##
Updated at UTC 2025-12-13T11:14:44.875638
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-13970 | 8.0 | 0.00% | 2 | 0 | 2025-12-13T03:30:14 | OpenPLC_V3 is vulnerable to a cross-site request forgery (CSRF) attack due to t | |
| CVE-2025-14585 | 7.3 | 0.00% | 1 | 0 | 2025-12-13T00:30:32 | A vulnerability was found in itsourcecode COVID Tracking System 1.0. Affected by | |
| CVE-2025-14582 | 4.7 | 0.00% | 1 | 0 | 2025-12-13T00:30:32 | A vulnerability was detected in campcodes Online Student Enrollment System 1.0. | |
| CVE-2025-67749 | 0 | 0.00% | 1 | 0 | 2025-12-12T23:15:42.223000 | PCSX2 is a free and open-source PlayStation 2 (PS2) emulator. In versions 2.5.37 | |
| CVE-2025-14584 | 7.3 | 0.00% | 1 | 0 | 2025-12-12T23:15:37.887000 | A vulnerability has been found in itsourcecode COVID Tracking System 1.0. Affect | |
| CVE-2025-14583 | 7.3 | 0.00% | 1 | 0 | 2025-12-12T22:15:39.123000 | A flaw has been found in campcodes Online Student Enrollment System 1.0. This im | |
| CVE-2025-67721 | None | 0.00% | 1 | 0 | 2025-12-12T22:12:24 | ### Summary Incorrect handling of malformed data in Java-based decompressor impl | |
| CVE-2025-67750 | 8.4 | 0.00% | 2 | 0 | 2025-12-12T21:37:31 | ### Impact The APIVersion rule uses `new Function()` to evaluate expression stri | |
| CVE-2025-64011 | 4.3 | 0.00% | 1 | 0 | 2025-12-12T21:32:46 | Nextcloud Server 30.0.0 is vulnerable to an Insecure Direct Object Reference (ID | |
| CVE-2025-67634 | 4.4 | 0.00% | 1 | 0 | 2025-12-12T21:31:51 | The CISA Software Acquisition Guide Supplier Response Web Tool before 2025-12-11 | |
| CVE-2025-14373 | 4.3 | 0.00% | 1 | 0 | 2025-12-12T21:31:50 | Inappropriate implementation in Toolbar in Google Chrome on Android prior to 143 | |
| CVE-2024-58311 | 9.8 | 0.00% | 1 | 0 | 2025-12-12T21:31:50 | Dormakaba Saflok System 6000 contains a predictable key generation algorithm tha | |
| CVE-2024-58299 | 9.8 | 0.00% | 1 | 0 | 2025-12-12T21:31:50 | PCMan FTP Server 2.0 contains a buffer overflow vulnerability in the 'pwd' comma | |
| CVE-2025-14572 | 8.8 | 0.00% | 2 | 0 | 2025-12-12T21:31:39 | A vulnerability was found in UTT 进取 512W up to 1.7.7-171114. This affects an unk | |
| CVE-2025-66429 | 8.8 | 0.07% | 1 | 0 | 2025-12-12T21:15:59.187000 | An issue was discovered in cPanel 110 through 132. A directory traversal vulnera | |
| CVE-2025-14611 | 0 | 0.00% | 2 | 0 | 2025-12-12T21:15:53.107000 | Gladinet CentreStack and Triofox prior to version 16.12.10420.56791 used hardcod | |
| CVE-2025-14174 | 8.8 | 0.00% | 8 | 0 | 2025-12-12T21:15:52.350000 | Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499 | |
| CVE-2024-58316 | 7.5 | 0.00% | 1 | 0 | 2025-12-12T21:15:51.430000 | Online Shopping System Advanced 1.0 contains a SQL injection vulnerability in th | |
| CVE-2025-67819 | None | 0.00% | 1 | 0 | 2025-12-12T20:25:07 | An issue was discovered in Weaviate OSS before 1.33.4. Due to a lack of validati | |
| CVE-2025-8083 | 8.6 | 0.00% | 1 | 0 | 2025-12-12T20:15:43.250000 | The Preset configuration https://v2.vuetifyjs.com/en/features/presets feature | |
| CVE-2025-67818 | 7.2 | 0.00% | 1 | 0 | 2025-12-12T20:15:42.770000 | An issue was discovered in Weaviate OSS before 1.33.4. An attacker with access t | |
| CVE-2025-67342 | 4.6 | 0.00% | 1 | 0 | 2025-12-12T20:15:42.327000 | RuoYi versions 4.8.1 and earlier is affected by a stored XSS vulnerability in th | |
| CVE-2025-66430 | 9.1 | 0.00% | 2 | 0 | 2025-12-12T20:15:41.747000 | Plesk 18.0 has Incorrect Access Control. | |
| CVE-2024-58314 | 8.8 | 0.00% | 1 | 0 | 2025-12-12T20:15:39.327000 | Atcom 100M IP Phones firmware version 2.7.x.x contains an authenticated command | |
| CVE-2024-58305 | 8.8 | 0.00% | 1 | 0 | 2025-12-12T20:15:39.020000 | WonderCMS 4.3.2 contains a cross-site scripting vulnerability that allows attack | |
| CVE-2024-14010 | 9.8 | 0.00% | 1 | 0 | 2025-12-12T20:15:38.520000 | Typora 1.7.4 contains a command injection vulnerability in the PDF export prefer | |
| CVE-2025-64538 | 9.3 | 0.52% | 1 | 0 | 2025-12-12T19:58:16.457000 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based | |
| CVE-2025-64539 | 9.3 | 0.52% | 1 | 0 | 2025-12-12T19:58:13.747000 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based | |
| CVE-2025-67779 | 7.5 | 0.04% | 3 | 1 | 2025-12-12T19:16:03.773000 | It was found that the fix addressing CVE-2025-55184 in React Server Components w | |
| CVE-2018-4063 | 8.8 | 0.18% | 2 | 0 | 2025-12-12T19:15:59.653000 | An exploitable remote code execution vulnerability exists in the upload.cgi func | |
| CVE-2025-56109 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:31:38 | OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR860 allowing attackers | |
| CVE-2025-56106 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:31:38 | OS Command Injection vulnerability in Ruijie RG-EW1800GX B11P226_EW1800GX_102231 | |
| CVE-2025-56099 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:31:37 | OS Command Injection vulnerability in Ruijie RG-YST AP_3.0(1)B11P280YST250F allo | |
| CVE-2025-56108 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:31:37 | OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowin | |
| CVE-2025-56117 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:31:37 | OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowin | |
| CVE-2025-56089 | 8.8 | 0.14% | 1 | 0 | 2025-12-12T18:31:37 | OS Command Injection vulnerability in Ruijie M18 EW_3.0(1)B11P226_M18_10223116 a | |
| CVE-2025-56098 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:31:37 | OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowin | |
| CVE-2025-56107 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:31:36 | OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR600W allowing attacker | |
| CVE-2025-56110 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:31:36 | OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR860 allowing attackers | |
| CVE-2025-56101 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:31:36 | OS Command Injection vulnerability in Ruijie M18 EW_3.0(1)B11P226_M18_10223116 a | |
| CVE-2025-56096 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:31:36 | OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR600W allowing attacker | |
| CVE-2025-56097 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:31:36 | OS Command Injection vulnerability in Ruijie RG-EW1800GX PRO B11P226_EW1800GX-PR | |
| CVE-2025-56093 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:31:36 | OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowin | |
| CVE-2025-56092 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:31:36 | OS Command Injection vulnerability in Ruijie X30 PRO V1 X30-PRO-V1_09241521 allo | |
| CVE-2025-56088 | 8.8 | 0.14% | 1 | 0 | 2025-12-12T18:31:36 | OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR860 allowing attackers | |
| CVE-2025-56095 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:31:36 | OS Command Injection vulnerability in Ruijie RG-EW1200G PRO RG-EW1200G PRO V1.00 | |
| CVE-2023-29144 | 3.3 | 0.00% | 1 | 0 | 2025-12-12T18:30:41 | Malwarebytes 1.0.14 for Linux doesn't properly compute signatures in some scenar | |
| CVE-2025-56086 | 8.8 | 0.14% | 1 | 0 | 2025-12-12T18:30:34 | OS Command Injection vulnerability in Ruijie RG-EW1200 EW_3.0(1)B11P227_EW1200_1 | |
| CVE-2025-56084 | 8.8 | 0.14% | 1 | 0 | 2025-12-12T18:30:33 | OS Command Injection vulnerability in Ruijie RG-EW1800GX PRO B11P226_EW1800GX-PR | |
| CVE-2025-56085 | 8.8 | 0.14% | 1 | 0 | 2025-12-12T18:30:33 | OS Command Injection vulnerability in Ruijie RG-EW1200 EW_3.0(1)B11P227_EW1200_1 | |
| CVE-2025-56079 | 8.8 | 0.14% | 1 | 0 | 2025-12-12T18:30:32 | OS Command Injection vulnerability in Ruijie RG-EW1300G EW1300G V1.00/V2.00/V4.0 | |
| CVE-2025-55184 | 7.5 | 0.07% | 6 | 8 | template | 2025-12-12T18:18:29.827000 | A pre-authentication denial of service vulnerability exists in React Server Comp |
| CVE-2025-55183 | 5.3 | 0.06% | 4 | 7 | 2025-12-12T18:18:19.950000 | An information leak vulnerability exists in specific configurations of React Ser | |
| CVE-2025-56120 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:15:44.537000 | OS Command Injection vulnerability in Ruijie X60 PRO X60_10212014RG-X60 PRO V1.0 | |
| CVE-2025-56118 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:15:44.377000 | OS Command Injection vulnerability in Ruijie X60 PRO X60_10212014RG-X60 PRO V1.0 | |
| CVE-2025-56114 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:15:44.047000 | OS Command Injection vulnerability in Ruijie M18 EW_3.0(1)B11P226_M18_10223116 a | |
| CVE-2025-56113 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:15:43.890000 | OS Command Injection vulnerability in Ruijie RG-YST EST, YSTAP_3.0(1)B11P280YST2 | |
| CVE-2025-56111 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:15:43.730000 | OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR860 allowing attackers | |
| CVE-2025-56102 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:15:42.737000 | OS Command Injection vulnerability in Ruijie RG-EW1800GX B11P226_EW1800GX_102231 | |
| CVE-2025-56094 | 8.8 | 0.11% | 1 | 0 | 2025-12-12T18:15:41.603000 | OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowin | |
| CVE-2025-56091 | 8.8 | 0.14% | 1 | 0 | 2025-12-12T18:15:41.120000 | OS Command Injection vulnerability in Ruijie RG-EW1800GX B11P226_EW1800GX_102231 | |
| CVE-2025-56090 | 8.8 | 0.14% | 1 | 0 | 2025-12-12T18:15:40.960000 | OS Command Injection vulnerability in Ruijie RG-EW1200G PRO RG-EW1200G PRO V1.00 | |
| CVE-2025-56087 | 8.8 | 0.14% | 1 | 0 | 2025-12-12T18:15:40.483000 | OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR600W allowing attacker | |
| CVE-2025-56083 | 8.8 | 0.14% | 1 | 0 | 2025-12-12T18:15:39.843000 | OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowin | |
| CVE-2025-56082 | 8.8 | 0.14% | 1 | 0 | 2025-12-12T18:15:39.687000 | OS Command Injection vulnerability in Ruijie RG-BCR RG-BCR600W allowing attacker | |
| CVE-2025-56077 | 8.8 | 0.14% | 1 | 0 | 2025-12-12T18:15:39.370000 | OS Command Injection vulnerability in Ruijie RG-RAP2200(E) 247 2200 allowing att | |
| CVE-2025-64863 | 5.4 | 0.03% | 1 | 0 | 2025-12-12T17:33:20.543000 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr | |
| CVE-2025-64869 | 5.4 | 0.03% | 1 | 0 | 2025-12-12T17:32:54.870000 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr | |
| CVE-2025-64872 | 4.8 | 0.06% | 1 | 0 | 2025-12-12T17:32:25.967000 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr | |
| CVE-2025-64887 | 5.4 | 0.03% | 1 | 0 | 2025-12-12T17:31:58.540000 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based | |
| CVE-2025-65530 | 8.8 | 0.00% | 1 | 0 | 2025-12-12T17:15:45.320000 | An eval injection in the malware de-obfuscation routines of CloudLinux ai-bolit | |
| CVE-2025-26866 | None | 0.73% | 1 | 0 | 2025-12-12T16:46:06 | A remote code execution vulnerability exists where a malicious Raft node can exp | |
| CVE-2025-13780 | 9.1 | 0.09% | 1 | 2 | 2025-12-12T16:42:56 | The PLAIN restore meta-command filter introduced in pgAdmin as part of the fix f | |
| CVE-2025-36743 | None | 0.00% | 1 | 0 | 2025-12-12T15:30:51 | SolarEdge SE3680H has an exposed debug/test interface accessible to unauthentica | |
| CVE-2025-36745 | None | 0.00% | 1 | 0 | 2025-12-12T15:30:51 | SolarEdge SE3680H ships with an outdated Linux kernel containing unpatched vuln | |
| CVE-2025-66039 | 0 | 0.07% | 2 | 0 | 2025-12-12T15:19:07.567000 | FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX | |
| CVE-2020-36896 | 0 | 0.23% | 1 | 0 | 2025-12-12T15:18:42.140000 | QiHang Media Web Digital Signage 3.0.9 contains a cleartext credentials vulnerab | |
| CVE-2020-36895 | 0 | 0.14% | 1 | 0 | 2025-12-12T15:18:42.140000 | EIBIZ i-Media Server Digital Signage 3.8.0 contains an unauthenticated configura | |
| CVE-2025-13607 | 9.4 | 0.04% | 1 | 0 | 2025-12-12T15:18:42.140000 | A malicious actor can access camera configuration information, including account | |
| CVE-2025-14265 | 9.1 | 0.03% | 3 | 0 | 2025-12-12T15:18:13.390000 | In versions of ScreenConnect™ prior to 25.8, server-side validation and integrit | |
| CVE-2025-14046 | 0 | 0.05% | 1 | 0 | 2025-12-12T15:18:13.390000 | An improper neutralization of input vulnerability was identified in GitHub Enter | |
| CVE-2025-66046 | 9.8 | 0.08% | 1 | 0 | 2025-12-12T15:18:13.390000 | Several stack-based buffer overflow vulnerabilities exists in the MFER parsing f | |
| CVE-2025-66048 | 9.8 | 0.08% | 1 | 0 | 2025-12-12T15:18:13.390000 | Several stack-based buffer overflow vulnerabilities exists in the MFER parsing f | |
| CVE-2025-66044 | 9.8 | 0.08% | 1 | 0 | 2025-12-12T15:18:13.390000 | Several stack-based buffer overflow vulnerabilities exists in the MFER parsing f | |
| CVE-2025-14535 | 9.8 | 0.04% | 1 | 0 | 2025-12-12T15:18:13.390000 | A vulnerability was identified in UTT 进取 512W up to 3.1.7.7-171114. Affected is | |
| CVE-2025-67741 | 4.6 | 0.01% | 1 | 0 | 2025-12-12T15:18:13.390000 | In JetBrains TeamCity before 2025.11 stored XSS was possible via session attribu | |
| CVE-2025-67742 | 3.8 | 0.00% | 1 | 0 | 2025-12-12T15:18:13.390000 | In JetBrains TeamCity before 2025.11 path traversal was possible via file upload | |
| CVE-2025-67739 | 3.1 | 0.00% | 1 | 0 | 2025-12-12T15:18:13.390000 | In JetBrains TeamCity before 2025.11.2 improper repository URL validation could | |
| CVE-2025-59803 | 5.3 | 0.02% | 1 | 0 | 2025-12-12T15:18:13.390000 | Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via trigger | |
| CVE-2025-55314 | 7.8 | 0.01% | 1 | 0 | 2025-12-12T15:18:13.390000 | An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13. | |
| CVE-2025-14512 | 6.5 | 0.03% | 1 | 0 | 2025-12-12T15:18:13.390000 | A flaw was found in glib. This vulnerability allows a heap buffer overflow and d | |
