## Updated at UTC 2025-12-18T20:51:02.033181

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2025-68147 8.1 0.03% 1 1 2025-12-18T19:53:06.907000 Open Source Point of Sale (opensourcepos) is a web based point of sale applicati
CVE-2025-67074 6.5 0.07% 1 0 2025-12-18T19:16:34.560000 A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in
CVE-2025-65568 0 0.00% 1 0 2025-12-18T19:16:34.300000 A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp
CVE-2025-65565 0 0.00% 1 0 2025-12-18T19:16:34.080000 A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp
CVE-2025-14879 9.8 0.00% 3 0 2025-12-18T19:16:22.227000 A weakness has been identified in Tenda WH450 1.0.0.18. Affected is an unknown f
CVE-2025-14739 0 0.00% 2 0 2025-12-18T19:16:21.680000 Access of Uninitialized Pointer vulnerability in TP-Link WR940N and WR941ND allo
CVE-2023-53933 8.8 0.24% 1 0 2025-12-18T19:16:20.433000 Serendipity 2.4.0 contains a remote code execution vulnerability that allows aut
CVE-2025-37164 10.0 0.25% 1 1 2025-12-18T18:31:33 A remote code execution issue exists in HPE OneView.
CVE-2025-63390 None 0.00% 2 0 2025-12-18T18:30:37 An authentication bypass vulnerability exists in AnythingLLM v1.8.5 in via the /
CVE-2025-63389 None 0.00% 2 0 2025-12-18T18:30:37 A critical authentication bypass vulnerability exists in Ollama platform's API e
CVE-2025-64236 9.8 0.00% 1 0 2025-12-18T18:30:37 Authentication Bypass Using an Alternate Path or Channel vulnerability in Amento
CVE-2025-14896 7.5 0.00% 1 0 2025-12-18T18:30:37 due to insufficient sanitazation in Vega’s `convert()` function when `safeMode`
CVE-2025-63391 7.5 0.00% 2 0 2025-12-18T18:15:45.587000 An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api
CVE-2025-14738 0 0.00% 2 0 2025-12-18T18:15:45.193000 Improper authentication vulnerability in TP-Link WA850RE (httpd modules) allows
CVE-2025-14737 0 0.00% 2 0 2025-12-18T18:15:45.027000 Command Injection vulnerability in TP-Link WA850RE (httpd modules) allows authen
CVE-2025-14884 7.2 0.00% 3 0 2025-12-18T17:15:47.480000 A vulnerability was detected in D-Link DIR-605 202WWB03. Affected by this issue
CVE-2025-68400 8.8 0.03% 1 0 2025-12-18T16:46:12.477000 ChurchCRM is an open-source church management system. A SQL Injection vulnerabil
CVE-2025-14878 9.8 0.00% 3 0 2025-12-18T16:15:52.960000 A security flaw has been discovered in Tenda WH450 1.0.0.18. This impacts an unk
CVE-2025-14763 5.3 0.01% 1 0 2025-12-18T15:47:08 ## Summary S3 Encryption Client for Java is an open-source client-side encrypti
CVE-2025-14759 5.3 0.01% 1 0 2025-12-18T15:46:18 ## Summary S3 Encryption Client for .NET (S3EC) is an open-source client-side e
CVE-2025-59374 9.8 56.04% 5 0 2025-12-18T15:42:03.790000 "UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were
CVE-2025-20393 10.0 4.03% 18 5 2025-12-18T15:41:16.840000 Cisco is aware of a potential vulnerability.&nbsp; Cisco is currently investigat
CVE-2025-64466 7.8 0.00% 1 0 2025-12-18T15:30:52 There is an out of bounds read vulnerability in NI LabVIEW in lvre!ExecPostedPro
CVE-2025-64469 7.8 0.00% 1 0 2025-12-18T15:30:51 There is a stack-based buffer overflow vulnerability in NI LabVIEW in LVResFile:
CVE-2025-64468 7.8 0.00% 1 0 2025-12-18T15:30:51 There is a use-after-free vulnerability in sentry!sentry_span_set_data() when pa
CVE-2025-13110 4.3 0.00% 1 0 2025-12-18T15:30:51 The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is
CVE-2025-14618 4.3 0.00% 1 0 2025-12-18T15:30:51 The Sweet Energy Efficiency plugin for WordPress is vulnerable to unauthorized a
CVE-2025-65007 None 0.00% 1 0 2025-12-18T15:30:51 In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) due to lack of
CVE-2025-64465 7.8 0.00% 1 0 2025-12-18T15:30:45 There is an out of bounds read vulnerability in NI LabVIEW in lvre!DataSizeTDR()
CVE-2025-64467 7.8 0.00% 1 0 2025-12-18T15:15:58.893000 There is an out of bounds read vulnerability in NI LabVIEW in LVResFile::FindRsr
CVE-2025-53000 0 0.02% 1 0 2025-12-18T15:15:54.730000 The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various oth
CVE-2025-68154 8.1 0.12% 2 0 2025-12-18T15:08:06.237000 systeminformation is a System and OS information library for node.js. In version
CVE-2025-47372 9.0 0.02% 1 0 2025-12-18T15:07:42.550000 Memory Corruption when a corrupted ELF image with an oversized file size is read
CVE-2025-47387 7.8 0.01% 1 0 2025-12-18T15:07:42.550000 Memory Corruption when processing IOCTLs for JPEG data without verification.
CVE-2025-47382 7.8 0.01% 1 0 2025-12-18T15:07:42.550000 Memory corruption while loading an invalid firmware in boot loader.
CVE-2025-14856 6.3 0.04% 1 0 2025-12-18T15:07:42.550000 A security vulnerability has been detected in y_project RuoYi up to 4.8.1. The a
CVE-2025-66029 7.6 0.03% 1 0 2025-12-18T15:07:42.550000 Open OnDemand provides remote web access to supercomputers. In versions 4.0.8 an
CVE-2025-68435 9.1 0.07% 2 0 2025-12-18T15:07:42.550000 Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.
CVE-2025-68129 6.8 0.06% 1 0 2025-12-18T15:07:42.550000 Auth0-PHP is a PHP SDK for Auth0 Authentication and Management APIs. In applicat
CVE-2025-67073 9.8 0.15% 1 0 2025-12-18T15:07:42.550000 A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in
CVE-2025-14762 5.3 0.02% 1 0 2025-12-18T15:07:42.550000 Missing cryptographic key commitment in the AWS SDK for Ruby may allow a user wi
CVE-2025-14760 5.3 0.02% 1 0 2025-12-18T15:07:42.550000 Missing cryptographic key commitment in the AWS SDK for C++ may allow a user wit
CVE-2025-14761 5.3 0.02% 1 0 2025-12-18T15:07:42.550000 Missing cryptographic key commitment in the AWS SDK for PHP may allow a user wit
CVE-2025-14764 5.3 0.01% 1 0 2025-12-18T15:07:42.550000 Missing cryptographic key commitment in the Amazon S3 Encryption Client for Go m
CVE-2025-65203 7.1 0.01% 1 0 2025-12-18T15:07:42.550000 KeePassXC-Browser thru 1.9.9.2 autofills or prompts to fill stored credentials i
CVE-2025-40602 6.6 1.71% 5 1 2025-12-18T15:07:18.427000 A local privilege escalation vulnerability due to insufficient authorization in
CVE-2025-14437 7.5 0.00% 1 0 2025-12-18T15:07:18.427000 The Hummingbird Performance plugin for WordPress is vulnerable to Sensitive Info
CVE-2025-14277 4.3 0.00% 1 0 2025-12-18T15:07:18.427000 The Prime Slider – Addons for Elementor plugin for WordPress is vulnerable to Se
CVE-2025-64374 0 0.02% 1 0 2025-12-18T15:07:18.427000 Unrestricted Upload of File with Dangerous Type vulnerability in StylemixThemes
CVE-2025-10910 None 0.19% 2 0 2025-12-18T12:30:33 A flaw in the binding process of Govee’s cloud platform and devices allows a rem
CVE-2025-68459 7.2 0.17% 2 0 2025-12-18T06:30:19 RG - AP180, Indoor Wall Plate Wireless AP AP180 series provided by Ruijie Networ
CVE-2025-68463 4.9 0.03% 1 0 2025-12-18T06:30:19 Bio.Entrez in Biopython through 186 allows doctype XXE.
CVE-2025-68462 3.2 0.01% 1 0 2025-12-18T06:30:19 Freedombox before 25.17.1 does not set proper permissions for the backups-data d
CVE-2025-12885 6.4 0.03% 1 0 2025-12-18T03:30:18 The Embed Any Document – Embed PDF, Word, PowerPoint and Excel Files plugin for
CVE-2025-14841 3.3 0.01% 1 0 2025-12-18T03:30:18 A flaw has been found in OFFIS DCMTK up to 3.6.9. The impacted element is the fu
CVE-2025-14837 4.7 0.04% 1 0 2025-12-18T00:34:16 A vulnerability has been found in ZZCMS 2025. Affected by this issue is the func
CVE-2025-14202 None 0.05% 2 0 2025-12-18T00:34:16 A vulnerability in the file upload at bookmark + asset rendering pipeline allows
CVE-2025-67172 7.2 0.24% 1 0 2025-12-17T21:31:53 RiteCMS v3.1.0 was discovered to contain an authenticated remote code execution
CVE-2025-66924 6.1 0.04% 1 0 2025-12-17T21:31:53 A Cross-site scripting (XSS) vulnerability in Create/Update Item Kit(s) in Open
CVE-2025-66923 7.2 0.10% 1 0 2025-12-17T21:31:52 A Cross-site scripting (XSS) vulnerability in Create/Update Customer(s) in Open
CVE-2025-34437 None 0.10% 1 0 2025-12-17T21:30:56 AVideo versions prior to 20.0 permit any authenticated user to upload comment im
CVE-2025-34436 None 0.10% 1 0 2025-12-17T21:30:56 AVideo versions prior to 20.0 allow any authenticated user to upload files into
CVE-2025-13326 3.9 0.01% 1 0 2025-12-17T21:30:56 Mattermost Desktop App versions <6.0.0 fail to enable the Hardened Runtime on th
CVE-2025-59718 9.8 5.57% 4 2 2025-12-17T13:54:45.390000 A improper verification of cryptographic signature vulnerability in Fortinet For
CVE-2025-68260 None 0.02% 2 0 2025-12-16T15:30:56 In the Linux kernel, the following vulnerability has been resolved: rust_binder
CVE-2025-66471 7.5 0.02% 1 0 2025-12-10T16:10:33.500000 urllib3 is a user-friendly HTTP client library for Python. Starting in version 1
CVE-2025-59719 9.8 0.07% 3 0 2025-12-09T19:59:29.507000 An improper verification of cryptographic signature vulnerability in Fortinet Fo
CVE-2025-41750 7.1 0.09% 1 0 2025-12-09T18:36:53.557000 An XSS vulnerability in pxc_PortCfg.php can be used by an unauthenticated remote
CVE-2025-41752 7.1 0.09% 1 0 2025-12-09T18:36:53.557000 An XSS vulnerability in pxc_portSfp.php can be used by an unauthenticated remote
CVE-2025-41694 6.5 0.11% 1 0 2025-12-09T18:36:53.557000 A low privileged remote attacker can run the webshell with an empty command cont
CVE-2025-41747 7.1 0.09% 1 0 2025-12-09T18:36:53.557000 An XSS vulnerability in pxc_vlanIntfCfg.php can be used by an unauthenticated re
CVE-2025-41695 7.1 0.09% 1 0 2025-12-09T18:36:53.557000 An XSS vulnerability in dyn_conn.php can be used by an unauthenticated remote at
CVE-2025-41746 7.1 0.09% 1 0 2025-12-09T18:36:53.557000 An XSS vulnerability in pxc_portSecCfg.php can be used by an unauthenticated rem
CVE-2025-41749 7.1 0.09% 1 0 2025-12-09T18:30:45 An XSS vulnerability in port_util.php can be used by an unauthenticated remote a
CVE-2025-41696 4.6 0.02% 1 0 2025-12-09T18:30:44 An attacker can use an undocumented UART port on the PCB as a side-channel with
CVE-2025-41748 7.1 0.09% 1 0 2025-12-09T18:30:44 An XSS vulnerability in pxc_Dot1xCfg.php can be used by an unauthenticated remot
CVE-2025-41751 7.1 0.09% 1 0 2025-12-09T18:30:44 An XSS vulnerability in pxc_portCntr.php can be used by an unauthenticated remot
CVE-2025-41697 6.8 0.02% 1 0 2025-12-09T18:30:44 An attacker can use an undocumented UART port on the PCB as a side-channel to
CVE-2025-41745 7.1 0.09% 1 0 2025-12-09T18:30:44 An XSS vulnerability in pxc_portCntr2.php can be used by an unauthenticated remo
CVE-2025-41693 4.3 0.23% 1 0 2025-12-09T18:30:43 A low privileged remote attacker can use the ssh feature to execute commands dir
CVE-2025-41692 6.8 0.02% 1 0 2025-12-09T18:30:43 A high privileged remote attacker with admin privileges for the webUI can brute-
CVE-2025-55182 10.0 44.14% 2 100 template 2025-12-09T16:53:25 ### Impact There is an unauthenticated remote code execution vulnerability in R
CVE-2025-34352 None 0.02% 1 0 2025-12-02T21:31:37 JumpCloud Remote Assist for Windows versions prior to 0.317.0 include an uninsta
CVE-2025-40300 None 0.06% 1 0 2025-11-17T18:30:25 In the Linux kernel, the following vulnerability has been resolved: x86/vmscape
CVE-2025-7962 7.5 0.01% 1 0 2025-11-13T18:36:55.173000 In Jakarta Mail 2.0.2 it is possible to preform a SMTP Injection by utilizing th
CVE-2025-53066 7.5 0.09% 2 0 2025-11-03T18:16:57.227000 Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Ente
CVE-2025-53057 5.9 0.07% 2 0 2025-11-03T18:16:56.973000 Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Ente
CVE-2025-49146 8.2 0.01% 1 0 2025-06-11T16:17:03 ### Impact When the PostgreSQL JDBC driver is configured with channel binding se
CVE-2025-5516 2.4 0.05% 1 0 2025-06-03T18:30:53 A vulnerability, which was classified as problematic, was found in TOTOLINK X200
CVE-2025-2039 4.7 0.09% 2 4 2025-05-13T20:57:18.117000 A vulnerability classified as critical has been found in code-projects Blood Ban
CVE-2025-32210 6.5 0.03% 1 0 2025-04-11T15:39:52.920000 Missing Authorization vulnerability in CreativeMindsSolutions CM Registration an
CVE-2025-68161 0 0.00% 2 0 N/A
CVE-2025-63820 0 0.00% 2 1 N/A
CVE-2025-63821 0 0.00% 2 1 N/A
CVE-2025-67745 0 0.00% 1 0 N/A
CVE-2025-65567 0 0.00% 1 0 N/A
CVE-2025-65564 0 0.00% 1 0 N/A
CVE-2025-68434 0 0.06% 1 1 N/A
CVE-2025-68401 0 0.04% 1 0 N/A
CVE-2025-68399 0 0.05% 1 0 N/A
CVE-2025-68275 0 0.04% 1 0 N/A
CVE-2025-66397 0 0.03% 1 0 N/A

