##
Updated at UTC 2025-12-21T07:17:23.537050
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-14993 | 8.8 | 0.00% | 1 | 0 | 2025-12-21T05:16:05.340000 | A vulnerability was detected in Tenda AC18 15.03.05.05. This affects the functio | |
| CVE-2025-9343 | 7.2 | 0.00% | 1 | 0 | 2025-12-21T04:16:05.670000 | The ELEX WordPress HelpDesk & Customer Ticketing System plugin for WordPress is | |
| CVE-2025-12980 | 7.5 | 0.00% | 1 | 0 | 2025-12-21T03:15:51.830000 | The Post Grid Gutenberg Blocks for News, Magazines, Blog Websites – PostX plugin | |
| CVE-2025-34290 | 0 | 0.00% | 1 | 0 | 2025-12-20T20:15:50.553000 | Versa SASE Client for Windows versions released between 7.8.7 and 7.9.4 contain | |
| CVE-2025-14882 | None | 0.04% | 1 | 0 | 2025-12-20T17:41:17 | An API endpoint allowed access to sensitive files from other users by knowing th | |
| CVE-2025-13619 | 9.8 | 0.07% | 1 | 0 | 2025-12-20T07:15:44.197000 | The Flex Store Users plugin for WordPress is vulnerable to Privilege Escalation | |
| CVE-2025-13329 | 9.8 | 0.15% | 1 | 0 | 2025-12-20T06:30:17 | The File Uploader for WooCommerce plugin for WordPress is vulnerable to arbitrar | |
| CVE-2025-63389 | None | 0.25% | 1 | 0 | 2025-12-20T05:37:50 | A critical authentication bypass vulnerability exists in Ollama platform's API e | |
| CVE-2025-14761 | 5.3 | 0.02% | 1 | 0 | 2025-12-20T05:31:03 | ## Summary S3 Encryption Client for PHP is an open-source client-side encryptio | |
| CVE-2025-68398 | 9.1 | 0.11% | 1 | 0 | 2025-12-20T05:26:43 | ### Impact It was possible to overwrite Git configuration remotely and override | |
| CVE-2025-68129 | 6.8 | 0.06% | 1 | 0 | 2025-12-20T05:14:17 | ### Description In applications built with the Auth0-PHP SDK, the audience valid | |
| CVE-2025-63390 | 5.3 | 0.05% | 1 | 0 | 2025-12-19T22:15:52.180000 | An authentication bypass vulnerability exists in AnythingLLM v1.8.5 in via the / | |
| CVE-2025-34433 | None | 0.31% | 1 | 0 | 2025-12-19T21:31:26 | AVideo versions 14.3.1 prior to 20.1 contain an unauthenticated remote code exec | |
| CVE-2025-34437 | 8.8 | 0.10% | 1 | 0 | 2025-12-19T21:31:26 | AVideo versions prior to 20.0 permit any authenticated user to upload comment im | |
| CVE-2025-34436 | 8.8 | 0.10% | 1 | 0 | 2025-12-19T19:15:51.073000 | AVideo versions prior to 20.1 allow any authenticated user to upload files into | |
| CVE-2025-14964 | 9.8 | 0.08% | 2 | 0 | 2025-12-19T19:15:50.213000 | A vulnerability has been found in TOTOLINK T10 4.1.8cu.5083_B20200521. This affe | |
| CVE-2025-14733 | 9.8 | 31.40% | 8 | 1 | 2025-12-19T19:15:48.973000 | An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remot | |
| CVE-2025-66909 | 7.5 | 0.08% | 1 | 0 | 2025-12-19T18:32:24 | Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an image decompres | |
| CVE-2025-65567 | 7.5 | 0.04% | 1 | 0 | 2025-12-19T18:32:20 | A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp | |
| CVE-2025-65564 | 7.5 | 0.05% | 1 | 0 | 2025-12-19T18:32:19 | A denial-of-service vulnerability exists in the omec-upf (upf-epc-pfcpiface) in | |
| CVE-2025-65568 | 7.5 | 0.04% | 1 | 0 | 2025-12-19T18:15:50.713000 | A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp | |
| CVE-2025-65565 | 7.5 | 0.05% | 1 | 0 | 2025-12-19T18:15:50.277000 | A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp | |
| CVE-2025-41697 | 6.8 | 0.02% | 1 | 0 | 2025-12-19T18:12:09.187000 | An attacker can use an undocumented UART port on the PCB as a side-channel to | |
| CVE-2025-41696 | 4.6 | 0.02% | 1 | 0 | 2025-12-19T18:12:06.293000 | An attacker can use an undocumented UART port on the PCB as a side-channel with | |
| CVE-2025-41695 | 7.1 | 0.09% | 1 | 0 | 2025-12-19T18:12:03.340000 | An XSS vulnerability in dyn_conn.php can be used by an unauthenticated remote at | |
| CVE-2025-14878 | 9.8 | 0.05% | 2 | 0 | 2025-12-19T18:00:54.283000 | A security flaw has been discovered in Tenda WH450 1.0.0.18. This impacts an unk | |
| CVE-2025-64469 | 7.8 | 0.01% | 1 | 0 | 2025-12-19T18:00:54.283000 | There is a stack-based buffer overflow vulnerability in NI LabVIEW in LVResFile: | |
| CVE-2025-64466 | 7.8 | 0.01% | 1 | 0 | 2025-12-19T18:00:54.283000 | There is an out of bounds read vulnerability in NI LabVIEW in lvre!ExecPostedPro | |
| CVE-2025-65007 | 0 | 0.04% | 1 | 0 | 2025-12-19T18:00:54.283000 | In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) due to lack of | |
| CVE-2025-66908 | 5.3 | 0.04% | 1 | 0 | 2025-12-19T18:00:18.330000 | Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an improper file t | |
| CVE-2025-14881 | 0 | 0.04% | 1 | 0 | 2025-12-19T18:00:18.330000 | Multiple API endpoints allowed access to sensitive files from other users by kno | |
| CVE-2025-1885 | 5.4 | 0.03% | 1 | 0 | 2025-12-19T18:00:18.330000 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Restajet In | |
| CVE-2025-66522 | 6.3 | 0.03% | 1 | 0 | 2025-12-19T18:00:18.330000 | A stored cross-site scripting (XSS) vulnerability exists in the Digital IDs func | |
| CVE-2025-52692 | 8.8 | 0.02% | 1 | 0 | 2025-12-19T18:00:18.330000 | Successful exploitation of the vulnerability could allow an attacker with local | |
| CVE-2025-11774 | 8.2 | 0.03% | 2 | 0 | 2025-12-19T18:00:18.330000 | Improper Neutralization of Special Elements used in an OS Command ('OS Command I | |
| CVE-2025-14908 | 6.3 | 0.06% | 1 | 0 | 2025-12-19T18:00:18.330000 | A security flaw has been discovered in JeecgBoot up to 3.9.0. The affected eleme | |
| CVE-2025-14899 | 4.7 | 0.03% | 1 | 0 | 2025-12-19T18:00:18.330000 | A weakness has been identified in CodeAstro Real Estate Management System 1.0. T | |
| CVE-2025-13427 | 0 | 0.12% | 1 | 0 | 2025-12-19T18:00:18.330000 | An authentication bypass vulnerability in Google Cloud Dialogflow CX Messenger a | |
| CVE-2025-64677 | 8.2 | 0.07% | 1 | 0 | 2025-12-19T18:00:18.330000 | Improper neutralization of input during web page generation ('cross-site scripti | |
| CVE-2025-34452 | 0 | 0.38% | 1 | 0 | 2025-12-19T18:00:18.330000 | Streama versions 1.10.0 through 1.10.5 and prior to commit b7c8767 contain a com | |
| CVE-2025-68161 | 0 | 0.03% | 2 | 0 | 2025-12-19T18:00:18.330000 | The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does | |
| CVE-2025-64236 | 9.8 | 0.07% | 1 | 0 | 2025-12-19T18:00:18.330000 | Authentication Bypass Using an Alternate Path or Channel vulnerability in Amento | |
| CVE-2025-14879 | 9.8 | 0.05% | 2 | 0 | 2025-12-19T18:00:18.330000 | A weakness has been identified in Tenda WH450 1.0.0.18. Affected is an unknown f | |
| CVE-2025-14739 | 0 | 0.01% | 1 | 0 | 2025-12-19T18:00:18.330000 | Access of Uninitialized Pointer vulnerability in TP-Link WR940N and WR941ND allo | |
| CVE-2025-41746 | 7.1 | 0.09% | 1 | 0 | 2025-12-19T16:46:01.880000 | An XSS vulnerability in pxc_portSecCfg.php can be used by an unauthenticated rem | |
| CVE-2025-41750 | 7.1 | 0.09% | 1 | 0 | 2025-12-19T16:45:56.357000 | An XSS vulnerability in pxc_PortCfg.php can be used by an unauthenticated remote | |
| CVE-2025-41745 | 7.1 | 0.09% | 1 | 0 | 2025-12-19T16:09:15.357000 | An XSS vulnerability in pxc_portCntr2.php can be used by an unauthenticated remo | |
| CVE-2025-1928 | 9.1 | 0.05% | 1 | 0 | 2025-12-19T15:31:25 | Improper Restriction of Excessive Authentication Attempts vulnerability in Resta | |
| CVE-2025-40602 | 6.6 | 1.42% | 4 | 2 | 2025-12-19T13:57:43.150000 | A local privilege escalation vulnerability due to insufficient authorization in | |
| CVE-2025-1927 | 7.1 | 0.01% | 1 | 0 | 2025-12-19T12:31:33 | Cross-Site Request Forgery (CSRF) vulnerability in Restajet Information Technolo | |
| CVE-2025-11747 | 6.4 | 0.03% | 1 | 0 | 2025-12-19T09:30:39 | The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site | |
| CVE-2025-14151 | 6.1 | 0.09% | 1 | 0 | 2025-12-19T09:30:39 | The SlimStat Analytics plugin for WordPress is vulnerable to Stored Cross-Site S | |
| CVE-2025-66521 | 6.3 | 0.02% | 1 | 0 | 2025-12-19T09:30:39 | A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com | |
| CVE-2025-66520 | 6.3 | 0.03% | 1 | 0 | 2025-12-19T09:30:39 | A stored cross-site scripting (XSS) vulnerability exists in the Portfolio featur | |
| CVE-2025-68491 | None | 0.00% | 1 | 0 | 2025-12-19T06:30:34 | Rejected reason: Not used | |
| CVE-2025-68488 | None | 0.00% | 1 | 0 | 2025-12-19T06:30:34 | Rejected reason: Not used | |
| CVE-2025-68487 | None | 0.00% | 1 | 0 | 2025-12-19T06:30:34 | Rejected reason: Not used | |
| CVE-2025-68490 | 0 | 0.00% | 1 | 0 | 2025-12-19T04:16:02.083000 | Rejected reason: Not used | |
| CVE-2025-68489 | 0 | 0.00% | 1 | 0 | 2025-12-19T04:16:02.017000 | Rejected reason: Not used | |
| CVE-2025-67843 | 8.3 | 0.23% | 1 | 0 | 2025-12-19T03:31:18 | A Server-Side Template Injection (SSTI) vulnerability in the MDX Rendering Engin | |
| CVE-2025-13941 | 8.8 | 0.01% | 1 | 0 | 2025-12-19T03:31:18 | A local privilege escalation vulnerability exists in the Foxit PDF Reader/Editor | |
| CVE-2025-14900 | 4.7 | 0.03% | 1 | 0 | 2025-12-19T03:31:18 | A security vulnerability has been detected in CodeAstro Real Estate Management S | |
| CVE-2025-64675 | 8.3 | 0.08% | 1 | 0 | 2025-12-19T00:31:52 | Improper neutralization of input during web page generation ('cross-site scripti | |
| CVE-2025-68382 | 6.5 | 0.04% | 1 | 0 | 2025-12-19T00:31:47 | Out-of-bounds read (CWE-125) allows an unauthenticated remote attacker to perfor | |
| CVE-2025-65037 | 10.0 | 0.10% | 1 | 0 | 2025-12-19T00:31:47 | Improper control of generation of code ('code injection') in Azure Container App | |
| CVE-2025-64663 | 10.0 | 0.08% | 1 | 0 | 2025-12-19T00:31:47 | Custom Question Answering Elevation of Privilege Vulnerability | |
| CVE-2025-65041 | 10.0 | 0.09% | 2 | 0 | 2025-12-19T00:31:46 | Improper authorization in Microsoft Partner Center allows an unauthorized attack | |
| CVE-2025-68381 | 6.5 | 0.04% | 1 | 0 | 2025-12-19T00:31:46 | Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated | |
| CVE-2025-64676 | 7.2 | 0.11% | 1 | 0 | 2025-12-19T00:31:46 | '.../...//' in Microsoft Purview allows an authorized attacker to execute code o | |
| CVE-2025-68463 | 4.9 | 0.03% | 1 | 0 | 2025-12-18T22:16:30 | Bio.Entrez in Biopython through 1.86 allows doctype XXE. | |
