##
Updated at UTC 2025-12-17T11:20:31.299915
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-14101 | 7.1 | 0.00% | 1 | 0 | 2025-12-17T10:15:39.710000 | Authorization Bypass Through User-Controlled Key vulnerability in GG Soft Softwa | |
| CVE-2025-14399 | 4.3 | 0.00% | 1 | 0 | 2025-12-17T09:30:32 | The Download Plugins and Themes in ZIP from Dashboard plugin for WordPress is vu | |
| CVE-2025-12496 | 4.9 | 0.00% | 1 | 0 | 2025-12-17T09:30:32 | The Zephyr Project Manager plugin for WordPress is vulnerable to Directory Trave | |
| CVE-2025-14817 | None | 0.00% | 2 | 0 | 2025-12-17T09:30:32 | The component com.transsion.tranfacmode.entrance.main.MainActivity in com.transs | |
| CVE-2025-14061 | 5.3 | 0.00% | 1 | 0 | 2025-12-17T09:30:32 | The Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker ( | |
| CVE-2025-13750 | 4.3 | 0.00% | 1 | 0 | 2025-12-17T09:30:32 | The Converter for Media – Optimize images | Convert WebP & AVIF plugin for WordP | |
| CVE-2025-11924 | 7.5 | 0.00% | 1 | 0 | 2025-12-17T07:15:57.750000 | The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPr | |
| CVE-2025-13880 | 6.5 | 0.00% | 1 | 0 | 2025-12-17T06:32:10 | The WP Social Ninja – Embed Social Feeds, Customer Reviews, Chat Widgets (Google | |
| CVE-2025-13861 | 6.1 | 0.00% | 1 | 0 | 2025-12-17T06:32:10 | The HTML Forms – Simple WordPress Forms Plugin for WordPress is vulnerable to Un | |
| CVE-2025-11775 | None | 0.00% | 1 | 0 | 2025-12-17T06:32:10 | An out-of-bounds read vulnerability has been identified in the asComSvc service. | |
| CVE-2025-14385 | 6.4 | 0.00% | 1 | 0 | 2025-12-17T06:32:09 | The WP Recipe Maker plugin for WordPress is vulnerable to Stored Cross-Site Scri | |
| CVE-2025-14305 | 7.8 | 0.00% | 1 | 0 | 2025-12-17T06:32:08 | ListCheck.exe developed by Acer has a Local Privilege Escalation vulnerability. | |
| CVE-2025-59374 | 0 | 0.00% | 3 | 0 | 2025-12-17T05:16:13.080000 | "UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were | |
| CVE-2025-53524 | 7.8 | 0.00% | 2 | 0 | 2025-12-17T03:30:19 | Fuji Electric Monitouch V-SFT-6 is vulnerable to an out-of-bounds write while p | |
| CVE-2025-14701 | 7.1 | 0.00% | 1 | 0 | 2025-12-17T03:30:19 | An input neutralization vulnerability in the Server MOTD component of Crafty Con | |
| CVE-2025-11009 | 5.1 | 0.00% | 1 | 0 | 2025-12-17T03:30:19 | Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric | |
| CVE-2025-14700 | 9.9 | 0.00% | 3 | 0 | 2025-12-17T01:15:59.620000 | An input neutralization vulnerability in the Webhook Template component of Craft | |
| CVE-2025-14766 | None | 0.00% | 1 | 0 | 2025-12-17T00:31:24 | Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allo | |
| CVE-2025-64725 | None | 0.01% | 1 | 0 | 2025-12-17T00:29:26 | ### Impact It was possible to accept an invitation opened by a different Weblat | |
| CVE-2025-54947 | None | 0.04% | 1 | 0 | 2025-12-17T00:25:52 | In Apache StreamPark versions 2.0.0 through 2.1.7, a security vulnerability invo | |
| CVE-2025-68087 | 5.4 | 0.02% | 1 | 0 | 2025-12-16T21:32:01 | Missing Authorization vulnerability in merkulove Modalier for Elementor modalier | |
| CVE-2025-14646 | 7.3 | 0.03% | 1 | 0 | 2025-12-16T21:32:01 | A security flaw has been discovered in code-projects Student File Management Sys | |
| CVE-2025-14642 | 4.7 | 0.03% | 1 | 0 | 2025-12-16T21:32:01 | A vulnerability has been found in code-projects Computer Laboratory System 1.0. | |
| CVE-2025-14653 | 7.3 | 0.03% | 1 | 0 | 2025-12-16T21:32:00 | A vulnerability was determined in itsourcecode Student Management System 1.0. Im | |
| CVE-2025-14623 | 7.3 | 0.03% | 1 | 0 | 2025-12-16T21:31:59 | A weakness has been identified in code-projects Student File Management System 1 | |
| CVE-2025-37164 | 10.0 | 0.00% | 1 | 0 | 2025-12-16T21:30:54 | A remote code execution issue exists in HPE OneView. | |
| CVE-2025-14649 | 7.3 | 0.03% | 1 | 0 | 2025-12-16T21:30:52 | A vulnerability was detected in itsourcecode Online Cake Ordering System 1.0. Af | |
| CVE-2025-14640 | 7.3 | 0.03% | 1 | 0 | 2025-12-16T21:30:52 | A flaw has been found in code-projects Student File Management System 1.0. The a | |
| CVE-2025-14589 | 6.3 | 0.03% | 1 | 0 | 2025-12-16T21:30:51 | A weakness has been identified in code-projects Prison Management System 2.0. Th | |
| CVE-2025-65427 | 6.5 | 0.00% | 1 | 1 | 2025-12-16T21:15:47.380000 | An issue was discovered in Dbit N300 T1 Pro Easy Setup Wireless Wi-Fi Router on | |
| CVE-2025-46295 | 9.8 | 0.00% | 1 | 0 | 2025-12-16T20:15:48.177000 | Apache Commons Text versions prior to 1.10.0 included interpolation features tha | |
| CVE-2025-13888 | 9.1 | 0.05% | 1 | 0 | 2025-12-16T20:11:05 | A flaw was found in OpenShift GitOps. Namespace admins can create ArgoCD Custom | |
| CVE-2025-14645 | 7.3 | 0.03% | 1 | 0 | 2025-12-16T20:07:17.483000 | A vulnerability was identified in code-projects Student File Management System 1 | |
| CVE-2025-14641 | 4.7 | 0.03% | 1 | 0 | 2025-12-16T20:06:40.230000 | A flaw has been found in code-projects Computer Laboratory System 1.0. This issu | |
| CVE-2025-14590 | 7.3 | 0.03% | 1 | 0 | 2025-12-16T19:53:27.180000 | A security vulnerability has been detected in code-projects Prison Management Sy | |
| CVE-2025-68130 | None | 0.00% | 1 | 0 | 2025-12-16T19:37:58 | > Note that this vulnerability is only present when using `experimental_caller` | |
| CVE-2025-68270 | 9.9 | 0.00% | 1 | 0 | 2025-12-16T19:16:00.720000 | The Open edX Platform is a learning management platform. Prior to commit 05d0d09 | |
| CVE-2025-59718 | 9.8 | 0.05% | 9 | 1 | 2025-12-16T19:15:57.863000 | A improper verification of cryptographic signature vulnerability in Fortinet For | |
| CVE-2025-65781 | 8.2 | 0.02% | 1 | 0 | 2025-12-16T18:32:38 | An issue was discovered in Wekan The Open Source kanban board system up to versi | |
| CVE-2025-65778 | 8.1 | 0.02% | 1 | 0 | 2025-12-16T18:32:38 | An issue was discovered in Wekan The Open Source kanban board system up to versi | |
| CVE-2025-33225 | 8.4 | 0.00% | 2 | 0 | 2025-12-16T18:31:43 | NVIDIA Resiliency Extension for Linux contains a vulnerability in log aggregatio | |
| CVE-2025-33235 | 7.8 | 0.00% | 1 | 0 | 2025-12-16T18:31:43 | NVIDIA Resiliency Extension for Linux contains a vulnerability in the checkpoint | |
| CVE-2025-33226 | 7.8 | 0.00% | 1 | 0 | 2025-12-16T18:31:43 | NVIDIA NeMo Framework for all platforms contains a vulnerability where malicious | |
| CVE-2025-29231 | 6.1 | 0.00% | 1 | 0 | 2025-12-16T18:31:43 | A stored cross-site scripting (XSS) vulnerability in the page_save component of | |
| CVE-2025-50401 | None | 0.00% | 1 | 0 | 2025-12-16T18:31:42 | Mercury D196G d196gv1-cn-up_2020-01-09_11.21.44 is vulnerable to Buffer Overflow | |
| CVE-2025-50398 | None | 0.00% | 1 | 0 | 2025-12-16T18:31:42 | Mercury D196G d196gv1-cn-up_2020-01-09_11.21.44 is vulnerable to Buffer Overflow | |
| CVE-2025-14432 | None | 0.00% | 1 | 0 | 2025-12-16T18:31:33 | In limited scenarios, sensitive data might be written to the log file if an admi | |
| CVE-2025-33212 | 7.3 | 0.00% | 1 | 0 | 2025-12-16T18:16:11.340000 | NVIDIA NeMo Framework contains a vulnerability in model loading that could allow | |
| CVE-2025-33210 | 9.0 | 0.00% | 2 | 0 | 2025-12-16T18:16:11.163000 | NVIDIA Isaac Lab contains a deserialization vulnerability. A successful exploit | |
| CVE-2023-53900 | 8.8 | 0.00% | 1 | 0 | 2025-12-16T18:16:07.063000 | Spip 4.1.10 contains a file upload vulnerability that allows attackers to upload | |
| CVE-2023-53896 | 7.5 | 0.00% | 2 | 0 | 2025-12-16T18:16:06.537000 | D-Link DAP-1325 firmware version 1.01 contains a broken access control vulnerabi | |
| CVE-2025-66388 | 6.5 | 0.03% | 1 | 0 | 2025-12-16T17:50:23 | A vulnerability in Apache Airflow allowed authenticated UI users to view secret | |
| CVE-2025-68088 | 5.4 | 0.02% | 1 | 0 | 2025-12-16T16:16:05.610000 | Missing Authorization vulnerability in merkulove Huger for Elementor huger-eleme | |
| CVE-2025-37731 | 6.8 | 0.04% | 1 | 0 | 2025-12-16T15:52:25 | Improper Authentication in Elasticsearch PKI realm can lead to user impersonatio | |
| CVE-2025-14691 | 4.3 | 0.09% | 1 | 0 | 2025-12-16T15:43:35 | A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is | |
| CVE-2025-55895 | 9.1 | 0.02% | 3 | 0 | 2025-12-16T15:31:39 | TOTOLINK A3300R V17.0.0cu.557_B20221024 and N200RE V9.3.5u.6448_B20240521 and V9 | |
| CVE-2025-14611 | 9.8 | 17.48% | 2 | 0 | 2025-12-16T15:31:34 | Gladinet CentreStack and Triofox prior to version 16.12.10420.56791 used hardcod | |
| CVE-2025-68265 | None | 0.00% | 1 | 0 | 2025-12-16T15:30:56 | In the Linux kernel, the following vulnerability has been resolved: nvme: fix a | |
| CVE-2025-68264 | None | 0.00% | 1 | 0 | 2025-12-16T15:30:56 | In the Linux kernel, the following vulnerability has been resolved: ext4: refre | |
| CVE-2025-68281 | None | 0.00% | 1 | 0 | 2025-12-16T15:30:55 | In the Linux kernel, the following vulnerability has been resolved: ASoC: SDCA: | |
| CVE-2025-14443 | 8.5 | 0.00% | 1 | 0 | 2025-12-16T15:30:47 | A flaw was found in ose-openshift-apiserver. This vulnerability allows internal | |
| CVE-2025-68086 | 5.4 | 0.02% | 1 | 0 | 2025-12-16T15:30:42 | Missing Authorization vulnerability in merkulove Reformer for Elementor reformer | |
| CVE-2025-68266 | 0 | 0.00% | 1 | 0 | 2025-12-16T15:15:56.140000 | In the Linux kernel, the following vulnerability has been resolved: bfs: Recons | |
| CVE-2025-68263 | 0 | 0.00% | 1 | 0 | 2025-12-16T15:15:55.813000 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: ipc: | |
| CVE-2025-65076 | 0 | 0.00% | 1 | 0 | 2025-12-16T14:10:11.300000 | WaveView client allows users to execute restricted set of predefined commands an | |
| CVE-2025-65074 | 0 | 0.00% | 1 | 0 | 2025-12-16T14:10:11.300000 | WaveView client allows users to execute restricted set of predefined commands an | |
| CVE-2025-9455 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T14:10:11.300000 | A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk prod | |
| CVE-2025-9453 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T14:10:11.300000 | A maliciously crafted PRT file, when parsed through certain Autodesk products, c | |
| CVE-2025-9460 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T14:10:11.300000 | A maliciously crafted SLDPRT file, when parsed through certain Autodesk products | |
| CVE-2025-10882 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T14:10:11.300000 | AA maliciously crafted X_T file, when parsed through certain Autodesk products, | |
| CVE-2025-10881 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T14:10:11.300000 | A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk prod | |
| CVE-2025-10883 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T14:10:11.300000 | A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk prod | |
| CVE-2025-10886 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T14:10:11.300000 | A maliciously crafted MODEL file, when parsed through certain Autodesk products, | |
| CVE-2025-10900 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T14:10:11.300000 | AA maliciously crafted MODEL file, when parsed through certain Autodesk products | |
| CVE-2025-61976 | 7.5 | 0.15% | 2 | 0 | 2025-12-16T14:10:11.300000 | CHOCO TEI WATCHER mini (IB-MCT001) contains an issue with improper check for unu | |
| CVE-2025-13794 | 4.3 | 0.03% | 1 | 0 | 2025-12-16T14:10:11.300000 | The Auto Featured Image (Auto Post Thumbnail) plugin for WordPress is vulnerable | |
| CVE-2025-59385 | 0 | 0.27% | 1 | 0 | 2025-12-16T14:10:11.300000 | An authentication bypass by spoofing vulnerability has been reported to affect s | |
| CVE-2025-67744 | 9.6 | 0.15% | 1 | 0 | 2025-12-16T14:10:11.300000 | DeepChat is an open-source artificial intelligence agent platform that unifies m | |
| CVE-2025-68115 | 0 | 0.04% | 1 | 0 | 2025-12-16T14:10:11.300000 | Parse Server is an open source backend that can be deployed to any infrastructur | |
| CVE-2025-67748 | 0 | 0.02% | 1 | 0 | 2025-12-16T14:10:11.300000 | Fickling is a Python pickling decompiler and static analyzer. Versions prior to | |
| CVE-2023-53889 | 0 | 0.34% | 1 | 0 | 2025-12-16T14:10:11.300000 | Perch CMS 3.2 contains a remote code execution vulnerability that allows authent | |
| CVE-2023-53892 | 0 | 0.27% | 1 | 0 | 2025-12-16T14:10:11.300000 | Blackcat CMS 1.4 contains a remote code execution vulnerability that allows auth | |
| CVE-2025-14722 | 2.4 | 0.03% | 1 | 0 | 2025-12-16T14:10:11.300000 | A vulnerability was determined in vion707 DMadmin up to 3403cafdb42537a648c30bf8 | |
| CVE-2025-14002 | 8.1 | 0.10% | 1 | 0 | 2025-12-16T12:30:37 | The WPCOM Member plugin for WordPress is vulnerable to authentication bypass via | |
| CVE-2025-11393 | 8.7 | 0.01% | 1 | 0 | 2025-12-16T10:15:42.090000 | A flaw was found in runtimes-inventory-rhel8-operator. An internal proxy compone | |
| CVE-2025-13439 | 5.9 | 0.03% | 1 | 0 | 2025-12-16T09:31:16 | The Fancy Product Designer plugin for WordPress is vulnerable to Information Dis | |