CVE-2025-68147
(8.1 HIGH)

EPSS: 0.03%

updated 2025-12-18T19:53:06.907000

1 posts

Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Stored Cross-Site Scripting (XSS) vulnerability exists in the "Return Policy" configuration field. The application does not properly sanitize user input before saving it to the database or displaying it on receipts. A

1 repos

https://github.com/Nixon-H/CVE-2025-68147-OSPOS-Stored-XSS

jos1264@social.skynetcloud.site at 2025-12-18T01:30:00.000Z ##

CVE-2025-68147 - opensourcepos has a Cross-site Scripting vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67074
(6.5 MEDIUM)

EPSS: 0.07%

updated 2025-12-18T19:16:34.560000

1 posts

A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in Tenda AC10V4.0 V16.03.10.20 allows remote attackers to cause denial of service and possibly code execution by sending a post request with a crafted payload (field `serverName`) to /goform/AdvSetMacMtuWan.

CVE-2025-65568
(0 None)

EPSS: 0.00%

updated 2025-12-18T19:16:34.300000

1 posts

A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2.1.3-dev. After PFCP association, a PFCP Session Establishment Request that includes a CreateFAR with an empty or truncated IPv4 address field is not properly validated. During parsing, parseFAR() calls ip2int(), which performs an out-of-bounds read on the IPv4 address buffer and tr

jos1264@social.skynetcloud.site at 2025-12-18T20:30:01.000Z ##

CVE-2025-65568 - OmeC-Project UPF pfcpiface Denial-of-Service Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65565
(0 None)

EPSS: 0.00%

updated 2025-12-18T19:16:34.080000

1 posts

A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2.1.3-dev. After PFCP association is established, a PFCP Session Establishment Request that is missing the mandatory F-SEID (CPF-SEID) Information Element is not properly validated. The session establishment handler calls IE.FSEID() on a nil pointer, which triggers a panic and termin

jos1264@social.skynetcloud.site at 2025-12-18T20:30:00.000Z ##

CVE-2025-65565 - "OmeC-Project UPF pfcpiface Denial-of-Service Vulnerability" cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14879
(9.8 CRITICAL)

EPSS: 0.00%

updated 2025-12-18T19:16:22.227000

3 posts

A weakness has been identified in Tenda WH450 1.0.0.18. Affected is an unknown function of the file /goform/onSSIDChange of the component HTTP Request Handler. This manipulation of the argument ssid_index causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

CVE-2025-14739
(0 None)

EPSS: 0.00%

updated 2025-12-18T19:16:21.680000

2 posts

Access of Uninitialized Pointer vulnerability in TP-Link WR940N and WR941ND allows local unauthenticated attackers the ability to execute DoS attack and potentially arbitrary code execution under the context of the ‘root’ user.This issue affects WR940N and WR941ND: ≤ WR940N v5 3.20.1 Build 200316, ≤ WR941ND v6 3.16.9 Build 151203.

CVE-2023-53933
(8.8 HIGH)

EPSS: 0.24%

updated 2025-12-18T19:16:20.433000

1 posts

Serendipity 2.4.0 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files with .phar extension. Attackers can upload files with system command payloads to the media upload endpoint and execute arbitrary commands on the server.

jos1264@social.skynetcloud.site at 2025-12-18T01:30:00.000Z ##

CVE-2023-53933 - Serendipity 2.4.0 Authenticated Remote Code Execution via File Upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-37164
(10.0 CRITICAL)

EPSS: 0.25%

updated 2025-12-18T18:31:33

1 posts

A remote code execution issue exists in HPE OneView.

1 repos

https://github.com/rxerium/CVE-2025-37164

beyondmachines1@infosec.exchange at 2025-12-18T10:01:31.000Z ##

Critical remote code execution flaw reported in HPE OneView

HPE OneView has a critical unauthenticated remote code execution vulnerability (CVE-2025-37164) with a maximum CVSS score of 10.0, affecting all versions prior to 11.00. HPE has released version 11.00 as a patch and provides hotfixes for older versions to address this severe security flaw.

**Make sure all HPE OneView systems are isolated from the internet and accessible only from trusted networks. Reach out to HPE for details and plan a quick upgrade to version 11.00 or apply the appropriate hotfix for your current version (5.20-10.20).**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-63390(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-18T18:30:37

2 posts

An authentication bypass vulnerability exists in AnythingLLM v1.8.5 in via the /api/workspaces endpoint. The endpoint fails to implement proper authentication checks, allowing unauthenticated remote attackers to enumerate and retrieve detailed information about all configured workspaces. Exposed data includes: workspace identifiers (id, name, slug), AI model configurations (chatProvider, chatModel

CVE-2025-63389(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-18T18:30:37

2 posts

A critical authentication bypass vulnerability exists in Ollama platform's API endpoints in versions prior to and including v0.12.3. The platform exposes multiple API endpoints without requiring authentication, enabling remote attackers to perform unauthorized model management operations.

cR0w at 2025-12-18T15:29:52.483Z ##

Go hack more AI shit.

cve.org/CVERecord?id=CVE-2025-

A critical authentication bypass vulnerability exists in Ollama platform's API endpoints in versions prior to and including v0.12.3. The platform exposes multiple API endpoints without requiring authentication, enabling remote attackers to perform unauthorized model management operations.