| CVE-2025-53000 | None | 0.02% | 1 | 0 | 2025-12-18T22:03:09 | ### Summary On Windows, converting a notebook containing SVG output to a PDF re | |
| CVE-2025-64374 | 10.0 | 0.04% | 1 | 0 | 2025-12-18T21:32:49 | Unrestricted Upload of File with Dangerous Type vulnerability in StylemixThemes | |
| CVE-2025-68434 | 8.8 | 0.08% | 1 | 1 | 2025-12-18T19:45:54.187000 | Open Source Point of Sale (opensourcepos) is a web based point of sale applicati | |
| CVE-2025-14837 | 4.7 | 0.04% | 1 | 0 | 2025-12-18T19:16:22.103000 | A vulnerability has been found in ZZCMS 2025. Affected by this issue is the func | |
| CVE-2023-53933 | 8.8 | 0.24% | 1 | 0 | 2025-12-18T19:16:20.433000 | Serendipity 2.4.0 contains a remote code execution vulnerability that allows aut | |
| CVE-2025-66397 | 8.3 | 0.04% | 1 | 0 | 2025-12-18T19:07:25.637000 | ChurchCRM is an open-source church management system. Prior to version 6.5.3, th | |
| CVE-2025-14764 | 5.3 | 0.01% | 1 | 0 | 2025-12-18T18:50:44 | ## Summary S3 Encryption Client for Go is an open-source client-side encryption | |
| CVE-2025-14884 | 7.2 | 0.19% | 2 | 0 | 2025-12-18T18:30:38 | A vulnerability was detected in D-Link DIR-605 202WWB03. Affected by this issue | |
| CVE-2025-14896 | 7.5 | 0.03% | 1 | 0 | 2025-12-18T18:30:37 | due to insufficient sanitazation in Vega’s `convert()` function when `safeMode` | |
| CVE-2025-14737 | None | 0.42% | 1 | 0 | 2025-12-18T18:30:37 | Command Injection vulnerability in TP-Link WA850RE (httpd modules) allows authen | |
| CVE-2025-14738 | None | 0.06% | 1 | 0 | 2025-12-18T18:30:37 | Improper authentication vulnerability in TP-Link WA850RE (httpd modules) allows | |
| CVE-2025-63391 | 7.5 | 0.08% | 1 | 0 | 2025-12-18T18:30:37 | An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api | |
| CVE-2025-37164 | 10.0 | 70.93% | 3 | 2 | template | 2025-12-18T17:15:47.853000 | A remote code execution issue exists in HPE OneView. |
| CVE-2025-68399 | 5.4 | 0.03% | 1 | 0 | 2025-12-18T16:47:11.970000 | ChurchCRM is an open-source church management system. In versions prior to 6.5.4 | |
| CVE-2025-68401 | 4.8 | 0.03% | 1 | 0 | 2025-12-18T16:44:00.020000 | ChurchCRM is an open-source church management system. Prior to version 6.0.0, th | |
| CVE-2025-14763 | 5.3 | 0.01% | 1 | 0 | 2025-12-18T15:47:08 | ## Summary S3 Encryption Client for Java is an open-source client-side encrypti | |
| CVE-2025-14759 | 5.3 | 0.01% | 1 | 0 | 2025-12-18T15:46:18 | ## Summary S3 Encryption Client for .NET (S3EC) is an open-source client-side e | |
| CVE-2025-59374 | 9.8 | 30.46% | 5 | 0 | 2025-12-18T15:42:03.790000 | "UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were | |
| CVE-2025-20393 | 10.0 | 4.56% | 15 | 6 | 2025-12-18T15:41:16.840000 | Cisco is aware of a potential vulnerability. Cisco is currently investigat | |
| CVE-2025-64468 | 7.8 | 0.01% | 1 | 0 | 2025-12-18T15:30:51 | There is a use-after-free vulnerability in sentry!sentry_span_set_data() when pa | |
| CVE-2025-13110 | 4.3 | 0.03% | 1 | 0 | 2025-12-18T15:30:51 | The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is | |
| CVE-2025-14437 | 7.5 | 0.06% | 1 | 0 | 2025-12-18T15:30:51 | The Hummingbird Performance plugin for WordPress is vulnerable to Sensitive Info | |
| CVE-2025-64467 | 7.8 | 0.01% | 1 | 0 | 2025-12-18T15:30:45 | There is an out of bounds read vulnerability in NI LabVIEW in LVResFile::FindRsr | |
| CVE-2025-64465 | 7.8 | 0.01% | 1 | 0 | 2025-12-18T15:30:45 | There is an out of bounds read vulnerability in NI LabVIEW in lvre!DataSizeTDR() | |
| CVE-2025-46295 | 9.8 | 0.25% | 1 | 0 | 2025-12-18T15:08:06.237000 | Apache Commons Text versions prior to 1.10.0 included interpolation features tha | |
| CVE-2025-68459 | 7.2 | 0.17% | 2 | 0 | 2025-12-18T15:07:42.550000 | RG - AP180, Indoor Wall Plate Wireless AP AP180 series provided by Ruijie Networ | |
| CVE-2025-68462 | 3.2 | 0.01% | 1 | 0 | 2025-12-18T15:07:42.550000 | Freedombox before 25.17.1 does not set proper permissions for the backups-data d | |
| CVE-2025-47382 | 7.8 | 0.01% | 1 | 0 | 2025-12-18T15:07:42.550000 | Memory corruption while loading an invalid firmware in boot loader. | |
| CVE-2025-14841 | 3.3 | 0.01% | 1 | 0 | 2025-12-18T15:07:42.550000 | A flaw has been found in OFFIS DCMTK up to 3.6.9. The impacted element is the fu | |
| CVE-2025-67073 | 9.8 | 0.15% | 1 | 0 | 2025-12-18T15:07:42.550000 | A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in | |
| CVE-2025-14762 | 5.3 | 0.02% | 1 | 0 | 2025-12-18T15:07:42.550000 | Missing cryptographic key commitment in the AWS SDK for Ruby may allow a user wi | |
| CVE-2025-14618 | 4.3 | 0.03% | 1 | 0 | 2025-12-18T15:07:18.427000 | The Sweet Energy Efficiency plugin for WordPress is vulnerable to unauthorized a | |
| CVE-2025-14277 | 4.3 | 0.03% | 1 | 0 | 2025-12-18T15:07:18.427000 | The Prime Slider – Addons for Elementor plugin for WordPress is vulnerable to Se | |
| CVE-2025-10910 | None | 0.14% | 2 | 0 | 2025-12-18T12:30:33 | A flaw in the binding process of Govee’s cloud platform and devices allows a rem | |
| CVE-2025-47372 | 9.0 | 0.02% | 1 | 0 | 2025-12-18T06:30:19 | Memory Corruption when a corrupted ELF image with an oversized file size is read | |
| CVE-2025-47387 | 7.8 | 0.01% | 1 | 0 | 2025-12-18T06:30:19 | Memory Corruption when processing IOCTLs for JPEG data without verification. | |
| CVE-2025-14856 | 6.3 | 0.04% | 1 | 0 | 2025-12-18T03:30:18 | A security vulnerability has been detected in y_project RuoYi up to 4.8.1. The a | |
| CVE-2025-12885 | 6.4 | 0.03% | 1 | 0 | 2025-12-18T03:30:18 | The Embed Any Document – Embed PDF, Word, PowerPoint and Excel Files plugin for | |
| CVE-2025-14202 | None | 0.05% | 2 | 0 | 2025-12-18T00:34:16 | A vulnerability in the file upload at bookmark + asset rendering pipeline allows | |
| CVE-2025-59718 | 9.8 | 5.57% | 3 | 2 | 2025-12-17T13:54:45.390000 | A improper verification of cryptographic signature vulnerability in Fortinet For | |
| CVE-2025-68154 | 8.1 | 0.05% | 1 | 0 | 2025-12-16T22:37:26 | ## Summary The `fsSize()` function in `systeminformation` is vulnerable to **OS | |
| CVE-2025-68260 | None | 0.02% | 2 | 0 | 2025-12-16T15:30:56 | In the Linux kernel, the following vulnerability has been resolved: rust_binder | |
| CVE-2025-55182 | 10.0 | 44.14% | 4 | 100 | template | 2025-12-10T02:00:02.557000 | A pre-authentication remote code execution vulnerability exists in React Server |
| CVE-2025-59719 | 9.8 | 0.07% | 2 | 0 | 2025-12-09T18:30:52 | An improper verification of cryptographic signature vulnerability in Fortinet Fo | |
| CVE-2025-41749 | 7.1 | 0.09% | 1 | 0 | 2025-12-09T18:30:45 | An XSS vulnerability in port_util.php can be used by an unauthenticated remote a | |
| CVE-2025-41747 | 7.1 | 0.09% | 1 | 0 | 2025-12-09T18:30:44 | An XSS vulnerability in pxc_vlanIntfCfg.php can be used by an unauthenticated re | |
| CVE-2025-41748 | 7.1 | 0.09% | 1 | 0 | 2025-12-09T18:30:44 | An XSS vulnerability in pxc_Dot1xCfg.php can be used by an unauthenticated remot | |
| CVE-2025-41751 | 7.1 | 0.09% | 1 | 0 | 2025-12-09T18:30:44 | An XSS vulnerability in pxc_portCntr.php can be used by an unauthenticated remot | |
| CVE-2025-41752 | 7.1 | 0.09% | 1 | 0 | 2025-12-09T18:30:44 | An XSS vulnerability in pxc_portSfp.php can be used by an unauthenticated remote | |
| CVE-2025-41694 | 6.5 | 0.11% | 1 | 0 | 2025-12-09T18:30:43 | A low privileged remote attacker can run the webshell with an empty command cont | |
| CVE-2025-41692 | 6.8 | 0.02% | 1 | 0 | 2025-12-09T18:30:43 | A high privileged remote attacker with admin privileges for the webUI can brute- | |
| CVE-2025-41693 | 4.3 | 0.23% | 1 | 0 | 2025-12-09T18:30:43 | A low privileged remote attacker can use the ssh feature to execute commands dir | |
| CVE-2025-66471 | None | 0.02% | 1 | 0 | 2025-12-05T18:33:09 | ### Impact urllib3's [streaming API](https://urllib3.readthedocs.io/en/2.5.0/ad | |
| CVE-2025-65945 | 7.5 | 0.01% | 1 | 1 | 2025-12-04T22:50:04 | ### Overview An improper signature verification vulnerability exists when using | |
| CVE-2025-34352 | 0 | 0.02% | 1 | 0 | 2025-12-04T17:15:25.860000 | JumpCloud Remote Assist for Windows versions prior to 0.317.0 include an uninsta | |
| CVE-2025-66478 | 0 | 0.00% | 1 | 100 | 2025-12-03T18:15:47.200000 | Rejected reason: This CVE is a duplicate of CVE-2025-55182. | |
| CVE-2025-40300 | None | 0.06% | 1 | 0 | 2025-11-17T18:30:25 | In the Linux kernel, the following vulnerability has been resolved: x86/vmscape | |
| CVE-2025-9242 | 9.8 | 73.45% | 1 | 2 | template | 2025-11-14T02:00:02.350000 | An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remot |
| CVE-2025-7962 | 7.5 | 0.01% | 1 | 0 | 2025-11-13T18:36:55.173000 | In Jakarta Mail 2.0.2 it is possible to preform a SMTP Injection by utilizing th | |
| CVE-2025-12480 | 9.1 | 74.31% | 1 | 0 | template | 2025-11-12T15:32:32 | Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access |
| CVE-2025-59287 | 9.8 | 76.76% | 1 | 21 | template | 2025-11-11T15:32:22 | Deserialization of untrusted data in Windows Server Update Service allows an una |
| CVE-2025-53066 | 7.5 | 0.09% | 1 | 0 | 2025-11-03T18:31:47 | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Ente | |
| CVE-2025-53057 | 5.9 | 0.07% | 1 | 0 | 2025-11-03T18:16:56.973000 | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Ente | |
| CVE-2025-61882 | 9.8 | 76.34% | 1 | 13 | template | 2025-10-27T17:08:52.230000 | Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business S |
| CVE-2025-31324 | 10.0 | 43.91% | 1 | 19 | template | 2025-10-22T00:34:21 | SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper a |
| CVE-2025-23006 | 9.8 | 53.22% | 1 | 0 | 2025-10-22T00:34:17 | Pre-authentication deserialization of untrusted data vulnerability has been iden | |
| CVE-2024-53704 | 9.8 | 93.82% | 1 | 1 | template | 2025-10-22T00:34:16 | An Improper Authentication vulnerability in the SSLVPN authentication mechanism |
| CVE-2025-49146 | 8.2 | 0.01% | 1 | 0 | 2025-10-06T19:29:58.977000 | pgjdbc is an open source postgresql JDBC Driver. From 42.7.4 and until 42.7.7, w | |
| CVE-2025-25231 | 7.5 | 10.75% | 1 | 1 | template | 2025-08-11T21:31:39 | Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerabil |
| CVE-2025-30023 | 9.0 | 1.92% | 2 | 0 | 2025-07-15T13:14:49.980000 | The communication protocol used between client and server had a flaw that could | |
| CVE-2025-30026 | 0 | 0.03% | 2 | 0 | 2025-07-15T13:14:49.980000 | The AXIS Camera Station Server had a flaw that allowed to bypass authentication | |
| CVE-2025-5516 | 2.4 | 0.05% | 1 | 0 | 2025-06-06T17:42:29.520000 | A vulnerability, which was classified as problematic, was found in TOTOLINK X200 | |
| CVE-2025-2039 | 4.7 | 0.09% | 1 | 5 | 2025-05-13T20:57:18.117000 | A vulnerability classified as critical has been found in code-projects Blood Ban | |
| CVE-2025-32210 | 6.5 | 0.03% | 1 | 0 | 2025-04-10T09:30:32 | Missing Authorization vulnerability in CreativeMindsSolutions CM Registration an | |
| CVE-2024-44067 | 8.4 | 0.04% | 1 | 0 | 2024-08-20T20:35:34.497000 | The T-Head XuanTie C910 CPU in the TH1520 SoC and the T-Head XuanTie C920 CPU in | |
| CVE-2025-66580 | 0 | 0.15% | 1 | 0 | N/A | ||
| CVE-2025-68613 | 0 | 0.22% | 1 | 0 | N/A | ||
| CVE-2025-14282 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-66387 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-67745 | 0 | 0.02% | 1 | 0 | N/A | ||
| CVE-2025-63821 | 0 | 0.00% | 1 | 1 | N/A | ||
| CVE-2025-63820 | 0 | 0.00% | 1 | 1 | N/A | ||
| CVE-2025-66029 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2025-68435 | 0 | 0.07% | 2 | 0 | N/A | ||
| CVE-2025-68147 | 0 | 0.03% | 1 | 1 | N/A | ||
| CVE-2025-68400 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2025-68275 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2025-14760 | 0 | 0.02% | 1 | 0 | N/A |
updated 2025-12-21T05:16:05.340000
1 posts
🚨 CVE-2025-14993 (HIGH): Stack-based buffer overflow in Tenda AC18 (v15.03.05.05) via /goform/SetDlnaCfg. Public exploit out—disable DLNA, segment networks, monitor for attacks. Patch ASAP when available! https://radar.offseq.com/threat/cve-2025-14993-stack-based-buffer-overflow-in-tend-b5631f8a #OffSeq #Infosec #RouterVuln #CVE202514993
##updated 2025-12-21T04:16:05.670000
1 posts
🔒 HIGH severity XSS (CVE-2025-9343) in ELEX WordPress HelpDesk plugin—ALL versions affected. Unauthenticated attackers can inject scripts in ticket subjects, risking session hijack & data theft. Patch or mitigate now! Details: https://radar.offseq.com/threat/cve-2025-9343-cwe-79-improper-neutralization-of-in-be5fc715 #OffSeq #XSS #WordPress
##updated 2025-12-21T03:15:51.830000
1 posts
🔎 CVE-2025-12980 (HIGH): All PostX WordPress plugin versions up to 5.0.3 allow unauthenticated access to user metadata & password hashes via the '/ultp/v2/get_dynamic_content/' REST API endpoint. Patch or restrict ASAP! https://radar.offseq.com/threat/cve-2025-12980-cwe-862-missing-authorization-in-wp-d70fd0d4 #OffSeq #WordPress #Vuln
##updated 2025-12-20T20:15:50.553000
1 posts
⚠️ CVE-2025-34290: HIGH severity local privilege escalation in Versa SASE Client for Windows (7.8.7–7.9.4). Authenticated users can exploit audit log export to gain SYSTEM rights. Patch and restrict local access! https://radar.offseq.com/threat/cve-2025-34290-cwe-250-execution-with-unnecessary--3537b5e2 #OffSeq #Vulnerability #Windows
##updated 2025-12-20T17:41:17
1 posts
CVE-2025-14882 - Insecure direct object reference https://cvefeed.io/vuln/detail/CVE-2025-14882
##updated 2025-12-20T07:15:44.197000
1 posts
⚠️ CRITICAL: CVE-2025-13619 impacts all versions of CMSSuperHeroes Flex Store Users plugin for WordPress. Unauthenticated attackers can create admin accounts via improper privilege checks. Disable plugin, audit users, monitor for updates. https://radar.offseq.com/threat/cve-2025-13619-cwe-269-improper-privilege-manageme-48700e01 #OffSeq #WordPress #CVE2025_13619 #Vuln
##updated 2025-12-20T06:30:17
1 posts
🚨 CRITICAL: CVE-2025-13329 in snowray File Uploader for WooCommerce lets unauthenticated users upload malicious files via REST API (all versions ≤1.0.3). RCE risk—disable plugin or restrict API. No patch yet. https://radar.offseq.com/threat/cve-2025-13329-cwe-434-unrestricted-upload-of-file-e47819d8 #OffSeq #WordPress #WooCommerce #Vuln
##updated 2025-12-20T05:37:50
1 posts
Go hack more AI shit.
https://www.cve.org/CVERecord?id=CVE-2025-63389
##A critical authentication bypass vulnerability exists in Ollama platform's API endpoints in versions prior to and including v0.12.3. The platform exposes multiple API endpoints without requiring authentication, enabling remote attackers to perform unauthorized model management operations.
updated 2025-12-20T05:31:03
1 posts
Six basically identical CVEs from Amazon in different SDKs.
https://www.cve.org/CVERecord?id=CVE-2025-14759
https://www.cve.org/CVERecord?id=CVE-2025-14760
https://www.cve.org/CVERecord?id=CVE-2025-14761
https://www.cve.org/CVERecord?id=CVE-2025-14762
##updated 2025-12-20T05:26:43
1 posts
CVE-2025-68398 - Weblate has git config file overwrite vulnerability that leads to remote code execution https://cvefeed.io/vuln/detail/CVE-2025-68398
##updated 2025-12-20T05:14:17
1 posts
CVE-2025-68129 - Auth0-PHP SDK has Improper Audience Validation https://cvefeed.io/vuln/detail/CVE-2025-68129
##updated 2025-12-19T22:15:52.180000
1 posts
updated 2025-12-19T21:31:26
1 posts
🚨 CVE-2025-34433: CRITICAL RCE in AVideo ≤14.3.1. Predictable salts + exposed endpoints = unauthenticated code execution! Upgrade to 20.1+ or lock down vulnerable APIs. Full details: https://radar.offseq.com/threat/cve-2025-34433-cwe-94-improper-control-of-generati-6b212350 #OffSeq #AVideo #RCE #vuln
##updated 2025-12-19T21:31:26
1 posts
CVE-2025-34437 - AVideo < 20.0 IDOR Arbitrary Comment Image Upload https://cvefeed.io/vuln/detail/CVE-2025-34437
##updated 2025-12-19T19:15:51.073000
1 posts
CVE-2025-34436 - AVideo < 20.0 IDOR Arbitrary File Upload https://cvefeed.io/vuln/detail/CVE-2025-34436
##updated 2025-12-19T19:15:50.213000
2 posts
CRITICAL: CVE-2025-14964 in TOTOLINK T10 (v4.1.8cu.5083_B20200521) enables remote stack buffer overflow—RCE possible, no auth needed! Isolate, restrict access, and monitor for malicious loginAuthUrl usage. Patch or replace ASAP. https://radar.offseq.com/threat/cve-2025-14964-stack-based-buffer-overflow-in-toto-be6aedc5 #OffSeq #CVE202514964 #IoT
##TOTOLINK
##updated 2025-12-19T19:15:48.973000
8 posts
1 repos
⚠️ Active exploitation alert: WatchGuard Fireware OS hit by CRITICAL VPN vuln (CVE-2025-14733). Remote, unauthenticated RCE risk via IKEv2 configs. Patch now, restrict VPN access, and monitor logs for large CERT payloads. More: https://radar.offseq.com/threat/watchguard-warns-of-active-exploitation-of-critica-7a91ba7a #OffSeq #WatchGuard #Vuln
##🚨 CISA has added 1 vulnerability to the KEV Catalog
CVE-2025-14733: WatchGuard Firebox Out of Bounds Write Vulnerability
CVSS: 9.3
##CVE ID: CVE-2025-14733
Vendor: WatchGuard
Product: Firebox
Date Added: 2025-12-19
Notes: Check for signs of potential compromise on all internet accessible instances after applying mitigations. For more information please see: https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00027 ; https://nvd.nist.gov/vuln/detail/CVE-2025-14733
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-14733
Critical actively exploited flaw in WatchGuard Fireware OS enables remote code execution through VPN service
WatchGuard patched a critical vulnerability (CVE-2025-14733) in Fireware OS that allows remote unauthenticated attackers to execute arbitrary code on devices with IKEv2 VPN configurations. The flaw is actively being exploited in the wild.
**If you have WatchGuard Firebox firewalls, you are under attack. Make a very quick update to the latest security updates from WatchGuard. After patching, change all passwords and security keys stored on the device, especially if you've ever used IKEv2 VPN configurations (even if now deleted). Old settings can still leave your firewall vulnerable.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/critical-flaw-in-watchguard-fireware-os-enables-remote-code-execution-through-vpn-service-n-s-w-d-7/gD2P6Ple2L
Analysis of CVE-2025-14733, a critical WatchGuard Firebox security vulnerability. Learn why unauthenticated RCE persists even after deleting vulnerable VPN configurations.
#SecurityLand #CyberWatch #ZeroDay #Watchguard #SecurityVulnerability #Firewall #CVE
Read More: https://www.security.land/watchguard-cve-2025-14733-critical-vulnerability-analysis/
##Hackers can now take over WatchGuard Firebox firewalls with zero passwords needed, putting entire networks at risk. Is your organization’s gateway already compromised?
##CVE-2025-14733 - WatchGuard Firebox iked Out of Bounds Write Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14733
##CVE-2025-14733 - WatchGuard Firebox iked Out of Bounds Write Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14733
##updated 2025-12-19T18:32:24
1 posts
updated 2025-12-19T18:32:20
1 posts
CVE-2025-65567 - OmeC-Project UPF Denial-of-Service Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65567
##updated 2025-12-19T18:32:19
1 posts
CVE-2025-65564 - OmeC UPF Denial-of-Service Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65564
##updated 2025-12-19T18:15:50.713000
1 posts
CVE-2025-65568 - OmeC-Project UPF pfcpiface Denial-of-Service Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65568
##updated 2025-12-19T18:15:50.277000
1 posts
CVE-2025-65565 - "OmeC-Project UPF pfcpiface Denial-of-Service Vulnerability" https://cvefeed.io/vuln/detail/CVE-2025-65565
##updated 2025-12-19T18:12:09.187000
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-19T18:12:06.293000
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-19T18:12:03.340000
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-19T18:00:54.283000
2 posts
CVE-2025-14878 - Tenda WH450 HTTP Request wirelessRestart stack-based overflow https://cvefeed.io/vuln/detail/CVE-2025-14878
##Tenda
##updated 2025-12-19T18:00:54.283000
1 posts
CVE-2025-64469 - Stack-based Buffer Overflow in LVResource::DetachResource() in NI LabVIEW https://cvefeed.io/vuln/detail/CVE-2025-64469
##updated 2025-12-19T18:00:54.283000
1 posts
CVE-2025-64466 - Out-of-Bounds Read in lvre!ExecPostedProcRecPost() in NI LabVIEW https://cvefeed.io/vuln/detail/CVE-2025-64466
##updated 2025-12-19T18:00:54.283000
1 posts
Five yet-to-be-published CVEs in WODESYS WD-R608U router.