| CVE-2025-14523 | 8.2 | 0.03% | 2 | 0 | 2025-12-12T15:18:13.390000 | A flaw in libsoup’s HTTP header handling allows multiple Host: headers in a requ | |
| CVE-2025-14516 | 6.3 | 0.04% | 1 | 0 | 2025-12-12T15:18:13.390000 | A vulnerability was found in Yalantis uCrop 2.2.11. Affected by this issue is th | |
| CVE-2025-14514 | 7.3 | 0.03% | 1 | 0 | 2025-12-12T15:18:13.390000 | A flaw has been found in Campcodes Supplier Management System 1.0. Affected is a | |
| CVE-2025-64994 | 6.5 | 0.01% | 1 | 0 | 2025-12-12T15:18:13.390000 | A privilege escalation vulnerability was discovered in TeamViewer DEX (former 1E | |
| CVE-2025-64993 | 6.8 | 0.14% | 1 | 0 | 2025-12-12T15:18:13.390000 | A command injection vulnerability was discovered in TeamViewer DEX (former 1E DE | |
| CVE-2025-64992 | 6.8 | 0.14% | 1 | 0 | 2025-12-12T15:18:13.390000 | A command injection vulnerability was discovered in TeamViewer DEX (former 1E DE | |
| CVE-2025-64987 | 7.2 | 0.29% | 1 | 0 | 2025-12-12T15:18:13.390000 | A command injection vulnerability was discovered in TeamViewer DEX (former 1E DE | |
| CVE-2025-44016 | 8.8 | 0.04% | 1 | 0 | 2025-12-12T15:18:13.390000 | A vulnerability in TeamViewer DEX Client (former 1E client) - Content Distributi | |
| CVE-2025-64701 | 7.8 | 0.01% | 1 | 0 | 2025-12-12T15:18:13.390000 | QND Premium/Advance/Standard Ver.11.0.9i and prior contains a privilege escalati | |
| CVE-2025-12029 | 8.0 | 0.04% | 1 | 0 | 2025-12-12T15:18:13.390000 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 15.11 | |
| CVE-2025-67738 | 8.5 | 0.04% | 1 | 0 | 2025-12-12T15:18:13.390000 | squid/cachemgr.cgi in Webmin before 2.600 does not properly quote arguments. Thi | |
| CVE-2025-11247 | 4.3 | 0.01% | 1 | 0 | 2025-12-12T15:18:13.390000 | GitLab has remediated an issue in GitLab EE affecting all versions from 13.2 bef | |
| CVE-2025-12716 | 8.7 | 0.02% | 1 | 0 | 2025-12-12T15:18:13.390000 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.4 | |
| CVE-2025-13764 | 9.8 | 0.07% | 2 | 0 | 2025-12-12T15:18:13.390000 | The WP CarDealer plugin for WordPress is vulnerable to Privilege Escalation in a | |
| CVE-2025-67719 | 0 | 0.01% | 2 | 0 | 2025-12-12T15:18:13.390000 | Ibexa is a composable end-to-end DXP (Digital Experience Platform). Versions 5.0 | |
| CVE-2025-67718 | 0 | 0.04% | 2 | 0 | 2025-12-12T15:18:13.390000 | Form.io is a combined Form and API platform for Serverless applications. Version | |
| CVE-2025-67717 | 0 | 0.03% | 1 | 0 | 2025-12-12T15:18:13.390000 | ZITADEL is an open-source identity infrastructure tool. Versions 2.44.0 through | |
| CVE-2025-67648 | 7.1 | 0.03% | 1 | 0 | 2025-12-12T15:18:13.390000 | Shopware is an open commerce platform. Versions 6.4.6.0 through 6.6.10.9 and 6.7 | |
| CVE-2025-67646 | 3.5 | 0.01% | 1 | 0 | 2025-12-12T15:18:13.390000 | TableProgressTracking is a MediaWiki extension to track progress against specifi | |
| CVE-2025-67509 | 8.2 | 0.04% | 1 | 0 | 2025-12-12T15:18:13.390000 | Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8 | |
| CVE-2025-67505 | 8.4 | 0.04% | 1 | 0 | 2025-12-12T15:18:13.390000 | Okta Java Management SDK facilitates interactions with the Okta management API. | |
| CVE-2025-66628 | 7.5 | 0.03% | 1 | 1 | 2025-12-12T15:18:13.390000 | ImageMagick is a software suite to create, edit, compose, or convert bitmap imag | |
| CVE-2025-65297 | 7.5 | 0.01% | 1 | 0 | 2025-12-12T15:18:13.390000 | Aqara Hub devices including Camera Hub G3 4.1.9_0027, Hub M2 4.3.6_0027, and Hub | |
| CVE-2025-65295 | 8.1 | 0.04% | 1 | 0 | 2025-12-12T15:18:13.390000 | Multiple vulnerabilities in Aqara Hub firmware update process in the Camera Hub | |
| CVE-2025-65293 | 6.6 | 0.04% | 1 | 0 | 2025-12-12T15:18:13.390000 | Command injection vulnerabilities in Aqara Camera Hub G3 4.1.9_0027 allow attack | |
| CVE-2020-36902 | 0 | 0.09% | 1 | 0 | 2025-12-12T15:18:13.390000 | UBICOD Medivision Digital Signage 1.5.1 contains an authorization bypass vulnera | |
| CVE-2020-36901 | 0 | 0.02% | 1 | 0 | 2025-12-12T15:18:13.390000 | UBICOD Medivision Digital Signage 1.5.1 contains a cross-site request forgery vu | |
| CVE-2020-36899 | 0 | 0.24% | 1 | 0 | 2025-12-12T15:18:13.390000 | QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated file disclosu | |
| CVE-2025-36744 | 0 | 0.00% | 1 | 0 | 2025-12-12T15:17:31.973000 | SolarEdge SE3680H has unauthenticated disclosure of sensitive information during | |
| CVE-2025-36746 | 0 | 0.00% | 1 | 0 | 2025-12-12T15:17:31.973000 | SolarEdge monitoring platform contains a Cross‑Site Scripting (XSS) flaw that al | |
| CVE-2025-14537 | 7.3 | 0.03% | 1 | 0 | 2025-12-12T15:17:31.973000 | A weakness has been identified in code-projects Class and Exam Timetable Managem | |
| CVE-2025-13663 | 6.7 | 0.01% | 1 | 0 | 2025-12-12T15:17:31.973000 | Under certain circumstances, the Quartus Prime Pro Installer for Windows does no | |
| CVE-2025-36937 | 0 | 0.04% | 1 | 0 | 2025-12-12T15:17:31.973000 | In AudioDecoder::HandleProduceRequest of audio_decoder.cc, there is a possible o | |
| CVE-2025-36936 | 0 | 0.01% | 1 | 0 | 2025-12-12T15:17:31.973000 | In GetTachyonCommand of tachyon_server_common.h, there is a possible out of boun | |
| CVE-2025-36938 | 5.1 | 0.01% | 1 | 0 | 2025-12-12T00:31:29 | In U-Boot of append_uint32_le(), there is a possible fault injection due to a lo | |
| CVE-2025-36934 | 6.7 | 0.01% | 1 | 0 | 2025-12-12T00:31:27 | In bigo_worker_thread of private/google-modules/video/gchips/bigo.c, there is a | |
| CVE-2025-8110 | None | 0.08% | 3 | 2 | 2025-12-11T22:02:22 | Improper Symbolic link handling in the PutContents API in Gogs allows Local Exec | |
| CVE-2025-58360 | 8.2 | 73.17% | 2 | 4 | template | 2025-12-11T21:55:34 | ## Description An XML External Entity (XXE) vulnerability was identified. The a |
| CVE-2025-14293 | 6.5 | 0.04% | 1 | 0 | 2025-12-11T21:31:45 | The WP Job Portal plugin for WordPress is vulnerable to Arbitrary File Read in a | |
| CVE-2025-36935 | None | 0.01% | 1 | 0 | 2025-12-11T21:31:45 | In trusty_ffa_mem_reclaim of shared-mem-smcall.c, there is a possible memory cor | |
| CVE-2025-14534 | 9.8 | 0.04% | 2 | 0 | 2025-12-11T21:31:39 | A vulnerability was determined in UTT 进取 512W up to 3.1.7.7-171114. This impacts | |
| CVE-2025-67740 | 2.7 | 0.00% | 1 | 0 | 2025-12-11T18:31:48 | In JetBrains TeamCity before 2025.11 improper access control could expose GitHub | |
| CVE-2025-65296 | 6.5 | 0.02% | 1 | 0 | 2025-12-11T18:31:48 | NULL-pointer dereference vulnerabilities in Aqara Hub M2 4.3.6_0027, Hub M3 4.3. | |
| CVE-2025-65294 | 9.8 | 0.24% | 1 | 0 | 2025-12-11T18:31:48 | Aqara Hub devices including Camera Hub G3 4.1.9_0027, Hub M2 4.3.6_0027, and Hub | |
| CVE-2025-66047 | 9.8 | 0.08% | 1 | 0 | 2025-12-11T18:30:53 | Several stack-based buffer overflow vulnerabilities exists in the MFER parsing f | |
| CVE-2025-66045 | 9.8 | 0.08% | 1 | 0 | 2025-12-11T18:30:53 | Several stack-based buffer overflow vulnerabilities exists in the MFER parsing f | |
| CVE-2025-66043 | 9.8 | 0.08% | 1 | 0 | 2025-12-11T18:30:53 | Several stack-based buffer overflow vulnerabilities exists in the MFER parsing f | |
| CVE-2025-65473 | 9.1 | 0.06% | 1 | 0 | 2025-12-11T18:30:53 | An arbitrary file rename vulnerability in the /admin/filer.php component of Easy | |
| CVE-2025-14526 | 8.8 | 0.09% | 2 | 0 | 2025-12-11T18:30:53 | A security flaw has been discovered in Tenda CH22 1.0.0.1. This affects the func | |
| CVE-2025-14528 | 5.3 | 0.04% | 1 | 0 | 2025-12-11T18:30:53 | A vulnerability was detected in D-Link DIR-803 up to 1.04. Impacted is an unknow | |
| CVE-2025-55313 | 7.8 | 0.02% | 1 | 0 | 2025-12-11T18:30:48 | An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13. | |
| CVE-2024-8273 | None | 0.07% | 1 | 0 | 2025-12-11T18:30:45 | Authentication Bypass by Spoofing vulnerability in HYPR Server allows Identity S | |
| CVE-2025-59802 | 7.5 | 0.03% | 1 | 0 | 2025-12-11T18:30:45 | Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via OCG. Wh | |
| CVE-2025-14321 | 9.8 | 0.04% | 1 | 0 | 2025-12-11T18:30:41 | Use-after-free in the WebRTC: Signaling component. This vulnerability affects Fi | |
| CVE-2025-67511 | 9.7 | 0.10% | 1 | 0 | 2025-12-11T17:22:16 | ### Summary A command injection vulnerability is present in the function tool ` | |
| CVE-2025-67716 | 3.7 | 0.05% | 1 | 0 | 2025-12-11T15:51:55 | ### Description An input-validation flaw in the returnTo parameter in the Auth0 | |
| CVE-2025-67720 | 6.5 | 0.04% | 1 | 0 | 2025-12-11T15:51:44 | ## Summary The `download_media` method in Pyrofork does not sanitize filenames | |
| CVE-2025-67713 | None | 0.04% | 1 | 0 | 2025-12-11T15:51:11 | ### Summary `redirect_url` is treated as safe when `url.Parse(...).IsAbs()` is f | |
| CVE-2025-67510 | 9.4 | 0.06% | 1 | 0 | 2025-12-11T15:49:18 | ### Impact `MySQLWriteTool` executes arbitrary SQL provided by the caller using | |
| CVE-2025-66474 | None | 0.47% | 2 | 0 | 2025-12-11T15:48:03 | ### Impact Any user who can edit their own user profile or any other document ca | |
| CVE-2025-66473 | None | 0.04% | 2 | 0 | 2025-12-11T15:47:50 | ### Impact XWiki's REST API doesn't enforce any limits for the number of items t | |
| CVE-2025-66472 | None | 0.04% | 1 | 0 | 2025-12-11T15:47:40 | ### Impact A reflected XSS vulnerability in XWiki allows an attacker to send a v | |
| CVE-2025-66033 | 5.3 | 0.04% | 1 | 0 | 2025-12-11T15:47:31 | ### Description In the Okta Java SDK, specific multithreaded implementations may | |
| CVE-2025-14515 | 7.3 | 0.03% | 1 | 0 | 2025-12-11T15:30:36 | A vulnerability has been found in Campcodes Supplier Management System 1.0. Affe | |
| CVE-2025-13003 | 7.6 | 0.03% | 1 | 0 | 2025-12-11T15:30:36 | Authorization Bypass Through User-Controlled Key vulnerability in Aksis Computer | |
| CVE-2025-14517 | 5.3 | 0.01% | 1 | 0 | 2025-12-11T15:30:33 | A vulnerability was determined in Yalantis uCrop 2.2.11. This affects the functi | |
| CVE-2025-64995 | 6.5 | 0.01% | 1 | 0 | 2025-12-11T12:30:34 | A privilege escalation vulnerability was discovered in TeamViewer DEX (former 1E | |
| CVE-2025-64988 | 7.2 | 0.29% | 1 | 0 | 2025-12-11T12:30:34 | A command injection vulnerability was discovered in TeamViewer DEX (former 1E DE | |
| CVE-2025-64991 | 6.8 | 0.14% | 1 | 0 | 2025-12-11T12:30:29 | A command injection vulnerability was discovered in TeamViewer DEX (former 1E DE | |
| CVE-2025-64990 | 6.8 | 0.14% | 1 | 0 | 2025-12-11T12:30:28 | A command injection vulnerability was discovered in TeamViewer DEX (former 1E DE | |
| CVE-2025-64989 | 7.2 | 0.29% | 1 | 0 | 2025-12-11T12:30:28 | A command injection vulnerability was discovered in TeamViewer DEX (former 1E DE | |
| CVE-2025-4097 | 6.5 | 0.03% | 1 | 0 | 2025-12-11T06:30:33 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 11.10 | |
| CVE-2025-67694 | None | 0.00% | 1 | 0 | 2025-12-11T06:30:33 | Rejected reason: Not used | |
| CVE-2025-9436 | 6.4 | 0.03% | 1 | 0 | 2025-12-11T06:30:33 | The Widgets for Google Reviews plugin for WordPress is vulnerable to Stored Cros | |
| CVE-2025-8405 | 8.7 | 0.01% | 2 | 0 | 2025-12-11T06:30:32 | GitLab has remediated a security issue in GitLab CE/EE affecting all versions fr | |
| CVE-2025-11984 | 6.8 | 0.02% | 1 | 0 | 2025-12-11T06:30:32 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.1 | |
| CVE-2025-67692 | None | 0.00% | 1 | 0 | 2025-12-11T06:30:32 | Rejected reason: Not used | |
| CVE-2025-67691 | None | 0.00% | 1 | 0 | 2025-12-11T06:30:32 | Rejected reason: Not used | |
| CVE-2025-67690 | None | 0.00% | 1 | 0 | 2025-12-11T06:30:32 | Rejected reason: Not used | |
| CVE-2025-67693 | 0 | 0.00% | 1 | 0 | 2025-12-11T04:15:59.570000 | Rejected reason: Not used | |
| CVE-2025-11467 | 5.8 | 0.04% | 1 | 0 | 2025-12-11T03:30:35 | The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video | |
| CVE-2020-36898 | None | 1.55% | 1 | 0 | 2025-12-10T21:31:48 | QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated file deletion | |
| CVE-2020-36900 | None | 0.02% | 1 | 0 | 2025-12-10T21:31:47 | All-Dynamics Digital Signage System 2.0.2 contains a cross-site request forgery | |
| CVE-2020-36897 | None | 0.28% | 1 | 0 | 2025-12-10T21:31:47 | QiHang Media Web Digital Signage 3.0.9 contains an unauthenticated remote code e | |
| CVE-2025-65199 | 7.8 | 0.03% | 1 | 0 | 2025-12-10T21:31:47 | A command injection vulnerability exists in Windscribe for Linux Desktop App tha | |
| CVE-2025-64888 | 5.4 | 0.03% | 1 | 0 | 2025-12-10T21:31:47 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based | |
| CVE-2023-53740 | None | 0.04% | 1 | 0 | 2025-12-10T21:31:46 | Screen SFT DAB 1.9.3 contains an authentication bypass vulnerability that allows | |
| CVE-2025-64881 | 5.4 | 0.03% | 1 | 0 | 2025-12-10T21:31:46 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr | |
| CVE-2025-64875 | 5.4 | 0.03% | 1 | 0 | 2025-12-10T21:31:46 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr | |
| CVE-2025-64873 | 5.4 | 0.03% | 1 | 0 | 2025-12-10T21:31:46 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr | |
| CVE-2025-64861 | 5.4 | 0.03% | 1 | 0 | 2025-12-10T21:31:46 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cr | |
| CVE-2025-64537 | 9.3 | 0.52% | 1 | 0 | 2025-12-10T21:31:33 | Adobe Experience Manager versions 6.5.23 and earlier are affected by a DOM-based | |
| CVE-2025-34424 | None | 0.01% | 1 | 0 | 2025-12-10T18:30:37 | MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability t | |
| CVE-2025-34423 | None | 0.01% | 1 | 0 | 2025-12-10T18:30:37 | MailEnable versions prior to 10.54 contain an unsafe DLL loading vulnerability t | |
| CVE-2025-55182 | 10.0 | 76.01% | 10 | 100 | template | 2025-12-10T02:00:02.557000 | A pre-authentication remote code execution vulnerability exists in React Server |
| CVE-2025-54100 | 7.8 | 0.17% | 1 | 2 | 2025-12-09T18:30:47 | Improper neutralization of special elements used in a command ('command injectio | |