##

cR0w@infosec.exchange at 2025-12-18T15:29:52.000Z ##

Go hack more AI shit.

cve.org/CVERecord?id=CVE-2025-

A critical authentication bypass vulnerability exists in Ollama platform's API endpoints in versions prior to and including v0.12.3. The platform exposes multiple API endpoints without requiring authentication, enabling remote attackers to perform unauthorized model management operations.

##

CVE-2025-64236
(9.8 CRITICAL)

EPSS: 0.00%

updated 2025-12-18T18:30:37

1 posts

Authentication Bypass Using an Alternate Path or Channel vulnerability in AmentoTech Tuturn allows Authentication Abuse.This issue affects Tuturn: from n/a before 3.6.

jos1264@social.skynetcloud.site at 2025-12-18T19:15:01.000Z ##

CVE-2025-64236 - WordPress Tuturn plugin < 3.6 - Broken Authentication vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14896
(7.5 HIGH)

EPSS: 0.00%

updated 2025-12-18T18:30:37

1 posts

due to insufficient sanitazation in Vega’s `convert()` function when `safeMode` is enabled and the spec variable is an array. An attacker can craft a malicious Vega diagram specification that will allow them to send requests to any URL, including local file system paths, leading to exposure of sensitive information.

CVE-2025-63391
(7.5 HIGH)

EPSS: 0.00%

updated 2025-12-18T18:15:45.587000

2 posts

An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api/config endpoint. The endpoint lacks proper authentication and authorization controls, exposing sensitive system configuration data to unauthenticated remote attackers.

cR0w at 2025-12-18T15:31:10.304Z ##

Auth bypass in Open-WebUI.

cve.org/CVERecord?id=CVE-2025-

An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api/config endpoint. The endpoint lacks proper authentication and authorization controls, exposing sensitive system configuration data to unauthenticated remote attackers.

##

cR0w@infosec.exchange at 2025-12-18T15:31:10.000Z ##

Auth bypass in Open-WebUI.

cve.org/CVERecord?id=CVE-2025-

An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api/config endpoint. The endpoint lacks proper authentication and authorization controls, exposing sensitive system configuration data to unauthenticated remote attackers.

##

CVE-2025-14738
(0 None)

EPSS: 0.00%

updated 2025-12-18T18:15:45.193000

2 posts

Improper authentication vulnerability in TP-Link WA850RE (httpd modules) allows unauthenticated attackers to download the configuration file.This issue affects: ≤ WA850RE V2_160527, ≤ WA850RE V3_160922.

CVE-2025-14737
(0 None)

EPSS: 0.00%

updated 2025-12-18T18:15:45.027000

2 posts

Command Injection vulnerability in TP-Link WA850RE (httpd modules) allows authenticated adjacent attacker to inject arbitrary commands.This issue affects: ≤ WA850RE V2_160527, ≤ WA850RE V3_160922.

CVE-2025-14884
(7.2 HIGH)

EPSS: 0.00%

updated 2025-12-18T17:15:47.480000

3 posts

A vulnerability was detected in D-Link DIR-605 202WWB03. Affected by this issue is some unknown functionality of the component Firmware Update Service. Performing manipulation results in command injection. The attack can be initiated remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVE-2025-68400
(8.8 HIGH)

EPSS: 0.03%

updated 2025-12-18T16:46:12.477000

1 posts

ChurchCRM is an open-source church management system. A SQL Injection vulnerability exists in the legacy endpoint `/Reports/ConfirmReportEmail.php` in ChurchCRM prior to version 6.5.3. Although the feature was removed from the UI, the file remains deployed and reachable directly via URL. This is a classic case of *dead but reachable code*. Any authenticated user - including one with zero assigned

jos1264@social.skynetcloud.site at 2025-12-17T22:45:01.000Z ##

CVE-2025-68400 - ChurchCRM vulnerable to time-based blind SQL Injection in ConfirmReportEmail.php cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14878
(9.8 CRITICAL)

EPSS: 0.00%

updated 2025-12-18T16:15:52.960000

3 posts

A security flaw has been discovered in Tenda WH450 1.0.0.18. This impacts an unknown function of the file /goform/wirelessRestart of the component HTTP Request Handler. The manipulation of the argument GO results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be exploited.

CVE-2025-14763
(5.3 MEDIUM)

EPSS: 0.01%

updated 2025-12-18T15:47:08

1 posts

## Summary S3 Encryption Client for Java is an open-source client-side encryption library used to facilitate writing and reading encrypted records to S3. When the encrypted data key (EDK) is stored in an "Instruction File" instead of S3's metadata record, the EDK is exposed to an "Invisible Salamanders" attack (https://eprint.iacr.org/2019/016), which could allow the EDK to be replaced with a

CVE-2025-14759
(5.3 MEDIUM)

EPSS: 0.01%

updated 2025-12-18T15:46:18

1 posts

## Summary S3 Encryption Client for .NET (S3EC) is an open-source client-side encryption library used to facilitate writing and reading encrypted records to S3. When the encrypted data key (EDK) is stored in an "Instruction File" instead of S3's metadata record, the EDK is exposed to an "Invisible Salamanders" attack (https://eprint.iacr.org/2019/016), which could allow the EDK to be replaced

CVE-2025-59374
(9.8 CRITICAL)

EPSS: 56.04%

updated 2025-12-18T15:42:03.790000

5 posts

"UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected. The Live Update client has

AAKL at 2025-12-18T17:51:46.239Z ##

New.

CISA Releases Nine Industrial Control Systems Advisories cisa.gov/news-events/alerts/20

KEV updates, from yesterday:

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025-

##

AAKL@infosec.exchange at 2025-12-18T17:51:46.000Z ##

New.

CISA Releases Nine Industrial Control Systems Advisories cisa.gov/news-events/alerts/20

KEV updates, from yesterday:

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #infosec #ASUS #Cisco #SonicWall

##

DarkWebInformer@infosec.exchange at 2025-12-18T02:57:36.000Z ##

🚨 CISA has added 3 vulnerabilities to the KEV Catalog

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability

darkwebinformer.com/cisa-kev-c

##

cisakevtracker@mastodon.social at 2025-12-17T21:00:59.000Z ##

CVE ID: CVE-2025-59374
Vendor: ASUS
Product: Live Update
Date Added: 2025-12-17
Notes: asus.com/support/faq/1018727/ ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

cR0w@infosec.exchange at 2025-12-17T20:43:21.000Z ##

EoL Asus Live Update was added to the KEV Catalog.

cve.org/CVERecord?id=CVE-2025-

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-20393
(10.0 CRITICAL)

EPSS: 4.03%

updated 2025-12-18T15:41:16.840000

18 posts

Cisco is aware of a potential vulnerability.&nbsp; Cisco is currently investigating and&nbsp;will update these details as appropriate&nbsp;as more information becomes available.

5 repos

https://github.com/StasonJatham/cisco-sa-sma-attack-N9bf4

https://github.com/KingHacker353/CVE-2025-20393

https://github.com/b1gchoi/CVE-2025-20393

https://github.com/thesystemowner/CVE-2025-20393-POC

https://github.com/cyberleelawat/CVE-2025-20393

PC_Fluesterer@social.tchncs.de at 2025-12-18T20:28:49.000Z ##

Cisco schon wieder Zero-Day Angriffe

Wer hat Cisco Appliances "Secure Email Gateway" (SEG) oder "Secure Email and Web Manager" (SEWM) in Betrieb? Herzliches Beileid! Nachdem ich gerade über Angriffe auf eine Zero-Day Sicherheitslücke in Cisco berichtet habe, folgt gleich die nächste "Sicherheitslücke" dieser Art. Die Sicherheitslücke CVE-2025-20393 mit dem Schweregrad 10 von 10 wurde von vermutlich chinesischen Akteuren bereits angegriffen, bevor sie öffentlich bekannt wurde. Der Hersteller hat bisher nur Empfehlungen zur Verminderung der Angriffsfläche zu bieten. Die beiden Appliances tragen "Secure"

pc-fluesterer.info/wordpress/2

#Allgemein #Empfehlung #Hintergrund #Warnung #0day #closedsource #cybercrime #firewall #router #sicherheit #UnplugTrump #vorbeugen #vorfälle #wissen #zeroday

##

DarkWebInformer at 2025-12-18T20:07:52.385Z ##

🚨 CVE-2025-20393: Script to detect for Cisco Secure Email Gateway And Cisco Secure Email and Web Manager

CVSS: 10

Currently no patch and zero-day

GitHub: github.com/StasonJatham/cisco-

##

Andy_Thompson at 2025-12-18T18:07:33.247Z ##

🔥 Cisco AsyncOS Zero-Day (CVE-2025-20393)
• BleepingComputer
bleepingcomputer.com/news/secu
• The Hacker News
thehackernews.com/2025/12/cisc
• SecurityWeek
securityweek.com/china-linked-
• The Register
theregister.com/2025/12/17/att
• Dark Reading (CISA KEV addition)
darkreading.com/attacks-breach
• SOCRadar analysis
socradar.io/blog/cve-2025-2039

##

AAKL at 2025-12-18T17:51:46.239Z ##

New.