##updated 2025-12-19T18:00:18.330000
1 posts
updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-14881 - Insecure direct object reference https://cvefeed.io/vuln/detail/CVE-2025-14881
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-1885 - Open Redirect in Restajet's Online Food Delivery System https://cvefeed.io/vuln/detail/CVE-2025-1885
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-66522 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Digital IDs Common Name Field https://cvefeed.io/vuln/detail/CVE-2025-66522
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-52692 - Bypass Authentication https://cvefeed.io/vuln/detail/CVE-2025-52692
##updated 2025-12-19T18:00:18.330000
2 posts
CVE-2025-11774 - Malicious Code Execution Vulnerability in the Software Keyboard Function of GENESIS64, ICONICS Suite, Mobile HMI, and MC Works64 https://cvefeed.io/vuln/detail/CVE-2025-11774
##CVE-2025-11774 - Malicious Code Execution Vulnerability in the Software Keyboard Function of GENESIS64, ICONICS Suite, Mobile HMI, and MC Works64 https://cvefeed.io/vuln/detail/CVE-2025-11774
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-14908 - JeecgBoot Multi-Tenant Management SysTenantController.java improper authentication https://cvefeed.io/vuln/detail/CVE-2025-14908
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-14899 - CodeAstro Real Estate Management System Administrator Endpoint stateadd.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14899
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-13427 - Authentication Bypass in Dialogflow CX Messenger https://cvefeed.io/vuln/detail/CVE-2025-13427
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-64677 - Office Out-of-Box Experience Spoofing Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64677
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-34452 - Streama Subtitle Download Path Traversal and SSRF Leading to Arbitrary File Write https://cvefeed.io/vuln/detail/CVE-2025-34452
##updated 2025-12-19T18:00:18.330000
2 posts
1000 yard stare
##For my fellow Log4j victims celebrating 4 years #log4shell PTSD: CVE-2025-68161
"The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the verifyHostName configuration attribute or the log4j2.sslVerifyHostName system property is set to true."
https://logging.apache.org/security.html#CVE-2025-68161
(It's not that terrible. Seeing the string "log4j" just makes me twitch. :-)
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-64236 - WordPress Tuturn plugin < 3.6 - Broken Authentication vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64236
##updated 2025-12-19T18:00:18.330000
2 posts
CVE-2025-14879 - Tenda WH450 HTTP Request onSSIDChange stack-based overflow https://cvefeed.io/vuln/detail/CVE-2025-14879
##Tenda
https://www.cve.org/CVERecord?id=CVE-2025-14879
D-Link
##updated 2025-12-19T18:00:18.330000
1 posts
updated 2025-12-19T16:46:01.880000
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-19T16:45:56.357000
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-19T16:09:15.357000
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-19T15:31:25
1 posts
CVE-2025-1928 - Improper Authentication in Restajet's Online Food Delivery System https://cvefeed.io/vuln/detail/CVE-2025-1928
##updated 2025-12-19T13:57:43.150000
4 posts
2 repos
SonicWall patches actively exploited flaw vulnerability chain in SMA 1000 appliances
SonicWall SMA 1000 appliances are being actively exploited through a vulnerability chain combining CVE-2025-40602 (a local privilege escalation flaw) with CVE-2025-23006 (a previously patched deserialization vulnerability), enabling unauthenticated remote code execution with root privileges.
**If you have SonicWall SMA 1000 appliances, make sure their SSH and management access is isolated from the public internet and only accessible from trusted networks. Review latest version, and if not up-to date patched, plan a very quick upgrade to platform-hotfix 12.4.3-03245 or 12.5.0-02283 (or higher). Your devices are being hacked, and you can't really hide them from the internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/sonicwall-patches-actively-exploited-flaw-vulnerability-chain-in-sma-1000-appliances-x-l-b-q-7/gD2P6Ple2L
New.
CISA Releases Nine Industrial Control Systems Advisories https://www.cisa.gov/news-events/alerts/2025/12/18/cisa-releases-nine-industrial-control-systems-advisories
KEV updates, from yesterday:
CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-20393
CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-40602
CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-59374 #CISA #infosec #ASUS #Cisco #SonicWall
##🚨 CISA has added 3 vulnerabilities to the KEV Catalog
CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability
CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability
CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability
##CVE ID: CVE-2025-40602
Vendor: SonicWall
Product: SMA1000 appliance
Date Added: 2025-12-17
Notes: Check for signs of potential compromise on all internet accessible SonicWall SMA1000 instances after applying mitigations. For more information please see: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0019 ; https://nvd.nist.gov/vuln/detail/CVE-2025-40602
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-40602
updated 2025-12-19T12:31:33
1 posts
CVE-2025-1927 - CSRF in Restajet's Online Food Delivery System https://cvefeed.io/vuln/detail/CVE-2025-1927
##updated 2025-12-19T09:30:39
1 posts
CVE-2025-11747 - Colibri Page Builder <= 1.0.345 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode https://cvefeed.io/vuln/detail/CVE-2025-11747
##updated 2025-12-19T09:30:39
1 posts
CVE-2025-14151 - SlimStat Analytics <= 5.3.2 - Unauthenticated Stored Cross-Site Scripting https://cvefeed.io/vuln/detail/CVE-2025-14151
##updated 2025-12-19T09:30:39
1 posts
CVE-2025-66521 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Trusted Certificates Feature https://cvefeed.io/vuln/detail/CVE-2025-66521
##updated 2025-12-19T09:30:39
1 posts
CVE-2025-66520 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Portfolio SVG Handling https://cvefeed.io/vuln/detail/CVE-2025-66520
##updated 2025-12-19T06:30:34
1 posts
CVE-2025-68491 - Apache HTTP Server Buffer Overflow Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-68491
##updated 2025-12-19T06:30:34
1 posts
CVE-2025-68488 - Apache HTTP Server Authentication Bypass https://cvefeed.io/vuln/detail/CVE-2025-68488
##updated 2025-12-19T06:30:34
1 posts
CVE-2025-68487 - Apache HTTP Server Cross-Site Request Forgery https://cvefeed.io/vuln/detail/CVE-2025-68487
##updated 2025-12-19T04:16:02.083000
1 posts
CVE-2025-68490 - Apache HTTP Server Cross-Site Request Forgery https://cvefeed.io/vuln/detail/CVE-2025-68490
##updated 2025-12-19T04:16:02.017000
1 posts
CVE-2025-68489 - Apache HTTP Server Cross-Site Request Forgery https://cvefeed.io/vuln/detail/CVE-2025-68489
##updated 2025-12-19T03:31:18
1 posts
CVE-2025-67843 - Mintlify Platform SSTI Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-67843
##updated 2025-12-19T03:31:18
1 posts
CVE-2025-13941 - Foxit PDF Reader Update Service Incorrect Permission Assignment Local Privilege Escalation Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-13941
##updated 2025-12-19T03:31:18
1 posts
CVE-2025-14900 - CodeAstro Real Estate Management System Administrator Endpoint userdelete.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14900
##updated 2025-12-19T00:31:52
1 posts
CVE-2025-64675 - Azure Cosmos DB Spoofing Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64675
##updated 2025-12-19T00:31:47
1 posts
CVE-2025-68382 - Packetbeat Out-of-bounds Read https://cvefeed.io/vuln/detail/CVE-2025-68382
##updated 2025-12-19T00:31:47
1 posts
CVE-2025-65037 - Azure Container Apps Remote Code Execution Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65037
##updated 2025-12-19T00:31:47
1 posts
CVE-2025-64663 - Custom Question Answering Elevation of Privilege Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64663
##updated 2025-12-19T00:31:46
2 posts
🚨 CRITICAL vuln: CVE-2025-65041 in Microsoft Partner Center enables unauthenticated remote privilege escalation (CVSS 10). No patch yet—segment networks, enforce MFA, and monitor for abuse. Stay updated! https://radar.offseq.com/threat/cve-2025-65041-cwe-285-improper-authorization-in-m-738f9e8a #OffSeq #Microsoft #CloudSecurity #CVE2025_65041
##CVE-2025-65041 - Microsoft Partner Center Elevation of Privilege Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65041
##updated 2025-12-19T00:31:46
1 posts
CVE-2025-68381 - Packetbeat Improper Bounds Check https://cvefeed.io/vuln/detail/CVE-2025-68381
##updated 2025-12-19T00:31:46
1 posts
Microsoft patched several sev:CRIT cloud vulns, including this ../ in Purview. LMAO.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64676
##updated 2025-12-18T22:16:30
1 posts
CVE-2025-68463 - Biopython Bio.Entrez XXE Injection https://cvefeed.io/vuln/detail/CVE-2025-68463
##updated 2025-12-18T22:03:09
1 posts
CVE-2025-53000 - nbconvert has an uncontrolled search path that leads to unauthorized code execution on Windows https://cvefeed.io/vuln/detail/CVE-2025-53000
##updated 2025-12-18T21:32:49
1 posts
Critical arbitrary file upload flaw reported in WordPress Motors theme
A critical vulnerability (CVE-2025-64374) in the Motors WordPress theme versions 5.6.81 and below allows any authenticated user with Subscriber-level access to upload and activate malicious plugins, potentially leading to complete website takeover due to missing permission checks.
**If you're using the Motors WordPress theme (version 5.6.81 or below), this is important and probably urgent. Plan a quick upgrade to version 5.6.82 or later. Review all user accounts with Subscriber-level or higher privileges and check for any unauthorized plugins that may have been installed.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-arbitrary-file-upload-flaw-reported-in-wordpress-motors-theme-5-2-b-q-8/gD2P6Ple2L
updated 2025-12-18T19:45:54.187000
1 posts
1 repos
CVE-2025-68434 - opensourcepos has Cross-Site Request Forgery vulnerability that leads to Unauthorized Administrator Creation https://cvefeed.io/vuln/detail/CVE-2025-68434
##updated 2025-12-18T19:16:22.103000
1 posts
CVE-2025-14837 - ZZCMS Backend Website Settings siteconfig.php stripfxg code injection https://cvefeed.io/vuln/detail/CVE-2025-14837
##updated 2025-12-18T19:16:20.433000
1 posts
CVE-2023-53933 - Serendipity 2.4.0 Authenticated Remote Code Execution via File Upload https://cvefeed.io/vuln/detail/CVE-2023-53933
##updated 2025-12-18T19:07:25.637000
1 posts
CVE-2025-66397 - ChurchCRM's Kiosk Manager Functions are vulnerable to Broken Access Control https://cvefeed.io/vuln/detail/CVE-2025-66397
##updated 2025-12-18T18:50:44
1 posts
Six basically identical CVEs from Amazon in different SDKs.
https://www.cve.org/CVERecord?id=CVE-2025-14759
https://www.cve.org/CVERecord?id=CVE-2025-14760
https://www.cve.org/CVERecord?id=CVE-2025-14761
https://www.cve.org/CVERecord?id=CVE-2025-14762
##updated 2025-12-18T18:30:38
2 posts
CVE-2025-14884 - D-Link DIR-605 Firmware Update Service command injection https://cvefeed.io/vuln/detail/CVE-2025-14884
##Tenda
https://www.cve.org/CVERecord?id=CVE-2025-14879
D-Link
##updated 2025-12-18T18:30:37
1 posts
CVE-2025-14896 - Vega Remote File Inclusion Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14896
##updated 2025-12-18T18:30:37
1 posts
updated 2025-12-18T18:30:37
1 posts
updated 2025-12-18T18:30:37
1 posts
Auth bypass in Open-WebUI.
https://www.cve.org/CVERecord?id=CVE-2025-63391
##An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api/config endpoint. The endpoint lacks proper authentication and authorization controls, exposing sensitive system configuration data to unauthenticated remote attackers.
updated 2025-12-18T17:15:47.853000
3 posts
2 repos
@christopherkunz yeah... Rapid7 have a write up, I'd love to know how HPE ended up adding this feature https://www.rapid7.com/blog/post/etr-cve-2025-37164-critical-unauthenticated-rce-affecting-hewlett-packard-enterprise-oneview/
##HPE OneView CVE-2025-37164 worth paying attention to
- Widely used enterprise management software
- HPE added a REST command, executeCommand, which requires no authentication to execute commands. Obviously, this is dumb and now patched out
- Being on OneView allows attacker to access VMware, 3PAR storage etc by design
- Expect exploitation in the wild as it's so simple
- The vulnerability (executeCommand) was introduced around 2020, feels like a vulndoor
Shodan dork: product:"HPE OneView"
##Critical remote code execution flaw reported in HPE OneView
HPE OneView has a critical unauthenticated remote code execution vulnerability (CVE-2025-37164) with a maximum CVSS score of 10.0, affecting all versions prior to 11.00. HPE has released version 11.00 as a patch and provides hotfixes for older versions to address this severe security flaw.