| CVE-2025-40801 | 8.1 | 0.02% | 1 | 0 | 2025-12-09T18:30:43 | A vulnerability has been identified in COMOS V10.6 (All versions), COMOS V10.6 ( | |
| CVE-2025-66491 | 5.9 | 0.01% | 1 | 0 | 2025-12-09T16:32:30 | ## Impact There is a potential vulnerability in Traefik NGINX provider managing | |
| CVE-2025-66516 | None | 0.06% | 1 | 2 | 2025-12-05T02:26:57 | Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1 | |
| CVE-2025-54988 | 9.8 | 0.03% | 1 | 1 | 2025-11-05T20:40:58 | Critical XXE in Apache Tika (tika-parser-pdf-module) in Apache Tika 1.13 through | |
| CVE-2025-49144 | 7.3 | 0.01% | 1 | 9 | 2025-10-23T14:15:35.980000 | Notepad++ is a free and open-source source code editor. In versions 8.8.1 and pr | |
| CVE-2025-49113 | 9.9 | 88.03% | 1 | 22 | template | 2025-06-12T17:15:29.310000 | Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execu |
| CVE-2025-27591 | 7.8 | 0.01% | 1 | 17 | 2025-03-21T21:51:09 | ### Impact A privilege escalation vulnerability existed in the Below service pri | |
| CVE-2024-9042 | 5.9 | 0.07% | 2 | 0 | 2025-03-13T21:24:16 | A security vulnerability has been discovered in Kubernetes windows nodes that co | |
| CVE-2025-36747 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-14440 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2025-10738 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-11693 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2025-13089 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2025-12077 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-7058 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-14476 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2025-11376 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-11164 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-14397 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-14475 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-14454 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-14050 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-14278 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-14056 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-43529 | 0 | 0.00% | 3 | 0 | N/A | ||
| CVE-2025-65950 | 0 | 0.04% | 1 | 0 | N/A |
updated 2025-12-13T03:30:14
2 posts
CVE-2025-13970 - OpenPLC_V3 Cross-Site Request Forgery https://cvefeed.io/vuln/detail/CVE-2025-13970
##CVE-2025-13970 - OpenPLC_V3 Cross-Site Request Forgery https://cvefeed.io/vuln/detail/CVE-2025-13970
##updated 2025-12-13T00:30:32
1 posts
CVE-2025-14585 - itsourcecode COVID Tracking System page sql injection https://cvefeed.io/vuln/detail/CVE-2025-14585
##updated 2025-12-13T00:30:32
1 posts
CVE-2025-14582 - campcodes Online Student Enrollment System index.php unrestricted upload https://cvefeed.io/vuln/detail/CVE-2025-14582
##updated 2025-12-12T23:15:42.223000
1 posts
CVE-2025-67749 - PCSX2 has an Out-of-bounds Read due to unchecked offset and size passed to memcpy https://cvefeed.io/vuln/detail/CVE-2025-67749
##updated 2025-12-12T23:15:37.887000
1 posts
CVE-2025-14584 - itsourcecode COVID Tracking System Admin Login login.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14584
##updated 2025-12-12T22:15:39.123000
1 posts
CVE-2025-14583 - campcodes Online Student Enrollment System register.php unrestricted upload https://cvefeed.io/vuln/detail/CVE-2025-14583
##updated 2025-12-12T22:12:24
1 posts
CVE-2025-67721 - Aircompressor's Snappy and LZ4 Java-based decompressor implementation can leak information from reused output buffer https://cvefeed.io/vuln/detail/CVE-2025-67721
##updated 2025-12-12T21:37:31
2 posts
CVE-2025-67750 - Lightning Flow Scanner is Vulnerable to Code Injection via Unsafe Use of new Function() in APIVersion Rule https://cvefeed.io/vuln/detail/CVE-2025-67750
##CVE-2025-67750 - Lightning Flow Scanner is Vulnerable to Code Injection via Unsafe Use of new Function() in APIVersion Rule https://cvefeed.io/vuln/detail/CVE-2025-67750
##updated 2025-12-12T21:32:46
1 posts
CVE-2025-64011 - Nextcloud Server IDOR https://cvefeed.io/vuln/detail/CVE-2025-64011
##updated 2025-12-12T21:31:51
1 posts
CVE-2025-67634 - Software Acquisition Guide Supplier Response Web Tool XSS https://cvefeed.io/vuln/detail/CVE-2025-67634
##updated 2025-12-12T21:31:50
1 posts
CVE-2025-14373 - Google Chrome Android Domain Spoofing Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14373
##updated 2025-12-12T21:31:50
1 posts
CVE-2024-58311 - Dormakaba Saflok System 6000 Key Generation Cryptographic Weakness https://cvefeed.io/vuln/detail/CVE-2024-58311
##updated 2025-12-12T21:31:50
1 posts
CVE-2024-58299 - PCMan FTP Server 2.0 Remote Buffer Overflow via 'pwd' Command https://cvefeed.io/vuln/detail/CVE-2024-58299
##updated 2025-12-12T21:31:39
2 posts
CVE-2025-14572 - UTT 进取 512W formWebAuthGlobalConfig memory corruption https://cvefeed.io/vuln/detail/CVE-2025-14572
##UTT
##updated 2025-12-12T21:15:59.187000
1 posts
updated 2025-12-12T21:15:53.107000
2 posts
🔎 HIGH severity: CVE-2025-14611 in Gladinet CentreStack & TrioFox (<16.12.10420.56791) — hardcoded AES weakens crypto & enables unauth LFI. Restrict public access, monitor for LFI attempts, prep for patch. https://radar.offseq.com/threat/cve-2025-14611-vulnerability-in-gladinet-centresta-e4cb3dcd #OffSeq #Vulnerability #InfoSec
##There's now a CVE for the EITW Gladinet / Triofox hardcoded key vuln from a few days ago.
##updated 2025-12-12T21:15:52.350000
8 posts
I see that Brendan Eich from Brave is out lying about @Vivaldi again. He claims that Brave was pretty much the first out with a fix for CVE-2025-14174 and that Vivaldi still has not released a fix.
AFAIK we were actually first because we released 7.7.3862.88 (Android) based on 142.0.7444.237 from the Extended Support Release branch at 13:00 UTC (and for Desktop [7.7.3851.61] one hour later) on the 10th of December, which includes a fix for CVE-2025-14174. However since that CVE was not being publicly discussed yet, it was not initially listed in the changelog.
I have updated the Desktop announcement to mention the CVE now. Here it is:
https://vivaldi.com/blog/desktop/minor-update-five-7-7/
Also FWIW my Masto bot which tracks various desktop browser updates announced us here:
https://social.vivaldi.net/@browserversiontracker/115695393613130159
That bot has a sibling that looks at Vivaldi only releases (all platforms), which caught the Android release:
https://social.vivaldi.net/@vivaldiversiontracker/115695161453809439
And here is when it detected the Brave annoucement, more than a day later:
https://social.vivaldi.net/@browserversiontracker/115702471419843978
##I see that Brendan Eich from Brave is out lying about @Vivaldi again. He claims that Brave was pretty much the first out with a fix for CVE-2025-14174 and that Vivaldi still has not released a fix.
AFAIK we were actually first because we released 7.7.3862.88 (Android) based on 142.0.7444.237 from the Extended Support Release branch at 13:00 UTC (and for Desktop [7.7.3851.61] one hour later) on the 10th of December, which includes a fix for CVE-2025-14174. However since that CVE was not being publicly discussed yet, it was not initially listed in the changelog.
I have updated the Desktop announcement to mention the CVE now. Here it is:
https://vivaldi.com/blog/desktop/minor-update-five-7-7/
Also FWIW my Masto bot which tracks various desktop browser updates announced us here:
https://social.vivaldi.net/@browserversiontracker/115695393613130159
That bot has a sibling that looks at Vivaldi only releases (all platforms), which caught the Android release:
https://social.vivaldi.net/@vivaldiversiontracker/115695161453809439
And here is when it detected the Brave annoucement, more than a day later:
https://social.vivaldi.net/@browserversiontracker/115702471419843978
##🚨 Two more vulnerabilities have been added to the CISA KEV Catalog
CVE-2018-4063: Sierra Wireless AirLink ALEOS Unrestricted Upload of File with Dangerous Type
CVSS: 8.8
CVE-2025-14174: Google Chromium Out of Bounds Memory Access
CVSS: 8.8
##CVE ID: CVE-2025-14174
Vendor: Google
Product: Chromium
Date Added: 2025-12-12
Notes: https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html ; https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security ; https://nvd.nist.gov/vuln/detail/CVE-2025-14174
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-14174
Two EITW 0days patched in iOS Webkit. The advisory says the exploits were against pre-iOS 26 but they have patches for 26 as well. And some other ones to go with those.
https://support.apple.com/en-us/125884
##Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report.
Processing maliciously crafted web content may lead to memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-43529 was also issued in response to this report.
📣 EMERGENCY UPDATES 📣
Apple pushed additional updates for 2 zero-days that may have been actively exploited.
🐛 CVE-2025-14174 (WebKit) additional patches,
🐛 CVE-2025-43529 (WebKit) additional patches:
- Safari 26.2
📣 EMERGENCY UPDATES 📣
Apple pushed updates for 2 new zero-days that may have been actively exploited.
🐛 CVE-2025-14174 (WebKit),
🐛 CVE-2025-43529 (WebKit):
- iOS and iPadOS 18.7.3
- iOS and iPadOS 26.2
- macOS Tahoe 26.2
- tvOS 26.2
- visionOS 26.2
- watchOS 26.2
updated 2025-12-12T21:15:51.430000
1 posts
CVE-2024-58316 - Online Shopping System Advanced 1.0 SQL Injection via Payment Success Parameter https://cvefeed.io/vuln/detail/CVE-2024-58316
##updated 2025-12-12T20:25:07
1 posts
CVE-2025-67819 - Weaviate File Path Traversal https://cvefeed.io/vuln/detail/CVE-2025-67819
##updated 2025-12-12T20:15:43.250000
1 posts
CVE-2025-8083 - Vuetify Prototype Pollution via Preset options https://cvefeed.io/vuln/detail/CVE-2025-8083
##updated 2025-12-12T20:15:42.770000
1 posts
CVE-2025-67818 - Weaviate Path Traversal File Write https://cvefeed.io/vuln/detail/CVE-2025-67818
##updated 2025-12-12T20:15:42.327000
1 posts
CVE-2025-67342 - RuoYi Stored XSS Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-67342
##updated 2025-12-12T20:15:41.747000
2 posts
🔔 CRITICAL: Plesk 18.0 (CVE-2025-66430) suffers from incorrect access control, risking unauthorized admin actions. No exploit yet, but review roles, restrict access, and monitor logs ASAP. Patch pending. https://radar.offseq.com/threat/cve-2025-66430-na-91279388 #OffSeq #Plesk #Vuln #AccessControl
##I think I already posted this one but the CVE was just published so go hack more Plesk shit anyway.
##updated 2025-12-12T20:15:39.327000
1 posts
CVE-2024-58314 - Atcom 2.7.x.x Authenticated Command Injection via Web Configuration CGI https://cvefeed.io/vuln/detail/CVE-2024-58314
##updated 2025-12-12T20:15:39.020000
1 posts
CVE-2024-58305 - WonderCMS 4.3.2 Cross-Site Scripting Remote Code Execution via Module Installation https://cvefeed.io/vuln/detail/CVE-2024-58305
##updated 2025-12-12T20:15:38.520000
1 posts
CVE-2024-14010 - Typora 1.7.4 OS Command Injection via Export PDF Preferences https://cvefeed.io/vuln/detail/CVE-2024-14010
##updated 2025-12-12T19:58:16.457000
1 posts
CVE-2025-64538 - Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79) https://cvefeed.io/vuln/detail/CVE-2025-64538
##updated 2025-12-12T19:58:13.747000
1 posts
CVE-2025-64539 - Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79) https://cvefeed.io/vuln/detail/CVE-2025-64539
##updated 2025-12-12T19:16:03.773000
3 posts
1 repos
New React Server vulnerabilities reported, enable Denial-of-Service attacks and source code exposure
Three new vulnerabilities were discovered in React Server Components (versions 19.0.0-19.2.2) following the React2Shell patch: two high-severity denial-of-service flaws (CVE-2025-55184, CVE-2025-67779) that can hang servers via malicious HTTP requests, and one medium-severity source code exposure vulnerability (CVE-2025-55183) that could leak hardcoded secrets.
**If you're using React Server Components or frameworks like Next.js, plan an upgrade to limit DoS risks and source code leaks. Not urgent like the React2Shell flaw, but a wise choice - especially the DoS patch. You don't want someone repeatedly crashing your application.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/new-react-server-vulnerabilities-reported-enable-denial-of-service-attacks-and-source-code-exposure-7-q-0-p-e/gD2P6Ple2L
New React Server vulnerabilities reported, enable Denial-of-Service attacks and source code exposure
Three new vulnerabilities were discovered in React Server Components (versions 19.0.0-19.2.2) following the React2Shell patch: two high-severity denial-of-service flaws (CVE-2025-55184, CVE-2025-67779) that can hang servers via malicious HTTP requests, and one medium-severity source code exposure vulnerability (CVE-2025-55183) that could leak hardcoded secrets.
**If you're using React Server Components or frameworks like Next.js, plan an upgrade to limit DoS risks and source code leaks. Not urgent like the React2Shell flaw, but a wise choice - especially the DoS patch. You don't want someone repeatedly crashing your application.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/new-react-server-vulnerabilities-reported-enable-denial-of-service-attacks-and-source-code-exposure-7-q-0-p-e/gD2P6Ple2L
Happy patch your React Server Components again Friday to all who celebrate. The patch for CVE-2025-55184 was incomplete and still leaves systems vulnerable to DoS.
https://www.facebook.com/security/advisories/cve-2025-67779
##It was found that the fix addressing CVE-2025-55184 in React Server Components was incomplete and does not prevent a denial of service attack in a specific case. React Server Components versions 19.0.2, 19.1.3 and 19.2.2 are affected, allowing unsafe deserialization of payloads from HTTP requests to Server Function endpoints. This can cause an infinite loop that hangs the server process and may prevent future HTTP requests from being served.
