## Updated at UTC 2025-12-13T11:14:44.875638

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2025-13970 8.0 0.00% 2 0 2025-12-13T03:30:14 OpenPLC_V3 is vulnerable to a cross-site request forgery (CSRF) attack due to t
CVE-2025-14585 7.3 0.00% 1 0 2025-12-13T00:30:32 A vulnerability was found in itsourcecode COVID Tracking System 1.0. Affected by
CVE-2025-14582 4.7 0.00% 1 0 2025-12-13T00:30:32 A vulnerability was detected in campcodes Online Student Enrollment System 1.0.
CVE-2025-67749 0 0.00% 1 0 2025-12-12T23:15:42.223000 PCSX2 is a free and open-source PlayStation 2 (PS2) emulator. In versions 2.5.37
CVE-2025-14584 7.3 0.00% 1 0 2025-12-12T23:15:37.887000 A vulnerability has been found in itsourcecode COVID Tracking System 1.0. Affect
CVE-2025-14583 7.3 0.00% 1 0 2025-12-12T22:15:39.123000 A flaw has been found in campcodes Online Student Enrollment System 1.0. This im
CVE-2025-67721 None 0.00% 1 0 2025-12-12T22:12:24 ### Summary Incorrect handling of malformed data in Java-based decompressor impl
CVE-2025-67750 8.4 0.00% 2 0 2025-12-12T21:37:31 ### Impact The APIVersion rule uses `new Function()` to evaluate expression stri
CVE-2025-64011 4.3 0.00% 1 0 2025-12-12T21:32:46 Nextcloud Server 30.0.0 is vulnerable to an Insecure Direct Object Reference (ID
CVE-2025-67634 4.4 0.00% 1 0 2025-12-12T21:31:51 The CISA Software Acquisition Guide Supplier Response Web Tool before 2025-12-11
CVE-2025-14373 4.3 0.00% 1 0 2025-12-12T21:31:50 Inappropriate implementation in Toolbar in Google Chrome on Android prior to 143
CVE-2024-58311 9.8 0.00% 1 0 2025-12-12T21:31:50 Dormakaba Saflok System 6000 contains a predictable key generation algorithm tha
CVE-2024-58299 9.8 0.00% 1 0 2025-12-12T21:31:50 PCMan FTP Server 2.0 contains a buffer overflow vulnerability in the 'pwd' comma
CVE-2025-14572 8.8 0.00% 2 0 2025-12-12T21:31:39 A vulnerability was found in UTT 进取 512W up to 1.7.7-171114. This affects an unk
CVE-2025-66429 8.8 0.07% 1 0 2025-12-12T21:15:59.187000 An issue was discovered in cPanel 110 through 132. A directory traversal vulnera
CVE-2025-14611 0 0.00% 2 0 2025-12-12T21:15:53.107000 Gladinet CentreStack and Triofox prior to version 16.12.10420.56791 used hardcod
CVE-2025-14174 8.8 0.00% 8 0 2025-12-12T21:15:52.350000 Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499
CVE-2024-58316 7.5 0.00% 1 0 2025-12-12T21:15:51.430000 Online Shopping System Advanced 1.0 contains a SQL injection vulnerability in th
CVE-2025-67819 None 0.00% 1 0 2025-12-12T20:25:07 An issue was discovered in Weaviate OSS before 1.33.4. Due to a lack of validati
CVE-2025-8083 8.6 0.00% 1 0 2025-12-12T20:15:43.250000 The Preset configuration https://v2.vuetifyjs.com/en/features/presets  feature
CVE-2025-67818 7.2 0.00% 1 0 2025-12-12T20:15:42.770000 An issue was discovered in Weaviate OSS before 1.33.4. An attacker with access t
CVE-2025-67342 4.6 0.00% 1 0 2025-12-12T20:15:42.327000 RuoYi versions 4.8.1 and earlier is affected by a stored XSS vulnerability in th
CVE-2025-66430 9.1 0.00% 2 0 2025-12-12T20:15:41.747000 Plesk 18.0 has Incorrect Access Control.
CVE-2024-58314 8.8 0.00% 1 0 2025-12-12T20:15:39.327000 Atcom 100M IP Phones firmware version 2.7.x.x contains an authenticated command
CVE-2024-58305 8.8 0.00% 1 0 2025-12-12T20:15:39.020000 WonderCMS 4.3.2 contains a cross-site scripting vulnerability that allows attack
CVE-2024-14010 9.8 0.00% 1 0 2025-12-12T20:15:38.520000 Typora 1.7.4 contains a command injection vulnerability in the PDF export prefer
CVE-2025-64538 9.3 0.52% 1 0 2025-12-12T19:58:16.457000 Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based
CVE-2025-64539 9.3 0.52% 1 0 2025-12-12T19:58:13.747000 Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based
CVE-2025-67779 7.5 0.04% 3 1 2025-12-12T19:16:03.773000 It was found that the fix addressing CVE-2025-55184 in React Server Components w
CVE-2018-4063 8.8 0.18% 2 0 2025-12-12T19:15:59.653000 An exploitable remote code execution vulnerability exists in the upload.cgi func
CVE-2025-56109 8.8 0.11% 1 0 2025-12-12T18:31:38 OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR860 allowing attackers
CVE-2025-56106 8.8 0.11% 1 0 2025-12-12T18:31:38 OS Command Injection vulnerability in Ruijie RG-EW1800GX B11P226_EW1800GX_102231
CVE-2025-56099 8.8 0.11% 1 0 2025-12-12T18:31:37 OS Command Injection vulnerability in Ruijie RG-YST AP_3.0(1)B11P280YST250F allo
CVE-2025-56108 8.8 0.11% 1 0 2025-12-12T18:31:37 OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowin
CVE-2025-56117 8.8 0.11% 1 0 2025-12-12T18:31:37 OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowin
CVE-2025-56089 8.8 0.14% 1 0 2025-12-12T18:31:37 OS Command Injection vulnerability in Ruijie M18 EW_3.0(1)B11P226_M18_10223116 a
CVE-2025-56098 8.8 0.11% 1 0 2025-12-12T18:31:37 OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowin
CVE-2025-56107 8.8 0.11% 1 0 2025-12-12T18:31:36 OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR600W allowing attacker
CVE-2025-56110 8.8 0.11% 1 0 2025-12-12T18:31:36 OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR860 allowing attackers
CVE-2025-56101 8.8 0.11% 1 0 2025-12-12T18:31:36 OS Command Injection vulnerability in Ruijie M18 EW_3.0(1)B11P226_M18_10223116 a
CVE-2025-56096 8.8 0.11% 1 0 2025-12-12T18:31:36 OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR600W allowing attacker
CVE-2025-56097 8.8 0.11% 1 0 2025-12-12T18:31:36 OS Command Injection vulnerability in Ruijie RG-EW1800GX PRO B11P226_EW1800GX-PR
CVE-2025-56093 8.8 0.11% 1 0 2025-12-12T18:31:36 OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowin
CVE-2025-56092 8.8 0.11% 1 0 2025-12-12T18:31:36 OS Command Injection vulnerability in Ruijie X30 PRO V1 X30-PRO-V1_09241521 allo
CVE-2025-56088 8.8 0.14% 1 0 2025-12-12T18:31:36 OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR860 allowing attackers
CVE-2025-56095 8.8 0.11% 1 0 2025-12-12T18:31:36 OS Command Injection vulnerability in Ruijie RG-EW1200G PRO RG-EW1200G PRO V1.00
CVE-2023-29144 3.3 0.00% 1 0 2025-12-12T18:30:41 Malwarebytes 1.0.14 for Linux doesn't properly compute signatures in some scenar
CVE-2025-56086 8.8 0.14% 1 0 2025-12-12T18:30:34 OS Command Injection vulnerability in Ruijie RG-EW1200 EW_3.0(1)B11P227_EW1200_1
CVE-2025-56084 8.8 0.14% 1 0 2025-12-12T18:30:33 OS Command Injection vulnerability in Ruijie RG-EW1800GX PRO B11P226_EW1800GX-PR
CVE-2025-56085 8.8 0.14% 1 0 2025-12-12T18:30:33 OS Command Injection vulnerability in Ruijie RG-EW1200 EW_3.0(1)B11P227_EW1200_1
CVE-2025-56079 8.8 0.14% 1 0 2025-12-12T18:30:32 OS Command Injection vulnerability in Ruijie RG-EW1300G EW1300G V1.00/V2.00/V4.0
CVE-2025-55184 7.5 0.07% 6 8 template 2025-12-12T18:18:29.827000 A pre-authentication denial of service vulnerability exists in React Server Comp
CVE-2025-55183 5.3 0.06% 4 7 2025-12-12T18:18:19.950000 An information leak vulnerability exists in specific configurations of React Ser
CVE-2025-56120 8.8 0.11% 1 0 2025-12-12T18:15:44.537000 OS Command Injection vulnerability in Ruijie X60 PRO X60_10212014RG-X60 PRO V1.0
CVE-2025-56118 8.8 0.11% 1 0 2025-12-12T18:15:44.377000 OS Command Injection vulnerability in Ruijie X60 PRO X60_10212014RG-X60 PRO V1.0
CVE-2025-56114 8.8 0.11% 1 0 2025-12-12T18:15:44.047000 OS Command Injection vulnerability in Ruijie M18 EW_3.0(1)B11P226_M18_10223116 a
CVE-2025-56113 8.8 0.11% 1 0 2025-12-12T18:15:43.890000 OS Command Injection vulnerability in Ruijie RG-YST EST, YSTAP_3.0(1)B11P280YST2
CVE-2025-56111 8.8 0.11% 1 0 2025-12-12T18:15:43.730000 OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR860 allowing attackers
CVE-2025-56102 8.8 0.11% 1 0 2025-12-12T18:15:42.737000 OS Command Injection vulnerability in Ruijie RG-EW1800GX B11P226_EW1800GX_102231
CVE-2025-56094 8.8 0.11% 1 0 2025-12-12T18:15:41.603000 OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowin
CVE-2025-56091 8.8 0.14% 1 0 2025-12-12T18:15:41.120000 OS Command Injection vulnerability in Ruijie RG-EW1800GX B11P226_EW1800GX_102231
CVE-2025-56090 8.8 0.14% 1 0 2025-12-12T18:15:40.960000 OS Command Injection vulnerability in Ruijie RG-EW1200G PRO RG-EW1200G PRO V1.00
CVE-2025-56087 8.8 0.14% 1 0 2025-12-12T18:15:40.483000 OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR600W allowing attacker
CVE-2025-56083 8.8 0.14% 1 0 2025-12-12T18:15:39.843000 OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowin
CVE-2025-56082 8.8 0.14% 1 0 2025-12-12T18:15:39.687000 OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR600W allowing attacker
CVE-2025-56077 8.8 0.14% 1 0 2025-12-12T18:15:39.370000 OS Command Injection vulnerability in Ruijie RG-RAP2200(E) 247 2200 allowing att
CVE-2025-64863 5.4 0.03% 1 0 2025-12-12T17:33:20.543000 Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr
CVE-2025-64869 5.4 0.03% 1 0 2025-12-12T17:32:54.870000 Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr
CVE-2025-64872 4.8 0.06% 1 0 2025-12-12T17:32:25.967000 Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr
CVE-2025-64887 5.4 0.03% 1 0 2025-12-12T17:31:58.540000 Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based
CVE-2025-65530 8.8 0.00% 1 0 2025-12-12T17:15:45.320000 An eval injection in the malware de-obfuscation routines of CloudLinux ai-bolit
CVE-2025-26866 None 0.73% 1 0 2025-12-12T16:46:06 A remote code execution vulnerability exists where a malicious Raft node can exp
CVE-2025-13780 9.1 0.09% 1 2 2025-12-12T16:42:56 The PLAIN restore meta-command filter introduced in pgAdmin as part of the fix f
CVE-2025-36743 None 0.00% 1 0 2025-12-12T15:30:51 SolarEdge SE3680H has an exposed debug/test interface accessible to unauthentica
CVE-2025-36745 None 0.00% 1 0 2025-12-12T15:30:51 SolarEdge SE3680H  ships with an outdated Linux kernel containing unpatched vuln
CVE-2025-66039 0 0.07% 2 0 2025-12-12T15:19:07.567000 FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX
CVE-2020-36896 0 0.23% 1 0 2025-12-12T15:18:42.140000 QiHang Media Web Digital Signage 3.0.9 contains a cleartext credentials vulnerab
CVE-2020-36895 0 0.14% 1 0 2025-12-12T15:18:42.140000 EIBIZ i-Media Server Digital Signage 3.8.0 contains an unauthenticated configura
CVE-2025-13607 9.4 0.04% 1 0 2025-12-12T15:18:42.140000 A malicious actor can access camera configuration information, including account
CVE-2025-14265 9.1 0.03% 3 0 2025-12-12T15:18:13.390000 In versions of ScreenConnect™ prior to 25.8, server-side validation and integrit
CVE-2025-14046 0 0.05% 1 0 2025-12-12T15:18:13.390000 An improper neutralization of input vulnerability was identified in GitHub Enter
CVE-2025-66046 9.8 0.08% 1 0 2025-12-12T15:18:13.390000 Several stack-based buffer overflow vulnerabilities exists in the MFER parsing f
CVE-2025-66048 9.8 0.08% 1 0 2025-12-12T15:18:13.390000 Several stack-based buffer overflow vulnerabilities exists in the MFER parsing f
CVE-2025-66044 9.8 0.08% 1 0 2025-12-12T15:18:13.390000 Several stack-based buffer overflow vulnerabilities exists in the MFER parsing f
CVE-2025-14535 9.8 0.04% 1 0 2025-12-12T15:18:13.390000 A vulnerability was identified in UTT 进取 512W up to 3.1.7.7-171114. Affected is
CVE-2025-67741 4.6 0.01% 1 0 2025-12-12T15:18:13.390000 In JetBrains TeamCity before 2025.11 stored XSS was possible via session attribu
CVE-2025-67742 3.8 0.00% 1 0 2025-12-12T15:18:13.390000 In JetBrains TeamCity before 2025.11 path traversal was possible via file upload
CVE-2025-67739 3.1 0.00% 1 0 2025-12-12T15:18:13.390000 In JetBrains TeamCity before 2025.11.2 improper repository URL validation could
CVE-2025-59803 5.3 0.02% 1 0 2025-12-12T15:18:13.390000 Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via trigger
CVE-2025-55314 7.8 0.01% 1 0 2025-12-12T15:18:13.390000 An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13.
CVE-2025-14512 6.5 0.03% 1 0 2025-12-12T15:18:13.390000 A flaw was found in glib. This vulnerability allows a heap buffer overflow and d
CVE-2025-14523 8.2 0.03% 2 0 2025-12-12T15:18:13.390000 A flaw in libsoup’s HTTP header handling allows multiple Host: headers in a requ
CVE-2025-14516 6.3 0.04% 1 0 2025-12-12T15:18:13.390000 A vulnerability was found in Yalantis uCrop 2.2.11. Affected by this issue is th
CVE-2025-14514 7.3 0.03% 1 0 2025-12-12T15:18:13.390000 A flaw has been found in Campcodes Supplier Management System 1.0. Affected is a
CVE-2025-64994 6.5 0.01% 1 0 2025-12-12T15:18:13.390000 A privilege escalation vulnerability was discovered in TeamViewer DEX (former 1E
CVE-2025-64993 6.8 0.14% 1 0 2025-12-12T15:18:13.390000 A command injection vulnerability was discovered in TeamViewer DEX (former 1E DE
CVE-2025-64992 6.8 0.14% 1 0 2025-12-12T15:18:13.390000 A command injection vulnerability was discovered in TeamViewer DEX (former 1E DE
CVE-2025-64987 7.2 0.29% 1 0 2025-12-12T15:18:13.390000 A command injection vulnerability was discovered in TeamViewer DEX (former 1E DE
CVE-2025-44016 8.8 0.04% 1 0 2025-12-12T15:18:13.390000 A vulnerability in TeamViewer DEX Client (former 1E client) - Content Distributi
CVE-2025-64701 7.8 0.01% 1 0 2025-12-12T15:18:13.390000 QND Premium/Advance/Standard Ver.11.0.9i and prior contains a privilege escalati
CVE-2025-12029 8.0 0.04% 1 0 2025-12-12T15:18:13.390000 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 15.11
CVE-2025-67738 8.5 0.04% 1 0 2025-12-12T15:18:13.390000 squid/cachemgr.cgi in Webmin before 2.600 does not properly quote arguments. Thi
CVE-2025-11247 4.3 0.01% 1 0 2025-12-12T15:18:13.390000 GitLab has remediated an issue in GitLab EE affecting all versions from 13.2 bef
CVE-2025-12716 8.7 0.02% 1 0 2025-12-12T15:18:13.390000 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.4
CVE-2025-13764 9.8 0.07% 2 0 2025-12-12T15:18:13.390000 The WP CarDealer plugin for WordPress is vulnerable to Privilege Escalation in a
CVE-2025-67719 0 0.01% 2 0 2025-12-12T15:18:13.390000 Ibexa is a composable end-to-end DXP (Digital Experience Platform). Versions 5.0
CVE-2025-67718 0 0.04% 2 0 2025-12-12T15:18:13.390000 Form.io is a combined Form and API platform for Serverless applications. Version
CVE-2025-67717 0 0.03% 1 0 2025-12-12T15:18:13.390000 ZITADEL is an open-source identity infrastructure tool. Versions 2.44.0 through
CVE-2025-67648 7.1 0.03% 1 0 2025-12-12T15:18:13.390000 Shopware is an open commerce platform. Versions 6.4.6.0 through 6.6.10.9 and 6.7
CVE-2025-67646 3.5 0.01% 1 0 2025-12-12T15:18:13.390000 TableProgressTracking is a MediaWiki extension to track progress against specifi
CVE-2025-67509 8.2 0.04% 1 0 2025-12-12T15:18:13.390000 Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8
CVE-2025-67505 8.4 0.04% 1 0 2025-12-12T15:18:13.390000 Okta Java Management SDK facilitates interactions with the Okta management API.
CVE-2025-66628 7.5 0.03% 1 1 2025-12-12T15:18:13.390000 ImageMagick is a software suite to create, edit, compose, or convert bitmap imag
CVE-2025-65297 7.5 0.01% 1 0 2025-12-12T15:18:13.390000 Aqara Hub devices including Camera Hub G3 4.1.9_0027, Hub M2 4.3.6_0027, and Hub
CVE-2025-65295 8.1 0.04% 1 0 2025-12-12T15:18:13.390000 Multiple vulnerabilities in Aqara Hub firmware update process in the Camera Hub
CVE-2025-65293 6.6 0.04% 1 0 2025-12-12T15:18:13.390000 Command injection vulnerabilities in Aqara Camera Hub G3 4.1.9_0027 allow attack
CVE-2020-36902 0 0.09% 1 0 2025-12-12T15:18:13.390000 UBICOD Medivision Digital Signage 1.5.1 contains an authorization bypass vulnera
CVE-2020-36901 0 0.02% 1 0 2025-12-12T15:18:13.390000 UBICOD Medivision Digital Signage 1.5.1 contains a cross-site request forgery vu
CVE-2020-36899 0 0.24% 1 0 2025-12-12T15:18:13.390000 QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated file disclosu
CVE-2025-36744 0 0.00% 1 0 2025-12-12T15:17:31.973000 SolarEdge SE3680H has unauthenticated disclosure of sensitive information during
CVE-2025-36746 0 0.00% 1 0 2025-12-12T15:17:31.973000 SolarEdge monitoring platform contains a Cross‑Site Scripting (XSS) flaw that al
CVE-2025-14537 7.3 0.03% 1 0 2025-12-12T15:17:31.973000 A weakness has been identified in code-projects Class and Exam Timetable Managem
CVE-2025-13663 6.7 0.01% 1 0 2025-12-12T15:17:31.973000 Under certain circumstances, the Quartus Prime Pro Installer for Windows does no
CVE-2025-36937 0 0.04% 1 0 2025-12-12T15:17:31.973000 In AudioDecoder::HandleProduceRequest of audio_decoder.cc, there is a possible o
CVE-2025-36936 0 0.01% 1 0 2025-12-12T15:17:31.973000 In GetTachyonCommand of tachyon_server_common.h, there is a possible out of boun
CVE-2025-36938 5.1 0.01% 1 0 2025-12-12T00:31:29 In U-Boot of append_uint32_le(), there is a possible fault injection due to a lo
CVE-2025-36934 6.7 0.01% 1 0 2025-12-12T00:31:27 In bigo_worker_thread of private/google-modules/video/gchips/bigo.c, there is a
CVE-2025-8110 None 0.08% 3 2 2025-12-11T22:02:22 Improper Symbolic link handling in the PutContents API in Gogs allows Local Exec
CVE-2025-58360 8.2 73.17% 2 4 template 2025-12-11T21:55:34 ## Description An XML External Entity (XXE) vulnerability was identified. The a
CVE-2025-14293 6.5 0.04% 1 0 2025-12-11T21:31:45 The WP Job Portal plugin for WordPress is vulnerable to Arbitrary File Read in a
CVE-2025-36935 None 0.01% 1 0 2025-12-11T21:31:45 In trusty_ffa_mem_reclaim of shared-mem-smcall.c, there is a possible memory cor
CVE-2025-14534 9.8 0.04% 2 0 2025-12-11T21:31:39 A vulnerability was determined in UTT 进取 512W up to 3.1.7.7-171114. This impacts
CVE-2025-67740 2.7 0.00% 1 0 2025-12-11T18:31:48 In JetBrains TeamCity before 2025.11 improper access control could expose GitHub
CVE-2025-65296 6.5 0.02% 1 0 2025-12-11T18:31:48 NULL-pointer dereference vulnerabilities in Aqara Hub M2 4.3.6_0027, Hub M3 4.3.
CVE-2025-65294 9.8 0.24% 1 0 2025-12-11T18:31:48 Aqara Hub devices including Camera Hub G3 4.1.9_0027, Hub M2 4.3.6_0027, and Hub
CVE-2025-66047 9.8 0.08% 1 0 2025-12-11T18:30:53 Several stack-based buffer overflow vulnerabilities exists in the MFER parsing f
CVE-2025-66045 9.8 0.08% 1 0 2025-12-11T18:30:53 Several stack-based buffer overflow vulnerabilities exists in the MFER parsing f
CVE-2025-66043 9.8 0.08% 1 0 2025-12-11T18:30:53 Several stack-based buffer overflow vulnerabilities exists in the MFER parsing f
CVE-2025-65473 9.1 0.06% 1 0 2025-12-11T18:30:53 An arbitrary file rename vulnerability in the /admin/filer.php component of Easy
CVE-2025-14526 8.8 0.09% 2 0 2025-12-11T18:30:53 A security flaw has been discovered in Tenda CH22 1.0.0.1. This affects the func
CVE-2025-14528 5.3 0.04% 1 0 2025-12-11T18:30:53 A vulnerability was detected in D-Link DIR-803 up to 1.04. Impacted is an unknow
CVE-2025-55313 7.8 0.02% 1 0 2025-12-11T18:30:48 An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13.
CVE-2024-8273 None 0.07% 1 0 2025-12-11T18:30:45 Authentication Bypass by Spoofing vulnerability in HYPR Server allows Identity S
CVE-2025-59802 7.5 0.03% 1 0 2025-12-11T18:30:45 Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via OCG. Wh
CVE-2025-14321 9.8 0.04% 1 0 2025-12-11T18:30:41 Use-after-free in the WebRTC: Signaling component. This vulnerability affects Fi
CVE-2025-67511 9.7 0.10% 1 0 2025-12-11T17:22:16 ### Summary A command injection vulnerability is present in the function tool `
CVE-2025-67716 3.7 0.05% 1 0 2025-12-11T15:51:55 ### Description An input-validation flaw in the returnTo parameter in the Auth0
CVE-2025-67720 6.5 0.04% 1 0 2025-12-11T15:51:44 ## Summary The `download_media` method in Pyrofork does not sanitize filenames
CVE-2025-67713 None 0.04% 1 0 2025-12-11T15:51:11 ### Summary `redirect_url` is treated as safe when `url.Parse(...).IsAbs()` is f
CVE-2025-67510 9.4 0.06% 1 0 2025-12-11T15:49:18 ### Impact `MySQLWriteTool` executes arbitrary SQL provided by the caller using
CVE-2025-66474 None 0.47% 2 0 2025-12-11T15:48:03 ### Impact Any user who can edit their own user profile or any other document ca
CVE-2025-66473 None 0.04% 2 0 2025-12-11T15:47:50 ### Impact XWiki's REST API doesn't enforce any limits for the number of items t
CVE-2025-66472 None 0.04% 1 0 2025-12-11T15:47:40 ### Impact A reflected XSS vulnerability in XWiki allows an attacker to send a v
CVE-2025-66033 5.3 0.04% 1 0 2025-12-11T15:47:31 ### Description In the Okta Java SDK, specific multithreaded implementations may
CVE-2025-14515 7.3 0.03% 1 0 2025-12-11T15:30:36 A vulnerability has been found in Campcodes Supplier Management System 1.0. Affe
CVE-2025-13003 7.6 0.03% 1 0 2025-12-11T15:30:36 Authorization Bypass Through User-Controlled Key vulnerability in Aksis Computer
CVE-2025-14517 5.3 0.01% 1 0 2025-12-11T15:30:33 A vulnerability was determined in Yalantis uCrop 2.2.11. This affects the functi
CVE-2025-64995 6.5 0.01% 1 0 2025-12-11T12:30:34 A privilege escalation vulnerability was discovered in TeamViewer DEX (former 1E
CVE-2025-64988 7.2 0.29% 1 0 2025-12-11T12:30:34 A command injection vulnerability was discovered in TeamViewer DEX (former 1E DE
CVE-2025-64991 6.8 0.14% 1 0 2025-12-11T12:30:29 A command injection vulnerability was discovered in TeamViewer DEX (former 1E DE
CVE-2025-64990 6.8 0.14% 1 0 2025-12-11T12:30:28 A command injection vulnerability was discovered in TeamViewer DEX (former 1E DE
CVE-2025-64989 7.2 0.29% 1 0 2025-12-11T12:30:28 A command injection vulnerability was discovered in TeamViewer DEX (former 1E DE
CVE-2025-4097 6.5 0.03% 1 0 2025-12-11T06:30:33 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.10
CVE-2025-67694 None 0.00% 1 0 2025-12-11T06:30:33 Rejected reason: Not used
CVE-2025-9436 6.4 0.03% 1 0 2025-12-11T06:30:33 The Widgets for Google Reviews plugin for WordPress is vulnerable to Stored Cros
CVE-2025-8405 8.7 0.01% 2 0 2025-12-11T06:30:32 GitLab has remediated a security issue in GitLab CE/EE affecting all versions fr
CVE-2025-11984 6.8 0.02% 1 0 2025-12-11T06:30:32 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.1
CVE-2025-67692 None 0.00% 1 0 2025-12-11T06:30:32 Rejected reason: Not used
CVE-2025-67691 None 0.00% 1 0 2025-12-11T06:30:32 Rejected reason: Not used
CVE-2025-67690 None 0.00% 1 0 2025-12-11T06:30:32 Rejected reason: Not used
CVE-2025-67693 0 0.00% 1 0 2025-12-11T04:15:59.570000 Rejected reason: Not used
CVE-2025-11467 5.8 0.04% 1 0 2025-12-11T03:30:35 The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video
CVE-2020-36898 None 1.55% 1 0 2025-12-10T21:31:48 QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated file deletion
CVE-2020-36900 None 0.02% 1 0 2025-12-10T21:31:47 All-Dynamics Digital Signage System 2.0.2 contains a cross-site request forgery
CVE-2020-36897 None 0.28% 1 0 2025-12-10T21:31:47 QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated remote code e
CVE-2025-65199 7.8 0.03% 1 0 2025-12-10T21:31:47 A command injection vulnerability exists in Windscribe for Linux Desktop App tha
CVE-2025-64888 5.4 0.03% 1 0 2025-12-10T21:31:47 Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based
CVE-2023-53740 None 0.04% 1 0 2025-12-10T21:31:46 Screen SFT DAB 1.9.3 contains an authentication bypass vulnerability that allows
CVE-2025-64881 5.4 0.03% 1 0 2025-12-10T21:31:46 Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr
CVE-2025-64875 5.4 0.03% 1 0 2025-12-10T21:31:46 Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr
CVE-2025-64873 5.4 0.03% 1 0 2025-12-10T21:31:46 Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr
CVE-2025-64861 5.4 0.03% 1 0 2025-12-10T21:31:46 Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr
CVE-2025-64537 9.3 0.52% 1 0 2025-12-10T21:31:33 Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based
CVE-2025-34424 None 0.01% 1 0 2025-12-10T18:30:37 MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability t
CVE-2025-34423 None 0.01% 1 0 2025-12-10T18:30:37 MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability t
CVE-2025-55182 10.0 76.01% 10 100 template 2025-12-10T02:00:02.557000 A pre-authentication remote code execution vulnerability exists in React Server
CVE-2025-54100 7.8 0.17% 1 2 2025-12-09T18:30:47 Improper neutralization of special elements used in a command ('command injectio
CVE-2025-40801 8.1 0.02% 1 0 2025-12-09T18:30:43 A vulnerability has been identified in COMOS V10.6 (All versions), COMOS V10.6 (
CVE-2025-66491 5.9 0.01% 1 0 2025-12-09T16:32:30 ## Impact There is a potential vulnerability in Traefik NGINX provider managing
CVE-2025-66516 None 0.06% 1 2 2025-12-05T02:26:57 Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1
CVE-2025-54988 9.8 0.03% 1 1 2025-11-05T20:40:58 Critical XXE in Apache Tika (tika-parser-pdf-module) in Apache Tika 1.13 through
CVE-2025-49144 7.3 0.01% 1 9 2025-10-23T14:15:35.980000 Notepad++ is a free and open-source source code editor. In versions 8.8.1 and pr
CVE-2025-49113 9.9 88.03% 1 22 template 2025-06-12T17:15:29.310000 Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execu
CVE-2025-27591 7.8 0.01% 1 17 2025-03-21T21:51:09 ### Impact A privilege escalation vulnerability existed in the Below service pri
CVE-2024-9042 5.9 0.07% 2 0 2025-03-13T21:24:16 A security vulnerability has been discovered in Kubernetes windows nodes that co
CVE-2025-36747 0 0.00% 1 0 N/A
CVE-2025-14440 0 0.00% 2 0 N/A
CVE-2025-10738 0 0.00% 1 0 N/A
CVE-2025-11693 0 0.00% 2 0 N/A
CVE-2025-13089 0 0.00% 2 0 N/A
CVE-2025-12077 0 0.00% 1 0 N/A
CVE-2025-7058 0 0.00% 1 0 N/A
CVE-2025-14476 0 0.00% 2 0 N/A
CVE-2025-11376 0 0.00% 1 0 N/A
CVE-2025-11164 0 0.00% 1 0 N/A
CVE-2025-14397 0 0.00% 1 0 N/A
CVE-2025-14475 0 0.00% 1 0 N/A
CVE-2025-14454 0 0.00% 1 0 N/A
CVE-2025-14050 0 0.00% 1 0 N/A
CVE-2025-14278 0 0.00% 1 0 N/A
CVE-2025-14056 0 0.00% 1 0 N/A
CVE-2025-43529 0 0.00% 3 0 N/A
CVE-2025-65950 0 0.04% 1 0 N/A