CISA Releases Nine Industrial Control Systems Advisories cisa.gov/news-events/alerts/20

KEV updates, from yesterday:

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025-

##

AAKL at 2025-12-18T15:46:37.991Z ##

Security Week: China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear securityweek.com/china-linked- @SecurityWeek

Cisco:

- Critical: CVE-2025-20393: Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager sec.cloudapps.cisco.com/securi

- Critical: CVE-2025-55182: Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 sec.cloudapps.cisco.com/securi @TalosSecurity

##

DarkWebInformer@infosec.exchange at 2025-12-18T20:07:52.000Z ##

🚨 CVE-2025-20393: Script to detect for Cisco Secure Email Gateway And Cisco Secure Email and Web Manager

CVSS: 10

Currently no patch and zero-day

GitHub: github.com/StasonJatham/cisco-

##

Andy_Thompson@infosec.exchange at 2025-12-18T18:07:33.000Z ##

🔥 Cisco AsyncOS Zero-Day (CVE-2025-20393)
• BleepingComputer
bleepingcomputer.com/news/secu
• The Hacker News
thehackernews.com/2025/12/cisc
• SecurityWeek
securityweek.com/china-linked-
• The Register
theregister.com/2025/12/17/att
• Dark Reading (CISA KEV addition)
darkreading.com/attacks-breach
• SOCRadar analysis
socradar.io/blog/cve-2025-2039

##

AAKL@infosec.exchange at 2025-12-18T17:51:46.000Z ##

New.

CISA Releases Nine Industrial Control Systems Advisories cisa.gov/news-events/alerts/20

KEV updates, from yesterday:

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #infosec #ASUS #Cisco #SonicWall

##

golang@activitypub.awakari.com at 2025-12-18T16:45:45.000Z ## 🚩 Chinese-Nexus APT UAT-9686 Actively Compromises Cisco Secure Email Appliances and Drops AquaShell Persistence Chinese APT UAT-9686 exploits Cisco Email Gateway zero-day CVE-2025-20393 (CVSS 10...

#TIGR #cybercriminal #nation #state #vulnerability

Origin | Interest | Match ##

AAKL@infosec.exchange at 2025-12-18T15:46:37.000Z ##

Security Week: China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear securityweek.com/china-linked- @SecurityWeek

Cisco:

- Critical: CVE-2025-20393: Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager sec.cloudapps.cisco.com/securi

- Critical: CVE-2025-55182: Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability #zeroday

##

beyondmachines1@infosec.exchange at 2025-12-18T14:01:31.000Z ##

Cisco Email Security appliances actively exploited

Cisco is warning of an active cyberattack campaign exploiting a critical zero-day vulnerability (CVE-2025-20393) in Cisco Secure Email Gateway and Email and Web Manager appliances, allowing attackers to execute arbitrary commands with root privileges. The flaw affects appliances with the Spam Quarantine feature enabled and exposed to the internet. Atacks date back to late November 2025.

**If you have Cisco Secure Email Gateway or Cisco Email and Web Manager appliances, this is urgent: Immediately check if the Spam Quarantine feature is enabled and exposed to the public ports - if it is, disable it on all public ports until a patch is available for CVE-2025-20393. If your appliance may have been compromised, contact Cisco support and prepare to rebuild the system from scratch. This is currently the only way to fully remove the threat from a compromised system.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

decio@infosec.exchange at 2025-12-18T13:14:47.000Z ##

[VULN] ⚠️ Zero‑day sur les appliances e‑mail Cisco : compromission, backdoors et logs effacés
👇
cyberveille.ch/posts/2025-12-1

🔗 Source originale : helpnetsecurity.com/2025/12/17

Advisory officiel:

sec.cloudapps.cisco.com/securi

Analyse de Cisco Talos:

UAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web Manager

Résumé FR ➡️ Campagne UAT-9686: un APT à nexus chinois cible Cisco Secure Email via le backdoor AquaShell

💬
⬇️
infosec.pub/post/39234259

#CyberVeille #0day #Cisco

##

DarkWebInformer@infosec.exchange at 2025-12-18T02:57:36.000Z ##

🚨 CISA has added 3 vulnerabilities to the KEV Catalog

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability

darkwebinformer.com/cisa-kev-c

##

campuscodi@mastodon.social at 2025-12-17T22:36:28.000Z ##

A suspected Chinese APT is exploiting a new Cisco zero-day

-impacts Cisco Secure Email Gateway And Cisco Secure Email and Web Manager
-CVE-2025-20393
-CVSS score: 10
-APT is UAT-9686

blog.talosintelligence.com/uat

##

zl2tod@mastodon.online at 2025-12-17T21:13:52.000Z ##

@cisakevtracker

Severity: 10.0

CVE ID: CVE-2025-20393
Vendor: Cisco
Product: Multiple Products
Date Added: 2025-12-17

nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2025-12-17T21:01:30.000Z ##

CVE ID: CVE-2025-20393
Vendor: Cisco
Product: Multiple Products
Date Added: 2025-12-17
Notes: Please adhere to Cisco's guidelines to assess exposure and mitigate risks. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

christopherkunz@chaos.social at 2025-12-17T21:00:41.000Z ##

@ljrk OK, two more Fleißsternchen for SonicWall: psirt.global.sonicwall.com/vul
And for Cisco: cve.org/CVERecord?id=CVE-2025-
Kudos to both for making CISA KEV on 0day (it seems).

##

jos1264@social.skynetcloud.site at 2025-12-17T20:15:01.000Z ##

Cisco email security appliances rooted and backdoored via still unpatched zero-day helpnetsecurity.com/2025/12/17 #cyberespionage #emailsecurity #enterprise #Don'tmiss #Hotstuff #backdoor #China #Cisco #News #APT

##

CVE-2025-64466
(7.8 HIGH)

EPSS: 0.00%

updated 2025-12-18T15:30:52

1 posts

There is an out of bounds read vulnerability in NI LabVIEW in lvre!ExecPostedProcRecPost() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64466 - Out-of-Bounds Read in lvre!ExecPostedProcRecPost() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64469
(7.8 HIGH)

EPSS: 0.00%

updated 2025-12-18T15:30:51

1 posts

There is a stack-based buffer overflow vulnerability in NI LabVIEW in LVResFile::FindRsrcListEntry() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64469 - Stack-based Buffer Overflow in LVResource::DetachResource() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64468
(7.8 HIGH)

EPSS: 0.00%

updated 2025-12-18T15:30:51

1 posts

There is a use-after-free vulnerability in sentry!sentry_span_set_data() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64468 - Use-after-Free in sentry!sentry_span_set_data() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13110
(4.3 MEDIUM)

EPSS: 0.00%

updated 2025-12-18T15:30:51

1 posts

The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.3.7.3 via the "woof_add_subscr" function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with subscriber level access and above, to create product messenger subscriptions on be

jos1264@social.skynetcloud.site at 2025-12-18T15:15:01.000Z ##

CVE-2025-13110 - HUSKY – Products Filter Professional for WooCommerce <= 1.3.7.3 - Authenticated (Subscriber+) Insecure Direct Object Reference via 'woof_add_subscr' cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14618
(4.3 MEDIUM)

EPSS: 0.00%

updated 2025-12-18T15:30:51

1 posts

The Sweet Energy Efficiency plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on the 'sweet_energy_efficiency_action' AJAX handler in all versions up to, and including, 1.0.6. This makes it possible for authenticated attackers, with subscriber level access and above, to read, modify, and delete arbitrary graphs.

jos1264@social.skynetcloud.site at 2025-12-18T15:15:01.000Z ##

CVE-2025-14618 - Sweet Energy Efficiency <= 1.0.6 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Graph Deletion cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65007(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-18T15:30:51

1 posts

In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) due to lack of authentication in the configuration change module in the adm.cgi endpoint, the unauthenticated attacker can execute commands including backup creation, device restart and resetting the device to factory settings. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerabil

CVE-2025-64465
(7.8 HIGH)

EPSS: 0.00%

updated 2025-12-18T15:30:45

1 posts

There is an out of bounds read vulnerability in NI LabVIEW in lvre!DataSizeTDR() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64465 - Out-of-Bounds Read in lvre!DataSizeTDR() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64467
(7.8 HIGH)

EPSS: 0.00%

updated 2025-12-18T15:15:58.893000

1 posts

There is an out of bounds read vulnerability in NI LabVIEW in LVResFile::FindRsrcListEntry() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64467 - Out-of-Bounds Read in LVResFile::FindRsrcListEntry() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-53000
(0 None)

EPSS: 0.02%

updated 2025-12-18T15:15:54.730000

1 posts

The nbconvert tool, jupyter nbconvert, converts Jupyter notebooks to various other formats via Jinja templates. Versions of nbconvert up to and including 7.16.6 on Windows have a vulnerability in which converting a notebook containing SVG output to a PDF results in unauthorized code execution. Specifically, a third party can create a `inkscape.bat` file that defines a Windows batch script, capable

jos1264@social.skynetcloud.site at 2025-12-17T22:30:02.000Z ##

CVE-2025-53000 - nbconvert has an uncontrolled search path that leads to unauthorized code execution on Windows cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68154
(8.1 HIGH)

EPSS: 0.12%

updated 2025-12-18T15:08:06.237000

2 posts

systeminformation is a System and OS information library for node.js. In versions prior to 5.27.14, the `fsSize()` function in systeminformation is vulnerable to OS command injection on Windows systems. The optional `drive` parameter is directly concatenated into a PowerShell command without sanitization, allowing arbitrary command execution when user-controlled input reaches this function. The ac

beyondmachines1 at 2025-12-18T17:01:32.071Z ##

Command injection flaw reported in Node.js systeminformation package

A command injection vulnerability (CVE-2025-68154) in the systeminformation Node.js library's fsSize() function allows attackers to execute arbitrary PowerShell commands on Windows systems through unsanitized user input in the drive parameter. The vulnerability has been patched in version 5.27.14.

**If you're using the systeminformation Node.js library on Windows, plan an upgrade to version 5.27.14 or newer to patch this command injection flaw. Review all applications using this library, especially web APIs or tools that accept user input for disk queries, to ensure they're running the patched version.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2025-12-18T17:01:32.000Z ##

Command injection flaw reported in Node.js systeminformation package

A command injection vulnerability (CVE-2025-68154) in the systeminformation Node.js library's fsSize() function allows attackers to execute arbitrary PowerShell commands on Windows systems through unsanitized user input in the drive parameter. The vulnerability has been patched in version 5.27.14.