**Make sure all HPE OneView systems are isolated from the internet and accessible only from trusted networks. Reach out to HPE for details and plan a quick upgrade to version 11.00 or apply the appropriate hotfix for your current version (5.20-10.20).**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-remote-code-execution-flaw-reported-in-hpe-oneview-b-i-c-y-p/gD2P6Ple2L
updated 2025-12-18T16:47:11.970000
1 posts
CVE-2025-68399 - ChurchCRM has Stored Cross-Site Scripting (XSS) In GroupEditor.php https://cvefeed.io/vuln/detail/CVE-2025-68399
##updated 2025-12-18T16:44:00.020000
1 posts
CVE-2025-68401 - ChurchCRM has Stored Cross-Site Scripting (XSS) vulnerability that leads to session theft and account takeover https://cvefeed.io/vuln/detail/CVE-2025-68401
##updated 2025-12-18T15:47:08
1 posts
Six basically identical CVEs from Amazon in different SDKs.
https://www.cve.org/CVERecord?id=CVE-2025-14759
https://www.cve.org/CVERecord?id=CVE-2025-14760
https://www.cve.org/CVERecord?id=CVE-2025-14761
https://www.cve.org/CVERecord?id=CVE-2025-14762
##updated 2025-12-18T15:46:18
1 posts
Six basically identical CVEs from Amazon in different SDKs.
https://www.cve.org/CVERecord?id=CVE-2025-14759
https://www.cve.org/CVERecord?id=CVE-2025-14760
https://www.cve.org/CVERecord?id=CVE-2025-14761
https://www.cve.org/CVERecord?id=CVE-2025-14762
##updated 2025-12-18T15:42:03.790000
5 posts
CISA reports active exploitation of ASUS Live Update supply chain vulnerability
CISA is reporting active exploitation of CVE-2025-59374, a supply chain backdoor embedded in ASUS Live Update utility during the 2018 Operation ShadowHammer attack by Chinese state-sponsored hackers. The backdoor surgically targeted specific devices using hardcoded MAC addresses. Federal agencies must discontinue use of the now-discontinued utility by January 7, 2026. ASUS urges remaining users to update to version 3.6.8 or higher.
**If you have ASUS Live Update utility installed, immediately update to version 3.6.8 or higher, or better yet, uninstall it completely since it's now discontinued. Given the previous supply chain compromise and end-of-support status, remove the utility and download updates directly from ASUS's official website.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-reports-active-exploitation-of-asus-live-update-supply-chain-vulnerability-d-5-n-4-d/gD2P6Ple2L
New.
CISA Releases Nine Industrial Control Systems Advisories https://www.cisa.gov/news-events/alerts/2025/12/18/cisa-releases-nine-industrial-control-systems-advisories
KEV updates, from yesterday:
CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-20393
CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-40602
CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-59374 #CISA #infosec #ASUS #Cisco #SonicWall
##🚨 CISA has added 3 vulnerabilities to the KEV Catalog
CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability
CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability
CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability
##CVE ID: CVE-2025-59374
Vendor: ASUS
Product: Live Update
Date Added: 2025-12-17
Notes: https://www.asus.com/support/faq/1018727/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-59374
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-59374
EoL Asus Live Update was added to the KEV Catalog.
##updated 2025-12-18T15:41:16.840000
15 posts
6 repos
https://github.com/cyberleelawat/CVE-2025-20393
https://github.com/b1gchoi/CVE-2025-20393
https://github.com/thesystemowner/CVE-2025-20393-POC
https://github.com/StasonJatham/cisco-sa-sma-attack-N9bf4
1/5 React2Shell (CVE-2025-55182) ⚛️
The big one. A CVSS 10.0 in React Server Components. Attackers are sending single HTTP requests to get root access.
⚠️ Status: Active exploitation by APTs and botnets. If you use Next.js, check your version NOW.
Cisco’s Nightmare (CVE-2025-20393) 🛡️
A maximum-severity zero-day in Cisco Secure Email Gateway. APT groups are using it to deploy "AquaShell"—a silent backdoor that hides in your mail logs.
Check for any unauthorized tunneling tools like ReverseSSH.
🚨 CVE-2025-20393: Script to detect for Cisco Secure Email Gateway And Cisco Secure Email and Web Manager
CVSS: 10
Currently no patch and zero-day
GitHub: https://github.com/StasonJatham/cisco-sa-sma-attack-N9bf4
##🔥 Cisco AsyncOS Zero-Day (CVE-2025-20393)
• BleepingComputer
https://www.bleepingcomputer.com/news/security/cisco-warns-of-unpatched-asyncos-zero-day-exploited-in-attacks/
• The Hacker News
https://thehackernews.com/2025/12/cisco-warns-of-active-attacks.html
• SecurityWeek
https://www.securityweek.com/china-linked-hackers-exploiting-zero-day-in-cisco-security-gear/
• The Register
https://www.theregister.com/2025/12/17/attacks_pummeling_cisco_0day/
• Dark Reading (CISA KEV addition)
https://www.darkreading.com/attacks-breaches/cisa-adds-cisco-asyncos-zero-day-to-kev-catalog
• SOCRadar analysis
https://socradar.io/blog/cve-2025-20393-cisco-asyncos-zero-day-email/
New.
CISA Releases Nine Industrial Control Systems Advisories https://www.cisa.gov/news-events/alerts/2025/12/18/cisa-releases-nine-industrial-control-systems-advisories
KEV updates, from yesterday:
CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-20393
CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-40602
CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-59374 #CISA #infosec #ASUS #Cisco #SonicWall
##Security Week: China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear https://www.securityweek.com/china-linked-hackers-exploiting-zero-day-in-cisco-security-gear/ @SecurityWeek
Cisco:
- Critical: CVE-2025-20393: Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4
- Critical: CVE-2025-55182: Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-react-flight-TYw32Ddb @TalosSecurity #infosec #Cisco #vulnerability #zeroday
##Cisco Email Security appliances actively exploited
Cisco is warning of an active cyberattack campaign exploiting a critical zero-day vulnerability (CVE-2025-20393) in Cisco Secure Email Gateway and Email and Web Manager appliances, allowing attackers to execute arbitrary commands with root privileges. The flaw affects appliances with the Spam Quarantine feature enabled and exposed to the internet. Atacks date back to late November 2025.
**If you have Cisco Secure Email Gateway or Cisco Email and Web Manager appliances, this is urgent: Immediately check if the Spam Quarantine feature is enabled and exposed to the public ports - if it is, disable it on all public ports until a patch is available for CVE-2025-20393. If your appliance may have been compromised, contact Cisco support and prepare to rebuild the system from scratch. This is currently the only way to fully remove the threat from a compromised system.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisco-says-chinese-hackers-are-exploiting-its-customers-with-a-new-zero-day-techcrunch-g-m-7-i-x/gD2P6Ple2L
[VULN] ⚠️ Zero‑day sur les appliances e‑mail Cisco : compromission, backdoors et logs effacés
👇
https://cyberveille.ch/posts/2025-12-18-zero-day-sur-les-appliances-e-mail-cisco-compromission-backdoors-et-logs-effaces/
🔗 Source originale : https://www.helpnetsecurity.com/2025/12/17/cisco-secure-email-cve-2025-20393/
Advisory officiel:
Analyse de Cisco Talos:
UAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web Manager
Résumé FR ➡️ Campagne UAT-9686: un APT à nexus chinois cible Cisco Secure Email via le backdoor AquaShell
##🚨 CISA has added 3 vulnerabilities to the KEV Catalog
CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability
CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability
CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability
##A suspected Chinese APT is exploiting a new Cisco zero-day
-impacts Cisco Secure Email Gateway And Cisco Secure Email and Web Manager
-CVE-2025-20393
-CVSS score: 10
-APT is UAT-9686
Severity: 10.0
CVE ID: CVE-2025-20393
Vendor: Cisco
Product: Multiple Products
Date Added: 2025-12-17
CVE ID: CVE-2025-20393
Vendor: Cisco
Product: Multiple Products
Date Added: 2025-12-17
Notes: Please adhere to Cisco's guidelines to assess exposure and mitigate risks. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4 ; https://nvd.nist.gov/vuln/detail/CVE-2025-20393
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-20393
@ljrk OK, two more Fleißsternchen for SonicWall: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0019
And for Cisco: https://www.cve.org/CVERecord?id=CVE-2025-20393
Kudos to both for making CISA KEV on 0day (it seems).
Cisco email security appliances rooted and backdoored via still unpatched zero-day https://www.helpnetsecurity.com/2025/12/17/cisco-secure-email-cve-2025-20393/ #cyberespionage #emailsecurity #enterprise #Don'tmiss #Hotstuff #backdoor #China #Cisco #News #APT
##updated 2025-12-18T15:30:51
1 posts
CVE-2025-64468 - Use-after-Free in sentry!sentry_span_set_data() in NI LabVIEW https://cvefeed.io/vuln/detail/CVE-2025-64468
##updated 2025-12-18T15:30:51
1 posts
CVE-2025-13110 - HUSKY – Products Filter Professional for WooCommerce <= 1.3.7.3 - Authenticated (Subscriber+) Insecure Direct Object Reference via 'woof_add_subscr' https://cvefeed.io/vuln/detail/CVE-2025-13110
##updated 2025-12-18T15:30:51
1 posts
CVE-2025-14437 - Hummingbird <= 3.18.0 - Unauthenticated Sensitive Information Exposure via Log File https://cvefeed.io/vuln/detail/CVE-2025-14437
##updated 2025-12-18T15:30:45
1 posts
CVE-2025-64467 - Out-of-Bounds Read in LVResFile::FindRsrcListEntry() in NI LabVIEW https://cvefeed.io/vuln/detail/CVE-2025-64467
##updated 2025-12-18T15:30:45
1 posts
CVE-2025-64465 - Out-of-Bounds Read in lvre!DataSizeTDR() in NI LabVIEW https://cvefeed.io/vuln/detail/CVE-2025-64465
##updated 2025-12-18T15:08:06.237000
1 posts
Critical remote code execution flaw reported in Apache Commons Text library
Apache Commons Text versions prior to 1.10.0 contain a critical remote code execution vulnerability (CVE-2025-46295,) that allows attackers to inject malicious code through the text-substitution API when processing untrusted input. The flaw was patched in late 2022 but is not updated in many deployed applications.
**If you use Apache Commons Text in your Java applications, check your version immediately and upgrade to at least version 1.10.0 (or preferably 1.15.0). Thi flaw allows remote code execution, so treat this update as very important. Exploits will start soon.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-remote-code-execution-flaw-reported-in-apache-commons-text-library-d-k-v-h-p/gD2P6Ple2L
updated 2025-12-18T15:07:42.550000
2 posts
CVE-2025-68459 - Ruijie Networks Co., Ltd. AP180 Command Injection Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-68459
##CVE-2025-68459 - Ruijie Networks Co., Ltd. AP180 Command Injection Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-68459
##updated 2025-12-18T15:07:42.550000
1 posts
CVE-2025-68462 - Freedombox Unauthenticated Database Backup File Disclosure https://cvefeed.io/vuln/detail/CVE-2025-68462
##updated 2025-12-18T15:07:42.550000
1 posts
CVE-2025-47382 - Incorrect Authorization in Boot https://cvefeed.io/vuln/detail/CVE-2025-47382
##updated 2025-12-18T15:07:42.550000
1 posts
CVE-2025-14841 - OFFIS DCMTK dcmqrscp dcmqrdbi.cc startMoveRequest null pointer dereference https://cvefeed.io/vuln/detail/CVE-2025-14841
##updated 2025-12-18T15:07:42.550000
1 posts
CVE-2025-67073 - Tenda HTTPd Buffer Overflow Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-67073
##updated 2025-12-18T15:07:42.550000
1 posts
Six basically identical CVEs from Amazon in different SDKs.
https://www.cve.org/CVERecord?id=CVE-2025-14759
https://www.cve.org/CVERecord?id=CVE-2025-14760
https://www.cve.org/CVERecord?id=CVE-2025-14761
https://www.cve.org/CVERecord?id=CVE-2025-14762
##updated 2025-12-18T15:07:18.427000
1 posts
CVE-2025-14618 - Sweet Energy Efficiency <= 1.0.6 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Graph Deletion https://cvefeed.io/vuln/detail/CVE-2025-14618
##updated 2025-12-18T15:07:18.427000
1 posts
CVE-2025-14277 - Prime Slider – Addons for Elementor <= 4.0.9 - Authenticated (Subscriber+) Server-Side Request Forgery https://cvefeed.io/vuln/detail/CVE-2025-14277
##updated 2025-12-18T12:30:33
2 posts
CVE-2025-10910 - Gaining remote control over Govee devices https://cvefeed.io/vuln/detail/CVE-2025-10910
##https://cert.pl/en/posts/2025/12/CVE-2025-10910/
##A flaw in the binding process of Govee’s cloud platform and devices allows a remote attacker to bind an existing, online Govee device to the attacker’s account, resulting in full control of the device and removal of the device from its legitimate owner’s account.
updated 2025-12-18T06:30:19
1 posts
CVE-2025-47372 - Buffer Copy Without Checking Size of Input in Boot https://cvefeed.io/vuln/detail/CVE-2025-47372
##updated 2025-12-18T06:30:19
1 posts
CVE-2025-47387 - Untrusted Pointer Dereference in Camera https://cvefeed.io/vuln/detail/CVE-2025-47387
##updated 2025-12-18T03:30:18
1 posts
CVE-2025-14856 - y_project RuoYi getnames code injection https://cvefeed.io/vuln/detail/CVE-2025-14856
##updated 2025-12-18T03:30:18
1 posts
CVE-2025-12885 - Embed Any Document <= 2.7.10 - Authenticated (Contributor+) Stored Cross-Site Scripting https://cvefeed.io/vuln/detail/CVE-2025-12885
##updated 2025-12-18T00:34:16
2 posts
CVE-2025-14202 - Cross-Site Request Forgery (CSRF) Leading to Account Takeover via SVG File Upload https://cvefeed.io/vuln/detail/CVE-2025-14202
##CVE-2025-14202 - Cross-Site Request Forgery (CSRF) Leading to Account Takeover via SVG File Upload https://cvefeed.io/vuln/detail/CVE-2025-14202
##updated 2025-12-17T13:54:45.390000
3 posts
2 repos
📰 ** Information Briefing: **
✨ FortiCloud SSO Login Bypass: Exploited in the Wild
- Critical vulnerabilities: CVE-2025-59718 and CVE-2025-59719
- Unauthenticated adversaries bypass FortiCloud SSO login
- Exploitation observed in the wild
- Affected products: FortiOS, FortiProxy, FortiSwitchManager, FortiWeb
🔗 https://www.adalta.info/pdf/index.html?title=prstn_exploit_115742000142229693&lang=en
(Available in 🇩🇪 🇺🇸 🇫🇷)
New. This relates to two vulnerabilities disclosed by Fortinet last week: CVE-2025-59718 and CVE-2025-59719.