CVE-2025-13970
(8.0 HIGH)

EPSS: 0.00%

updated 2025-12-13T03:30:14

2 posts

OpenPLC_V3 is vulnerable to a cross-site request forgery (CSRF) attack due to the absence of proper CSRF validation. This issue allows an unauthenticated attacker to trick a logged-in administrator into visiting a maliciously crafted link, potentially enabling unauthorized modification of PLC settings or the upload of malicious programs which could lead to significant disruption or damage to

CVE-2025-14585
(7.3 HIGH)

EPSS: 0.00%

updated 2025-12-13T00:30:32

1 posts

A vulnerability was found in itsourcecode COVID Tracking System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/?page=zone. The manipulation of the argument ID results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used.

jos1264@social.skynetcloud.site at 2025-12-13T03:15:01.000Z ##

CVE-2025-14585 - itsourcecode COVID Tracking System page sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14582
(4.7 MEDIUM)

EPSS: 0.00%

updated 2025-12-13T00:30:32

1 posts

A vulnerability was detected in campcodes Online Student Enrollment System 1.0. This affects an unknown function of the file /admin/index.php?page=user-profile. Performing manipulation of the argument userphoto results in unrestricted upload. The attack can be initiated remotely. The exploit is now public and may be used.

jos1264@social.skynetcloud.site at 2025-12-13T00:15:01.000Z ##

CVE-2025-14582 - campcodes Online Student Enrollment System index.php unrestricted upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67749
(0 None)

EPSS: 0.00%

updated 2025-12-12T23:15:42.223000

1 posts

PCSX2 is a free and open-source PlayStation 2 (PS2) emulator. In versions 2.5.377 and below, an unchecked offset and size used in a memcpy operation inside PCSX2's CDVD SCMD 0x91 and SCMD 0x8F handlers allow a specially crafted disc image or ELF to cause an out-of-bounds read from emulator memory. Because the offset and size is controlled through MG header fields, a specially crafted ELF can read

jos1264@social.skynetcloud.site at 2025-12-13T03:15:01.000Z ##

CVE-2025-67749 - PCSX2 has an Out-of-bounds Read due to unchecked offset and size passed to memcpy cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14584
(7.3 HIGH)

EPSS: 0.00%

updated 2025-12-12T23:15:37.887000

1 posts

A vulnerability has been found in itsourcecode COVID Tracking System 1.0. Affected is an unknown function of the file /admin/login.php of the component Admin Login. The manipulation of the argument Username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

jos1264@social.skynetcloud.site at 2025-12-13T03:15:00.000Z ##

CVE-2025-14584 - itsourcecode COVID Tracking System Admin Login login.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14583
(7.3 HIGH)

EPSS: 0.00%

updated 2025-12-12T22:15:39.123000

1 posts

A flaw has been found in campcodes Online Student Enrollment System 1.0. This impacts an unknown function of the file /admin/register.php. Executing manipulation of the argument photo can lead to unrestricted upload. The attack can be launched remotely. The exploit has been published and may be used.

jos1264@social.skynetcloud.site at 2025-12-13T00:15:01.000Z ##

CVE-2025-14583 - campcodes Online Student Enrollment System register.php unrestricted upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67721(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-12T22:12:24

1 posts

### Summary Incorrect handling of malformed data in Java-based decompressor implementations for Snappy and LZ4 allows remote attackers to read previous buffer contents via crafted compressed input. In applications where the output buffer is reused without being cleared, this may lead to disclosure of sensitive data. ### Details With certain crafted compressed inputs, elements from the output buff

jos1264@social.skynetcloud.site at 2025-12-13T03:15:01.000Z ##

CVE-2025-67721 - Aircompressor's Snappy and LZ4 Java-based decompressor implementation can leak information from reused output buffer cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67750
(8.4 HIGH)

EPSS: 0.00%

updated 2025-12-12T21:37:31

2 posts

### Impact The APIVersion rule uses `new Function()` to evaluate expression strings. A malicious crafted flow metadata file can cause arbitrary JavaScript execution during scanning. An attacker could execute arbitrary JavaScript during a scan by supplying a malicious expression within rule configuration or crafted flow metadata. This could compromise developer machines, CI runners, or editor envir

jos1264@social.skynetcloud.site at 2025-12-13T00:15:00.000Z ##

CVE-2025-67750 - Lightning Flow Scanner is Vulnerable to Code Injection via Unsafe Use of new Function() in APIVersion Rule cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-12T23:30:01.000Z ##

CVE-2025-67750 - Lightning Flow Scanner is Vulnerable to Code Injection via Unsafe Use of new Function() in APIVersion Rule cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64011
(4.3 MEDIUM)

EPSS: 0.00%

updated 2025-12-12T21:32:46

1 posts

Nextcloud Server 30.0.0 is vulnerable to an Insecure Direct Object Reference (IDOR) in the /core/preview endpoint. Any authenticated user can access previews of arbitrary files belonging to other users by manipulating the fileId parameter. This allows unauthorized disclosure of sensitive data, such as text files or images, without prior sharing permissions.

