## Updated at UTC 2025-11-11T21:03:54.212110

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2025-62220 8.8 0.00% 1 0 2025-11-11T18:30:31 Heap-based buffer overflow in Windows Subsystem for Linux GUI allows an unauthor
CVE-2025-60724 9.8 0.00% 1 0 2025-11-11T18:30:30 Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorize
CVE-2025-60715 8.0 0.00% 1 0 2025-11-11T18:30:30 Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) a
CVE-2025-59499 8.8 0.00% 1 0 2025-11-11T18:30:25 Improper neutralization of special elements used in an sql command ('sql injecti
CVE-2025-30398 8.1 0.00% 1 0 2025-11-11T18:30:25 Missing authorization in Nuance PowerScribe allows an unauthorized attacker to d
CVE-2025-33178 7.8 0.00% 1 0 2025-11-11T18:30:25 NVIDIA NeMo Framework for all platforms contains a vulnerability in the bert ser
CVE-2025-33202 6.5 0.00% 1 0 2025-11-11T18:30:25 NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability wh
CVE-2025-33185 5.3 0.00% 1 0 2025-11-11T18:30:25 NVIDIA AIStore contains a vulnerability in AuthN where an unauthenticated user m
CVE-2025-33186 8.8 0.00% 1 0 2025-11-11T18:30:24 NVIDIA AIStore contains a vulnerability in AuthN. A successful exploit of this v
CVE-2025-23357 7.8 0.00% 1 0 2025-11-11T18:30:24 NVIDIA Megatron-LM for all platforms contains a vulnerability in a script, where
CVE-2025-62211 8.7 0.00% 1 0 2025-11-11T18:30:23 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2025-62210 8.7 0.00% 1 0 2025-11-11T18:30:23 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2025-62204 8.0 0.00% 1 0 2025-11-11T18:30:23 Deserialization of untrusted data in Microsoft Office SharePoint allows an autho
CVE-2025-61831 7.8 0.00% 1 0 2025-11-11T18:30:23 Illustrator versions 28.7.10, 29.8.2 and earlier are affected by an out-of-bound
CVE-2025-62452 8.0 0.00% 1 0 2025-11-11T18:15:50.250000 Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) a
CVE-2025-62222 8.8 0.00% 1 0 2025-11-11T18:15:49.887000 Improper neutralization of special elements used in a command ('command injectio
CVE-2025-43079 6.3 0.01% 1 0 2025-11-11T18:15:35.277000 The Qualys Cloud Agent included a bundled uninstall script (qagent_uninstall.sh)
CVE-2025-23361 7.8 0.00% 1 0 2025-11-11T17:15:41.260000 NVIDIA NeMo Framework for all platforms contains a vulnerability in a script, wh
CVE-2025-64773 2.7 0.00% 1 0 2025-11-11T16:15:40.260000 In JetBrains YouTrack before 2025.3.104432 a race condition allowed bypass of he
CVE-2025-10918 7.1 0.00% 2 0 2025-11-11T16:15:38.113000 Insecure default permissions in the agent of Ivanti Endpoint Manager before vers
CVE-2025-11959 8.1 0.00% 2 0 2025-11-11T15:31:27 Files or Directories Accessible to External Parties, Exposure of Private Persona
CVE-2024-57695 None 0.00% 1 0 2025-11-11T15:31:27 An issue in Agnitum Outpost Security Suite 7.5.3 (3942.608.1810) and 7.6 (3984.6
CVE-2025-9227 6.5 0.00% 1 0 2025-11-11T15:31:27 Zohocorp ManageEngine OpManager versions 128609 and below are vulnerable to Stor
CVE-2025-12101 None 0.00% 1 0 2025-11-11T15:31:27 Cross-Site Scripting (XSS) in NetScaler ADC and NetScaler Gateway when the appli
CVE-2025-41103 None 0.00% 1 0 2025-11-11T15:31:27 HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, wh
CVE-2025-11697 None 0.00% 2 0 2025-11-11T15:31:26 A local code execution security issue exists within Studio 5000® Simulation Inte
CVE-2025-11085 None 0.00% 2 0 2025-11-11T15:31:26 A security issue exists within DataMosaix™ Private Cloud allowing for Persistent
CVE-2025-10161 7.3 0.00% 1 1 2025-11-11T15:31:26 Improper Restriction of Excessive Authentication Attempts, Client-Side Enforceme
CVE-2025-11696 None 0.00% 2 0 2025-11-11T15:31:21 A local server-side request forgery (SSRF) security issue exists within Studio 5
CVE-2025-41105 None 0.00% 1 0 2025-11-11T15:31:21 HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, wh
CVE-2025-41104 None 0.00% 1 0 2025-11-11T15:31:20 HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, wh
CVE-2025-9223 8.8 0.00% 2 1 2025-11-11T14:15:35.507000 Zohocorp ManageEngine Applications Manager versions 178100 and below are vulnera
CVE-2025-11862 0 0.00% 2 0 2025-11-11T14:15:34.933000 A security issue was discovered within Verve Asset Manager allowing unauthorized
CVE-2025-8324 9.8 0.00% 2 0 2025-11-11T13:15:45.443000 Zohocorp ManageEngine Analytics Plus versions 6170 and below are vulnerable to U
CVE-2025-64457 0 0.00% 1 0 2025-11-11T13:15:45.183000 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering
CVE-2025-41106 0 0.00% 1 0 2025-11-11T13:15:45.037000 HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, wh
CVE-2025-12846 8.8 0.10% 1 0 2025-11-11T12:30:25 The Blocksy Companion plugin for WordPress is vulnerable to authenticated arbitr
CVE-2025-12539 10.0 0.19% 1 1 2025-11-11T12:30:25 The TNC Toolbox: Web Performance plugin for WordPress is vulnerable to Sensitive
CVE-2025-41101 None 0.05% 1 0 2025-11-11T12:30:25 HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, wh
CVE-2025-11960 6.1 0.03% 1 0 2025-11-11T12:30:25 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2025-7633 7.3 0.03% 1 0 2025-11-11T12:30:25 Zohocorp ManageEngine Exchange Reporter Plus versions 5723 and below are vulnera
CVE-2025-41102 0 0.05% 1 0 2025-11-11T12:15:34.713000 HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, wh
CVE-2025-9055 6.4 0.01% 1 0 2025-11-11T09:30:41 The VAPIX Edge storage API that allowed a privilege escalation, enabling a VAPIX
CVE-2025-8998 3.1 0.04% 1 0 2025-11-11T09:30:41 It was possible to upload files with a specific name to a temporary directory, w
CVE-2025-6779 6.7 0.03% 1 0 2025-11-11T09:30:36 An ACAP configuration file has improper permissions, which could allow command i
CVE-2025-5452 6.6 0.04% 1 0 2025-11-11T09:30:36 A malicious ACAP application can gain access to admin-level service account cred
CVE-2025-5718 6.8 0.04% 1 0 2025-11-11T09:30:36 The ACAP Application framework could allow privilege escalation through a symlin
CVE-2025-5454 6.4 0.01% 1 0 2025-11-11T09:30:36 An ACAP configuration file lacked sufficient input validation, which could allow
CVE-2025-10714 8.4 0.01% 2 0 2025-11-11T09:30:31 AXIS Optimizer was vulnerable to an unquoted search path vulnerability, which co
CVE-2025-5317 None 0.01% 1 0 2025-11-11T09:30:30 An improper access restriction to a folder in Bitdefender Endpoint Security Tool
CVE-2025-4645 6.7 0.02% 1 0 2025-11-11T09:30:30 An ACAP configuration file lacked sufficient input validation, which could allow
CVE-2025-9524 4.3 0.06% 1 0 2025-11-11T08:15:35.213000 The VAPIX API port.cgi did not have sufficient input validation, which may resul
CVE-2025-7429 7.3 0.03% 1 0 2025-11-11T08:15:34.690000 Zohocorp ManageEngine Exchange Reporter Plus versions 5723 and below are vulnera
CVE-2025-8108 6.7 0.01% 1 0 2025-11-11T07:15:36.413000 An ACAP configuration file has improper permissions and lacks input validation,
CVE-2025-6571 6.0 0.01% 1 0 2025-11-11T07:15:35.590000 A 3rd-party component exposed its password in process arguments, allowing for lo
CVE-2025-6298 6.7 0.02% 1 0 2025-11-11T07:15:35.397000 ACAP applications can gain elevated privileges due to improper input validation,
CVE-2025-42940 7.5 0.08% 1 0 2025-11-11T03:30:36 SAP CommonCryptoLib does not perform necessary boundary checks during pre-authen
CVE-2025-42924 6.1 0.05% 1 0 2025-11-11T03:30:36 SAP S/4HANA landscape SAP E-Recruiting BSP allows an unauthenticated attacker to
CVE-2025-42899 4.3 0.03% 1 0 2025-11-11T03:30:36 SAP S4CORE (Manage journal entries) does not perform necessary authorization che
CVE-2025-42897 5.3 0.03% 1 0 2025-11-11T03:30:36 Due to information disclosure vulnerability in anonymous API provided by SAP Bus
CVE-2025-42894 6.8 0.03% 1 0 2025-11-11T03:30:36 Due to a Path Traversal vulnerability in SAP Business Connector, an attacker aut
CVE-2025-42893 6.1 0.05% 1 0 2025-11-11T03:30:36 Due to an Open Redirect vulnerability in SAP Business Connector, an unauthentica
CVE-2025-42892 6.8 0.34% 1 0 2025-11-11T03:30:36 Due to an OS Command Injection vulnerability in SAP Business Connector, an authe
CVE-2025-42887 10.0 0.05% 1 0 2025-11-11T03:30:36 Due to missing input sanitation, SAP Solution Manager allows an authenticated at
CVE-2025-21042 8.8 21.58% 9 1 2025-11-11T02:00:02.247000 Out-of-bounds write in libimagecodec.quram.so prior to SMR Apr-2025 Release 1 al
CVE-2025-42919 5.3 0.11% 1 0 2025-11-11T01:15:38.937000 Due to an Information Disclosure vulnerability in SAP NetWeaver Application Serv
CVE-2025-42895 6.9 0.02% 1 0 2025-11-11T01:15:38.487000 Due to insufficient validation of connection property values, the SAP HANA JDBC
CVE-2025-42890 10.0 0.07% 3 0 2025-11-11T01:15:37.820000 SQL Anywhere Monitor (Non-GUI) baked credentials into the code,exposing the reso
CVE-2021-4462 None 0.07% 2 0 2025-11-11T00:30:29 Employee Records System version 1.0 contains an unrestricted file upload vulnera
CVE-2025-12542 None 0.00% 1 0 2025-11-11T00:30:29 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering
CVE-2025-11892 None 0.05% 2 0 2025-11-11T00:30:28 An improper neutralization of input vulnerability was identified in GitHub Enter
CVE-2018-25124 None 0.67% 2 0 2025-11-11T00:30:28 PacsOne Server version 6.6.2 (prior versions are likely affected) contains a dir
CVE-2025-63678 None 0.02% 1 0 2025-11-11T00:30:28 An authenticated arbitrary file upload vulnerability in the /uploads/ endpoint o
CVE-2025-64529 0 0.04% 1 0 2025-11-10T23:15:42.170000 SpiceDB is an open source database system for creating and managing security-cri
CVE-2025-64519 8.8 0.03% 2 0 2025-11-10T23:15:41.833000 TorrentPier is an open source BitTorrent Public/Private tracker engine, written
CVE-2025-59396 0 0.00% 1 1 2025-11-10T23:15:41.620000 Rejected reason: Not a security vulnerability
CVE-2025-11578 0 0.05% 1 0 2025-11-10T23:15:41.193000 A privilege escalation vulnerability was identified in GitHub Enterprise Server
CVE-2025-64512 8.6 0.05% 1 0 2025-11-10T22:15:40.067000 Pdfminer.six is a community maintained fork of the original PDFMiner, a tool for
CVE-2025-12725 4.3 0.02% 3 0 2025-11-10T22:15:34.740000 Out of bounds read in WebGPU in Google Chrome on Android prior to 142.0.7444.137
CVE-2025-64522 9.1 0.04% 2 0 2025-11-10T22:10:18 SUMMARY We have identified and verified an SSRF vulnerability where webhook URL
CVE-2025-12779 8.8 0.02% 3 0 2025-11-10T21:31:37 Improper handling of the authentication token in the Amazon WorkSpaces client fo
CVE-2025-12727 None 0.03% 3 0 2025-11-10T21:30:42 Inappropriate implementation in V8 in Google Chrome prior to 142.0.7444.137 allo
CVE-2025-12432 8.8 0.06% 1 0 2025-11-10T21:30:42 Race in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to
CVE-2025-63149 None 0.02% 1 0 2025-11-10T21:30:42 Tenda AX3 V16.03.12.10_CN was discovered to contain a stack overflow in the urls
CVE-2025-63384 None 0.02% 1 0 2025-11-10T21:30:42 A vulnerability was discovered in RISC-V Rocket-Chip v1.6 and before implementat
CVE-2025-12729 4.2 0.03% 1 0 2025-11-10T21:30:42 Inappropriate implementation in Omnibox in Google Chrome on Android prior to 142
CVE-2025-12726 7.5 0.07% 3 0 2025-11-10T21:30:36 Inappropriate implementation in Views in Google Chrome on Windows prior to 142.0
CVE-2025-60876 None 0.02% 1 0 2025-11-10T21:30:36 BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control by
CVE-2025-33150 5.3 0.03% 1 0 2025-11-10T21:30:36 IBM Cognos Analytics Certified Containers 12.1.0 could disclose package paramete
CVE-2025-63455 7.5 0.04% 1 0 2025-11-10T21:30:35 Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow via the sh
CVE-2025-48878 4.3 0.03% 1 0 2025-11-10T21:15:39.263000 Combodo iTop is a web based IT service management tool. In versions on the 3.x b
CVE-2025-48065 8.8 0.04% 2 0 2025-11-10T21:15:39.103000 Combodo iTop is a web based IT service management tool. Versions prior to 2.7.13
CVE-2025-12438 8.8 0.07% 1 0 2025-11-10T21:15:37.527000 Use after free in Ozone in Google Chrome on Linux and ChromeOS prior to 142.0.74
CVE-2025-64518 7.5 0.05% 1 0 2025-11-10T21:04:04 ### Impact The XML [`Validator`](https://docs.oracle.com/javase/8/docs/api/java
CVE-2025-56503 0 0.02% 1 1 2025-11-10T20:15:47.990000 An issue in Sublime HQ Pty Ltd Sublime Text 4 4200 allows authenticated attacker
CVE-2025-12967 8.0 0.10% 1 0 2025-11-10T19:15:56.320000 An issue in AWS Wrappers for Amazon Aurora PostgreSQL may allow for privilege es
CVE-2025-12735 None 0.12% 1 0 2025-11-10T19:06:04 The expr-eval library is a JavaScript expression parser and evaluator designed t
CVE-2025-63835 None 0.07% 1 0 2025-11-10T18:30:40 A stack-based buffer overflow vulnerability was discovered in Tenda AC18 v15.03.
CVE-2025-63834 None 0.08% 1 0 2025-11-10T18:30:40 A stored cross-site scripting (XSS) vulnerability was discovered in Tenda AC18 v
CVE-2025-63497 None 0.01% 1 0 2025-11-10T18:30:35 The patient prescription viewing functionality in his_doc_view_single_patient.ph
CVE-2025-63456 None 0.02% 1 0 2025-11-10T18:30:35 Tenda AX-1803 v1.0.0.1 was discovered to contain a stack overflow via the time p
CVE-2025-63147 None 0.02% 1 0 2025-11-10T18:30:34 Tenda AX3 V16.03.12.10_CN was discovered to contain a stack overflow in the devi
CVE-2025-63154 None 0.02% 1 0 2025-11-10T18:30:34 TOTOLink A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflo
CVE-2025-12907 8.8 0.08% 1 1 2025-11-10T18:30:34 Insufficient validation of untrusted input in Devtools in Google Chrome prior to
CVE-2025-63457 0 0.02% 1 0 2025-11-10T17:15:35.100000 Tenda AX-1803 v1.0.0.1 was discovered to contain a stack overflow via the wanMTU
CVE-2025-12480 9.1 0.03% 8 0 template 2025-11-10T16:15:43.237000 Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access
CVE-2025-64456 8.4 0.00% 2 0 2025-11-10T15:31:11 In JetBrains ReSharper before 2025.2.4 missing signature verification in DPA Col
CVE-2025-64690 5.4 0.00% 1 0 2025-11-10T15:31:11 In JetBrains YouTrack before 2025.3.104432 insecure Junie configuration could le
CVE-2025-64687 5.4 0.00% 1 0 2025-11-10T15:31:11 In JetBrains YouTrack before 2025.3.104432 improper access control allowed modif
CVE-2025-64688 7.4 0.00% 1 0 2025-11-10T15:31:06 In JetBrains YouTrack before 2025.3.104432 missing VCS URL validation allowed de
CVE-2025-64689 9.6 0.00% 2 0 2025-11-10T15:31:05 In JetBrains YouTrack before 2025.3.104432 misconfiguration in the Junie could l
CVE-2025-64684 4.3 0.00% 1 0 2025-11-10T15:31:05 In JetBrains YouTrack before 2025.3.104432 information disclosure was possible v
CVE-2025-64683 5.3 0.00% 1 0 2025-11-10T15:31:05 In JetBrains Hub before 2025.3.104432 information disclosure was possible via th
CVE-2025-12929 7.3 0.03% 1 0 2025-11-10T15:15:36.903000 A flaw has been found in SourceCodester Survey Application System 1.0. This impa
CVE-2025-64686 3.1 0.00% 1 0 2025-11-10T14:15:44.223000 In JetBrains YouTrack before 2025.3.104432 missing user principal cleanup led to
CVE-2025-64685 8.1 0.00% 2 0 2025-11-10T14:15:44.070000 In JetBrains YouTrack before 2025.3.104432 missing TLS certificate validation en
CVE-2025-12405 None 0.04% 1 0 2025-11-10T12:30:29 An improper privilege management vulnerability was found in Looker Studio. It im
CVE-2025-41001 None 0.16% 1 0 2025-11-10T12:30:26 Cross Site Scripting (XSS) vulnerability stored in SOPlanning v1.53.02, which co
CVE-2025-12397 None 0.03% 1 0 2025-11-10T09:30:28 A SQL injection vulnerability was found in Looker Studio. A Looker Studio user
CVE-2025-12155 None 0.38% 1 0 2025-11-10T09:30:28 A Command Injection vulnerability, resulting from improper file path sanitizatio
CVE-2025-41731 7.4 0.01% 1 0 2025-11-10T09:30:28 A vulnerability was identified in the password generation algorithm when accessi
CVE-2025-41107 0 0.16% 1 0 2025-11-10T09:15:42.270000 Stored Cross Site Scripting (XSS) vulnerability in Smart School 7.0 due to lack
CVE-2025-12409 0 0.03% 1 0 2025-11-10T09:15:42.107000 A SQL injection vulnerability was discovered in Looker Studio that allowed for d
CVE-2025-62689 7.5 0.03% 2 0 2025-11-10T06:30:31 NULL pointer dereference vulnerability exists in GNU libmicrohttpd v1.0.2 and ea
CVE-2025-59777 7.5 0.03% 2 0 2025-11-10T06:30:31 NULL pointer dereference vulnerability exists in GNU libmicrohttpd v1.0.2 and ea
CVE-2025-12931 6.3 0.03% 1 0 2025-11-10T06:30:31 A vulnerability was found in SourceCodester Food Ordering System 1.0. Affected b
CVE-2025-12932 4.7 0.03% 1 0 2025-11-10T06:30:31 A vulnerability was determined in SourceCodester Baby Care System 1.0. Affected
CVE-2025-12930 6.3 0.03% 1 0 2025-11-10T06:30:31 A vulnerability has been found in SourceCodester Food Ordering System 1.0. Affec
CVE-2025-12928 7.3 0.03% 1 0 2025-11-10T06:30:26 A vulnerability was detected in code-projects Online Job Search Engine 1.0. This
CVE-2025-12868 9.8 0.20% 2 0 2025-11-10T06:30:25 New Site Server developed by CyberTutor has a Use of Client-Side Authentication
CVE-2025-12867 7.2 0.21% 1 0 2025-11-10T06:30:25 EIP Plus developed by Hundred Plus has an Arbitrary File Uplaod vulnerability, a
CVE-2025-12933 6.3 0.03% 1 0 2025-11-10T06:15:34.133000 A vulnerability was identified in SourceCodester Baby Care System 1.0. This affe
CVE-2025-12613 8.6 0.05% 2 0 2025-11-10T05:15:42.900000 Versions of the package cloudinary before 2.7.0 are vulnerable to Arbitrary Argu
CVE-2025-12866 9.8 0.08% 1 0 2025-11-10T03:30:23 EIP Plus developed by Hundred Plus has a Weak Password Recovery Mechanism vulner
CVE-2025-12865 8.8 0.08% 1 0 2025-11-10T03:30:23 U-Office Force developed by e-Excellence has a SQL Injection vulnerability, allo
CVE-2025-12925 7.3 0.04% 1 0 2025-11-10T03:30:23 A security flaw has been discovered in rymcu forest up to de53ce79db9faa2efc4e79
CVE-2025-12924 4.3 0.03% 1 0 2025-11-10T03:30:23 A vulnerability was identified in rymcu forest up to de53ce79db9faa2efc4e79ce107
CVE-2025-12922 6.3 0.05% 1 0 2025-11-10T03:30:22 A vulnerability was found in OpenClinica Community Edition up to 3.12.2/3.13. Th
CVE-2025-12864 8.8 0.08% 1 0 2025-11-10T03:15:42.017000 U-Office Force developed by e-Excellence has a SQL Injection vulnerability, allo
CVE-2025-12923 2.7 0.04% 1 0 2025-11-10T01:15:37.860000 A vulnerability was determined in liweiyi ChestnutCMS up to 1.5.8. This vulnerab
CVE-2025-12920 2.4 0.03% 1 0 2025-11-10T00:30:32 A flaw has been found in qianfox FoxCMS up to 1.2.16. Affected by this vulnerabi
CVE-2025-12921 4.3 0.03% 1 0 2025-11-10T00:15:44.943000 A vulnerability has been found in OpenClinica Community Edition up to 3.12.2/3.1
CVE-2025-12919 3.7 0.03% 1 0 2025-11-09T21:30:24 A vulnerability was detected in EverShop up to 2.0.1. Affected is an unknown fun
CVE-2025-12918 3.1 0.03% 1 0 2025-11-09T09:30:16 A security flaw has been discovered in yungifez Skuul School Management System u
CVE-2025-12917 4.3 0.01% 1 1 2025-11-09T09:30:16 A vulnerability was identified in TOZED ZLT T10 T10PLUS_3.04.15. The affected el
CVE-2025-9458 7.8 0.01% 2 0 2025-11-07T18:15:37.647000 A maliciously crafted PRT file, when parsed through certain Autodesk products, c
CVE-2025-52425 0 0.10% 1 0 2025-11-07T16:15:38.753000 An SQL injection vulnerability has been reported to affect QuMagie. A remote att
CVE-2025-34299 None 0.06% 2 2 2025-11-07T15:31:36 Monsta FTP versions 2.11 and earlier contain a vulnerability that allows unauthe
CVE-2025-52881 None 0.01% 5 2 2025-11-07T12:31:35 ### Impact ### This attack is primarily a more sophisticated version of CVE-201
CVE-2025-52565 None 0.01% 5 1 2025-11-06T23:12:53 ### Impact ### This attack is very similar in concept and application to CVE-202
CVE-2025-31133 None 0.01% 4 2 2025-11-06T23:12:38 ### Impact ### The OCI runtime specification has a `maskedPaths` feature that
CVE-2025-10885 7.8 0.02% 2 0 2025-11-06T19:45:09.883000 A maliciously crafted file, when executed on the victim's machine, can lead to p
CVE-2025-40300 None 0.07% 1 0 2025-11-03T18:32:46 In the Linux kernel, the following vulnerability has been resolved: x86/vmscape
CVE-2024-1086 7.8 88.85% 1 9 2025-10-27T17:06:37.437000 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables compon
CVE-2025-55315 9.9 0.07% 2 6 2025-10-21T21:04:55 # Microsoft Security Advisory CVE-2025-55315: .NET Security Feature Bypass Vulne
CVE-2025-62518 8.1 0.01% 4 1 2025-10-21T19:31:25.450000 astral-tokio-tar is a tar archive reading/writing library for async Rust. Versio
CVE-2025-54918 8.8 0.15% 1 1 2025-09-09T18:31:31 Improper authentication in Windows NTLM allows an authorized attacker to elevate
CVE-2025-48561 5.5 0.01% 1 1 2025-09-05T21:34:34 In multiple locations, there is a possible way to access data displayed on the s
CVE-2025-47728 7.3 0.01% 2 0 2025-07-11T17:52:28.613000 Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file.
CVE-2024-38197 6.5 6.58% 1 0 2024-10-22T19:50:21.707000 Microsoft Teams for iOS Spoofing Vulnerability
CVE-2022-1234 6.1 0.13% 1 0 2023-01-27T05:01:29 XSS in livehelperchat in GitHub repository livehelperchat/livehelperchat prior t
CVE-2025-12686 0 0.00% 2 0 N/A
CVE-2025-9408 0 0.00% 1 0 N/A
CVE-2025-48593 0 0.00% 3 6 N/A
CVE-2025-64513 0 0.24% 1 0 N/A
CVE-2025-64507 0 0.01% 1 0 N/A
CVE-2025-64484 0 0.06% 1 0 N/A
CVE-2025-49145 0 0.03% 1 0 N/A
CVE-2025-48055 0 0.03% 2 0 N/A
CVE-2025-47932 0 0.04% 2 0 N/A