| CVE-2025-11991 | 5.3 | 0.05% | 1 | 0 | 2025-12-16T09:31:16 | The JetFormBuilder — Dynamic Blocks Form Builder plugin for WordPress is vulnera | |
| CVE-2025-66635 | 7.2 | 0.08% | 1 | 0 | 2025-12-16T09:31:16 | Stack-based buffer overflow vulnerability exists in SEIKO EPSON Web Config. Spec | |
| CVE-2025-14252 | 7.8 | 0.01% | 2 | 0 | 2025-12-16T06:30:30 | An Improper Access Control vulnerability in Advantech SUSI driver (susi.sys) all | |
| CVE-2025-12809 | 5.3 | 0.05% | 1 | 0 | 2025-12-16T06:30:20 | The Dokan Pro plugin for WordPress is vulnerable to unauthorized access of data | |
| CVE-2025-66357 | 5.3 | 0.04% | 1 | 0 | 2025-12-16T06:30:20 | CHOCO TEI WATCHER mini (IB-MCT001) contains an issue with improper check for unu | |
| CVE-2025-62848 | None | 0.15% | 1 | 0 | 2025-12-16T03:31:22 | A NULL pointer dereference vulnerability has been reported to affect several QNA | |
| CVE-2025-14674 | 6.3 | 0.05% | 1 | 0 | 2025-12-16T00:45:19 | A vulnerability was found in aizuda snail-job up to 1.6.0. Affected by this vuln | |
| CVE-2025-68113 | 6.5 | 0.04% | 1 | 0 | 2025-12-16T00:43:54 | ### Impact A cryptographic semantic binding flaw in ALTCHA libraries allows cha | |
| CVE-2025-9452 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T00:30:37 | A maliciously crafted SLDPRT file, when parsed through certain Autodesk products | |
| CVE-2025-9454 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T00:30:36 | A maliciously crafted PRT file, when parsed through certain Autodesk products, c | |
| CVE-2025-14731 | 6.3 | 0.05% | 1 | 0 | 2025-12-16T00:30:36 | A weakness has been identified in CTCMS Content Management System up to 2.1.2. T | |
| CVE-2025-14593 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T00:30:36 | A maliciously crafted CATPART file, when parsed through certain Autodesk product | |
| CVE-2025-9457 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T00:30:36 | A maliciously crafted PRT file, when parsed through certain Autodesk products, c | |
| CVE-2025-9459 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T00:30:36 | A maliciously crafted SLDPRT file, when parsed through certain Autodesk products | |
| CVE-2025-9456 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T00:30:36 | A maliciously crafted SLDPRT file, when parsed through certain Autodesk products | |
| CVE-2025-10888 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T00:30:36 | AA maliciously crafted MODEL file, when parsed through certain Autodesk products | |
| CVE-2025-10887 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T00:30:36 | A maliciously crafted MODEL file, when parsed through certain Autodesk products, | |
| CVE-2025-10884 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T00:30:36 | AA maliciously crafted CATPART file, when parsed through certain Autodesk produc | |
| CVE-2025-10898 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T00:30:36 | AA maliciously crafted MODEL file, when parsed through certain Autodesk products | |
| CVE-2025-10899 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T00:30:36 | AA maliciously crafted MODEL file, when parsed through certain Autodesk products | |
| CVE-2025-10889 | 7.8 | 0.01% | 1 | 0 | 2025-12-16T00:30:36 | A maliciously crafted CATPART file, when parsed through certain Autodesk product | |
| CVE-2025-9121 | 8.8 | 0.05% | 1 | 0 | 2025-12-16T00:30:30 | Pentaho Data Integration and Analytics Community Dashboard Editor plugin version | |
| CVE-2025-67735 | 6.5 | 0.04% | 1 | 0 | 2025-12-15T23:28:50 | ### Summary The `io.netty.handler.codec.http.HttpRequestEncoder` CRLF injection | |
| CVE-2025-67899 | 2.9 | 0.01% | 1 | 0 | 2025-12-15T23:15:57.293000 | uriparser through 0.9.9 allows unbounded recursion and stack consumption, as dem | |
| CVE-2023-53888 | None | 0.30% | 1 | 0 | 2025-12-15T21:30:45 | Zomplog 3.9 contains a remote code execution vulnerability that allows authentic | |
| CVE-2023-53885 | None | 0.30% | 1 | 0 | 2025-12-15T21:30:44 | Webutler v3.2 contains a remote code execution vulnerability that allows authent | |
| CVE-2023-53881 | None | 0.03% | 1 | 0 | 2025-12-15T21:30:44 | ReyeeOS 1.204.1614 contains an unencrypted CWMP communication vulnerability that | |
| CVE-2023-53877 | None | 0.03% | 1 | 0 | 2025-12-15T21:30:44 | Bus Reservation System 1.1 contains a SQL injection vulnerability in the pickup_ | |
| CVE-2023-53893 | None | 0.04% | 1 | 0 | 2025-12-15T21:30:44 | Ateme TITAN File 3.9.12.4 contains an authenticated server-side request forgery | |
| CVE-2025-67809 | 4.7 | 0.03% | 1 | 0 | 2025-12-15T21:30:39 | An issue was discovered in Zimbra Collaboration (ZCS) 10.0 and 10.1. A hardcoded | |
| CVE-2025-14023 | 3.1 | 0.03% | 1 | 0 | 2025-12-15T19:16:02.593000 | LINE client for iOS prior to 15.19 allows UI spoofing due to inconsistencies bet | |
| CVE-2025-60786 | 8.8 | 0.07% | 1 | 0 | 2025-12-15T18:30:45 | A Zip Slip vulnerability in the import a Project component of iceScrum v7.54 Pro | |
| CVE-2024-44599 | 8.3 | 0.04% | 1 | 0 | 2025-12-15T18:30:45 | FNT Command 13.4.0 is vulnerable to Directory Traversal. | |
| CVE-2025-13824 | 0 | 0.04% | 1 | 0 | 2025-12-15T18:22:13.783000 | A security issue exists due to improper handling of malformed CIP packets during | |
| CVE-2025-65782 | 0 | 0.02% | 1 | 0 | 2025-12-15T18:22:13.783000 | An issue was discovered in Wekan The Open Source kanban board system up to versi | |
| CVE-2025-65780 | 0 | 0.02% | 1 | 0 | 2025-12-15T18:22:13.783000 | An issue was discovered in Wekan The Open Source kanban board system up to versi | |
| CVE-2025-37732 | 5.4 | 0.03% | 1 | 0 | 2025-12-15T18:22:13.783000 | Improper neutralization of input during web page generation ('Cross-site Scripti | |
| CVE-2025-14708 | 9.8 | 0.04% | 1 | 0 | 2025-12-15T18:22:13.783000 | A weakness has been identified in Shiguangwu sgwbox N3 2.0.25. Affected by this | |
| CVE-2025-14695 | 6.3 | 0.04% | 1 | 0 | 2025-12-15T18:22:13.783000 | A vulnerability was determined in SamuNatsu HaloBot up to 026b01d4a896d93eaaf9d5 | |
| CVE-2025-14692 | 4.3 | 0.10% | 1 | 0 | 2025-12-15T18:22:13.783000 | A flaw has been found in Mayan EDMS up to 4.10.1. The impacted element is an unk | |
| CVE-2025-14672 | 7.3 | 0.04% | 1 | 0 | 2025-12-15T18:22:13.783000 | A flaw has been found in gmg137 snap7-rs up to 1.142.1. This impacts the functio | |
| CVE-2025-14668 | 7.3 | 0.03% | 1 | 0 | 2025-12-15T18:22:13.783000 | A vulnerability was detected in campcodes Advanced Online Examination System 1.0 | |
| CVE-2025-14656 | 8.8 | 0.05% | 2 | 0 | 2025-12-15T18:22:13.783000 | A weakness has been identified in Tenda AC20 16.03.08.12. This affects the funct | |
| CVE-2025-14659 | 8.8 | 0.18% | 1 | 0 | 2025-12-15T18:22:13.783000 | A vulnerability was detected in D-Link DIR-860LB1 and DIR-868LB1 203b01/203b03. | |
| CVE-2025-14648 | 4.7 | 0.23% | 1 | 0 | 2025-12-15T18:22:13.783000 | A security vulnerability has been detected in DedeBIZ up to 6.5.9. Affected by t | |
| CVE-2025-14647 | 7.3 | 0.03% | 1 | 0 | 2025-12-15T18:22:13.783000 | A weakness has been identified in code-projects Computer Book Store 1.0. Affecte | |
| CVE-2025-14644 | 7.3 | 0.03% | 1 | 0 | 2025-12-15T18:22:13.783000 | A vulnerability was determined in itsourcecode Student Management System 1.0. Th | |
| CVE-2025-14643 | 7.3 | 0.03% | 1 | 0 | 2025-12-15T18:22:13.783000 | A vulnerability was found in code-projects Simple Attendance Record System 2.0. | |
| CVE-2025-14636 | 3.7 | 0.02% | 1 | 0 | 2025-12-15T18:22:13.783000 | A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the f | |
| CVE-2025-14606 | 5.0 | 0.04% | 1 | 0 | 2025-12-15T18:22:13.783000 | A security vulnerability has been detected in tiny-rdm Tiny RDM up to 1.2.5. Aff | |
| CVE-2025-14607 | 6.3 | 0.05% | 1 | 0 | 2025-12-15T18:22:13.783000 | A vulnerability was detected in OFFIS DCMTK up to 3.6.9. Affected by this issue | |
| CVE-2025-8780 | 6.4 | 0.03% | 1 | 0 | 2025-12-15T18:22:13.783000 | The Livemesh SiteOrigin Widgets plugin for WordPress is vulnerable to Stored Cro | |
| CVE-2025-36751 | 0 | 0.01% | 1 | 0 | 2025-12-15T18:22:13.783000 | Encryption is missing on the configuration interface for Growatt ShineLan-X and | |
| CVE-2025-7058 | 6.4 | 0.03% | 1 | 0 | 2025-12-15T18:22:13.783000 | The Kingcabs theme for WordPress is vulnerable to Stored Cross-Site Scripting vi | |
| CVE-2025-65779 | None | 0.02% | 1 | 0 | 2025-12-15T15:30:32 | An issue was discovered in Wekan The Open Source kanban board system up to versi | |
| CVE-2018-4063 | 8.8 | 1.71% | 2 | 0 | 2025-12-15T15:18:49.987000 | An exploitable remote code execution vulnerability exists in the upload.cgi func | |
| CVE-2025-14174 | 8.8 | 1.08% | 6 | 0 | 2025-12-15T15:16:08.650000 | Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499 | |
| CVE-2025-14714 | None | 0.01% | 1 | 0 | 2025-12-15T12:30:32 | An Authentication Bypass vulnerability existed where the application bundled an | |
| CVE-2025-11670 | 6.4 | 0.03% | 1 | 0 | 2025-12-15T12:30:32 | Zohocorp ManageEngine ADManager Plus versions before 8025 are vulnerable to NTLM | |
| CVE-2025-14710 | 7.3 | 0.03% | 1 | 0 | 2025-12-15T09:31:35 | A vulnerability was detected in FantasticLBP Hotels Server up to 67b44df162fab26 | |
| CVE-2025-14709 | 9.8 | 0.04% | 1 | 0 | 2025-12-15T09:31:35 | A security vulnerability has been detected in Shiguangwu sgwbox N3 2.0.25. Affec | |
| CVE-2025-14711 | 7.3 | 0.03% | 1 | 0 | 2025-12-15T09:31:34 | A flaw has been found in FantasticLBP Hotels Server up to 67b44df162fab26df209bd | |
| CVE-2025-14705 | 9.8 | 0.15% | 1 | 0 | 2025-12-15T06:31:25 | A vulnerability was determined in Shiguangwu sgwbox N3 2.0.25. This affects an u | |
| CVE-2025-14712 | 7.5 | 0.03% | 1 | 0 | 2025-12-15T06:31:16 | Student Learning Assessment and Support System developed by JHENG GAO has a Expo | |
| CVE-2025-14696 | 5.3 | 0.03% | 1 | 1 | 2025-12-15T03:30:22 | A vulnerability was identified in Shenzhen Sixun Software Sixun Shanghui Group B | |
| CVE-2025-67900 | 8.2 | 0.01% | 2 | 0 | 2025-12-15T00:30:31 | NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environmen | |
| CVE-2025-67901 | 5.3 | 0.06% | 1 | 0 | 2025-12-15T00:30:31 | openrsync through 0.5.0, as used in OpenBSD through 7.8 and on other platforms, | |
| CVE-2025-14667 | 7.3 | 0.03% | 1 | 0 | 2025-12-14T18:31:34 | A security vulnerability has been detected in itsourcecode COVID Tracking System | |
| CVE-2025-14673 | 7.3 | 0.04% | 1 | 0 | 2025-12-14T18:31:30 | A vulnerability has been found in gmg137 snap7-rs up to 1.142.1. Affected is the | |
| CVE-2025-14665 | 9.8 | 0.09% | 1 | 0 | 2025-12-14T15:30:24 | A security flaw has been discovered in Tenda WH450 1.0.0.18. Impacted is an unkn | |
| CVE-2025-14655 | 8.8 | 0.05% | 2 | 0 | 2025-12-14T12:32:35 | A security flaw has been discovered in Tenda AC20 16.03.08.12. The impacted elem | |
| CVE-2025-14654 | 8.8 | 0.05% | 2 | 0 | 2025-12-14T12:32:35 | A vulnerability was identified in Tenda AC20 16.03.08.12. The affected element i | |
| CVE-2025-13832 | None | 0.00% | 1 | 0 | 2025-12-14T00:30:28 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering | |
| CVE-2025-14637 | 7.3 | 0.03% | 1 | 0 | 2025-12-13T21:30:24 | A weakness has been identified in itsourcecode Online Pet Shop Management System | |
| CVE-2025-14622 | 7.3 | 0.03% | 1 | 0 | 2025-12-13T18:30:31 | A security flaw has been discovered in code-projects Student File Management Sys | |
| CVE-2025-14621 | 7.3 | 0.03% | 1 | 0 | 2025-12-13T18:30:31 | A vulnerability was identified in code-projects Student File Management System 1 | |
| CVE-2025-67870 | None | 0.00% | 1 | 0 | 2025-12-13T18:30:30 | Rejected reason: Not used | |
| CVE-2025-14588 | 7.3 | 0.03% | 1 | 0 | 2025-12-13T18:30:30 | A security flaw has been discovered in itsourcecode Student Management System 1. | |
| CVE-2025-8687 | 6.4 | 0.03% | 1 | 0 | 2025-12-13T18:30:30 | The Enter Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripti | |
| CVE-2025-36747 | None | 0.02% | 1 | 0 | 2025-12-13T18:30:29 | ShineLan-X contains a set of credentials for an FTP server was found within the | |
| CVE-2025-12077 | 6.1 | 0.08% | 1 | 0 | 2025-12-13T18:30:29 | The WP to LinkedIn Auto Publish plugin for WordPress is vulnerable to Reflected | |
| CVE-2025-10738 | 9.8 | 0.05% | 1 | 0 | 2025-12-13T18:30:22 | The URL Shortener Plugin For WordPress plugin for WordPress is vulnerable to SQL | |
| CVE-2025-67871 | 0 | 0.00% | 1 | 0 | 2025-12-13T16:16:55.233000 | Rejected reason: Not used | |
| CVE-2025-66430 | 9.1 | 0.03% | 1 | 0 | 2025-12-12T21:32:45 | Plesk 18.0 has Incorrect Access Control. | |
| CVE-2025-13780 | 9.1 | 0.09% | 1 | 4 | 2025-12-12T16:42:56 | The PLAIN restore meta-command filter introduced in pgAdmin as part of the fix f | |
| CVE-2025-66004 | 5.7 | 0.02% | 1 | 0 | 2025-12-12T15:18:42.140000 | A Path Traversal vulnerability in usbmuxd allows local users to escalate to the | |
| CVE-2025-12105 | 7.5 | 0.05% | 1 | 0 | 2025-12-12T00:30:20 | A flaw was found in the asynchronous message queue handling of the libsoup libra | |