CVE-2025-67634
(4.4 MEDIUM)

EPSS: 0.00%

updated 2025-12-12T21:31:51

1 posts

The CISA Software Acquisition Guide Supplier Response Web Tool before 2025-12-11 was vulnerable to cross-site scripting via text fields. If an attacker could convince a user to import a specially-crafted JSON file, the Tool would load JavaScript from the file into the page. The JavaScript would execute in the context of the user's browser when the user submits the page (clicks 'Next').

jos1264@social.skynetcloud.site at 2025-12-13T00:15:00.000Z ##

CVE-2025-67634 - Software Acquisition Guide Supplier Response Web Tool XSS cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14373
(4.3 MEDIUM)

EPSS: 0.00%

updated 2025-12-12T21:31:50

1 posts

Inappropriate implementation in Toolbar in Google Chrome on Android prior to 143.0.7499.110 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)

jos1264@social.skynetcloud.site at 2025-12-12T23:30:00.000Z ##

CVE-2025-14373 - Google Chrome Android Domain Spoofing Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2024-58311
(9.8 CRITICAL)

EPSS: 0.00%

updated 2025-12-12T21:31:50

1 posts

Dormakaba Saflok System 6000 contains a predictable key generation algorithm that allows attackers to derive card access keys from a 32-bit unique identifier. Attackers can exploit the deterministic key generation process by calculating valid access keys using a simple mathematical transformation of the card's unique identifier.

jos1264@social.skynetcloud.site at 2025-12-12T21:45:01.000Z ##

CVE-2024-58311 - Dormakaba Saflok System 6000 Key Generation Cryptographic Weakness cvefeed.io/vuln/detail/CVE-202

##

CVE-2024-58299
(9.8 CRITICAL)

EPSS: 0.00%

updated 2025-12-12T21:31:50

1 posts

PCMan FTP Server 2.0 contains a buffer overflow vulnerability in the 'pwd' command that allows remote attackers to execute arbitrary code. Attackers can send a specially crafted payload during the FTP login process to overwrite memory and potentially gain system access.

jos1264@social.skynetcloud.site at 2025-12-12T21:45:00.000Z ##

CVE-2024-58299 - PCMan FTP Server 2.0 Remote Buffer Overflow via 'pwd' Command cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14572
(8.8 HIGH)

EPSS: 0.00%

updated 2025-12-12T21:31:39

2 posts

A vulnerability was found in UTT 进取 512W up to 1.7.7-171114. This affects an unknown part of the file /goform/formWebAuthGlobalConfig. Performing manipulation of the argument hidcontact results in memory corruption. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-66429
(8.8 HIGH)

EPSS: 0.07%

updated 2025-12-12T21:15:59.187000

1 posts

An issue was discovered in cPanel 110 through 132. A directory traversal vulnerability within the Team Manager API allows for overwrite of an arbitrary file. This can allow for privilege escalation to the root user.

CVE-2025-14611
(0 None)

EPSS: 0.00%

updated 2025-12-12T21:15:53.107000

2 posts

Gladinet CentreStack and Triofox prior to version 16.12.10420.56791 used hardcoded values for their implementation of the AES cryptoscheme. This degrades security for public exposed endpoints that may make use of it and may offer arbitrary local file inclusion when provided a specially crafted request without authentication. This opens the door for future exploitation and can be leveraged with pre

offseq at 2025-12-13T02:34:39.465Z ##

🔎 HIGH severity: CVE-2025-14611 in Gladinet CentreStack & TrioFox (<16.12.10420.56791) — hardcoded AES weakens crypto & enables unauth LFI. Restrict public access, monitor for LFI attempts, prep for patch. radar.offseq.com/threat/cve-20

##

cR0w@infosec.exchange at 2025-12-12T21:27:43.000Z ##

There's now a CVE for the EITW Gladinet / Triofox hardcoded key vuln from a few days ago.

huntress.com/blog/active-explo

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-14174
(8.8 HIGH)

EPSS: 0.00%

updated 2025-12-12T21:15:52.350000

8 posts

Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

ruario@vivaldi.net at 2025-12-13T08:21:06.000Z ##

I see that Brendan Eich from Brave is out lying about @Vivaldi again. He claims that Brave was pretty much the first out with a fix for CVE-2025-14174 and that Vivaldi still has not released a fix.

AFAIK we were actually first because we released 7.7.3862.88 (Android) based on 142.0.7444.237 from the Extended Support Release branch at 13:00 UTC (and for Desktop [7.7.3851.61] one hour later) on the 10th of December, which includes a fix for CVE-2025-14174. However since that CVE was not being publicly discussed yet, it was not initially listed in the changelog.

I have updated the Desktop announcement to mention the CVE now. Here it is:

vivaldi.com/blog/desktop/minor

Also FWIW my Masto bot which tracks various desktop browser updates announced us here:

social.vivaldi.net/@browserver

That bot has a sibling that looks at Vivaldi only releases (all platforms), which caught the Android release:

social.vivaldi.net/@vivaldiver

And here is when it detected the Brave annoucement, more than a day later:

social.vivaldi.net/@browserver

##

Android@activitypub.awakari.com at 2025-12-10T11:48:31.000Z ## Minor update(3) for Vivaldi Android Browser 7.7 Today’s update delivers regression fixes and a minor Chromium bump, which includes a patch for CVE-2025-14174, an out‑of‑bounds memory access i...

#Android #Android #Updates

Origin | Interest | Match ##

ruario@vivaldi.net at 2025-12-13T08:21:06.000Z ##

I see that Brendan Eich from Brave is out lying about @Vivaldi again. He claims that Brave was pretty much the first out with a fix for CVE-2025-14174 and that Vivaldi still has not released a fix.

AFAIK we were actually first because we released 7.7.3862.88 (Android) based on 142.0.7444.237 from the Extended Support Release branch at 13:00 UTC (and for Desktop [7.7.3851.61] one hour later) on the 10th of December, which includes a fix for CVE-2025-14174. However since that CVE was not being publicly discussed yet, it was not initially listed in the changelog.

I have updated the Desktop announcement to mention the CVE now. Here it is:

vivaldi.com/blog/desktop/minor

Also FWIW my Masto bot which tracks various desktop browser updates announced us here:

social.vivaldi.net/@browserver

That bot has a sibling that looks at Vivaldi only releases (all platforms), which caught the Android release:

social.vivaldi.net/@vivaldiver

And here is when it detected the Brave annoucement, more than a day later:

social.vivaldi.net/@browserver

##

DarkWebInformer@infosec.exchange at 2025-12-12T23:39:33.000Z ##

🚨 Two more vulnerabilities have been added to the CISA KEV Catalog

CVE-2018-4063: Sierra Wireless AirLink ALEOS Unrestricted Upload of File with Dangerous Type

CVSS: 8.8

CVE-2025-14174: Google Chromium Out of Bounds Memory Access

CVSS: 8.8

darkwebinformer.com/cisa-kev-c

##

cisakevtracker@mastodon.social at 2025-12-12T21:00:54.000Z ##

CVE ID: CVE-2025-14174
Vendor: Google
Product: Chromium
Date Added: 2025-12-12
Notes: chromereleases.googleblog.com/ ; learn.microsoft.com/en-us/depl ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

cR0w@infosec.exchange at 2025-12-12T19:55:35.000Z ##

Two EITW 0days patched in iOS Webkit. The advisory says the exploits were against pre-iOS 26 but they have patches for 26 as well. And some other ones to go with those.

support.apple.com/en-us/125884

Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report.

Processing maliciously crafted web content may lead to memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-43529 was also issued in response to this report.

##

applsec@infosec.exchange at 2025-12-12T19:45:39.000Z ##

📣 EMERGENCY UPDATES 📣

Apple pushed additional updates for 2 zero-days that may have been actively exploited.

🐛 CVE-2025-14174 (WebKit) additional patches,
🐛 CVE-2025-43529 (WebKit) additional patches:
- Safari 26.2

#apple #cybersecurity #infosec #security #ios

##

applsec@infosec.exchange at 2025-12-12T19:01:21.000Z ##

📣 EMERGENCY UPDATES 📣

Apple pushed updates for 2 new zero-days that may have been actively exploited.

🐛 CVE-2025-14174 (WebKit),
🐛 CVE-2025-43529 (WebKit):
- iOS and iPadOS 18.7.3
- iOS and iPadOS 26.2
- macOS Tahoe 26.2
- tvOS 26.2
- visionOS 26.2
- watchOS 26.2

#apple #cybersecurity #infosec #security #ios

##

CVE-2024-58316
(7.5 HIGH)

EPSS: 0.00%

updated 2025-12-12T21:15:51.430000

1 posts

Online Shopping System Advanced 1.0 contains a SQL injection vulnerability in the payment_success.php script that allows attackers to inject malicious SQL through the unfiltered 'cm' parameter. Attackers can exploit the vulnerability by sending crafted SQL queries to retrieve sensitive database information by manipulating the user ID parameter.

jos1264@social.skynetcloud.site at 2025-12-12T23:30:01.000Z ##

CVE-2024-58316 - Online Shopping System Advanced 1.0 SQL Injection via Payment Success Parameter cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67819(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-12T20:25:07

1 posts

An issue was discovered in Weaviate OSS before 1.33.4. Due to a lack of validation of the fileName field in the transfer logic, an attacker who can call the GetFile method while a shard is in the "Pause file activity" state and the FileReplicationService is reachable can read arbitrary files accessible to the service process.

CVE-2025-8083
(8.6 HIGH)

EPSS: 0.00%

updated 2025-12-12T20:15:43.250000

1 posts

The Preset configuration https://v2.vuetifyjs.com/en/features/presets  feature of Vuetify is vulnerable to Prototype Pollution https://cheatsheetseries.owasp.org/cheatsheets/Prototype_Pollution_Prevention_Cheat_Sheet.html  due to the internal 'mergeDeep' utility function used to merge options with defaults. Using a specially-crafted, malicious preset can result in polluting all JavaScript object

jos1264@social.skynetcloud.site at 2025-12-12T23:30:01.000Z ##

CVE-2025-8083 - Vuetify Prototype Pollution via Preset options cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67818
(7.2 HIGH)

EPSS: 0.00%

updated 2025-12-12T20:15:42.770000

1 posts

An issue was discovered in Weaviate OSS before 1.33.4. An attacker with access to insert data into the database can craft an entry name with an absolute path (e.g., /etc/...) or use parent directory traversal (../../..) to escape the restore root when a backup is restored, potentially creating or overwriting files in arbitrary locations within the application's privilege scope.

CVE-2025-67342
(4.6 MEDIUM)

EPSS: 0.00%

updated 2025-12-12T20:15:42.327000

1 posts

RuoYi versions 4.8.1 and earlier is affected by a stored XSS vulnerability in the /system/menu/edit endpoint. While the endpoint is protected by an XSS filter, the protection can be bypassed. Additionally, because the menu is shared across all users, any user with menu modification permissions can impact all users by exploiting this stored XSS vulnerability.

CVE-2025-66430
(9.1 CRITICAL)

EPSS: 0.00%

updated 2025-12-12T20:15:41.747000

2 posts

Plesk 18.0 has Incorrect Access Control.

offseq at 2025-12-13T01:05:13.162Z ##

🔔 CRITICAL: Plesk 18.0 (CVE-2025-66430) suffers from incorrect access control, risking unauthorized admin actions. No exploit yet, but review roles, restrict access, and monitor logs ASAP. Patch pending. radar.offseq.com/threat/cve-20

##

cR0w@infosec.exchange at 2025-12-12T16:54:27.000Z ##

I think I already posted this one but the CVE was just published so go hack more Plesk shit anyway.

support.plesk.com/hc/en-us/art

##

CVE-2024-58314
(8.8 HIGH)

EPSS: 0.00%

updated 2025-12-12T20:15:39.327000

1 posts

Atcom 100M IP Phones firmware version 2.7.x.x contains an authenticated command injection vulnerability in the web configuration CGI script that allows attackers to execute arbitrary system commands. Attackers can inject shell commands through the 'cmd' parameter in web_cgi_main.cgi, enabling remote code execution with administrative credentials.

jos1264@social.skynetcloud.site at 2025-12-12T21:45:01.000Z ##

CVE-2024-58314 - Atcom 2.7.x.x Authenticated Command Injection via Web Configuration CGI cvefeed.io/vuln/detail/CVE-202

##

CVE-2024-58305
(8.8 HIGH)

EPSS: 0.00%

updated 2025-12-12T20:15:39.020000

1 posts

WonderCMS 4.3.2 contains a cross-site scripting vulnerability that allows attackers to inject malicious JavaScript through the module installation endpoint. Attackers can craft a specially designed XSS payload to install a reverse shell module and execute remote commands by tricking an authenticated administrator into accessing a malicious link.

jos1264@social.skynetcloud.site at 2025-12-12T21:45:01.000Z ##

CVE-2024-58305 - WonderCMS 4.3.2 Cross-Site Scripting Remote Code Execution via Module Installation cvefeed.io/vuln/detail/CVE-202

##

CVE-2024-14010
(9.8 CRITICAL)

EPSS: 0.00%

updated 2025-12-12T20:15:38.520000

1 posts

Typora 1.7.4 contains a command injection vulnerability in the PDF export preferences that allows attackers to execute arbitrary system commands. Attackers can inject malicious commands into the 'run command' input field during PDF export to achieve remote code execution.

jos1264@social.skynetcloud.site at 2025-12-12T21:45:00.000Z ##

CVE-2024-14010 - Typora 1.7.4 OS Command Injection via Export PDF Preferences cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64538
(9.3 CRITICAL)

EPSS: 0.52%

updated 2025-12-12T19:58:16.457000

1 posts

Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by injecting malicious scripts into a web page that are executed in the context of the victim's browser. A successful attacker can abuse this to achieve session takeover, increasing the co

jos1264@social.skynetcloud.site at 2025-12-10T19:00:02.000Z ##

CVE-2025-64538 - Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64539
(9.3 CRITICAL)

EPSS: 0.52%

updated 2025-12-12T19:58:13.747000

1 posts

Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by injecting malicious scripts into a web page that are executed in the context of the victim's browser. A successful attacker can abuse this to achieve session takeover, increasing the co

jos1264@social.skynetcloud.site at 2025-12-10T19:00:03.000Z ##

CVE-2025-64539 - Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67779
(7.5 HIGH)

EPSS: 0.04%

updated 2025-12-12T19:16:03.773000

3 posts

It was found that the fix addressing CVE-2025-55184 in React Server Components was incomplete and does not prevent a denial of service attack in a specific case. React Server Components versions 19.0.2, 19.1.3 and 19.2.2 are affected, allowing unsafe deserialization of payloads from HTTP requests to Server Function endpoints. This can cause an infinite loop that hangs the server process and may pr

1 repos

https://github.com/williavs/nextjs-security-update

beyondmachines1 at 2025-12-13T08:01:31.608Z ##

New React Server vulnerabilities reported, enable Denial-of-Service attacks and source code exposure

Three new vulnerabilities were discovered in React Server Components (versions 19.0.0-19.2.2) following the React2Shell patch: two high-severity denial-of-service flaws (CVE-2025-55184, CVE-2025-67779) that can hang servers via malicious HTTP requests, and one medium-severity source code exposure vulnerability (CVE-2025-55183) that could leak hardcoded secrets.

**If you're using React Server Components or frameworks like Next.js, plan an upgrade to limit DoS risks and source code leaks. Not urgent like the React2Shell flaw, but a wise choice - especially the DoS patch. You don't want someone repeatedly crashing your application.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2025-12-13T08:01:31.000Z ##

New React Server vulnerabilities reported, enable Denial-of-Service attacks and source code exposure

Three new vulnerabilities were discovered in React Server Components (versions 19.0.0-19.2.2) following the React2Shell patch: two high-severity denial-of-service flaws (CVE-2025-55184, CVE-2025-67779) that can hang servers via malicious HTTP requests, and one medium-severity source code exposure vulnerability (CVE-2025-55183) that could leak hardcoded secrets.

**If you're using React Server Components or frameworks like Next.js, plan an upgrade to limit DoS risks and source code leaks. Not urgent like the React2Shell flaw, but a wise choice - especially the DoS patch. You don't want someone repeatedly crashing your application.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

cR0w@infosec.exchange at 2025-12-12T14:23:47.000Z ##

Happy patch your React Server Components again Friday to all who celebrate. The patch for CVE-2025-55184 was incomplete and still leaves systems vulnerable to DoS.

facebook.com/security/advisori

It was found that the fix addressing CVE-2025-55184 in React Server Components was incomplete and does not prevent a denial of service attack in a specific case. React Server Components versions 19.0.2, 19.1.3 and 19.2.2 are affected, allowing unsafe deserialization of payloads from HTTP requests to Server Function endpoints. This can cause an infinite loop that hangs the server process and may prevent future HTTP requests from being served.

##

CVE-2018-4063
(8.8 HIGH)

EPSS: 0.18%

updated 2025-12-12T19:15:59.653000

2 posts

An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability.

CVE-2025-56109
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:31:38

1 posts

OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR860 allowing attackers to execute arbitrary commands via a crafted POST request to the action_wireless in file /usr/lib/lua/luci/control/admin/wireless.lua.

CVE-2025-56106
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:31:38

1 posts

OS Command Injection vulnerability in Ruijie RG-EW1800GX B11P226_EW1800GX_10223121 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_sta/nbr_cwmp.lua.

CVE-2025-56099
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:31:37

1 posts

OS Command Injection vulnerability in Ruijie RG-YST AP_3.0(1)B11P280YST250F allowing attackers to execute arbitrary commands via a crafted POST request to the pwdmodify in file /usr/lib/lua/luci/modules/common.lua.

CVE-2025-56108
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:31:37

1 posts

OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowing attackers to execute arbitrary commands via a crafted POST request to the pwdmodify in file /usr/lib/lua/luci/modules/common.lua.

CVE-2025-56117
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:31:37

1 posts

OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_sta/nbr_cwmp.lua.

CVE-2025-56089
(8.8 HIGH)

EPSS: 0.14%

updated 2025-12-12T18:31:37

1 posts

OS Command Injection vulnerability in Ruijie M18 EW_3.0(1)B11P226_M18_10223116 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_sta/nbr_cwmp.lua.

CVE-2025-56098
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:31:37

1 posts

OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowing attackers to execute arbitrary commands via a crafted POST request to the module_get in file /usr/local/lua/dev_sta/networkConnect.lua.

CVE-2025-56107
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:31:36

1 posts

OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR600W allowing attackers to execute arbitrary commands via a crafted POST request to the submit_wifi in file /usr/lib/lua/luci/controller/admin/common_quick_config.lua.

CVE-2025-56110
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:31:36

1 posts

OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR860 allowing attackers to execute arbitrary commands via a crafted POST request to the action_deal_update in file /usr/lib/lua/luci/controller/api/rcmsAPI.lua.

CVE-2025-56101
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:31:36

1 posts

OS Command Injection vulnerability in Ruijie M18 EW_3.0(1)B11P226_M18_10223116 allowing attackers to execute arbitrary commands via a crafted POST request to the module_get in file /usr/local/lua/dev_sta/networkConnect.lua.

CVE-2025-56096
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:31:36

1 posts

OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR600W allowing attackers to execute arbitrary commands via a crafted POST request to the restart_modules in file /usr/lib/lua/luci/controller/admin/common.lua.

CVE-2025-56097
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:31:36

1 posts

OS Command Injection vulnerability in Ruijie RG-EW1800GX PRO B11P226_EW1800GX-PRO_10223117 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_config/config_retain.lua.

CVE-2025-56093
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:31:36

1 posts

OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowing attackers to execute arbitrary commands via a crafted POST request to the setWisp in file /usr/lib/lua/luci/modules/wireless.lua.

CVE-2025-56092
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:31:36

1 posts

OS Command Injection vulnerability in Ruijie X30 PRO V1 X30-PRO-V1_09241521 allowing attackers to execute arbitrary commands via a crafted POST request to the module_get in file /usr/local/lua/dev_sta/networkConnect.lua.