**If you're using the systeminformation Node.js library on Windows, plan an upgrade to version 5.27.14 or newer to patch this command injection flaw. Review all applications using this library, especially web APIs or tools that accept user input for disk queries, to ensure they're running the patched version.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-47372
(9.0 CRITICAL)

EPSS: 0.02%

updated 2025-12-18T15:07:42.550000

1 posts

Memory Corruption when a corrupted ELF image with an oversized file size is read into a buffer without authentication.

jos1264@social.skynetcloud.site at 2025-12-18T07:45:00.000Z ##

CVE-2025-47372 - Buffer Copy Without Checking Size of Input in Boot cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-47387
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-18T15:07:42.550000

1 posts

Memory Corruption when processing IOCTLs for JPEG data without verification.

CVE-2025-47382
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-18T15:07:42.550000

1 posts

Memory corruption while loading an invalid firmware in boot loader.

CVE-2025-14856
(6.3 MEDIUM)

EPSS: 0.04%

updated 2025-12-18T15:07:42.550000

1 posts

A security vulnerability has been detected in y_project RuoYi up to 4.8.1. The affected element is an unknown function of the file /monitor/cache/getnames. Such manipulation of the argument fragment leads to code injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.

CVE-2025-66029
(7.6 HIGH)

EPSS: 0.03%

updated 2025-12-18T15:07:42.550000

1 posts

Open OnDemand provides remote web access to supercomputers. In versions 4.0.8 and prior, the Apache proxy allows sensitive headers to be passed to origin servers. This means malicious users can create an origin server on a compute node that record these headers when unsuspecting users connect to it. Maintainers anticipate a patch in a 4.1 release. Workarounds exist for 4.0.x versions. Using `custo

offseq@infosec.exchange at 2025-12-18T04:34:35.000Z ##

🚨 CVE-2025-66029 (HIGH): OSC ondemand ≤4.0.8 exposes sensitive creds via Apache proxy headers—attackers can harvest tokens if users hit malicious servers. Patch in v4.1; config workarounds available now. Details: radar.offseq.com/threat/cve-20 #OffSeq #HPC #Vuln #Security

##

CVE-2025-68435
(9.1 CRITICAL)

EPSS: 0.07%

updated 2025-12-18T15:07:42.550000

2 posts

Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix h

jos1264@social.skynetcloud.site at 2025-12-18T02:45:00.000Z ##

CVE-2025-68435 - Zerobyte has Authentication Bypass by Primary Weakness cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-18T01:30:00.000Z ##

CVE-2025-68435 - Zerobyte has Authentication Bypass by Primary Weakness cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68129
(6.8 MEDIUM)

EPSS: 0.06%

updated 2025-12-18T15:07:42.550000

1 posts

Auth0-PHP is a PHP SDK for Auth0 Authentication and Management APIs. In applications built with the Auth0-PHP SDK, the audience validation in access tokens is performed improperly. Without proper validation, affected applications may accept ID tokens as Access tokens. Projects are affected if they use Auth0-PHP SDK versions between v8.0.0 and v8.17.0, or applications using the following SDKs that

jos1264@social.skynetcloud.site at 2025-12-17T22:45:01.000Z ##

CVE-2025-68129 - Auth0-PHP SDK has Improper Audience Validation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67073
(9.8 CRITICAL)

EPSS: 0.15%

updated 2025-12-18T15:07:42.550000

1 posts

A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in Tenda AC10V4.0 V16.03.10.20 allows remote attackers to cause denial of service and possibly code execution by sending a post request with a crafted payload (field `serviceName`) to /goform/AdvSetMacMtuWan.

jos1264@social.skynetcloud.site at 2025-12-17T22:30:01.000Z ##

CVE-2025-67073 - Tenda HTTPd Buffer Overflow Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14762
(5.3 MEDIUM)

EPSS: 0.02%

updated 2025-12-18T15:07:42.550000

1 posts

Missing cryptographic key commitment in the AWS SDK for Ruby may allow a user with write access to the S3 bucket to introduce a new EDK that decrypts to different plaintext when the encrypted data key is stored in an "instruction file" instead of S3's metadata record. To mitigate this issue, upgrade AWS SDK for Ruby to version 1.208.0 or later.

CVE-2025-14760
(5.3 MEDIUM)

EPSS: 0.02%

updated 2025-12-18T15:07:42.550000

1 posts

Missing cryptographic key commitment in the AWS SDK for C++ may allow a user with write access to the S3 bucket to introduce a new EDK that decrypts to different plaintext when the encrypted data key is stored in an "instruction file" instead of S3's metadata record. To mitigate this issue, upgrade AWS SDK for C++ to version 1.11.712 or later

CVE-2025-14761
(5.3 MEDIUM)

EPSS: 0.02%

updated 2025-12-18T15:07:42.550000

1 posts

Missing cryptographic key commitment in the AWS SDK for PHP may allow a user with write access to the S3 bucket to introduce a new EDK that decrypts to different plaintext when the encrypted data key is stored in an "instruction file" instead of S3's metadata record. To mitigate this issue, upgrade AWS SDK for PHP to version 3.368.0 or later

CVE-2025-14764
(5.3 MEDIUM)

EPSS: 0.01%

updated 2025-12-18T15:07:42.550000

1 posts

Missing cryptographic key commitment in the Amazon S3 Encryption Client for Go may allow a user with write access to the S3 bucket to introduce a new EDK that decrypts to different plaintext when the encrypted data key is stored in an "instruction file" instead of S3's metadata record. To mitigate this issue, upgrade Amazon S3 Encryption Client for Go to version 4.0 or later.

CVE-2025-65203
(7.1 HIGH)

EPSS: 0.01%

updated 2025-12-18T15:07:42.550000

1 posts

KeePassXC-Browser thru 1.9.9.2 autofills or prompts to fill stored credentials into documents rendered under a browser-enforced CSP directive and iframe attribute sandbox, allowing attacker-controlled script in the sandboxed document to access populated form fields and exfiltrate credentials.

jos1264@social.skynetcloud.site at 2025-12-17T20:00:01.000Z ##

CVE-2025-65203 - KeePassXC-Browser thru 1.9.9.2 autofills or prompt cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-40602
(6.6 MEDIUM)

EPSS: 1.71%

updated 2025-12-18T15:07:18.427000

5 posts

A local privilege escalation vulnerability due to insufficient authorization in the SonicWall SMA1000 appliance management console (AMC).

1 repos

https://github.com/rxerium/CVE-2025-40602

AAKL at 2025-12-18T17:51:46.239Z ##

New.

CISA Releases Nine Industrial Control Systems Advisories cisa.gov/news-events/alerts/20

KEV updates, from yesterday:

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025-

##

AAKL@infosec.exchange at 2025-12-18T17:51:46.000Z ##

New.

CISA Releases Nine Industrial Control Systems Advisories cisa.gov/news-events/alerts/20

KEV updates, from yesterday:

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #infosec #ASUS #Cisco #SonicWall

##

DarkWebInformer@infosec.exchange at 2025-12-18T02:57:36.000Z ##

🚨 CISA has added 3 vulnerabilities to the KEV Catalog

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability

darkwebinformer.com/cisa-kev-c

##

cisakevtracker@mastodon.social at 2025-12-17T21:01:14.000Z ##

CVE ID: CVE-2025-40602
Vendor: SonicWall
Product: SMA1000 appliance
Date Added: 2025-12-17
Notes: Check for signs of potential compromise on all internet accessible SonicWall SMA1000 instances after applying mitigations. For more information please see: psirt.global.sonicwall.com/vul ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

jos1264@social.skynetcloud.site at 2025-12-17T20:15:01.000Z ##

SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances thehackernews.com/2025/12/soni

##

CVE-2025-14437
(7.5 HIGH)

EPSS: 0.00%

updated 2025-12-18T15:07:18.427000

1 posts

The Hummingbird Performance plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.18.0 via the 'request' function. This makes it possible for unauthenticated attackers to extract sensitive data including Cloudflare API credentials.

jos1264@social.skynetcloud.site at 2025-12-18T15:15:01.000Z ##

CVE-2025-14437 - Hummingbird <= 3.18.0 - Unauthenticated Sensitive Information Exposure via Log File cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14277
(4.3 MEDIUM)

EPSS: 0.00%

updated 2025-12-18T15:07:18.427000

1 posts

The Prime Slider – Addons for Elementor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 4.0.9 via the import_elementor_template AJAX action. This makes it possible for authenticated attackers, with subscriber level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and m

jos1264@social.skynetcloud.site at 2025-12-18T15:15:01.000Z ##

CVE-2025-14277 - Prime Slider – Addons for Elementor <= 4.0.9 - Authenticated (Subscriber+) Server-Side Request Forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64374
(0 None)

EPSS: 0.02%

updated 2025-12-18T15:07:18.427000

1 posts

Unrestricted Upload of File with Dangerous Type vulnerability in StylemixThemes Motors motors allows Using Malicious Files.This issue affects Motors: from n/a through <= 5.6.81.

beyondmachines1@infosec.exchange at 2025-12-18T09:01:32.000Z ##

Critical arbitrary file upload flaw reported in WordPress Motors theme

A critical vulnerability (CVE-2025-64374) in the Motors WordPress theme versions 5.6.81 and below allows any authenticated user with Subscriber-level access to upload and activate malicious plugins, potentially leading to complete website takeover due to missing permission checks.