updated 2025-12-12T19:15:59.653000
2 posts
🚨 Two more vulnerabilities have been added to the CISA KEV Catalog
CVE-2018-4063: Sierra Wireless AirLink ALEOS Unrestricted Upload of File with Dangerous Type
CVSS: 8.8
CVE-2025-14174: Google Chromium Out of Bounds Memory Access
CVSS: 8.8
##CVE ID: CVE-2018-4063
Vendor: Sierra Wireless
Product: AirLink ALEOS
Date Added: 2025-12-12
Notes: https://www.cisa.gov/news-events/ics-advisories/icsa-19-122-03 ; https://source.sierrawireless.com/resources/airlink/software_reference_docs/technical-bulletin/sierra-wireless-technical-bulletin---swi-psa-2019-003 ; https://source.sierrawireless.com/resources/airlink/hardware_reference_docs/airlink_es450_eol ; https://nvd.nist.gov/vuln/detail/CVE-2018-4063
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2018-4063
updated 2025-12-12T18:31:38
1 posts
More Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56099
https://www.cve.org/CVERecord?id=CVE-2025-56101
https://www.cve.org/CVERecord?id=CVE-2025-56102
https://www.cve.org/CVERecord?id=CVE-2025-56106
https://www.cve.org/CVERecord?id=CVE-2025-56107
https://www.cve.org/CVERecord?id=CVE-2025-56108
https://www.cve.org/CVERecord?id=CVE-2025-56109
https://www.cve.org/CVERecord?id=CVE-2025-56110
https://www.cve.org/CVERecord?id=CVE-2025-56111
https://www.cve.org/CVERecord?id=CVE-2025-56113
https://www.cve.org/CVERecord?id=CVE-2025-56114
https://www.cve.org/CVERecord?id=CVE-2025-56117
https://www.cve.org/CVERecord?id=CVE-2025-56118
##updated 2025-12-12T18:31:38
1 posts
More Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56099
https://www.cve.org/CVERecord?id=CVE-2025-56101
https://www.cve.org/CVERecord?id=CVE-2025-56102
https://www.cve.org/CVERecord?id=CVE-2025-56106
https://www.cve.org/CVERecord?id=CVE-2025-56107
https://www.cve.org/CVERecord?id=CVE-2025-56108
https://www.cve.org/CVERecord?id=CVE-2025-56109
https://www.cve.org/CVERecord?id=CVE-2025-56110
https://www.cve.org/CVERecord?id=CVE-2025-56111
https://www.cve.org/CVERecord?id=CVE-2025-56113
https://www.cve.org/CVERecord?id=CVE-2025-56114
https://www.cve.org/CVERecord?id=CVE-2025-56117
https://www.cve.org/CVERecord?id=CVE-2025-56118
##updated 2025-12-12T18:31:37
1 posts
More Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56099
https://www.cve.org/CVERecord?id=CVE-2025-56101
https://www.cve.org/CVERecord?id=CVE-2025-56102
https://www.cve.org/CVERecord?id=CVE-2025-56106
https://www.cve.org/CVERecord?id=CVE-2025-56107
https://www.cve.org/CVERecord?id=CVE-2025-56108
https://www.cve.org/CVERecord?id=CVE-2025-56109
https://www.cve.org/CVERecord?id=CVE-2025-56110
https://www.cve.org/CVERecord?id=CVE-2025-56111
https://www.cve.org/CVERecord?id=CVE-2025-56113
https://www.cve.org/CVERecord?id=CVE-2025-56114
https://www.cve.org/CVERecord?id=CVE-2025-56117
https://www.cve.org/CVERecord?id=CVE-2025-56118
##updated 2025-12-12T18:31:37
1 posts
More Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56099
https://www.cve.org/CVERecord?id=CVE-2025-56101
https://www.cve.org/CVERecord?id=CVE-2025-56102
https://www.cve.org/CVERecord?id=CVE-2025-56106
https://www.cve.org/CVERecord?id=CVE-2025-56107
https://www.cve.org/CVERecord?id=CVE-2025-56108
https://www.cve.org/CVERecord?id=CVE-2025-56109
https://www.cve.org/CVERecord?id=CVE-2025-56110
https://www.cve.org/CVERecord?id=CVE-2025-56111
https://www.cve.org/CVERecord?id=CVE-2025-56113
https://www.cve.org/CVERecord?id=CVE-2025-56114
https://www.cve.org/CVERecord?id=CVE-2025-56117
https://www.cve.org/CVERecord?id=CVE-2025-56118
##updated 2025-12-12T18:31:37
1 posts
More Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56099
https://www.cve.org/CVERecord?id=CVE-2025-56101
https://www.cve.org/CVERecord?id=CVE-2025-56102
https://www.cve.org/CVERecord?id=CVE-2025-56106
https://www.cve.org/CVERecord?id=CVE-2025-56107
https://www.cve.org/CVERecord?id=CVE-2025-56108
https://www.cve.org/CVERecord?id=CVE-2025-56109
https://www.cve.org/CVERecord?id=CVE-2025-56110
https://www.cve.org/CVERecord?id=CVE-2025-56111
https://www.cve.org/CVERecord?id=CVE-2025-56113
https://www.cve.org/CVERecord?id=CVE-2025-56114
https://www.cve.org/CVERecord?id=CVE-2025-56117
https://www.cve.org/CVERecord?id=CVE-2025-56118
##updated 2025-12-12T18:31:37
1 posts
Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56077
https://www.cve.org/CVERecord?id=CVE-2025-56079
https://www.cve.org/CVERecord?id=CVE-2025-56082
https://www.cve.org/CVERecord?id=CVE-2025-56083
https://www.cve.org/CVERecord?id=CVE-2025-56084
https://www.cve.org/CVERecord?id=CVE-2025-56085
https://www.cve.org/CVERecord?id=CVE-2025-56086
https://www.cve.org/CVERecord?id=CVE-2025-56087
https://www.cve.org/CVERecord?id=CVE-2025-56088
https://www.cve.org/CVERecord?id=CVE-2025-56089
https://www.cve.org/CVERecord?id=CVE-2025-56090
https://www.cve.org/CVERecord?id=CVE-2025-56091
https://www.cve.org/CVERecord?id=CVE-2025-56092
https://www.cve.org/CVERecord?id=CVE-2025-56093
https://www.cve.org/CVERecord?id=CVE-2025-56094
https://www.cve.org/CVERecord?id=CVE-2025-56095
https://www.cve.org/CVERecord?id=CVE-2025-56096
https://www.cve.org/CVERecord?id=CVE-2025-56097
##updated 2025-12-12T18:31:37
1 posts
Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56077
https://www.cve.org/CVERecord?id=CVE-2025-56079
https://www.cve.org/CVERecord?id=CVE-2025-56082
https://www.cve.org/CVERecord?id=CVE-2025-56083
https://www.cve.org/CVERecord?id=CVE-2025-56084
https://www.cve.org/CVERecord?id=CVE-2025-56085
https://www.cve.org/CVERecord?id=CVE-2025-56086
https://www.cve.org/CVERecord?id=CVE-2025-56087
https://www.cve.org/CVERecord?id=CVE-2025-56088
https://www.cve.org/CVERecord?id=CVE-2025-56089
https://www.cve.org/CVERecord?id=CVE-2025-56090
https://www.cve.org/CVERecord?id=CVE-2025-56091
https://www.cve.org/CVERecord?id=CVE-2025-56092
https://www.cve.org/CVERecord?id=CVE-2025-56093
https://www.cve.org/CVERecord?id=CVE-2025-56094
https://www.cve.org/CVERecord?id=CVE-2025-56095
https://www.cve.org/CVERecord?id=CVE-2025-56096
https://www.cve.org/CVERecord?id=CVE-2025-56097
##updated 2025-12-12T18:31:36
1 posts
More Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56099
https://www.cve.org/CVERecord?id=CVE-2025-56101
https://www.cve.org/CVERecord?id=CVE-2025-56102
https://www.cve.org/CVERecord?id=CVE-2025-56106
https://www.cve.org/CVERecord?id=CVE-2025-56107
https://www.cve.org/CVERecord?id=CVE-2025-56108
https://www.cve.org/CVERecord?id=CVE-2025-56109
https://www.cve.org/CVERecord?id=CVE-2025-56110
https://www.cve.org/CVERecord?id=CVE-2025-56111
https://www.cve.org/CVERecord?id=CVE-2025-56113
https://www.cve.org/CVERecord?id=CVE-2025-56114
https://www.cve.org/CVERecord?id=CVE-2025-56117
https://www.cve.org/CVERecord?id=CVE-2025-56118
##updated 2025-12-12T18:31:36
1 posts
More Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56099
https://www.cve.org/CVERecord?id=CVE-2025-56101
https://www.cve.org/CVERecord?id=CVE-2025-56102
https://www.cve.org/CVERecord?id=CVE-2025-56106
https://www.cve.org/CVERecord?id=CVE-2025-56107
https://www.cve.org/CVERecord?id=CVE-2025-56108
https://www.cve.org/CVERecord?id=CVE-2025-56109
https://www.cve.org/CVERecord?id=CVE-2025-56110
https://www.cve.org/CVERecord?id=CVE-2025-56111
https://www.cve.org/CVERecord?id=CVE-2025-56113
https://www.cve.org/CVERecord?id=CVE-2025-56114
https://www.cve.org/CVERecord?id=CVE-2025-56117
https://www.cve.org/CVERecord?id=CVE-2025-56118
##updated 2025-12-12T18:31:36
1 posts
More Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56099
https://www.cve.org/CVERecord?id=CVE-2025-56101
https://www.cve.org/CVERecord?id=CVE-2025-56102
https://www.cve.org/CVERecord?id=CVE-2025-56106
https://www.cve.org/CVERecord?id=CVE-2025-56107
https://www.cve.org/CVERecord?id=CVE-2025-56108
https://www.cve.org/CVERecord?id=CVE-2025-56109
https://www.cve.org/CVERecord?id=CVE-2025-56110
https://www.cve.org/CVERecord?id=CVE-2025-56111
https://www.cve.org/CVERecord?id=CVE-2025-56113
https://www.cve.org/CVERecord?id=CVE-2025-56114
https://www.cve.org/CVERecord?id=CVE-2025-56117
https://www.cve.org/CVERecord?id=CVE-2025-56118
##updated 2025-12-12T18:31:36
1 posts
Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56077
https://www.cve.org/CVERecord?id=CVE-2025-56079
https://www.cve.org/CVERecord?id=CVE-2025-56082
https://www.cve.org/CVERecord?id=CVE-2025-56083
https://www.cve.org/CVERecord?id=CVE-2025-56084
https://www.cve.org/CVERecord?id=CVE-2025-56085
https://www.cve.org/CVERecord?id=CVE-2025-56086
https://www.cve.org/CVERecord?id=CVE-2025-56087
https://www.cve.org/CVERecord?id=CVE-2025-56088
https://www.cve.org/CVERecord?id=CVE-2025-56089
https://www.cve.org/CVERecord?id=CVE-2025-56090
https://www.cve.org/CVERecord?id=CVE-2025-56091
https://www.cve.org/CVERecord?id=CVE-2025-56092
https://www.cve.org/CVERecord?id=CVE-2025-56093
https://www.cve.org/CVERecord?id=CVE-2025-56094
https://www.cve.org/CVERecord?id=CVE-2025-56095
https://www.cve.org/CVERecord?id=CVE-2025-56096
https://www.cve.org/CVERecord?id=CVE-2025-56097
##updated 2025-12-12T18:31:36
1 posts
Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56077
https://www.cve.org/CVERecord?id=CVE-2025-56079
https://www.cve.org/CVERecord?id=CVE-2025-56082
https://www.cve.org/CVERecord?id=CVE-2025-56083
https://www.cve.org/CVERecord?id=CVE-2025-56084
https://www.cve.org/CVERecord?id=CVE-2025-56085
https://www.cve.org/CVERecord?id=CVE-2025-56086
https://www.cve.org/CVERecord?id=CVE-2025-56087
https://www.cve.org/CVERecord?id=CVE-2025-56088
https://www.cve.org/CVERecord?id=CVE-2025-56089
https://www.cve.org/CVERecord?id=CVE-2025-56090
https://www.cve.org/CVERecord?id=CVE-2025-56091
https://www.cve.org/CVERecord?id=CVE-2025-56092
https://www.cve.org/CVERecord?id=CVE-2025-56093
https://www.cve.org/CVERecord?id=CVE-2025-56094
https://www.cve.org/CVERecord?id=CVE-2025-56095
https://www.cve.org/CVERecord?id=CVE-2025-56096
https://www.cve.org/CVERecord?id=CVE-2025-56097
##updated 2025-12-12T18:31:36
1 posts
Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56077
https://www.cve.org/CVERecord?id=CVE-2025-56079
https://www.cve.org/CVERecord?id=CVE-2025-56082
https://www.cve.org/CVERecord?id=CVE-2025-56083
https://www.cve.org/CVERecord?id=CVE-2025-56084
https://www.cve.org/CVERecord?id=CVE-2025-56085
https://www.cve.org/CVERecord?id=CVE-2025-56086
https://www.cve.org/CVERecord?id=CVE-2025-56087
https://www.cve.org/CVERecord?id=CVE-2025-56088
https://www.cve.org/CVERecord?id=CVE-2025-56089
https://www.cve.org/CVERecord?id=CVE-2025-56090
https://www.cve.org/CVERecord?id=CVE-2025-56091
https://www.cve.org/CVERecord?id=CVE-2025-56092
https://www.cve.org/CVERecord?id=CVE-2025-56093
https://www.cve.org/CVERecord?id=CVE-2025-56094
https://www.cve.org/CVERecord?id=CVE-2025-56095
https://www.cve.org/CVERecord?id=CVE-2025-56096
https://www.cve.org/CVERecord?id=CVE-2025-56097
##updated 2025-12-12T18:31:36
1 posts
Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56077
https://www.cve.org/CVERecord?id=CVE-2025-56079
https://www.cve.org/CVERecord?id=CVE-2025-56082
https://www.cve.org/CVERecord?id=CVE-2025-56083
https://www.cve.org/CVERecord?id=CVE-2025-56084
https://www.cve.org/CVERecord?id=CVE-2025-56085
https://www.cve.org/CVERecord?id=CVE-2025-56086
https://www.cve.org/CVERecord?id=CVE-2025-56087
https://www.cve.org/CVERecord?id=CVE-2025-56088
https://www.cve.org/CVERecord?id=CVE-2025-56089
https://www.cve.org/CVERecord?id=CVE-2025-56090
https://www.cve.org/CVERecord?id=CVE-2025-56091
https://www.cve.org/CVERecord?id=CVE-2025-56092
https://www.cve.org/CVERecord?id=CVE-2025-56093
https://www.cve.org/CVERecord?id=CVE-2025-56094
https://www.cve.org/CVERecord?id=CVE-2025-56095
https://www.cve.org/CVERecord?id=CVE-2025-56096
https://www.cve.org/CVERecord?id=CVE-2025-56097
##updated 2025-12-12T18:31:36
1 posts
Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56077
https://www.cve.org/CVERecord?id=CVE-2025-56079
https://www.cve.org/CVERecord?id=CVE-2025-56082
https://www.cve.org/CVERecord?id=CVE-2025-56083
https://www.cve.org/CVERecord?id=CVE-2025-56084
https://www.cve.org/CVERecord?id=CVE-2025-56085
https://www.cve.org/CVERecord?id=CVE-2025-56086
https://www.cve.org/CVERecord?id=CVE-2025-56087
https://www.cve.org/CVERecord?id=CVE-2025-56088
https://www.cve.org/CVERecord?id=CVE-2025-56089
https://www.cve.org/CVERecord?id=CVE-2025-56090
https://www.cve.org/CVERecord?id=CVE-2025-56091
https://www.cve.org/CVERecord?id=CVE-2025-56092
https://www.cve.org/CVERecord?id=CVE-2025-56093
https://www.cve.org/CVERecord?id=CVE-2025-56094
https://www.cve.org/CVERecord?id=CVE-2025-56095
https://www.cve.org/CVERecord?id=CVE-2025-56096
https://www.cve.org/CVERecord?id=CVE-2025-56097
##updated 2025-12-12T18:31:36
1 posts
Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56077
https://www.cve.org/CVERecord?id=CVE-2025-56079
https://www.cve.org/CVERecord?id=CVE-2025-56082
https://www.cve.org/CVERecord?id=CVE-2025-56083
https://www.cve.org/CVERecord?id=CVE-2025-56084
https://www.cve.org/CVERecord?id=CVE-2025-56085
https://www.cve.org/CVERecord?id=CVE-2025-56086
https://www.cve.org/CVERecord?id=CVE-2025-56087
https://www.cve.org/CVERecord?id=CVE-2025-56088
https://www.cve.org/CVERecord?id=CVE-2025-56089
https://www.cve.org/CVERecord?id=CVE-2025-56090
https://www.cve.org/CVERecord?id=CVE-2025-56091
https://www.cve.org/CVERecord?id=CVE-2025-56092
https://www.cve.org/CVERecord?id=CVE-2025-56093
https://www.cve.org/CVERecord?id=CVE-2025-56094
https://www.cve.org/CVERecord?id=CVE-2025-56095
https://www.cve.org/CVERecord?id=CVE-2025-56096
https://www.cve.org/CVERecord?id=CVE-2025-56097
##updated 2025-12-12T18:30:41
1 posts
CVE-2023-29144 - Malwarebytes Linux Signature Validation Bypass https://cvefeed.io/vuln/detail/CVE-2023-29144
##updated 2025-12-12T18:30:34
1 posts
Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56077
https://www.cve.org/CVERecord?id=CVE-2025-56079
https://www.cve.org/CVERecord?id=CVE-2025-56082
https://www.cve.org/CVERecord?id=CVE-2025-56083
https://www.cve.org/CVERecord?id=CVE-2025-56084
https://www.cve.org/CVERecord?id=CVE-2025-56085
https://www.cve.org/CVERecord?id=CVE-2025-56086
https://www.cve.org/CVERecord?id=CVE-2025-56087
https://www.cve.org/CVERecord?id=CVE-2025-56088
https://www.cve.org/CVERecord?id=CVE-2025-56089
https://www.cve.org/CVERecord?id=CVE-2025-56090
https://www.cve.org/CVERecord?id=CVE-2025-56091
https://www.cve.org/CVERecord?id=CVE-2025-56092
https://www.cve.org/CVERecord?id=CVE-2025-56093
https://www.cve.org/CVERecord?id=CVE-2025-56094
https://www.cve.org/CVERecord?id=CVE-2025-56095
https://www.cve.org/CVERecord?id=CVE-2025-56096
https://www.cve.org/CVERecord?id=CVE-2025-56097
##updated 2025-12-12T18:30:33
1 posts
Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56077
https://www.cve.org/CVERecord?id=CVE-2025-56079
https://www.cve.org/CVERecord?id=CVE-2025-56082
https://www.cve.org/CVERecord?id=CVE-2025-56083
https://www.cve.org/CVERecord?id=CVE-2025-56084
https://www.cve.org/CVERecord?id=CVE-2025-56085
https://www.cve.org/CVERecord?id=CVE-2025-56086
https://www.cve.org/CVERecord?id=CVE-2025-56087
https://www.cve.org/CVERecord?id=CVE-2025-56088
https://www.cve.org/CVERecord?id=CVE-2025-56089
https://www.cve.org/CVERecord?id=CVE-2025-56090
https://www.cve.org/CVERecord?id=CVE-2025-56091
https://www.cve.org/CVERecord?id=CVE-2025-56092
https://www.cve.org/CVERecord?id=CVE-2025-56093
https://www.cve.org/CVERecord?id=CVE-2025-56094
https://www.cve.org/CVERecord?id=CVE-2025-56095
https://www.cve.org/CVERecord?id=CVE-2025-56096
https://www.cve.org/CVERecord?id=CVE-2025-56097
##updated 2025-12-12T18:30:33
1 posts
Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56077
https://www.cve.org/CVERecord?id=CVE-2025-56079
https://www.cve.org/CVERecord?id=CVE-2025-56082
https://www.cve.org/CVERecord?id=CVE-2025-56083
https://www.cve.org/CVERecord?id=CVE-2025-56084
https://www.cve.org/CVERecord?id=CVE-2025-56085
https://www.cve.org/CVERecord?id=CVE-2025-56086
https://www.cve.org/CVERecord?id=CVE-2025-56087
https://www.cve.org/CVERecord?id=CVE-2025-56088
https://www.cve.org/CVERecord?id=CVE-2025-56089
https://www.cve.org/CVERecord?id=CVE-2025-56090
https://www.cve.org/CVERecord?id=CVE-2025-56091
https://www.cve.org/CVERecord?id=CVE-2025-56092
https://www.cve.org/CVERecord?id=CVE-2025-56093
https://www.cve.org/CVERecord?id=CVE-2025-56094
https://www.cve.org/CVERecord?id=CVE-2025-56095
https://www.cve.org/CVERecord?id=CVE-2025-56096
https://www.cve.org/CVERecord?id=CVE-2025-56097
##updated 2025-12-12T18:30:32
1 posts
Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56077
https://www.cve.org/CVERecord?id=CVE-2025-56079
https://www.cve.org/CVERecord?id=CVE-2025-56082
https://www.cve.org/CVERecord?id=CVE-2025-56083
https://www.cve.org/CVERecord?id=CVE-2025-56084
https://www.cve.org/CVERecord?id=CVE-2025-56085
https://www.cve.org/CVERecord?id=CVE-2025-56086
https://www.cve.org/CVERecord?id=CVE-2025-56087
https://www.cve.org/CVERecord?id=CVE-2025-56088
https://www.cve.org/CVERecord?id=CVE-2025-56089
https://www.cve.org/CVERecord?id=CVE-2025-56090
https://www.cve.org/CVERecord?id=CVE-2025-56091
https://www.cve.org/CVERecord?id=CVE-2025-56092
https://www.cve.org/CVERecord?id=CVE-2025-56093
https://www.cve.org/CVERecord?id=CVE-2025-56094
https://www.cve.org/CVERecord?id=CVE-2025-56095
https://www.cve.org/CVERecord?id=CVE-2025-56096
https://www.cve.org/CVERecord?id=CVE-2025-56097
##updated 2025-12-12T18:18:29.827000
6 posts
8 repos
https://github.com/BakhodiribnYashinibnMansur/CVE-2025-55184
https://github.com/bountyyfi/lonkero
https://github.com/ejpir/CVE-2025-55184
https://github.com/williavs/nextjs-security-update
https://github.com/hans362/CVE-2025-55184-poc
https://github.com/abdozkaya/rsc-security-auditor
New React Server vulnerabilities reported, enable Denial-of-Service attacks and source code exposure
Three new vulnerabilities were discovered in React Server Components (versions 19.0.0-19.2.2) following the React2Shell patch: two high-severity denial-of-service flaws (CVE-2025-55184, CVE-2025-67779) that can hang servers via malicious HTTP requests, and one medium-severity source code exposure vulnerability (CVE-2025-55183) that could leak hardcoded secrets.