CVE-2025-62220
(8.8 HIGH)

EPSS: 0.00%

updated 2025-11-11T18:30:31

1 posts

Heap-based buffer overflow in Windows Subsystem for Linux GUI allows an unauthorized attacker to execute code over a network.

jos1264@social.skynetcloud.site at 2025-11-11T20:25:03.000Z ##

CVE-2025-62220 - Windows Subsystem for Linux GUI Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-60724
(9.8 CRITICAL)

EPSS: 0.00%

updated 2025-11-11T18:30:30

1 posts

Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.

CVE-2025-60715
(8.0 HIGH)

EPSS: 0.00%

updated 2025-11-11T18:30:30

1 posts

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

jos1264@social.skynetcloud.site at 2025-11-11T20:25:01.000Z ##

CVE-2025-60715 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59499
(8.8 HIGH)

EPSS: 0.00%

updated 2025-11-11T18:30:25

1 posts

Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.

jos1264@social.skynetcloud.site at 2025-11-11T20:25:01.000Z ##

CVE-2025-59499 - Microsoft SQL Server Elevation of Privilege Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-30398
(8.1 HIGH)

EPSS: 0.00%

updated 2025-11-11T18:30:25

1 posts

Missing authorization in Nuance PowerScribe allows an unauthorized attacker to disclose information over a network.

jos1264@social.skynetcloud.site at 2025-11-11T20:25:01.000Z ##

CVE-2025-30398 - Nuance PowerScribe 360 Information Disclosure Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-33178
(7.8 HIGH)

EPSS: 0.00%

updated 2025-11-11T18:30:25

1 posts

NVIDIA NeMo Framework for all platforms contains a vulnerability in the bert services component where malicious data created by an attacker may cause a code injection. A successful exploit of this vulnerability may lead to Code execution, Escalation of privileges, Information disclosure, and Data tampering.

AAKL@infosec.exchange at 2025-11-11T15:57:14.000Z ##

Nvidia has four new advisories, three of them high-severity.

CVE-2025-23357: NVIDIA Megatron LM nvidia.custhelp.com/app/answer

CVE-2025-23361 and CVE-2025-33178: NVIDIA NeMo Framework nvidia.custhelp.com/app/answer

CVE-2025-33202: NVIDIA Triton Inference Server nvidia.custhelp.com/app/answer

CVE-2025-33186 and CVE-2025-33185: NVIDIA AIStore Framework nvidia.custhelp.com/app/answer #Nvidia #infosec #LLM #vulnerabilities

##

CVE-2025-33202
(6.5 MEDIUM)

EPSS: 0.00%

updated 2025-11-11T18:30:25

1 posts

NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability where an attacker could cause a stack overflow by sending extra-large payloads. A successful exploit of this vulnerability might lead to denial of service.

AAKL@infosec.exchange at 2025-11-11T15:57:14.000Z ##

Nvidia has four new advisories, three of them high-severity.

CVE-2025-23357: NVIDIA Megatron LM nvidia.custhelp.com/app/answer

CVE-2025-23361 and CVE-2025-33178: NVIDIA NeMo Framework nvidia.custhelp.com/app/answer

CVE-2025-33202: NVIDIA Triton Inference Server nvidia.custhelp.com/app/answer

CVE-2025-33186 and CVE-2025-33185: NVIDIA AIStore Framework nvidia.custhelp.com/app/answer #Nvidia #infosec #LLM #vulnerabilities

##

CVE-2025-33185
(5.3 MEDIUM)

EPSS: 0.00%

updated 2025-11-11T18:30:25

1 posts

NVIDIA AIStore contains a vulnerability in AuthN where an unauthenticated user may cause information disclosure.  A successful exploit of this vulnerability may lead to information disclosure.

AAKL@infosec.exchange at 2025-11-11T15:57:14.000Z ##

Nvidia has four new advisories, three of them high-severity.

CVE-2025-23357: NVIDIA Megatron LM nvidia.custhelp.com/app/answer

CVE-2025-23361 and CVE-2025-33178: NVIDIA NeMo Framework nvidia.custhelp.com/app/answer

CVE-2025-33202: NVIDIA Triton Inference Server nvidia.custhelp.com/app/answer

CVE-2025-33186 and CVE-2025-33185: NVIDIA AIStore Framework nvidia.custhelp.com/app/answer #Nvidia #infosec #LLM #vulnerabilities

##

CVE-2025-33186
(8.8 HIGH)

EPSS: 0.00%

updated 2025-11-11T18:30:24

1 posts

NVIDIA AIStore contains a vulnerability in AuthN. A successful exploit of this vulnerability might lead to escalation of privileges, information disclosure, and data tampering.

AAKL@infosec.exchange at 2025-11-11T15:57:14.000Z ##

Nvidia has four new advisories, three of them high-severity.

CVE-2025-23357: NVIDIA Megatron LM nvidia.custhelp.com/app/answer

CVE-2025-23361 and CVE-2025-33178: NVIDIA NeMo Framework nvidia.custhelp.com/app/answer

CVE-2025-33202: NVIDIA Triton Inference Server nvidia.custhelp.com/app/answer

CVE-2025-33186 and CVE-2025-33185: NVIDIA AIStore Framework nvidia.custhelp.com/app/answer #Nvidia #infosec #LLM #vulnerabilities

##

CVE-2025-23357
(7.8 HIGH)

EPSS: 0.00%

updated 2025-11-11T18:30:24

1 posts

NVIDIA Megatron-LM for all platforms contains a vulnerability in a script, where malicious data created by an attacker may cause a code injection issue. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, data tampering.

AAKL@infosec.exchange at 2025-11-11T15:57:14.000Z ##

Nvidia has four new advisories, three of them high-severity.

CVE-2025-23357: NVIDIA Megatron LM nvidia.custhelp.com/app/answer

CVE-2025-23361 and CVE-2025-33178: NVIDIA NeMo Framework nvidia.custhelp.com/app/answer

CVE-2025-33202: NVIDIA Triton Inference Server nvidia.custhelp.com/app/answer

CVE-2025-33186 and CVE-2025-33185: NVIDIA AIStore Framework nvidia.custhelp.com/app/answer #Nvidia #infosec #LLM #vulnerabilities

##

CVE-2025-62211
(8.7 HIGH)

EPSS: 0.00%

updated 2025-11-11T18:30:23

1 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Dynamics 365 Field Service (online) allows an authorized attacker to perform spoofing over a network.

jos1264@social.skynetcloud.site at 2025-11-11T20:25:02.000Z ##

CVE-2025-62211 - Dynamics 365 Field Service (online) Spoofing Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-62210
(8.7 HIGH)

EPSS: 0.00%

updated 2025-11-11T18:30:23

1 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Dynamics 365 Field Service (online) allows an authorized attacker to perform spoofing over a network.

jos1264@social.skynetcloud.site at 2025-11-11T20:25:02.000Z ##

CVE-2025-62210 - Dynamics 365 Field Service (online) Spoofing Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-62204
(8.0 HIGH)

EPSS: 0.00%

updated 2025-11-11T18:30:23

1 posts

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

jos1264@social.skynetcloud.site at 2025-11-11T20:25:02.000Z ##

CVE-2025-62204 - Microsoft SharePoint Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-61831
(7.8 HIGH)

EPSS: 0.00%

updated 2025-11-11T18:30:23

1 posts

Illustrator versions 28.7.10, 29.8.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

jos1264@social.skynetcloud.site at 2025-11-11T19:45:02.000Z ##

CVE-2025-61831 - Illustrator | Out-of-bounds Write (CWE-787) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-62452
(8.0 HIGH)

EPSS: 0.00%

updated 2025-11-11T18:15:50.250000

1 posts

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

jos1264@social.skynetcloud.site at 2025-11-11T20:25:03.000Z ##

CVE-2025-62452 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-62222
(8.8 HIGH)

EPSS: 0.00%

updated 2025-11-11T18:15:49.887000

1 posts

Improper neutralization of special elements used in a command ('command injection') in Visual Studio Code CoPilot Chat Extension allows an unauthorized attacker to execute code over a network.

jos1264@social.skynetcloud.site at 2025-11-11T20:25:03.000Z ##

CVE-2025-62222 - Agentic AI and Visual Studio Code Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-43079
(6.3 MEDIUM)

EPSS: 0.01%

updated 2025-11-11T18:15:35.277000

1 posts

The Qualys Cloud Agent included a bundled uninstall script (qagent_uninstall.sh), specific to Linux supported versions that invoked multiple system commands without using absolute paths and without sanitizing the $PATH environment. If the uninstall script is executed with elevated privileges (e.g., via sudo) in an environment where $PATH has been manipulated, an attacker with root/sudo privileges

jos1264@social.skynetcloud.site at 2025-11-10T18:30:02.000Z ##

CVE-2025-43079 - Local Privilege Escalation via qagent_uninstall.sh Qualys Cloud Agents cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-23361
(7.8 HIGH)

EPSS: 0.00%

updated 2025-11-11T17:15:41.260000

1 posts

NVIDIA NeMo Framework for all platforms contains a vulnerability in a script, where malicious input created by an attacker may cause improper control of code generation. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.