VulnCheck: FortiCloud SSO Login Bypass Vulnerabilities Exploited in the Wild https://www.vulncheck.com/blog/forticloud-sso-login-bypass @vulncheck #infosec #Fortinet #threatresearch
##We wrote a little bit on FortiCloud SSO login bypass CVE-2025-59718 (and 59719). Both the known PoCs for the former are fake / invalid. There does appear to be real exploitation evidence, but detections based on fake PoCs ain't it (and it seems like that's where a lot of chatter is coming from)
##updated 2025-12-16T22:37:26
1 posts
Command injection flaw reported in Node.js systeminformation package
A command injection vulnerability (CVE-2025-68154) in the systeminformation Node.js library's fsSize() function allows attackers to execute arbitrary PowerShell commands on Windows systems through unsanitized user input in the drive parameter. The vulnerability has been patched in version 5.27.14.
**If you're using the systeminformation Node.js library on Windows, plan an upgrade to version 5.27.14 or newer to patch this command injection flaw. Review all applications using this library, especially web APIs or tools that accept user input for disk queries, to ensure they're running the patched version.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/command-injection-flaw-reported-in-node-js-systeminformation-package-5-5-0-6-6/gD2P6Ple2L
updated 2025-12-16T15:30:56
2 posts
Linux Kernel Rust Code Sees Its First CVE Vulnerability
https://lore.kernel.org/linux-cve-announce/2025121614-CVE-2025-68260-558d@gregkh/T/#u
##updated 2025-12-10T02:00:02.557000
4 posts
100 repos
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/fatguru/CVE-2025-55182-scanner
https://github.com/timsonner/React2Shell-CVE-2025-55182
https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-
https://github.com/ejpir/CVE-2025-55182-research
https://github.com/Call123X/-cve-2025-55182
https://github.com/AliHzSec/CVE-2025-55182
https://github.com/MoLeft/React2Shell-Toolbox
https://github.com/Saturate/CVE-2025-55182-Scanner
https://github.com/assetnote/react2shell-scanner
https://github.com/Spritualkb/CVE-2025-55182-exp
https://github.com/theori-io/reactguard
https://github.com/f0xyx/CVE-2025-55182-Scanner
https://github.com/RuoJi6/CVE-2025-55182-RCE-shell
https://github.com/whiteov3rflow/CVE-2025-55182-poc
https://github.com/SainiONHacks/CVE-2025-55182-Scanner
https://github.com/Chocapikk/CVE-2025-55182
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/raivenLockdown/RCE_React2Shell_ButCooler-SomeUselessUsefulThingsLMAO-
https://github.com/gensecaihq/react2shell-scanner
https://github.com/logesh-GIT001/CVE-2025-55182
https://github.com/sudo-Yangziran/CVE-2025-55182POC
https://github.com/jf0x3a/CVE-2025-55182-exploit
https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/zr0n/react2shell
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS
https://github.com/fullhunt/react2shell-test-server
https://github.com/yanoshercohen/React2Shell_CVE-2025-55182
https://github.com/alsaut1/react2shell-lab
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/LemonTeatw1/CVE-2025-55182-exploit
https://github.com/xiaopeng-ye/react2shell-detector
https://github.com/im-ezboy/CVE-2025-55182-zoomeye
https://github.com/yz9yt/React2Shell-CTF
https://github.com/zzhorc/CVE-2025-55182
https://github.com/c0rydoras/CVE-2025-55182
https://github.com/sumanrox/rschunter
https://github.com/C00LN3T/React2Shell
https://github.com/websecuritylabs/React2Shell-Library
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/ayoub-intigriti/react2shell-cve
https://github.com/msanft/CVE-2025-55182
https://github.com/Pizz33/CVE-2025-55182-burpscanner
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/mrknow001/RSC_Detector
https://github.com/alfazhossain/CVE-2025-55182-Exploiter
https://github.com/ThemeHackers/CVE-2025-55182
https://github.com/xcanwin/CVE-2025-55182-React-RCE
https://github.com/shamo0/react2shell-PoC
https://github.com/AggressiveUser/React2Hell
https://github.com/surajhacx/react2shellpoc
https://github.com/freeqaz/react2shell
https://github.com/techgaun/cve-2025-55182-scanner
https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive
https://github.com/ejpir/CVE-2025-55182-bypass
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/EynaExp/CVE-2025-55182-POC
https://github.com/dwisiswant0/CVE-2025-55182
https://github.com/VeilVulp/RscScan-cve-2025-55182
https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell
https://github.com/acheong08/CVE-2025-55182-poc
https://github.com/kavienanj/CVE-2025-55182
https://github.com/subhdotsol/CVE-2025-55182
https://github.com/Ashwesker/Blackash-CVE-2025-55182
https://github.com/andrei2308/react2shell
https://github.com/xkillbit/cve-2025-55182-scanner
https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool
https://github.com/GelukCrab/React-Server-Components-RCE
https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI
https://github.com/Rsatan/Next.js-Exploit-Tool
https://github.com/hidden-investigations/react2shell-scanner
https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE
https://github.com/santihabib/CVE-2025-55182-analysis
https://github.com/zack0x01/vuln-app-CVE-2025-55182
https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
https://github.com/XiaomingX/CVE-2025-55182-poc
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/sho-luv/React2Shell
https://github.com/sickwell/CVE-2025-55182
https://github.com/keklick1337/CVE-2025-55182-golang-PoC
https://github.com/hoosin/CVE-2025-55182
https://github.com/nehkark/CVE-2025-55182
https://github.com/shyambhanushali/React2Shell
https://github.com/emredavut/CVE-2025-55182
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/StealthMoud/CVE-2025-55182-Scanner
https://github.com/7amzahard/React2shell
https://github.com/xalgord/React2Shell
https://github.com/kOaDT/poc-cve-2025-55182
https://github.com/ynsmroztas/NextRce
RSC Explorer; Cloudflare Error Page Generator; SQL Quest: The Bank Job
I spent much of Q3 and early Q4 revamping my CMU course. I gave said lecture this past week, and the work for that, along with the need to spend an inordinate amount of time tracking React2Shell nonsense has made December Drops pretty sparse.
If you’re interested in “data-driven threat intelligence” or just cyber-curious, this repo has “A Practical Guide to Cyber Threat Intelligence” and “Operationalizing CTI: Considerations for Security Leaders”. They’re two additional resources I developed for the course, since I found other threat intel content was not really aimed at security leaders (existing or budding ones). Full Typst + Markdown sources are available.
I also finally carved out time to finish up and publish a thinkpiece/essay/whitepaper titled “Children Of The MagentAI” which contains a critical analysis of automation dependency patterns in modern cybersecurity and software development, drawing parallels to aviation’s “magenta line” phenomenon.
(So, I have definitely not been slacking off. 🙂
Today, we have three pretty diverse resources for y’all to ponder. Yes, the “exploits” does have something to with React2Shell, but it’s a super cool way to learn some front-end skills as you also learn more about RSC and how to hack things.
(This is an LLM/GPT-generated summary of today’s Drop. This week, I have been — for lack of a better word — forced into using Gemini, so today’s summary was provided by that model. Sigh. This is also the last Drop that will be using Gemini for the TL;DR.)
Dan Abramov just dropped something genuinely useful for anyone trying to understand what actually happened with the React Server Components vulnerability I keep blathering about and that we’ve been tracking at work. His RSC Explorer (GH) is designed to show how the exploits work under the hood, and has full source for you to play with and expand upon.
If you’ve been following the React2Shell situation at all, you know that CVE-2025-55182 caused a lot of confusion. Part of that confusion stems from the fact that most developers using React Server Components don’t really understand the protocol that makes RSC tick. It’s an implementation detail that React intentionally doesn’t document heavily, which gives the React team flexibility to evolve it, but also means that when something goes wrong, people are left scrambling to understand what they’re even looking at.
React2Shell exploited a flaw in how the RSC protocol handles certain payloads, allowing attackers to achieve remote code execution on vulnerable servers. We saw thousands of exploitation attempts in the wild, with threat actors probing for vulnerable Next.js and other RSC-enabled applications. The vulnerability was serious enough that it drew comparisons to Log4Shell, and while the scope was different, the urgency was real.
Dan’s Explorer lets you step through the RSC protocol in your browser. The whole thing runs client-side, with the server portion running in a web worker, so you’re not making any network requests. But it uses the actual React packages that read and write the RSC protocol, so everything you see is real.
The way it works is pretty clever. You write some server and client code in the left pane, and then you can step through the execution one chunk at a time. You see the raw protocol output, the JSON-like format that React uses to serialize component trees, and then you see what the client reconstructs from that data. It makes visible what’s normally invisible.
There’s even a specific example for CVE-2025-55182, though you have to select version 19.2.0 in the corner to see it work since that was the vulnerable version. Being able to actually watch the exploit flow through the protocol is educational in a way that reading about it just isn’t.
Beyond the security angle, the tool is just a really nice way to build intuition for how RSC actually works. You can watch streaming in action, see how Suspense boundaries create “holes” that get filled in as data arrives, understand how client components get referenced rather than having their code sent over the wire, and see how server actions work in the opposite direction. There’s an example showing how a router refresh works without a framework, which demystifies a lot of the magic that Next.js and similar frameworks provide.
As noted, the source is available on GitHub if you want to dig into how he built it, and the whole thing is embeddable so you can include live examples in your own documentation or blog posts.
If you’re doing any work with RSC, or if you’re just curious about what was actually happening with React2Shell at the protocol level, I’d encourage you to spend some time with this and the blog post walking through it.
This definitely made the rounds, but it deserves some preservation in the Drop.
Cloudflare is one of the most harmful and evil corporations to have ever existed. It’s one of those “you have to be a sociopath to work there” kind of places, and they’ve likely irreparably harmed what was the open internet. Some of you will also remember they took down most of said internet a couple times in the past few weeks.
This project (GH) by Anthony Donlon creates customized error pages that mimics the very well-known Cloudflare error page. You can also embed it into your website, and put the blame on them when your own site goes down (but that may send a signal you use Cloudflare, which I would be somewhat embarassed to even remotely have errantly associated with me).
The editor is super-easy to use, and the pages do not load any other static resources, so they are served up super fast, unlike all the sites Cloudflare took down this past year due to sheer incompetence.
There are some examples you can poke through to see what’s possible in terms of customization, and the sources for the editor and pages themselves are very grok-able, especially if you’re looking to get better at javascript/typescript.
I do code “katas” all the time to keep concepts and syntax fresh in active, human RAM. While I tend to do this with practical mini-projects, there are times I find it a bit more fun when there’s gamification involved, especially when it’s framed as a mystery to solved (we’ve covered more than a few of these types of things in previous Drops).
Either this week or last week I came across a neat way to practice SQL that doesn’t feel like practice at all. SQL Habit just released something called SQL Quest, and the first one is called “The Bank Job.” The premise is simple: a bank has been robbed, and you’re the detective. Your job is to follow the trail of evidence through the bank’s database, figure out what happened, and ultimately help Interpol catch the thief. You solve puzzles by writing SQL queries, and each chapter teaches you something new while advancing the story.