| CVE-2025-58360 | 8.2 | 71.92% | 1 | 4 | template | 2025-12-11T21:55:34 | ## Description An XML External Entity (XXE) vulnerability was identified. The a |
| CVE-2025-64669 | 7.8 | 0.06% | 1 | 0 | 2025-12-11T18:30:54 | Improper access control in Windows Admin Center allows an authorized attacker to | |
| CVE-2025-14321 | 9.8 | 0.06% | 1 | 0 | 2025-12-11T18:30:41 | Use-after-free in the WebRTC: Signaling component. This vulnerability affects Fi | |
| CVE-2025-55182 | 10.0 | 76.01% | 25 | 100 | template | 2025-12-10T02:00:02.557000 | A pre-authentication remote code execution vulnerability exists in React Server |
| CVE-2025-59719 | 9.8 | 0.05% | 4 | 0 | 2025-12-09T19:59:29.507000 | An improper verification of cryptographic signature vulnerability in Fortinet Fo | |
| CVE-2025-40800 | 7.4 | 0.02% | 1 | 0 | 2025-12-09T18:30:43 | A vulnerability has been identified in COMOS V10.6 (All versions), COMOS V10.6 ( | |
| CVE-2025-2296 | None | 0.16% | 1 | 4 | 2025-12-09T18:30:42 | EDK2 contains a vulnerability in BIOS where an attacker may cause “ Improper Inp | |
| CVE-2025-66516 | 0 | 0.06% | 2 | 3 | 2025-12-08T18:27:15.857000 | Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1 | |
| CVE-2025-14104 | 6.1 | 0.01% | 1 | 0 | 2025-12-05T18:31:18 | A flaw was found in util-linux. This vulnerability allows a heap buffer overread | |
| CVE-2025-34352 | 0 | 0.02% | 3 | 0 | 2025-12-04T17:15:25.860000 | JumpCloud Remote Assist for Windows versions prior to 0.317.0 include an uninsta | |
| CVE-2025-13223 | 8.8 | 1.16% | 4 | 0 | 2025-12-02T14:33:52.680000 | Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed a remote a | |
| CVE-2025-64446 | 9.8 | 88.85% | 1 | 11 | template | 2025-11-19T15:32:36 | A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1 |
| CVE-2025-40300 | None | 0.06% | 4 | 0 | 2025-11-17T18:30:25 | In the Linux kernel, the following vulnerability has been resolved: x86/vmscape | |
| CVE-2025-40780 | 8.6 | 0.03% | 1 | 0 | 2025-11-04T22:16:11.920000 | In specific circumstances, due to a weakness in the Pseudo Random Number Generat | |
| CVE-2025-40018 | None | 0.03% | 1 | 0 | 2025-10-29T15:31:53 | In the Linux kernel, the following vulnerability has been resolved: ipvs: Defer | |
| CVE-2025-24294 | 5.3 | 0.05% | 1 | 0 | 2025-07-15T22:56:20 | A denial of service vulnerability has been discovered in the resolv gem bundled | |
| CVE-2023-52922 | 7.8 | 0.04% | 1 | 0 | 2025-06-13T20:15:22.450000 | In the Linux kernel, the following vulnerability has been resolved: can: bcm: F | |
| CVE-2025-32210 | 6.5 | 0.04% | 1 | 0 | 2025-04-11T15:39:52.920000 | Missing Authorization vulnerability in CreativeMindsSolutions CM Registration an | |
| CVE-2024-39432 | 8.3 | 1.07% | 4 | 0 | 2024-09-30T18:12:04.437000 | In UMTS RLC driver, there is a possible out of bounds read due to a missing boun | |
| CVE-2025-14558 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-66478 | 0 | 0.00% | 4 | 100 | N/A | ||
| CVE-2025-14282 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-66039 | 0 | 0.09% | 1 | 3 | N/A | ||
| CVE-2025-67736 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2025-66449 | 0 | 0.06% | 1 | 0 | N/A | ||
| CVE-2025-67874 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2025-67751 | 0 | 0.02% | 1 | 0 | N/A | ||
| CVE-2025-59947 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2025-43529 | 0 | 0.00% | 6 | 0 | N/A |
updated 2025-12-17T10:15:39.710000
1 posts
⚠️ HIGH severity: CVE-2025-14101 affects GG Soft PaperWork ≤5.2.0.9427. Authorization bypass via user-controlled key risks trusted identifiers. Update to 6.0+ recommended. https://radar.offseq.com/threat/cve-2025-14101-cwe-639-authorization-bypass-throug-28919e82 #OffSeq #Vulnerability #PaperWork #CVE202514101
##updated 2025-12-17T09:30:32
1 posts
CVE-2025-14399 - Download Plugins and Themes from Dashboard <= 1.9.6 - Cross-Site Request Forgery to Bulk Plugin/Theme Archival https://cvefeed.io/vuln/detail/CVE-2025-14399
##updated 2025-12-17T09:30:32
1 posts
CVE-2025-12496 - Zephyr Project Manager <= 3.3.203 - Authenticated (Custom+) Arbitrary File Read And Server-Side Request Forgery https://cvefeed.io/vuln/detail/CVE-2025-12496
##updated 2025-12-17T09:30:32
2 posts
CVE-2025-14817 - Factory Mode App Exists Privilege Escalation Issue Allowing Third-Party Apps to Open ADB https://cvefeed.io/vuln/detail/CVE-2025-14817
##CVE-2025-14817 - Factory Mode App Exists Privilege Escalation Issue Allowing Third-Party Apps to Open ADB https://cvefeed.io/vuln/detail/CVE-2025-14817
##updated 2025-12-17T09:30:32
1 posts
CVE-2025-14061 - Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker (for GDPR, CCPA & ePrivacy) : WP Cookie Consent <= 4.0.7 - Missing Authorization to Unauthenticated Arbitrary Post Deletion https://cvefeed.io/vuln/detail/CVE-2025-14061
##updated 2025-12-17T09:30:32
1 posts
CVE-2025-13750 - Converter for Media <= 6.3.2 - Missing Authorization to Authenticated (Subscriber+) Optimized Image Deletion via regenerate-attachment REST Endpoint https://cvefeed.io/vuln/detail/CVE-2025-13750
##updated 2025-12-17T07:15:57.750000
1 posts
⚠️ HIGH severity: CVE-2025-11924 impacts Ninja Forms (WordPress), letting unauthenticated attackers access form data via REST API. Patch 3.13.1 is ineffective. Restrict API, audit tokens, and monitor logs. More info: https://radar.offseq.com/threat/cve-2025-11924-cwe-639-authorization-bypass-throug-69810fa6 #OffSeq #WordPress #CVE2025 #Security
##updated 2025-12-17T06:32:10
1 posts
CVE-2025-13880 - WP Social Ninja - Embed Social Feeds, Customer Reviews, Chat Widgets (Google Reviews, YouTube Feed, Photo Feeds, and More) <= 4.0.1 - Missing Authorization to Unauthenticated Plugin's Settings Disclosure And Modification https://cvefeed.io/vuln/detail/CVE-2025-13880
##updated 2025-12-17T06:32:10
1 posts
CVE-2025-13861 - HTML Forms – Simple WordPress Forms Plugin <= 1.6.0 - Unauthenticated Stored Cross-Site Scripting https://cvefeed.io/vuln/detail/CVE-2025-13861
##updated 2025-12-17T06:32:10
1 posts
CVE-2025-11775 - ASUS asComSvc Out-of-Bounds Read Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-11775
##updated 2025-12-17T06:32:09
1 posts
CVE-2025-14385 - WP Recipe Maker <= 10.2.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode https://cvefeed.io/vuln/detail/CVE-2025-14385
##updated 2025-12-17T06:32:08
1 posts
CVE-2025-14305 - Acer|ListCheck.exe - Local Privilege Escalation https://cvefeed.io/vuln/detail/CVE-2025-14305
##updated 2025-12-17T05:16:13.080000
3 posts
🚨 CVE-2025-59374: CRITICAL supply chain compromise in ASUS Live Update (<3.6.6, EOS). Legacy devices face remote code execution risk. Inventory, isolate, and monitor now. No patches available. Info: https://radar.offseq.com/threat/cve-2025-59374-cwe-506-embedded-malicious-code-in--b20044d2 #OffSeq #SupplyChain #Vulnerability #InfoSec
##CVE-2025-59374 - "Asus Live Update Client Supply Chain Compromise" https://cvefeed.io/vuln/detail/CVE-2025-59374
##CVE-2025-59374 - "Asus Live Update Client Supply Chain Compromise" https://cvefeed.io/vuln/detail/CVE-2025-59374
##updated 2025-12-17T03:30:19
2 posts
CVE-2025-53524 - Fuji Electric Monitouch V-SFT-6 Out-of-bounds Write https://cvefeed.io/vuln/detail/CVE-2025-53524
##CVE-2025-53524 - Fuji Electric Monitouch V-SFT-6 Out-of-bounds Write https://cvefeed.io/vuln/detail/CVE-2025-53524
##updated 2025-12-17T03:30:19
1 posts
CVE-2025-14701 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Crafty Controller https://cvefeed.io/vuln/detail/CVE-2025-14701
##updated 2025-12-17T03:30:19
1 posts
CVE-2025-11009 - Information Disclosure Vulnerability in GT Designer3 https://cvefeed.io/vuln/detail/CVE-2025-11009
##updated 2025-12-17T01:15:59.620000
3 posts
🚨 CVE-2025-14700 (CRITICAL, CVSS 9.9) in Crafty Controller 4.6.1 enables authenticated RCE via SSTI in Webhook Template. Restrict access, monitor for suspicious activity, and prep for patches. Full details: https://radar.offseq.com/threat/cve-2025-14700-cwe-1336-improper-neutralization-of-bf9964e9 #OffSeq #CyberAlerts #SSTI #RCE
##CVE-2025-14700 - Improper Neutralization of Special Elements Used in a Template Engine in Crafty Controller https://cvefeed.io/vuln/detail/CVE-2025-14700
##CVE-2025-14700 - Improper Neutralization of Special Elements Used in a Template Engine in Crafty Controller https://cvefeed.io/vuln/detail/CVE-2025-14700
##updated 2025-12-17T00:31:24
1 posts
CVE-2025-14766 - Google Chrome V8 Heap Corruption https://cvefeed.io/vuln/detail/CVE-2025-14766
##updated 2025-12-17T00:29:26
1 posts
CVE-2025-64725 - Weblate has improper validation upon invitation acceptance https://cvefeed.io/vuln/detail/CVE-2025-64725
##updated 2025-12-17T00:25:52
1 posts
Apache StreamPark hard-coded encryption key exposes sensitive data to decryption attacks
Apache StreamPark versions 2.0.0 through 2.1.6 contain a critical vulnerability (CVE-2025-54947) caused by a hard-coded encryption key that attackers can extract through reverse engineering to decrypt sensitive data and forge encrypted content.
**If you're running Apache StreamPark, ensure these systems are isolated from the internet and accessible only from trusted networks, then plan an upgrade to version 2.1.7.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/apache-streampark-hard-coded-encryption-key-exposes-sensitive-data-to-decryption-attacks-b-9-9-v-0/gD2P6Ple2L
updated 2025-12-16T21:32:01
1 posts
CVE-2025-68087 - WordPress Modalier for Elementor plugin <= 1.0.6 - Broken Access Control vulnerability https://cvefeed.io/vuln/detail/CVE-2025-68087
##updated 2025-12-16T21:32:01
1 posts
CVE-2025-14646 - code-projects Student File Management System delete_student.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14646
##updated 2025-12-16T21:32:01
1 posts
CVE-2025-14642 - code-projects Computer Laboratory System technical_staff_pic.php unrestricted upload https://cvefeed.io/vuln/detail/CVE-2025-14642
##updated 2025-12-16T21:32:00
1 posts
CVE-2025-14653 - itsourcecode Student Management System addrecord.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14653
##updated 2025-12-16T21:31:59
1 posts
CVE-2025-14623 - code-projects Student File Management System update_student.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14623
##updated 2025-12-16T21:30:54
1 posts
Perfect 10 in HPE OneView with no description and the advisory behind a login? Must be good. Go hack that shit please. 🥳
##updated 2025-12-16T21:30:52
1 posts
CVE-2025-14649 - itsourcecode Online Cake Ordering System supplier.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14649
##updated 2025-12-16T21:30:52
1 posts
CVE-2025-14640 - code-projects Student File Management System save_student.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14640
##updated 2025-12-16T21:30:51
1 posts
CVE-2025-14589 - "Code-Projects Prison Management System SQL Injection Vulnerability" https://cvefeed.io/vuln/detail/CVE-2025-14589
##updated 2025-12-16T21:15:47.380000
1 posts
1 repos
updated 2025-12-16T20:15:48.177000
1 posts
⚠️ CRITICAL: CVE-2025-46295 affects Claris FileMaker Server via Apache Commons Text <1.10.0, enabling RCE with untrusted input. Upgrade to 22.0.4+ ASAP and restrict access. Details: https://radar.offseq.com/threat/cve-2025-46295-apache-commons-text-versions-prior--b0b7aaed #OffSeq #Vulnerability #InfoSec #FileMaker
##updated 2025-12-16T20:11:05
1 posts
CVE-2025-13888 - Openshift-gitops-operator: openshift gitops: namespace admin cluster takeover via privileged jobs https://cvefeed.io/vuln/detail/CVE-2025-13888
##updated 2025-12-16T20:07:17.483000
1 posts
CVE-2025-14645 - code-projects Student File Management System delete_user.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14645
##updated 2025-12-16T20:06:40.230000
1 posts
CVE-2025-14641 - code-projects Computer Laboratory System admin_pic.php unrestricted upload https://cvefeed.io/vuln/detail/CVE-2025-14641
##updated 2025-12-16T19:53:27.180000
1 posts
CVE-2025-14590 - Code-projects Prison Management System SQL Injection Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14590
##updated 2025-12-16T19:37:58
1 posts
CVE-2025-68130 - tRPC has possible prototype pollution in `experimental_nextAppDirCaller` https://cvefeed.io/vuln/detail/CVE-2025-68130
##updated 2025-12-16T19:16:00.720000
1 posts
🚨CRITICAL: CVE-2025-68270 hits Open edX edx-platform <05d0d09—org-level CourseLimitedStaffRole can access/edit courses in studio. Patch now or restrict access & audit roles. CVSS 9.9. Details: https://radar.offseq.com/threat/cve-2025-68270-cwe-862-missing-authorization-in-op-c7d17376 #OffSeq #Vulnerability #OpenEdX #Security
##updated 2025-12-16T19:15:57.863000
9 posts
1 repos
CISA reports active exploitation of critical Fortinet authentication bypass flaw
CISA reports active exploitation of two critical Fortinet vulnerabilities (CVE-2025-59718 and CVE-2025-59719, CVSS 9.8) that allow unauthenticated attackers to bypass FortiCloud SSO authentication through flawed SAML signature verification. Exploitation began just three days after patches were released on December 12, 2025.