CVE-2025-56088
(8.8 HIGH)

EPSS: 0.14%

updated 2025-12-12T18:31:36

1 posts

OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR860 allowing attackers to execute arbitrary commands via a crafted POST request to the action_service in file /usr/lib/lua/luci/controller/admin/service.lua.

CVE-2025-56095
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:31:36

1 posts

OS Command Injection vulnerability in Ruijie RG-EW1200G PRO RG-EW1200G PRO V1.00/V2.00/V3.00/V4.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_sta/nbr_cwmp.lua.

CVE-2023-29144
(3.3 LOW)

EPSS: 0.00%

updated 2025-12-12T18:30:41

1 posts

Malwarebytes 1.0.14 for Linux doesn't properly compute signatures in some scenarios. This allows a bypass of detection.

jos1264@social.skynetcloud.site at 2025-12-12T17:45:00.000Z ##

CVE-2023-29144 - Malwarebytes Linux Signature Validation Bypass cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-56086
(8.8 HIGH)

EPSS: 0.14%

updated 2025-12-12T18:30:34

1 posts

OS Command Injection vulnerability in Ruijie RG-EW1200 EW_3.0(1)B11P227_EW1200_11130208RG-EW1200 V1.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_get in file /usr/local/lua/dev_sta/networkConnect.lua.

CVE-2025-56084
(8.8 HIGH)

EPSS: 0.14%

updated 2025-12-12T18:30:33

1 posts

OS Command Injection vulnerability in Ruijie RG-EW1800GX PRO B11P226_EW1800GX-PRO_10223117 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_sta/nbr_cwmp.lua.

CVE-2025-56085
(8.8 HIGH)

EPSS: 0.14%

updated 2025-12-12T18:30:33

1 posts

OS Command Injection vulnerability in Ruijie RG-EW1200 EW_3.0(1)B11P227_EW1200_11130208RG-EW1200 V1.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_config/config_retain.lua.

CVE-2025-56079
(8.8 HIGH)

EPSS: 0.14%

updated 2025-12-12T18:30:32

1 posts

OS Command Injection vulnerability in Ruijie RG-EW1300G EW1300G V1.00/V2.00/V4.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_get in file /usr/local/lua/dev_sta/networkConnect.lua.

CVE-2025-55184
(7.5 HIGH)

EPSS: 0.07%

updated 2025-12-12T18:18:29.827000

6 posts

A pre-authentication denial of service vulnerability exists in React Server Components versions 19.0.0, 19.0.1 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1, including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints, which can cause an infinite l

Nuclei template

8 repos

https://github.com/BakhodiribnYashinibnMansur/CVE-2025-55184

https://github.com/bountyyfi/lonkero

https://github.com/ejpir/CVE-2025-55184

https://github.com/williavs/nextjs-security-update

https://github.com/hans362/CVE-2025-55184-poc

https://github.com/abdozkaya/rsc-security-auditor

https://github.com/caohungphu/react2shell

https://github.com/StealthMoud/react-server-cve-lab

beyondmachines1 at 2025-12-13T08:01:31.608Z ##

New React Server vulnerabilities reported, enable Denial-of-Service attacks and source code exposure

Three new vulnerabilities were discovered in React Server Components (versions 19.0.0-19.2.2) following the React2Shell patch: two high-severity denial-of-service flaws (CVE-2025-55184, CVE-2025-67779) that can hang servers via malicious HTTP requests, and one medium-severity source code exposure vulnerability (CVE-2025-55183) that could leak hardcoded secrets.

**If you're using React Server Components or frameworks like Next.js, plan an upgrade to limit DoS risks and source code leaks. Not urgent like the React2Shell flaw, but a wise choice - especially the DoS patch. You don't want someone repeatedly crashing your application.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2025-12-13T08:01:31.000Z ##

New React Server vulnerabilities reported, enable Denial-of-Service attacks and source code exposure

Three new vulnerabilities were discovered in React Server Components (versions 19.0.0-19.2.2) following the React2Shell patch: two high-severity denial-of-service flaws (CVE-2025-55184, CVE-2025-67779) that can hang servers via malicious HTTP requests, and one medium-severity source code exposure vulnerability (CVE-2025-55183) that could leak hardcoded secrets.

**If you're using React Server Components or frameworks like Next.js, plan an upgrade to limit DoS risks and source code leaks. Not urgent like the React2Shell flaw, but a wise choice - especially the DoS patch. You don't want someone repeatedly crashing your application.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

cR0w@infosec.exchange at 2025-12-12T14:23:47.000Z ##

Happy patch your React Server Components again Friday to all who celebrate. The patch for CVE-2025-55184 was incomplete and still leaves systems vulnerable to DoS.

facebook.com/security/advisori

It was found that the fix addressing CVE-2025-55184 in React Server Components was incomplete and does not prevent a denial of service attack in a specific case. React Server Components versions 19.0.2, 19.1.3 and 19.2.2 are affected, allowing unsafe deserialization of payloads from HTTP requests to Server Function endpoints. This can cause an infinite loop that hangs the server process and may prevent future HTTP requests from being served.

##

cR0w@infosec.exchange at 2025-12-11T22:14:53.000Z ##

F5 finally confirmed their stuff is not impacted by CVE-2025-55184.

my.f5.com/manage/s/article/K00

##

jschauma@mstdn.social at 2025-12-11T21:29:25.000Z ##

If you just updated React / NextJS for #react2shell , you now get to update again. Two additional vulnerabilities identified in follow-up work were just published: CVE-2025-55183 (DoS), CVE-2025-55184 (Source Code Exposure)

react.dev/blog/2025/12/11/deni

nextjs.org/blog/security-updat

##

jos1264@social.skynetcloud.site at 2025-12-11T21:00:03.000Z ##

CVE-2025-55184 - "React Server Components Denial of Service Vulnerability" cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-55183
(5.3 MEDIUM)

EPSS: 0.06%

updated 2025-12-12T18:18:19.950000

4 posts

An information leak vulnerability exists in specific configurations of React Server Components versions 19.0.0, 19.0.1 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1, including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. A specifically crafted HTTP request sent to a vulnerable Server Function may unsafely return the source code of any Serve

7 repos

https://github.com/bountyyfi/lonkero

https://github.com/williavs/nextjs-security-update

https://github.com/kimtruth/CVE-2025-55183-poc

https://github.com/Saturate/CVE-2025-55183

https://github.com/X-Cotang/CVE-2025-55183_POC

https://github.com/StealthMoud/react-server-cve-lab

https://github.com/omaidnebari/RSC-Scanner-POC

beyondmachines1 at 2025-12-13T08:01:31.608Z ##

New React Server vulnerabilities reported, enable Denial-of-Service attacks and source code exposure

Three new vulnerabilities were discovered in React Server Components (versions 19.0.0-19.2.2) following the React2Shell patch: two high-severity denial-of-service flaws (CVE-2025-55184, CVE-2025-67779) that can hang servers via malicious HTTP requests, and one medium-severity source code exposure vulnerability (CVE-2025-55183) that could leak hardcoded secrets.

**If you're using React Server Components or frameworks like Next.js, plan an upgrade to limit DoS risks and source code leaks. Not urgent like the React2Shell flaw, but a wise choice - especially the DoS patch. You don't want someone repeatedly crashing your application.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2025-12-13T08:01:31.000Z ##

New React Server vulnerabilities reported, enable Denial-of-Service attacks and source code exposure

Three new vulnerabilities were discovered in React Server Components (versions 19.0.0-19.2.2) following the React2Shell patch: two high-severity denial-of-service flaws (CVE-2025-55184, CVE-2025-67779) that can hang servers via malicious HTTP requests, and one medium-severity source code exposure vulnerability (CVE-2025-55183) that could leak hardcoded secrets.

**If you're using React Server Components or frameworks like Next.js, plan an upgrade to limit DoS risks and source code leaks. Not urgent like the React2Shell flaw, but a wise choice - especially the DoS patch. You don't want someone repeatedly crashing your application.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

jschauma@mstdn.social at 2025-12-11T21:29:25.000Z ##

If you just updated React / NextJS for #react2shell , you now get to update again. Two additional vulnerabilities identified in follow-up work were just published: CVE-2025-55183 (DoS), CVE-2025-55184 (Source Code Exposure)

react.dev/blog/2025/12/11/deni

nextjs.org/blog/security-updat

##

jos1264@social.skynetcloud.site at 2025-12-11T21:00:03.000Z ##

CVE-2025-55183 - Apache React Server Components Information Disclosure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-56120
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:15:44.537000

1 posts

OS Command Injection vulnerability in Ruijie X60 PRO X60_10212014RG-X60 PRO V1.00/V2.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_config/config_retain.lua.

CVE-2025-56118
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:15:44.377000

1 posts

OS Command Injection vulnerability in Ruijie X60 PRO X60_10212014RG-X60 PRO V1.00/V2.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_sta/nbr_cwmp.lua.

CVE-2025-56114
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:15:44.047000

1 posts

OS Command Injection vulnerability in Ruijie M18 EW_3.0(1)B11P226_M18_10223116 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_config/config_retain.lua.

CVE-2025-56113
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:15:43.890000

1 posts

OS Command Injection vulnerability in Ruijie RG-YST EST, YSTAP_3.0(1)B11P280YST250F V1.xxV2.xx allowing attackers to execute arbitrary commands via a crafted POST request to the pwdmodify in file /usr/lib/lua/luci/modules/common.lua.

CVE-2025-56111
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:15:43.730000

1 posts

OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR860 allowing attackers to execute arbitrary commands via a crafted POST request to the network_set_wan_conf in file /usr/lib/lua/luci/controller/admin/netport.lua.

CVE-2025-56102
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:15:42.737000

1 posts

OS Command Injection vulnerability in Ruijie RG-EW1800GX B11P226_EW1800GX_10223121 allowing attackers to execute arbitrary commands via a crafted POST request to the module_get in file /usr/local/lua/dev_sta/networkConnect.lua.

CVE-2025-56094
(8.8 HIGH)

EPSS: 0.11%

updated 2025-12-12T18:15:41.603000

1 posts

OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowing attackers to execute arbitrary commands via a crafted POST request to the module_get in file /usr/local/lua/dev_sta/host_access_delay.lua.

CVE-2025-56091
(8.8 HIGH)

EPSS: 0.14%

updated 2025-12-12T18:15:41.120000

1 posts

OS Command Injection vulnerability in Ruijie RG-EW1800GX B11P226_EW1800GX_10223121 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_config/config_retain.lua.

CVE-2025-56090
(8.8 HIGH)

EPSS: 0.14%

updated 2025-12-12T18:15:40.960000

1 posts

OS Command Injection vulnerability in Ruijie RG-EW1200G PRO RG-EW1200G PRO V1.00/V2.00/V3.00/V4.00 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_config/config_retain.lua.

CVE-2025-56087
(8.8 HIGH)

EPSS: 0.14%

updated 2025-12-12T18:15:40.483000

1 posts

OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR600W allowing attackers to execute arbitrary commands via a crafted POST request to the run_tcpdump in file /usr/lib/lua/luci/controller/admin/common_tcpdump.lua.

CVE-2025-56083
(8.8 HIGH)

EPSS: 0.14%

updated 2025-12-12T18:15:39.843000

1 posts

OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_sta/nbr_networkId_merge.lua.

CVE-2025-56082
(8.8 HIGH)

EPSS: 0.14%

updated 2025-12-12T18:15:39.687000

1 posts

OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR600W allowing attackers to execute arbitrary commands via a crafted POST request to the check_changes in file /usr/lib/lua/luci/controller/admin/common.lua.

CVE-2025-56077
(8.8 HIGH)

EPSS: 0.14%

updated 2025-12-12T18:15:39.370000

1 posts

OS Command Injection vulnerability in Ruijie RG-RAP2200(E) 247 2200 allowing attackers to execute arbitrary commands via a crafted POST request to the module_set in file /usr/local/lua/dev_sta/nbr_cwmp.lua.

CVE-2025-64863
(5.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-12T17:33:20.543000

1 posts

Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

jos1264@social.skynetcloud.site at 2025-12-10T20:20:02.000Z ##

CVE-2025-64863 - Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64869
(5.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-12T17:32:54.870000

1 posts

Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

jos1264@social.skynetcloud.site at 2025-12-10T20:20:02.000Z ##

CVE-2025-64869 - Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64872
(4.8 MEDIUM)

EPSS: 0.06%

updated 2025-12-12T17:32:25.967000

1 posts

Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

jos1264@social.skynetcloud.site at 2025-12-10T20:20:02.000Z ##

CVE-2025-64872 - Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64887
(5.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-12T17:31:58.540000

1 posts

Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by a low privileged attacker to execute malicious scripts in the context of the victim's browser. Exploitation of this issue requires user interaction, such as visiting a crafted URL or interacting with a manipulated web page.

jos1264@social.skynetcloud.site at 2025-12-10T20:20:03.000Z ##

CVE-2025-64887 - Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65530
(8.8 HIGH)

EPSS: 0.00%

updated 2025-12-12T17:15:45.320000

1 posts

An eval injection in the malware de-obfuscation routines of CloudLinux ai-bolit before v32.7.4 allows attackers to overwrite arbitrary files as root via scanning a crafted file.

jos1264@social.skynetcloud.site at 2025-12-12T21:00:00.000Z ##

CVE-2025-65530 - CloudLinux ai-bolit Remote File Overwrite Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-26866(CVSS UNKNOWN)

EPSS: 0.73%

updated 2025-12-12T16:46:06

1 posts

A remote code execution vulnerability exists where a malicious Raft node can exploit insecure Hessian deserialization within the PD store. The fix enforces IP-based authentication to restrict cluster membership and implements a strict class whitelist to harden the Hessian serialization process against object injection attacks. Users are recommended to upgrade to version 1.7.0, which fixes the iss

jos1264@social.skynetcloud.site at 2025-12-12T21:00:00.000Z ##

CVE-2025-26866 - Apache HugeGraph-Server: RAFT and deserialization vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13780
(9.1 CRITICAL)

EPSS: 0.09%

updated 2025-12-12T16:42:56

1 posts

The PLAIN restore meta-command filter introduced in pgAdmin as part of the fix for CVE-2025-12762 does not detect meta-commands when a SQL file begins with a UTF-8 Byte Order Mark (EF BB BF) or other special byte sequences. The implemented filter uses the function `has_meta_commands()`, which scans raw bytes using a regular expression. The regex does not treat the bytes as ignorable, so meta-comma

2 repos

https://github.com/zeropwn/pgadmin4-9.10-CVE-2025-13780

https://github.com/meenakshisl/PoC-CVE-2025-13780

jos1264@social.skynetcloud.site at 2025-12-11T20:10:03.000Z ##

CVE-2025-13780 - Remote Code Execution vulnerability when restoring PLAIN-format SQL dumps in server mode (pgAdmin 4) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-36743(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-12T15:30:51

1 posts

SolarEdge SE3680H has an exposed debug/test interface accessible to unauthenticated actors, allowing disclosure of system internals and execution of debug commands.

cR0w@infosec.exchange at 2025-12-12T16:58:13.000Z ##

Most of these SolarEdge vulns are local and unlikely to be a major issue ( assuming no supply chain / logistics compromise ) but they could be useful for people looking to hack on some of their own gear.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-36745(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-12T15:30:51

1 posts

SolarEdge SE3680H  ships with an outdated Linux kernel containing unpatched vulnerabilities in core subsystems. An attacker with network or local access can exploit these flaws to achieve remote code execution, privilege escalation, or disclosure of sensitive information.

cR0w@infosec.exchange at 2025-12-12T16:58:13.000Z ##

Most of these SolarEdge vulns are local and unlikely to be a major issue ( assuming no supply chain / logistics compromise ) but they could be useful for people looking to hack on some of their own gear.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-66039
(0 None)

EPSS: 0.07%

updated 2025-12-12T15:19:07.567000

2 posts

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions are vulnerable to authentication bypass when the authentication type is set to "webserver." When providing an Authorization header with an arbitrary value, a session is associated with the target user regardless of valid credentials. This issue is fixed in versions 16.0.44 and 17.0.23.

CVE-2020-36896
(0 None)

EPSS: 0.23%

updated 2025-12-12T15:18:42.140000

1 posts

QiHang Media Web Digital Signage 3.0.9 contains a cleartext credentials vulnerability that allows unauthenticated attackers to access administrative login information through an unprotected XML file. Attackers can retrieve hardcoded admin credentials by requesting the '/xml/User/User.xml' file, enabling direct authentication bypass.

jos1264@social.skynetcloud.site at 2025-12-10T23:05:01.000Z ##

CVE-2020-36896 - QiHang Media Web Digital Signage 3.0.9 Cleartext Credentials Disclosure cvefeed.io/vuln/detail/CVE-202

##

CVE-2020-36895
(0 None)

EPSS: 0.14%

updated 2025-12-12T15:18:42.140000

1 posts

EIBIZ i-Media Server Digital Signage 3.8.0 contains an unauthenticated configuration disclosure vulnerability that allows remote attackers to access sensitive configuration files via direct object reference. Attackers can retrieve the SiteConfig.properties file through an HTTP GET request, exposing administrative credentials, database connection details, and system configuration information.

jos1264@social.skynetcloud.site at 2025-12-10T23:05:01.000Z ##

CVE-2020-36895 - EIBIZ i-Media Server Digital Signage 3.8.0 Unauthenticated Configuration Disclosure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13607
(9.4 CRITICAL)

EPSS: 0.04%

updated 2025-12-12T15:18:42.140000

1 posts

A malicious actor can access camera configuration information, including account credentials, without authenticating when accessing a vulnerable URL.

jos1264@social.skynetcloud.site at 2025-12-10T19:00:02.000Z ##

CVE-2025-13607 - Cisco Camera Unauthenticated Configuration Information Disclosure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14265
(9.1 CRITICAL)

EPSS: 0.03%

updated 2025-12-12T15:18:13.390000

3 posts

In versions of ScreenConnect™ prior to 25.8, server-side validation and integrity checks within the extension subsystem could allow the installation and execution of untrusted or arbitrary extensions by authorized or administrative users. Abuse of this behavior could result in the execution of custom code on the server or unauthorized access to application configuration data. This issue affects on

beyondmachines1 at 2025-12-13T09:01:31.768Z ##

ConnectWise ScreenConnect patches critical code execution flaw

ConnectWise patched a critical vulnerability (CVE-2025-14265) in ScreenConnect remote maintenance software that allows authenticated attackers to execute arbitrary code by installing malicious extensions. All versions prior to 25.8 are affected; cloud servers were auto-updated while on-premises deployments require manual upgrade to version 25.8.

