com) SAP NetWeaver Visual Composer Zero-Day Exploitation: Infrastructure Analysis and Ransomware Attribution
2025-06-16: (darktrace.com) Critical SAP NetWeaver Zero-Day Exploitation: Comprehensive Analysis of CVE-2025-31324 Attacks and Detection Strategies
2025-06-13: (cyfirma.com) Ransomware Landscape Evolution: Advanced Evasion Techniques and Emerging Threat Groups Drive Global Attack Surge
Reference: https://www.cyfirma.com/research/tracking-ransomware-may-2025/
2025-05-27: (trendmicro.com) Earth Lamia APT Group Deploys Custom PULSEPACK Backdoor in Multi-Industry Campaign Targeting Brazil, India, and Southeast Asia
Reference: https://www.trendmicro.com/en_us/research/25/e/earth-lamia.html
##updated 2025-05-03T01:00:02.097000
3 posts
5 repos
https://github.com/sfewer-r7/CVE-2025-22457
https://github.com/TRone-ux/CVE-2025-22457
https://github.com/B1ack4sh/Blackash-CVE-2025-22457
Ivanti VPNs Under Siege: Cobalt Strike, Vshell RAT and a New Sophisticated Attacks
A Rising Wave of Silent Infiltrations An alarming new cyber threat campaign is sweeping across enterprise networks, using unpatched Ivanti Connect Secure VPN appliances as the primary gateway. Security experts are sounding the alarm over the active exploitation of two recently disclosed vulnerabilities — CVE-2025-0282 and CVE-2025-22457 — which are enabling attackers to infiltrate…
##JPCERT/CC's 増渕 維摩 (Yuma Masubuchi) looks into malware identified in attacks exploiting Ivanti Connect Secure vulnerabilities CVE-2025-0282 and CVE-2025-22457 from December 2024 to the present. https://blogs.jpcert.or.jp/en/2025/07/ivanti_cs.html
##JPCERT/CC's 増渕 維摩 (Yuma Masubuchi) looks into malware identified in attacks exploiting Ivanti Connect Secure vulnerabilities CVE-2025-0282 and CVE-2025-22457 from December 2024 to the present. https://blogs.jpcert.or.jp/en/2025/07/ivanti_cs.html
##updated 2025-05-02T15:31:16
1 posts
18 repos
https://github.com/JonathanStross/CVE-2025-31324
https://github.com/Pengrey/CVE-2025-31324
https://github.com/moften/CVE-2025-31324-NUCLEI
https://github.com/redrays-io/CVE-2025-31324
https://github.com/nairuzabulhul/nuclei-template-cve-2025-31324-check
https://github.com/rf-peixoto/sap_netweaver_cve-2025-31324-
https://github.com/BlueOWL-overlord/Burp_CVE-2025-31324
https://github.com/NULLTRACE0X/CVE-2025-31324
https://github.com/ODST-Forge/CVE-2025-31324_PoC
https://github.com/Onapsis/Onapsis-Mandiant-CVE-2025-31324-Vuln-Compromise-Assessment
https://github.com/moften/CVE-2025-31324
https://github.com/rxerium/CVE-2025-31324
https://github.com/Onapsis/Onapsis_CVE-2025-31324_Scanner_Tools
https://github.com/Alizngnc/SAP-CVE-2025-31324
https://github.com/nullcult/CVE-2025-31324-File-Upload
https://github.com/abrewer251/CVE-2025-31324_PoC_SAP
"Convergence" around SAP NetWeaver vulnerabilities as entry specifically CVE-2025-31324 sometimes chained with CVE-2025-42999.