AAKL@infosec.exchange at 2025-11-11T15:57:14.000Z ##

Nvidia has four new advisories, three of them high-severity.

CVE-2025-23357: NVIDIA Megatron LM nvidia.custhelp.com/app/answer

CVE-2025-23361 and CVE-2025-33178: NVIDIA NeMo Framework nvidia.custhelp.com/app/answer

CVE-2025-33202: NVIDIA Triton Inference Server nvidia.custhelp.com/app/answer

CVE-2025-33186 and CVE-2025-33185: NVIDIA AIStore Framework nvidia.custhelp.com/app/answer #Nvidia #infosec #LLM #vulnerabilities

##

CVE-2025-64773
(2.7 LOW)

EPSS: 0.00%

updated 2025-11-11T16:15:40.260000

1 posts

In JetBrains YouTrack before 2025.3.104432 a race condition allowed bypass of helpdesk Agent limit

jos1264@social.skynetcloud.site at 2025-11-11T17:40:03.000Z ##

CVE-2025-64773 - JetBrains YouTrack Helpdesk Agent Limit Bypass cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-10918
(7.1 HIGH)

EPSS: 0.00%

updated 2025-11-11T16:15:38.113000

2 posts

Insecure default permissions in the agent of Ivanti Endpoint Manager before version 2024 SU4 allows a local authenticated attacker to write arbitrary files anywhere on disk

AAKL at 2025-11-11T17:04:07.578Z ##

New.

Once you get past Ivanti's November 2025 Security Update preamble, you finally get to this part:

"Today Ivanti is disclosing a vulnerability in Ivanti Endpoint Manager (EPM).

It is important for customers to know: We have no evidence of this vulnerability being exploited in the wild" ivanti.com/blog/november-2025-

The vulnerability:

Security Advisory EPM November 2025 for EPM 2024: CVE-2025-10918 forums.ivanti.com/s/article/Se

##

AAKL@infosec.exchange at 2025-11-11T17:04:07.000Z ##

New.

Once you get past Ivanti's November 2025 Security Update preamble, you finally get to this part:

"Today Ivanti is disclosing a vulnerability in Ivanti Endpoint Manager (EPM).

It is important for customers to know: We have no evidence of this vulnerability being exploited in the wild" ivanti.com/blog/november-2025-

The vulnerability:

Security Advisory EPM November 2025 for EPM 2024: CVE-2025-10918 forums.ivanti.com/s/article/Se #Ivanti #vulnerabilities

##

CVE-2025-11959
(8.1 HIGH)

EPSS: 0.00%

updated 2025-11-11T15:31:27

2 posts

Files or Directories Accessible to External Parties, Exposure of Private Personal Information to an Unauthorized Actor vulnerability in Premierturk Information Technologies Inc. Excavation Management Information System allows Footprinting, Functionality Misuse.This issue affects Excavation Management Information System: before v.10.2025.01.

jos1264@social.skynetcloud.site at 2025-11-11T18:10:02.000Z ##

CVE-2025-11959 - Improper Access Control in Premierturk's Excavation Management Information System cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-11T17:40:03.000Z ##

CVE-2025-11959 - Improper Access Control in Premierturk's Excavation Management Information System cvefeed.io/vuln/detail/CVE-202

##

CVE-2024-57695(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-11-11T15:31:27

1 posts

An issue in Agnitum Outpost Security Suite 7.5.3 (3942.608.1810) and 7.6 (3984.693.1842) allows a local attacker to execute arbitrary code via the lock function. The manufacturer fixed the vulnerability in version 8.0 (4164.652.1856) from December 17, 2012.

jos1264@social.skynetcloud.site at 2025-11-11T17:40:03.000Z ##

CVE-2024-57695 - Agnitum Outpost Security Suite Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-9227
(6.5 MEDIUM)

EPSS: 0.00%

updated 2025-11-11T15:31:27

1 posts

Zohocorp ManageEngine OpManager versions 128609 and below are vulnerable to Stored XSS Vulnerability in the SNMP trap processor.

CVE-2025-12101(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-11-11T15:31:27

1 posts

Cross-Site Scripting (XSS) in NetScaler ADC and NetScaler Gateway when the appliance is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server

CVE-2025-41103(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-11-11T15:31:27

1 posts

HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'reply_message' in '/messages/reply'.

jos1264@social.skynetcloud.site at 2025-11-11T13:35:02.000Z ##

CVE-2025-41103 - Multiple vulnerabilities in Fairsketch's RISE CRM Framework cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11697(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-11-11T15:31:26

2 posts

A local code execution security issue exists within Studio 5000® Simulation Interface™ via the API. This vulnerability allows any Windows user on the system to extract files using path traversal sequences, resulting in execution of scripts with Administrator privileges on system reboot.

jos1264@social.skynetcloud.site at 2025-11-11T18:10:02.000Z ##

CVE-2025-11697 - Studio 5000 ® Simulation Interface Local Code Execution cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-11T17:40:02.000Z ##

CVE-2025-11697 - Studio 5000 ® Simulation Interface Local Code Execution cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11085(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-11-11T15:31:26

2 posts

A security issue exists within DataMosaix™ Private Cloud allowing for Persistent XSS. This vulnerability can result in the execution of malicious JavaScript, allowing for account takeover, credential theft, or redirection to a malicious website.

jos1264@social.skynetcloud.site at 2025-11-11T17:40:02.000Z ##

CVE-2025-11085 - FactoryTalk® DataMosaix™ Private Cloud – Persistent XSS cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-11T14:05:02.000Z ##

CVE-2025-11085 - FactoryTalk® DataMosaix™ Private Cloud – Persistent XSS cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-10161
(7.3 HIGH)

EPSS: 0.00%

updated 2025-11-11T15:31:26

1 posts

Improper Restriction of Excessive Authentication Attempts, Client-Side Enforcement of Server-Side Security, Reliance on Untrusted Inputs in a Security Decision vulnerability in Turkguven Software Technologies Inc. Perfektive allows Brute Force, Authentication Bypass, Functionality Bypass.This issue affects Perfektive: before Version: 12574 Build: 2701.

1 repos

https://github.com/FeZqq/CVE-2025-10161

jos1264@social.skynetcloud.site at 2025-11-11T13:35:03.000Z ##

CVE-2025-10161 - Authentication Bypass in Turkguven's Perfektive cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11696(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-11-11T15:31:21

2 posts

A local server-side request forgery (SSRF) security issue exists within Studio 5000® Simulation Interface™ via the API. This vulnerability allows any Windows user on the system to trigger outbound SMB requests, enabling the capture of NTLM hashes.

CVE-2025-41105(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-11-11T15:31:21

1 posts

HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'title' in '/tickets/save'.

jos1264@social.skynetcloud.site at 2025-11-11T13:35:02.000Z ##

CVE-2025-41105 - Multiple vulnerabilities in Fairsketch's RISE CRM Framework cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-41104(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-11-11T15:31:20

1 posts

HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'custom_field_1' in '/estimate_requests/save_estimate_request'.

jos1264@social.skynetcloud.site at 2025-11-11T13:35:02.000Z ##

CVE-2025-41104 - Multiple vulnerabilities in Fairsketch's RISE CRM Framework cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-9223
(8.8 HIGH)

EPSS: 0.00%

updated 2025-11-11T14:15:35.507000

2 posts

Zohocorp ManageEngine Applications Manager versions 178100 and below are vulnerable to authenticated command injection vulnerability due to the improper configuration in the execute program action feature.

1 repos

https://github.com/networkkiller/CVE-2025-9223

CVE-2025-11862
(0 None)

EPSS: 0.00%

updated 2025-11-11T14:15:34.933000

2 posts

A security issue was discovered within Verve Asset Manager allowing unauthorized read-only users to read, update, and delete users via the API.

jos1264@social.skynetcloud.site at 2025-11-11T18:10:02.000Z ##

CVE-2025-11862 - Verve Asset Manager Access Control Vulnerability cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-11T17:40:02.000Z ##

CVE-2025-11862 - Verve Asset Manager Access Control Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-8324
(9.8 CRITICAL)

EPSS: 0.00%

updated 2025-11-11T13:15:45.443000

2 posts

Zohocorp ManageEngine Analytics Plus versions 6170 and below are vulnerable to Unauthenticated SQL Injection due to the improper filter configuration.

CVE-2025-64457
(0 None)

EPSS: 0.00%

updated 2025-11-11T13:15:45.183000

1 posts

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority while details are being clarified. A corrected record will be published once verification is complete.

jos1264@social.skynetcloud.site at 2025-11-10T15:55:03.000Z ##

CVE-2025-64457 - JetBrains dotTrace Local Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-41106
(0 None)

EPSS: 0.00%

updated 2025-11-11T13:15:45.037000

1 posts

HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'first_name' in '/clients/save_contact/'.

jos1264@social.skynetcloud.site at 2025-11-11T13:35:03.000Z ##

CVE-2025-41106 - Multiple vulnerabilities in Fairsketch's RISE CRM Framework cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12846
(8.8 HIGH)

EPSS: 0.10%

updated 2025-11-11T12:30:25

1 posts

The Blocksy Companion plugin for WordPress is vulnerable to authenticated arbitrary file upload in all versions up to, and including, 2.1.19. This is due to insufficient file type validation detecting SVG files, allowing double extension files to bypass sanitization while being accepted as a valid SVG file. This makes it possible for authenticated attackers, with author level access and above, to

jos1264@social.skynetcloud.site at 2025-11-11T14:05:01.000Z ##

CVE-2025-12846 - Blocksy Companion <= 2.1.19 - Authenticated (Author+) Arbitrary File Upload via SVG Upload Bypass cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12539
(10.0 CRITICAL)

EPSS: 0.19%

updated 2025-11-11T12:30:25

1 posts

The TNC Toolbox: Web Performance plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.2. This is due to the plugin storing cPanel API credentials (hostname, username, and API key) in files within the web-accessible wp-content directory without adequate protection in the "Tnc_Wp_Toolbox_Settings::save_settings" function. This makes it possib

1 repos

https://github.com/Nxploited/CVE-2025-12539

jos1264@social.skynetcloud.site at 2025-11-11T14:05:01.000Z ##

CVE-2025-12539 - TNC Toolbox: Web Performance <= 1.4.2 - Unauthenticated Sensitive Information Exposure to Privilege Escalation/cPanel Account Takeover cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-41101(CVSS UNKNOWN)

EPSS: 0.05%

updated 2025-11-11T12:30:25

1 posts

HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'title' in'/projects/save'.

jos1264@social.skynetcloud.site at 2025-11-11T13:35:02.000Z ##

CVE-2025-41101 - Multiple vulnerabilities in Fairsketch's RISE CRM Framework cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11960
(6.1 MEDIUM)

EPSS: 0.03%

updated 2025-11-11T12:30:25

1 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Aryom Software High Technology Systems Inc. KVKNET allows Reflected XSS.This issue affects KVKNET: before 2.1.8.

CVE-2025-7633
(7.3 HIGH)

EPSS: 0.03%

updated 2025-11-11T12:30:25

1 posts

Zohocorp ManageEngine Exchange Reporter Plus versions 5723 and below are vulnerable to the Stored XSS Vulnerability in the Custom report.

CVE-2025-41102
(0 None)

EPSS: 0.05%

updated 2025-11-11T12:15:34.713000

1 posts

HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'title' in '/events/save'.

jos1264@social.skynetcloud.site at 2025-11-11T13:35:02.000Z ##

CVE-2025-41102 - Multiple vulnerabilities in Fairsketch's RISE CRM Framework cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-9055
(6.4 MEDIUM)

EPSS: 0.01%

updated 2025-11-11T09:30:41

1 posts

The VAPIX Edge storage API that allowed a privilege escalation, enabling a VAPIX administrator-privileged user to gain Linux Root privileges. This flaw can only be exploited after authenticating with an administrator-privileged service account.

jos1264@social.skynetcloud.site at 2025-11-11T11:30:03.000Z ##

CVE-2025-9055 - VAPIX Edge Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-8998
(3.1 LOW)

EPSS: 0.04%

updated 2025-11-11T09:30:41

1 posts

It was possible to upload files with a specific name to a temporary directory, which may result in process crashes and impact usability. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account.

jos1264@social.skynetcloud.site at 2025-11-11T11:30:03.000Z ##

CVE-2025-8998 - Apache HTTP Server File Upload Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-6779
(6.7 MEDIUM)

EPSS: 0.03%

updated 2025-11-11T09:30:36

1 posts

An ACAP configuration file has improper permissions, which could allow command injection and potentially lead to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

jos1264@social.skynetcloud.site at 2025-11-11T07:30:02.000Z ##

CVE-2025-6779 - Axis ACAP Command Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-5452
(6.6 MEDIUM)

EPSS: 0.04%

updated 2025-11-11T09:30:36

1 posts

A malicious ACAP application can gain access to admin-level service account credentials used by legitimate ACAP applications, leading to potential privilege escalation of the malicious ACAP application. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACA

jos1264@social.skynetcloud.site at 2025-11-11T07:30:02.000Z ##

CVE-2025-5452 - Axis ACAP Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-5718
(6.8 MEDIUM)

EPSS: 0.04%

updated 2025-11-11T09:30:36

1 posts

The ACAP Application framework could allow privilege escalation through a symlink attack. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

CVE-2025-5454
(6.4 MEDIUM)

EPSS: 0.01%

updated 2025-11-11T09:30:36

1 posts

An ACAP configuration file lacked sufficient input validation, which could allow a path traversal attack leading to potential privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

jos1264@social.skynetcloud.site at 2025-11-11T07:30:01.000Z ##

CVE-2025-5454 - Axis ACAP Path Traversal Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-10714
(8.4 HIGH)

EPSS: 0.01%

updated 2025-11-11T09:30:31

2 posts

AXIS Optimizer was vulnerable to an unquoted search path vulnerability, which could potentially lead to privilege escalation within Microsoft Windows operating system. This vulnerability can only be exploited if the attacker has access to the local Windows machine and sufficient access rights (administrator) to write data into the installation path of AXIS Optimizer.

jos1264@social.skynetcloud.site at 2025-11-11T11:30:02.000Z ##

CVE-2025-10714 - AXIS Optimizer Windows Unquoted Search Path Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-11T10:00:02.000Z ##

CVE-2025-10714 - AXIS Optimizer Windows Unquoted Search Path Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-5317(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-11-11T09:30:30

1 posts

An improper access restriction to a folder in Bitdefender Endpoint Security Tools for Mac (BEST) before 7.20.52.200087 allows local users with administrative privileges to bypass the configured uninstall password protection. An unauthorized user with sudo privileges can manually remove the application directory (/Applications/Endpoint Security for Mac.app/) and the related directories within /Libr

jos1264@social.skynetcloud.site at 2025-11-11T11:30:02.000Z ##

CVE-2025-5317 - Improper access restriction to critical folder in Bitdefender Endpoint Security Tools for Mac cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-4645
(6.7 MEDIUM)

EPSS: 0.02%

updated 2025-11-11T09:30:30

1 posts

An ACAP configuration file lacked sufficient input validation, which could allow for arbitrary code execution. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

CVE-2025-9524
(4.3 MEDIUM)

EPSS: 0.06%

updated 2025-11-11T08:15:35.213000

1 posts

The VAPIX API port.cgi did not have sufficient input validation, which may result in process crashes and impact usability. This vulnerability can only be exploited after authenticating with a viewer- operator- or administrator-privileged service account.

CVE-2025-7429
(7.3 HIGH)

EPSS: 0.03%

updated 2025-11-11T08:15:34.690000

1 posts

Zohocorp ManageEngine Exchange Reporter Plus versions 5723 and below are vulnerable to the Stored XSS Vulnerability in the Mails Deleted or Moved report.

CVE-2025-8108
(6.7 MEDIUM)

EPSS: 0.01%

updated 2025-11-11T07:15:36.413000

1 posts

An ACAP configuration file has improper permissions and lacks input validation, which could potentially lead to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

jos1264@social.skynetcloud.site at 2025-11-11T07:30:02.000Z ##

CVE-2025-8108 - Axis ACAP Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-6571
(6.0 MEDIUM)

EPSS: 0.01%

updated 2025-11-11T07:15:35.590000

1 posts

A 3rd-party component exposed its password in process arguments, allowing for low-privileged users to access it.