**Not urgent, but important. If you use on-premises ConnectWise ScreenConnect, plan an upgrade to version 25.8. The flaw is limited to users who are already admin, so it's not immediately exploitable. But an admin account can be compromised, so remind your admins of risks of infostealers and phishing.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2025-12-13T09:01:31.000Z ##

ConnectWise ScreenConnect patches critical code execution flaw

ConnectWise patched a critical vulnerability (CVE-2025-14265) in ScreenConnect remote maintenance software that allows authenticated attackers to execute arbitrary code by installing malicious extensions. All versions prior to 25.8 are affected; cloud servers were auto-updated while on-premises deployments require manual upgrade to version 25.8.

**Not urgent, but important. If you use on-premises ConnectWise ScreenConnect, plan an upgrade to version 25.8. The flaw is limited to users who are already admin, so it's not immediately exploitable. But an admin account can be compromised, so remind your admins of risks of infostealers and phishing.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

jos1264@social.skynetcloud.site at 2025-12-11T16:45:01.000Z ##

CVE-2025-14265 - Improper server-side validation in ScreenConnect extension framework cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14046
(0 None)

EPSS: 0.05%

updated 2025-12-12T15:18:13.390000

1 posts

An improper neutralization of input vulnerability was identified in GitHub Enterprise Server that allowed user-supplied HTML to inject DOM elements with IDs that collided with server-initialized data islands. These collisions could overwrite or shadow critical application state objects used by certain Project views, leading to unintended server-side POST requests or other unauthorized backend inte

jos1264@social.skynetcloud.site at 2025-12-11T20:10:02.000Z ##

CVE-2025-14046 - Insufficient HTML Sanitization Allows User-Controlled DOM Elements to Overwrite Server-Initialized Data Islands and Trigger Unintended Server-Side POST Requests cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66046
(9.8 CRITICAL)

EPSS: 0.08%

updated 2025-12-12T15:18:13.390000

1 posts

Several stack-based buffer overflow vulnerabilities exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.1. A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger these vulnerabilities.When Tag is 67

jos1264@social.skynetcloud.site at 2025-12-11T20:10:02.000Z ##

CVE-2025-66046 - Biosig Project libbiosig MFER Parsing Buffer Overflow Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66048
(9.8 CRITICAL)

EPSS: 0.08%

updated 2025-12-12T15:18:13.390000

1 posts

Several stack-based buffer overflow vulnerabilities exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.1. A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger these vulnerabilities.When Tag is 133

jos1264@social.skynetcloud.site at 2025-12-11T20:10:02.000Z ##

CVE-2025-66048 - Biosig Project libbiosig MFER Parsing Stack-Based Buffer Overflow Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66044
(9.8 CRITICAL)

EPSS: 0.08%

updated 2025-12-12T15:18:13.390000

1 posts

Several stack-based buffer overflow vulnerabilities exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.1. A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger these vulnerabilities.When Tag is 64

jos1264@social.skynetcloud.site at 2025-12-11T20:10:02.000Z ##

CVE-2025-66044 - Biosig Project libbiosig Arbitrary Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14535
(9.8 CRITICAL)

EPSS: 0.04%

updated 2025-12-12T15:18:13.390000

1 posts

A vulnerability was identified in UTT 进取 512W up to 3.1.7.7-171114. Affected is the function strcpy of the file /goform/formConfigFastDirectionW. The manipulation of the argument ssid leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-67741
(4.6 MEDIUM)

EPSS: 0.01%

updated 2025-12-12T15:18:13.390000

1 posts

In JetBrains TeamCity before 2025.11 stored XSS was possible via session attribute

jos1264@social.skynetcloud.site at 2025-12-11T18:35:02.000Z ##

CVE-2025-67741 - JetBrains TeamCity Stored XSS Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67742
(3.8 LOW)

EPSS: 0.00%

updated 2025-12-12T15:18:13.390000

1 posts

In JetBrains TeamCity before 2025.11 path traversal was possible via file upload

jos1264@social.skynetcloud.site at 2025-12-11T18:35:02.000Z ##

CVE-2025-67742 - JetBrains TeamCity Arbitrary File Access Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67739
(3.1 LOW)

EPSS: 0.00%

updated 2025-12-12T15:18:13.390000

1 posts

In JetBrains TeamCity before 2025.11.2 improper repository URL validation could lead to local paths disclosure

jos1264@social.skynetcloud.site at 2025-12-11T18:35:02.000Z ##

CVE-2025-67739 - JetBrains TeamCity Unvalidated Repository URL Disclosure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59803
(5.3 MEDIUM)

EPSS: 0.02%

updated 2025-12-12T15:18:13.390000

1 posts

Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via triggers. An attacker can embed triggers (e.g., JavaScript) in a PDF document that execute during the signing process. When a signer reviews the document, the content appears normal. However, once the signature is applied, the triggers modify content on other pages or optional content layers without explicit warning. This can

jos1264@social.skynetcloud.site at 2025-12-11T18:35:01.000Z ##

CVE-2025-59803 - Foxit PDF Editor and Reader Signature Spoofing Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-55314
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-12T15:18:13.390000

1 posts

An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13.2 and 2025 before 2025.2. When pages in a PDF are deleted via JavaScript, the application may fail to properly update internal states. Subsequent annotation management operations assume these states are valid, causing dereference of invalid or released memory. This can lead to memory corruption, application crashes, an

jos1264@social.skynetcloud.site at 2025-12-11T18:35:01.000Z ##

CVE-2025-55314 - Foxit PDF and Editor Memory Corruption Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14512
(6.5 MEDIUM)

EPSS: 0.03%

updated 2025-12-12T15:18:13.390000

1 posts

A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.

cR0w@infosec.exchange at 2025-12-11T17:19:36.000Z ##

BoF in glib.

access.redhat.com/security/cve

A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.

##

CVE-2025-14523
(8.2 HIGH)

EPSS: 0.03%

updated 2025-12-12T15:18:13.390000

2 posts

A flaw in libsoup’s HTTP header handling allows multiple Host: headers in a request and returns the last occurrence for server-side processing. Common front proxies often honor the first Host: header, so this mismatch can cause vhost confusion where a proxy routes a request to one backend but the backend interprets it as destined for another host. This discrepancy enables request-smuggling style a

jos1264@social.skynetcloud.site at 2025-12-11T16:45:01.000Z ##

CVE-2025-14523 - Libsoup: libsoup: duplicate host header handling causes host-parsing discrepancy (first- vs last-value wins) cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-11T16:15:02.000Z ##

CVE-2025-14523 - Libsoup: libsoup: duplicate host header handling causes host-parsing discrepancy (first- vs last-value wins) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14516
(6.3 MEDIUM)

EPSS: 0.04%

updated 2025-12-12T15:18:13.390000

1 posts

A vulnerability was found in Yalantis uCrop 2.2.11. Affected by this issue is the function downloadFile of the file com.yalantis.ucrop.task.BitmapLoadTask.java of the component URL Handler. Performing manipulation results in server-side request forgery. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but

jos1264@social.skynetcloud.site at 2025-12-11T16:15:02.000Z ##

CVE-2025-14516 - Yalantis uCrop URL com.yalantis.ucrop.task.BitmapLoadTask.java downloadFile server-side request forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14514
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-12T15:18:13.390000

1 posts

A flaw has been found in Campcodes Supplier Management System 1.0. Affected is an unknown function of the file /admin/add_distributor.php. This manipulation of the argument txtDistributorAddress causes sql injection. The attack can be initiated remotely. The exploit has been published and may be used.

jos1264@social.skynetcloud.site at 2025-12-11T14:10:03.000Z ##

CVE-2025-14514 - Campcodes Supplier Management System add_distributor.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64994
(6.5 MEDIUM)

EPSS: 0.01%

updated 2025-12-12T15:18:13.390000

1 posts

A privilege escalation vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-SetWorkRate instruction prior V17.1. The improper handling of executable search paths could allow local attackers with write access to a PATH directory on a device to escalate privileges and execute arbitrary code as SYSTEM.

jos1264@social.skynetcloud.site at 2025-12-11T14:10:03.000Z ##

CVE-2025-64994 - Privilege Escalation via Uncontrolled Search Path in 1E-Nomad-SetWorkRate instruction cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64993
(6.8 MEDIUM)

EPSS: 0.14%

updated 2025-12-12T15:18:13.390000

1 posts

A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-ConfigMgrConsoleExtensions instructions. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.

jos1264@social.skynetcloud.site at 2025-12-11T14:10:03.000Z ##

CVE-2025-64993 - Command Injection in 1E-ConfigMgrConsoleExtensions Instructions cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64992
(6.8 MEDIUM)

EPSS: 0.14%

updated 2025-12-12T15:18:13.390000

1 posts

A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-PauseNomadJobQueue instruction prior V25. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.

jos1264@social.skynetcloud.site at 2025-12-11T14:10:02.000Z ##

CVE-2025-64992 - Command Injection in 1E-Nomad-PauseNomadJobQueue Instruction cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64987
(7.2 HIGH)

EPSS: 0.29%

updated 2025-12-12T15:18:13.390000

1 posts

A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Explorer-TachyonCore-CheckSimpleIoC instruction. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.

jos1264@social.skynetcloud.site at 2025-12-11T14:10:02.000Z ##

CVE-2025-64987 - Command Injection in 1E-Explorer-TachyonCore-CheckSimpleIoC Instruction cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-44016
(8.8 HIGH)

EPSS: 0.04%

updated 2025-12-12T15:18:13.390000

1 posts

A vulnerability in TeamViewer DEX Client (former 1E client) - Content Distribution Service (NomadBranch.exe) prior version 25.11 for Windows allows malicious actors to bypass file integrity validation via a crafted request. By providing a valid hash for a malicious file, an attacker can cause the service to incorrectly validate and process the file as trusted, enabling arbitrary code execution und

jos1264@social.skynetcloud.site at 2025-12-11T13:40:02.000Z ##

CVE-2025-44016 - File Hash Validation Bypass in NomadBranch.exe cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64701
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-12T15:18:13.390000

1 posts

QND Premium/Advance/Standard Ver.11.0.9i and prior contains a privilege escalation vulnerability, which may allow a user who can log in to a Windows system with the affected product to gain administrator privileges. As a result, sensitive information may be accessed or altered, and arbitrary actions may be performed.

jos1264@social.skynetcloud.site at 2025-12-11T10:10:02.000Z ##

CVE-2025-64701 - QND Premium/Advance/Standard Windows Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12029
(8.0 HIGH)

EPSS: 0.04%

updated 2025-12-12T15:18:13.390000

1 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 15.11 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 that could have, under certain circumstances, allowed an unauthenticated user to perform unauthorized actions on behalf of another user by injecting malicious external scripts into the Swagger UI."

jos1264@social.skynetcloud.site at 2025-12-11T10:10:02.000Z ##

CVE-2025-12029 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67738
(8.5 HIGH)

EPSS: 0.04%

updated 2025-12-12T15:18:13.390000

1 posts

squid/cachemgr.cgi in Webmin before 2.600 does not properly quote arguments. This is relevant if Webmin's Squid module and its Cache Manager feature are available, and an untrusted party is able to authenticate to Webmin and has certain Cache Manager permissions (the "cms" security option).

jos1264@social.skynetcloud.site at 2025-12-11T10:10:02.000Z ##

CVE-2025-67738 - Squid Webmin Unquoted Argument Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11247
(4.3 MEDIUM)

EPSS: 0.01%

updated 2025-12-12T15:18:13.390000

1 posts

GitLab has remediated an issue in GitLab EE affecting all versions from 13.2 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 that could have allowed an authenticated user to disclose sensitive information from private projects by executing specifically crafted GraphQL queries.

jos1264@social.skynetcloud.site at 2025-12-11T07:00:03.000Z ##

CVE-2025-11247 - Authorization Bypass Through User-Controlled Key in GitLab cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12716
(8.7 HIGH)

EPSS: 0.02%

updated 2025-12-12T15:18:13.390000

1 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.4 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 that, under certain conditions could have allowed an authenticated user to perform unauthorized actions on behalf of another user by creating wiki pages with malicious content.

jos1264@social.skynetcloud.site at 2025-12-11T06:05:02.000Z ##

CVE-2025-12716 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13764
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-12-12T15:18:13.390000

2 posts

The WP CarDealer plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.2.16. This is due to the 'WP_CarDealer_User::process_register' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site.

jos1264@social.skynetcloud.site at 2025-12-11T06:05:02.000Z ##

CVE-2025-13764 - WP CarDealer <= 1.2.16 - Unauthenticated Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-11T02:55:02.000Z ##

CVE-2025-13764 - WP CarDealer <= 1.2.16 - Unauthenticated Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67719
(0 None)

EPSS: 0.01%

updated 2025-12-12T15:18:13.390000

2 posts

Ibexa is a composable end-to-end DXP (Digital Experience Platform). Versions 5.0.0-beta1 through 5.0.3 do not have password validation. During the transition from v4 to v5 an error was introduced into validation code which causes the validation of the previous password not to run as expected. This makes it possible for a logged in user to change their password in the back office without knowing th

jos1264@social.skynetcloud.site at 2025-12-11T06:05:02.000Z ##

CVE-2025-67719 - Ibexa User Bundle is missing password change validation cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-11T02:55:03.000Z ##

CVE-2025-67719 - Ibexa User Bundle is missing password change validation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67718
(0 None)

EPSS: 0.04%

updated 2025-12-12T15:18:13.390000

2 posts

Form.io is a combined Form and API platform for Serverless applications. Versions 3.5.6 and below and 4.0.0-rc.1 through 4.4.2 contain a flaw in path handling which could allow an attacker to access protected API endpoints by sending a crafted request path. An unauthenticated or unauthorized request could retrieve data from endpoints that should be protected. This issue is fixed in versions 3.5.7

jos1264@social.skynetcloud.site at 2025-12-11T02:55:02.000Z ##

CVE-2025-67718 - Formio improperly authorized permission elevation through specially crafted request path cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-11T02:00:03.000Z ##

CVE-2025-67718 - Formio improperly authorized permission elevation through specially crafted request path cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67717
(0 None)

EPSS: 0.03%

updated 2025-12-12T15:18:13.390000

1 posts

ZITADEL is an open-source identity infrastructure tool. Versions 2.44.0 through 3.4.4 and 4.0.0-rc.1 through 4.7.1 disclose the total number of instance users to authenticated users, regardless of their specific permissions. While this does not leak individual user data or PII, disclosing the total user count via the totalResult field constitutes an information disclosure vulnerability that may be

jos1264@social.skynetcloud.site at 2025-12-11T02:55:02.000Z ##

CVE-2025-67717 - Zitadel Discloses the Total Number of Instance Users cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67648
(7.1 HIGH)

EPSS: 0.03%

updated 2025-12-12T15:18:13.390000

1 posts

Shopware is an open commerce platform. Versions 6.4.6.0 through 6.6.10.9 and 6.7.0.0 through 6.7.5.0 have a Reflected XSS vulnerability in AuthController.php. A request parameter from the login page URL is directly rendered within the Twig template of the Storefront login page without further processing or input validation. This allows direct code injection into the template via the URL parameter,

jos1264@social.skynetcloud.site at 2025-12-11T02:55:02.000Z ##

CVE-2025-67648 - Shopware's inproper input validation can lead to Reflected XSS through Storefront Login Page cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67646
(3.5 LOW)

EPSS: 0.01%

updated 2025-12-12T15:18:13.390000

1 posts

TableProgressTracking is a MediaWiki extension to track progress against specific criterion. Versions 1.2.0 and below do not enforce CSRF token validation in the REST API. As a result, an attacker could craft a malicious webpage that, when visited by an authenticated user on a wiki with the extension enabled, would trigger unintended authenticated actions through the victim's browser. Due to the l

jos1264@social.skynetcloud.site at 2025-12-11T02:55:01.000Z ##

CVE-2025-67646 - TableProgressTracking's missing CSRF protection allows unauthorized state changes cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67509
(8.2 HIGH)

EPSS: 0.04%

updated 2025-12-12T15:18:13.390000

1 posts

Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO

jos1264@social.skynetcloud.site at 2025-12-11T02:00:02.000Z ##

CVE-2025-67509 - MySQLSelectTool Read-Only Bypass via SELECT INTO OUTFILE Allows Arbitrary File Write cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67505
(8.4 HIGH)

EPSS: 0.04%

updated 2025-12-12T15:18:13.390000

1 posts

Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.

CVE-2025-66628
(7.5 HIGH)

EPSS: 0.03%

updated 2025-12-12T15:18:13.390000

1 posts

ImageMagick is a software suite to create, edit, compose, or convert bitmap images. In versions 7.1.2-9 and prior, the TIM (PSX TIM) image parser contains a critical integer overflow vulnerability in its ReadTIMImage function (coders/tim.c). The code reads width and height (16-bit values) from the file header and calculates image_size = 2 * width * height without checking for overflow. On 32-bit s

1 repos

https://github.com/Sumitshah00/CVE-2025-66628

jos1264@social.skynetcloud.site at 2025-12-11T00:15:03.000Z ##

CVE-2025-66628 - ImageMagick is vulnerable to an Integer Overflow in TIM decoder leading to out of bounds read (32-bit only) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65297
(7.5 HIGH)

EPSS: 0.01%

updated 2025-12-12T15:18:13.390000

1 posts

Aqara Hub devices including Camera Hub G3 4.1.9_0027, Hub M2 4.3.6_0027, and Hub M3 4.3.6_0025 automatically collect and upload unencrypted sensitive information. Note that this occurs without disclosure or consent from the manufacturer.