2025-07-14: (kudelskisecurity.com) SAP NetWeaver Visual Composer Zero-Day Exploitation: Infrastructure Analysis and Ransomware Attribution
2025-06-16: (darktrace.com) Critical SAP NetWeaver Zero-Day Exploitation: Comprehensive Analysis of CVE-2025-31324 Attacks and Detection Strategies
2025-06-13: (cyfirma.com) Ransomware Landscape Evolution: Advanced Evasion Techniques and Emerging Threat Groups Drive Global Attack Surge
Reference: https://www.cyfirma.com/research/tracking-ransomware-may-2025/
2025-05-27: (trendmicro.com) Earth Lamia APT Group Deploys Custom PULSEPACK Backdoor in Multi-Industry Campaign Targeting Brazil, India, and Southeast Asia
Reference: https://www.trendmicro.com/en_us/research/25/e/earth-lamia.html
##updated 2025-04-22T16:53:42
1 posts
8 repos
https://github.com/celsius026/poc_CVE-2025-24016
https://github.com/cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE-PoC
https://github.com/0xjessie21/CVE-2025-24016
https://github.com/MuhammadWaseem29/CVE-2025-24016
https://github.com/rxerium/CVE-2025-24016
https://github.com/guinea-offensive-security/Wazuh-RCE
https://github.com/B1ack4sh/Blackash-CVE-2025-24016
https://github.com/huseyinstif/CVE-2025-24016-Nuclei-Template
Unverified exploit for that Wazuh RCE vuln in February: CVE-2025-24016
##updated 2025-04-11T03:59:22
1 posts
* 0x20000000 = start of RAM on most ARM MCUs
* 0xbfc00000 = MIPS reset vector
* 0x00007fffffffffff = last valid address in amd64 (see CVE-2012-0217 et al)
* 0x00 = indirect memory addressing register on 8-bit PIC (not null)
* 0x41414141 = no explanation needed
updated 2025-04-09T04:18:30
1 posts
[CVE-2025-32461] Tiki Wiki CMS Groupware <= 28.3 Two SSTI Vulnerabilities https://karmainsecurity.com/KIS-2025-03
##updated 2025-03-28T15:12:44.513000
1 posts
66 repos
https://github.com/zomasec/CVE-2024-4577
https://github.com/AlperenY-cs/CVE-2024-4577
https://github.com/olebris/CVE-2024-4577
https://github.com/huseyinstif/CVE-2024-4577-Nuclei-Template
https://github.com/ZeroMemoryEx/PHP-CGI-INTERNAL-RCE
https://github.com/bibo318/CVE-2024-4577-RCE-ATTACK
https://github.com/princew88/CVE-2024-4577
https://github.com/Jcccccx/CVE-2024-4577
https://github.com/a-roshbaik/CVE-2024-4577-PHP-RCE
https://github.com/mistakes1337/CVE-2024-4577
https://github.com/ywChen-NTUST/PHP-CGI-RCE-Scanner
https://github.com/Dejavu666/CVE-2024-4577
https://github.com/bl4cksku11/CVE-2024-4577
https://github.com/Gill-Singh-A/CVE-2024-4577-Exploit
https://github.com/Sysc4ll3r/CVE-2024-4577
https://github.com/tntrock/CVE-2024-4577_PowerShell
https://github.com/Entropt/CVE-2024-4577_Analysis
https://github.com/ibrahmsql/CVE-2024-4577
https://github.com/d3ck4/Shodan-CVE-2024-4577
https://github.com/manuelinfosec/CVE-2024-4577
https://github.com/gh-ost00/CVE-2024-4577-RCE
https://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE
https://github.com/PhinehasNarh/CVE-2024-4577-LetsDefend-walkthrough
https://github.com/tpdlshdmlrkfmcla/php-cgi-cve-2024-4577
https://github.com/Skycritch/CVE-2024-4577
https://github.com/hexedbyte/cve-2024-4577
https://github.com/gotr00t0day/CVE-2024-4577
https://github.com/nemu1k5ma/CVE-2024-4577
https://github.com/BTtea/CVE-2024-4577-RCE-PoC
https://github.com/JeninSutradhar/CVE-2024-4577-checker
https://github.com/bughuntar/CVE-2024-4577
https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOIT
https://github.com/0x20c/CVE-2024-4577-nuclei
https://github.com/longhoangth18/CVE-2024-4577
https://github.com/charis3306/CVE-2024-4577
https://github.com/Chocapikk/CVE-2024-4577
https://github.com/zjhzjhhh/CVE-2024-4577
https://github.com/xcanwin/CVE-2024-4577-PHP-RCE
https://github.com/Sh0ckFR/CVE-2024-4577
https://github.com/11whoami99/CVE-2024-4577
https://github.com/watchtowrlabs/CVE-2024-4577
https://github.com/dbyMelina/CVE-2024-4577
https://github.com/WanLiChangChengWanLiChang/CVE-2024-4577-RCE-EXP
https://github.com/byteReaper77/CVE-2024-4577
https://github.com/l0n3m4n/CVE-2024-4577-RCE
https://github.com/BitMEXResearch/CVE-2024-4577
https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE
https://github.com/phirojshah/CVE-2024-4577
https://github.com/TAM-K592/CVE-2024-4577
https://github.com/ggfzx/CVE-2024-4577
https://github.com/taida957789/CVE-2024-4577
https://github.com/sug4r-wr41th/CVE-2024-4577
https://github.com/Wh02m1/CVE-2024-4577
https://github.com/Didarul342/CVE-2024-4577
https://github.com/gmh5225/CVE-2024-4577-PHP-RCE
https://github.com/Junp0/CVE-2024-4577
https://github.com/ahmetramazank/CVE-2024-4577
https://github.com/VictorShem/CVE-2024-4577
https://github.com/jakabakos/CVE-2024-4577-PHP-CGI-argument-injection-RCE
https://github.com/KimJuhyeong95/cve-2024-4577
https://github.com/Night-have-dreams/php-cgi-Injector
https://github.com/r0otk3r/CVE-2024-4577
https://github.com/a-roshbaik/CVE-2024-4577
CVE-2024-4577: payload analysis
As I mentioned in a previous post, I’ve started using the data collected by our honeypot to analyze some exploitation attempts, and a few days ago,...