**If you're using React Server Components or frameworks like Next.js, plan an upgrade to limit DoS risks and source code leaks. Not urgent like the React2Shell flaw, but a wise choice - especially the DoS patch. You don't want someone repeatedly crashing your application.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/new-react-server-vulnerabilities-reported-enable-denial-of-service-attacks-and-source-code-exposure-7-q-0-p-e/gD2P6Ple2L
New React Server vulnerabilities reported, enable Denial-of-Service attacks and source code exposure
Three new vulnerabilities were discovered in React Server Components (versions 19.0.0-19.2.2) following the React2Shell patch: two high-severity denial-of-service flaws (CVE-2025-55184, CVE-2025-67779) that can hang servers via malicious HTTP requests, and one medium-severity source code exposure vulnerability (CVE-2025-55183) that could leak hardcoded secrets.
**If you're using React Server Components or frameworks like Next.js, plan an upgrade to limit DoS risks and source code leaks. Not urgent like the React2Shell flaw, but a wise choice - especially the DoS patch. You don't want someone repeatedly crashing your application.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/new-react-server-vulnerabilities-reported-enable-denial-of-service-attacks-and-source-code-exposure-7-q-0-p-e/gD2P6Ple2L
Happy patch your React Server Components again Friday to all who celebrate. The patch for CVE-2025-55184 was incomplete and still leaves systems vulnerable to DoS.
https://www.facebook.com/security/advisories/cve-2025-67779
##It was found that the fix addressing CVE-2025-55184 in React Server Components was incomplete and does not prevent a denial of service attack in a specific case. React Server Components versions 19.0.2, 19.1.3 and 19.2.2 are affected, allowing unsafe deserialization of payloads from HTTP requests to Server Function endpoints. This can cause an infinite loop that hangs the server process and may prevent future HTTP requests from being served.
F5 finally confirmed their stuff is not impacted by CVE-2025-55184.
##If you just updated React / NextJS for #react2shell , you now get to update again. Two additional vulnerabilities identified in follow-up work were just published: CVE-2025-55183 (DoS), CVE-2025-55184 (Source Code Exposure)
##CVE-2025-55184 - "React Server Components Denial of Service Vulnerability" https://cvefeed.io/vuln/detail/CVE-2025-55184
##updated 2025-12-12T18:18:19.950000
4 posts
7 repos
https://github.com/bountyyfi/lonkero
https://github.com/williavs/nextjs-security-update
https://github.com/kimtruth/CVE-2025-55183-poc
https://github.com/Saturate/CVE-2025-55183
https://github.com/X-Cotang/CVE-2025-55183_POC
New React Server vulnerabilities reported, enable Denial-of-Service attacks and source code exposure
Three new vulnerabilities were discovered in React Server Components (versions 19.0.0-19.2.2) following the React2Shell patch: two high-severity denial-of-service flaws (CVE-2025-55184, CVE-2025-67779) that can hang servers via malicious HTTP requests, and one medium-severity source code exposure vulnerability (CVE-2025-55183) that could leak hardcoded secrets.
**If you're using React Server Components or frameworks like Next.js, plan an upgrade to limit DoS risks and source code leaks. Not urgent like the React2Shell flaw, but a wise choice - especially the DoS patch. You don't want someone repeatedly crashing your application.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/new-react-server-vulnerabilities-reported-enable-denial-of-service-attacks-and-source-code-exposure-7-q-0-p-e/gD2P6Ple2L
New React Server vulnerabilities reported, enable Denial-of-Service attacks and source code exposure
Three new vulnerabilities were discovered in React Server Components (versions 19.0.0-19.2.2) following the React2Shell patch: two high-severity denial-of-service flaws (CVE-2025-55184, CVE-2025-67779) that can hang servers via malicious HTTP requests, and one medium-severity source code exposure vulnerability (CVE-2025-55183) that could leak hardcoded secrets.
**If you're using React Server Components or frameworks like Next.js, plan an upgrade to limit DoS risks and source code leaks. Not urgent like the React2Shell flaw, but a wise choice - especially the DoS patch. You don't want someone repeatedly crashing your application.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/new-react-server-vulnerabilities-reported-enable-denial-of-service-attacks-and-source-code-exposure-7-q-0-p-e/gD2P6Ple2L
If you just updated React / NextJS for #react2shell , you now get to update again. Two additional vulnerabilities identified in follow-up work were just published: CVE-2025-55183 (DoS), CVE-2025-55184 (Source Code Exposure)
##CVE-2025-55183 - Apache React Server Components Information Disclosure https://cvefeed.io/vuln/detail/CVE-2025-55183
##updated 2025-12-12T18:15:44.537000
1 posts
More Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56099
https://www.cve.org/CVERecord?id=CVE-2025-56101
https://www.cve.org/CVERecord?id=CVE-2025-56102
https://www.cve.org/CVERecord?id=CVE-2025-56106
https://www.cve.org/CVERecord?id=CVE-2025-56107
https://www.cve.org/CVERecord?id=CVE-2025-56108
https://www.cve.org/CVERecord?id=CVE-2025-56109
https://www.cve.org/CVERecord?id=CVE-2025-56110
https://www.cve.org/CVERecord?id=CVE-2025-56111
https://www.cve.org/CVERecord?id=CVE-2025-56113
https://www.cve.org/CVERecord?id=CVE-2025-56114
https://www.cve.org/CVERecord?id=CVE-2025-56117
https://www.cve.org/CVERecord?id=CVE-2025-56118
##updated 2025-12-12T18:15:44.377000
1 posts
More Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56099
https://www.cve.org/CVERecord?id=CVE-2025-56101
https://www.cve.org/CVERecord?id=CVE-2025-56102
https://www.cve.org/CVERecord?id=CVE-2025-56106
https://www.cve.org/CVERecord?id=CVE-2025-56107
https://www.cve.org/CVERecord?id=CVE-2025-56108
https://www.cve.org/CVERecord?id=CVE-2025-56109
https://www.cve.org/CVERecord?id=CVE-2025-56110
https://www.cve.org/CVERecord?id=CVE-2025-56111
https://www.cve.org/CVERecord?id=CVE-2025-56113
https://www.cve.org/CVERecord?id=CVE-2025-56114
https://www.cve.org/CVERecord?id=CVE-2025-56117
https://www.cve.org/CVERecord?id=CVE-2025-56118
##updated 2025-12-12T18:15:44.047000
1 posts
More Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56099
https://www.cve.org/CVERecord?id=CVE-2025-56101
https://www.cve.org/CVERecord?id=CVE-2025-56102
https://www.cve.org/CVERecord?id=CVE-2025-56106
https://www.cve.org/CVERecord?id=CVE-2025-56107
https://www.cve.org/CVERecord?id=CVE-2025-56108
https://www.cve.org/CVERecord?id=CVE-2025-56109
https://www.cve.org/CVERecord?id=CVE-2025-56110
https://www.cve.org/CVERecord?id=CVE-2025-56111
https://www.cve.org/CVERecord?id=CVE-2025-56113
https://www.cve.org/CVERecord?id=CVE-2025-56114
https://www.cve.org/CVERecord?id=CVE-2025-56117
https://www.cve.org/CVERecord?id=CVE-2025-56118
##updated 2025-12-12T18:15:43.890000
1 posts
More Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56099
https://www.cve.org/CVERecord?id=CVE-2025-56101
https://www.cve.org/CVERecord?id=CVE-2025-56102
https://www.cve.org/CVERecord?id=CVE-2025-56106
https://www.cve.org/CVERecord?id=CVE-2025-56107
https://www.cve.org/CVERecord?id=CVE-2025-56108
https://www.cve.org/CVERecord?id=CVE-2025-56109
https://www.cve.org/CVERecord?id=CVE-2025-56110
https://www.cve.org/CVERecord?id=CVE-2025-56111
https://www.cve.org/CVERecord?id=CVE-2025-56113
https://www.cve.org/CVERecord?id=CVE-2025-56114
https://www.cve.org/CVERecord?id=CVE-2025-56117
https://www.cve.org/CVERecord?id=CVE-2025-56118
##updated 2025-12-12T18:15:43.730000
1 posts
More Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56099
https://www.cve.org/CVERecord?id=CVE-2025-56101
https://www.cve.org/CVERecord?id=CVE-2025-56102
https://www.cve.org/CVERecord?id=CVE-2025-56106
https://www.cve.org/CVERecord?id=CVE-2025-56107
https://www.cve.org/CVERecord?id=CVE-2025-56108
https://www.cve.org/CVERecord?id=CVE-2025-56109
https://www.cve.org/CVERecord?id=CVE-2025-56110
https://www.cve.org/CVERecord?id=CVE-2025-56111
https://www.cve.org/CVERecord?id=CVE-2025-56113
https://www.cve.org/CVERecord?id=CVE-2025-56114
https://www.cve.org/CVERecord?id=CVE-2025-56117
https://www.cve.org/CVERecord?id=CVE-2025-56118
##updated 2025-12-12T18:15:42.737000
1 posts
More Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56099
https://www.cve.org/CVERecord?id=CVE-2025-56101
https://www.cve.org/CVERecord?id=CVE-2025-56102
https://www.cve.org/CVERecord?id=CVE-2025-56106
https://www.cve.org/CVERecord?id=CVE-2025-56107
https://www.cve.org/CVERecord?id=CVE-2025-56108
https://www.cve.org/CVERecord?id=CVE-2025-56109
https://www.cve.org/CVERecord?id=CVE-2025-56110
https://www.cve.org/CVERecord?id=CVE-2025-56111
https://www.cve.org/CVERecord?id=CVE-2025-56113
https://www.cve.org/CVERecord?id=CVE-2025-56114
https://www.cve.org/CVERecord?id=CVE-2025-56117
https://www.cve.org/CVERecord?id=CVE-2025-56118
##updated 2025-12-12T18:15:41.603000
1 posts
Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56077
https://www.cve.org/CVERecord?id=CVE-2025-56079
https://www.cve.org/CVERecord?id=CVE-2025-56082
https://www.cve.org/CVERecord?id=CVE-2025-56083
https://www.cve.org/CVERecord?id=CVE-2025-56084
https://www.cve.org/CVERecord?id=CVE-2025-56085
https://www.cve.org/CVERecord?id=CVE-2025-56086
https://www.cve.org/CVERecord?id=CVE-2025-56087
https://www.cve.org/CVERecord?id=CVE-2025-56088
https://www.cve.org/CVERecord?id=CVE-2025-56089
https://www.cve.org/CVERecord?id=CVE-2025-56090
https://www.cve.org/CVERecord?id=CVE-2025-56091
https://www.cve.org/CVERecord?id=CVE-2025-56092
https://www.cve.org/CVERecord?id=CVE-2025-56093
https://www.cve.org/CVERecord?id=CVE-2025-56094
https://www.cve.org/CVERecord?id=CVE-2025-56095
https://www.cve.org/CVERecord?id=CVE-2025-56096
https://www.cve.org/CVERecord?id=CVE-2025-56097
##updated 2025-12-12T18:15:41.120000
1 posts
Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56077
https://www.cve.org/CVERecord?id=CVE-2025-56079
https://www.cve.org/CVERecord?id=CVE-2025-56082
https://www.cve.org/CVERecord?id=CVE-2025-56083
https://www.cve.org/CVERecord?id=CVE-2025-56084
https://www.cve.org/CVERecord?id=CVE-2025-56085
https://www.cve.org/CVERecord?id=CVE-2025-56086
https://www.cve.org/CVERecord?id=CVE-2025-56087
https://www.cve.org/CVERecord?id=CVE-2025-56088
https://www.cve.org/CVERecord?id=CVE-2025-56089
https://www.cve.org/CVERecord?id=CVE-2025-56090
https://www.cve.org/CVERecord?id=CVE-2025-56091
https://www.cve.org/CVERecord?id=CVE-2025-56092
https://www.cve.org/CVERecord?id=CVE-2025-56093
https://www.cve.org/CVERecord?id=CVE-2025-56094
https://www.cve.org/CVERecord?id=CVE-2025-56095
https://www.cve.org/CVERecord?id=CVE-2025-56096
https://www.cve.org/CVERecord?id=CVE-2025-56097
##updated 2025-12-12T18:15:40.960000
1 posts
Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56077
https://www.cve.org/CVERecord?id=CVE-2025-56079
https://www.cve.org/CVERecord?id=CVE-2025-56082
https://www.cve.org/CVERecord?id=CVE-2025-56083
https://www.cve.org/CVERecord?id=CVE-2025-56084
https://www.cve.org/CVERecord?id=CVE-2025-56085
https://www.cve.org/CVERecord?id=CVE-2025-56086
https://www.cve.org/CVERecord?id=CVE-2025-56087
https://www.cve.org/CVERecord?id=CVE-2025-56088
https://www.cve.org/CVERecord?id=CVE-2025-56089
https://www.cve.org/CVERecord?id=CVE-2025-56090
https://www.cve.org/CVERecord?id=CVE-2025-56091
https://www.cve.org/CVERecord?id=CVE-2025-56092
https://www.cve.org/CVERecord?id=CVE-2025-56093
https://www.cve.org/CVERecord?id=CVE-2025-56094
https://www.cve.org/CVERecord?id=CVE-2025-56095
https://www.cve.org/CVERecord?id=CVE-2025-56096
https://www.cve.org/CVERecord?id=CVE-2025-56097
##updated 2025-12-12T18:15:40.483000
1 posts
Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56077
https://www.cve.org/CVERecord?id=CVE-2025-56079
https://www.cve.org/CVERecord?id=CVE-2025-56082
https://www.cve.org/CVERecord?id=CVE-2025-56083
https://www.cve.org/CVERecord?id=CVE-2025-56084
https://www.cve.org/CVERecord?id=CVE-2025-56085
https://www.cve.org/CVERecord?id=CVE-2025-56086
https://www.cve.org/CVERecord?id=CVE-2025-56087
https://www.cve.org/CVERecord?id=CVE-2025-56088
https://www.cve.org/CVERecord?id=CVE-2025-56089
https://www.cve.org/CVERecord?id=CVE-2025-56090
https://www.cve.org/CVERecord?id=CVE-2025-56091
https://www.cve.org/CVERecord?id=CVE-2025-56092
https://www.cve.org/CVERecord?id=CVE-2025-56093
https://www.cve.org/CVERecord?id=CVE-2025-56094
https://www.cve.org/CVERecord?id=CVE-2025-56095
https://www.cve.org/CVERecord?id=CVE-2025-56096
https://www.cve.org/CVERecord?id=CVE-2025-56097
##updated 2025-12-12T18:15:39.843000
1 posts
Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56077
https://www.cve.org/CVERecord?id=CVE-2025-56079
https://www.cve.org/CVERecord?id=CVE-2025-56082
https://www.cve.org/CVERecord?id=CVE-2025-56083
https://www.cve.org/CVERecord?id=CVE-2025-56084
https://www.cve.org/CVERecord?id=CVE-2025-56085
https://www.cve.org/CVERecord?id=CVE-2025-56086
https://www.cve.org/CVERecord?id=CVE-2025-56087
https://www.cve.org/CVERecord?id=CVE-2025-56088
https://www.cve.org/CVERecord?id=CVE-2025-56089
https://www.cve.org/CVERecord?id=CVE-2025-56090
https://www.cve.org/CVERecord?id=CVE-2025-56091
https://www.cve.org/CVERecord?id=CVE-2025-56092
https://www.cve.org/CVERecord?id=CVE-2025-56093
https://www.cve.org/CVERecord?id=CVE-2025-56094
https://www.cve.org/CVERecord?id=CVE-2025-56095
https://www.cve.org/CVERecord?id=CVE-2025-56096
https://www.cve.org/CVERecord?id=CVE-2025-56097
##updated 2025-12-12T18:15:39.687000
1 posts
Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56077
https://www.cve.org/CVERecord?id=CVE-2025-56079
https://www.cve.org/CVERecord?id=CVE-2025-56082
https://www.cve.org/CVERecord?id=CVE-2025-56083
https://www.cve.org/CVERecord?id=CVE-2025-56084