CVE-2025-65295
(8.1 HIGH)

EPSS: 0.04%

updated 2025-12-12T15:18:13.390000

1 posts

Multiple vulnerabilities in Aqara Hub firmware update process in the Camera Hub G3 4.1.9_0027, Hub M2 4.3.6_0027, and Hub M3 4.3.6_0025 devices, allow attackers to install malicious firmware without proper verification. The device fails to validate firmware signatures during updates, uses outdated cryptographic methods that can be exploited to forge valid signatures, and exposes information throug

jos1264@social.skynetcloud.site at 2025-12-11T00:15:02.000Z ##

CVE-2025-65295 - Aqara Hub Firmware Update Signature Forgery and Information Exposure Vulnerabilities cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65293
(6.6 MEDIUM)

EPSS: 0.04%

updated 2025-12-12T15:18:13.390000

1 posts

Command injection vulnerabilities in Aqara Camera Hub G3 4.1.9_0027 allow attackers to execute arbitrary commands with root privileges through malicious QR codes during device setup and factory reset.

jos1264@social.skynetcloud.site at 2025-12-11T00:15:01.000Z ##

CVE-2025-65293 - Aqara Camera Hub G3 Command Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2020-36902
(0 None)

EPSS: 0.09%

updated 2025-12-12T15:18:13.390000

1 posts

UBICOD Medivision Digital Signage 1.5.1 contains an authorization bypass vulnerability that allows normal users to escalate privileges by manipulating the 'ft[grp]' parameter. Attackers can send a GET request to /html/user with 'ft[grp]' set to integer value '3' to gain super admin rights without authentication.

jos1264@social.skynetcloud.site at 2025-12-10T23:05:02.000Z ##

CVE-2020-36902 - UBICOD Medivision Digital Signage 1.5.1 Authorization Bypass via User Privileges cvefeed.io/vuln/detail/CVE-202

##

CVE-2020-36901
(0 None)

EPSS: 0.02%

updated 2025-12-12T15:18:13.390000

1 posts

UBICOD Medivision Digital Signage 1.5.1 contains a cross-site request forgery vulnerability that allows attackers to create administrative user accounts without proper request validation. Attackers can craft a malicious web page that submits a form to the /query/user/itSet endpoint to add a new admin user with elevated privileges.

jos1264@social.skynetcloud.site at 2025-12-10T23:05:02.000Z ##

CVE-2020-36901 - UBICOD Medivision Digital Signage 1.5.1 Cross-Site Request Forgery via User Management cvefeed.io/vuln/detail/CVE-202

##

CVE-2020-36899
(0 None)

EPSS: 0.24%

updated 2025-12-12T15:18:13.390000

1 posts

QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated file disclosure vulnerability that allows remote attackers to access sensitive files through unverified 'filename' and 'path' parameters. Attackers can exploit the QH.aspx endpoint to read arbitrary files and directory contents without authentication by manipulating download and getAll actions.

jos1264@social.skynetcloud.site at 2025-12-10T23:05:02.000Z ##

CVE-2020-36899 - QiHang Media Web Digital Signage 3.0.9 Unauthenticated Arbitrary File Disclosure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-36744
(0 None)

EPSS: 0.00%

updated 2025-12-12T15:17:31.973000

1 posts

SolarEdge SE3680H has unauthenticated disclosure of sensitive information during the bootloader loop. While the device repeatedly initializes and waits for boot instructions, the bootloader emits diagnostic output this behavior can leak operating system information.

cR0w@infosec.exchange at 2025-12-12T16:58:13.000Z ##

Most of these SolarEdge vulns are local and unlikely to be a major issue ( assuming no supply chain / logistics compromise ) but they could be useful for people looking to hack on some of their own gear.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-36746
(0 None)

EPSS: 0.00%

updated 2025-12-12T15:17:31.973000

1 posts

SolarEdge monitoring platform contains a Cross‑Site Scripting (XSS) flaw that allows an authenticated user to inject payloads into report names, which may execute in a victim’s browser during a deletion attempt.

cR0w@infosec.exchange at 2025-12-12T16:58:13.000Z ##

Most of these SolarEdge vulns are local and unlikely to be a major issue ( assuming no supply chain / logistics compromise ) but they could be useful for people looking to hack on some of their own gear.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-14537
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-12T15:17:31.973000

1 posts

A weakness has been identified in code-projects Class and Exam Timetable Management 1.0. Affected by this issue is some unknown functionality of the file /preview7.php. This manipulation of the argument course_year_section/semester causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.

jos1264@social.skynetcloud.site at 2025-12-11T21:00:03.000Z ##

CVE-2025-14537 - code-projects Class and Exam Timetable Management preview7.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13663
(6.7 MEDIUM)

EPSS: 0.01%

updated 2025-12-12T15:17:31.973000

1 posts

Under certain circumstances, the Quartus Prime Pro Installer for Windows does not check the permissions of the Quartus target installation directory if the target installation directory already exists.

jos1264@social.skynetcloud.site at 2025-12-11T21:00:04.000Z ##

CVE-2025-13663 - Quartus Prime Pro Edition Installer Advisory cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-36937
(0 None)

EPSS: 0.04%

updated 2025-12-12T15:17:31.973000

1 posts

In AudioDecoder::HandleProduceRequest of audio_decoder.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

jos1264@social.skynetcloud.site at 2025-12-11T21:00:03.000Z ##

CVE-2025-36937 - Adobe AudioDecoder Out-of-Bounds Write RCE cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-36936
(0 None)

EPSS: 0.01%

updated 2025-12-12T15:17:31.973000

1 posts

In GetTachyonCommand of tachyon_server_common.h, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

jos1264@social.skynetcloud.site at 2025-12-11T21:00:03.000Z ##

CVE-2025-36936 - Tachyon Server Local Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-36938
(5.1 MEDIUM)

EPSS: 0.01%

updated 2025-12-12T00:31:29

1 posts

In U-Boot of append_uint32_le(), there is a possible fault injection due to a logic error in the code. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

jos1264@social.skynetcloud.site at 2025-12-11T21:00:03.000Z ##

CVE-2025-36938 - U-Boot Integer Underflow Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-36934
(6.7 MEDIUM)

EPSS: 0.01%

updated 2025-12-12T00:31:27

1 posts

In bigo_worker_thread of private/google-modules/video/gchips/bigo.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

jos1264@social.skynetcloud.site at 2025-12-11T21:00:02.000Z ##

CVE-2025-36934 - Google Bigo Use After Free Vulnerability (Local Privilege Escalation) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-8110(CVSS UNKNOWN)

EPSS: 0.08%

updated 2025-12-11T22:02:22

3 posts

Improper Symbolic link handling in the PutContents API in Gogs allows Local Execution of Code.

2 repos

https://github.com/Ashwesker/Blackash-CVE-2025-8110

https://github.com/rxerium/CVE-2025-8110

DarkWebInformer@infosec.exchange at 2025-12-11T20:21:12.000Z ##

🚨 CVE-2025-8110 (Zero-Day) Detection Template: Improper Symbolic link handling in the PutContents API in Gogs allows Local Execution of Code

GitHub: github.com/rxerium/CVE-2025-81

Writeup: wiz.io/blog/wiz-research-gogs-

##

jbhall56@infosec.exchange at 2025-12-11T13:32:07.000Z ##

The flaw, tracked as CVE-2025-8110 (CVSS score: 8.7), is a case of file overwrite in the file update API of the Go-based self-hosted Git service. thehackernews.com/2025/12/unpa

##

beyondmachines1@infosec.exchange at 2025-12-11T10:01:31.000Z ##

Gogs Zero-Day vulnerability actively exploited

A zero-day vulnerability (CVE-2025-8110) in Gogs self-hosted Git service allows authenticated attackers to achieve remote code execution through a symlink bypass. Over 700 instances are reported as compromised since July 2025. Despite responsible disclosure in July and acknowledgment in October 2025, no patch is available as of December 10, 2025.

**If you're running Gogs (version 0.13.3 or earlier), this is urgent. Disable open registration in your settings and place the service behind a VPN or IP allow-list - there's an actively exploited vulnerability with no available patch. Check your server for suspicious repositories with random 8-character owner and repository names. These indicate your server is probably already compromised.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2025-58360
(8.2 HIGH)

EPSS: 73.17%

updated 2025-12-11T21:55:34

2 posts

## Description An XML External Entity (XXE) vulnerability was identified. The application accepts XML input through a specific endpoint ``/geoserver/wms`` operation ``GetMap``. However, this input is not sufficiently sanitized or restricted, allowing an attacker to define external entities within the XML request. An XML External Entity attack is a type of attack that occurs when XML input contai

Nuclei template

4 repos

https://github.com/quyenheu/CVE-2025-58360

https://github.com/Ashwesker/Blackash-CVE-2025-58360

https://github.com/Joker-Wiggin/CVE-2025-58360-GeoServer-XXE

https://github.com/rxerium/CVE-2025-58360

DarkWebInformer@infosec.exchange at 2025-12-11T23:31:14.000Z ##

🚨 CVE-2025-58360: OSGeo GeoServer Improper Restriction of XML External Entity Reference Vulnerability has been added to the CISA KEV Catalog

CVSS: 8.2

darkwebinformer.com/cisa-kev-c

##

cisakevtracker@mastodon.social at 2025-12-11T20:01:02.000Z ##

CVE ID: CVE-2025-58360
Vendor: OSGeo
Product: GeoServer
Date Added: 2025-12-11
Notes: This vulnerability affects an open-source component, third-party library, or a protocol used by different products. For more information, please see: github.com/geoserver/geoserver ; osgeo-org.atlassian.net/browse ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-14293
(6.5 MEDIUM)

EPSS: 0.04%

updated 2025-12-11T21:31:45

1 posts

The WP Job Portal plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.4.0 via the 'downloadCustomUploadedFile' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

jos1264@social.skynetcloud.site at 2025-12-11T21:00:03.000Z ##

CVE-2025-14293 - WP Job Portal <= 2.4.0 - Authenticated (Subscriber+) Arbitrary File Read cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-36935(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-12-11T21:31:45

1 posts

In trusty_ffa_mem_reclaim of shared-mem-smcall.c, there is a possible memory corruption due to uninitialized data. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

jos1264@social.skynetcloud.site at 2025-12-11T21:00:02.000Z ##

CVE-2025-36935 - Apache Shared-Memory Memory Corruption Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14534
(9.8 CRITICAL)

EPSS: 0.04%

updated 2025-12-11T21:31:39

2 posts

A vulnerability was determined in UTT 进取 512W up to 3.1.7.7-171114. This impacts the function strcpy of the file /goform/formNatStaticMap of the component Endpoint. Executing manipulation of the argument NatBind can lead to buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did

CVE-2025-67740
(2.7 LOW)

EPSS: 0.00%

updated 2025-12-11T18:31:48

1 posts

In JetBrains TeamCity before 2025.11 improper access control could expose GitHub App token's metadata

jos1264@social.skynetcloud.site at 2025-12-11T18:35:02.000Z ##

CVE-2025-67740 - JetBrains TeamCity GitHub App Token Metadata Access Control Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65296
(6.5 MEDIUM)

EPSS: 0.02%

updated 2025-12-11T18:31:48

1 posts

NULL-pointer dereference vulnerabilities in Aqara Hub M2 4.3.6_0027, Hub M3 4.3.6_0025, and Camera Hub G3 4.1.9_0027 in the JSON processing enable denial-of-service attacks through malformed JSON inputs.

jos1264@social.skynetcloud.site at 2025-12-11T00:15:02.000Z ##

CVE-2025-65296 - Aqara Hub M2/Camera Hub G3 Denial-of-Service JSON Processing NULL Pointer Dereference cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65294
(9.8 CRITICAL)

EPSS: 0.24%

updated 2025-12-11T18:31:48

1 posts

Aqara Hub devices including Camera Hub G3 4.1.9_0027, Hub M2 4.3.6_0027, and Hub M3 4.3.6_0025 contain an undocumented remote access mechanism enabling unrestricted remote command execution.

CVE-2025-66047
(9.8 CRITICAL)

EPSS: 0.08%

updated 2025-12-11T18:30:53

1 posts

Several stack-based buffer overflow vulnerabilities exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.1. A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger these vulnerabilities.When Tag is 131

jos1264@social.skynetcloud.site at 2025-12-11T20:10:02.000Z ##

CVE-2025-66047 - Biosig Project libbiosig MFER Parsing Stack-Based Buffer Overflow Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66045
(9.8 CRITICAL)

EPSS: 0.08%

updated 2025-12-11T18:30:53

1 posts

Several stack-based buffer overflow vulnerabilities exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.1. A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger these vulnerabilities.When Tag is 65

jos1264@social.skynetcloud.site at 2025-12-11T20:10:02.000Z ##

CVE-2025-66045 - Biosig Project libbiosig Stack-based Buffer Overflow Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66043
(9.8 CRITICAL)

EPSS: 0.08%

updated 2025-12-11T18:30:53

1 posts

Several stack-based buffer overflow vulnerabilities exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.1. A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger these vulnerabilities.When Tag is 3

jos1264@social.skynetcloud.site at 2025-12-11T20:10:01.000Z ##

CVE-2025-66043 - Biosig Project Libbiosig MFER Parsing Stack-Based Buffer Overflow Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65473
(9.1 CRITICAL)

EPSS: 0.06%

updated 2025-12-11T18:30:53

1 posts

An arbitrary file rename vulnerability in the /admin/filer.php component of EasyImages 2.0 v2.8.6 and below allows attackers with Administrator privileges to execute arbitrary code via injecting a crafted payload into an uploaded file name.

jos1264@social.skynetcloud.site at 2025-12-11T20:10:01.000Z ##

CVE-2025-65473 - EasyImages Arbitrary File Rename Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14526
(8.8 HIGH)

EPSS: 0.09%

updated 2025-12-11T18:30:53

2 posts

A security flaw has been discovered in Tenda CH22 1.0.0.1. This affects the function frmL7ImForm of the file /goform/L7Im. Performing manipulation of the argument page results in buffer overflow. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited.

CVE-2025-14528
(5.3 MEDIUM)

EPSS: 0.04%

updated 2025-12-11T18:30:53

1 posts

A vulnerability was detected in D-Link DIR-803 up to 1.04. Impacted is an unknown function of the file /getcfg.php of the component Configuration Handler. The manipulation of the argument AUTHORIZED_GROUP results in information disclosure. The attack may be performed from remote. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the

CVE-2025-55313
(7.8 HIGH)

EPSS: 0.02%

updated 2025-12-11T18:30:48

1 posts

An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13.2 and 2025 before 2025.2. They allow potential arbitrary code execution when processing crafted PDF files. The vulnerability stems from insufficient handling of memory allocation failures after assigning an extremely large value to a form field's charLimit property via JavaScript. This can result in memory corruption a

jos1264@social.skynetcloud.site at 2025-12-11T18:35:01.000Z ##

CVE-2025-55313 - Foxit PDF and Editor Arbitrary Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2024-8273(CVSS UNKNOWN)

EPSS: 0.07%

updated 2025-12-11T18:30:45

1 posts

Authentication Bypass by Spoofing vulnerability in HYPR Server allows Identity Spoofing.This issue affects Server: before 10.1.

CVE-2025-59802
(7.5 HIGH)

EPSS: 0.03%

updated 2025-12-11T18:30:45

1 posts

Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via OCG. When Optional Content Groups (OCG) are supported, the state property of an OCG is runtime-only and not included in the digital signature computation buffer. An attacker can leverage JavaScript or PDF triggers to dynamically change the visibility of OCG content after signing (Post-Sign), allowing the visual content of a s

CVE-2025-14321
(9.8 CRITICAL)

EPSS: 0.04%

updated 2025-12-11T18:30:41

1 posts

Use-after-free in the WebRTC: Signaling component. This vulnerability affects Firefox < 146 and Firefox ESR < 140.6.

Firefox@activitypub.awakari.com at 2025-12-10T22:23:21.000Z ## Debian: firefox-esr Critical Privilege Escalation DSA-6078-1 CVE-2025-14321 Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execut...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-67511
(9.7 CRITICAL)

EPSS: 0.10%

updated 2025-12-11T17:22:16

1 posts

### Summary A command injection vulnerability is present in the function tool `run_ssh_command_with_credentials()` available to AI agents. ### Details This is the source code of the function tool `run_ssh_command_with_credentials()` ([code](https://github.com/aliasrobotics/cai/blob/0.5.9/src/cai/tools/command_and_control/sshpass.py#L20)): ```python @function_tool def run_ssh_command_with_crede

jos1264@social.skynetcloud.site at 2025-12-11T02:00:02.000Z ##

CVE-2025-67511 - Cybersecurity AI (CAI) vulnerable to Command Injection in run_ssh_command_with_credentials Agent tool cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67716
(3.7 LOW)

EPSS: 0.05%

updated 2025-12-11T15:51:55

1 posts

### Description An input-validation flaw in the returnTo parameter in the Auth0 Next.js SDK could allow attackers to inject unintended OAuth query parameters into the Auth0 authorization request. Successful exploitation may result in tokens being issued with unintended parameters ### Am I Affected? You are affected if you meet the following preconditions: - Applications using the auth0/nextjs-aut

jos1264@social.skynetcloud.site at 2025-12-11T02:55:02.000Z ##

CVE-2025-67716 - Auth0 Next.js SDK has Improper Validation of Query Parameters cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67720
(6.5 MEDIUM)

EPSS: 0.04%

updated 2025-12-11T15:51:44

1 posts

## Summary The `download_media` method in Pyrofork does not sanitize filenames received from Telegram messages before using them in file path construction. This allows a remote attacker to write files to arbitrary locations on the filesystem by sending a specially crafted document with path traversal sequences (e.g., `../`) or absolute paths in the filename. --- ## Details When downloading med

jos1264@social.skynetcloud.site at 2025-12-11T02:55:03.000Z ##

CVE-2025-67720 - Pyrofork has a Path Traversal in download_media Method cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67713(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-12-11T15:51:11

1 posts

### Summary `redirect_url` is treated as safe when `url.Parse(...).IsAbs()` is false. Protocol-relative URLs like `//ikotaslabs.com` have an empty scheme and pass that check, allowing post-login redirects to attacker-controlled sites. ### Details - `url.Parse("//ikotaslabs.com")` => empty Scheme, Host="ikotaslabs.com". - `IsAbs()` returns false for `//ikotaslabs.com`, so the code treats it as all

jos1264@social.skynetcloud.site at 2025-12-11T02:55:02.000Z ##

CVE-2025-67713 - Miniflux 2 has an Open Redirect via protocol-relative `redirect_url` cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67510
(9.4 CRITICAL)

EPSS: 0.06%

updated 2025-12-11T15:49:18

1 posts

### Impact `MySQLWriteTool` executes arbitrary SQL provided by the caller using `PDO::prepare()` + `execute()` without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as `DROP TABLE`, `TRUNCATE`, `DELETE`, `ALTER

jos1264@social.skynetcloud.site at 2025-12-11T02:00:02.000Z ##

CVE-2025-67510 - MySQLWriteTool allows arbitrary/destructive SQL when exposed to untrusted prompts (agent “footgun”) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66474(CVSS UNKNOWN)

EPSS: 0.47%

updated 2025-12-11T15:48:03

2 posts

### Impact Any user who can edit their own user profile or any other document can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The reason is that rendering output is included as content of HTML macros with insufficient escaping, and it is thus possible to close the HTML macro a

jos1264@social.skynetcloud.site at 2025-12-11T02:00:02.000Z ##

CVE-2025-66474 - XWiki vulnerable to remote code execution through insufficient protection against {{/html}} injection cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-11T00:15:02.000Z ##

CVE-2025-66474 - XWiki vulnerable to remote code execution through insufficient protection against {{/html}} injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66473(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-12-11T15:47:50

2 posts

### Impact XWiki's REST API doesn't enforce any limits for the number of items that can be requested in a single request at the moment. Depending on the number of pages in the wiki and the memory configuration, this can lead to slowness and unavailability of the wiki. As an example, the `/rest/wikis/xwiki/spaces` resource returns all spaces on the wiki by default, which are basically all pages. #

jos1264@social.skynetcloud.site at 2025-12-11T02:00:01.000Z ##

CVE-2025-66473 - XWiki's REST APIs don't enforce any limits, leading to unavailability and OOM in large wikis cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-11T00:15:02.000Z ##

CVE-2025-66473 - XWiki's REST APIs don't enforce any limits, leading to unavailability and OOM in large wikis cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66472(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-12-11T15:47:40

1 posts

### Impact A reflected XSS vulnerability in XWiki allows an attacker to send a victim to a URL with a deletion confirmation message on which the attacker-supplied script is executed when the victim clicks the "No" button. When the victim has admin or programming right, this allows the attacker to execute basically arbitrary actions on the XWiki installation including remote code execution. ### Pa

jos1264@social.skynetcloud.site at 2025-12-11T00:15:02.000Z ##

CVE-2025-66472 - XWiki vulnerable to a reflected XSS via xredirect parameter in DeleteApplication cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66033
(5.3 MEDIUM)

EPSS: 0.04%

updated 2025-12-11T15:47:31

1 posts

### Description In the Okta Java SDK, specific multithreaded implementations may encounter memory issues as threads are not properly cleaned up after requests are completed. Over time, this can degrade performance and availability in long-running applications and may result in a denial-of-service condition under sustained load. ### Affected product and versions You may be affected by this vulnera

jos1264@social.skynetcloud.site at 2025-12-11T00:15:02.000Z ##

CVE-2025-66033 - Improper Memory Cleanup in the Okta Java SDK cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14515
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-11T15:30:36

1 posts

A vulnerability has been found in Campcodes Supplier Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/add_unit.php. Such manipulation of the argument txtunitDetails leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

jos1264@social.skynetcloud.site at 2025-12-11T16:15:02.000Z ##

CVE-2025-14515 - Campcodes Supplier Management System add_unit.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13003
(7.6 HIGH)

EPSS: 0.03%

updated 2025-12-11T15:30:36

1 posts

Authorization Bypass Through User-Controlled Key vulnerability in Aksis Computer Services and Consulting Inc. AxOnboard allows Exploitation of Trusted Identifiers.This issue affects AxOnboard: from 3.2.0 before 3.3.0.