CVE-2025-6298
(6.7 MEDIUM)

EPSS: 0.02%

updated 2025-11-11T07:15:35.397000

1 posts

ACAP applications can gain elevated privileges due to improper input validation, potentially leading to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

jos1264@social.skynetcloud.site at 2025-11-11T07:30:02.000Z ##

CVE-2025-6298 - Axis ACAP Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-42940
(7.5 HIGH)

EPSS: 0.08%

updated 2025-11-11T03:30:36

1 posts

SAP CommonCryptoLib does not perform necessary boundary checks during pre-authentication parsing of manipulated ASN.1 data over the network. This may result in memory corruption followed by an application crash, hence leading to a high impact on availability. There is no impact on confidentiality or integrity.

jos1264@social.skynetcloud.site at 2025-11-11T03:55:03.000Z ##

CVE-2025-42940 - Memory Corruption vulnerability in SAP CommonCryptoLib cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-42924
(6.1 MEDIUM)

EPSS: 0.05%

updated 2025-11-11T03:30:36

1 posts

SAP S/4HANA landscape SAP E-Recruiting BSP allows an unauthenticated attacker to craft malicious links, when clicked the victim could be redirected to the page controlled by the attacker. This has low impact on confidentiality and integrity of the application with no impact on availability.

jos1264@social.skynetcloud.site at 2025-11-11T03:55:03.000Z ##

CVE-2025-42924 - Open Redirect vulnerabilities in SAP S/4HANA landscape (SAP E-Recruiting BSP) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-42899
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-11T03:30:36

1 posts

SAP S4CORE (Manage journal entries) does not perform necessary authorization checks for an authenticated user resulting in escalation of privileges. This has low impact on confidentiality of the application with no impact on integrity and availability of the application.

jos1264@social.skynetcloud.site at 2025-11-11T03:55:03.000Z ##

CVE-2025-42899 - Missing Authorization check in SAP S4CORE (Manage Journal Entries) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-42897
(5.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-11T03:30:36

1 posts

Due to information disclosure vulnerability in anonymous API provided by SAP Business One (SLD), an attacker with normal user access could gain access to unauthorized information. As a result, it has a low impact on the confidentiality of the application but no impact on the integrity and availability.

jos1264@social.skynetcloud.site at 2025-11-11T03:55:03.000Z ##

CVE-2025-42897 - Information Disclosure vulnerability in SAP Business One (SLD) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-42894
(6.8 MEDIUM)

EPSS: 0.03%

updated 2025-11-11T03:30:36

1 posts

Due to a Path Traversal vulnerability in SAP Business Connector, an attacker authenticated as an administrator with adjacent access could read, write, overwrite, and delete arbitrary files on the host system. Successful exploitation could enable the attacker to execute arbitrary operating system commands on the server, resulting in a complete compromise of the confidentiality, integrity, and avail

jos1264@social.skynetcloud.site at 2025-11-11T03:55:02.000Z ##

CVE-2025-42894 - Path Traversal vulnerability in SAP Business Connector cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-42893
(6.1 MEDIUM)

EPSS: 0.05%

updated 2025-11-11T03:30:36

1 posts

Due to an Open Redirect vulnerability in SAP Business Connector, an unauthenticated attacker could craft a malicious URL that, if accessed by a victim, redirects them to an attacker-controlled site displayed within an embedded frame. Successful exploitation could allow the attacker to steal sensitive information and perform unauthorized actions, impacting the confidentiality and integrity of web c

jos1264@social.skynetcloud.site at 2025-11-11T03:55:02.000Z ##

CVE-2025-42893 - Open Redirect vulnerability in SAP Business Connector cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-42892
(6.8 MEDIUM)

EPSS: 0.34%

updated 2025-11-11T03:30:36

1 posts

Due to an OS Command Injection vulnerability in SAP Business Connector, an authenticated attacker with administrative access and adjacent network access could upload specially crafted content to the server. If processed by the application, this content enables execution of arbitrary operating system commands. Successful exploitation could lead to full compromise of the system�s confidentiality, in

jos1264@social.skynetcloud.site at 2025-11-11T03:55:02.000Z ##

CVE-2025-42892 - OS Command Injection vulnerability in SAP Business Connector cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-42887
(10.0 CRITICAL)

EPSS: 0.05%

updated 2025-11-11T03:30:36

1 posts

Due to missing input sanitation, SAP Solution Manager allows an authenticated attacker to insert malicious code when calling a remote-enabled function module. This could provide the attacker with full control of the system hence leading to high impact on confidentiality, integrity and availability of the system.

jos1264@social.skynetcloud.site at 2025-11-11T03:30:03.000Z ##

CVE-2025-42887 - Code Injection vulnerability in SAP Solution Manager cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-21042
(8.8 HIGH)

EPSS: 21.58%

updated 2025-11-11T02:00:02.247000

9 posts

Out-of-bounds write in libimagecodec.quram.so prior to SMR Apr-2025 Release 1 allows remote attackers to execute arbitrary code.

1 repos

https://github.com/B1ack4sh/Blackash-CVE-2025-21042

jos1264@social.skynetcloud.site at 2025-11-11T16:10:02.000Z ##

CISA: Patch Samsung flaw exploited to deliver spyware (CVE-2025-21042) helpnetsecurity.com/2025/11/11 #PaloAltoNetworks #vulnerability #government #Don'tmiss #Hotstuff #Samsung #spyware #0-day #News #CISA #CVE

##

DarkWebInformer@infosec.exchange at 2025-11-10T20:18:11.000Z ##

🚨CVE-2025-21042 has been added to the CISA KEV Catalog.

darkwebinformer.com/cisa-kev-c

Samsung Mobile Devices Out-of-Bounds Write Vulnerability

##

cisakevtracker@mastodon.social at 2025-11-10T19:00:52.000Z ##

CVE ID: CVE-2025-21042
Vendor: Samsung
Product: Mobile Devices
Date Added: 2025-11-10
Notes: security.samsungmobile.com/sec ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2025-11-10T18:56:29.000Z ##

CISA has updated the KEV catalogue.

CVE-2025-21042: Samsung Mobile Devices Out-of-Bounds Write Vulnerability cve.org/CVERecord?id=CVE-2025- #Samsung #CISA #infosec

##

VirusBulletin@infosec.exchange at 2025-11-10T10:17:24.000Z ##

Unit 42 uncovers the new LANDFALL Android spyware delivered as DNG images that exploit CVE-2025-21042 in Samsung devices. unit42.paloaltonetworks.com/la

##

technadu@infosec.exchange at 2025-11-10T09:26:57.000Z ##

Palo Alto Networks Unit 42 revealed that LANDFALL spyware exploited a Samsung zero-day (CVE-2025-21042) via malicious DNG images sent through WhatsApp.

The Android spyware targeted Galaxy flagship models across the Middle East before Samsung patched it in April 2025.

LANDFALL collected sensitive user data, connected to C2 servers, and persisted via SELinux manipulation — showing how refined mobile exploits have become.

Follow @technadu for continuous coverage on advanced threat campaigns and mobile security research.

#InfoSec #AndroidSecurity #Samsung #LANDFALL #ZeroDay #CyberThreats #MobileSpyware #Privacy #TechNadu

##

Android@activitypub.awakari.com at 2025-11-07T15:29:34.000Z ## Landfall Android Spyware Targeted Samsung Phones via Zero-Day Threat actors exploited CVE-2025-21042 to deliver malware via specially crafted images to users in the Middle East.  The post Landfall...

#Malware #& #Threats #Android #malware #exploited #Featured #Landfall #Samsung #spyware #Zero-Day

Origin | Interest | Match ##

Android@activitypub.awakari.com at 2025-11-10T03:43:01.000Z ## These Galaxy phones were attacked by spyware for nearly a year before a patch was released A zero-day vulnerability (CVE-2025-21042) in Samsung’s Android image processing library allowed attacke...

#SmartPhone

Origin | Interest | Match ##

agnieszkaserafinowicz@imagazine.pl at 2025-11-09T13:00:56.000Z ##

Rok na celowniku. Oprogramowanie „Landfall” przez rok szpiegowało telefony Samsunga

To brzmi jak scenariusz filmu szpiegowskiego, ale wydarzyło się naprawdę. Analitycy z Unit 42, specjalnej jednostki ds. cyberbezpieczeństwa w Palo Alto Networks, ujawnili istnienie wysoce zaawansowanego oprogramowania szpiegowskiego o nazwie „Landfall”.

Atak był wymierzony w smartfony Samsung Galaxy i był aktywny przez prawie rok, zanim luka została załatana. Oprogramowanie pozwalało na kradzież praktycznie wszystkich danych z telefonu, a także na zdalne aktywowanie kamery i mikrofonu w celu szpiegowania użytkownika.

Atak typu zero-click, czyli broń w obrazku

Najbardziej niepokojący w ataku „Landfall” jest jego mechanizm. Był to atak typu zero-click, co oznacza, że do infekcji nie była wymagana absolutnie żadna interakcja ze strony użytkownika – nie trzeba było klikać w żaden link ani niczego instalować.

Jak to działało?

  • Dostawa: atakujący przesyłali ofierze (prawdopodobnie przez komunikator typu WhatsApp) specjalnie spreparowany plik graficzny.
  • Przynęta: „bronią” nie był zwykły JPG, lecz zmodyfikowany plik DNG – jest to format typu „raw” (surowy obraz) bazujący na formacie TIFF.
  • Pułapka: wewnątrz tego pliku DNG hakerzy osadzili ukryte archiwum ZIP zawierające złośliwy kod.
  • Luka: problem leżał w bibliotece przetwarzania obrazu w oprogramowaniu Samsunga.

Gdy telefon próbował przetworzyć ten plik (np. by wyświetlić jego miniaturkę w galerii lub komunikatorze), system operacyjny rozpakowywał ukryty plik ZIP i uruchamiał złośliwe oprogramowanie szpiegowskie.

Po zainfekowaniu, „Landfall” modyfikował polityki SELinux (mechanizm bezpieczeństwa w Androidzie), aby zakopać się głęboko w systemie, uzyskać szerokie uprawnienia i uniknąć wykrycia.

Kto był celem?

Analitycy z Unit 42 uspokajają, że nie był to atak masowy. Wszystko wskazuje na to, że „Landfall” był używany do precyzyjnie wymierzonych działań szpiegowskich, głównie na Bliskim Wschodzie (wskazano na Irak, Iran, Turcję i Maroko).

W kodzie złośliwego oprogramowania znaleziono bezpośrednie odniesienia do konkretnych modeli Samsunga, w tym Galaxy S22, Galaxy S23, Galaxy S24, Galaxy Z Flip 4 oraz Galaxy Z Fold 4. Chociaż nie zidentyfikowano autorów ataku, jego złożoność i metody działania przypominają narzędzia tworzone przez komercyjne firmy zajmujące się cyberwywiadem, takie jak osławiona NSO Group (twórcy Pegasusa).

Sprawdź, czy jesteś bezpieczny

Luka (zarejestrowana jako CVE-2025-21042) była obecna w oprogramowaniu Samsunga opartym na Androidzie od 13 do 15. Producent wydał krytyczną poprawkę bezpieczeństwa w kwietniu 2025 roku.

Analitycy z Unit 42 wstrzymywali się z publikacją szczegółów ataku do teraz, aby dać użytkownikom czas na aktualizację. Teraz, gdy metoda jest publiczna, kluczowe jest, aby każdy posiadacz telefonu Samsung upewnił się, że ma zainstalowane wszystkie aktualizacje systemu, a w szczególności łatkę bezpieczeństwa z kwietnia 2025 lub nowszą.

#Android #CVE202521042 #DNG #GalaxyS23 #GalaxyS24_ #Landfall #lukaBezpieczeństwa #news #oprogramowanieSzpiegowskie #Samsung #spyware #Unit42 #zeroClick

##

CVE-2025-42919
(5.3 MEDIUM)

EPSS: 0.11%

updated 2025-11-11T01:15:38.937000

1 posts

Due to an Information Disclosure vulnerability in SAP NetWeaver Application Server Java, internal metadata files could be accessed via manipulated URLs. An unauthenticated attacker could exploit this vulnerability by inserting arbitrary path components in the request, allowing unauthorized access to sensitive application metadata. This results in a partial compromise of the confidentiality of the

jos1264@social.skynetcloud.site at 2025-11-11T03:55:03.000Z ##

CVE-2025-42919 - Information Disclosure vulnerability in SAP NetWeaver Application Server Java cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-42895
(6.9 MEDIUM)

EPSS: 0.02%

updated 2025-11-11T01:15:38.487000

1 posts

Due to insufficient validation of connection property values, the SAP HANA JDBC Client allows a high-privilege locally authenticated user to supply crafted parameters that lead to unauthorized code loading, resulting in low impact on confidentiality and integrity and high impact on availability of the application.

jos1264@social.skynetcloud.site at 2025-11-11T03:55:02.000Z ##

CVE-2025-42895 - Code Injection vulnerability in SAP HANA JDBC Client cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-42890
(10.0 CRITICAL)

EPSS: 0.07%

updated 2025-11-11T01:15:37.820000

3 posts

SQL Anywhere Monitor (Non-GUI) baked credentials into the code,exposing the resources or functionality to unintended users and providing attackers with the possibility of arbitrary code execution.This could cause high impact on confidentiality integrity and availability of the system.

jos1264@social.skynetcloud.site at 2025-11-11T03:55:02.000Z ##

CVE-2025-42890 - Insecure key & Secret Management vulnerability in SQL Anywhere Monitor (Non-Gui) cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-11T03:30:03.000Z ##

CVE-2025-42890 - Insecure key & Secret Management vulnerability in SQL Anywhere Monitor (Non-Gui) cvefeed.io/vuln/detail/CVE-202

##

offseq@infosec.exchange at 2025-11-11T01:32:02.000Z ##

⚠️ CRITICAL: CVE-2025-42890 in SAP SQL Anywhere Monitor 17.0 (Non-GUI) — hard-coded credentials let attackers bypass auth remotely for RCE & full system takeover. Audit & restrict access now. Await SAP patches. radar.offseq.com/threat/cve-20 #OffSeq #SAP #Infosec #CVE202542890

##

CVE-2021-4462(CVSS UNKNOWN)

EPSS: 0.07%

updated 2025-11-11T00:30:29

2 posts

Employee Records System version 1.0 contains an unrestricted file upload vulnerability that allows a remote unauthenticated attacker to upload arbitrary files via the uploadID.php endpoint; uploaded files can be executed because the application does not perform proper server-side validation.

jos1264@social.skynetcloud.site at 2025-11-11T03:30:01.000Z ##

CVE-2021-4462 - Employee Records System v1.0 Arbitrary File Upload RCE cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-11T01:30:02.000Z ##

CVE-2021-4462 - Employee Records System v1.0 Arbitrary File Upload RCE cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12542(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-11-11T00:30:29

1 posts

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

jos1264@social.skynetcloud.site at 2025-11-11T01:30:03.000Z ##

CVE-2025-12542 - CVE-2022-1234: Apache HTTP Server Unauthenticated Remote Code Execution cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11892(CVSS UNKNOWN)

EPSS: 0.05%

updated 2025-11-11T00:30:28

2 posts

An improper neutralization of input vulnerability was identified in GitHub Enterprise Server that allows DOM-based cross-site scripting via Issues search label filter that could lead to privilege escalation and unauthorized workflow triggers. Successful exploitation requires an attacker to have access to the target GitHub Enterprise Server instance and to entice a user, while operating in sudo mod

jos1264@social.skynetcloud.site at 2025-11-11T03:30:02.000Z ##

CVE-2025-11892 - DOM-based Cross-Site Scripting was identified in GitHub Enterprise Server Issues search allows privilege escalation and unauthorized workflow triggers cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-11T01:30:03.000Z ##

CVE-2025-11892 - DOM-based Cross-Site Scripting was identified in GitHub Enterprise Server Issues search allows privilege escalation and unauthorized workflow triggers cvefeed.io/vuln/detail/CVE-202

##

CVE-2018-25124(CVSS UNKNOWN)

EPSS: 0.67%

updated 2025-11-11T00:30:28

2 posts

PacsOne Server version 6.6.2 (prior versions are likely affected) contains a directory traversal vulnerability within the web-based DICOM viewer component. Successful exploitation allows a remote unauthenticated attacker to read arbitrary files via the 'nocache.php' endpoint with a crafted 'path' parameter. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-07 UTC.

jos1264@social.skynetcloud.site at 2025-11-11T03:30:01.000Z ##

CVE-2018-25124 - PacsOne Server 6.6.2 DICOM Web Viewer Directory Traversal LFI cvefeed.io/vuln/detail/CVE-201

##

jos1264@social.skynetcloud.site at 2025-11-11T01:30:02.000Z ##

CVE-2018-25124 - PacsOne Server 6.6.2 DICOM Web Viewer Directory Traversal LFI cvefeed.io/vuln/detail/CVE-201