https://www.cve.org/CVERecord?id=CVE-2025-56085
https://www.cve.org/CVERecord?id=CVE-2025-56086
https://www.cve.org/CVERecord?id=CVE-2025-56087
https://www.cve.org/CVERecord?id=CVE-2025-56088
https://www.cve.org/CVERecord?id=CVE-2025-56089
https://www.cve.org/CVERecord?id=CVE-2025-56090
https://www.cve.org/CVERecord?id=CVE-2025-56091
https://www.cve.org/CVERecord?id=CVE-2025-56092
https://www.cve.org/CVERecord?id=CVE-2025-56093
https://www.cve.org/CVERecord?id=CVE-2025-56094
https://www.cve.org/CVERecord?id=CVE-2025-56095
https://www.cve.org/CVERecord?id=CVE-2025-56096
https://www.cve.org/CVERecord?id=CVE-2025-56097
##updated 2025-12-12T18:15:39.370000
1 posts
Ruijie
https://www.cve.org/CVERecord?id=CVE-2025-56077
https://www.cve.org/CVERecord?id=CVE-2025-56079
https://www.cve.org/CVERecord?id=CVE-2025-56082
https://www.cve.org/CVERecord?id=CVE-2025-56083
https://www.cve.org/CVERecord?id=CVE-2025-56084
https://www.cve.org/CVERecord?id=CVE-2025-56085
https://www.cve.org/CVERecord?id=CVE-2025-56086
https://www.cve.org/CVERecord?id=CVE-2025-56087
https://www.cve.org/CVERecord?id=CVE-2025-56088
https://www.cve.org/CVERecord?id=CVE-2025-56089
https://www.cve.org/CVERecord?id=CVE-2025-56090
https://www.cve.org/CVERecord?id=CVE-2025-56091
https://www.cve.org/CVERecord?id=CVE-2025-56092
https://www.cve.org/CVERecord?id=CVE-2025-56093
https://www.cve.org/CVERecord?id=CVE-2025-56094
https://www.cve.org/CVERecord?id=CVE-2025-56095
https://www.cve.org/CVERecord?id=CVE-2025-56096
https://www.cve.org/CVERecord?id=CVE-2025-56097
##updated 2025-12-12T17:33:20.543000
1 posts
CVE-2025-64863 - Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) https://cvefeed.io/vuln/detail/CVE-2025-64863
##updated 2025-12-12T17:32:54.870000
1 posts
CVE-2025-64869 - Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) https://cvefeed.io/vuln/detail/CVE-2025-64869
##updated 2025-12-12T17:32:25.967000
1 posts
CVE-2025-64872 - Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) https://cvefeed.io/vuln/detail/CVE-2025-64872
##updated 2025-12-12T17:31:58.540000
1 posts
CVE-2025-64887 - Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79) https://cvefeed.io/vuln/detail/CVE-2025-64887
##updated 2025-12-12T17:15:45.320000
1 posts
CVE-2025-65530 - CloudLinux ai-bolit Remote File Overwrite Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65530
##updated 2025-12-12T16:46:06
1 posts
CVE-2025-26866 - Apache HugeGraph-Server: RAFT and deserialization vulnerability https://cvefeed.io/vuln/detail/CVE-2025-26866
##updated 2025-12-12T16:42:56
1 posts
2 repos
CVE-2025-13780 - Remote Code Execution vulnerability when restoring PLAIN-format SQL dumps in server mode (pgAdmin 4) https://cvefeed.io/vuln/detail/CVE-2025-13780
##updated 2025-12-12T15:30:51
1 posts
Most of these SolarEdge vulns are local and unlikely to be a major issue ( assuming no supply chain / logistics compromise ) but they could be useful for people looking to hack on some of their own gear.
https://www.cve.org/CVERecord?id=CVE-2025-36743
https://www.cve.org/CVERecord?id=CVE-2025-36744
##updated 2025-12-12T15:30:51
1 posts
Most of these SolarEdge vulns are local and unlikely to be a major issue ( assuming no supply chain / logistics compromise ) but they could be useful for people looking to hack on some of their own gear.
https://www.cve.org/CVERecord?id=CVE-2025-36743
https://www.cve.org/CVERecord?id=CVE-2025-36744
##updated 2025-12-12T15:19:07.567000
2 posts
The FreePBX Rabbit Hole: CVE-2025-66039 & More https://horizon3.ai/attack-research/the-freepbx-rabbit-hole-cve-2025-66039-and-others/
##RE: https://infosec.exchange/@cR0w/115691795046297042
Write-up for this from Horizon3.
https://horizon3.ai/attack-research/the-freepbx-rabbit-hole-cve-2025-66039-and-others/
##updated 2025-12-12T15:18:42.140000
1 posts
CVE-2020-36896 - QiHang Media Web Digital Signage 3.0.9 Cleartext Credentials Disclosure https://cvefeed.io/vuln/detail/CVE-2020-36896
##updated 2025-12-12T15:18:42.140000
1 posts
CVE-2020-36895 - EIBIZ i-Media Server Digital Signage 3.8.0 Unauthenticated Configuration Disclosure https://cvefeed.io/vuln/detail/CVE-2020-36895
##updated 2025-12-12T15:18:42.140000
1 posts
CVE-2025-13607 - Cisco Camera Unauthenticated Configuration Information Disclosure https://cvefeed.io/vuln/detail/CVE-2025-13607
##updated 2025-12-12T15:18:13.390000
3 posts
ConnectWise ScreenConnect patches critical code execution flaw
ConnectWise patched a critical vulnerability (CVE-2025-14265) in ScreenConnect remote maintenance software that allows authenticated attackers to execute arbitrary code by installing malicious extensions. All versions prior to 25.8 are affected; cloud servers were auto-updated while on-premises deployments require manual upgrade to version 25.8.
**Not urgent, but important. If you use on-premises ConnectWise ScreenConnect, plan an upgrade to version 25.8. The flaw is limited to users who are already admin, so it's not immediately exploitable. But an admin account can be compromised, so remind your admins of risks of infostealers and phishing.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/connectwise-screenconnect-patches-critical-code-execution-flaw-p-3-p-7-c/gD2P6Ple2L
ConnectWise ScreenConnect patches critical code execution flaw
ConnectWise patched a critical vulnerability (CVE-2025-14265) in ScreenConnect remote maintenance software that allows authenticated attackers to execute arbitrary code by installing malicious extensions. All versions prior to 25.8 are affected; cloud servers were auto-updated while on-premises deployments require manual upgrade to version 25.8.
**Not urgent, but important. If you use on-premises ConnectWise ScreenConnect, plan an upgrade to version 25.8. The flaw is limited to users who are already admin, so it's not immediately exploitable. But an admin account can be compromised, so remind your admins of risks of infostealers and phishing.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/connectwise-screenconnect-patches-critical-code-execution-flaw-p-3-p-7-c/gD2P6Ple2L
CVE-2025-14265 - Improper server-side validation in ScreenConnect extension framework https://cvefeed.io/vuln/detail/CVE-2025-14265
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-14046 - Insufficient HTML Sanitization Allows User-Controlled DOM Elements to Overwrite Server-Initialized Data Islands and Trigger Unintended Server-Side POST Requests https://cvefeed.io/vuln/detail/CVE-2025-14046
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-66046 - Biosig Project libbiosig MFER Parsing Buffer Overflow Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-66046
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-66048 - Biosig Project libbiosig MFER Parsing Stack-Based Buffer Overflow Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-66048
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-66044 - Biosig Project libbiosig Arbitrary Code Execution Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-66044
##updated 2025-12-12T15:18:13.390000
1 posts
updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-67741 - JetBrains TeamCity Stored XSS Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-67741
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-67742 - JetBrains TeamCity Arbitrary File Access Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-67742
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-67739 - JetBrains TeamCity Unvalidated Repository URL Disclosure https://cvefeed.io/vuln/detail/CVE-2025-67739
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-59803 - Foxit PDF Editor and Reader Signature Spoofing Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-59803
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-55314 - Foxit PDF and Editor Memory Corruption Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-55314
##updated 2025-12-12T15:18:13.390000
1 posts
BoF in glib.
https://access.redhat.com/security/cve/CVE-2025-14512
##A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.
updated 2025-12-12T15:18:13.390000
2 posts
CVE-2025-14523 - Libsoup: libsoup: duplicate host header handling causes host-parsing discrepancy (first- vs last-value wins) https://cvefeed.io/vuln/detail/CVE-2025-14523
##CVE-2025-14523 - Libsoup: libsoup: duplicate host header handling causes host-parsing discrepancy (first- vs last-value wins) https://cvefeed.io/vuln/detail/CVE-2025-14523
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-14516 - Yalantis uCrop URL com.yalantis.ucrop.task.BitmapLoadTask.java downloadFile server-side request forgery https://cvefeed.io/vuln/detail/CVE-2025-14516
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-14514 - Campcodes Supplier Management System add_distributor.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14514
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-64994 - Privilege Escalation via Uncontrolled Search Path in 1E-Nomad-SetWorkRate instruction https://cvefeed.io/vuln/detail/CVE-2025-64994
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-64993 - Command Injection in 1E-ConfigMgrConsoleExtensions Instructions https://cvefeed.io/vuln/detail/CVE-2025-64993
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-64992 - Command Injection in 1E-Nomad-PauseNomadJobQueue Instruction https://cvefeed.io/vuln/detail/CVE-2025-64992
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-64987 - Command Injection in 1E-Explorer-TachyonCore-CheckSimpleIoC Instruction https://cvefeed.io/vuln/detail/CVE-2025-64987
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-44016 - File Hash Validation Bypass in NomadBranch.exe https://cvefeed.io/vuln/detail/CVE-2025-44016
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-64701 - QND Premium/Advance/Standard Windows Privilege Escalation Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64701
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-12029 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab https://cvefeed.io/vuln/detail/CVE-2025-12029
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-67738 - Squid Webmin Unquoted Argument Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-67738
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-11247 - Authorization Bypass Through User-Controlled Key in GitLab https://cvefeed.io/vuln/detail/CVE-2025-11247
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-12716 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab https://cvefeed.io/vuln/detail/CVE-2025-12716
##updated 2025-12-12T15:18:13.390000
2 posts
CVE-2025-13764 - WP CarDealer <= 1.2.16 - Unauthenticated Privilege Escalation https://cvefeed.io/vuln/detail/CVE-2025-13764
##CVE-2025-13764 - WP CarDealer <= 1.2.16 - Unauthenticated Privilege Escalation https://cvefeed.io/vuln/detail/CVE-2025-13764
##updated 2025-12-12T15:18:13.390000
2 posts
CVE-2025-67719 - Ibexa User Bundle is missing password change validation https://cvefeed.io/vuln/detail/CVE-2025-67719
##CVE-2025-67719 - Ibexa User Bundle is missing password change validation https://cvefeed.io/vuln/detail/CVE-2025-67719
##updated 2025-12-12T15:18:13.390000
2 posts
CVE-2025-67718 - Formio improperly authorized permission elevation through specially crafted request path https://cvefeed.io/vuln/detail/CVE-2025-67718
##CVE-2025-67718 - Formio improperly authorized permission elevation through specially crafted request path https://cvefeed.io/vuln/detail/CVE-2025-67718
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-67717 - Zitadel Discloses the Total Number of Instance Users https://cvefeed.io/vuln/detail/CVE-2025-67717
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-67648 - Shopware's inproper input validation can lead to Reflected XSS through Storefront Login Page https://cvefeed.io/vuln/detail/CVE-2025-67648
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-67646 - TableProgressTracking's missing CSRF protection allows unauthorized state changes https://cvefeed.io/vuln/detail/CVE-2025-67646
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-67509 - MySQLSelectTool Read-Only Bypass via SELECT INTO OUTFILE Allows Arbitrary File Write https://cvefeed.io/vuln/detail/CVE-2025-67509
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-67505 - Race condition in the Okta Java SDK https://cvefeed.io/vuln/detail/CVE-2025-67505
##updated 2025-12-12T15:18:13.390000
1 posts
1 repos
CVE-2025-66628 - ImageMagick is vulnerable to an Integer Overflow in TIM decoder leading to out of bounds read (32-bit only) https://cvefeed.io/vuln/detail/CVE-2025-66628
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-65297 - Aqara Hub Unencrypted Data Leakage https://cvefeed.io/vuln/detail/CVE-2025-65297
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-65295 - Aqara Hub Firmware Update Signature Forgery and Information Exposure Vulnerabilities https://cvefeed.io/vuln/detail/CVE-2025-65295
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2025-65293 - Aqara Camera Hub G3 Command Injection Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65293
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2020-36902 - UBICOD Medivision Digital Signage 1.5.1 Authorization Bypass via User Privileges https://cvefeed.io/vuln/detail/CVE-2020-36902
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2020-36901 - UBICOD Medivision Digital Signage 1.5.1 Cross-Site Request Forgery via User Management https://cvefeed.io/vuln/detail/CVE-2020-36901
##updated 2025-12-12T15:18:13.390000
1 posts
CVE-2020-36899 - QiHang Media Web Digital Signage 3.0.9 Unauthenticated Arbitrary File Disclosure https://cvefeed.io/vuln/detail/CVE-2020-36899
##updated 2025-12-12T15:17:31.973000
1 posts
Most of these SolarEdge vulns are local and unlikely to be a major issue ( assuming no supply chain / logistics compromise ) but they could be useful for people looking to hack on some of their own gear.