CVE-2025-14517
(5.3 MEDIUM)

EPSS: 0.01%

updated 2025-12-11T15:30:33

1 posts

A vulnerability was determined in Yalantis uCrop 2.2.11. This affects the function UCropActivity  of the file AndroidManifest.xml. Executing manipulation can lead to improper export of android application components. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any w

jos1264@social.skynetcloud.site at 2025-12-11T16:15:02.000Z ##

CVE-2025-14517 - Yalantis uCrop AndroidManifest.xml UCropActivity  improper export of android application components cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64995
(6.5 MEDIUM)

EPSS: 0.01%

updated 2025-12-11T12:30:34

1 posts

A privilege escalation vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Exchange-NomadClientHealth-ConfigureGeneralSetting instruction prior V3.4. Improper protection of the execution path on the local device allows attackers, with local access to the device during execution, to hijack the process and execute arbitrary code with SYSTEM privileges.

jos1264@social.skynetcloud.site at 2025-12-11T14:10:03.000Z ##

CVE-2025-64995 - Privilege Escalation via Process Hijacking in 1E-Exchange-NomadClientHealth-ConfigureGeneralSetting instruction cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64988
(7.2 HIGH)

EPSS: 0.29%

updated 2025-12-11T12:30:34

1 posts

A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-GetCmContentLocations instruction prior V19.2. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.

jos1264@social.skynetcloud.site at 2025-12-11T14:10:02.000Z ##

CVE-2025-64988 - Command Injection in 1E-Nomad-GetCmContentLocations Instruction cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64991
(6.8 MEDIUM)

EPSS: 0.14%

updated 2025-12-11T12:30:29

1 posts

A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-PatchInsights-Deploy instruction prior V15. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.

jos1264@social.skynetcloud.site at 2025-12-11T14:10:02.000Z ##

CVE-2025-64991 - Command Injection in 1E-PatchInsights-Deploy Instruction cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64990
(6.8 MEDIUM)

EPSS: 0.14%

updated 2025-12-11T12:30:28

1 posts

A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Explorer-TachyonCore-LogoffUser instruction prior V21.1. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.

jos1264@social.skynetcloud.site at 2025-12-11T14:10:02.000Z ##

CVE-2025-64990 - Command Injection in 1E-Explorer-TachyonCore-LogoffUser Instruction cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64989
(7.2 HIGH)

EPSS: 0.29%

updated 2025-12-11T12:30:28

1 posts

A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Explorer-TachyonCore-FindFileBySizeAndHash instruction prior V21.1. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.

jos1264@social.skynetcloud.site at 2025-12-11T14:10:02.000Z ##

CVE-2025-64989 - Command Injection in 1E-Explorer-TachyonCore-FindFileBySizeAndHash Instruction cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-4097
(6.5 MEDIUM)

EPSS: 0.03%

updated 2025-12-11T06:30:33

1 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.10 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 that could have allowed an authenticated user to cause a denial of service condition by uploading specially crafted images.

jos1264@social.skynetcloud.site at 2025-12-11T07:00:03.000Z ##

CVE-2025-4097 - Allocation of Resources Without Limits or Throttling in GitLab cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67694(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-11T06:30:33

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-12-11T07:00:03.000Z ##

CVE-2025-67694 - Apache HTTP Server Cross-Site Request Forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-9436
(6.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-11T06:30:33

1 posts

The Widgets for Google Reviews plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `trustindex` shortcode in all versions up to, and including, 13.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pa

jos1264@social.skynetcloud.site at 2025-12-11T07:00:03.000Z ##

CVE-2025-9436 - Widgets for Google Reviews <= 13.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via trustindex Shortcode cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-8405
(8.7 HIGH)

EPSS: 0.01%

updated 2025-12-11T06:30:32

2 posts

GitLab has remediated a security issue in GitLab CE/EE affecting all versions from 17.1 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 that could have allowed an authenticated user to perform unauthorized actions on behalf of other users by injecting malicious HTML into vulnerability code flow displays.

jos1264@social.skynetcloud.site at 2025-12-11T07:00:04.000Z ##

CVE-2025-8405 - Improper Encoding or Escaping of Output in GitLab cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-11T06:05:02.000Z ##

CVE-2025-8405 - Improper Encoding or Escaping of Output in GitLab cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11984
(6.8 MEDIUM)

EPSS: 0.02%

updated 2025-12-11T06:30:32

1 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.1 before 18.4.6, 18.5 before 18.5.4, and 18.6 before 18.6.2 that could have allowed an authenticated user to bypass WebAuthn two-factor authentication by manipulating the session state under certain conditions.

jos1264@social.skynetcloud.site at 2025-12-11T07:00:03.000Z ##

CVE-2025-11984 - Authentication Bypass Using an Alternate Path or Channel in GitLab cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67692(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-11T06:30:32

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-12-11T07:00:03.000Z ##

CVE-2025-67692 - Apache HTTP Server Cross-Site Request Forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67691(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-11T06:30:32

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-12-11T07:00:02.000Z ##

CVE-2025-67691 - Apache Struts Deserialization Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67690(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-11T06:30:32

1 posts

Rejected reason: Not used

CVE-2025-67693
(0 None)

EPSS: 0.00%

updated 2025-12-11T04:15:59.570000

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-12-11T07:00:03.000Z ##

CVE-2025-67693 - Apache Apache HTTP Server Missing Authentication for Configuration cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11467
(5.8 MEDIUM)

EPSS: 0.04%

updated 2025-12-11T03:30:35

1 posts

The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 5.1.1 via the feedzy_lazy_load function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to

jos1264@social.skynetcloud.site at 2025-12-11T02:55:02.000Z ##

CVE-2025-11467 - RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator <= 5.1.1 - Unauthenticated Blind Server-Side Request Forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2020-36898(CVSS UNKNOWN)

EPSS: 1.55%

updated 2025-12-10T21:31:48

1 posts

QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated file deletion vulnerability in the QH.aspx endpoint that allows remote attackers to delete files without authentication. Attackers can exploit the 'data' parameter by sending a POST request with file paths to delete arbitrary files with web server permissions using directory traversal sequences.

jos1264@social.skynetcloud.site at 2025-12-10T23:05:01.000Z ##

CVE-2020-36898 - QiHang Media Web Digital Signage 3.0.9 Unauthenticated Arbitrary File Deletion cvefeed.io/vuln/detail/CVE-202

##

CVE-2020-36900(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-10T21:31:47

1 posts

All-Dynamics Digital Signage System 2.0.2 contains a cross-site request forgery vulnerability that allows attackers to create administrative users without proper request validation. Attackers can craft a malicious web page that automatically submits forms to create a new user with global administrative privileges when a logged-in user visits the page.

jos1264@social.skynetcloud.site at 2025-12-10T23:05:02.000Z ##

CVE-2020-36900 - All-Dynamics Digital Signage System 2.0.2 Cross-Site Request Forgery via User Management cvefeed.io/vuln/detail/CVE-202

##

CVE-2020-36897(CVSS UNKNOWN)

EPSS: 0.28%

updated 2025-12-10T21:31:47

1 posts

QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated remote code execution vulnerability in the QH.aspx file that allows attackers to upload malicious ASPX scripts. Attackers can exploit the file upload functionality by using the 'remotePath' and 'fileToUpload' parameters to write and execute arbitrary system commands on the server.

jos1264@social.skynetcloud.site at 2025-12-10T23:05:01.000Z ##

CVE-2020-36897 - QiHang Media Web Digital Signage 3.0.9 Unauthenticated Remote Code Execution cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65199
(7.8 HIGH)

EPSS: 0.03%

updated 2025-12-10T21:31:47

1 posts

A command injection vulnerability exists in Windscribe for Linux Desktop App that allows a local user who is a member of the windscribe group to execute arbitrary commands as root via the 'adapterName' parameter of the 'changeMTU' function. Fixed in Windscribe v2.18.3-alpha and v2.18.8.

jos1264@social.skynetcloud.site at 2025-12-10T20:20:03.000Z ##

CVE-2025-65199 - Windscribe for Linux 'changeMTU' local privilege escalation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64888
(5.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-10T21:31:47

1 posts

Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be exploited by a low privileged attacker to execute malicious scripts in the context of the victim's browser. Exploitation of this issue requires user interaction, such as visiting a crafted URL or interacting with a manipulated web page.

jos1264@social.skynetcloud.site at 2025-12-10T20:20:03.000Z ##

CVE-2025-64888 - Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79) cvefeed.io/vuln/detail/CVE-202

##

CVE-2023-53740(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-12-10T21:31:46

1 posts

Screen SFT DAB 1.9.3 contains an authentication bypass vulnerability that allows attackers to change the admin password without providing the current credentials. Attackers can exploit the userManager.cgx endpoint by sending a crafted JSON request with a new MD5-hashed password to directly modify the admin account.

jos1264@social.skynetcloud.site at 2025-12-10T23:05:02.000Z ##

CVE-2023-53740 - Screen SFT DAB 1.9.3 Authentication Bypass via Admin Password Change cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64881
(5.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-10T21:31:46

1 posts

Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

jos1264@social.skynetcloud.site at 2025-12-10T20:20:03.000Z ##

CVE-2025-64881 - Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64875
(5.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-10T21:31:46

1 posts

Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

jos1264@social.skynetcloud.site at 2025-12-10T20:20:03.000Z ##

CVE-2025-64875 - Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64873
(5.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-10T21:31:46

1 posts

Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

jos1264@social.skynetcloud.site at 2025-12-10T20:20:02.000Z ##

CVE-2025-64873 - Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64861
(5.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-10T21:31:46

1 posts

Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

jos1264@social.skynetcloud.site at 2025-12-10T20:20:02.000Z ##

CVE-2025-64861 - Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64537
(9.3 CRITICAL)

EPSS: 0.52%

updated 2025-12-10T21:31:33

1 posts

Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by injecting malicious scripts into a web page that are executed in the context of the victim's browser. A successful attacker can abuse this to achieve session takeover, increasing the co

jos1264@social.skynetcloud.site at 2025-12-10T19:00:03.000Z ##

CVE-2025-64537 - Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-34424(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-12-10T18:30:37

1 posts

MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability that can lead to local arbitrary code execution. The MailEnable administrative executable attempts to load MEAIDP.DLL from its installation directory without sufficient integrity validation or a secure search order. A local attacker with write access to that directory can plant a malicious MEAIDP.DLL, which is then load

jos1264@social.skynetcloud.site at 2025-12-10T19:00:02.000Z ##

CVE-2025-34424 - MailEnable < 10.54 DLL Hijacking via Unsafe Loading of MEAIDP.DLL cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-34423(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-12-10T18:30:37

1 posts

MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability that can lead to local arbitrary code execution. The MailEnable administrative executable attempts to load MEAIAU.DLL from its installation directory without sufficient integrity validation or a secure search order. A local attacker with write access to that directory can plant a malicious MEAIAU.DLL, which is then load

jos1264@social.skynetcloud.site at 2025-12-10T19:00:02.000Z ##

CVE-2025-34423 - MailEnable < 10.54 DLL Hijacking via Unsafe Loading of MEAIAU.DLL cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-55182
(10.0 CRITICAL)

EPSS: 76.01%

updated 2025-12-10T02:00:02.557000

10 posts

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Nuclei template

100 repos

https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-

https://github.com/m3m0ryc0rrupt/CVE-2025-55182-PoC

https://github.com/freeqaz/react2shell

https://github.com/StealthMoud/CVE-2025-55182-Scanner

https://github.com/MedusaSH/POC-CVE-2025-55182

https://github.com/chitoz1300/React2Shell-CVE-2025-55182

https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc

https://github.com/jf0x3a/CVE-2025-55182-exploit

https://github.com/ejpir/CVE-2025-55182-bypass

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/techgaun/cve-2025-55182-scanner

https://github.com/Saturate/CVE-2025-55182-Scanner

https://github.com/fatguru/CVE-2025-55182-scanner

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS

https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI

https://github.com/IrsyadSEC/CVE-2025-55182-MassPayloadAttack

https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182

https://github.com/santihabib/CVE-2025-55182-analysis

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/sickwell/CVE-2025-55182

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/f0xyx/CVE-2025-55182-Scanner

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/SainiONHacks/CVE-2025-55182-Scanner

https://github.com/C00LN3T/React2Shell

https://github.com/yz9yt/React2Shell-CTF

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/Ashwesker/Blackash-CVE-2025-55182

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/xiaopeng-ye/react2shell-detector

https://github.com/LemonTeatw1/CVE-2025-55182-exploit

https://github.com/ihsansencan/React2Shell-CVE-2025-55182

https://github.com/7amzahard/React2shell

https://github.com/EynaExp/CVE-2025-55182-POC

https://github.com/assetnote/react2shell-scanner

https://github.com/theori-io/reactguard

https://github.com/Hghost0x00/CVE-2025-55182

https://github.com/cypholab/evilact

https://github.com/SoICT-BKSEC/CVE-2025-55182-docker-lab

https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell

https://github.com/dwisiswant0/CVE-2025-55182

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/kavienanj/CVE-2025-55182

https://github.com/kk12-30/CVE-2025-55182

https://github.com/zxz3650/CVE-2025-55182-POC

https://github.com/hualy13/CVE-2025-55182

https://github.com/GelukCrab/React-Server-Components-RCE

https://github.com/ynsmroztas/NextRce

https://github.com/Chocapikk/CVE-2025-55182

https://github.com/im-ezboy/CVE-2025-55182-zoomeye

https://github.com/yanoshercohen/React2Shell_CVE-2025-55182

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/xkillbit/cve-2025-55182-scanner

https://github.com/FurkanKAYAPINAR/ReactNext2Shell

https://github.com/AliHzSec/CVE-2025-55182

https://github.com/zzhorc/CVE-2025-55182

https://github.com/Spritualkb/CVE-2025-55182-exp

https://github.com/mrknow001/RSC_Detector

https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/xcanwin/CVE-2025-55182-React-RCE

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/Night-have-dreams/CVE-2025-55182-PoC

https://github.com/alsaut1/react2shell-lab

https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE

https://github.com/msanft/CVE-2025-55182

https://github.com/whiteov3rflow/CVE-2025-55182-poc

https://github.com/sumanrox/rschunter

https://github.com/acheong08/CVE-2025-55182-poc

https://github.com/shamo0/react2shell-PoC

https://github.com/shyambhanushali/React2Shell

https://github.com/hoosin/CVE-2025-55182

https://github.com/RuoJi6/CVE-2025-55182-RCE-shell

https://github.com/VeilVulp/RscScan-cve-2025-55182

https://github.com/Archerkong/CVE-2025-55182

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web

https://github.com/andrei2308/react2shell

https://github.com/c0rydoras/CVE-2025-55182

https://github.com/ThemeHackers/CVE-2025-55182

https://github.com/ejpir/CVE-2025-55182-research

https://github.com/ayoub-intigriti/react2shell-cve

https://github.com/gensecaihq/react2shell-scanner

https://github.com/kOaDT/poc-cve-2025-55182

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/logesh-GIT001/CVE-2025-55182

https://github.com/keklick1337/CVE-2025-55182-golang-PoC

https://github.com/XiaomingX/CVE-2025-55182-poc

https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-

https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive

https://github.com/sudo-Yangziran/CVE-2025-55182POC

https://github.com/emredavut/CVE-2025-55182

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/horsenyet/RSC-Detect-CVE-2025-55182

https://github.com/nehkark/CVE-2025-55182

https://github.com/surajhacx/react2shellpoc

https://github.com/timsonner/React2Shell-CVE-2025-55182

https://github.com/zack0x01/vuln-app-CVE-2025-55182

https://github.com/gagaltotal/tot-react-rce-CVE-2025-55182

https://github.com/Pizz33/CVE-2025-55182-burpscanner

catc0n@infosec.exchange at 2025-12-12T18:29:22.000Z ##

VulnCheck analyzed several hundred #React2Shell CVE-2025-55182 exploits so you don't have to!

Amid all the slop (and there's so, so much slop) were some interesting finds that understandably escaped attention, including an early in-memory webshell variant, a PoC with logic that loads the Godzilla webshell, and a repo that deploys a lightweight WAF to block React2Shell payloads entirely (!)

@albinolobster wrote about exploit characteristics in aggregate and broke out the cooler examples here:

vulncheck.com/blog/react2shell

##

technadu@infosec.exchange at 2025-12-12T17:10:32.000Z ##

React2Shell exploitation now enables persistent access via EtherRAT’s blockchain-based C2.

technadu.com/react2shell-explo

• Unauthenticated RCE via CVE-2025-55182
• EtherRAT instructions hidden inside Ethereum smart contracts
• Gov + cloud + critical-infrastructure orgs selectively targeted
• Unique per-host payloads hinder signature detection
• Monitor Node.js anomalies + Ethereum RPC activity

#React2Shell #CVE202555182 #EtherRAT #CyberSecurity #ThreatIntel #NextJS #AppSec

##

jos1264@social.skynetcloud.site at 2025-12-12T16:45:00.000Z ##

Critical React2Shell Vulnerability (CVE-2025-55182) Analysis: Surge in Attacks Targeting RSC-Enabled Services Worldwide cybersecuritynews.com/react2sh #PressRelease

##

Kubernetes@activitypub.awakari.com at 2025-12-11T07:41:39.000Z ## React2Shell: Decoding CVE-2025-55182 – The Silent Threat in React Server Components On December 3, 2025, a critical remote code execution (RCE) vulnerability, dubbed “React2Shell,” was disclo...