Most SQL tutorials teach you syntax in isolation. You learn how to write a JOIN or a window function, but you’re working with clean, obvious data where the answer is basically handed to you. Real data work is 100% definitely NOT like that. Real data work is messy and ambiguous, and you have to figure out what question to even ask before you can write the query to answer it.
The Bank Job uses realistic, messy data and gives you context and clues instead of step-by-step instructions. You have to turn those clues into insights, which is much closer to actual data analysis work. The creator, Anatoli Makarevich, comes from a background building startups and working on growth and BI at Blinkist, so he’s clearly seen the difference between textbook SQL and the kind of SQL you actually need to get things done.
The whole thing takes somewhere between 20 minutes and an hour depending on your skill level. If you can write window functions without looking anything up, you’ll breeze through it. If you’re still building those muscles, plan for the longer end and use it as a learning opportunity. Each chapter has three levels of hints if you get stuck, though using them adds time penalties if you’re competing for the leaderboard.
It’s completely free and doesn’t require a credit card or bitcoin wallet. If you’re looking for a way to sharpen your SQL skills that’s more engaging than working through another set of exercises about employees and departments, this seems like a pretty spiffy option.
Remember, you can follow and interact with the full text of The Daily Drop’s free posts on:
@dailydrop.hrbrmstr.dev@dailydrop.hrbrmstr.devhttps://bsky.app/profile/dailydrop.hrbrmstr.dev.web.brid.gy☮️
##1/5 React2Shell (CVE-2025-55182) ⚛️
The big one. A CVSS 10.0 in React Server Components. Attackers are sending single HTTP requests to get root access.
⚠️ Status: Active exploitation by APTs and botnets. If you use Next.js, check your version NOW.
Cisco’s Nightmare (CVE-2025-20393) 🛡️
A maximum-severity zero-day in Cisco Secure Email Gateway. APT groups are using it to deploy "AquaShell"—a silent backdoor that hides in your mail logs.
Check for any unauthorized tunneling tools like ReverseSSH.
Security Week: China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear https://www.securityweek.com/china-linked-hackers-exploiting-zero-day-in-cisco-security-gear/ @SecurityWeek
Cisco:
- Critical: CVE-2025-20393: Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4
- Critical: CVE-2025-55182: Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-react-flight-TYw32Ddb @TalosSecurity #infosec #Cisco #vulnerability #zeroday
##updated 2025-12-09T18:30:52
2 posts
📰 ** Information Briefing: **
✨ FortiCloud SSO Login Bypass: Exploited in the Wild
- Critical vulnerabilities: CVE-2025-59718 and CVE-2025-59719
- Unauthenticated adversaries bypass FortiCloud SSO login
- Exploitation observed in the wild
- Affected products: FortiOS, FortiProxy, FortiSwitchManager, FortiWeb
🔗 https://www.adalta.info/pdf/index.html?title=prstn_exploit_115742000142229693&lang=en
(Available in 🇩🇪 🇺🇸 🇫🇷)
New. This relates to two vulnerabilities disclosed by Fortinet last week: CVE-2025-59718 and CVE-2025-59719.
VulnCheck: FortiCloud SSO Login Bypass Vulnerabilities Exploited in the Wild https://www.vulncheck.com/blog/forticloud-sso-login-bypass @vulncheck #infosec #Fortinet #threatresearch
##updated 2025-12-09T18:30:45
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-09T18:30:44
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-09T18:30:44
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-09T18:30:44
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-09T18:30:44
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-09T18:30:43
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-09T18:30:43
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-09T18:30:43
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-05T18:33:09
1 posts
Malcolm v25.12.1 contains a few critical bug fixes and component version updates.
https://github.com/idaholab/Malcolm/compare/v25.12.0...v25.12.1
zeek.intel.file_mime_type to file.mime_type so filters created from it can work on other dashboards/var partition (#835)Malcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻♀️.
Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.
Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.
As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.
#Malcolm #HedgehogLinux #Zeek #Arkime #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #INL
##updated 2025-12-04T22:50:04
1 posts
1 repos
#PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws)
##updated 2025-12-04T17:15:25.860000
1 posts
Local Privilege Escalation (CVE-2025-34352) in JumpCloud Agent https://xmcyber.com/blog/jumpshot-xm-cyber-uncovers-critical-local-privilege-escalation-cve-2025-34352-in-jumpcloud-agent/
##updated 2025-12-03T18:15:47.200000
1 posts
100 repos
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-calcom-yarn-monorepo
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-devdeps
https://github.com/gagaltotal/tot-react-rce-CVE-2025-55182
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-caret
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-15x
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-hoisting
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-overrides
https://github.com/assetnote/react2shell-scanner
https://github.com/ExpTechTW/CVE-2025-66478
https://github.com/FurkanKAYAPINAR/ReactNext2Shell
https://github.com/alessiodos/react2shell-scanner
https://github.com/ancs21/react2shell-scanner-rust
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-v-prefix
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/Saad-Ayady/react2shellNSE
https://github.com/mio-qwq/nextjs-cve-2025-66478-ctf
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-14x
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn
https://github.com/enesbuyuk/react2shell-security-tool
https://github.com/Code42Cate/nexts-cve-2025-66478-exploit
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-resolutions
https://github.com/arashiyans/CVE-2025-55182-CVE-2025-66478
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/strainxx/react2shell-honeypot
https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script
https://github.com/Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-berry
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-range
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-catalog
https://github.com/mounta11n/CHECK-CVE-2025-55182-AND-CVE-2025-66478
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/cypholab/evilact
https://github.com/xiaopeng-ye/react2shell-detector
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-rsc-webpack
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-peer-conflict
https://github.com/abdozkaya/rsc-security-auditor
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-yarn-workspaces
https://github.com/DavionGowie/-vercel-application-is-vulnerable-to-CVE-2025-66478.
https://github.com/sumanrox/rschunter
https://github.com/C00LN3T/React2Shell
https://github.com/lincemorado97/CVE-2025-55182_CVE-2025-66478
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tag-latest
https://github.com/mattcbarrett/check-cve-2025-66478
https://github.com/grp-ops/react2shell
https://github.com/ayoub-intigriti/react2shell-cve
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-16x
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-overrides
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-transitive
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-optional-deps
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-nested-versions
https://github.com/shamo0/react2shell-PoC
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm-symlinks
https://github.com/freeqaz/react2shell
https://github.com/Mustafa1p/Next.js-RCE-Scanner---CVE-2025-55182-CVE-2025-66478
https://github.com/Letalandroid/cve-2025-66478_rce_vulnerable
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-packagemanager-field
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-build-metadata
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/abhirajranjan/cve-2025-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-bun
https://github.com/zhixiangyao/CVE-2025-66478-Exploit-PoC
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-no-lockfile
https://github.com/namest504/CVE-2025-66478-Exploit-Poc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-alias
https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI
https://github.com/Rhyru9/CVE-2025-66478
https://github.com/hidden-investigations/react2shell-scanner
https://github.com/Jibaru/CVE-2025-66478-github-patcher
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-git-dep
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-dub-pnpm-monorepo
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-supabase-pnpm-monorepo
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-shrinkwrap
https://github.com/changgun-lee/Next.js-RSC-RCE-Scanner-CVE-2025-66478
https://github.com/abtonc/next-cve-2025-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-lockfile-mismatch
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-zero-installs
https://github.com/vercel-labs/fix-react2shell-next
https://github.com/jctommasi/react2shellVulnApp
https://github.com/aiexz/CVE-2025-66478-kinda-waf
https://github.com/nehkark/CVE-2025-55182
https://github.com/shyambhanushali/React2Shell
https://github.com/emredavut/CVE-2025-55182
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-pnp
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-turborepo
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tilde
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-patch-package
updated 2025-11-17T18:30:25
1 posts
updated 2025-11-14T02:00:02.350000
1 posts
2 repos
https://github.com/Ashwesker/Blackash-CVE-2025-9242
https://github.com/watchtowrlabs/watchTowr-vs-WatchGuard-CVE-2025-9242
Urgent: A critical WatchGuard Firebox RCE flaw (CVE-2025-9242) is being actively exploited. CISA has mandated patching. Over 54k devices are still vulnerable. Patch immediately and rotate all credentials. https://redteamnews.com/red-team/cve/critical-watchguard-firebox-rce-flaw-exploited-cisa-issues-directive/
##updated 2025-11-13T18:36:55.173000
1 posts
This critical advisory was posted yesterday. It relates to CVE-2025-7962, CVE-2025-49146, and CVE-2025-5516.
HPESBNW04986 rev.1 - HPE Telco Service Activator, Multiple Vulnerabilities https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04986en_us&docLocale=en_US
More:
The Hacker News: HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution https://thehackernews.com/2025/12/hpe-oneview-flaw-rated-cvss-100-allows.html @thehackernews #infosec #HPE #vulnerability
##updated 2025-11-12T15:32:32
1 posts
Yooo @yeslikethefood wrote a neat bunch of words about developing an exploit for Gladinet Triofox CVE-2025-12480 that closely followed the real-world attack pattern Mandiant wrote about last month and attributed to UNC6485.
20+ requests, an AV config trigger, and an embedded PostgreSQL server later:
https://www.vulncheck.com/blog/triofox-exploit-cve-2025-12480
##updated 2025-11-11T15:32:22
1 posts
21 repos
https://github.com/N3k0t-dev/PoC-CVE-collection
https://github.com/0xBruno/WSUSploit.NET
https://github.com/esteban11121/WSUS-RCE-Mitigation-59287
https://github.com/AdityaBhatt3010/CVE-2025-59287-When-your-patch-server-becomes-the-attack-vector
https://github.com/tecxx/CVE-2025-59287-WSUS
https://github.com/Adel-kaka-dz/cve-2025-59287
https://github.com/FurkanKAYAPINAR/CVE-2025-59287
https://github.com/garvitv14/CVE-2025-59287
https://github.com/Lupovis/Honeypot-for-CVE-2025-59287-WSUS
https://github.com/QurtiDev/WSUS-CVE-2025-59287-RCE
https://github.com/fsanzmoya/wsus_CVE-2025-59287
https://github.com/keeganparr1/CVE-2025-59287-hawktrace
https://github.com/mrk336/Breaking-the-Update-Chain-Inside-CVE-2025-59287-and-the-WSUS-RCE-Threat
https://github.com/0x7556/CVE-2025-59287
https://github.com/mubix/Find-WSUS
https://github.com/M507/CVE-2025-59287-PoC
https://github.com/jiansiting/CVE-2025-59287
https://github.com/RadzaRr/WSUSResponder
https://github.com/dexterm300/cve-2025-59287-exploit-poc
https://github.com/Twodimensionalitylevelcrossing817/CVE-2025-59287
Critical WSUS flaw reported in Schneider Electric Foxboro DCS systems
Schneider Electric issued a critical security advisory for a vulnerability (CVE-2025-59287) in its EcoStruxure Foxboro DCS Advisor services caused by a flaw in Microsoft WSUS that allows unauthenticated attackers to execute arbitrary code with SYSTEM privileges via ports 8530/8531. Active exploitation is observed in the wild.
**This one is important and kind of urgent, there is active exploitation. If you have Schneider Electric EcoStruxure Foxboro DCS Advisor systems, make sure to block WSUS ports 8530/8531 from the internet, or even better, make sure they are isolated from the internet and only accessible from trusted networks. Then apply Microsoft patches KB5070882 and KB5070884 and verify patch with Schneider Electric Global Customer Support.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-wsus-flaw-reported-in-schneider-electric-foxboro-dcs-systems-8-0-8-z-c/gD2P6Ple2L
updated 2025-11-03T18:31:47
1 posts
New. This addresses high-risk CVE-2025-53057 and CVE-2025-53066.
Security Update for Dell APEX Cloud Platform for Microsoft Azure and Dell APEX Cloud Platform Foundation Software Multiple Third-Party Component Vulnerabilities https://www.dell.com/support/kbdoc/en-us/000405196/dsa-2025-449-security-update-for-dell-apex-cloud-platform-for-microsoft-azure-and-dell-apex-cloud-platform-foundation-software-multiple-third-party-component-vulnerabilities #Dell #Microsoft #infosec #Azure #vulnerability
##updated 2025-11-03T18:16:56.973000
1 posts
New. This addresses high-risk CVE-2025-53057 and CVE-2025-53066.