**Now it's urgent, because once again, your Fortinet products are being hacked. If you have Fortinet products, first make sure the management interface is isolated from the internet and accessible only from trusted networks. Then disable FortiCloud SSO login (in System -> Settings or use CLI command config system global set admin-forticloud-sso-login disable end) to prevent authentication bypass attacks. Finally, upgrade to the latest secure versions as soon as possible.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-multiple-fortinet-products-exploited-in-attacks-rapid-patching-urged-crn-8-k-w-x-8/gD2P6Ple2L
🚨 CISA has added 1 vulnerability to the KEV Catalog
CVE-2025-59718: Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability
CVSS: 9.8
##🚨 [CISA-2025:1216] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2025:1216)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2025-59718 (https://secdb.nttzen.cloud/cve/detail/CVE-2025-59718)
- Name: Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: Multiple Products
- Notes: https://fortiguard.fortinet.com/psirt/FG-IR-25-647 ; https://docs.fortinet.com/upgrade-tool/fortigate ; https://nvd.nist.gov/vuln/detail/CVE-2025-59718
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20251216 #cisa20251216 #cve_2025_59718 #cve202559718
##CISA reports active exploitation of critical Fortinet authentication bypass flaw
CISA reports active exploitation of two critical Fortinet vulnerabilities (CVE-2025-59718 and CVE-2025-59719, CVSS 9.8) that allow unauthenticated attackers to bypass FortiCloud SSO authentication through flawed SAML signature verification. Exploitation began just three days after patches were released on December 12, 2025.
**Now it's urgent, because once again, your Fortinet products are being hacked. If you have Fortinet products, first make sure the management interface is isolated from the internet and accessible only from trusted networks. Then disable FortiCloud SSO login (in System -> Settings or use CLI command config system global set admin-forticloud-sso-login disable end) to prevent authentication bypass attacks. Finally, upgrade to the latest secure versions as soon as possible.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-multiple-fortinet-products-exploited-in-attacks-rapid-patching-urged-crn-8-k-w-x-8/gD2P6Ple2L
🚨 CISA has added 1 vulnerability to the KEV Catalog
CVE-2025-59718: Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability
CVSS: 9.8
##Pornhub / Mixpanel
- https://www.bleepingcomputer.com/news/security/pornhub-extorted-after-hackers-steal-premium-member-activity-data/
- https://mixpanel.com/blog/sms-security-incident/https://www.newsweek.com/pornhub-hack-premium-user-data-200-million-records-shinyhunters-1959937
- https://www.techspot.com/news/107779-pornhub-extorted-after-94gb-user-data-stolen.html
- https://www.securityaffairs.com/177881/data-breach/pornhub-extorted-shinyhunters.html
PDVSA Hacked
- https://www.bleepingcomputer.com/news/security/cyberattack-disrupts-venezuelan-oil-giant-pdvsas-operations/
- https://www.reuters.com/world/americas/cyberattack-disrupts-venezuela-oil-company-pdvsas-operations-sources-say-2025-12-16/
- https://www.bloomberg.com/news/articles/2025-12-16/venezuela-s-pdvsa-hit-by-cyberattack-disrupting-oil-exports
- https://www.maritime-executive.com/article/pdvsa-in-cyberattack-export-operations-disrupted-report
Fortinet FortiCloud SSO auth bypass
- https://www.bleepingcomputer.com/news/security/fortinet-warns-of-critical-forticloud-sso-login-auth-bypass-flaws/
- https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-sso-logins-following-disclosure-cve-2025-59718-cve-2025-59719/
- https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerabilities-in-multiple-fortinet-products-forticloud-sso-login-authentication-bypass
- https://cyber.gc.ca/en/alerts-advisories/al25-019-vulnerabilities-impacting-fortinet-products-forticloud-sso-login-authentication-bypass-cve-2025-59718-cve-2025-59719
- https://thehackernews.com/2025/12/fortinet-fortigate-under-active-attack.html
CISA has updated the KEV catalogue.
CVE-2025-59718: Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-59718
CISA Releases Seven Industrial Control Systems Advisories https://www.cisa.gov/news-events/alerts/2025/12/16/cisa-releases-seven-industrial-control-systems-advisories #CISA #infosec #Fortinet
##CVE ID: CVE-2025-59718
Vendor: Fortinet
Product: Multiple Products
Date Added: 2025-12-16
Notes: https://fortiguard.fortinet.com/psirt/FG-IR-25-647 ; https://docs.fortinet.com/upgrade-tool/fortigate ; https://nvd.nist.gov/vuln/detail/CVE-2025-59718
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-59718
RE: https://infosec.exchange/@BleepingComputer/115730066370654236
Apparently CVE-2025-59718 and CVE-2025-59719 are now EITW.
##updated 2025-12-16T18:32:38
1 posts
CVE-2025-65781 - Wekan Open Source Kanban Board System Bearer Token Abuse https://cvefeed.io/vuln/detail/CVE-2025-65781
##updated 2025-12-16T18:32:38
1 posts
CVE-2025-65778 - Wekan HTML Injection Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65778
##updated 2025-12-16T18:31:43
2 posts
CVE-2025-33225 - NVIDIA Resiliency Extension for Linux Log File Name Prediction Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-33225
##Nvidia has three security advisories today.
NVIDIA NeMo Framework: CVE-2025-33212 and CVE-2025-33226 https://nvidia.custhelp.com/app/answers/detail/a_id/5736
NVIDIA Isaac Lab: CVE-2025-32210 https://nvidia.custhelp.com/app/answers/detail/a_id/5733
NVIDIA Resiliency Extension: CVE-2025-33225 and CVE-2025-33235 https://nvidia.custhelp.com/app/answers/detail/a_id/5746 #Nvidia #vulnerability #infosec
##updated 2025-12-16T18:31:43
1 posts
Nvidia has three security advisories today.
NVIDIA NeMo Framework: CVE-2025-33212 and CVE-2025-33226 https://nvidia.custhelp.com/app/answers/detail/a_id/5736
NVIDIA Isaac Lab: CVE-2025-32210 https://nvidia.custhelp.com/app/answers/detail/a_id/5733
NVIDIA Resiliency Extension: CVE-2025-33225 and CVE-2025-33235 https://nvidia.custhelp.com/app/answers/detail/a_id/5746 #Nvidia #vulnerability #infosec
##updated 2025-12-16T18:31:43
1 posts
Nvidia has three security advisories today.
NVIDIA NeMo Framework: CVE-2025-33212 and CVE-2025-33226 https://nvidia.custhelp.com/app/answers/detail/a_id/5736
NVIDIA Isaac Lab: CVE-2025-32210 https://nvidia.custhelp.com/app/answers/detail/a_id/5733
NVIDIA Resiliency Extension: CVE-2025-33225 and CVE-2025-33235 https://nvidia.custhelp.com/app/answers/detail/a_id/5746 #Nvidia #vulnerability #infosec
##updated 2025-12-16T18:31:43
1 posts
updated 2025-12-16T18:31:42
1 posts
updated 2025-12-16T18:31:42
1 posts
updated 2025-12-16T18:31:33
1 posts
CVE-2025-14432 - Poly Video - Sensitive Data Might Be Written to Log File https://cvefeed.io/vuln/detail/CVE-2025-14432
##updated 2025-12-16T18:16:11.340000
1 posts
Nvidia has three security advisories today.
NVIDIA NeMo Framework: CVE-2025-33212 and CVE-2025-33226 https://nvidia.custhelp.com/app/answers/detail/a_id/5736
NVIDIA Isaac Lab: CVE-2025-32210 https://nvidia.custhelp.com/app/answers/detail/a_id/5733
NVIDIA Resiliency Extension: CVE-2025-33225 and CVE-2025-33235 https://nvidia.custhelp.com/app/answers/detail/a_id/5746 #Nvidia #vulnerability #infosec
##updated 2025-12-16T18:16:11.163000
2 posts
🚨 CVE-2025-33210: CRITICAL deserialization flaw in NVIDIA Isaac Lab (<2.3.0). Remote code execution risk for robotics & AI. Patch when released, restrict network, validate inputs! https://radar.offseq.com/threat/cve-2025-33210-cwe-502-deserialization-of-untruste-c0f2ea24 #OffSeq #Nvidia #Vuln #Infosec
##CVE-2025-33210 - NVIDIA Isaac Lab Deserialization Code Execution Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-33210
##updated 2025-12-16T18:16:07.063000
1 posts
CVE-2023-53900 - Spip 4.1.10 Admin Account Spoofing via Malicious SVG Upload https://cvefeed.io/vuln/detail/CVE-2023-53900
##updated 2025-12-16T18:16:06.537000
2 posts
CVE-2023-53896 - D-Link DAP-1325 Hardware A1 Unauthenticated Configuration Download https://cvefeed.io/vuln/detail/CVE-2023-53896
##D-Link
##updated 2025-12-16T17:50:23
1 posts
CVE-2025-66388 - Apache Airflow: Secrets in rendered templates not redacted properly and exposed in the UI https://cvefeed.io/vuln/detail/CVE-2025-66388
##updated 2025-12-16T16:16:05.610000
1 posts
CVE-2025-68088 - WordPress Huger for Elementor plugin <= 1.1.5 - Broken Access Control vulnerability https://cvefeed.io/vuln/detail/CVE-2025-68088
##updated 2025-12-16T15:52:25
1 posts
CVE-2025-37731 - Elasticsearch Improper Authentication https://cvefeed.io/vuln/detail/CVE-2025-37731
##updated 2025-12-16T15:43:35
1 posts
CVE-2025-14691 - Mayan EDMS authentication cross site scripting https://cvefeed.io/vuln/detail/CVE-2025-14691
##updated 2025-12-16T15:31:39
3 posts
CVE-2025-55895 - TOTOLINK A3300R and N200RE Remote Authentication Bypass Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-55895
##CVE-2025-55895 - TOTOLINK A3300R and N200RE Remote Authentication Bypass Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-55895
##TOTOLINK
##updated 2025-12-16T15:31:34
2 posts
CISA KEV Catalog has added 2 more vulnerabilities
CVE-2025-14611: Gladinet CentreStack and Triofox Hard Coded Cryptographic Vulnerability
CVSS: 7.1
CVE-2025-43529: Apple Multiple Products Use-After-Free WebKit Vulnerability
##CVE ID: CVE-2025-14611
Vendor: Gladinet
Product: CentreStack and Triofox
Date Added: 2025-12-15
Notes: https://www.centrestack.com/p/gce_latest_release.html ; https://access.triofox.com/releases_history/; https://support.centrestack.com/hc/en-us/articles/360007159054-Hardening-the-CentreStack-Cluster#h_01JQRV57T37HJFQZKBZH9NBXQP ; https://nvd.nist.gov/vuln/detail/CVE-2025-14611
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-14611
updated 2025-12-16T15:30:56
1 posts
CVE-2025-68265 - nvme: fix admin request_queue lifetime https://cvefeed.io/vuln/detail/CVE-2025-68265
##updated 2025-12-16T15:30:56
1 posts
CVE-2025-68264 - ext4: refresh inline data size before write operations https://cvefeed.io/vuln/detail/CVE-2025-68264
##updated 2025-12-16T15:30:55
1 posts
CVE-2025-68281 - ASoC: SDCA: bug fix while parsing mipi-sdca-control-cn-list https://cvefeed.io/vuln/detail/CVE-2025-68281
##updated 2025-12-16T15:30:47
1 posts
CVE-2025-14443 - Ose-openshift-apiserver: openshift api server: server-side request forgery (ssrf) vulnerability in imagestreamimport mechanism https://cvefeed.io/vuln/detail/CVE-2025-14443
##updated 2025-12-16T15:30:42
1 posts
CVE-2025-68086 - WordPress Reformer for Elementor plugin <= 1.0.6 - Broken Access Control vulnerability https://cvefeed.io/vuln/detail/CVE-2025-68086
##updated 2025-12-16T15:15:56.140000
1 posts
CVE-2025-68266 - bfs: Reconstruct file type when loading from disk https://cvefeed.io/vuln/detail/CVE-2025-68266
##updated 2025-12-16T15:15:55.813000
1 posts
CVE-2025-68263 - ksmbd: ipc: fix use-after-free in ipc_msg_send_request https://cvefeed.io/vuln/detail/CVE-2025-68263
##updated 2025-12-16T14:10:11.300000
1 posts
CVE-2025-65076 - Arbitrary File Read and Delete via Path Traversal in WaveStore Server https://cvefeed.io/vuln/detail/CVE-2025-65076
##updated 2025-12-16T14:10:11.300000
1 posts
CVE-2025-65074 - OS Command Injection via Path Traversal in WaveStore Server https://cvefeed.io/vuln/detail/CVE-2025-65074
##updated 2025-12-16T14:10:11.300000
1 posts
updated 2025-12-16T14:10:11.300000
1 posts
updated 2025-12-16T14:10:11.300000
1 posts
updated 2025-12-16T14:10:11.300000
1 posts
And more yet.
https://www.cve.org/CVERecord?id=CVE-2025-10881
https://www.cve.org/CVERecord?id=CVE-2025-10882
https://www.cve.org/CVERecord?id=CVE-2025-10883
https://www.cve.org/CVERecord?id=CVE-2025-10884
https://www.cve.org/CVERecord?id=CVE-2025-10886
##updated 2025-12-16T14:10:11.300000
1 posts
And more yet.