🔗️ [Roccosicilia] https://link.is.it/kqWMt9
##updated 2025-02-07T18:31:59
1 posts
NoBooze1 Malware Targets TP-Link Routers via CVE-2019-9082 https://www.f5.com/labs/articles/threat-intelligence/nobooze1-malware-targets-tp-link-routers-via-cve-2019-9082
##updated 2025-01-28T18:32:27
3 posts
11 repos
https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit
https://github.com/AnonStorks/CVE-2025-0282-Full-version
https://github.com/44xo/CVE-2025-0282
https://github.com/almanatra/CVE-2025-0282
https://github.com/rxwx/pulse-meter
https://github.com/AdaniKamal/CVE-2025-0282
https://github.com/Hexastrike/Ivanti-Connect-Secure-Logs-Parser
https://github.com/sfewer-r7/CVE-2025-0282
https://github.com/watchtowrlabs/CVE-2025-0282
Ivanti VPNs Under Siege: Cobalt Strike, Vshell RAT and a New Sophisticated Attacks
A Rising Wave of Silent Infiltrations An alarming new cyber threat campaign is sweeping across enterprise networks, using unpatched Ivanti Connect Secure VPN appliances as the primary gateway. Security experts are sounding the alarm over the active exploitation of two recently disclosed vulnerabilities — CVE-2025-0282 and CVE-2025-22457 — which are enabling attackers to infiltrate…
##JPCERT/CC's 増渕 維摩 (Yuma Masubuchi) looks into malware identified in attacks exploiting Ivanti Connect Secure vulnerabilities CVE-2025-0282 and CVE-2025-22457 from December 2024 to the present. https://blogs.jpcert.or.jp/en/2025/07/ivanti_cs.html
##JPCERT/CC's 増渕 維摩 (Yuma Masubuchi) looks into malware identified in attacks exploiting Ivanti Connect Secure vulnerabilities CVE-2025-0282 and CVE-2025-22457 from December 2024 to the present. https://blogs.jpcert.or.jp/en/2025/07/ivanti_cs.html
##updated 2025-01-16T21:32:03
1 posts
1 repos
Fortinet Outbreak Alert: TBK DVRs Botnet Attack (High-severity, exploiting CVE-2024-3721): https://fortiguard.fortinet.com/outbreak-alert/tbk-dvrs-botnet-attack @fortinet #cybersecurity #infosec #IoT
From yesterday: SimpleHelp Support Software Attack (high-severity, exploiting CVE-2024-57727) https://fortiguard.fortinet.com/outbreak-alert/simplehelp-ransomware-attack
##updated 2024-09-13T21:31:22
2 posts
⚡ CVE-2024-20439 (Cisco Smart Licensing Utility) (9.8/10, KEV)
Hardcoded credentials have been known since late last year.
##🫖 & #threatintel - noticing a few other spikes orgs should be mindful of:
🔥 CVE-2025-49132 (Pterodactyl Panel RCE) (10/10 RCE)
⚡ CVE-2024-20439 (Cisco Smart Licensing Utility) (9.8/10, KEV)
📝 CVE-2017-18370 (Zyxel P660HN)
1/4
updated 2024-09-13T09:31:32
1 posts
Go hack the robots!
https://www.ros.org/blog/noetic-eol/
After May 31st, 2025 ROS 1 Noetic users may find themselves exposed to un-patched security vulnerabilities and bugs, with few avenues of support short of fixing these issues themselves and recompiling Noetic from source.
https://www.cve.org/CVERecord?id=CVE-2024-39289
https://www.cve.org/CVERecord?id=CVE-2024-39385
https://www.cve.org/CVERecord?id=CVE-2024-41148
https://www.cve.org/CVERecord?id=CVE-2024-41921
Edit to add a couple more.
##updated 2024-09-07T00:32:35
1 posts
4 repos
https://github.com/0xbassiouny1337/CVE-2024-42009
https://github.com/Bhanunamikaze/CVE-2024-42009
updated 2024-08-12T15:30:49
1 posts
🚨🇧🇪Alleged Admin Access Sale to Belgian IT Company's Zabbix Monitoring Panel
A threat actor is selling admin access to a Zabbix monitoring system allegedly belonging to a Belgium-based IT company with $7M revenue.