Security Update for Dell APEX Cloud Platform for Microsoft Azure and Dell APEX Cloud Platform Foundation Software Multiple Third-Party Component Vulnerabilities https://www.dell.com/support/kbdoc/en-us/000405196/dsa-2025-449-security-update-for-dell-apex-cloud-platform-for-microsoft-azure-and-dell-apex-cloud-platform-foundation-software-multiple-third-party-component-vulnerabilities #Dell #Microsoft #infosec #Azure #vulnerability
##updated 2025-10-27T17:08:52.230000
1 posts
13 repos
https://github.com/GhoStZA-debug/CVE-2025-61882
https://github.com/watchtowrlabs/watchTowr-vs-Oracle-E-Business-Suite-CVE-2025-61882
https://github.com/rxerium/CVE-2025-61882-CVE-2025-61884
https://github.com/Sachinart/CVE-2025-61882
https://github.com/RootAid/CVE-2025-61882
https://github.com/Zhert-lab/CVE-2025-61882-CVE-2025-61884
https://github.com/AshrafZaryouh/CVE-2025-61882-Executive-Summary
https://github.com/BattalionX/http-oracle-ebs-cve-2025-61882.nse
https://github.com/MindflareX/CVE-2025-61882-POC
https://github.com/zerozenxlabs/CVE-2025-61882-Oracle-EBS
https://github.com/AdityaBhatt3010/CVE-2025-61882-Oracle-E-Business-Suite-Pre-Auth-RCE-Exploit
2/3 The Oracle EBS Breach 🏦
Clop ransomware is back, targeting Oracle EBS (CVE-2025-61882). They’ve already hit GlobalLogic and several NHS providers.
Supply chain attacks are the new "Front Door" for ransomware.
Analysis: Why is this happening?
Attackers are moving up the stack. They aren't just hacking servers; they're hacking the Frameworks (React) and the Infrastructure (Cisco). One vulnerability now grants access to 1,000s of companies at once.
updated 2025-10-22T00:34:21
1 posts
19 repos
https://github.com/Onapsis/Onapsis_CVE-2025-31324_Scanner_Tools
https://github.com/redrays-io/CVE-2025-31324
https://github.com/rf-peixoto/sap_netweaver_cve-2025-31324-
https://github.com/rxerium/CVE-2025-31324
https://github.com/ODST-Forge/CVE-2025-31324_PoC
https://github.com/nullcult/CVE-2025-31324-File-Upload
https://github.com/nairuzabulhul/nuclei-template-cve-2025-31324-check
https://github.com/abrewer251/CVE-2025-31324_PoC_SAP
https://github.com/JonathanStross/CVE-2025-31324
https://github.com/BlueOWL-overlord/Burp_CVE-2025-31324
https://github.com/Onapsis/Onapsis-Mandiant-CVE-2025-31324-Vuln-Compromise-Assessment
https://github.com/moften/CVE-2025-31324-NUCLEI
https://github.com/NULLTRACE0X/CVE-2025-31324
https://github.com/Alizngnc/SAP-CVE-2025-31324
https://github.com/moften/CVE-2025-31324
https://github.com/harshitvarma05/CVE-2025-31324-Exploits
https://github.com/sug4r-wr41th/CVE-2025-31324
https://github.com/respondiq/jsp-webshell-scanner
https://github.com/antichainalysis/sap-netweaver-0day-CVE-2025-31324
⚪ Vulnerability in SAP NetWeaver Exploited to Deploy Auto-Color Linux Malware
🗨️ Experts at Darktrace warned that hackers exploited a critical vulnerability in SAP NetWeaver (CVE-2025-31324) to deploy Linux malware Auto-Color into the network of an unnamed American chemical company.
##updated 2025-10-22T00:34:17
1 posts
SonicWall patches actively exploited flaw vulnerability chain in SMA 1000 appliances
SonicWall SMA 1000 appliances are being actively exploited through a vulnerability chain combining CVE-2025-40602 (a local privilege escalation flaw) with CVE-2025-23006 (a previously patched deserialization vulnerability), enabling unauthenticated remote code execution with root privileges.
**If you have SonicWall SMA 1000 appliances, make sure their SSH and management access is isolated from the public internet and only accessible from trusted networks. Review latest version, and if not up-to date patched, plan a very quick upgrade to platform-hotfix 12.4.3-03245 or 12.5.0-02283 (or higher). Your devices are being hacked, and you can't really hide them from the internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/sonicwall-patches-actively-exploited-flaw-vulnerability-chain-in-sma-1000-appliances-x-l-b-q-7/gD2P6Ple2L
updated 2025-10-22T00:34:16
1 posts
1 repos
CVE-2024-53704 in SonicWall SSLVPN has been added to the KEV Catalog.
##updated 2025-10-06T19:29:58.977000
1 posts
This critical advisory was posted yesterday. It relates to CVE-2025-7962, CVE-2025-49146, and CVE-2025-5516.
HPESBNW04986 rev.1 - HPE Telco Service Activator, Multiple Vulnerabilities https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04986en_us&docLocale=en_US
More:
The Hacker News: HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution https://thehackernews.com/2025/12/hpe-oneview-flaw-rated-cvss-100-allows.html @thehackernews #infosec #HPE #vulnerability
##updated 2025-08-11T21:31:39
1 posts
1 repos
New.
Picus: Omnissa Workspace One CVE-2025-25231 Path Traversal Exploit https://www.picussecurity.com/resource/blog/omnissa-workspace-one-cve-2025-25231-path-traversal-exploit #infosec #threatresearch
##updated 2025-07-15T13:14:49.980000
2 posts
Critical vulnerabilities reported in Axis Communications Camera management systems
Axis Communications patched four security vulnerabilities (CVE-2025-30023 through CVE-2025-30026) in its camera management software, including a critical remote code execution flaw and authentication bypass issues affecting surveillance systems in government facilities and critical infrastructure.
**If you have Axis Communications camera management systems (AXIS Camera Station Pro, AXIS Camera Station, or AXIS Device Manager), make sure they are isolated from the internet and only accessible from trusted internal networks. Then plan an update to the latest patched versions (Camera Station Pro 6.9+, Camera Station 5.58+, Device Manager 5.32+).**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-vulnerabilities-reported-in-axis-communications-camera-management-systems-a-w-f-7-b/gD2P6Ple2L
Critical vulnerabilities reported in Axis Communications Camera management systems
Axis Communications patched four security vulnerabilities (CVE-2025-30023 through CVE-2025-30026) in its camera management software, including a critical remote code execution flaw and authentication bypass issues affecting surveillance systems in government facilities and critical infrastructure.
**If you have Axis Communications camera management systems (AXIS Camera Station Pro, AXIS Camera Station, or AXIS Device Manager), make sure they are isolated from the internet and only accessible from trusted internal networks. Then plan an update to the latest patched versions (Camera Station Pro 6.9+, Camera Station 5.58+, Device Manager 5.32+).**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-vulnerabilities-reported-in-axis-communications-camera-management-systems-a-w-f-7-b/gD2P6Ple2L
updated 2025-07-15T13:14:49.980000
2 posts
Critical vulnerabilities reported in Axis Communications Camera management systems
Axis Communications patched four security vulnerabilities (CVE-2025-30023 through CVE-2025-30026) in its camera management software, including a critical remote code execution flaw and authentication bypass issues affecting surveillance systems in government facilities and critical infrastructure.
**If you have Axis Communications camera management systems (AXIS Camera Station Pro, AXIS Camera Station, or AXIS Device Manager), make sure they are isolated from the internet and only accessible from trusted internal networks. Then plan an update to the latest patched versions (Camera Station Pro 6.9+, Camera Station 5.58+, Device Manager 5.32+).**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-vulnerabilities-reported-in-axis-communications-camera-management-systems-a-w-f-7-b/gD2P6Ple2L
Critical vulnerabilities reported in Axis Communications Camera management systems
Axis Communications patched four security vulnerabilities (CVE-2025-30023 through CVE-2025-30026) in its camera management software, including a critical remote code execution flaw and authentication bypass issues affecting surveillance systems in government facilities and critical infrastructure.
**If you have Axis Communications camera management systems (AXIS Camera Station Pro, AXIS Camera Station, or AXIS Device Manager), make sure they are isolated from the internet and only accessible from trusted internal networks. Then plan an update to the latest patched versions (Camera Station Pro 6.9+, Camera Station 5.58+, Device Manager 5.32+).**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-vulnerabilities-reported-in-axis-communications-camera-management-systems-a-w-f-7-b/gD2P6Ple2L
updated 2025-06-06T17:42:29.520000
1 posts
This critical advisory was posted yesterday. It relates to CVE-2025-7962, CVE-2025-49146, and CVE-2025-5516.
HPESBNW04986 rev.1 - HPE Telco Service Activator, Multiple Vulnerabilities https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04986en_us&docLocale=en_US
More:
The Hacker News: HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution https://thehackernews.com/2025/12/hpe-oneview-flaw-rated-cvss-100-allows.html @thehackernews #infosec #HPE #vulnerability
##updated 2025-05-13T20:57:18.117000
1 posts
5 repos
https://github.com/cyberleelawat/CVE-2025-20393
https://github.com/thesystemowner/CVE-2025-20393-POC
https://github.com/KingHacker353/CVE-2025-20393
🔥 Cisco AsyncOS Zero-Day (CVE-2025-20393)
• BleepingComputer
https://www.bleepingcomputer.com/news/security/cisco-warns-of-unpatched-asyncos-zero-day-exploited-in-attacks/
• The Hacker News
https://thehackernews.com/2025/12/cisco-warns-of-active-attacks.html
• SecurityWeek
https://www.securityweek.com/china-linked-hackers-exploiting-zero-day-in-cisco-security-gear/
• The Register
https://www.theregister.com/2025/12/17/attacks_pummeling_cisco_0day/
• Dark Reading (CISA KEV addition)
https://www.darkreading.com/attacks-breaches/cisa-adds-cisco-asyncos-zero-day-to-kev-catalog
• SOCRadar analysis
https://socradar.io/blog/cve-2025-20393-cisco-asyncos-zero-day-email/
updated 2025-04-10T09:30:32
1 posts
Flaw in NVIDIA Isaac Lab enables remote code execution
NVIDIA patched a critical deserialization vulnerability (CVE-2025-32210) in Isaac Lab that allows authenticated low-privilege users to execute arbitrary code, affecting all versions prior to v2.3.0.
**Make sure all devices running NVIDIA Isaac Lab are isolated from the internet and accessible from trusted networks only. Then plan a quick upgrade to Isaac Lab v2.3.0.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/flaw-in-nvidia-isaac-lab-enables-remote-code-execution-u-o-u-f-q/gD2P6Ple2L
updated 2024-08-20T20:35:34.497000
1 posts
somehow nfs feels faster too. Kinda sad about CVE-2024-44067 on this board but i don't really care because i just want more architectures
##🔒 CRITICAL: CVE-2025-66580 in OpenAgentPlatform Dive (<0.11.1) enables stored XSS via Mermaid diagrams—can lead to remote code execution! Upgrade to 0.11.1 now. https://radar.offseq.com/threat/cve-2025-66580-cwe-94-improper-control-of-generati-8d6c3eb4 #OffSeq #CVE202566580 #XSS #RCE #Infosec
##⚠️ CRITICAL: CVE-2025-68613 in n8n enables authenticated RCE (CVSS 10). Affects >=0.211.0, <1.120.4, and 1.121.0. Upgrade to 1.120.4, 1.121.1, or 1.122.0 ASAP! Full compromise risk. https://radar.offseq.com/threat/cve-2025-68613-cwe-913-improper-control-of-dynamic-ff9feacf #OffSeq #n8n #RCE #Vulnerability
##CVE-2025-67745 - Myhoard logs backup encryption key in plain text https://cvefeed.io/vuln/detail/CVE-2025-67745
##🚨 CVE-2025-66029 (HIGH): OSC ondemand ≤4.0.8 exposes sensitive creds via Apache proxy headers—attackers can harvest tokens if users hit malicious servers. Patch in v4.1; config workarounds available now. Details: https://radar.offseq.com/threat/cve-2025-66029-cwe-522-insufficiently-protected-cr-b9fc3983 #OffSeq #HPC #Vuln #Security
##CVE-2025-68435 - Zerobyte has Authentication Bypass by Primary Weakness https://cvefeed.io/vuln/detail/CVE-2025-68435
##CVE-2025-68435 - Zerobyte has Authentication Bypass by Primary Weakness https://cvefeed.io/vuln/detail/CVE-2025-68435
##CVE-2025-68147 - opensourcepos has a Cross-site Scripting vulnerability https://cvefeed.io/vuln/detail/CVE-2025-68147
##CVE-2025-68400 - ChurchCRM vulnerable to time-based blind SQL Injection in ConfirmReportEmail.php https://cvefeed.io/vuln/detail/CVE-2025-68400
##CVE-2025-68275 - ChurchCRM vulnerable to Stored XSS - Group name > Person Listing https://cvefeed.io/vuln/detail/CVE-2025-68275
##Six basically identical CVEs from Amazon in different SDKs.
https://www.cve.org/CVERecord?id=CVE-2025-14759
https://www.cve.org/CVERecord?id=CVE-2025-14760
https://www.cve.org/CVERecord?id=CVE-2025-14761
https://www.cve.org/CVERecord?id=CVE-2025-14762
##