https://www.cve.org/CVERecord?id=CVE-2025-10881
https://www.cve.org/CVERecord?id=CVE-2025-10882
https://www.cve.org/CVERecord?id=CVE-2025-10883
https://www.cve.org/CVERecord?id=CVE-2025-10884
https://www.cve.org/CVERecord?id=CVE-2025-10886
##updated 2025-12-16T14:10:11.300000
1 posts
And more yet.
https://www.cve.org/CVERecord?id=CVE-2025-10881
https://www.cve.org/CVERecord?id=CVE-2025-10882
https://www.cve.org/CVERecord?id=CVE-2025-10883
https://www.cve.org/CVERecord?id=CVE-2025-10884
https://www.cve.org/CVERecord?id=CVE-2025-10886
##updated 2025-12-16T14:10:11.300000
1 posts
And more yet.
https://www.cve.org/CVERecord?id=CVE-2025-10881
https://www.cve.org/CVERecord?id=CVE-2025-10882
https://www.cve.org/CVERecord?id=CVE-2025-10883
https://www.cve.org/CVERecord?id=CVE-2025-10884
https://www.cve.org/CVERecord?id=CVE-2025-10886
##updated 2025-12-16T14:10:11.300000
1 posts
updated 2025-12-16T14:10:11.300000
2 posts
CVE-2025-61976 - CHOCO TEI WATCHER mini Denial of Service (DoS) https://cvefeed.io/vuln/detail/CVE-2025-61976
##CVE-2025-61976 - CHOCO TEI WATCHER mini Denial of Service (DoS) https://cvefeed.io/vuln/detail/CVE-2025-61976
##updated 2025-12-16T14:10:11.300000
1 posts
CVE-2025-13794 - Auto Featured Image <= 4.2.1 - Missing Authorization to Authenticated (Contributor+) Post Thumbnail Modification https://cvefeed.io/vuln/detail/CVE-2025-13794
##updated 2025-12-16T14:10:11.300000
1 posts
CVE-2025-59385 - QTS, QuTS hero https://cvefeed.io/vuln/detail/CVE-2025-59385
##updated 2025-12-16T14:10:11.300000
1 posts
CVE-2025-67744 - Mermaid XSS vulnerability leads to Remote Code Execution https://cvefeed.io/vuln/detail/CVE-2025-67744
##updated 2025-12-16T14:10:11.300000
1 posts
CVE-2025-68115 - Parse Server vulnerable to Cross-Site Scripting (XSS) via Unescaped Mustache Template Variables https://cvefeed.io/vuln/detail/CVE-2025-68115
##updated 2025-12-16T14:10:11.300000
1 posts
CVE-2025-67748 - Fickling has Code Injection vulnerability via pty.spawn() https://cvefeed.io/vuln/detail/CVE-2025-67748
##updated 2025-12-16T14:10:11.300000
1 posts
CVE-2023-53889 - Perch CMS 3.2 Remote Code Execution via Unrestricted File Upload https://cvefeed.io/vuln/detail/CVE-2023-53889
##updated 2025-12-16T14:10:11.300000
1 posts
CVE-2023-53892 - Blackcat CMS 1.4 Remote Code Execution via Jquery Plugin Manager https://cvefeed.io/vuln/detail/CVE-2023-53892
##updated 2025-12-16T14:10:11.300000
1 posts
CVE-2025-14722 - vion707 DMadmin Backend AddonsController.class.php add cross site scripting https://cvefeed.io/vuln/detail/CVE-2025-14722
##updated 2025-12-16T12:30:37
1 posts
CVE-2025-14002 - WPCOM Member <= 1.7.16 - Authentication Bypass via Weak OTP https://cvefeed.io/vuln/detail/CVE-2025-14002
##updated 2025-12-16T10:15:42.090000
1 posts
CVE-2025-11393 - Insights-runtimes-tech-preview/runtimes-inventory-rhel8-operator: improper proxy configuration allows unauthorized administrative commands https://cvefeed.io/vuln/detail/CVE-2025-11393
##updated 2025-12-16T09:31:16
1 posts
CVE-2025-13439 - Fancy Product Designer | WooCommerce WordPress <= 6.4.8 - Unauthenticated Information Disclosure via 'url' Parameter https://cvefeed.io/vuln/detail/CVE-2025-13439
##updated 2025-12-16T09:31:16
1 posts
CVE-2025-11991 - JetFormBuilder <= 3.5.3 - Missing Authorization to Unauthenticated Form Generation https://cvefeed.io/vuln/detail/CVE-2025-11991
##updated 2025-12-16T09:31:16
1 posts
CVE-2025-66635 - Seiko Epson Web Config Stack-based Buffer Overflow Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-66635
##updated 2025-12-16T06:30:30
2 posts
CVE-2025-14252 - Advantech SUSI Improper Access Control Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14252
##CVE-2025-14252 - Advantech SUSI Improper Access Control Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14252
##updated 2025-12-16T06:30:20
1 posts
CVE-2025-12809 - dokan pro <= 4.1.3 - Missing Authorization to Unauthenticated Sensitive Information Exposure https://cvefeed.io/vuln/detail/CVE-2025-12809
##updated 2025-12-16T06:30:20
1 posts
CVE-2025-66357 - Choco TEI Watcher mini Denial of Service https://cvefeed.io/vuln/detail/CVE-2025-66357
##updated 2025-12-16T03:31:22
1 posts
CVE-2025-62848 - QTS, QuTS hero https://cvefeed.io/vuln/detail/CVE-2025-62848
##updated 2025-12-16T00:45:19
1 posts
CVE-2025-14674 - aizuda snail-job QLExpressEngine.java QLExpressEngine.doEval injection https://cvefeed.io/vuln/detail/CVE-2025-14674
##updated 2025-12-16T00:43:54
1 posts
CVE-2025-68113 - ALTCHA Proof-of-Work Vulnerable to Challenge Splicing and Replay https://cvefeed.io/vuln/detail/CVE-2025-68113
##updated 2025-12-16T00:30:37
1 posts
updated 2025-12-16T00:30:36
1 posts
updated 2025-12-16T00:30:36
1 posts
updated 2025-12-16T00:30:36
1 posts
updated 2025-12-16T00:30:36
1 posts
updated 2025-12-16T00:30:36
1 posts
updated 2025-12-16T00:30:36
1 posts
updated 2025-12-16T00:30:36
1 posts
And more yet.
https://www.cve.org/CVERecord?id=CVE-2025-10881
https://www.cve.org/CVERecord?id=CVE-2025-10882
https://www.cve.org/CVERecord?id=CVE-2025-10883
https://www.cve.org/CVERecord?id=CVE-2025-10884
https://www.cve.org/CVERecord?id=CVE-2025-10886
##updated 2025-12-16T00:30:36
1 posts
And more yet.
https://www.cve.org/CVERecord?id=CVE-2025-10881
https://www.cve.org/CVERecord?id=CVE-2025-10882
https://www.cve.org/CVERecord?id=CVE-2025-10883
https://www.cve.org/CVERecord?id=CVE-2025-10884
https://www.cve.org/CVERecord?id=CVE-2025-10886
##updated 2025-12-16T00:30:36
1 posts
And more yet.
https://www.cve.org/CVERecord?id=CVE-2025-10881
https://www.cve.org/CVERecord?id=CVE-2025-10882
https://www.cve.org/CVERecord?id=CVE-2025-10883
https://www.cve.org/CVERecord?id=CVE-2025-10884
https://www.cve.org/CVERecord?id=CVE-2025-10886
##updated 2025-12-16T00:30:36
1 posts
updated 2025-12-16T00:30:36
1 posts
updated 2025-12-16T00:30:36
1 posts
updated 2025-12-16T00:30:30
1 posts
CVE-2025-9121 - Hitachi Vantara Pentaho Business Analytics Server - Deserialization of Untrusted Data https://cvefeed.io/vuln/detail/CVE-2025-9121
##updated 2025-12-15T23:28:50
1 posts
We've released Netty 4.2.9 and 4.1.130.
They fix CVE-2025-67735 (https://github.com/netty/netty/security/advisories/GHSA-84h7-rjj3-6jx4), which is a line break injection vulnerability when encoding HTTP request objects.
The fix introduced a regression we had to fix as well, so versions 4.2.8 and 4.1.129 are skipped.
https://netty.io/news/2025/12/15/4-2-9.html
https://netty.io/news/2025/12/15/4-2-8.html
https://netty.io/news/2025/12/15/4-1-130-Final.html
https://netty.io/news/2025/12/15/4-1-129-Final.html
updated 2025-12-15T23:15:57.293000
1 posts
CVE-2025-67899 - Uriparser Unbounded Recursion Stack Consumption Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-67899
##updated 2025-12-15T21:30:45
1 posts
CVE-2023-53888 - Zomplog 3.9 Remote Code Execution via Authenticated File Manipulation https://cvefeed.io/vuln/detail/CVE-2023-53888
##updated 2025-12-15T21:30:44
1 posts
CVE-2023-53885 - Webutler v3.2 Remote Code Execution via Arbitrary File Upload https://cvefeed.io/vuln/detail/CVE-2023-53885
##updated 2025-12-15T21:30:44
1 posts
CVE-2023-53881 - ReyeeOS 1.204.1614 Man-in-the-Middle Remote Code Execution via CWMP https://cvefeed.io/vuln/detail/CVE-2023-53881
##updated 2025-12-15T21:30:44
1 posts
CVE-2023-53877 - Bus Reservation System 1.1 Multiple SQL Injection via pickup_id Parameter https://cvefeed.io/vuln/detail/CVE-2023-53877
##updated 2025-12-15T21:30:44
1 posts
CVE-2023-53893 - Ateme TITAN File 3.9 Authenticated Server-Side Request Forgery Vulnerability https://cvefeed.io/vuln/detail/CVE-2023-53893
##updated 2025-12-15T21:30:39
1 posts
Oh that could be fun.
https://www.cve.org/CVERecord?id=CVE-2025-67809
##An issue was discovered in Zimbra Collaboration (ZCS) 10.0 and 10.1. A hardcoded Flickr API key and secret are present in the publicly accessible Flickr Zimlet used by Zimbra Collaboration. Because these credentials are embedded directly in the Zimlet, any unauthorized party could retrieve them and misuse the Flickr integration. An attacker with access to the exposed credentials could impersonate the legitimate application and initiate valid Flickr OAuth flows. If a user is tricked into approving such a request, the attacker could gain access to the user s Flickr data. The hardcoded credentials have since been removed from the Zimlet code, and the associated key has been revoked.
updated 2025-12-15T19:16:02.593000
1 posts
CVE-2025-14023 - LINE iOS UI Spoofing Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14023
##updated 2025-12-15T18:30:45
1 posts
CVE-2025-60786 - IceScrum Zip Slip Arbitrary Code Execution https://cvefeed.io/vuln/detail/CVE-2025-60786
##updated 2025-12-15T18:30:45
1 posts
CVE-2024-44599 - FNT Command Directory Traversal Vulnerability https://cvefeed.io/vuln/detail/CVE-2024-44599
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-13824 - Micro820®, Micro850®, Micro870® – Specialized Fuzzing Vulnerabilities https://cvefeed.io/vuln/detail/CVE-2025-13824
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-65782 - Wekan Authorization Bypass Vote Forgery Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65782
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-65780 - Wekan Privilege Escalation Unauthorized Access Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65780
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-37732 - Kibana Cross-site Scripting via the Integration Package Upload Functionality https://cvefeed.io/vuln/detail/CVE-2025-37732
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-14708 - Shiguangwu sgwbox N3 WIREDCFGGET http_eshell_server buffer overflow https://cvefeed.io/vuln/detail/CVE-2025-14708
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-14695 - SamuNatsu HaloBot Inter-plugin API index.js html_renderer dynamically-managed code resources https://cvefeed.io/vuln/detail/CVE-2025-14695
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-14692 - Mayan EDMS authentication redirect https://cvefeed.io/vuln/detail/CVE-2025-14692
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-14672 - gmg137 snap7-rs s7_micro_client.cpp opWriteArea heap-based overflow https://cvefeed.io/vuln/detail/CVE-2025-14672
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-14668 - campcodes Advanced Online Examination System loginExe.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14668
##updated 2025-12-15T18:22:13.783000
2 posts
CVE-2025-14656 - Tenda AC20 openSchedWifi httpd buffer overflow https://cvefeed.io/vuln/detail/CVE-2025-14656
##CVE-2025-14656 - Tenda AC20 openSchedWifi httpd buffer overflow https://cvefeed.io/vuln/detail/CVE-2025-14656
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-14659 - D-Link DIR-860LB1/DIR-868LB1 DHCP command injection https://cvefeed.io/vuln/detail/CVE-2025-14659
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-14648 - DedeBIZ catalog_add.php command injection https://cvefeed.io/vuln/detail/CVE-2025-14648
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-14647 - code-projects Computer Book Store admin_delete.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14647
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-14644 - itsourcecode Student Management System update_subject.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14644
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-14643 - code-projects Simple Attendance Record System check.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14643
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-14636 - Tenda AX9 httpd image_check weak hash https://cvefeed.io/vuln/detail/CVE-2025-14636
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-14606 - "Tiny RDM Pickle Decoding Remote Deserialization Vulnerability" https://cvefeed.io/vuln/detail/CVE-2025-14606
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-14607 - OFFIS DCMTK Remote Memory Corruption Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14607
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-8780 - Livemesh SiteOrigin Widgets WordPress Stored Cross-Site Scripting Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-8780
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-36751 - Growatt ShineLan-X and MIC 3300TL-X Unencrypted Configuration Interface Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-36751
##updated 2025-12-15T18:22:13.783000
1 posts
CVE-2025-7058 - Kingcabs WordPress Stored Cross-Site Scripting Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-7058
##updated 2025-12-15T15:30:32
1 posts
CVE-2025-65779 - Wekan Unauthenticated Board Reordering Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65779
##updated 2025-12-15T15:18:49.987000
2 posts
CISA reports active expploit of Sierra Wireless Router vulnerability
CISA reports active exploitation of CVE-2018-4063, a critical unrestricted file upload vulnerability in end-of-life Sierra Wireless AirLink ALEOS routers that enables remote code execution with root privileges. The flaw is being exploited by multiple malware campaigns.
**If you have Sierra Wireless AirLink ES450 routers or related products, make sure they are isolated from the internet and only accessible from trusted networks with VPN or dedicated VLANs. Since these devices are End-of-Life, there are no security patches available. Plan to replace them entirely as soon as possible.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-reports-active-expploit-of-sierra-wireless-router-vulnerability-u-r-d-b-t/gD2P6Ple2L
If you missed this, Apple issued a bunch of security advisories yesterday https://support.apple.com/en-us/100100
The Hacker News: Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild https://thehackernews.com/2025/12/apple-issues-security-updates-after-two.html @thehackernews #Apple
Also:
CISA listed CVE-2025-14174, a Google Chromium Out of Bounds Memory Access Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-14174
And CVE-2018-4063, Sierra Wireless AirLink ALEOS Unrestricted Upload of File with Dangerous Type Vulnerability https://www.cve.org/CVERecord?id=CVE-2018-4063 #infosec #CISA #vulnerability #Google #Chromium
##updated 2025-12-15T15:16:08.650000
6 posts
Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529) https://www.helpnetsecurity.com/2025/12/15/ios-macos-cve-2025-14174-cve-2025-43529/ #securityupdate #Don'tmiss #Hotstuff #0-day #Apple #macOS #News #iOS
##Huh, I somehow missed this CVE:
https://mastodon.social/@verbrecher/115720201828646496
Thx to for the pointer @verbrecher
CVE-2025-14174 is related to this commit in the ANGLE repo:
https://github.com/google/angle/commit/95a32cb37edbb90eac0b83727b38fedbbb32307b
For CVE-2025-43529 there's much less info.