Details of the Access:
- Platform: Zabbix
- Version: 3.0.32
- Hosts Monitored: 63
- Items Tracked: 5,034
- Triggers: 2,646
- User Accounts:
- Groups: 16
CVE Exposure: CVE-2024-22122, CVE-2024-22120 (These are critical Zabbix vulnerabilities exploited for initial access)
What’s Included?
Full Admin Access to the monitoring infrastructure
Price: 300$
##updated 2024-05-17T12:30:59
1 posts
4 repos
https://github.com/isPique/CVE-2024-22120-RCE-with-gopher
https://github.com/Akshath-Nagulapally/ReproducingCVEs_Akshath_Nagulapally
🚨🇧🇪Alleged Admin Access Sale to Belgian IT Company's Zabbix Monitoring Panel
A threat actor is selling admin access to a Zabbix monitoring system allegedly belonging to a Belgium-based IT company with $7M revenue.
Details of the Access:
- Platform: Zabbix
- Version: 3.0.32
- Hosts Monitored: 63
- Items Tracked: 5,034
- Triggers: 2,646
- User Accounts:
- Groups: 16
CVE Exposure: CVE-2024-22122, CVE-2024-22120 (These are critical Zabbix vulnerabilities exploited for initial access)
What’s Included?
Full Admin Access to the monitoring infrastructure
Price: 300$
##updated 2024-04-13T12:30:30
1 posts
Fortinet Outbreak Alert: TBK DVRs Botnet Attack (High-severity, exploiting CVE-2024-3721): https://fortiguard.fortinet.com/outbreak-alert/tbk-dvrs-botnet-attack @fortinet #cybersecurity #infosec #IoT
From yesterday: SimpleHelp Support Software Attack (high-severity, exploiting CVE-2024-57727) https://fortiguard.fortinet.com/outbreak-alert/simplehelp-ransomware-attack
##updated 2024-04-11T21:16:45
2 posts
📝 CVE-2017-18370 (Zyxel P660HN)
Oldie but goodie.
https://viz.greynoise.io/tags/zyxel-p660hn-viewlog-asp-command-injection-attempt?days=30
4/4
🫖 & #threatintel - noticing a few other spikes orgs should be mindful of:
🔥 CVE-2025-49132 (Pterodactyl Panel RCE) (10/10 RCE)
⚡ CVE-2024-20439 (Cisco Smart Licensing Utility) (9.8/10, KEV)
📝 CVE-2017-18370 (Zyxel P660HN)
1/4
updated 2024-04-04T06:28:11
1 posts
1 repos
Greenshot sollten sich alle anschauen, die öfters Screenshots unter Windows oder macOS machen.
##updated 2024-04-04T05:46:09
1 posts
4 repos
https://github.com/cashapp323232/CVE-2023-2868CVE-2023-2868
https://github.com/getdrive/PoC
There is a lot less stuff so far using GNU tar than I expected. Lots of roll-your-own shit though like we saw with CVE-2023-2868 in Barracudas.
##Go hack more Ubiquiti shit.
sev:CRIT 9.8 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
##An Improper Input Validation in certain UniFi Access devices could allow a Command Injection by a malicious actor with access to UniFi Access management network.
Go hack more Ubiquiti shit.
sev:CRIT 9.8 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
##An Improper Input Validation in certain UniFi Access devices could allow a Command Injection by a malicious actor with access to UniFi Access management network.
New. AMD security advisories:
- TPM Reference Implementation - CVE-2025-2884 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4011.html
- Uninitialized GPU Register Access - CVE-2024-21969 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6013.html
- GPU Memory Leaks - CVE-2023-4969 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6010.html #AMD #cybersecurity #infosec
##New. AMD security advisories:
- TPM Reference Implementation - CVE-2025-2884 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-4011.html
- Uninitialized GPU Register Access - CVE-2024-21969 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6013.html
- GPU Memory Leaks - CVE-2023-4969 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6010.html #AMD #cybersecurity #infosec
##DoS in 7-Zip.
https://securitylab.github.com/advisories/GHSL-2025-058_7-Zip/
##Zeroes written outside heap buffer in RAR5 handler may lead to memory corruption and denial of service.
1 posts
2 repos
https://github.com/B1ack4sh/Blackash-CVE-2025-27210
https://github.com/absholi7ly/CVE-2025-27210_NodeJS_Path_Traversal_Exploit
Unverified exploit for CVE-2025-27210 which was a ../ in NodeJS.
##Broken authN and authZ in session API and resulting session tokens in ZITADEL
https://github.com/zitadel/zitadel/security/advisories/GHSA-6c5p-6www-pcmr
sev:HIGH 7.7 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
##A vulnerability in ZITADEL's session management API allows any authenticated user to update a session if they know its ID, due to a missing permission check. This flaw enables session hijacking, allowing an attacker to impersonate another user and access sensitive resources.
Looks like this was reported a while ago. CVE was reserved in September 2024.
##