https://www.cve.org/CVERecord?id=CVE-2025-36743
https://www.cve.org/CVERecord?id=CVE-2025-36744
##updated 2025-12-12T15:17:31.973000
1 posts
Most of these SolarEdge vulns are local and unlikely to be a major issue ( assuming no supply chain / logistics compromise ) but they could be useful for people looking to hack on some of their own gear.
https://www.cve.org/CVERecord?id=CVE-2025-36743
https://www.cve.org/CVERecord?id=CVE-2025-36744
##updated 2025-12-12T15:17:31.973000
1 posts
CVE-2025-14537 - code-projects Class and Exam Timetable Management preview7.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14537
##updated 2025-12-12T15:17:31.973000
1 posts
CVE-2025-13663 - Quartus Prime Pro Edition Installer Advisory https://cvefeed.io/vuln/detail/CVE-2025-13663
##updated 2025-12-12T15:17:31.973000
1 posts
CVE-2025-36937 - Adobe AudioDecoder Out-of-Bounds Write RCE https://cvefeed.io/vuln/detail/CVE-2025-36937
##updated 2025-12-12T15:17:31.973000
1 posts
CVE-2025-36936 - Tachyon Server Local Privilege Escalation Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-36936
##updated 2025-12-12T00:31:29
1 posts
CVE-2025-36938 - U-Boot Integer Underflow Privilege Escalation https://cvefeed.io/vuln/detail/CVE-2025-36938
##updated 2025-12-12T00:31:27
1 posts
CVE-2025-36934 - Google Bigo Use After Free Vulnerability (Local Privilege Escalation) https://cvefeed.io/vuln/detail/CVE-2025-36934
##updated 2025-12-11T22:02:22
3 posts
2 repos
🚨 CVE-2025-8110 (Zero-Day) Detection Template: Improper Symbolic link handling in the PutContents API in Gogs allows Local Execution of Code
GitHub: https://github.com/rxerium/CVE-2025-8110
Writeup: https://www.wiz.io/blog/wiz-research-gogs-cve-2025-8110-rce-exploit
##The flaw, tracked as CVE-2025-8110 (CVSS score: 8.7), is a case of file overwrite in the file update API of the Go-based self-hosted Git service. https://thehackernews.com/2025/12/unpatched-gogs-zero-day-exploited.html
##Gogs Zero-Day vulnerability actively exploited
A zero-day vulnerability (CVE-2025-8110) in Gogs self-hosted Git service allows authenticated attackers to achieve remote code execution through a symlink bypass. Over 700 instances are reported as compromised since July 2025. Despite responsible disclosure in July and acknowledgment in October 2025, no patch is available as of December 10, 2025.
**If you're running Gogs (version 0.13.3 or earlier), this is urgent. Disable open registration in your settings and place the service behind a VPN or IP allow-list - there's an actively exploited vulnerability with no available patch. Check your server for suspicious repositories with random 8-character owner and repository names. These indicate your server is probably already compromised.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/gogs-zero-day-vulnerability-actively-exploited-l-k-t-s-8/gD2P6Ple2L
updated 2025-12-11T21:55:34
2 posts
4 repos
https://github.com/quyenheu/CVE-2025-58360
https://github.com/Ashwesker/Blackash-CVE-2025-58360
https://github.com/Joker-Wiggin/CVE-2025-58360-GeoServer-XXE
🚨 CVE-2025-58360: OSGeo GeoServer Improper Restriction of XML External Entity Reference Vulnerability has been added to the CISA KEV Catalog
CVSS: 8.2
##CVE ID: CVE-2025-58360
Vendor: OSGeo
Product: GeoServer
Date Added: 2025-12-11
Notes: This vulnerability affects an open-source component, third-party library, or a protocol used by different products. For more information, please see: https://github.com/geoserver/geoserver/security/advisories/GHSA-fjf5-xgmq-5525 ; https://osgeo-org.atlassian.net/browse/GEOS-11922 ; https://nvd.nist.gov/vuln/detail/CVE-2025-58360
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-58360
updated 2025-12-11T21:31:45
1 posts
CVE-2025-14293 - WP Job Portal <= 2.4.0 - Authenticated (Subscriber+) Arbitrary File Read https://cvefeed.io/vuln/detail/CVE-2025-14293
##updated 2025-12-11T21:31:45
1 posts
CVE-2025-36935 - Apache Shared-Memory Memory Corruption Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-36935
##updated 2025-12-11T21:31:39
2 posts
CVE-2025-14534 - UTT 进取 512W Endpoint formNatStaticMap strcpy buffer overflow https://cvefeed.io/vuln/detail/CVE-2025-14534
##UTT
##updated 2025-12-11T18:31:48
1 posts
CVE-2025-67740 - JetBrains TeamCity GitHub App Token Metadata Access Control Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-67740
##updated 2025-12-11T18:31:48
1 posts
CVE-2025-65296 - Aqara Hub M2/Camera Hub G3 Denial-of-Service JSON Processing NULL Pointer Dereference https://cvefeed.io/vuln/detail/CVE-2025-65296
##updated 2025-12-11T18:31:48
1 posts
CVE-2025-65294 - Aqara Hub Remote Command Execution https://cvefeed.io/vuln/detail/CVE-2025-65294
##updated 2025-12-11T18:30:53
1 posts
CVE-2025-66047 - Biosig Project libbiosig MFER Parsing Stack-Based Buffer Overflow Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-66047
##updated 2025-12-11T18:30:53
1 posts
CVE-2025-66045 - Biosig Project libbiosig Stack-based Buffer Overflow Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-66045
##updated 2025-12-11T18:30:53
1 posts
CVE-2025-66043 - Biosig Project Libbiosig MFER Parsing Stack-Based Buffer Overflow Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-66043
##updated 2025-12-11T18:30:53
1 posts
CVE-2025-65473 - EasyImages Arbitrary File Rename Code Execution Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65473
##updated 2025-12-11T18:30:53
2 posts
CVE-2025-14526 - Tenda CH22 L7Im frmL7ImForm buffer overflow https://cvefeed.io/vuln/detail/CVE-2025-14526
##Tenda
##updated 2025-12-11T18:30:53
1 posts
updated 2025-12-11T18:30:48
1 posts
CVE-2025-55313 - Foxit PDF and Editor Arbitrary Code Execution Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-55313
##updated 2025-12-11T18:30:45
1 posts
CVE-2024-8273 - HYPR Server Authentication Bypass https://cvefeed.io/vuln/detail/CVE-2024-8273
##updated 2025-12-11T18:30:45
1 posts
CVE-2025-59802 - Foxit PDF Signature Spoofing via OCG https://cvefeed.io/vuln/detail/CVE-2025-59802
##updated 2025-12-11T18:30:41
1 posts
updated 2025-12-11T17:22:16
1 posts
CVE-2025-67511 - Cybersecurity AI (CAI) vulnerable to Command Injection in run_ssh_command_with_credentials Agent tool https://cvefeed.io/vuln/detail/CVE-2025-67511
##updated 2025-12-11T15:51:55
1 posts
CVE-2025-67716 - Auth0 Next.js SDK has Improper Validation of Query Parameters https://cvefeed.io/vuln/detail/CVE-2025-67716
##updated 2025-12-11T15:51:44
1 posts
CVE-2025-67720 - Pyrofork has a Path Traversal in download_media Method https://cvefeed.io/vuln/detail/CVE-2025-67720
##updated 2025-12-11T15:51:11
1 posts
CVE-2025-67713 - Miniflux 2 has an Open Redirect via protocol-relative `redirect_url` https://cvefeed.io/vuln/detail/CVE-2025-67713
##updated 2025-12-11T15:49:18
1 posts
CVE-2025-67510 - MySQLWriteTool allows arbitrary/destructive SQL when exposed to untrusted prompts (agent “footgun”) https://cvefeed.io/vuln/detail/CVE-2025-67510
##updated 2025-12-11T15:48:03
2 posts
CVE-2025-66474 - XWiki vulnerable to remote code execution through insufficient protection against {{/html}} injection https://cvefeed.io/vuln/detail/CVE-2025-66474
##CVE-2025-66474 - XWiki vulnerable to remote code execution through insufficient protection against {{/html}} injection https://cvefeed.io/vuln/detail/CVE-2025-66474
##updated 2025-12-11T15:47:50
2 posts
CVE-2025-66473 - XWiki's REST APIs don't enforce any limits, leading to unavailability and OOM in large wikis https://cvefeed.io/vuln/detail/CVE-2025-66473
##CVE-2025-66473 - XWiki's REST APIs don't enforce any limits, leading to unavailability and OOM in large wikis https://cvefeed.io/vuln/detail/CVE-2025-66473
##updated 2025-12-11T15:47:40
1 posts
CVE-2025-66472 - XWiki vulnerable to a reflected XSS via xredirect parameter in DeleteApplication https://cvefeed.io/vuln/detail/CVE-2025-66472
##updated 2025-12-11T15:47:31
1 posts
CVE-2025-66033 - Improper Memory Cleanup in the Okta Java SDK https://cvefeed.io/vuln/detail/CVE-2025-66033
##updated 2025-12-11T15:30:36
1 posts
CVE-2025-14515 - Campcodes Supplier Management System add_unit.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14515
##updated 2025-12-11T15:30:36
1 posts
CVE-2025-13003 - IDOR in Aksis Computer's AxOnboard https://cvefeed.io/vuln/detail/CVE-2025-13003
##updated 2025-12-11T15:30:33
1 posts
CVE-2025-14517 - Yalantis uCrop AndroidManifest.xml UCropActivity improper export of android application components https://cvefeed.io/vuln/detail/CVE-2025-14517
##updated 2025-12-11T12:30:34
1 posts
CVE-2025-64995 - Privilege Escalation via Process Hijacking in 1E-Exchange-NomadClientHealth-ConfigureGeneralSetting instruction https://cvefeed.io/vuln/detail/CVE-2025-64995
##updated 2025-12-11T12:30:34
1 posts
CVE-2025-64988 - Command Injection in 1E-Nomad-GetCmContentLocations Instruction https://cvefeed.io/vuln/detail/CVE-2025-64988
##updated 2025-12-11T12:30:29
1 posts
CVE-2025-64991 - Command Injection in 1E-PatchInsights-Deploy Instruction https://cvefeed.io/vuln/detail/CVE-2025-64991
##updated 2025-12-11T12:30:28
1 posts
CVE-2025-64990 - Command Injection in 1E-Explorer-TachyonCore-LogoffUser Instruction https://cvefeed.io/vuln/detail/CVE-2025-64990
##updated 2025-12-11T12:30:28
1 posts
CVE-2025-64989 - Command Injection in 1E-Explorer-TachyonCore-FindFileBySizeAndHash Instruction https://cvefeed.io/vuln/detail/CVE-2025-64989
##updated 2025-12-11T06:30:33
1 posts
CVE-2025-4097 - Allocation of Resources Without Limits or Throttling in GitLab https://cvefeed.io/vuln/detail/CVE-2025-4097
##updated 2025-12-11T06:30:33
1 posts
CVE-2025-67694 - Apache HTTP Server Cross-Site Request Forgery https://cvefeed.io/vuln/detail/CVE-2025-67694
##updated 2025-12-11T06:30:33
1 posts
CVE-2025-9436 - Widgets for Google Reviews <= 13.2.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via trustindex Shortcode https://cvefeed.io/vuln/detail/CVE-2025-9436
##updated 2025-12-11T06:30:32
2 posts
CVE-2025-8405 - Improper Encoding or Escaping of Output in GitLab https://cvefeed.io/vuln/detail/CVE-2025-8405
##CVE-2025-8405 - Improper Encoding or Escaping of Output in GitLab https://cvefeed.io/vuln/detail/CVE-2025-8405
##updated 2025-12-11T06:30:32
1 posts
CVE-2025-11984 - Authentication Bypass Using an Alternate Path or Channel in GitLab https://cvefeed.io/vuln/detail/CVE-2025-11984
##updated 2025-12-11T06:30:32
1 posts
CVE-2025-67692 - Apache HTTP Server Cross-Site Request Forgery https://cvefeed.io/vuln/detail/CVE-2025-67692
##updated 2025-12-11T06:30:32
1 posts
CVE-2025-67691 - Apache Struts Deserialization Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-67691
##updated 2025-12-11T06:30:32
1 posts
CVE-2025-67690 - Apache HTTP Server Remote Code Execution https://cvefeed.io/vuln/detail/CVE-2025-67690
##updated 2025-12-11T04:15:59.570000
1 posts
CVE-2025-67693 - Apache Apache HTTP Server Missing Authentication for Configuration https://cvefeed.io/vuln/detail/CVE-2025-67693
##updated 2025-12-11T03:30:35
1 posts
CVE-2025-11467 - RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator <= 5.1.1 - Unauthenticated Blind Server-Side Request Forgery https://cvefeed.io/vuln/detail/CVE-2025-11467
##updated 2025-12-10T21:31:48
1 posts
CVE-2020-36898 - QiHang Media Web Digital Signage 3.0.9 Unauthenticated Arbitrary File Deletion https://cvefeed.io/vuln/detail/CVE-2020-36898
##updated 2025-12-10T21:31:47
1 posts
CVE-2020-36900 - All-Dynamics Digital Signage System 2.0.2 Cross-Site Request Forgery via User Management https://cvefeed.io/vuln/detail/CVE-2020-36900
##updated 2025-12-10T21:31:47
1 posts
CVE-2020-36897 - QiHang Media Web Digital Signage 3.0.9 Unauthenticated Remote Code Execution https://cvefeed.io/vuln/detail/CVE-2020-36897
##updated 2025-12-10T21:31:47
1 posts
CVE-2025-65199 - Windscribe for Linux 'changeMTU' local privilege escalation https://cvefeed.io/vuln/detail/CVE-2025-65199
##updated 2025-12-10T21:31:47
1 posts
CVE-2025-64888 - Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79) https://cvefeed.io/vuln/detail/CVE-2025-64888
##updated 2025-12-10T21:31:46
1 posts
CVE-2023-53740 - Screen SFT DAB 1.9.3 Authentication Bypass via Admin Password Change https://cvefeed.io/vuln/detail/CVE-2023-53740
##updated 2025-12-10T21:31:46
1 posts
CVE-2025-64881 - Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) https://cvefeed.io/vuln/detail/CVE-2025-64881
##updated 2025-12-10T21:31:46
1 posts
CVE-2025-64875 - Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) https://cvefeed.io/vuln/detail/CVE-2025-64875
##updated 2025-12-10T21:31:46
1 posts
CVE-2025-64873 - Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) https://cvefeed.io/vuln/detail/CVE-2025-64873
##updated 2025-12-10T21:31:46
1 posts
CVE-2025-64861 - Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) https://cvefeed.io/vuln/detail/CVE-2025-64861
##updated 2025-12-10T21:31:33
1 posts
CVE-2025-64537 - Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79) https://cvefeed.io/vuln/detail/CVE-2025-64537
##updated 2025-12-10T18:30:37
1 posts
CVE-2025-34424 - MailEnable < 10.54 DLL Hijacking via Unsafe Loading of MEAIDP.DLL https://cvefeed.io/vuln/detail/CVE-2025-34424
##updated 2025-12-10T18:30:37
1 posts
CVE-2025-34423 - MailEnable < 10.54 DLL Hijacking via Unsafe Loading of MEAIAU.DLL https://cvefeed.io/vuln/detail/CVE-2025-34423
##updated 2025-12-10T02:00:02.557000
10 posts
100 repos
https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-
https://github.com/m3m0ryc0rrupt/CVE-2025-55182-PoC
https://github.com/freeqaz/react2shell
https://github.com/StealthMoud/CVE-2025-55182-Scanner
https://github.com/MedusaSH/POC-CVE-2025-55182
https://github.com/chitoz1300/React2Shell-CVE-2025-55182
https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc
https://github.com/jf0x3a/CVE-2025-55182-exploit
https://github.com/ejpir/CVE-2025-55182-bypass
https://github.com/techgaun/cve-2025-55182-scanner
https://github.com/Saturate/CVE-2025-55182-Scanner
https://github.com/fatguru/CVE-2025-55182-scanner
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS
https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI
https://github.com/IrsyadSEC/CVE-2025-55182-MassPayloadAttack
https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182
https://github.com/santihabib/CVE-2025-55182-analysis
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/sickwell/CVE-2025-55182
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/f0xyx/CVE-2025-55182-Scanner
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/SainiONHacks/CVE-2025-55182-Scanner
https://github.com/C00LN3T/React2Shell
https://github.com/yz9yt/React2Shell-CTF
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/Ashwesker/Blackash-CVE-2025-55182
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/xiaopeng-ye/react2shell-detector
https://github.com/LemonTeatw1/CVE-2025-55182-exploit
https://github.com/ihsansencan/React2Shell-CVE-2025-55182
https://github.com/7amzahard/React2shell
https://github.com/EynaExp/CVE-2025-55182-POC
https://github.com/assetnote/react2shell-scanner
https://github.com/theori-io/reactguard
https://github.com/Hghost0x00/CVE-2025-55182
https://github.com/cypholab/evilact
https://github.com/SoICT-BKSEC/CVE-2025-55182-docker-lab
https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell
https://github.com/dwisiswant0/CVE-2025-55182
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/kavienanj/CVE-2025-55182
https://github.com/kk12-30/CVE-2025-55182
https://github.com/zxz3650/CVE-2025-55182-POC
https://github.com/hualy13/CVE-2025-55182
https://github.com/GelukCrab/React-Server-Components-RCE
https://github.com/ynsmroztas/NextRce
https://github.com/Chocapikk/CVE-2025-55182
https://github.com/im-ezboy/CVE-2025-55182-zoomeye
https://github.com/yanoshercohen/React2Shell_CVE-2025-55182
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/xkillbit/cve-2025-55182-scanner
https://github.com/FurkanKAYAPINAR/ReactNext2Shell
https://github.com/AliHzSec/CVE-2025-55182
https://github.com/zzhorc/CVE-2025-55182
https://github.com/Spritualkb/CVE-2025-55182-exp
https://github.com/mrknow001/RSC_Detector
https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/xcanwin/CVE-2025-55182-React-RCE
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/Night-have-dreams/CVE-2025-55182-PoC
https://github.com/alsaut1/react2shell-lab
https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE
https://github.com/msanft/CVE-2025-55182
https://github.com/whiteov3rflow/CVE-2025-55182-poc
https://github.com/sumanrox/rschunter
https://github.com/acheong08/CVE-2025-55182-poc
https://github.com/shamo0/react2shell-PoC
https://github.com/shyambhanushali/React2Shell
https://github.com/hoosin/CVE-2025-55182
https://github.com/RuoJi6/CVE-2025-55182-RCE-shell
https://github.com/VeilVulp/RscScan-cve-2025-55182
https://github.com/Archerkong/CVE-2025-55182
https://github.com/andrei2308/react2shell
https://github.com/c0rydoras/CVE-2025-55182
https://github.com/ThemeHackers/CVE-2025-55182
https://github.com/ejpir/CVE-2025-55182-research
https://github.com/ayoub-intigriti/react2shell-cve
https://github.com/gensecaihq/react2shell-scanner
https://github.com/kOaDT/poc-cve-2025-55182
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/logesh-GIT001/CVE-2025-55182
https://github.com/keklick1337/CVE-2025-55182-golang-PoC
https://github.com/XiaomingX/CVE-2025-55182-poc
https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive
https://github.com/sudo-Yangziran/CVE-2025-55182POC
https://github.com/emredavut/CVE-2025-55182
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/horsenyet/RSC-Detect-CVE-2025-55182
https://github.com/nehkark/CVE-2025-55182
https://github.com/surajhacx/react2shellpoc
https://github.com/timsonner/React2Shell-CVE-2025-55182
https://github.com/zack0x01/vuln-app-CVE-2025-55182
VulnCheck analyzed several hundred #React2Shell CVE-2025-55182 exploits so you don't have to!