##Apple patches two actively exploited WebKit flaws
Apple released security updates across all major operating systems patching over 50 vulnerabilities, including two actively exploited WebKit zero-days (CVE-2025-43529 and CVE-2025-14174) used in targeted spyware attacks against individuals. The updates also address flaws enabling privilege escalation, Gatekeeper bypass, sandbox escape, and unauthorized access to sensitive user data.
**This one is important and urgent. The update fixes two actively exploited flaws and Google and Apple don't share any technical details. So it's very smart to update your Apple ecosystem (all iPhones, iPads, and Mac computers). You may not think you are important enough for a targeted attack, but the flaws will become common knowledge soon. And then everyone becomes a target.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/apple-patches-two-actively-exploited-webkit-flaws-8-6-c-x-v/gD2P6Ple2L
If you missed this, Apple issued a bunch of security advisories yesterday https://support.apple.com/en-us/100100
The Hacker News: Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild https://thehackernews.com/2025/12/apple-issues-security-updates-after-two.html @thehackernews #Apple
Also:
CISA listed CVE-2025-14174, a Google Chromium Out of Bounds Memory Access Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-14174
And CVE-2018-4063, Sierra Wireless AirLink ALEOS Unrestricted Upload of File with Dangerous Type Vulnerability https://www.cve.org/CVERecord?id=CVE-2018-4063 #infosec #CISA #vulnerability #Google #Chromium
##[VULN] "Sécurité : Apple comble deux failles « zero-day » avec iOS 26.2 et macOS 26.2"
"La première (CVE-2025-43529) concerne WebKit, le moteur de rendu de Safari. Il s'agit d'une faille de type use-after-free qui permet l'exécution de code arbitraire simplement en traitant un contenu web malveillant. La seconde (CVE-2025-14174) est une corruption de mémoire identifiée non seulement par les équipes d'Apple, mais aussi par le Threat Analysis Group de Google.
Fait intéressant, Google a également dû corriger Chrome en urgence mercredi dernier pour une faille similaire..."
👇
https://www.macg.co/ios/2025/12/securite-apple-comble-deux-failles-zero-day-avec-ios-262-et-macos-262-305619
⬇️
https://cve.circl.lu/vuln/CVE-2025-14174
updated 2025-12-15T12:30:32
1 posts
CVE-2025-14714 - TCC Bypass via Inherited Permissions in Bundled Interpreter https://cvefeed.io/vuln/detail/CVE-2025-14714
##updated 2025-12-15T12:30:32
1 posts
CVE-2025-11670 - NTLM Hash Exposure Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-11670
##updated 2025-12-15T09:31:35
1 posts
CVE-2025-14710 - FantasticLBP Hotels Server OrderList.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14710
##updated 2025-12-15T09:31:35
1 posts
CVE-2025-14709 - Shiguangwu sgwbox N3 WIRELESSCFGGET http_eshell_server buffer overflow https://cvefeed.io/vuln/detail/CVE-2025-14709
##updated 2025-12-15T09:31:34
1 posts
CVE-2025-14711 - FantasticLBP Hotels Server hotelList.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14711
##updated 2025-12-15T06:31:25
1 posts
CVE-2025-14705 - Shiguangwu sgwbox N3 SHARESERVER Feature command injection https://cvefeed.io/vuln/detail/CVE-2025-14705
##updated 2025-12-15T06:31:16
1 posts
CVE-2025-14712 - JHENG GAO|Student Learning Assessment and Support System - Exposure of Sensitive Information https://cvefeed.io/vuln/detail/CVE-2025-14712
##updated 2025-12-15T03:30:22
1 posts
1 repos
CVE-2025-14696 - Shenzhen Sixun Software Sixun Shanghui Group Business Management System UpdatePasswordBatch password recovery https://cvefeed.io/vuln/detail/CVE-2025-14696
##updated 2025-12-15T00:30:31
2 posts
CVE-2025-67900 - NXLog Agent OpenSSL Configuration File Load Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-67900
##CVE-2025-67900 - NXLog Agent OpenSSL Configuration File Load Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-67900
##updated 2025-12-15T00:30:31
1 posts
CVE-2025-67901 - OpenBSD Openrsync SIGSEGV https://cvefeed.io/vuln/detail/CVE-2025-67901
##updated 2025-12-14T18:31:34
1 posts
CVE-2025-14667 - itsourcecode COVID Tracking System page sql injection https://cvefeed.io/vuln/detail/CVE-2025-14667
##updated 2025-12-14T18:31:30
1 posts
CVE-2025-14673 - gmg137 snap7-rs client.rs as_ct_write heap-based overflow https://cvefeed.io/vuln/detail/CVE-2025-14673
##updated 2025-12-14T15:30:24
1 posts
CVE-2025-14665 - Tenda WH450 HTTP Request DhcpListClient stack-based overflow https://cvefeed.io/vuln/detail/CVE-2025-14665
##updated 2025-12-14T12:32:35
2 posts
CVE-2025-14655 - Tenda AC20 httpd SetSysAutoRebbotCfg formSetRebootTimer stack-based overflow https://cvefeed.io/vuln/detail/CVE-2025-14655
##CVE-2025-14655 - Tenda AC20 httpd SetSysAutoRebbotCfg formSetRebootTimer stack-based overflow https://cvefeed.io/vuln/detail/CVE-2025-14655
##updated 2025-12-14T12:32:35
2 posts
CVE-2025-14654 - Tenda AC20 httpd setPptpUserList formSetPPTPUserList stack-based overflow https://cvefeed.io/vuln/detail/CVE-2025-14654
##CVE-2025-14654 - Tenda AC20 httpd setPptpUserList formSetPPTPUserList stack-based overflow https://cvefeed.io/vuln/detail/CVE-2025-14654
##updated 2025-12-14T00:30:28
1 posts
CVE-2025-13832 - Apache HTTP Server Remote Code Execution Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-13832
##updated 2025-12-13T21:30:24
1 posts
CVE-2025-14637 - itsourcecode Online Pet Shop Management System addcnp.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14637
##updated 2025-12-13T18:30:31
1 posts
CVE-2025-14622 - code-projects Student File Management System save_user.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14622
##updated 2025-12-13T18:30:31
1 posts
CVE-2025-14621 - code-projects Student File Management System update_user.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14621
##updated 2025-12-13T18:30:30
1 posts
CVE-2025-67870 - Apache HTTP Server Cross-Site Request Forgery https://cvefeed.io/vuln/detail/CVE-2025-67870
##updated 2025-12-13T18:30:30
1 posts
CVE-2025-14588 - iSourcecode Student Management System SQL Injection Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14588
##updated 2025-12-13T18:30:30
1 posts
CVE-2025-8687 - WordPress Enter Addons Stored Cross-Site Scripting Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-8687
##updated 2025-12-13T18:30:29
1 posts
CVE-2025-36747 - ShineLan-X FTP Server Credentials Disclosure https://cvefeed.io/vuln/detail/CVE-2025-36747
##updated 2025-12-13T18:30:29
1 posts
CVE-2025-12077 - WordPress WP to LinkedIn Auto Publish Plugin Reflected Cross-Site Scripting https://cvefeed.io/vuln/detail/CVE-2025-12077
##updated 2025-12-13T18:30:22
1 posts
CVE-2025-10738 - WordPress URL Shortener Plugin SQL Injection Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-10738
##updated 2025-12-13T16:16:55.233000
1 posts
CVE-2025-67871 - Apache HTTP Server Directory Traversal https://cvefeed.io/vuln/detail/CVE-2025-67871
##updated 2025-12-12T21:32:45
1 posts
Critical Plesk vulnerability enables privilege escalation, server compromise
Plesk for Linux has a critical vulnerability (CVE-2025-66430) in its Password-Protected Directories feature that allows authenticated users to escalate privileges to root access. Security patches are available through micro-updates to versions 18.0.73.5 or 18.0.74.2.
**If you're running Plesk for Linux, plan a very quick update to version 18.0.73.5 or 18.0.74.2. Your authenticated users (or their hacked accounts) can gain complete root control of your server. After patching, audit your systems for any signs of unauthorized access or compromise.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-plesk-vulnerability-enables-privilege-escalation-server-compromise-1-8-g-i-w/gD2P6Ple2L
updated 2025-12-12T16:42:56
1 posts
4 repos
https://github.com/meenakshisl/PoC-CVE-2025-13780
https://github.com/ThemeHackers/CVE-2025-13780
Critical flaw in pgAdmin 4 allows remote code execution
A critical vulnerability (CVE-2025-13780) in pgAdmin 4 versions up to 9.10 allows authenticated attackers to execute arbitrary shell commands by bypassing regex-based filters using UTF-8 BOM and non-standard whitespace characters in malicious SQL dump files. The flaw has been patched in version 9.11, which implements psql's `\restrict` directive to disable dangerous meta-commands during database restoration operations.
**If you're running pgAdmin 4 in server mode, plan a quick update to version and upgrade to 9.11 or later. All previous versions allow attackers to execute shell commands on your server through malicious database restore files. It's not critical because users still need privileges on pgAdmin, but those can be breached. So don't ignore this one.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-flaw-in-pgadmin-4-allows-remote-code-execution-o-r-d-1-s/gD2P6Ple2L
updated 2025-12-12T15:18:42.140000
1 posts
updated 2025-12-12T00:30:20
1 posts
updated 2025-12-11T21:55:34
1 posts
4 repos
https://github.com/Joker-Wiggin/CVE-2025-58360-GeoServer-XXE
https://github.com/Ashwesker/Blackash-CVE-2025-58360
CISA reports active exploitation of GeoServer XXE flaw
CISA reports active exploitation of CVE-2025-58360, a critical XML External Entity (XXE) vulnerability in OSGeo GeoServer that allows unauthenticated attackers to access sensitive files, conduct SSRF attacks, and launch denial-of-service attacks.
**If you run OSGeo GeoServer, this is urgent. Your server is under attack. If possible, isolate from the internet. Definitely upgrade to the latest patched version (2.25.6, 2.26.2, 2.27.0, 2.28.0, or 2.28.1).**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-reports-active-exploitation-of-geoserver-xxe-flaw-t-8-t-y-g/gD2P6Ple2L
updated 2025-12-11T18:30:54
1 posts
CVE-2025-64669: Uncovering Local Privilege Escalation Vulnerability in Windows Admin Center https://cymulate.com/blog/cve-2025-64669-windows-admin-center/
##updated 2025-12-11T18:30:41
1 posts
updated 2025-12-10T02:00:02.557000
25 posts
100 repos
https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool
https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182
https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-
https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/yanoshercohen/React2Shell_CVE-2025-55182
https://github.com/sho-luv/React2Shell
https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/Pizz33/CVE-2025-55182-burpscanner
https://github.com/VeilVulp/RscScan-cve-2025-55182
https://github.com/ayoub-intigriti/react2shell-cve
https://github.com/theori-io/reactguard
https://github.com/emredavut/CVE-2025-55182
https://github.com/7amzahard/React2shell
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/Saturate/CVE-2025-55182-Scanner
https://github.com/LemonTeatw1/CVE-2025-55182-exploit
https://github.com/shamo0/react2shell-PoC
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/GelukCrab/React-Server-Components-RCE
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/keklick1337/CVE-2025-55182-golang-PoC
https://github.com/subhdotsol/CVE-2025-55182
https://github.com/xcanwin/CVE-2025-55182-React-RCE
https://github.com/Chocapikk/CVE-2025-55182
https://github.com/AggressiveUser/React2Hell
https://github.com/AliHzSec/CVE-2025-55182
https://github.com/xiaopeng-ye/react2shell-detector
https://github.com/acheong08/CVE-2025-55182-poc
https://github.com/santihabib/CVE-2025-55182-analysis
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/xalgord/React2Shell
https://github.com/gensecaihq/react2shell-scanner
https://github.com/im-ezboy/CVE-2025-55182-zoomeye
https://github.com/EynaExp/CVE-2025-55182-POC
https://github.com/raivenLockdown/RCE_React2Shell_ButCooler-SomeUselessUsefulThingsLMAO-
https://github.com/andrei2308/react2shell
https://github.com/hoosin/CVE-2025-55182
https://github.com/zack0x01/vuln-app-CVE-2025-55182
https://github.com/msanft/CVE-2025-55182
https://github.com/c0rydoras/CVE-2025-55182
https://github.com/fatguru/CVE-2025-55182-scanner
https://github.com/nehkark/CVE-2025-55182
https://github.com/logesh-GIT001/CVE-2025-55182
https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/EQSTLab/CVE-2025-55182
https://github.com/freeqaz/react2shell
https://github.com/whiteov3rflow/CVE-2025-55182-poc
https://github.com/MoLeft/React2Shell-Toolbox
https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive
https://github.com/dwisiswant0/CVE-2025-55182
https://github.com/Rsatan/Next.js-Exploit-Tool
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/XiaomingX/CVE-2025-55182-poc
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/shyambhanushali/React2Shell
https://github.com/kavienanj/CVE-2025-55182
https://github.com/ejpir/CVE-2025-55182-research
https://github.com/C00LN3T/React2Shell
https://github.com/sudo-Yangziran/CVE-2025-55182POC
https://github.com/SainiONHacks/CVE-2025-55182-Scanner
https://github.com/zzhorc/CVE-2025-55182
https://github.com/ThemeHackers/CVE-2025-55182
https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc
https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell
https://github.com/StealthMoud/CVE-2025-55182-Scanner
https://github.com/alfazhossain/CVE-2025-55182-Exploiter
https://github.com/Spritualkb/CVE-2025-55182-exp
https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
https://github.com/techgaun/cve-2025-55182-scanner
https://github.com/Ashwesker/Blackash-CVE-2025-55182
https://github.com/ejpir/CVE-2025-55182-bypass
https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS
https://github.com/m3m0ryc0rrupt/CVE-2025-55182-PoC
https://github.com/alsaut1/react2shell-lab
https://github.com/xkillbit/cve-2025-55182-scanner
https://github.com/kk12-30/CVE-2025-55182
https://github.com/mrknow001/RSC_Detector
https://github.com/timsonner/React2Shell-CVE-2025-55182
https://github.com/yz9yt/React2Shell-CTF
https://github.com/ynsmroztas/NextRce
https://github.com/f0xyx/CVE-2025-55182-Scanner
https://github.com/kOaDT/poc-cve-2025-55182
https://github.com/SoICT-BKSEC/CVE-2025-55182-docker-lab
https://github.com/hualy13/CVE-2025-55182
https://github.com/RuoJi6/CVE-2025-55182-RCE-shell
https://github.com/sickwell/CVE-2025-55182
https://github.com/jf0x3a/CVE-2025-55182-exploit
https://github.com/sumanrox/rschunter
https://github.com/assetnote/react2shell-scanner
https://github.com/surajhacx/react2shellpoc
📢 Exploitation massive de la faille React2Shell (CVE-2025-55182) dans React/Next.js
📝 Source : Google Cloud Blog (Google Threat Intelligence Group), 12 décembre 2025.