**If you're using the Motors WordPress theme (version 5.6.81 or below), this is important and probably urgent. Plan a quick upgrade to version 5.6.82 or later. Review all user accounts with Subscriber-level or higher privileges and check for any unauthorized plugins that may have been installed.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-10910(CVSS UNKNOWN)

EPSS: 0.19%

updated 2025-12-18T12:30:33

2 posts

A flaw in the binding process of Govee’s cloud platform and devices allows a remote attacker to bind an existing, online Govee device to the attacker’s account, resulting in full control of the device and removal of the device from its legitimate owner’s account. The server‑side API allows device association using a set of identifiers: "device", "sku", "type", and a client‑computed "value", that a

jos1264@social.skynetcloud.site at 2025-12-18T15:15:01.000Z ##

CVE-2025-10910 - Gaining remote control over Govee devices cvefeed.io/vuln/detail/CVE-202

##

cR0w@infosec.exchange at 2025-12-18T14:23:26.000Z ##

cert.pl/en/posts/2025/12/CVE-2

A flaw in the binding process of Govee’s cloud platform and devices allows a remote attacker to bind an existing, online Govee device to the attacker’s account, resulting in full control of the device and removal of the device from its legitimate owner’s account.

#internetOfShit

##

CVE-2025-68459
(7.2 HIGH)

EPSS: 0.17%

updated 2025-12-18T06:30:19

2 posts

RG - AP180, Indoor Wall Plate Wireless AP AP180 series provided by Ruijie Networks Co., Ltd. contain an OS command injection vulnerability. An arbitrary OS command may be executed on the product by an attacker who logs in to the CLI service.

jos1264@social.skynetcloud.site at 2025-12-18T07:45:00.000Z ##

CVE-2025-68459 - Ruijie Networks Co., Ltd. AP180 Command Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-18T07:15:00.000Z ##

CVE-2025-68459 - Ruijie Networks Co., Ltd. AP180 Command Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68463
(4.9 MEDIUM)

EPSS: 0.03%

updated 2025-12-18T06:30:19

1 posts

Bio.Entrez in Biopython through 186 allows doctype XXE.

CVE-2025-68462
(3.2 LOW)

EPSS: 0.01%

updated 2025-12-18T06:30:19

1 posts

Freedombox before 25.17.1 does not set proper permissions for the backups-data directory, allowing the reading of dump files of databases.

jos1264@social.skynetcloud.site at 2025-12-18T07:15:01.000Z ##

CVE-2025-68462 - Freedombox Unauthenticated Database Backup File Disclosure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12885
(6.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-18T03:30:18

1 posts

The Embed Any Document – Embed PDF, Word, PowerPoint and Excel Files plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the sanitize_pdf_src function regex bypass in all versions up to, and including, 2.7.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary

jos1264@social.skynetcloud.site at 2025-12-18T04:45:00.000Z ##

CVE-2025-12885 - Embed Any Document <= 2.7.10 - Authenticated (Contributor+) Stored Cross-Site Scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14841
(3.3 LOW)

EPSS: 0.01%

updated 2025-12-18T03:30:18

1 posts

A flaw has been found in OFFIS DCMTK up to 3.6.9. The impacted element is the function DcmQueryRetrieveIndexDatabaseHandle::startFindRequest/DcmQueryRetrieveIndexDatabaseHandle::startMoveRequest in the library dcmqrdb/libsrc/dcmqrdbi.cc of the component dcmqrscp. This manipulation causes null pointer dereference. The attack requires local access. Upgrading to version 3.7.0 is sufficient to resolve

jos1264@social.skynetcloud.site at 2025-12-18T04:45:00.000Z ##

CVE-2025-14841 - OFFIS DCMTK dcmqrscp dcmqrdbi.cc startMoveRequest null pointer dereference cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14837
(4.7 MEDIUM)

EPSS: 0.04%

updated 2025-12-18T00:34:16

1 posts

A vulnerability has been found in ZZCMS 2025. Affected by this issue is the function stripfxg of the file /admin/siteconfig.php of the component Backend Website Settings Module. Such manipulation of the argument icp leads to code injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.

jos1264@social.skynetcloud.site at 2025-12-18T02:45:00.000Z ##

CVE-2025-14837 - ZZCMS Backend Website Settings siteconfig.php stripfxg code injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14202(CVSS UNKNOWN)

EPSS: 0.05%

updated 2025-12-18T00:34:16

2 posts

A vulnerability in the file upload at bookmark + asset rendering pipeline allows an attacker to upload a malicious SVG file with JavaScript content. When an authenticated admin user views the SVG file with embedded JavaScript code of shared bookmark, JavaScript executes in the admin’s browser, retrieves the CSRF token, and sends a request to change the admin's password resulting in a full account

jos1264@social.skynetcloud.site at 2025-12-18T02:45:00.000Z ##

CVE-2025-14202 - Cross-Site Request Forgery (CSRF) Leading to Account Takeover via SVG File Upload cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-18T01:30:01.000Z ##

CVE-2025-14202 - Cross-Site Request Forgery (CSRF) Leading to Account Takeover via SVG File Upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67172
(7.2 HIGH)

EPSS: 0.24%

updated 2025-12-17T21:31:53

1 posts

RiteCMS v3.1.0 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the parse_special_tags() function.

jos1264@social.skynetcloud.site at 2025-12-17T20:00:01.000Z ##

CVE-2025-67172 - RiteCMS Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66924
(6.1 MEDIUM)

EPSS: 0.04%

updated 2025-12-17T21:31:53

1 posts

A Cross-site scripting (XSS) vulnerability in Create/Update Item Kit(s) in Open Source Point of Sale v3.4.1 allows remote attackers to inject arbitrary web script or HTML via the "name" parameter.

jos1264@social.skynetcloud.site at 2025-12-17T20:00:01.000Z ##

CVE-2025-66924 - Open Source Point of Sale XSS Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66923
(7.2 HIGH)

EPSS: 0.10%

updated 2025-12-17T21:31:52

1 posts

A Cross-site scripting (XSS) vulnerability in Create/Update Customer(s) in Open Source Point of Sale v3.4.1 allows remote attackers to inject arbitrary web script or HTML via the phone_number parameter.

jos1264@social.skynetcloud.site at 2025-12-17T20:00:01.000Z ##

CVE-2025-66923 - Open Source Point of Sale XSS Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-34437(CVSS UNKNOWN)

EPSS: 0.10%

updated 2025-12-17T21:30:56

1 posts

AVideo versions prior to 20.0 permit any authenticated user to upload comment images to videos owned by other users. The endpoint validates authentication but omits ownership checks, allowing attackers to perform unauthorized uploads to arbitrary video objects.

jos1264@social.skynetcloud.site at 2025-12-17T22:30:01.000Z ##

CVE-2025-34437 - AVideo < 20.0 IDOR Arbitrary Comment Image Upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-34436(CVSS UNKNOWN)

EPSS: 0.10%

updated 2025-12-17T21:30:56

1 posts

AVideo versions prior to 20.0 allow any authenticated user to upload files into directories belonging to other users due to an insecure direct object reference. The upload functionality verifies authentication but does not enforce ownership checks.

CVE-2025-13326
(3.9 LOW)

EPSS: 0.01%

updated 2025-12-17T21:30:56

1 posts

Mattermost Desktop App versions <6.0.0 fail to enable the Hardened Runtime on the Mattermost Desktop App when packaged for Mac App Store which allows an attacker to inherit TCC permissions via copying the binary to a tmp folder.

jos1264@social.skynetcloud.site at 2025-12-17T20:00:01.000Z ##

CVE-2025-13326 - Mattermost Desktop App fails to enable Hardened Runtime when packaged for Mac App Store cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59718
(9.8 CRITICAL)

EPSS: 5.57%

updated 2025-12-17T13:54:45.390000

4 posts

A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7

2 repos

https://github.com/Ashwesker/Blackash-CVE-2025-59718

https://github.com/exfil0/CVE-2025-59718-PoC

AAKL at 2025-12-18T18:32:45.451Z ##

New. This relates to two vulnerabilities disclosed by Fortinet last week: CVE-2025-59718 and CVE-2025-59719.

VulnCheck: FortiCloud SSO Login Bypass Vulnerabilities Exploited in the Wild vulncheck.com/blog/forticloud- @vulncheck

##

hbrpgm@adalta.social at 2025-12-18T18:33:36.000Z ##

📰 ** Information Briefing: **

✨ FortiCloud SSO Login Bypass: Exploited in the Wild
- Critical vulnerabilities: CVE-2025-59718 and CVE-2025-59719
- Unauthenticated adversaries bypass FortiCloud SSO login
- Exploitation observed in the wild
- Affected products: FortiOS, FortiProxy, FortiSwitchManager, FortiWeb

🔗 adalta.info/pdf/index.html?tit
(Available in 🇩🇪 🇺🇸 🇫🇷)

#AISummary #Bot

##

AAKL@infosec.exchange at 2025-12-18T18:32:45.000Z ##

New. This relates to two vulnerabilities disclosed by Fortinet last week: CVE-2025-59718 and CVE-2025-59719.

VulnCheck: FortiCloud SSO Login Bypass Vulnerabilities Exploited in the Wild vulncheck.com/blog/forticloud- @vulncheck #infosec #Fortinet #threatresearch

##

catc0n@infosec.exchange at 2025-12-18T15:28:05.000Z ##

We wrote a little bit on FortiCloud SSO login bypass CVE-2025-59718 (and 59719). Both the known PoCs for the former are fake / invalid. There does appear to be real exploitation evidence, but detections based on fake PoCs ain't it (and it seems like that's where a lot of chatter is coming from)

vulncheck.com/blog/forticloud-

##

CVE-2025-68260(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-16T15:30:56

2 posts

In the Linux kernel, the following vulnerability has been resolved: rust_binder: fix race condition on death_list Rust Binder contains the following unsafe operation: // SAFETY: A `NodeDeath` is never inserted into the death list // of any node other than its owner, so it is either in this // death list or in no death list. unsafe { node_inner.death_list.remove(self) }; This operation is u

Linux-Maintainers@activitypub.awakari.com at 2025-12-18T16:10:07.000Z ## Linux Kernel’s First Rust CVE: Race Condition in Binder Driver The Linux kernel has assigned its first CVE to Rust code: CVE-2025-68260, a race condition in the Rust-rewritten Android Binder driv...