##

CVE-2025-63678(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-11T00:30:28

1 posts

An authenticated arbitrary file upload vulnerability in the /uploads/ endpoint of CMS Made Simple Foundation File Manager v2.2.22 allows attackers with Administrator privileges to execute arbitrary code via uploading a crafted PHP file.

jos1264@social.skynetcloud.site at 2025-11-11T01:30:03.000Z ##

CVE-2025-63678 - CMS Made Simple Foundation File Manager Remote Code Execution cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64529
(0 None)

EPSS: 0.04%

updated 2025-11-10T23:15:42.170000

1 posts

SpiceDB is an open source database system for creating and managing security-critical application permissions. In versions prior to 1.45.2, users who use the exclusion operator somewhere in their authorization schema; have configured their SpiceDB server such that `--write-relationships-max-updates-per-call` is bigger than 6500; and issue calls to WriteRelationships with a large enough number of u

jos1264@social.skynetcloud.site at 2025-11-11T01:30:03.000Z ##

CVE-2025-64529 - SpiceDB's WriteRelationships fails silently if payload is too big cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64519
(8.8 HIGH)

EPSS: 0.03%

updated 2025-11-10T23:15:41.833000

2 posts

TorrentPier is an open source BitTorrent Public/Private tracker engine, written in php. In versions up to and including 2.8.8, an authenticated SQL injection vulnerability exists in the moderator control panel (`modcp.php`). Users with moderator permissions can exploit this vulnerability by supplying a malicious `topic_id` (`t`) parameter. This allows an authenticated moderator to execute arbitrar

jos1264@social.skynetcloud.site at 2025-11-11T03:30:02.000Z ##

CVE-2025-64519 - TorrentPier is Vulnerable to Authenticated SQL Injection through Moderator Control Panel's topic_id parameter cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-11T01:30:03.000Z ##

CVE-2025-64519 - TorrentPier is Vulnerable to Authenticated SQL Injection through Moderator Control Panel's topic_id parameter cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59396
(0 None)

EPSS: 0.00%

updated 2025-11-10T23:15:41.620000

1 posts

Rejected reason: Not a security vulnerability

1 repos

https://github.com/cyberbyte000/CVE-2025-59396

beyondmachines1@infosec.exchange at 2025-11-11T10:01:32.000Z ##

WatchGuard Firebox reported having well-known default credentials, vendor says by design

CVE-2025-59396, initially reported as a critical default credential vulnerability in WatchGuard Firebox firewalls allowing SSH administrative access with "admin/readwrite" credentials on port 4118, was rejected by WatchGuard on November 10, 2025, as "Not a security vulnerability" since these are documented factory-default settings administrators are expected to change during setup.

**WatchGuard says this isn't a vulnerability but unchanged default passwords will still get you hacked. If you have WatchGuard Firebox firewalls, immediately verify that you've changed the default "admin/readwrite" and "status/readonly" SSH credentials on port 4118. These are well-known defaults that attackers can easily exploit. Make sure to restrict SSH access to standard port and to 4118 to trusted management networks only.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-11578
(0 None)

EPSS: 0.05%

updated 2025-11-10T23:15:41.193000

1 posts

A privilege escalation vulnerability was identified in GitHub Enterprise Server that allowed an authenticated Enterprise admin to gain root SSH access to the appliance by exploiting a symlink escape in pre-receive hook environments. By crafting a malicious repository and environment, an attacker could replace system binaries during hook cleanup and execute a payload that adds their own SSH key to

jos1264@social.skynetcloud.site at 2025-11-11T01:30:02.000Z ##

CVE-2025-11578 - Pre-Receive Hook Path Collision Vulnerability in GitHub Enterprise Server Allowing Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64512
(8.6 HIGH)

EPSS: 0.05%

updated 2025-11-10T22:15:40.067000

1 posts

Pdfminer.six is a community maintained fork of the original PDFMiner, a tool for extracting information from PDF documents. Prior to version 20251107, pdfminer.six will execute arbitrary code from a malicious pickle file if provided with a malicious PDF file. The `CMapDB._load_data()` function in pdfminer.six uses `pickle.loads()` to deserialize pickle files. These pickle files are supposed to be

jos1264@social.skynetcloud.site at 2025-11-10T23:25:03.000Z ##

CVE-2025-64512 - pdfminer.six vulnerable to Arbitrary Code Execution via Crafted PDF Input cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12725
(4.3 MEDIUM)

EPSS: 0.02%

updated 2025-11-10T22:15:34.740000

3 posts

Out of bounds read in WebGPU in Google Chrome on Android prior to 142.0.7444.137 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

Android@activitypub.awakari.com at 2025-11-06T14:28:41.000Z ## Google Issues Emergency Chrome 142 Update to Fix Multiple High-Risk Vulnerabilities Google has rolled out an emergency update for its Chrome browser, version 142, to address a series of serious rem...

#Firewall #Daily #Cyber #News #Vulnerabilities #Chrome #CVE-2025-12725 #CVE-2025-12726 #CVE-2025-12727 #Google #The

Origin | Interest | Match ##

Android@activitypub.awakari.com at 2025-11-06T14:28:41.000Z ## Google Issues Emergency Chrome 142 Update to Fix Multiple High-Risk Vulnerabilities Google has rolled out an emergency update for its Chrome browser, version 142, to address a series of serious rem...

#Firewall #Daily #Cyber #News #Vulnerabilities #Chrome #CVE-2025-12725 #CVE-2025-12726 #CVE-2025-12727 #Google #The

Origin | Interest | Match ##

Android@activitypub.awakari.com at 2025-11-06T14:28:41.000Z ## Google Issues Emergency Chrome 142 Update to Fix Multiple High-Risk Vulnerabilities Google has rolled out an emergency update for its Chrome browser, version 142, to address a series of serious rem...

#Firewall #Daily #Cyber #News #Vulnerabilities #Chrome #CVE-2025-12725 #CVE-2025-12726 #CVE-2025-12727 #Google #The

Origin | Interest | Match ##

CVE-2025-64522
(9.1 CRITICAL)

EPSS: 0.04%

updated 2025-11-10T22:10:18

2 posts

SUMMARY We have identified and verified an SSRF vulnerability where webhook URLs are not validated, allowing repository administrators to create webhooks targeting internal services, private networks, and cloud metadata endpoints. AFFECTED COMPONENTS (VERIFIED) 1. Webhook Creation (pkg/ssh/cmd/webhooks.go:125) 2. Backend CreateWebhook (pkg/backend/webhooks.go:17) 3. Backend UpdateWebhook (pkg/

jos1264@social.skynetcloud.site at 2025-11-11T03:30:03.000Z ##

CVE-2025-64522 - Soft Serve is vulnerable to SSRF through its Webhooks cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-11T01:30:03.000Z ##

CVE-2025-64522 - Soft Serve is vulnerable to SSRF through its Webhooks cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12779
(8.8 HIGH)

EPSS: 0.02%

updated 2025-11-10T21:31:37

3 posts

Improper handling of the authentication token in the Amazon WorkSpaces client for Linux, versions 2023.0 through 2024.8, may expose the authentication token for DCV-based WorkSpaces to other local users on the same client machine. Under certain circumstances, a local user may be able to extract another local user's authentication token from the shared client machine and access their WorkSpace. To

linux@activitypub.awakari.com at 2025-11-07T13:37:44.000Z ## Critical CVE-2025-12779 Vulnerability Exposes Amazon WorkSpaces for Linux Users to Token Theft A newly disclosed security flaw in the Amazon WorkSpaces client for Linux has raised serious concer...

#Firewall #Daily #Cyber #News #Vulnerabilities #Amazon #AWS #CVE-2025-12779 #The #Cyber #Express

Origin | Interest | Match ##

linux@activitypub.awakari.com at 2025-11-07T13:37:44.000Z ## Critical CVE-2025-12779 Vulnerability Exposes Amazon WorkSpaces for Linux Users to Token Theft A newly disclosed security flaw in the Amazon WorkSpaces client for Linux has raised serious concer...

#Firewall #Daily #Cyber #News #Vulnerabilities #Amazon #AWS #CVE-2025-12779 #The #Cyber #Express

Origin | Interest | Match ##

linux@activitypub.awakari.com at 2025-11-07T13:37:44.000Z ## Critical CVE-2025-12779 Vulnerability Exposes Amazon WorkSpaces for Linux Users to Token Theft A newly disclosed security flaw in the Amazon WorkSpaces client for Linux has raised serious concer...

#Firewall #Daily #Cyber #News #Vulnerabilities #Amazon #AWS #CVE-2025-12779 #The #Cyber #Express

Origin | Interest | Match ##

CVE-2025-12727(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-11-10T21:30:42

3 posts

Inappropriate implementation in V8 in Google Chrome prior to 142.0.7444.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Android@activitypub.awakari.com at 2025-11-06T14:28:41.000Z ## Google Issues Emergency Chrome 142 Update to Fix Multiple High-Risk Vulnerabilities Google has rolled out an emergency update for its Chrome browser, version 142, to address a series of serious rem...

#Firewall #Daily #Cyber #News #Vulnerabilities #Chrome #CVE-2025-12725 #CVE-2025-12726 #CVE-2025-12727 #Google #The

Origin | Interest | Match ##

Android@activitypub.awakari.com at 2025-11-06T14:28:41.000Z ## Google Issues Emergency Chrome 142 Update to Fix Multiple High-Risk Vulnerabilities Google has rolled out an emergency update for its Chrome browser, version 142, to address a series of serious rem...

#Firewall #Daily #Cyber #News #Vulnerabilities #Chrome #CVE-2025-12725 #CVE-2025-12726 #CVE-2025-12727 #Google #The

Origin | Interest | Match ##

Android@activitypub.awakari.com at 2025-11-06T14:28:41.000Z ## Google Issues Emergency Chrome 142 Update to Fix Multiple High-Risk Vulnerabilities Google has rolled out an emergency update for its Chrome browser, version 142, to address a series of serious rem...

#Firewall #Daily #Cyber #News #Vulnerabilities #Chrome #CVE-2025-12725 #CVE-2025-12726 #CVE-2025-12727 #Google #The

Origin | Interest | Match ##

CVE-2025-12432
(8.8 HIGH)

EPSS: 0.06%

updated 2025-11-10T21:30:42

1 posts

Race in V8 in Google Chrome prior to 142.0.7444.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

jos1264@social.skynetcloud.site at 2025-11-10T23:25:02.000Z ##

CVE-2025-12432 - Google Chrome V8 Race Condition Heap Corruption Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-63149(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-10T21:30:42

1 posts

Tenda AX3 V16.03.12.10_CN was discovered to contain a stack overflow in the urls parameter of the get_parentControl_list_Info function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

jos1264@social.skynetcloud.site at 2025-11-10T22:20:02.000Z ##

CVE-2025-63149 - Tenda AX3 Stack Overflow Denial of Service (DoS) Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-63384(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-10T21:30:42

1 posts

A vulnerability was discovered in RISC-V Rocket-Chip v1.6 and before implementation where the SRET (Supervisor-mode Exception Return) instruction fails to correctly transition the processor's privilege level. Instead of downgrading from Machine-mode (M-mode) to Supervisor-mode (S-mode) as specified by the sstatus.SPP bit, the processor incorrectly remains in M-mode, leading to a critical privilege

jos1264@social.skynetcloud.site at 2025-11-10T22:20:02.000Z ##

CVE-2025-63384 - RISC-V Rocket-Chip Privilege Retention Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12729
(4.2 MEDIUM)

EPSS: 0.03%

updated 2025-11-10T21:30:42

1 posts

Inappropriate implementation in Omnibox in Google Chrome on Android prior to 142.0.7444.137 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)

jos1264@social.skynetcloud.site at 2025-11-10T22:20:01.000Z ##

CVE-2025-12729 - Google Chrome Android Omnibox UI Spoofing cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12726
(7.5 HIGH)

EPSS: 0.07%

updated 2025-11-10T21:30:36

3 posts

Inappropriate implementation in Views in Google Chrome on Windows prior to 142.0.7444.137 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severity: High)

Android@activitypub.awakari.com at 2025-11-06T14:28:41.000Z ## Google Issues Emergency Chrome 142 Update to Fix Multiple High-Risk Vulnerabilities Google has rolled out an emergency update for its Chrome browser, version 142, to address a series of serious rem...

#Firewall #Daily #Cyber #News #Vulnerabilities #Chrome #CVE-2025-12725 #CVE-2025-12726 #CVE-2025-12727 #Google #The

Origin | Interest | Match ##

Android@activitypub.awakari.com at 2025-11-06T14:28:41.000Z ## Google Issues Emergency Chrome 142 Update to Fix Multiple High-Risk Vulnerabilities Google has rolled out an emergency update for its Chrome browser, version 142, to address a series of serious rem...

#Firewall #Daily #Cyber #News #Vulnerabilities #Chrome #CVE-2025-12725 #CVE-2025-12726 #CVE-2025-12727 #Google #The

Origin | Interest | Match ##

Android@activitypub.awakari.com at 2025-11-06T14:28:41.000Z ## Google Issues Emergency Chrome 142 Update to Fix Multiple High-Risk Vulnerabilities Google has rolled out an emergency update for its Chrome browser, version 142, to address a series of serious rem...

#Firewall #Daily #Cyber #News #Vulnerabilities #Chrome #CVE-2025-12725 #CVE-2025-12726 #CVE-2025-12727 #Google #The

Origin | Interest | Match ##

CVE-2025-60876(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-10T21:30:36

1 posts

BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).

CVE-2025-33150
(5.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-10T21:30:36

1 posts

IBM Cognos Analytics Certified Containers 12.1.0 could disclose package parameter information due to the presence of hidden pages.

jos1264@social.skynetcloud.site at 2025-11-10T22:20:01.000Z ##

CVE-2025-33150 - IBM Cognos Analytics Certified Containers information disclosure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-63455
(7.5 HIGH)

EPSS: 0.04%

updated 2025-11-10T21:30:35

1 posts

Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow via the shareSpeed parameter in the fromSetWifiGusetBasic function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

jos1264@social.skynetcloud.site at 2025-11-10T18:30:02.000Z ##

CVE-2025-63455 - Tenda AX-3 Stack Overflow Denial of Service Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-48878
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-10T21:15:39.263000

1 posts

Combodo iTop is a web based IT service management tool. In versions on the 3.x branch prior to 3.2.2, an insecure direct object reference allows a user (e.g. with Service desk agent profile) to create a ModuleInstallation object when they shouldn't be able to do so. Version 3.2.2 fixes the issue.

jos1264@social.skynetcloud.site at 2025-11-10T22:20:03.000Z ##

CVE-2025-48878 - Combodo iTop vulnerable to IDOR with ModuleInstallation object cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-48065
(8.8 HIGH)

EPSS: 0.04%

updated 2025-11-10T21:15:39.103000

2 posts

Combodo iTop is a web based IT service management tool. Versions prior to 2.7.13 and 3.2.2 are vulnerable to cross-site scripting when a field with an error contains malicious content. Versions 2.7.13 and 3.2.2 protect rendered HTML content.

jos1264@social.skynetcloud.site at 2025-11-10T23:25:03.000Z ##

CVE-2025-48065 - Combodo iTop vulnerable to reflected XSS via objection edition form error cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-10T22:20:02.000Z ##

CVE-2025-48065 - Combodo iTop vulnerable to reflected XSS via objection edition form error cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12438
(8.8 HIGH)

EPSS: 0.07%

updated 2025-11-10T21:15:37.527000

1 posts

Use after free in Ozone in Google Chrome on Linux and ChromeOS prior to 142.0.7444.59 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: Medium)

jos1264@social.skynetcloud.site at 2025-11-10T23:25:02.000Z ##

CVE-2025-12438 - Ozone Use-After-Free Vulnerability in Google Chrome cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64518
(7.5 HIGH)

EPSS: 0.05%

updated 2025-11-10T21:04:04

1 posts

### Impact The XML [`Validator`](https://docs.oracle.com/javase/8/docs/api/javax/xml/validation/Validator.html) used by cyclonedx-core-java was not configured securely, making the library vulnerable to XML External Entity (XXE) injection. The fix for GHSA-683x-4444-jxh8 / CVE-2024-38374 has been incomplete in that it only fixed *parsing* of XML BOMs, but not *validation*. ### Patches The vulne

jos1264@social.skynetcloud.site at 2025-11-11T01:30:02.000Z ##

CVE-2025-64518 - CycloneDX Core (Java): BOM validation is vulnerable to XML External Entity injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-56503
(0 None)

EPSS: 0.02%

updated 2025-11-10T20:15:47.990000

1 posts

An issue in Sublime HQ Pty Ltd Sublime Text 4 4200 allows authenticated attackers with low-level privileges to escalate privileges to Administrator via replacing the uninstall file with a crafted binary in the installation folder.