Amid all the slop (and there's so, so much slop) were some interesting finds that understandably escaped attention, including an early in-memory webshell variant, a PoC with logic that loads the Godzilla webshell, and a repo that deploys a lightweight WAF to block React2Shell payloads entirely (!)
@albinolobster wrote about exploit characteristics in aggregate and broke out the cooler examples here:
##React2Shell exploitation now enables persistent access via EtherRAT’s blockchain-based C2.
https://www.technadu.com/react2shell-exploitation-evolves-into-persistent-access-threat/615626/
• Unauthenticated RCE via CVE-2025-55182
• EtherRAT instructions hidden inside Ethereum smart contracts
• Gov + cloud + critical-infrastructure orgs selectively targeted
• Unique per-host payloads hinder signature detection
• Monitor Node.js anomalies + Ethereum RPC activity
#React2Shell #CVE202555182 #EtherRAT #CyberSecurity #ThreatIntel #NextJS #AppSec
##Critical React2Shell Vulnerability (CVE-2025-55182) Analysis: Surge in Attacks Targeting RSC-Enabled Services Worldwide https://cybersecuritynews.com/react2shell-cve-2025-55182-attacks-rsc-enabled-services/ #PressRelease
##Cisco posted this yesterday, if you missed it:
Critical: CVE-2025-55182: Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-react-flight-TYw32Ddb @TalosSecurity #infosec #vulnerability #React
##In addition to React, CVE-2025-55182 impacts other frameworks, including Next.js, Waku, React Router, and RedwoodSDK. https://www.securityweek.com/wide-range-of-malware-delivered-in-react2shell-attacks/
##It didn’t take long: CVE-2025-55182 is now under active exploitation
Threat actors are now exploiting CVE-2025-55182, and attacks are poised to grow. Here's what you need to know about the vulnerability, how our...
🔗️ [Securelist] https://link.is.it/p03Ho5
##How widespread is the impact of Critical Security Vulnerability in React Server Components(CVE-2025-55182) https://helixguard.ai/blog/CVE-2025-55182
##updated 2025-12-09T18:30:47
1 posts
2 repos
PowerShell 5.1 now shows warnings when scripts use Invoke-WebRequest to fetch web content, aiming to limit silent script execution risks tied to CVE-2025-54100. ⚠️
Admins are urged to switch to -UseBasicParsing to avoid unintended code parsing and prevent automation hang-ups. 🛡️
#TechNews #Cybersecurity #Windows #PowerShell #Security #Privacy #InfoSec #Patch #Update #Automation #IT #DevOps #Risk #Technology #Development #Shell #Script #CVE #Vulnerability
##updated 2025-12-09T18:30:43
1 posts
Critical flaw reported in Siemens advanced licensing toolkit
Siemens disclosed a critical vulnerability (CVE-2025-40801) in its SALT Toolkit affecting multiple industrial software products, which allows unauthenticated attackers to perform man-in-the-middle attacks due to improper TLS certificate validation. Patches are available for some affected products (NX, Simcenter 3D, Simcenter Femap, and Tecnomatix Plant Simulation), but others are not patched.
**If you use any Siemens products, make sure they are isolated from the internet and only accessible from trusted networks. Plan an update for the products if patches available (NX, Simcenter 3D, Simcenter Femap, or Tecnomatix). For products without fixes, network isolation is the only available mitigation.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-flaw-reported-in-siemens-advanced-licensing-toolkit-j-c-f-m-n/gD2P6Ple2L
updated 2025-12-09T16:32:30
1 posts
A popular reverse proxy and ingress controller shipped misconfigured versions for the past five months.
The Traefik setting that enabled TLS verification was actually disabling it across the board.
https://aisle.com/blog/cve-2025-66491-traefiks-verifyon-turned-tls-off
##updated 2025-12-05T02:26:57
1 posts
2 repos
On Apache Tika vulnerability CVE-2025-66516
- The fix was released in August.
- It's the same vulnerability as CVE-2025-54988 from August, they just issued a new CVE (which they probably shouldn't have) as they filed the scope wrong.
- It doesn't provide RCE. You can read local files with it as the Java user, e.g. /etc/passwd.
- Exploitation requires knowing a specific endpoint which processes PDFs to be vulnerable (so exploitation would be tailored).
It's not one to panic over.
##updated 2025-11-05T20:40:58
1 posts
1 repos
On Apache Tika vulnerability CVE-2025-66516
- The fix was released in August.
- It's the same vulnerability as CVE-2025-54988 from August, they just issued a new CVE (which they probably shouldn't have) as they filed the scope wrong.
- It doesn't provide RCE. You can read local files with it as the Java user, e.g. /etc/passwd.
- Exploitation requires knowing a specific endpoint which processes PDFs to be vulnerable (so exploitation would be tailored).
It's not one to panic over.
##updated 2025-10-23T14:15:35.980000
1 posts
9 repos
https://github.com/0xCZR1/cve-2025-49144
https://github.com/onniio/CVE-2025-49144
https://github.com/Vr00mm/CVE-2025-49144
https://github.com/b0ySie7e/Notepad-8.8.1_CVE-2025-49144
https://github.com/timsonner/CVE-2025-49144-Research
https://github.com/ammarm0010/CVE-2025-49144_PoC
https://github.com/assad12341/notepad-v8.8.1-LPE-CVE-
If you use PDQ, the Notepad++ 8.8.9 auto upgrade package is now available, but may require manual updates to your existing jobs to point to it. Patch that #0day if you haven't already. CVE-2025-49144
##updated 2025-06-12T17:15:29.310000
1 posts
22 repos
https://github.com/LeakForge/CVE-2025-49113
https://github.com/Zwique/CVE-2025-49113
https://github.com/ankitpandey383/roundcube-cve-2025-49113-lab
https://github.com/fearsoff-org/CVE-2025-49113
https://github.com/CyberQuestor-infosec/CVE-2025-49113-Roundcube_1.6.10
https://github.com/BiiTts/Roundcube-CVE-2025-49113
https://github.com/hackmelocal/CVE-2025-49113-Simulation
https://github.com/l4f2s4/CVE-2025-49113_exploit_cookies
https://github.com/Ademking/CVE-2025-49113-nuclei-template
https://github.com/SyFi/CVE-2025-49113
https://github.com/Zuack55/Roundcube-1.6.10-Post-Auth-RCE-CVE-2025-49113-
https://github.com/SteamPunk424/CVE-2025-49113-Roundcube-RCE-PHP
https://github.com/rxerium/CVE-2025-49113
https://github.com/Ashwesker/Blackash-CVE-2025-49113
https://github.com/Joelp03/CVE-2025-49113
https://github.com/00xCanelo/CVE-2025-49113
https://github.com/hakaioffsec/CVE-2025-49113-exploit
https://github.com/punitdarji/roundcube-cve-2025-49113
https://github.com/Yuri08loveElaina/CVE-2025-49113
https://github.com/AC8999/CVE-2025-49113
updated 2025-03-21T21:51:09
1 posts
17 repos
https://github.com/BridgerAlderson/CVE-2025-27591-PoC
https://github.com/Diabl0xE/CVE-2025-27519
https://github.com/Thekin-ctrl/CVE-2025-27591-Below
https://github.com/danil-koltsov/below-log-race-poc
https://github.com/00xCanelo/CVE-2025-27591
https://github.com/0xDTC/Below-Logger-Symlink-Attack_CVE-2025-27591
https://github.com/Cythonic1/CVE-2025-27591
https://github.com/DarksBlackSk/CVE-2025-27591
https://github.com/incommatose/CVE-2025-27591-PoC
https://github.com/umutcamliyurt/CVE-2025-27591
https://github.com/alialucas7/CVE-2025-27591_PoC
https://github.com/rvizx/CVE-2025-27591
https://github.com/obamalaolu/CVE-2025-27591
https://github.com/0x00Jeff/CVE-2025-27591
https://github.com/krn966/CVE-2025-27591
https://github.com/dollarboysushil/Linux-Privilege-Escalation-CVE-2025-27591
updated 2025-03-13T21:24:16
2 posts
SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation
https://isc.sans.edu/podcastdetail/9734
🚨 CVE-2025-36747 (CRITICAL, CVSS 9.4): Hard-coded FTP creds in Growatt ShineLan-X 3.6.0.0 allow file tampering—no signature checks! Patch, restrict FTP, and monitor for abuse. https://radar.offseq.com/threat/cve-2025-36747-cwe-798-use-of-hard-coded-credentia-55cb0be8 #OffSeq #CVE202536747 #ICS #Infosec
##🚨 CRITICAL: CVE-2025-14440 in JAY Login & Register plugin (≤2.4.01) enables auth bypass—attackers can hijack any WordPress account, incl. admin. Disable plugin & monitor now. No patch yet. https://radar.offseq.com/threat/cve-2025-14440-cwe-565-reliance-on-cookies-without-51904fb2 #OffSeq #WordPress #Infosec #CVE202514440
##CVE-2025-14440 - JAY Login & Register Plugin WordPress Authentication Bypass Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14440
##🚨 CVE-2025-10738 (CRITICAL, CVSS 9.8): Unauthenticated SQL Injection in rupok98 URL Shortener Plugin for WordPress (all versions). Exploitation risks full DB compromise. Disable or restrict plugin ASAP! https://radar.offseq.com/threat/cve-2025-10738-cwe-89-improper-neutralization-of-s-08eed048 #OffSeq #WordPress #SQLi #Infosec
##🚨 CVE-2025-11693 (CRITICAL, CVSS 9.8): recorp Export WP Pages to HTML & PDF plugin exposes admin cookies via cookies.txt — risk of WordPress site takeover. Disable plugin & secure backups. No patch yet. https://radar.offseq.com/threat/cve-2025-11693-cwe-200-exposure-of-sensitive-infor-d010e42a #OffSeq #WordPress #Vuln #Infosec
##CVE-2025-11693 - WordPress Export WP Page to Static HTML & PDF Sensitive Information Exposure https://cvefeed.io/vuln/detail/CVE-2025-11693
##🚨 CVE-2025-13089: HIGH-severity SQL Injection in WP Directory Kit (all versions). Unauthenticated attackers can leak sensitive DB info via 'hide_fields' & 'attr_search'. Mitigate: disable plugin or use WAF. https://radar.offseq.com/threat/cve-2025-13089-cwe-89-improper-neutralization-of-s-39a10248 #OffSeq #WordPress #Vuln #SQLi
##CVE-2025-13089 - WP Directory Kit <= 1.4.7 - Unauthenticated SQL Injection https://cvefeed.io/vuln/detail/CVE-2025-13089
##CVE-2025-12077 - WordPress WP to LinkedIn Auto Publish Plugin Reflected Cross-Site Scripting https://cvefeed.io/vuln/detail/CVE-2025-12077
##CVE-2025-7058 - Kingcabs WordPress Stored Cross-Site Scripting Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-7058
##CVE-2025-14476 - WordPress Doubly - Cross Domain Copy Paste PHP Object Injection Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14476
##CVE-2025-14476 - WordPress Doubly - Cross Domain Copy Paste PHP Object Injection Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14476
##CVE-2025-11376 - Colibri Page Builder Stored Cross-Site Scripting https://cvefeed.io/vuln/detail/CVE-2025-11376
##CVE-2025-11164 - Mavix Education WordPress Unauthorized Data Modification Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-11164
##CVE-2025-14397 - WordPress Postem Ipsum Privilege Escalation Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14397
##CVE-2025-14475 - WordPress WPBakery Local File Inclusion Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14475
##CVE-2025-14454 - Image Slider by Ays- Responsive Slider and Carousel <= 2.7.0 - Cross-Site Request Forgery to Arbitrary Slider Deletion https://cvefeed.io/vuln/detail/CVE-2025-14454
##CVE-2025-14050 - Design Import/Export <= 2.2 - Authenticated (Administrator+) SQL Injection via XML File Import https://cvefeed.io/vuln/detail/CVE-2025-14050
##CVE-2025-14278 - HT Slider for Elementor <= 1.7.4 - Authenticated (Contributor+) Stored Cross-Site Scripting https://cvefeed.io/vuln/detail/CVE-2025-14278
##CVE-2025-14056 - Custom Post Type UI <= 1.18.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via 'label' Import Parameter https://cvefeed.io/vuln/detail/CVE-2025-14056
##Two EITW 0days patched in iOS Webkit. The advisory says the exploits were against pre-iOS 26 but they have patches for 26 as well. And some other ones to go with those.
https://support.apple.com/en-us/125884
##Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report.
Processing maliciously crafted web content may lead to memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-43529 was also issued in response to this report.
📣 EMERGENCY UPDATES 📣
Apple pushed additional updates for 2 zero-days that may have been actively exploited.
🐛 CVE-2025-14174 (WebKit) additional patches,
🐛 CVE-2025-43529 (WebKit) additional patches:
- Safari 26.2
📣 EMERGENCY UPDATES 📣
Apple pushed updates for 2 new zero-days that may have been actively exploited.
🐛 CVE-2025-14174 (WebKit),
🐛 CVE-2025-43529 (WebKit):
- iOS and iPadOS 18.7.3
- iOS and iPadOS 26.2
- macOS Tahoe 26.2
- tvOS 26.2
- visionOS 26.2
- watchOS 26.2
CVE-2025-65950 - WBCE CMS is Vulnerable to Time-Based Blind SQL Injection through groups[] Parameter https://cvefeed.io/vuln/detail/CVE-2025-65950
##