#CybersecurityUpdate #DevNews #Android #Binder #driver #CVE-2025-68260 #Linux #kernel #Rust #CVE #Rust

Origin | Interest | Match ##

rustaceans@mastodon.social at 2025-12-17T23:44:42.000Z ##

Linux Kernel Rust Code Sees Its First CVE Vulnerability

#rust #rustlang #programming

lore.kernel.org/linux-cve-anno

##

CVE-2025-66471
(7.5 HIGH)

EPSS: 0.02%

updated 2025-12-10T16:10:33.500000

1 posts

urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can

mmguero@infosec.exchange at 2025-12-18T14:46:11.000Z ##

Malcolm v25.12.1 contains a few critical bug fixes and component version updates.

github.com/idaholab/Malcolm/co

  • ✨ Features and enhancements
    • Installer splash screen shows "HEDGEHOG" when using Hedgehog run profile
  • ✅ Component version updates
  • 🐛 Bug fixes
    • Changed field used in Threat Intelligence dashboard's file type table from zeek.intel.file_mime_type to file.mime_type so filters created from it can work on other dashboards
    • link for threat intelligence URL doesn't work correctly from dashboards (behind reverse proxy) (#832)
    • self-signed certificates not accepted by Chrome (#833)
    • Malcolm ISO installer's automatic partitioning may create too-small /var partition (#835)
  • 🧹 Code and project maintenance

Malcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻‍♀️.

Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.

Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.

As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.

#Malcolm #HedgehogLinux #Zeek #Arkime #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #INL

##

CVE-2025-59719
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-12-09T19:59:29.507000

3 posts

An improper verification of cryptographic signature vulnerability in Fortinet FortiWeb 8.0.0, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9 may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.

AAKL at 2025-12-18T18:32:45.451Z ##

New. This relates to two vulnerabilities disclosed by Fortinet last week: CVE-2025-59718 and CVE-2025-59719.

VulnCheck: FortiCloud SSO Login Bypass Vulnerabilities Exploited in the Wild vulncheck.com/blog/forticloud- @vulncheck

##

hbrpgm@adalta.social at 2025-12-18T18:33:36.000Z ##

📰 ** Information Briefing: **

✨ FortiCloud SSO Login Bypass: Exploited in the Wild
- Critical vulnerabilities: CVE-2025-59718 and CVE-2025-59719
- Unauthenticated adversaries bypass FortiCloud SSO login
- Exploitation observed in the wild
- Affected products: FortiOS, FortiProxy, FortiSwitchManager, FortiWeb

🔗 adalta.info/pdf/index.html?tit
(Available in 🇩🇪 🇺🇸 🇫🇷)

#AISummary #Bot

##

AAKL@infosec.exchange at 2025-12-18T18:32:45.000Z ##

New. This relates to two vulnerabilities disclosed by Fortinet last week: CVE-2025-59718 and CVE-2025-59719.

VulnCheck: FortiCloud SSO Login Bypass Vulnerabilities Exploited in the Wild vulncheck.com/blog/forticloud- @vulncheck #infosec #Fortinet #threatresearch

##

CVE-2025-41750
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:36:53.557000

1 posts

An XSS vulnerability in pxc_PortCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device confi

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41752
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:36:53.557000

1 posts

An XSS vulnerability in pxc_portSfp.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device confi

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41694
(6.5 MEDIUM)

EPSS: 0.11%

updated 2025-12-09T18:36:53.557000

1 posts

A low privileged remote attacker can run the webshell with an empty command containing whitespace. The server will then block until it receives more data, resulting in a DoS condition of the websserver.

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41747
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:36:53.557000

1 posts

An XSS vulnerability in pxc_vlanIntfCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to devic

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41695
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:36:53.557000

1 posts

An XSS vulnerability in dyn_conn.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device confi

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41746
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:36:53.557000

1 posts

An XSS vulnerability in pxc_portSecCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41749
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:30:45

1 posts

An XSS vulnerability in port_util.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configu

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41696
(4.6 MEDIUM)

EPSS: 0.02%

updated 2025-12-09T18:30:44

1 posts

An attacker can use an undocumented UART port on the PCB as a side-channel with the user hardcoded credentials obtained from CVE-2025-41692 to gain read access to parts of the filesystem of the device.

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41748
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:30:44

1 posts

An XSS vulnerability in pxc_Dot1xCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device conf

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41751
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:30:44

1 posts

An XSS vulnerability in pxc_portCntr.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device conf

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41697
(6.8 MEDIUM)

EPSS: 0.02%

updated 2025-12-09T18:30:44

1 posts

An attacker can use an undocumented UART port on the PCB as a side-channel to get root access e.g. with the credentials obtained from CVE-2025-41692.

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41745
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:30:44

1 posts

An XSS vulnerability in pxc_portCntr2.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41693
(4.3 MEDIUM)

EPSS: 0.23%

updated 2025-12-09T18:30:43

1 posts

A low privileged remote attacker can use the ssh feature to execute commands directly after login. The process stays open and uses resources which leads to a reduced performance of the management functions. Switching functionality is not affected.

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41692
(6.8 MEDIUM)

EPSS: 0.02%

updated 2025-12-09T18:30:43

1 posts

A high privileged remote attacker with admin privileges for the webUI can brute-force the "root" and "user" passwords of the underlying OS due to a weak password generation algorithm.

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-55182
(10.0 CRITICAL)

EPSS: 44.14%

updated 2025-12-09T16:53:25

2 posts

### Impact There is an unauthenticated remote code execution vulnerability in React Server Components. We recommend upgrading immediately. The vulnerability is present in versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 of: * [react-server-dom-webpack](https://www.npmjs.com/package/react-server-dom-webpack) * [react-server-dom-parcel](https://www.npmjs.com/package/react-server-dom-parcel) * [react-s

Nuclei template

100 repos

https://github.com/gensecaihq/react2shell-scanner

https://github.com/m3m0ryc0rrupt/CVE-2025-55182-PoC

https://github.com/c0rydoras/CVE-2025-55182

https://github.com/SainiONHacks/CVE-2025-55182-Scanner

https://github.com/assetnote/react2shell-scanner

https://github.com/hidden-investigations/react2shell-scanner

https://github.com/santihabib/CVE-2025-55182-analysis

https://github.com/C00LN3T/React2Shell

https://github.com/Call123X/-cve-2025-55182

https://github.com/Saturate/CVE-2025-55182-Scanner

https://github.com/theori-io/reactguard

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182

https://github.com/sumanrox/rschunter

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/zack0x01/vuln-app-CVE-2025-55182

https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS

https://github.com/ayoub-intigriti/react2shell-cve

https://github.com/freeqaz/react2shell

https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc

https://github.com/yanoshercohen/React2Shell_CVE-2025-55182

https://github.com/xiaopeng-ye/react2shell-detector

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/techgaun/cve-2025-55182-scanner

https://github.com/nehkark/CVE-2025-55182

https://github.com/dwisiswant0/CVE-2025-55182

https://github.com/hoosin/CVE-2025-55182

https://github.com/f0xyx/CVE-2025-55182-Scanner

https://github.com/AliHzSec/CVE-2025-55182

https://github.com/ejpir/CVE-2025-55182-bypass

https://github.com/zr0n/react2shell

https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-

https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/EynaExp/CVE-2025-55182-POC

https://github.com/MoLeft/React2Shell-Toolbox

https://github.com/alsaut1/react2shell-lab

https://github.com/xcanwin/CVE-2025-55182-React-RCE

https://github.com/xkillbit/cve-2025-55182-scanner

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/shyambhanushali/React2Shell

https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive

https://github.com/subhdotsol/CVE-2025-55182

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/kavienanj/CVE-2025-55182

https://github.com/GelukCrab/React-Server-Components-RCE

https://github.com/whiteov3rflow/CVE-2025-55182-poc

https://github.com/acheong08/CVE-2025-55182-poc

https://github.com/zzhorc/CVE-2025-55182

https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI

https://github.com/emredavut/CVE-2025-55182

https://github.com/RuoJi6/CVE-2025-55182-RCE-shell

https://github.com/andrei2308/react2shell

https://github.com/7amzahard/React2shell

https://github.com/sickwell/CVE-2025-55182

https://github.com/mrknow001/RSC_Detector

https://github.com/raivenLockdown/RCE_React2Shell_ButCooler-SomeUselessUsefulThingsLMAO-

https://github.com/Ashwesker/Blackash-CVE-2025-55182

https://github.com/LemonTeatw1/CVE-2025-55182-exploit

https://github.com/xalgord/React2Shell

https://github.com/keklick1337/CVE-2025-55182-golang-PoC

https://github.com/SoICT-BKSEC/CVE-2025-55182-docker-lab

https://github.com/ejpir/CVE-2025-55182-research

https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE

https://github.com/msanft/CVE-2025-55182

https://github.com/hualy13/CVE-2025-55182

https://github.com/sho-luv/React2Shell

https://github.com/XiaomingX/CVE-2025-55182-poc

https://github.com/AggressiveUser/React2Hell

https://github.com/surajhacx/react2shellpoc

https://github.com/yz9yt/React2Shell-CTF

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell

https://github.com/Spritualkb/CVE-2025-55182-exp

https://github.com/websecuritylabs/React2Shell-Library

https://github.com/im-ezboy/CVE-2025-55182-zoomeye

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web

https://github.com/StealthMoud/CVE-2025-55182-Scanner

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/sudo-Yangziran/CVE-2025-55182POC

https://github.com/Rsatan/Next.js-Exploit-Tool

https://github.com/ynsmroztas/NextRce

https://github.com/jf0x3a/CVE-2025-55182-exploit

https://github.com/kOaDT/poc-cve-2025-55182

https://github.com/Chocapikk/CVE-2025-55182

https://github.com/timsonner/React2Shell-CVE-2025-55182

https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell

https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/VeilVulp/RscScan-cve-2025-55182

https://github.com/logesh-GIT001/CVE-2025-55182

https://github.com/Pizz33/CVE-2025-55182-burpscanner

https://github.com/shamo0/react2shell-PoC

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/ThemeHackers/CVE-2025-55182

https://github.com/alfazhossain/CVE-2025-55182-Exploiter

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/fatguru/CVE-2025-55182-scanner

AAKL at 2025-12-18T15:46:37.991Z ##

Security Week: China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear securityweek.com/china-linked- @SecurityWeek