1 repos

https://github.com/secxplorers/CVE-2025-56503

jos1264@social.skynetcloud.site at 2025-11-10T22:20:01.000Z ##

CVE-2025-56503 - Sublime Text Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12967
(8.0 HIGH)

EPSS: 0.10%

updated 2025-11-10T19:15:56.320000

1 posts

An issue in AWS Wrappers for Amazon Aurora PostgreSQL may allow for privilege escalation to rds_superuser role. A low privilege authenticated user can create a crafted function that could be executed with permissions of other Amazon Relational Database Service (RDS) users. We recommend customers upgrade to the following versions: AWS JDBC Wrapper to v2.6.5, AWS Go Wrapper to 2025-10-17, AWS NodeJ

jos1264@social.skynetcloud.site at 2025-11-10T21:05:02.000Z ##

CVE-2025-12967 - AWS Wrappers for Amazon Aurora PostgreSQL Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12735(CVSS UNKNOWN)

EPSS: 0.12%

updated 2025-11-10T19:06:04

1 posts

The expr-eval library is a JavaScript expression parser and evaluator designed to safely evaluate mathematical expressions with user-defined variables. However, due to insufficient input validation, an attacker can pass a crafted variables object into the evaluate() function and trigger arbitrary code execution.

beyondmachines1@infosec.exchange at 2025-11-11T11:01:31.000Z ##

Critical arbitrary code execution flaw reported in JavaScript expression parser expr-eval

A critical vulnerability (CVE-2025-12735) in the widely used expr-eval JavaScript library allows attackers to execute arbitrary code through insufficient input validation, affecting numerous dependent packages including AI frameworks. The original library appears unmaintained, but a security fix is available in the actively maintained expr-eval-fork version 3.0.0.

**If you use the expr-eval JavaScript library (or have dependencies that use it), be aware that uncontrolled user input can exploit a flaw and run arbitrary code. Sanitize user input as much as possible and plan a very quick switch to the actively maintained expr-eval-fork version 3.0.0 since the original package is not updated and still vulnerable to remote code execution. This is urgent if your application processes user-supplied mathematical expressions in calculators, educational tools, financial platforms, or AI systems like LangChain implementations.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-63835(CVSS UNKNOWN)

EPSS: 0.07%

updated 2025-11-10T18:30:40

1 posts

A stack-based buffer overflow vulnerability was discovered in Tenda AC18 v15.03.05.05_multi. The vulnerability exists in the guestSsid parameter of the /goform/WifiGuestSet interface. Remote attackers can exploit this vulnerability by sending oversized data to the guestSsid parameter, leading to denial of service (device crash) or potential remote code execution.

jos1264@social.skynetcloud.site at 2025-11-10T18:30:03.000Z ##

CVE-2025-63835 - Tenda AC18 Stack-Based Buffer Overflow Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-63834(CVSS UNKNOWN)

EPSS: 0.08%

updated 2025-11-10T18:30:40

1 posts

A stored cross-site scripting (XSS) vulnerability was discovered in Tenda AC18 v15.03.05.05_multi. The vulnerability exists in the ssid parameter of the wireless settings. Remote attackers can inject malicious payloads that execute when any user visits the router's homepage.

CVE-2025-63497(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-11-10T18:30:35

1 posts

The patient prescription viewing functionality in his_doc_view_single_patient.php of rickxy Hospital Management System version 1.0 contains an SQL injection vulnerability. The pat_number GET parameter is directly concatenated into SQL queries without proper sanitization, allowing authenticated attackers (doctor role) to execute arbitrary SQL queries.

jos1264@social.skynetcloud.site at 2025-11-10T18:30:03.000Z ##

CVE-2025-63497 - Rickxy Hospital Management System SQL Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-63456(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-10T18:30:35

1 posts

Tenda AX-1803 v1.0.0.1 was discovered to contain a stack overflow via the time parameter in the SetSysTimeCfg function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

jos1264@social.skynetcloud.site at 2025-11-10T18:30:02.000Z ##

CVE-2025-63456 - Tenda AX-1803 Stack Overflow Denial of Service cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-63147(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-10T18:30:34

1 posts

Tenda AX3 V16.03.12.10_CN was discovered to contain a stack overflow in the deviceId parameter of the saveParentControlInfo function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

jos1264@social.skynetcloud.site at 2025-11-10T18:30:02.000Z ##

CVE-2025-63147 - Tenda AX3 Stack Overflow Denial of Service Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-63154(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-10T18:30:34

1 posts

TOTOLink A7000R V9.1.0u.6115_B20201022 was discovered to contain a stack overflow in the addEffect parameter of the urldecode function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.

jos1264@social.skynetcloud.site at 2025-11-10T18:30:02.000Z ##

CVE-2025-63154 - TOTOLink A7000R Stack Overflow Denial of Service cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12907
(8.8 HIGH)

EPSS: 0.08%

updated 2025-11-10T18:30:34

1 posts

Insufficient validation of untrusted input in Devtools in Google Chrome prior to 140.0.7339.80 allowed a remote attacker to execute arbitrary code via user action in Devtools. (Chromium security severity: Low)

1 repos

https://github.com/DExplo1ted/CVE-2025-12907-Exploit

jos1264@social.skynetcloud.site at 2025-11-10T17:10:01.000Z ##

CVE-2025-12907 - "Google Chrome Devtools Code Execution Vulnerability" cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-63457
(0 None)

EPSS: 0.02%

updated 2025-11-10T17:15:35.100000

1 posts

Tenda AX-1803 v1.0.0.1 was discovered to contain a stack overflow via the wanMTU parameter in the sub_4F55C function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.

jos1264@social.skynetcloud.site at 2025-11-10T18:30:02.000Z ##

CVE-2025-63457 - Tenda AX-1803 v1.0.0.1 was discovered to contain a cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12480
(9.1 CRITICAL)

EPSS: 0.03%

updated 2025-11-10T16:15:43.237000

8 posts

Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.

Nuclei template

defendopsdiaries at 2025-11-11T20:14:34.760Z ##

undefined

thedefendopsdiaries.com/triofo

##

AAKL@infosec.exchange at 2025-11-11T15:46:39.000Z ##

Mandiant, from yesterday: No Place Like Localhost: Unauthenticated Remote Access via Triofox Vulnerability CVE-2025-12480 cloud.google.com/blog/topics/t #infosec #Google #threatintel #threatintelligence

##

jos1264@social.skynetcloud.site at 2025-11-11T12:55:01.000Z ##

Attackers exploited another Gladinet Triofox zero-day (CVE-2025-12480) helpnetsecurity.com/2025/11/11 #file-sharing #remoteaccess #Don'tmiss #Hotstuff #Gladinet #Mandiant #0-day #News

##

technadu@infosec.exchange at 2025-11-11T12:13:18.000Z ##

Triofox flaw (CVE-2025-12480) exploited in the wild - threat actors abuse built-in AV scanning to trigger RCE & install AnyDesk/Zoho tools.
technadu.com/triofox-unauthent

#CyberSecurity #Vulnerability #RCE

##

beyondmachines1@infosec.exchange at 2025-11-11T09:01:31.000Z ##

Critical Triofox authentication bypass flaw actively exploited

Google Mandiant reports active exploitation of CVE-2025-12480, a critical authentication bypass vulnerability in Gladinet Triofox file-sharing platform that allows attackers to create administrative accounts and achieve SYSTEM-level code execution by manipulating the Host header and abusing the antivirus integration feature.

**If you use Gladinet Triofox file-sharing platform, be aware that it's being hacked. And you can't hide it from the internet since it's designed to be visible on the web. Update immediately to version 16.7.10368.56560, check for any suspicious admin accounts (especially ones named "Cluster Admin") and verify your antivirus configuration hasn't been modified to point to unauthorized scripts.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

Mozilla@activitypub.awakari.com at 2025-11-10T14:00:00.000Z ## No Place Like Localhost: Unauthenticated Remote Access via Triofox Vulnerability CVE-2025-12480 Written by: Stallone D'Souza, Praveeth DSouza, Bill Glynn, Kevin O'Flynn, Yash Gupta Welcome ...

#Threat #Intelligence

Origin | Interest | Match ##

jos1264@social.skynetcloud.site at 2025-11-10T17:10:02.000Z ##

CVE-2025-12480 - Triofox Improper Access Control cvefeed.io/vuln/detail/CVE-202

##

PostgreSQL@activitypub.awakari.com at 2025-11-10T16:36:08.000Z ## No Place Like Localhost: Unauthenticated Remote Access via Triofox Vulnerability CVE-2025-12480 Written by: Stallone D'Souza, Praveeth DSouza, Bill Glynn, Kevin O'Flynn, Yash Gupta Introduc...

#Malware #News

Origin | Interest | Match ##

CVE-2025-64456
(8.4 HIGH)

EPSS: 0.00%

updated 2025-11-10T15:31:11

2 posts

In JetBrains ReSharper before 2025.2.4 missing signature verification in DPA Collector allows local privilege escalation

jos1264@social.skynetcloud.site at 2025-11-10T17:10:01.000Z ##

CVE-2025-64456 - JetBrains ReSharper DPA Collector Unverified Signature Escalation cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-10T15:55:03.000Z ##

CVE-2025-64456 - JetBrains ReSharper DPA Collector Unverified Signature Escalation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64690
(5.4 MEDIUM)

EPSS: 0.00%

updated 2025-11-10T15:31:11

1 posts

In JetBrains YouTrack before 2025.3.104432 insecure Junie configuration could lead to data exposure and unauthorized changes

jos1264@social.skynetcloud.site at 2025-11-10T15:55:03.000Z ##

CVE-2025-64690 - JetBrains YouTrack Junie Configuration Insecure Access Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64687
(5.4 MEDIUM)

EPSS: 0.00%

updated 2025-11-10T15:31:11

1 posts

In JetBrains YouTrack before 2025.3.104432 improper access control allowed modify MCP tool logic

jos1264@social.skynetcloud.site at 2025-11-10T15:55:02.000Z ##

CVE-2025-64687 - JetBrains YouTrack Unauthenticated Modify MCP Tool Logic Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64688
(7.4 HIGH)

EPSS: 0.00%

updated 2025-11-10T15:31:06

1 posts

In JetBrains YouTrack before 2025.3.104432 missing VCS URL validation allowed delegation to unauthorized repositories from the Junie widget

jos1264@social.skynetcloud.site at 2025-11-10T15:55:03.000Z ##

CVE-2025-64688 - JetBrains YouTrack Unvalidated VCS URL Delegation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64689
(9.6 CRITICAL)

EPSS: 0.00%

updated 2025-11-10T15:31:05

2 posts

In JetBrains YouTrack before 2025.3.104432 misconfiguration in the Junie could lead to exposure of the global Junie token

CVE-2025-64684
(4.3 MEDIUM)

EPSS: 0.00%

updated 2025-11-10T15:31:05

1 posts

In JetBrains YouTrack before 2025.3.104432 information disclosure was possible via the feedback form

jos1264@social.skynetcloud.site at 2025-11-10T15:55:02.000Z ##

CVE-2025-64684 - JetBrains YouTrack Information Disclosure Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64683
(5.3 MEDIUM)

EPSS: 0.00%

updated 2025-11-10T15:31:05

1 posts

In JetBrains Hub before 2025.3.104432 information disclosure was possible via the Users API

jos1264@social.skynetcloud.site at 2025-11-10T15:55:02.000Z ##

CVE-2025-64683 - JetBrains Hub Unauthenticated Information Disclosure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12929
(7.3 HIGH)

EPSS: 0.03%

updated 2025-11-10T15:15:36.903000

1 posts

A flaw has been found in SourceCodester Survey Application System 1.0. This impacts the function save_user/update_user of the file /LoginRegistration.php. Executing manipulation of the argument fullname can lead to sql injection. The attack may be performed from remote. The exploit has been published and may be used. Other parameters might be affected as well.

jos1264@social.skynetcloud.site at 2025-11-10T06:20:02.000Z ##

CVE-2025-12929 - SourceCodester Survey Application System LoginRegistration.php update_user sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64686
(3.1 LOW)

EPSS: 0.00%

updated 2025-11-10T14:15:44.223000

1 posts

In JetBrains YouTrack before 2025.3.104432 missing user principal cleanup led to reuse of incorrect authorization context

jos1264@social.skynetcloud.site at 2025-11-10T15:55:02.000Z ##

CVE-2025-64686 - In JetBrains YouTrack before 2025.3.104432 missing cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64685
(8.1 HIGH)

EPSS: 0.00%

updated 2025-11-10T14:15:44.070000

2 posts

In JetBrains YouTrack before 2025.3.104432 missing TLS certificate validation enabled data disclosure

jos1264@social.skynetcloud.site at 2025-11-10T17:10:01.000Z ##

CVE-2025-64685 - In JetBrains YouTrack before 2025.3.104432 missing cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-10T15:55:02.000Z ##

CVE-2025-64685 - In JetBrains YouTrack before 2025.3.104432 missing cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12405(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-11-10T12:30:29

1 posts

An improper privilege management vulnerability was found in Looker Studio. It impacted all JDBC-based connectors. A Looker Studio user with report view access could make a copy of the report and execute arbitrary SQL that would run on the data source database due to the stored credentials attached to the report. This vulnerability was patched on 21 July 2025, and no customer action is needed.

jos1264@social.skynetcloud.site at 2025-11-10T12:10:02.000Z ##

CVE-2025-12405 - Unauthorized access through stored credentials in Looker Studio cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-41001(CVSS UNKNOWN)

EPSS: 0.16%

updated 2025-11-10T12:30:26

1 posts

Cross Site Scripting (XSS) vulnerability stored in SOPlanning v1.53.02, which consist of a stored XSS due to a lack of proper validation of user input by sending a POST request using the 'LOGOUT_REDIRECT' parameter in '/soplanning/www/process/options.php'. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal their cookie session details.

CVE-2025-12397(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-11-10T09:30:28

1 posts

A SQL injection vulnerability was found in Looker Studio. A Looker Studio user with report view access could inject malicious SQL that would execute with the report owner's permissions. The vulnerability affected to reports with BigQuery as the data source. This vulnerability was patched on 21 July 2025, and no customer action is needed.

CVE-2025-12155(CVSS UNKNOWN)

EPSS: 0.38%

updated 2025-11-10T09:30:28

1 posts

A Command Injection vulnerability, resulting from improper file path sanitization (Directory Traversal) in Looker allows an attacker with Developer permission to execute arbitrary shell commands when a user is deleted on the host system. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for thes

CVE-2025-41731
(7.4 HIGH)

EPSS: 0.01%

updated 2025-11-10T09:30:28

1 posts

A vulnerability was identified in the password generation algorithm when accessing the debug-interface. An unauthenticated local attacker with knowledge of the password generation timeframe might be able to brute force the password in a timely manner and thus gain root access to the device if the debug interface is still enabled.

jos1264@social.skynetcloud.site at 2025-11-10T09:45:02.000Z ##

CVE-2025-41731 - Jumo: Insufficient entropy in PRNG may lead to root access cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-41107
(0 None)

EPSS: 0.16%

updated 2025-11-10T09:15:42.270000

1 posts

Stored Cross Site Scripting (XSS) vulnerability in Smart School 7.0 due to lack of proper validation of user input when sending a POST request to '/online_admission', wich affects the parameters 'firstname', 'lastname', 'guardian_name' and others. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal his/her session cookie details.