#Product #and #Tech #Vulnerabilities #and #Threat #Research #CSAM #KCS #React2Shell #TotalAppSec

Origin | Interest | Match ##

AAKL@infosec.exchange at 2025-12-11T16:59:34.000Z ##

Cisco posted this yesterday, if you missed it:

Critical: CVE-2025-55182: Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #vulnerability #React

##

Kubernetes@activitypub.awakari.com at 2025-12-11T07:41:39.000Z ## React2Shell: Decoding CVE-2025-55182 – The Silent Threat in React Server Components On December 3, 2025, a critical remote code execution (RCE) vulnerability, dubbed “React2Shell,” was disclo...

#Product #and #Tech #Vulnerabilities #and #Threat #Research #CSAM #KCS #React2Shell #TotalAppSec

Origin | Interest | Match ##

jbhall56@infosec.exchange at 2025-12-11T12:53:31.000Z ##

In addition to React, CVE-2025-55182 impacts other frameworks, including Next.js, Waku, React Router, and RedwoodSDK. securityweek.com/wide-range-of

##

Kubernetes@activitypub.awakari.com at 2025-12-11T07:41:39.000Z ## React2Shell: Decoding CVE-2025-55182 – The Silent Threat in React Server Components On December 3, 2025, a critical remote code execution (RCE) vulnerability, dubbed “React2Shell,” was disclo...

#Product #and #Tech #Vulnerabilities #and #Threat #Research #CSAM #KCS #React2Shell #TotalAppSec

Origin | Interest | Match ##

oversecurity@mastodon.social at 2025-12-11T07:50:31.000Z ##

It didn’t take long: CVE-2025-55182 is now under active exploitation

Threat actors are now exploiting CVE-2025-55182, and attacks are poised to grow. Here's what you need to know about the vulnerability, how our...

🔗️ [Securelist] link.is.it/p03Ho5

##

_r_netsec@infosec.exchange at 2025-12-11T03:13:06.000Z ##

How widespread is the impact of Critical Security Vulnerability in React Server Components(CVE-2025-55182) helixguard.ai/blog/CVE-2025-55

##

CVE-2025-54100
(7.8 HIGH)

EPSS: 0.17%

updated 2025-12-09T18:30:47

1 posts

Improper neutralization of special elements used in a command ('command injection') in Windows PowerShell allows an unauthorized attacker to execute code locally.

2 repos

https://github.com/osman1337-security/CVE-2025-54100

https://github.com/ThemeHackers/CVE-2025-54100

knoppix95@mastodon.social at 2025-12-12T15:10:32.000Z ##

PowerShell 5.1 now shows warnings when scripts use Invoke-WebRequest to fetch web content, aiming to limit silent script execution risks tied to CVE-2025-54100. ⚠️

Admins are urged to switch to -UseBasicParsing to avoid unintended code parsing and prevent automation hang-ups. 🛡️

🔗 bleepingcomputer.com/news/secu

#TechNews #Cybersecurity #Windows #PowerShell #Security #Privacy #InfoSec #Patch #Update #Automation #IT #DevOps #Risk #Technology #Development #Shell #Script #CVE #Vulnerability

##

CVE-2025-40801
(8.1 HIGH)

EPSS: 0.02%

updated 2025-12-09T18:30:43

1 posts

A vulnerability has been identified in COMOS V10.6 (All versions), COMOS V10.6 (All versions), JT Bi-Directional Translator for STEP (All versions), NX V2412 (All versions < V2412.8900 with Cloud Entitlement (bundled as NX X)), NX V2506 (All versions < V2506.6000 with Cloud Entitlement (bundled as NX X)), Simcenter 3D (All versions < V2506.6000 with Cloud Entitlement (bundled as Simcenter X Mechan

beyondmachines1@infosec.exchange at 2025-12-12T18:01:32.000Z ##

Critical flaw reported in Siemens advanced licensing toolkit

Siemens disclosed a critical vulnerability (CVE-2025-40801) in its SALT Toolkit affecting multiple industrial software products, which allows unauthenticated attackers to perform man-in-the-middle attacks due to improper TLS certificate validation. Patches are available for some affected products (NX, Simcenter 3D, Simcenter Femap, and Tecnomatix Plant Simulation), but others are not patched.

**If you use any Siemens products, make sure they are isolated from the internet and only accessible from trusted networks. Plan an update for the products if patches available (NX, Simcenter 3D, Simcenter Femap, or Tecnomatix). For products without fixes, network isolation is the only available mitigation.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-66491
(5.9 MEDIUM)

EPSS: 0.01%

updated 2025-12-09T16:32:30

1 posts

## Impact There is a potential vulnerability in Traefik NGINX provider managing the `nginx.ingress.kubernetes.io/proxy-ssl-verify` annotation. The provider inverts the semantics of the `nginx.ingress.kubernetes.io/proxy-ssl-verify` annotation. Setting the annotation to `"on"` (intending to enable backend TLS certificate verification) actually disables verification, allowing man-in-the-middle att

campuscodi@mastodon.social at 2025-12-11T12:04:33.000Z ##

A popular reverse proxy and ingress controller shipped misconfigured versions for the past five months.

The Traefik setting that enabled TLS verification was actually disabling it across the board.

aisle.com/blog/cve-2025-66491-

##

CVE-2025-66516(CVSS UNKNOWN)

EPSS: 0.06%

updated 2025-12-05T02:26:57

1 posts

Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. This CVE covers the same vulnerability as in CVE-2025-54988. However, this CVE expands the scope of affected packages in two ways. First, while the entrypoi

2 repos

https://github.com/chasingimpact/CVE-2025-66516-Writeup-POC

https://github.com/Ashwesker/Blackash-CVE-2025-66516

GossiTheDog@cyberplace.social at 2025-12-12T12:25:22.000Z ##

On Apache Tika vulnerability CVE-2025-66516

- The fix was released in August.

- It's the same vulnerability as CVE-2025-54988 from August, they just issued a new CVE (which they probably shouldn't have) as they filed the scope wrong.

- It doesn't provide RCE. You can read local files with it as the Java user, e.g. /etc/passwd.

- Exploitation requires knowing a specific endpoint which processes PDFs to be vulnerable (so exploitation would be tailored).

It's not one to panic over.

##

CVE-2025-54988
(9.8 CRITICAL)

EPSS: 0.03%

updated 2025-11-05T20:40:58

1 posts

Critical XXE in Apache Tika (tika-parser-pdf-module) in Apache Tika 1.13 through and including 3.2.1 on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. An attacker may be able to read sensitive data or trigger malicious requests to internal resources or third-party servers. Note that the tika-parser-pdf-module is used as a depende

1 repos

https://github.com/mgthuramoemyint/POC-CVE-2025-54988

GossiTheDog@cyberplace.social at 2025-12-12T12:25:22.000Z ##

On Apache Tika vulnerability CVE-2025-66516

- The fix was released in August.

- It's the same vulnerability as CVE-2025-54988 from August, they just issued a new CVE (which they probably shouldn't have) as they filed the scope wrong.

- It doesn't provide RCE. You can read local files with it as the Java user, e.g. /etc/passwd.

- Exploitation requires knowing a specific endpoint which processes PDFs to be vulnerable (so exploitation would be tailored).

It's not one to panic over.

##

CVE-2025-49144
(7.3 HIGH)

EPSS: 0.01%

updated 2025-10-23T14:15:35.980000

1 posts

Notepad++ is a free and open-source source code editor. In versions 8.8.1 and prior, a privilege escalation vulnerability exists in the Notepad++ v8.8.1 installer that allows unprivileged users to gain SYSTEM-level privileges through insecure executable search paths. An attacker could use social engineering or clickjacking to trick users into downloading both the legitimate installer and a malicio

9 repos

https://github.com/0xCZR1/cve-2025-49144

https://github.com/onniio/CVE-2025-49144

https://github.com/Vr00mm/CVE-2025-49144

https://github.com/b0ySie7e/Notepad-8.8.1_CVE-2025-49144

https://github.com/timsonner/CVE-2025-49144-Research

https://github.com/ammarm0010/CVE-2025-49144_PoC

https://github.com/assad12341/notepad-v8.8.1-LPE-CVE-

https://github.com/TheTorjanCaptain/CVE-2025-49144_PoC

https://github.com/havertz2110/CVE-2025-49144

earthshine@masto.hackers.town at 2025-12-12T18:15:37.000Z ##

If you use PDQ, the Notepad++ 8.8.9 auto upgrade package is now available, but may require manual updates to your existing jobs to point to it. Patch that #0day if you haven't already. CVE-2025-49144

##

CVE-2025-49113
(9.9 CRITICAL)

EPSS: 88.03%

updated 2025-06-12T17:15:29.310000

1 posts

Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.

Nuclei template

22 repos

https://github.com/LeakForge/CVE-2025-49113

https://github.com/Zwique/CVE-2025-49113

https://github.com/ankitpandey383/roundcube-cve-2025-49113-lab

https://github.com/fearsoff-org/CVE-2025-49113

https://github.com/CyberQuestor-infosec/CVE-2025-49113-Roundcube_1.6.10

https://github.com/BiiTts/Roundcube-CVE-2025-49113

https://github.com/hackmelocal/CVE-2025-49113-Simulation

https://github.com/l4f2s4/CVE-2025-49113_exploit_cookies

https://github.com/Ademking/CVE-2025-49113-nuclei-template

https://github.com/SyFi/CVE-2025-49113

https://github.com/Zuack55/Roundcube-1.6.10-Post-Auth-RCE-CVE-2025-49113-

https://github.com/SteamPunk424/CVE-2025-49113-Roundcube-RCE-PHP

https://github.com/rxerium/CVE-2025-49113

https://github.com/Ashwesker/Blackash-CVE-2025-49113

https://github.com/Joelp03/CVE-2025-49113

https://github.com/00xCanelo/CVE-2025-49113

https://github.com/hakaioffsec/CVE-2025-49113-exploit

https://github.com/punitdarji/roundcube-cve-2025-49113

https://github.com/Yuri08loveElaina/CVE-2025-49113

https://github.com/AC8999/CVE-2025-49113

https://github.com/5kr1pt/Roundcube_CVE-2025-49113

https://github.com/rasool13x/exploit-CVE-2025-49113

Ubuntu@activitypub.awakari.com at 2025-12-10T14:01:42.000Z ## Outbound HTB Walkthrough / Solution — Exploiting Roundcube Webmail CVE-2025–49113 and Rooting via… Outbound HTB Writeup — Roundcube CVE-2025–49113 Exploit Introduction In this Hac...

#cve-2025-27591 #outbound-htb-writeup #outbound-hackthebox #cve-2025-49113 #roundcube-webmai-exploit

Origin | Interest | Match ##

Ubuntu@activitypub.awakari.com at 2025-12-10T14:01:42.000Z ## Outbound HTB Walkthrough / Solution — Exploiting Roundcube Webmail CVE-2025–49113 and Rooting via… Outbound HTB Writeup — Roundcube CVE-2025–49113 Exploit Introduction In this Hac...

#cve-2025-27591 #outbound-htb-writeup #outbound-hackthebox #cve-2025-49113 #roundcube-webmai-exploit

Origin | Interest | Match ##

CVE-2024-9042
(5.9 MEDIUM)

EPSS: 0.07%

updated 2025-03-13T21:24:16

2 posts

A security vulnerability has been discovered in Kubernetes windows nodes that could allow a user with the ability to query a node's '/logs' endpoint to execute arbitrary commands on the host. This CVE affects only Windows worker nodes. Your worker node is vulnerable to this issue if it is running one of the affected versions listed below.

Kubernetes@activitypub.awakari.com at 2025-12-11T12:18:40.000Z ## Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection), (Wed, Dec 10th) Last year, Kubernetes fixed a command injection vulnerability in the Kubernetes NodeLogQuery feature (%...


Origin | Interest | Match ##

sans_isc@infosec.exchange at 2025-12-11T01:50:28.000Z ##

SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation
isc.sans.edu/podcastdetail/9734

##

CVE-2025-36747
(0 None)

EPSS: 0.00%

1 posts

N/A

offseq at 2025-12-13T09:35:16.674Z ##

🚨 CVE-2025-36747 (CRITICAL, CVSS 9.4): Hard-coded FTP creds in Growatt ShineLan-X 3.6.0.0 allow file tampering—no signature checks! Patch, restrict FTP, and monitor for abuse. radar.offseq.com/threat/cve-20

##

CVE-2025-14440
(0 None)

EPSS: 0.00%

2 posts

N/A

offseq at 2025-12-13T08:04:29.896Z ##

🚨 CRITICAL: CVE-2025-14440 in JAY Login & Register plugin (≤2.4.01) enables auth bypass—attackers can hijack any WordPress account, incl. admin. Disable plugin & monitor now. No patch yet. radar.offseq.com/threat/cve-20

##

jos1264@social.skynetcloud.site at 2025-12-13T09:45:01.000Z ##

CVE-2025-14440 - JAY Login & Register Plugin WordPress Authentication Bypass Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-10738
(0 None)

EPSS: 0.00%

1 posts

N/A

offseq at 2025-12-13T07:03:20.894Z ##

🚨 CVE-2025-10738 (CRITICAL, CVSS 9.8): Unauthenticated SQL Injection in rupok98 URL Shortener Plugin for WordPress (all versions). Exploitation risks full DB compromise. Disable or restrict plugin ASAP! radar.offseq.com/threat/cve-20

##

CVE-2025-11693
(0 None)

EPSS: 0.00%

2 posts

N/A

offseq at 2025-12-13T05:34:10.025Z ##

🚨 CVE-2025-11693 (CRITICAL, CVSS 9.8): recorp Export WP Pages to HTML & PDF plugin exposes admin cookies via cookies.txt — risk of WordPress site takeover. Disable plugin & secure backups. No patch yet. radar.offseq.com/threat/cve-20

##

jos1264@social.skynetcloud.site at 2025-12-13T09:45:01.000Z ##

CVE-2025-11693 - WordPress Export WP Page to Static HTML & PDF Sensitive Information Exposure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13089
(0 None)

EPSS: 0.00%

2 posts

N/A

offseq at 2025-12-13T04:03:10.076Z ##

🚨 CVE-2025-13089: HIGH-severity SQL Injection in WP Directory Kit (all versions). Unauthenticated attackers can leak sensitive DB info via 'hide_fields' & 'attr_search'. Mitigate: disable plugin or use WAF. radar.offseq.com/threat/cve-20

##

jos1264@social.skynetcloud.site at 2025-12-13T05:45:01.000Z ##

CVE-2025-13089 - WP Directory Kit <= 1.4.7 - Unauthenticated SQL Injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12077
(0 None)

EPSS: 0.00%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-13T10:30:02.000Z ##

CVE-2025-12077 - WordPress WP to LinkedIn Auto Publish Plugin Reflected Cross-Site Scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-7058
(0 None)

EPSS: 0.00%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-13T10:30:01.000Z ##

CVE-2025-7058 - Kingcabs WordPress Stored Cross-Site Scripting Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14476
(0 None)

EPSS: 0.00%

2 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-13T10:30:01.000Z ##

CVE-2025-14476 - WordPress Doubly - Cross Domain Copy Paste PHP Object Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-13T09:45:01.000Z ##

CVE-2025-14476 - WordPress Doubly - Cross Domain Copy Paste PHP Object Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11376
(0 None)

EPSS: 0.00%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-13T10:30:01.000Z ##

CVE-2025-11376 - Colibri Page Builder Stored Cross-Site Scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11164
(0 None)

EPSS: 0.00%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-13T10:30:00.000Z ##

CVE-2025-11164 - Mavix Education WordPress Unauthorized Data Modification Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14397
(0 None)

EPSS: 0.00%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-13T09:45:01.000Z ##

CVE-2025-14397 - WordPress Postem Ipsum Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14475
(0 None)

EPSS: 0.00%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-13T09:45:00.000Z ##

CVE-2025-14475 - WordPress WPBakery Local File Inclusion Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14454
(0 None)

EPSS: 0.00%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-13T05:45:01.000Z ##

CVE-2025-14454 - Image Slider by Ays- Responsive Slider and Carousel <= 2.7.0 - Cross-Site Request Forgery to Arbitrary Slider Deletion cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14050
(0 None)

EPSS: 0.00%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-13T05:45:01.000Z ##

CVE-2025-14050 - Design Import/Export <= 2.2 - Authenticated (Administrator+) SQL Injection via XML File Import cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14278
(0 None)

EPSS: 0.00%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-13T05:45:01.000Z ##

CVE-2025-14278 - HT Slider for Elementor <= 1.7.4 - Authenticated (Contributor+) Stored Cross-Site Scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14056
(0 None)

EPSS: 0.00%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-13T05:45:00.000Z ##

CVE-2025-14056 - Custom Post Type UI <= 1.18.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'label' Import Parameter cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-43529
(0 None)

EPSS: 0.00%

3 posts

N/A

cR0w@infosec.exchange at 2025-12-12T19:55:35.000Z ##

Two EITW 0days patched in iOS Webkit. The advisory says the exploits were against pre-iOS 26 but they have patches for 26 as well. And some other ones to go with those.

support.apple.com/en-us/125884

Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report.

Processing maliciously crafted web content may lead to memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-43529 was also issued in response to this report.

##

applsec@infosec.exchange at 2025-12-12T19:45:39.000Z ##

📣 EMERGENCY UPDATES 📣

Apple pushed additional updates for 2 zero-days that may have been actively exploited.

🐛 CVE-2025-14174 (WebKit) additional patches,
🐛 CVE-2025-43529 (WebKit) additional patches:
- Safari 26.2

#apple #cybersecurity #infosec #security #ios

##

applsec@infosec.exchange at 2025-12-12T19:01:21.000Z ##

📣 EMERGENCY UPDATES 📣

Apple pushed updates for 2 new zero-days that may have been actively exploited.

🐛 CVE-2025-14174 (WebKit),
🐛 CVE-2025-43529 (WebKit):
- iOS and iPadOS 18.7.3
- iOS and iPadOS 26.2
- macOS Tahoe 26.2
- tvOS 26.2
- visionOS 26.2
- watchOS 26.2

#apple #cybersecurity #infosec #security #ios

##

CVE-2025-65950
(0 None)

EPSS: 0.04%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-10T23:05:02.000Z ##

CVE-2025-65950 - WBCE CMS is Vulnerable to Time-Based Blind SQL Injection through groups[] Parameter cvefeed.io/vuln/detail/CVE-202

##

Visit counter For Websites