Cisco:

- Critical: CVE-2025-20393: Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager sec.cloudapps.cisco.com/securi

- Critical: CVE-2025-55182: Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 sec.cloudapps.cisco.com/securi @TalosSecurity

##

AAKL@infosec.exchange at 2025-12-18T15:46:37.000Z ##

Security Week: China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear securityweek.com/china-linked- @SecurityWeek

Cisco:

- Critical: CVE-2025-20393: Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager sec.cloudapps.cisco.com/securi

- Critical: CVE-2025-55182: Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability #zeroday

##

CVE-2025-34352(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-02T21:31:37

1 posts

JumpCloud Remote Assist for Windows versions prior to 0.317.0 include an uninstaller that is invoked by the JumpCloud Windows Agent as NT AUTHORITY\SYSTEM during agent uninstall or update operations. The Remote Assist uninstaller performs privileged create, write, execute, and delete actions on predictable files inside a user-writable %TEMP% subdirectory without validating that the directory is tr

CVE-2025-40300(CVSS UNKNOWN)

EPSS: 0.06%

updated 2025-11-17T18:30:25

1 posts

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors af

Ubuntu@activitypub.awakari.com at 2025-12-17T18:01:15.000Z ## Ubuntu 24.04: Linux Kernel Azure FIPS Critical Info Exposure CVE-2025-40300 Several security issues were fixed in the Linux kernel.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-7962
(7.5 HIGH)

EPSS: 0.01%

updated 2025-11-13T18:36:55.173000

1 posts

In Jakarta Mail 2.0.2 it is possible to preform a SMTP Injection by utilizing the \r and \n UTF-8 characters to separate different messages.

AAKL@infosec.exchange at 2025-12-18T15:24:55.000Z ##

This critical advisory was posted yesterday. It relates to CVE-2025-7962, CVE-2025-49146, and CVE-2025-5516.

HPESBNW04986 rev.1 - HPE Telco Service Activator, Multiple Vulnerabilities support.hpe.com/hpesc/public/d

More:

The Hacker News: HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution thehackernews.com/2025/12/hpe- @thehackernews #infosec #HPE #vulnerability

##

CVE-2025-53066
(7.5 HIGH)

EPSS: 0.09%

updated 2025-11-03T18:16:57.227000

2 posts

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25; Oracle GraalVM for JDK: 17.0.16 and 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15. Easily exploitable vulnerability allows unauthenticated attacker

AAKL at 2025-12-18T17:39:39.847Z ##

New. This addresses high-risk CVE-2025-53057 and CVE-2025-53066.

Security Update for Dell APEX Cloud Platform for Microsoft Azure and Dell APEX Cloud Platform Foundation Software Multiple Third-Party Component Vulnerabilities dell.com/support/kbdoc/en-us/0

##

AAKL@infosec.exchange at 2025-12-18T17:39:39.000Z ##

New. This addresses high-risk CVE-2025-53057 and CVE-2025-53066.

Security Update for Dell APEX Cloud Platform for Microsoft Azure and Dell APEX Cloud Platform Foundation Software Multiple Third-Party Component Vulnerabilities dell.com/support/kbdoc/en-us/0 #Dell #Microsoft #infosec #Azure #vulnerability

##

CVE-2025-53057
(5.9 MEDIUM)

EPSS: 0.07%

updated 2025-11-03T18:16:56.973000

2 posts

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25; Oracle GraalVM for JDK: 17.0.16 and 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15. Difficult to exploit vulnerability allows unauthenticated at

AAKL at 2025-12-18T17:39:39.847Z ##

New. This addresses high-risk CVE-2025-53057 and CVE-2025-53066.

Security Update for Dell APEX Cloud Platform for Microsoft Azure and Dell APEX Cloud Platform Foundation Software Multiple Third-Party Component Vulnerabilities dell.com/support/kbdoc/en-us/0

##

AAKL@infosec.exchange at 2025-12-18T17:39:39.000Z ##

New. This addresses high-risk CVE-2025-53057 and CVE-2025-53066.

Security Update for Dell APEX Cloud Platform for Microsoft Azure and Dell APEX Cloud Platform Foundation Software Multiple Third-Party Component Vulnerabilities dell.com/support/kbdoc/en-us/0 #Dell #Microsoft #infosec #Azure #vulnerability

##

CVE-2025-49146
(8.2 HIGH)

EPSS: 0.01%

updated 2025-06-11T16:17:03

1 posts

### Impact When the PostgreSQL JDBC driver is configured with channel binding set to `required` (default value is `prefer`), the driver would incorrectly allow connections to proceed with authentication methods that do not support channel binding (such as password, MD5, GSS, or SSPI authentication). This could allow a man-in-the-middle attacker to intercept connections that users believed were pr

AAKL@infosec.exchange at 2025-12-18T15:24:55.000Z ##

This critical advisory was posted yesterday. It relates to CVE-2025-7962, CVE-2025-49146, and CVE-2025-5516.

HPESBNW04986 rev.1 - HPE Telco Service Activator, Multiple Vulnerabilities support.hpe.com/hpesc/public/d

More:

The Hacker News: HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution thehackernews.com/2025/12/hpe- @thehackernews #infosec #HPE #vulnerability

##

CVE-2025-5516
(2.4 LOW)

EPSS: 0.05%

updated 2025-06-03T18:30:53

1 posts

A vulnerability, which was classified as problematic, was found in TOTOLINK X2000R 1.0.0-B20230726.1108. This affects an unknown part of the file /boafrm/formFilter of the component URL Filtering Page. The manipulation of the argument URL Address leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor w

AAKL@infosec.exchange at 2025-12-18T15:24:55.000Z ##

This critical advisory was posted yesterday. It relates to CVE-2025-7962, CVE-2025-49146, and CVE-2025-5516.

HPESBNW04986 rev.1 - HPE Telco Service Activator, Multiple Vulnerabilities support.hpe.com/hpesc/public/d

More:

The Hacker News: HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution thehackernews.com/2025/12/hpe- @thehackernews #infosec #HPE #vulnerability

##

CVE-2025-2039
(4.7 MEDIUM)

EPSS: 0.09%

updated 2025-05-13T20:57:18.117000

2 posts

A vulnerability classified as critical has been found in code-projects Blood Bank Management System 1.0. Affected is an unknown function of the file /admin/delete_members.php. The manipulation of the argument member_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

4 repos

https://github.com/thesystemowner/CVE-2025-20393-POC

https://github.com/cyberleelawat/CVE-2025-20393

https://github.com/KingHacker353/CVE-2025-20393

https://github.com/b1gchoi/CVE-2025-20393

CVE-2025-32210
(6.5 MEDIUM)

EPSS: 0.03%

updated 2025-04-11T15:39:52.920000

1 posts

Missing Authorization vulnerability in CreativeMindsSolutions CM Registration and Invitation Codes allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects CM Registration and Invitation Codes: from n/a through 2.5.2.

beyondmachines1@infosec.exchange at 2025-12-18T08:01:32.000Z ##

Flaw in NVIDIA Isaac Lab enables remote code execution

NVIDIA patched a critical deserialization vulnerability (CVE-2025-32210) in Isaac Lab that allows authenticated low-privilege users to execute arbitrary code, affecting all versions prior to v2.3.0.

**Make sure all devices running NVIDIA Isaac Lab are isolated from the internet and accessible from trusted networks only. Then plan a quick upgrade to Isaac Lab v2.3.0.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-68161
(0 None)

EPSS: 0.00%

2 posts

N/A

jschauma@mstdn.social at 2025-12-18T19:27:47.000Z ##

For my fellow Log4j victims celebrating 4 years #log4shell PTSD: CVE-2025-68161

"The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the verifyHostName configuration attribute or the log4j2.sslVerifyHostName system property is set to true."

logging.apache.org/security.ht

(It's not that terrible. Seeing the string "log4j" just makes me twitch. :-)

##

jschauma@mstdn.social at 2025-12-18T19:27:47.000Z ##

For my fellow Log4j victims celebrating 4 years #log4shell PTSD: CVE-2025-68161

"The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the verifyHostName configuration attribute or the log4j2.sslVerifyHostName system property is set to true."

logging.apache.org/security.ht

(It's not that terrible. Seeing the string "log4j" just makes me twitch. :-)

##

CVE-2025-63820
(0 None)

EPSS: 0.00%

2 posts

N/A

1 repos

https://github.com/Xernary/CVE-2025-63820

CVE-2025-63821
(0 None)

EPSS: 0.00%

2 posts

N/A

1 repos

https://github.com/Xernary/CVE-2025-63821

CVE-2025-67745
(0 None)

EPSS: 0.00%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-18T20:30:01.000Z ##

CVE-2025-67745 - Myhoard logs backup encryption key in plain text cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65567
(0 None)

EPSS: 0.00%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-18T20:30:01.000Z ##

CVE-2025-65567 - OmeC-Project UPF Denial-of-Service Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65564
(0 None)

EPSS: 0.00%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-18T01:30:00.000Z ##

CVE-2025-68434 - opensourcepos has Cross-Site Request Forgery vulnerability that leads to Unauthorized Administrator Creation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68401
(0 None)

EPSS: 0.04%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-17T22:45:01.000Z ##

CVE-2025-68401 - ChurchCRM has Stored Cross-Site Scripting (XSS) vulnerability that leads to session theft and account takeover cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68399
(0 None)

EPSS: 0.05%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-17T22:45:01.000Z ##

CVE-2025-68399 - ChurchCRM has Stored Cross-Site Scripting (XSS) In GroupEditor.php cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68275
(0 None)

EPSS: 0.04%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-17T22:45:01.000Z ##

CVE-2025-68275 - ChurchCRM vulnerable to Stored XSS - Group name > Person Listing cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66397
(0 None)

EPSS: 0.03%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-17T22:30:01.000Z ##

CVE-2025-66397 - ChurchCRM's Kiosk Manager Functions are vulnerable to Broken Access Control cvefeed.io/vuln/detail/CVE-202

##

Visit counter For Websites