CVE-2025-12409
(0 None)

EPSS: 0.03%

updated 2025-11-10T09:15:42.107000

1 posts

A SQL injection vulnerability was discovered in Looker Studio that allowed for data exfiltration from BigQuery data sources. By creating a malicious report with native functions enabled, and having the victim access the report, an attacker could execute injected SQL queries with the victim's permissions in BigQuery. This vulnerability was patched on 07 July 2025, and no customer action is neede

CVE-2025-62689
(7.5 HIGH)

EPSS: 0.03%

updated 2025-11-10T06:30:31

2 posts

NULL pointer dereference vulnerability exists in GNU libmicrohttpd v1.0.2 and earlier. The vulnerability was fixed in commit ff13abc on the master branch of the libmicrohttpd Git repository, after the v1.0.2 tag. A specially crafted packet sent by an attacker could cause a denial-of-service (DoS) condition.

jos1264@social.skynetcloud.site at 2025-11-10T06:25:02.000Z ##

CVE-2025-62689 - "GNU libmicrohttpd NULL Pointer Dereference DoS" cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-10T06:20:03.000Z ##

CVE-2025-62689 - "GNU libmicrohttpd NULL Pointer Dereference DoS" cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59777
(7.5 HIGH)

EPSS: 0.03%

updated 2025-11-10T06:30:31

2 posts

NULL pointer dereference vulnerability exists in GNU libmicrohttpd v1.0.2 and earlier. The vulnerability was fixed in commit ff13abc on the master branch of the libmicrohttpd Git repository, after the v1.0.2 tag. A specially crafted packet sent by an attacker could cause a denial-of-service (DoS) condition.

jos1264@social.skynetcloud.site at 2025-11-10T06:25:02.000Z ##

CVE-2025-59777 - GNU libmicrohttpd NULL Pointer Dereference Denial of Service cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-10T06:20:02.000Z ##

CVE-2025-59777 - GNU libmicrohttpd NULL Pointer Dereference Denial of Service cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12931
(6.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-10T06:30:31

1 posts

A vulnerability was found in SourceCodester Food Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file /routers/edit-orders.php. The manipulation of the argument ID results in sql injection. It is possible to launch the attack remotely. The exploit has been made public and could be used.

jos1264@social.skynetcloud.site at 2025-11-10T06:20:02.000Z ##

CVE-2025-12931 - SourceCodester Food Ordering System edit-orders.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12932
(4.7 MEDIUM)

EPSS: 0.03%

updated 2025-11-10T06:30:31

1 posts

A vulnerability was determined in SourceCodester Baby Care System 1.0. Affected by this issue is some unknown functionality of the file /admin.php?id=inbox. This manipulation of the argument msgid causes sql injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.

jos1264@social.skynetcloud.site at 2025-11-10T06:20:02.000Z ##

CVE-2025-12932 - SourceCodester Baby Care System admin.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12930
(6.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-10T06:30:31

1 posts

A vulnerability has been found in SourceCodester Food Ordering System 1.0. Affected is an unknown function of the file /view-ticket.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

jos1264@social.skynetcloud.site at 2025-11-10T06:20:02.000Z ##

CVE-2025-12930 - SourceCodester Food Ordering System view-ticket.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12928
(7.3 HIGH)

EPSS: 0.03%

updated 2025-11-10T06:30:26

1 posts

A vulnerability was detected in code-projects Online Job Search Engine 1.0. This affects an unknown function of the file /login.php. Performing manipulation of the argument username/phone results in sql injection. The attack is possible to be carried out remotely. The exploit is now public and may be used.

jos1264@social.skynetcloud.site at 2025-11-10T06:20:01.000Z ##

CVE-2025-12928 - code-projects Online Job Search Engine login.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12868
(9.8 CRITICAL)

EPSS: 0.20%

updated 2025-11-10T06:30:25

2 posts

New Site Server developed by CyberTutor has a Use of Client-Side Authentication vulnerability, allowing unauthenticated remote attackers to modify the frontend code to gain administrator privileges on the website.

jos1264@social.skynetcloud.site at 2025-11-10T06:25:02.000Z ##

CVE-2025-12868 - CyberTutor|New Site Server - Use of Client-Side Authentication cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-10T06:20:01.000Z ##

CVE-2025-12868 - CyberTutor|New Site Server - Use of Client-Side Authentication cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12867
(7.2 HIGH)

EPSS: 0.21%

updated 2025-11-10T06:30:25

1 posts

EIP Plus developed by Hundred Plus has an Arbitrary File Uplaod vulnerability, allowing privileged remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.

jos1264@social.skynetcloud.site at 2025-11-10T06:20:01.000Z ##

CVE-2025-12867 - Hundred Plus|EIP Plus - Arbitrary File Uplaod cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12933
(6.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-10T06:15:34.133000

1 posts

A vulnerability was identified in SourceCodester Baby Care System 1.0. This affects an unknown part of the file /updatewelcome.php?id=siteoptions&action=welcome. Such manipulation of the argument roleid leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.

jos1264@social.skynetcloud.site at 2025-11-10T09:45:01.000Z ##

CVE-2025-12933 - SourceCodester Baby Care System updatewelcome.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12613
(8.6 HIGH)

EPSS: 0.05%

updated 2025-11-10T05:15:42.900000

2 posts

Versions of the package cloudinary before 2.7.0 are vulnerable to Arbitrary Argument Injection due to improper parsing of parameter values containing an ampersand. An attacker can inject additional, unintended parameters. This could lead to a variety of malicious outcomes, such as bypassing security checks, altering data, or manipulating the application's behavior. **Note:** Following our establi

jos1264@social.skynetcloud.site at 2025-11-10T06:25:02.000Z ##

CVE-2025-12613 - Cloudinary Arbitrary Argument Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-10T06:20:02.000Z ##

CVE-2025-12613 - Cloudinary Arbitrary Argument Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12866
(9.8 CRITICAL)

EPSS: 0.08%

updated 2025-11-10T03:30:23

1 posts

EIP Plus developed by Hundred Plus has a Weak Password Recovery Mechanism vulnerability, allowing unauthenticated remote attacker to predict or brute-force the 'forgot password' link, thereby successfully resetting any user's password.

jos1264@social.skynetcloud.site at 2025-11-10T06:25:02.000Z ##

CVE-2025-12866 - Hundred Plus|EIP Plus - Weak Password Recovery Mechanism cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12865
(8.8 HIGH)

EPSS: 0.08%

updated 2025-11-10T03:30:23

1 posts

U-Office Force developed by e-Excellence has a SQL Injection vulnerability, allowing authenticated remote attacker to inject arbitrary SQL commands to read, modify, and delete database contents.

jos1264@social.skynetcloud.site at 2025-11-10T06:25:01.000Z ##

CVE-2025-12865 - e-Excellence|U-Office Force - SQL Injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12925
(7.3 HIGH)

EPSS: 0.04%

updated 2025-11-10T03:30:23

1 posts

A security flaw has been discovered in rymcu forest up to de53ce79db9faa2efc4e79ce1077a302c42a1224. Impacted is the function getAll/addDic/getAllDic/deleteDic of the file src/main/java/com/rymcu/forest/lucene/api/UserDicController.java. The manipulation results in missing authorization. The attack may be launched remotely. This product operates on a rolling release basis, ensuring continuous deliv

jos1264@social.skynetcloud.site at 2025-11-10T02:15:03.000Z ##

CVE-2025-12925 - rymcu forest UserDicController.java deleteDic authorization cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12924
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-10T03:30:23

1 posts

A vulnerability was identified in rymcu forest up to de53ce79db9faa2efc4e79ce1077a302c42a1224. This issue affects the function GlobalResult of the file src/main/java/com/rymcu/forest/web/api/bank/BankController.java. The manipulation leads to missing authorization. The attack may be initiated remotely. This product uses a rolling release model to deliver continuous updates. As a result, specific v

jos1264@social.skynetcloud.site at 2025-11-10T02:15:02.000Z ##

CVE-2025-12924 - rymcu forest BankController.java GlobalResult authorization cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12922
(6.3 MEDIUM)

EPSS: 0.05%

updated 2025-11-10T03:30:22

1 posts

A vulnerability was found in OpenClinica Community Edition up to 3.12.2/3.13. This affects an unknown part of the file /ImportCRFData?action=confirm of the component CRF Data Import. Performing manipulation of the argument xml_file results in path traversal. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosur

jos1264@social.skynetcloud.site at 2025-11-10T02:15:02.000Z ##

CVE-2025-12922 - OpenClinica Community Edition CRF Data Import ImportCRFData path traversal cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12864
(8.8 HIGH)

EPSS: 0.08%

updated 2025-11-10T03:15:42.017000

1 posts

U-Office Force developed by e-Excellence has a SQL Injection vulnerability, allowing authenticated remote attacker to inject arbitrary SQL commands to read, modify, and delete database contents.

jos1264@social.skynetcloud.site at 2025-11-10T06:25:01.000Z ##

CVE-2025-12864 - e-Excellence|U-Office Force - SQL Injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12923
(2.7 LOW)

EPSS: 0.04%

updated 2025-11-10T01:15:37.860000

1 posts

A vulnerability was determined in liweiyi ChestnutCMS up to 1.5.8. This vulnerability affects the function resourceDownload of the file /dev-api/common/download. Executing manipulation of the argument path can lead to path traversal. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

jos1264@social.skynetcloud.site at 2025-11-10T02:15:03.000Z ##

CVE-2025-12923 - liweiyi ChestnutCMS download resourceDownload path traversal cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12920
(2.4 LOW)

EPSS: 0.03%

updated 2025-11-10T00:30:32

1 posts

A flaw has been found in qianfox FoxCMS up to 1.2.16. Affected by this vulnerability is the function add/edit of the file app/admin/controller/Product.php. This manipulation of the argument Title causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any

jos1264@social.skynetcloud.site at 2025-11-10T02:15:02.000Z ##

CVE-2025-12920 - qianfox FoxCMS Product.php edit cross site scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12921
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-10T00:15:44.943000

1 posts

A vulnerability has been found in OpenClinica Community Edition up to 3.12.2/3.13. Affected by this issue is some unknown functionality of the file /ImportCRFData?action=confirm of the component CRF Data Import. Such manipulation of the argument xml_file leads to xml injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor wa

jos1264@social.skynetcloud.site at 2025-11-10T02:15:02.000Z ##

CVE-2025-12921 - OpenClinica Community Edition CRF Data Import ImportCRFData xml injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12919
(3.7 LOW)

EPSS: 0.03%

updated 2025-11-09T21:30:24

1 posts

A vulnerability was detected in EverShop up to 2.0.1. Affected is an unknown function of the file /src/modules/oms/graphql/types/Order/Order.resolvers.js of the component Order Handler. The manipulation of the argument uuid results in improper control of resource identifiers. The attack may be performed from remote. This attack is characterized by high complexity. The exploitability is told to be

jos1264@social.skynetcloud.site at 2025-11-10T00:10:01.000Z ##

CVE-2025-12919 - EverShop Order Order.resolvers.js resource injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12918
(3.1 LOW)

EPSS: 0.03%

updated 2025-11-09T09:30:16

1 posts

A security flaw has been discovered in yungifez Skuul School Management System up to 2.6.5. The impacted element is an unknown function of the file /dashboard/fees/fee-invoices/ of the component View Fee Invoice. Performing manipulation of the argument invoice_id results in improper control of resource identifiers. Remote exploitation of the attack is possible. The attack is considered to have hig

jos1264@social.skynetcloud.site at 2025-11-09T09:20:02.000Z ##

CVE-2025-12918 - yungifez Skuul School Management System View Fee Invoice fee-invoices resource injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12917
(4.3 MEDIUM)

EPSS: 0.01%

updated 2025-11-09T09:30:16

1 posts

A vulnerability was identified in TOZED ZLT T10 T10PLUS_3.04.15. The affected element is an unknown function of the file /reqproc/proc_post of the component Reboot Handler. Such manipulation leads to denial of service. Access to the local network is required for this attack to succeed. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did

1 repos

https://github.com/0xcucumbersalad/CVE-2025-12917-PoC

jos1264@social.skynetcloud.site at 2025-11-09T09:20:01.000Z ##

CVE-2025-12917 - TOZED ZLT T10 Reboot proc_post denial of service cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-9458
(7.8 HIGH)

EPSS: 0.01%

updated 2025-11-07T18:15:37.647000

2 posts

A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

AAKL at 2025-11-11T16:02:59.032Z ##

If you missed this, Trend Micro updated three advisories yesterday:

CVE-2025-9458: Autodesk AutoCAD PRT File Parsing Memory Corruption Remote Code Execution Vulnerability zerodayinitiative.com/advisori

CVE-2025-10885: Autodesk On-Demand Install Services adsk_IPCUpdaterChannel Origin Validation Error Local Privilege Escalation Vulnerability zerodayinitiative.com/advisori

CVE-2025-47728: Delta Electronics CNCSoft-G2 DOPSoft DPAX File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability zerodayinitiative.com/advisori @TrendMicro

##

AAKL@infosec.exchange at 2025-11-11T16:02:59.000Z ##

If you missed this, Trend Micro updated three advisories yesterday:

CVE-2025-9458: Autodesk AutoCAD PRT File Parsing Memory Corruption Remote Code Execution Vulnerability zerodayinitiative.com/advisori

CVE-2025-10885: Autodesk On-Demand Install Services adsk_IPCUpdaterChannel Origin Validation Error Local Privilege Escalation Vulnerability zerodayinitiative.com/advisori

CVE-2025-47728: Delta Electronics CNCSoft-G2 DOPSoft DPAX File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability zerodayinitiative.com/advisori @TrendMicro #infosec #vulnerabilities

##

CVE-2025-52425
(0 None)

EPSS: 0.10%

updated 2025-11-07T16:15:38.753000

1 posts

An SQL injection vulnerability has been reported to affect QuMagie. A remote attacker can exploit the vulnerability to execute unauthorized code or commands. We have already fixed the vulnerability in the following versions: QuMagie 2.7.0 and later

beyondmachines1@infosec.exchange at 2025-11-09T10:01:31.000Z ##

QNAP patches critical SQL Injection flaw in QuMagie photo management application

QNAP patched a critical SQL injection vulnerability (CVE-2025-52425) in QuMagie, its photo management application for NAS devices, that allowed remote attackers to execute unauthorized code and potentially access private photo libraries, steal sensitive data, or compromise the network.

**If you have QNAP NAS devices, first make sure they are isolated from the internet and accessible only from trusted networks. Then if you're using QNAP's QuMagie photo management app (version 2.6.x) plan a quick update to the patched 2.7.x versions.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-34299(CVSS UNKNOWN)

EPSS: 0.06%

updated 2025-11-07T15:31:36

2 posts

Monsta FTP versions 2.11 and earlier contain a vulnerability that allows unauthenticated arbitrary file uploads. This flaw enables attackers to execute arbitrary code by uploading a specially crafted file from a malicious (S)FTP server.

2 repos

https://github.com/rxerium/CVE-2025-34299

https://github.com/crondenice/CVE-2025-34299

beyondmachines1@infosec.exchange at 2025-11-10T16:01:31.000Z ##

Critical remote code execution flaw in Monsta FTP web client actively exploited

A critical pre-authentication remote code execution vulnerability (CVE-2025-34299) in Monsta FTP versions 2.10.3-2.11.2 is being actively exploited, allowing attackers to execute malicious PHP code by manipulating the file download function to write files to web-accessible directories.

**If you're using Monsta FTP web-based file transfer tool, immediately upgrade to version 2.11.3 or later. The application is actively exploited so your instance will be hacked. If you can't upgrade right away, restrict access to the Monsta FTP web interface so it's only available to your internal network or via VPN.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

Hackread@mstdn.social at 2025-11-10T10:59:07.000Z ##

A pre-auth RCE vulnerability (CVE-2025-34299) in #MonstaFTP lets attackers drop web shells and seize full control of servers. Over 5 000 instances exposed online. Update to version 2.11.3 or later now 📌

🔗 Read: hackread.com/monsta-ftp-flaw-w

#CyberSecurity #InfoSec #Vulnerability #RCE

##

CVE-2025-52881(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-11-07T12:31:35

5 posts

### Impact ### This attack is primarily a more sophisticated version of CVE-2019-19921, which was a flaw which allowed an attacker to trick runc into writing the LSM process labels for a container process into a dummy `tmpfs` file and thus not apply the correct LSM labels to the container process. The mitigation runc applied for CVE-2019-19921 was fairly limited and effectively only caused runc t

2 repos

https://github.com/omne-earth/arca

https://github.com/jq6l43d1/proxmox-lxc-docker-fix

Kubernetes@activitypub.awakari.com at 2025-11-11T07:45:39.000Z ## Researchers Uncover Critical runC Bugs Allowing Full Container Escape Security researchers have revealed three serious vulnerabilities in runC, the Open Container Initiative (OCI)-compliant runtime...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2025-31133 #CVE-2025-52565 #CVE-2025-52881 #Docker #Kubernetes #runC

Origin | Interest | Match ##

Kubernetes@activitypub.awakari.com at 2025-11-11T07:45:39.000Z ## Researchers Uncover Critical runC Bugs Allowing Full Container Escape Security researchers have revealed three serious vulnerabilities in runC, the Open Container Initiative (OCI)-compliant runtime...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2025-31133 #CVE-2025-52565 #CVE-2025-52881 #Docker #Kubernetes #runC

Origin | Interest | Match ##

beyondmachines1@infosec.exchange at 2025-11-10T17:01:32.000Z ##

Container escape vulnerabilities discovered in runC container runtime

Three high-severity vulnerabilities (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881, all CVSS 8.2) in runC container runtime enable attackers to escape container isolation and gain root access on host systems through mount race conditions and procfs manipulation, affecting Docker, Kubernetes, and major cloud platforms.

**If you're running Docker, Kubernetes, or any containerized environments, plan an update it to pull the latest runC to version 1.2.8, 1.3.3, or 1.4.0-rc.3 or later. There is a possible exploit that lets attackers escape containers and take full control of your host systems with root privileges. It's not trivial, but why wait for hackers to find a way in. In the meantime, scan your Dockerfiles and use only Dockerfiles from trusted sources.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

linux@activitypub.awakari.com at 2025-11-10T11:43:51.000Z ## Runtime bugs break container walls, enabling root on Docker hosts Console and Write-Gadget Lurkers: CVE-2025-52565 & CVE-2025-52881 The second vulnerability, tracked as CVE-2025-52565, targets...

#Computers

Origin | Interest | Match ##

technadu@infosec.exchange at 2025-11-10T11:17:37.000Z ##

Alert: Three critical runC vulnerabilities (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881) enable mount/symlink-based escapes that may redirect writes to /proc or other host targets. A successful exploit requires container start privileges via crafted mounts or malicious images/Dockerfiles. Patches: runC 1.2.8 / 1.3.3 / 1.4.0-rc.3+.
Detection & mitigation guidance:
• Patch runC immediately.
• Deploy rootless containers and enable user namespaces without host root mapping.
• Monitor for rapid symlink creation, unexpected bind mounts of /dev/null or /dev/console, and anomalous writes to procfs entries (e.g., /proc/sysrq-trigger).
• Harden CI/CD image provenance checks and disallow unverified custom mount configurations.
Share any YARA/OSQuery/Suricata rules you’ve validated — let’s collate detection patterns. Follow TechNadu for vetted technical advisories.