📖 cyberveille : https://cyberveille.ch/posts/2025-12-15-exploitation-massive-de-la-faille-react2shell-cve-2025-55182-dans-react-next-js/
🌐 source : https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182?hl=en
#Analyse_de_menace #CVE_2025_55182 #Cyberveille
GitHub Scanner for React2Shell (CVE-2025-55182) Turns Out to Be Malware https://hackread.com/github-scanner-react2shell-cve-2025-55182-malware/
##📢 React2Shell (CVE-2025-55182) exploité pour déployer le ransomware Weaxor
📝 Source: S-RM — Dans un rapport d’incident, S-RM décrit l’exploitation de la vulné...
📖 cyberveille : https://cyberveille.ch/posts/2025-12-16-react2shell-cve-2025-55182-exploite-pour-deployer-le-ransomware-weaxor/
🌐 source : https://www.s-rminform.com/latest-thinking/react2shell-used-as-initial-access-vector-for-weaxor-ransomware-deployment
#CVE_2025_55182 #Next_js_React_Server_Components #Cyberveille
React2Shell beyond Next.js: Our team tested exploitability and analyzed exploit patterns for *other* frameworks vulnerable to CVE-2025-55182. Notes on the four other frameworks we exploited successfully are in this blog, but it's important to note that none of these is anywhere close to the viable attack surface area that Next.js apps presented.
In other words, in an alternate universe where Next.js apps weren't vulnerable by default, this probably would've been a nothing-burger after all. Unfortunately (gestures at everything).
##GitHub Scanner for React2Shell (CVE-2025-55182) Turns Out to Be Malware https://hackread.com/github-scanner-react2shell-cve-2025-55182-malware/
##React2Shell beyond Next.js: Our team tested exploitability and analyzed exploit patterns for *other* frameworks vulnerable to CVE-2025-55182. Notes on the four other frameworks we exploited successfully are in this blog, but it's important to note that none of these is anywhere close to the viable attack surface area that Next.js apps presented.
In other words, in an alternate universe where Next.js apps weren't vulnerable by default, this probably would've been a nothing-burger after all. Unfortunately (gestures at everything).
##Microsoft posted this yesterday.
Microsoft: Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components https://www.microsoft.com/en-us/security/blog/2025/12/15/defending-against-the-cve-2025-55182-react2shell-vulnerability-in-react-server-components/ #Microsoft #threatresearch #infosec #React2shell #vulnerability
##React2Shell: L'ampleur des dégâts se révèle. Cloudflare rapporte 14,5M tentatives d'exploitation/heure. Microsoft observe des compromissions massives. Cette faille critique (CVE-2025-55182) exige une action immédiate. Patchez et protégez vos systèmes.
⚡️https://linkeaz.net/fr/posts/react2shell-damages-revealed
#React2Shell #Sécurité #CyberSécurité #Technews #Vulnerabilités #React #NextJS
##“Five new China-linked groups join rapid React2Shell exploitation, raising urgency to patch now.”
https://www.scworld.com/news/more-china-linked-groups-exploit-react2shell-cve-2025-55182-zero-day
##GitHub Scanner for React2Shell (CVE-2025-55182) Turns Out to Be Malware https://hackread.com/github-scanner-react2shell-cve-2025-55182-malware/ #ScamsandFraud #Cybersecurity #Vulnerability #React2Shell #Security #security #Malware #GitHub #Fraud #Scam
##A fake #React2Shell (CVE-2025-55182) scanner on GitHub was caught delivering malware targeting security researchers, using a #Windows tool to pull a remote payload.
Read: https://hackread.com/github-scanner-react2shell-cve-2025-55182-malware/
##It's an incredibly slow Monday, which probably explains why some cybersecurity posts were published on Friday, December 12. This is one of them:
Google Threat Intelligence: Multiple Threat Actors Exploit React2Shell (CVE-2025-55182) https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182 #Google #infosec #threatintel #threatintelligence #React2shell
##More React2Shell Exploits CVE-2025-55182 https://isc.sans.edu/diary/32572
##🖲️ #Cybersecurity #Ciberseguridad #Ciberseguranca #Security #Seguridad #Seguranca #News #Noticia #Noticias #Tecnologia #Technology
⚫ React2Shell Exploits Flood the Internet as Attacks Continue
🔗 https://www.darkreading.com/threat-intelligence/react2shell-exploits-flood-internet-attacks-continue
As exploitation activity against CVE-2025-55182 ramps up, researchers are finding some proof-of-concept exploits contain bypasses for web application firewall (WAF) rules.
##NTT's Kazuya Nomura analyses ZnDoor, a malware executed by exploiting React2Shell (CVE-2025-55182) in attacks against companies in Japan. https://jp.security.ntt/insights_resources/tech_blog/react2shell_malware_zndoor/
##Critical React2Shell Vulnerability (CVE-2025-55182) Analysis: Surge in Attacks Targeting RSC-Enabled Services Worldwide https://hackread.com/react2shell-vulnerability-cve-2025-55182-analysis/ #Cybersecurity #Vulnerability #PressRelease #CyberAttack #React2Shell #CriminalIP #News #CISA #RCE
##Wer bei #React2Shell mit den Softwareupdates zu langsam war, kann jetzt langsam eher mal auf die folgenden Indicators of Compromise achten… https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182?hl=en
##Google is now tracking at least five Chinese cyber-espionage groups that are exploiting the React2Shell vulnerability for initial access.
The groups are UNC6600, UNC6586, UNC6588, UNC6595, and UNC6603. This is up from two at the beginning.
##React2shell CVE-2025-55182のせいで勝手にサーバでマイニングされてた(むしろその程度で済んでよかったねクラスのあかんやつ)という話をたくさん聞いてるのでお気をつけくださいまし…
DifyをセルフホストしたやつをパブリックなIPに少しでも晒したら即死とか聞いとるでな。
##An actively exploited GeoServer XXE vulnerability is prompting renewed discussion around breach readiness in public-sector and enterprise environments.
Experts note that unauthenticated flaws in widely deployed open-source platforms significantly increase exposure, especially where asset discovery and patch coordination are constrained.
Venky Raju, Field CTO at ColorTokens:
“The massive adoption of open-source software has significantly increased the attack surface of many enterprises, often without their knowledge. Unauthenticated vulnerabilities are particularly concerning because they bypass identity and application-level controls. The GeoServer vulnerability comes on the heels of a larger one called React2Shell (CVE-2025-55182), which scored a perfect 10 on the CVSS metric.
However, enterprises may not be able to patch servers quickly due to internal challenges, such as discovering affected assets, identifying affected applications, scheduling patch updates, etc. As an emergency measure, organizations should consider microsegmentation controls to isolate affected assets or zones with just enough policies to maintain business continuity while preventing lateral movement using commonly used techniques. The MITRE framework is an excellent guide for identifying the tactics hackers use to move laterally from the initially compromised system.”
How are teams handling containment when patching isn’t immediate?
Engage and follow @technadu for grounded infosec coverage.
#InfoSec #ZeroTrust #Microsegmentation #GeoServer #OpenSourceRisk #ThreatDetection #TechNadu
##Missed this yesterday - Google TIG published what they've been seeing on React2Shell.
Dovetails with @hrbrmstr 's tireless work lately.
##updated 2025-12-09T19:59:29.507000
4 posts
CISA reports active exploitation of critical Fortinet authentication bypass flaw
CISA reports active exploitation of two critical Fortinet vulnerabilities (CVE-2025-59718 and CVE-2025-59719, CVSS 9.8) that allow unauthenticated attackers to bypass FortiCloud SSO authentication through flawed SAML signature verification. Exploitation began just three days after patches were released on December 12, 2025.
**Now it's urgent, because once again, your Fortinet products are being hacked. If you have Fortinet products, first make sure the management interface is isolated from the internet and accessible only from trusted networks. Then disable FortiCloud SSO login (in System -> Settings or use CLI command config system global set admin-forticloud-sso-login disable end) to prevent authentication bypass attacks. Finally, upgrade to the latest secure versions as soon as possible.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-multiple-fortinet-products-exploited-in-attacks-rapid-patching-urged-crn-8-k-w-x-8/gD2P6Ple2L
CISA reports active exploitation of critical Fortinet authentication bypass flaw
CISA reports active exploitation of two critical Fortinet vulnerabilities (CVE-2025-59718 and CVE-2025-59719, CVSS 9.8) that allow unauthenticated attackers to bypass FortiCloud SSO authentication through flawed SAML signature verification. Exploitation began just three days after patches were released on December 12, 2025.
**Now it's urgent, because once again, your Fortinet products are being hacked. If you have Fortinet products, first make sure the management interface is isolated from the internet and accessible only from trusted networks. Then disable FortiCloud SSO login (in System -> Settings or use CLI command config system global set admin-forticloud-sso-login disable end) to prevent authentication bypass attacks. Finally, upgrade to the latest secure versions as soon as possible.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-multiple-fortinet-products-exploited-in-attacks-rapid-patching-urged-crn-8-k-w-x-8/gD2P6Ple2L
Pornhub / Mixpanel
- https://www.bleepingcomputer.com/news/security/pornhub-extorted-after-hackers-steal-premium-member-activity-data/
- https://mixpanel.com/blog/sms-security-incident/https://www.newsweek.com/pornhub-hack-premium-user-data-200-million-records-shinyhunters-1959937
- https://www.techspot.com/news/107779-pornhub-extorted-after-94gb-user-data-stolen.html
- https://www.securityaffairs.com/177881/data-breach/pornhub-extorted-shinyhunters.html
PDVSA Hacked
- https://www.bleepingcomputer.com/news/security/cyberattack-disrupts-venezuelan-oil-giant-pdvsas-operations/
- https://www.reuters.com/world/americas/cyberattack-disrupts-venezuela-oil-company-pdvsas-operations-sources-say-2025-12-16/
- https://www.bloomberg.com/news/articles/2025-12-16/venezuela-s-pdvsa-hit-by-cyberattack-disrupting-oil-exports
- https://www.maritime-executive.com/article/pdvsa-in-cyberattack-export-operations-disrupted-report
Fortinet FortiCloud SSO auth bypass
- https://www.bleepingcomputer.com/news/security/fortinet-warns-of-critical-forticloud-sso-login-auth-bypass-flaws/
- https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-sso-logins-following-disclosure-cve-2025-59718-cve-2025-59719/
- https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerabilities-in-multiple-fortinet-products-forticloud-sso-login-authentication-bypass
- https://cyber.gc.ca/en/alerts-advisories/al25-019-vulnerabilities-impacting-fortinet-products-forticloud-sso-login-authentication-bypass-cve-2025-59718-cve-2025-59719
- https://thehackernews.com/2025/12/fortinet-fortigate-under-active-attack.html
RE: https://infosec.exchange/@BleepingComputer/115730066370654236
Apparently CVE-2025-59718 and CVE-2025-59719 are now EITW.
##updated 2025-12-09T18:30:43
1 posts
Siemens reports critical flaw in IAM Client on multiple industrial products
Siemens is reporting a critical vulnerability (CVE-2025-40800) in its IAM client component affecting multiple industrial software products, which allows unauthenticated attackers to conduct man-in-the-middle attacks due to improper certificate validation. Patches are available for most affected products.
**Make sure all your industrial systems are isolated from the internet and accessible from trusted networks only. If you are using COMOS, NX, Simcenter 3D, Simcenter Femap, Solid Edge plan a quick update for them. Not an urgent thing, but don't ignore this one. Someone will find a way to hack them.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/siemens-reports-critical-flaw-in-iam-client-on-multiple-industrial-products-1-d-o-3-h/gD2P6Ple2L
updated 2025-12-09T18:30:42
1 posts
4 repos
https://github.com/CRUNZEX/CVE-2025-22968
https://github.com/padayali-JD/CVE-2025-22964
Analyzing CVE-2025-2296 [Un-verified #kernel bypass #SecureBoot mechanism in direct boot mode]
https://www.kraxel.org/blog/2025/12/analyzing-cve-2025-2296/
Gerd Hoffmann aka kraxel writes: ""[…] So, if secure boot is enabled attempts to boot via 'EFI stub' will fail, the firmware rejects the binary due to the signature check failing. OVMF will fallback to the legacy 'EFI handover protocol' loader. The legacy loader does not do secure boot verification, which is the core of CVE-2025-2296. And this was essentially unfixable (in the firmware alone) because there simply is no valid secure boot signature due to the patching qemu is doing. Nevertheless there are some use cases which expect direct kernel boot with secure boot enabled to work. Catch 22. […]
Secure boot bypass sounds scary, but is it really? […] So, the actual impact is quite limited. […]""
##updated 2025-12-08T18:27:15.857000
2 posts
3 repos
https://github.com/Ashwesker/Blackash-CVE-2025-66516
Atlassian fixed maximum severity flaw CVE-2025-66516 in Apache Tika https://securityaffairs.com/185710/security/atlassian-fixed-maximum-severity-flaw-cve-2025-66516-in-apache-tika.html
##Atlassian patches 46 vulnerabilities in December 2025 security bulletin, nine critical Third-Party flaws
Atlassian's December 2025 Security Bulletin addresses 46 vulnerabilities across its enterprise software suite, including a critical CVE-2025-66516 XXE vulnerability (CVSS 10.0) in the Tika dependency affecting Bamboo, Confluence, Crowd, Jira, and Fisheye/Crucible products.
**If you use Atlassian products (Jira, Confluence, Bamboo, Bitbucket, Crowd, or Fisheye/Crucible), plan a general update. The December 2025 patch brings a bunch of fixes, including some critical flaws in dependency components.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/atlassian-patches-46-vulnerabilities-in-december-2025-security-bulletin-nine-critical-third-party-flaws-d-j-4-s-6/gD2P6Ple2L
updated 2025-12-05T18:31:18
1 posts
updated 2025-12-04T17:15:25.860000
3 posts
Privilege escalation flaw reported in JumpCloud Remote Assist for Windows
A critical vulnerability (CVE-2025-34352) in JumpCloud Remote Assist for Windows allows low-privileged local attackers to escalate privileges to SYSTEM level or cause denial-of-service attacks by exploiting insecure file operations during the uninstallation process.
**This one is potentially very dangerous, but complex to exploit and does require several prerequisites like having local access and triggering specific sequences of events on the computer including JumpCloud uninstall. It's important to update all agents, but not a panic mode patch. Just keep up the patches of your fleet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/privilege-escalation-flaw-reported-in-jumpcloud-remote-assist-for-windows-8-7-u-a-b/gD2P6Ple2L
Privilege escalation flaw reported in JumpCloud Remote Assist for Windows
A critical vulnerability (CVE-2025-34352) in JumpCloud Remote Assist for Windows allows low-privileged local attackers to escalate privileges to SYSTEM level or cause denial-of-service attacks by exploiting insecure file operations during the uninstallation process.
**This one is potentially very dangerous, but complex to exploit and does require several prerequisites like having local access and triggering specific sequences of events on the computer including JumpCloud uninstall. It's important to update all agents, but not a panic mode patch. Just keep up the patches of your fleet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/privilege-escalation-flaw-reported-in-jumpcloud-remote-assist-for-windows-8-7-u-a-b/gD2P6Ple2L
🚨 JumpCloud Remote Assist flaw (CVE-2025-34352) lets local users hijack full control of company devices. Affects 180,000+ orgs. Update now to patch.
Read: https://hackread.com/jumpcloud-remote-assist-flaw-full-devices-control/
##updated 2025-12-02T14:33:52.680000
4 posts
Только вчера была удалена запись о критической уязвимости #Chrome (CVE-2025-13223), и вот, не прошло и месяца (спустя 24 дня), как нашлась новая, у которой даже нет #CVE-идентификатора.
Какие ещё нужны аргументы, чтобы слезть с этого...
и начать пользоваться #Firefox?
##Только вчера была удалена запись о критической уязвимости #Chrome (CVE-2025-13223), и вот, не прошло и месяца (спустя 24 дня), как нашлась новая, у которой даже нет #CVE-идентификатора.
Какие ещё нужны аргументы, чтобы слезть с этого...
и начать пользоваться #Firefox?
##updated 2025-11-19T15:32:36
1 posts
11 repos
https://github.com/fevar54/CVE-2025-64446-PoC---FortiWeb-Path-Traversal
https://github.com/mrk336/Silent-WebStorm-Fortinet-s-Hidden-Exploits
https://github.com/Death112233/CVE-2025-64446-
https://github.com/sensepost/CVE-2025-64446
https://github.com/lincemorado97/CVE-2025-64446_CVE-2025-58034
https://github.com/Ashwesker/Blackash-CVE-2025-64446
https://github.com/AN5I/cve-2025-64446-fortiweb-exploit
https://github.com/soltanali0/CVE-2025-64446-Exploit
https://github.com/sxyrxyy/CVE-2025-64446-FortiWeb-CGI-Bypass-PoC
Fortinet FortiWeb Vulnerability (CVE-2025-64446) Exploited in the Wild for Full Admin Takeover https://cybersecuritynews.com/fortinet-fortiweb-vulnerability-exploited/ #CyberSecurityNews #VulnerabilityNews #cybersecuritynews #vulnerability
##updated 2025-11-17T18:30:25
4 posts
updated 2025-11-04T22:16:11.920000
1 posts
F5 updated their advisory for CVE-2025-40780. I don't know what they updated since they still don't do a change log but they still say it sucks to suck. No fix in BIG-IP DNS.
##updated 2025-10-29T15:31:53
1 posts
updated 2025-07-15T22:56:20
1 posts
updated 2025-06-13T20:15:22.450000
1 posts
With H2HC on hiatus this year, the security community stepped up to create the 307 Temporary Security Conference—and we were proud to be part of it!
We presented our research on vulnerabilities in the CAN BCM protocol in the Linux kernel.
Thank you to everyone who watched!
The slides and exploit demos are now available.
Slides
https://allelesecurity.com/wp-content/uploads/2025/12/Presentation_307.pdf
Demo 1: Exploit for UAF read (CAN BCM) to dump shadow file & MySQL root hash.
https://www.youtube.com/watch?v=znTLHc2mXIs
Demo 2: Exploit for UAF read in CAN BCM (CVE-2023-52922) that leaks encoded freelist pointer and slab object addresses
https://www.youtube.com/watch?v=XQ3QlXqn6pI
updated 2025-04-11T15:39:52.920000
1 posts
Nvidia has three security advisories today.
NVIDIA NeMo Framework: CVE-2025-33212 and CVE-2025-33226 https://nvidia.custhelp.com/app/answers/detail/a_id/5736
NVIDIA Isaac Lab: CVE-2025-32210 https://nvidia.custhelp.com/app/answers/detail/a_id/5733
NVIDIA Resiliency Extension: CVE-2025-33225 and CVE-2025-33235 https://nvidia.custhelp.com/app/answers/detail/a_id/5746 #Nvidia #vulnerability #infosec
##updated 2024-09-30T18:12:04.437000
4 posts
Researchers disclosed a critical buffer overflow (CVE-2024-39432) in connected car modems that enables remote code execution and lateral movement across the vehicle SoC.
The findings challenge long-held assumptions about cellular protocol isolation in automotive systems.
##📢 RCE baseband sur le modem Unisoc UIS7862A des head units automobiles (CVE-2024-39432/39431)
📝 Source: Kaspersky ICS CERT — Contexte: publication de recherche (16 déc.
📖 cyberveille : https://cyberveille.ch/posts/2025-12-16-rce-baseband-sur-le-modem-unisoc-uis7862a-des-head-units-automobiles-cve-2024-39432-39431/
🌐 source : https://securelist.com/attacking-car-modem/118463/
#CVE_2024_39431 #CVE_2024_39432 #Cyberveille
Researchers disclosed a critical buffer overflow (CVE-2024-39432) in connected car modems that enables remote code execution and lateral movement across the vehicle SoC.
The findings challenge long-held assumptions about cellular protocol isolation in automotive systems.
##New.
"During our research, we identified several critical vulnerabilities at various levels of the Unisoc UIS7862A modem’s cellular protocol stack. This article discusses a stack-based buffer overflow vulnerability in the 3G RLC protocol implementation (CVE-2024-39432). The vulnerability can be exploited to achieve remote code execution at the early stages of connection, before any protection mechanisms are activated."
Kaspersky: God Mode On: how we attacked a vehicle’s head unit modem https://securelist.com/attacking-car-modem/118463/ @Kaspersky #infosec #IoT #threatresearch
##4 posts
100 repos
https://github.com/jctommasi/react2shellVulnApp
https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-supabase-pnpm-monorepo
https://github.com/cypholab/evilact
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-alias
https://github.com/arashiyans/CVE-2025-55182-CVE-2025-66478
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/grp-ops/react2shell
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/ayoub-intigriti/react2shell-cve
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-pnp
https://github.com/lincemorado97/CVE-2025-55182_CVE-2025-66478
https://github.com/emredavut/CVE-2025-55182
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-hoisting
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-15x
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tag-latest
https://github.com/zhixiangyao/CVE-2025-66478-Exploit-PoC
https://github.com/Saad-Ayady/react2shellNSE
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-devdeps
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/abhirajranjan/cve-2025-66478
https://github.com/wangxso/CVE-2025-66478-POC
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/DavionGowie/-vercel-application-is-vulnerable-to-CVE-2025-66478.
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-turborepo
https://github.com/MoisesTapia/http-react2shell
https://github.com/shamo0/react2shell-PoC
https://github.com/changgun-lee/Next.js-RSC-RCE-Scanner-CVE-2025-66478
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/Code42Cate/nexts-cve-2025-66478-exploit
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-overrides
https://github.com/namest504/CVE-2025-66478-Exploit-Poc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-shrinkwrap
https://github.com/xiaopeng-ye/react2shell-detector
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-build-metadata
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-packagemanager-field
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/mattcbarrett/check-cve-2025-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-caret
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-git-dep
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-zero-installs
https://github.com/aiexz/CVE-2025-66478-kinda-waf
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-rsc-webpack
https://github.com/Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-no-lockfile
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-berry
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-patch-package
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-bun
https://github.com/vercel-labs/fix-react2shell-next
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces
https://github.com/mounta11n/CHECK-CVE-2025-55182-AND-CVE-2025-66478
https://github.com/ExpTechTW/CVE-2025-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-transitive
https://github.com/nehkark/CVE-2025-55182
https://github.com/Jibaru/CVE-2025-66478-github-patcher
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/freeqaz/react2shell
https://github.com/DavionGowie/-vercel-prod.yml-application-is-vulnerable-to-CVE-2025-66478.
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-calcom-yarn-monorepo
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-yarn-workspaces
https://github.com/hidden-investigations/react2shell-scanner
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-14x
https://github.com/shyambhanushali/React2Shell
https://github.com/C00LN3T/React2Shell
https://github.com/FurkanKAYAPINAR/ReactNext2Shell
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-16x
https://github.com/enesbuyuk/react2shell-security-tool
https://github.com/Mustafa1p/Next.js-RCE-Scanner---CVE-2025-55182-CVE-2025-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm
https://github.com/ToritoIO/Torito-R2S
https://github.com/abtonc/next-cve-2025-66478
https://github.com/gagaltotal/tot-react-rce-CVE-2025-55182
https://github.com/Rhyru9/CVE-2025-66478
https://github.com/strainxx/react2shell-honeypot
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-lockfile-mismatch
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-peer-conflict
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-catalog
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-resolutions
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-range
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-nested-versions
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-dub-pnpm-monorepo
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-overrides
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-optional-deps
https://github.com/alessiodos/react2shell-scanner
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tilde
https://github.com/Letalandroid/cve-2025-66478_rce_vulnerable
https://github.com/abdozkaya/rsc-security-auditor
https://github.com/ancs21/react2shell-scanner-rust
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm-symlinks
https://github.com/sumanrox/rschunter
https://github.com/assetnote/react2shell-scanner
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-v-prefix
0G Foundation reports $520,000 security breach through exploitation of critical Next.js flaw
The 0G Foundation suffered a $520,000 cryptocurrency theft after attackers exploited a critical Next.js vulnerability (CVE-2025-66478) involving insecure deserialization, which enabled arbitrary code execution and access to a locally-stored private key on an AliCloud server. The attackers then conducted lateral movement across the infrastructure, compromised the rewards distribution contract using the stolen key, and laundered the funds through Tornado Cash.
**When unpatched flaws have real monetary vulnerabilities**
#cybersecurity #infosec #incident #vulnerability
https://beyondmachines.net/event_details/0g-foundation-reports-520000-security-breach-through-exploitation-of-critical-next-js-flaw-p-u-p-g-g/gD2P6Ple2L
A privilege escalation in Dropbear (CVE-2025-14282) allows any authenticated user to run arbitrary commands as root. The vulnerability affects versions 2024.84 to 2025.88. Dropbear release 2025.89 fixes the vulnerability.
A mitigation is to run dropbear without unix socket forwarding by adding the -j option.
##1 posts
3 repos
https://github.com/rxerium/FreePBX-Vulns-December-25
https://github.com/cyberleelawat/FreePBX-Multiple-CVEs-2025
https://github.com/BimBoxH4/CVE-2025-66039_CVE-2025-61675_CVE-2025-61678_reePBX
Critical authentication bypass and multiple flaws discovered in FreePBX VoIP platform
Security researchers discovered three critical vulnerabilities in FreePBX affecting authentication, database security, and file uploads, with the most severe (CVE-2025-66039,) allowing authentication bypass that can be chained with SQL injection and file upload flaws to achieve complete system compromise. Patches have been released as of December 2025.
**Make sure all FreePBX management and login interfaces are are isolated from the internet and only accessible from trusted networks. Plan a quick update to the latest patched versions (16.0.92/17.0.6 or newer), verify your authentication type is set to 'usermanager' instead of 'webserver', then reboot the system to clear any potentially compromised sessions. Finally, investigate for possible indicators of compromise.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-authentication-bypass-and-multiple-flaws-discovered-in-freepbx-voip-platform-s-b-g-p-0/gD2P6Ple2L
CVE-2025-67736 - Authenticated SQL Injection in FreePBX tts (Text To Speech) module https://cvefeed.io/vuln/detail/CVE-2025-67736
##CVE-2025-66449 - ConvertX has Path Traversal that leads to Arbitrary File Write and Arbitrary Code Execution https://cvefeed.io/vuln/detail/CVE-2025-66449
##CVE-2025-67874 - ChurchCRM has plaintext password return in response https://cvefeed.io/vuln/detail/CVE-2025-67874
##CVE-2025-67751 - ChurchCRM has SQL Injection in Event Editor via `EN_tyid` Parameter caused by an Incomplete Fix https://cvefeed.io/vuln/detail/CVE-2025-67751
##CVE-2025-59947 - NanoMQ has Buffer Overflow https://cvefeed.io/vuln/detail/CVE-2025-59947
##CVE-2025-59947 - NanoMQ has Buffer Overflow https://cvefeed.io/vuln/detail/CVE-2025-59947
##CISA KEV Catalog has added 2 more vulnerabilities
CVE-2025-14611: Gladinet CentreStack and Triofox Hard Coded Cryptographic Vulnerability
CVSS: 7.1
CVE-2025-43529: Apple Multiple Products Use-After-Free WebKit Vulnerability
##CVE ID: CVE-2025-43529
Vendor: Apple
Product: Multiple Products
Date Added: 2025-12-15
Notes: https://support.apple.com/en-us/125884 ; https://support.apple.com/en-us/125892 ; https://support.apple.com/en-us/125885 ; https://support.apple.com/en-us/125886 ; https://support.apple.com/en-us/125889 ; https://nvd.nist.gov/vuln/detail/CVE-2025-43529
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-43529
Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529) https://www.helpnetsecurity.com/2025/12/15/ios-macos-cve-2025-14174-cve-2025-43529/ #securityupdate #Don'tmiss #Hotstuff #0-day #Apple #macOS #News #iOS
##Huh, I somehow missed this CVE:
https://mastodon.social/@verbrecher/115720201828646496
Thx to for the pointer @verbrecher
CVE-2025-14174 is related to this commit in the ANGLE repo:
https://github.com/google/angle/commit/95a32cb37edbb90eac0b83727b38fedbbb32307b
For CVE-2025-43529 there's much less info.
##Apple patches two actively exploited WebKit flaws
Apple released security updates across all major operating systems patching over 50 vulnerabilities, including two actively exploited WebKit zero-days (CVE-2025-43529 and CVE-2025-14174) used in targeted spyware attacks against individuals. The updates also address flaws enabling privilege escalation, Gatekeeper bypass, sandbox escape, and unauthorized access to sensitive user data.
**This one is important and urgent. The update fixes two actively exploited flaws and Google and Apple don't share any technical details. So it's very smart to update your Apple ecosystem (all iPhones, iPads, and Mac computers). You may not think you are important enough for a targeted attack, but the flaws will become common knowledge soon. And then everyone becomes a target.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/apple-patches-two-actively-exploited-webkit-flaws-8-6-c-x-v/gD2P6Ple2L
[VULN] "Sécurité : Apple comble deux failles « zero-day » avec iOS 26.2 et macOS 26.2"
"La première (CVE-2025-43529) concerne WebKit, le moteur de rendu de Safari. Il s'agit d'une faille de type use-after-free qui permet l'exécution de code arbitraire simplement en traitant un contenu web malveillant. La seconde (CVE-2025-14174) est une corruption de mémoire identifiée non seulement par les équipes d'Apple, mais aussi par le Threat Analysis Group de Google.
Fait intéressant, Google a également dû corriger Chrome en urgence mercredi dernier pour une faille similaire..."
👇
https://www.macg.co/ios/2025/12/securite-apple-comble-deux-failles-zero-day-avec-ios-262-et-macos-262-305619
⬇️
https://cve.circl.lu/vuln/CVE-2025-14174