#containersecurity #runC #CVE #Kubernetes #Docker #threathunting #DFIR #DevSecOps

##

CVE-2025-52565(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-11-06T23:12:53

5 posts

### Impact ### This attack is very similar in concept and application to CVE-2025-31133, except that it attacks a similar vulnerability in a different target (namely, the bind-mount of `/dev/pts/$n` to `/dev/console` as configured for all containers that allocate a console). In runc version 1.0.0-rc3 and later, due to insufficient checks when bind-mounting `/dev/pts/$n` to `/dev/console` inside

1 repos

https://github.com/omne-earth/arca

Kubernetes@activitypub.awakari.com at 2025-11-11T07:45:39.000Z ## Researchers Uncover Critical runC Bugs Allowing Full Container Escape Security researchers have revealed three serious vulnerabilities in runC, the Open Container Initiative (OCI)-compliant runtime...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2025-31133 #CVE-2025-52565 #CVE-2025-52881 #Docker #Kubernetes #runC

Origin | Interest | Match ##

Kubernetes@activitypub.awakari.com at 2025-11-11T07:45:39.000Z ## Researchers Uncover Critical runC Bugs Allowing Full Container Escape Security researchers have revealed three serious vulnerabilities in runC, the Open Container Initiative (OCI)-compliant runtime...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2025-31133 #CVE-2025-52565 #CVE-2025-52881 #Docker #Kubernetes #runC

Origin | Interest | Match ##

beyondmachines1@infosec.exchange at 2025-11-10T17:01:32.000Z ##

Container escape vulnerabilities discovered in runC container runtime

Three high-severity vulnerabilities (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881, all CVSS 8.2) in runC container runtime enable attackers to escape container isolation and gain root access on host systems through mount race conditions and procfs manipulation, affecting Docker, Kubernetes, and major cloud platforms.

**If you're running Docker, Kubernetes, or any containerized environments, plan an update it to pull the latest runC to version 1.2.8, 1.3.3, or 1.4.0-rc.3 or later. There is a possible exploit that lets attackers escape containers and take full control of your host systems with root privileges. It's not trivial, but why wait for hackers to find a way in. In the meantime, scan your Dockerfiles and use only Dockerfiles from trusted sources.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

linux@activitypub.awakari.com at 2025-11-10T11:43:51.000Z ## Runtime bugs break container walls, enabling root on Docker hosts Console and Write-Gadget Lurkers: CVE-2025-52565 & CVE-2025-52881 The second vulnerability, tracked as CVE-2025-52565, targets...

#Computers

Origin | Interest | Match ##

technadu@infosec.exchange at 2025-11-10T11:17:37.000Z ##

Alert: Three critical runC vulnerabilities (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881) enable mount/symlink-based escapes that may redirect writes to /proc or other host targets. A successful exploit requires container start privileges via crafted mounts or malicious images/Dockerfiles. Patches: runC 1.2.8 / 1.3.3 / 1.4.0-rc.3+.
Detection & mitigation guidance:
• Patch runC immediately.
• Deploy rootless containers and enable user namespaces without host root mapping.
• Monitor for rapid symlink creation, unexpected bind mounts of /dev/null or /dev/console, and anomalous writes to procfs entries (e.g., /proc/sysrq-trigger).
• Harden CI/CD image provenance checks and disallow unverified custom mount configurations.
Share any YARA/OSQuery/Suricata rules you’ve validated — let’s collate detection patterns. Follow TechNadu for vetted technical advisories.

#containersecurity #runC #CVE #Kubernetes #Docker #threathunting #DFIR #DevSecOps

##

CVE-2025-31133(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-11-06T23:12:38

4 posts

### Impact ### The OCI runtime specification has a `maskedPaths` feature that allows for files or directories to be "masked" by placing a mount on top of them to conceal their contents. This is primarily intended to protect against privileged users in non-user-namespaced from being able to write to files or access directories that would either provide sensitive information about the host to cont

2 repos

https://github.com/omne-earth/arca

https://github.com/sahar042/CVE-2025-31133

Kubernetes@activitypub.awakari.com at 2025-11-11T07:45:39.000Z ## Researchers Uncover Critical runC Bugs Allowing Full Container Escape Security researchers have revealed three serious vulnerabilities in runC, the Open Container Initiative (OCI)-compliant runtime...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2025-31133 #CVE-2025-52565 #CVE-2025-52881 #Docker #Kubernetes #runC

Origin | Interest | Match ##

Kubernetes@activitypub.awakari.com at 2025-11-11T07:45:39.000Z ## Researchers Uncover Critical runC Bugs Allowing Full Container Escape Security researchers have revealed three serious vulnerabilities in runC, the Open Container Initiative (OCI)-compliant runtime...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2025-31133 #CVE-2025-52565 #CVE-2025-52881 #Docker #Kubernetes #runC

Origin | Interest | Match ##

beyondmachines1@infosec.exchange at 2025-11-10T17:01:32.000Z ##

Container escape vulnerabilities discovered in runC container runtime

Three high-severity vulnerabilities (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881, all CVSS 8.2) in runC container runtime enable attackers to escape container isolation and gain root access on host systems through mount race conditions and procfs manipulation, affecting Docker, Kubernetes, and major cloud platforms.

**If you're running Docker, Kubernetes, or any containerized environments, plan an update it to pull the latest runC to version 1.2.8, 1.3.3, or 1.4.0-rc.3 or later. There is a possible exploit that lets attackers escape containers and take full control of your host systems with root privileges. It's not trivial, but why wait for hackers to find a way in. In the meantime, scan your Dockerfiles and use only Dockerfiles from trusted sources.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

technadu@infosec.exchange at 2025-11-10T11:17:37.000Z ##

Alert: Three critical runC vulnerabilities (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881) enable mount/symlink-based escapes that may redirect writes to /proc or other host targets. A successful exploit requires container start privileges via crafted mounts or malicious images/Dockerfiles. Patches: runC 1.2.8 / 1.3.3 / 1.4.0-rc.3+.
Detection & mitigation guidance:
• Patch runC immediately.
• Deploy rootless containers and enable user namespaces without host root mapping.
• Monitor for rapid symlink creation, unexpected bind mounts of /dev/null or /dev/console, and anomalous writes to procfs entries (e.g., /proc/sysrq-trigger).
• Harden CI/CD image provenance checks and disallow unverified custom mount configurations.
Share any YARA/OSQuery/Suricata rules you’ve validated — let’s collate detection patterns. Follow TechNadu for vetted technical advisories.

#containersecurity #runC #CVE #Kubernetes #Docker #threathunting #DFIR #DevSecOps

##

CVE-2025-10885
(7.8 HIGH)

EPSS: 0.02%

updated 2025-11-06T19:45:09.883000

2 posts

A maliciously crafted file, when executed on the victim's machine, can lead to privilege escalation to NT AUTHORITY/SYSTEM due to an insufficient validation of loaded binaries. An attacker with local and low-privilege access could exploit this to execute code as SYSTEM.

AAKL at 2025-11-11T16:02:59.032Z ##

If you missed this, Trend Micro updated three advisories yesterday:

CVE-2025-9458: Autodesk AutoCAD PRT File Parsing Memory Corruption Remote Code Execution Vulnerability zerodayinitiative.com/advisori

CVE-2025-10885: Autodesk On-Demand Install Services adsk_IPCUpdaterChannel Origin Validation Error Local Privilege Escalation Vulnerability zerodayinitiative.com/advisori

CVE-2025-47728: Delta Electronics CNCSoft-G2 DOPSoft DPAX File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability zerodayinitiative.com/advisori @TrendMicro

##

AAKL@infosec.exchange at 2025-11-11T16:02:59.000Z ##

If you missed this, Trend Micro updated three advisories yesterday:

CVE-2025-9458: Autodesk AutoCAD PRT File Parsing Memory Corruption Remote Code Execution Vulnerability zerodayinitiative.com/advisori

CVE-2025-10885: Autodesk On-Demand Install Services adsk_IPCUpdaterChannel Origin Validation Error Local Privilege Escalation Vulnerability zerodayinitiative.com/advisori

CVE-2025-47728: Delta Electronics CNCSoft-G2 DOPSoft DPAX File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability zerodayinitiative.com/advisori @TrendMicro #infosec #vulnerabilities

##

CVE-2025-40300(CVSS UNKNOWN)

EPSS: 0.07%

updated 2025-11-03T18:32:46

1 posts

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors af

linux@activitypub.awakari.com at 2025-11-10T12:27:09.000Z ## Ubuntu 22.04: USN-7862-2 Linux Kernel Info Exposure CVE-2025-40300 The system could be made to expose sensitive information.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2024-1086
(7.8 HIGH)

EPSS: 88.85%

updated 2025-10-27T17:06:37.437000

1 posts

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgradi

9 repos

https://github.com/xzx482/CVE-2024-1086

https://github.com/karim4353/CVE-2024-1086-Exploit

https://github.com/feely666/CVE-2024-1086

https://github.com/kevcooper/CVE-2024-1086-checker

https://github.com/andigandhi/bitpixie

https://github.com/Alicey0719/docker-POC_CVE-2024-1086

https://github.com/LLfam/CVE-2024-1086

https://github.com/Notselwyn/CVE-2024-1086

https://github.com/CCIEVoice2009/CVE-2024-1086

knoppix95@mastodon.social at 2025-11-09T10:11:50.000Z ##

CISA confirms a high-severity Linux kernel flaw (CVE-2024-1086) is now exploited by ransomware gangs 💀.

Local attackers can gain root access, enabling full system takeover and lateral movement ⚠️.

Patching or mitigations recommended immediately 🛡️.

🔗 bleepingcomputer.com/news/secu

#TechNews #Linux #CyberSecurity #Ransomware #Vulnerability #Kernel #Infosec #DataSecurity #Security #PatchNow #OpenSource #DigitalSafety #Malware #ThreatIntel #SystemSecurity #ITSecurity #TechPolicy

##

CVE-2025-55315
(9.9 CRITICAL)

EPSS: 0.07%

updated 2025-10-21T21:04:55

2 posts

# Microsoft Security Advisory CVE-2025-55315: .NET Security Feature Bypass Vulnerability ## <a name="executive-summary"></a>Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in ASP.NET Core 10.0 , ASP.NET Core 9.0 , ASP.NET Core 8.0, and ASP.NET Core 2.3. This advisory also provides guidance on what developers can do to update their appl

6 repos

https://github.com/sirredbeard/CVE-2025-55315-repro

https://github.com/ZemarKhos/CVE-2025-55315-PoC-Exploit

https://github.com/RootAid/CVE-2025-55315

https://github.com/7huukdlnkjkjba/CVE-2025-55315-

https://github.com/jlinebau/CVE-2025-55315-Scanner-Monitor

https://github.com/nickcopi/CVE-2025-55315-detection-playground

CVE-2025-62518
(8.1 HIGH)

EPSS: 0.01%

updated 2025-10-21T19:31:25.450000

4 posts

astral-tokio-tar is a tar archive reading/writing library for async Rust. Versions of astral-tokio-tar prior to 0.5.6 contain a boundary parsing vulnerability that allows attackers to smuggle additional archive entries by exploiting inconsistent PAX/ustar header handling. When processing archives with PAX-extended headers containing size overrides, the parser incorrectly advances stream position b

1 repos

https://github.com/edera-dev/cve-tarmageddon

0x0@hachyderm.io at 2025-11-11T18:25:29.000Z ##

A [CVE](nvd.nist.gov/vuln/detail/CVE-2) in software written in rust? Impossible!

##

cyclone at 2025-11-11T16:54:38.824Z ##

Rust async tar libraries are affected by a High 8.1 severity vulnerability CVE-2025-62518 “TARmageddon” which allows potential RCE and supply-chain attacks.

forum.hashpwn.net/post/5906

##

cyclone@infosec.exchange at 2025-11-11T16:54:38.000Z ##

Rust async tar libraries are affected by a High 8.1 severity vulnerability CVE-2025-62518 “TARmageddon” which allows potential RCE and supply-chain attacks.

forum.hashpwn.net/post/5906

#rust #cve_2025_62518 #TARmageddon #tar #cybersecurity #news #hashpwn

##

whitequark@mastodon.social at 2025-11-11T07:52:14.000Z ##

hey can we talk about the absolutely _atrocious_ journalism around CVE-2025-62518

it's a polyglot / inconsistent deserialization bug that people keep referring to as "RCE" because there's a race to the bottom among the infosec consulting complex and the entire vulnerability disclosure pipeline is about as clickbaity as Daily Mail

> RCE
> look inside
> an attacker that can execute code locally can escalate to executing code locally

##

CVE-2025-54918
(8.8 HIGH)

EPSS: 0.15%

updated 2025-09-09T18:31:31

1 posts

Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network.

1 repos

https://github.com/mrk336/From-Foothold-to-Domain-Admin-Weaponizing-CVE-2025-54918-in-Real-World-DevOps

jos1264@social.skynetcloud.site at 2025-11-09T11:30:02.000Z ##

From Domain User to SYSTEM: Analyzing the NTLM LDAP Authentication Bypass Vulnerability (CVE-2025-54918) crowdstrike.com/en-us/blog/ana

##

CVE-2025-48561
(5.5 MEDIUM)

EPSS: 0.01%

updated 2025-09-05T21:34:34

1 posts

In multiple locations, there is a possible way to access data displayed on the screen due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

1 repos

https://github.com/demining/Pixnapping-Attack-on-Android

Android@activitypub.awakari.com at 2025-11-11T16:51:11.000Z ## What is the Pixnapping vulnerability, and how to protect your Android smartphone? | Kaspersky official blog The Android vulnerability CVE-2025-48561 (Pixnapping) enables the theft of any data displ...

#Threats #2FA #Android #infostealers #passwords #privacy #spyware #threats #tips #vulnerabilities

Origin | Interest | Match ##

CVE-2025-47728
(7.3 HIGH)

EPSS: 0.01%

updated 2025-07-11T17:52:28.613000

2 posts

Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

AAKL at 2025-11-11T16:02:59.032Z ##

If you missed this, Trend Micro updated three advisories yesterday:

CVE-2025-9458: Autodesk AutoCAD PRT File Parsing Memory Corruption Remote Code Execution Vulnerability zerodayinitiative.com/advisori

CVE-2025-10885: Autodesk On-Demand Install Services adsk_IPCUpdaterChannel Origin Validation Error Local Privilege Escalation Vulnerability zerodayinitiative.com/advisori

CVE-2025-47728: Delta Electronics CNCSoft-G2 DOPSoft DPAX File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability zerodayinitiative.com/advisori @TrendMicro

##

AAKL@infosec.exchange at 2025-11-11T16:02:59.000Z ##

If you missed this, Trend Micro updated three advisories yesterday:

CVE-2025-9458: Autodesk AutoCAD PRT File Parsing Memory Corruption Remote Code Execution Vulnerability zerodayinitiative.com/advisori

CVE-2025-10885: Autodesk On-Demand Install Services adsk_IPCUpdaterChannel Origin Validation Error Local Privilege Escalation Vulnerability zerodayinitiative.com/advisori

CVE-2025-47728: Delta Electronics CNCSoft-G2 DOPSoft DPAX File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability zerodayinitiative.com/advisori @TrendMicro #infosec #vulnerabilities

##

CVE-2024-38197
(6.5 MEDIUM)

EPSS: 6.58%

updated 2024-10-22T19:50:21.707000

1 posts

Microsoft Teams for iOS Spoofing Vulnerability

daniel1820815 at 2025-11-11T16:24:01.455Z ##

Research has uncovered four critical in that allow attackers to impersonate users, manipulate messages, notifications, displayed names and forge caller identities in video and audio calls. fixed the flaws and officially tracked the notification spoofing flaw as CVE-2024-38197.

research.checkpoint.com/2025/m

##

CVE-2022-1234
(6.1 MEDIUM)

EPSS: 0.13%

updated 2023-01-27T05:01:29

1 posts

XSS in livehelperchat in GitHub repository livehelperchat/livehelperchat prior to 3.97. This vulnerability has the potential to deface websites, result in compromised user accounts, and can run malicious code on web pages, which can lead to a compromise of the user’s device.

jos1264@social.skynetcloud.site at 2025-11-11T01:30:03.000Z ##

CVE-2025-12542 - CVE-2022-1234: Apache HTTP Server Unauthenticated Remote Code Execution cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12686
(0 None)

EPSS: 0.00%

2 posts

N/A

beyondmachines1 at 2025-11-11T18:01:31.442Z ##

Synology patches critical remote code execution vulnerability in BeeStation OS

Synology has patched a critical buffer overflow vulnerability (CVE-2025-12686) discovered at Pwn2Own 2025 that allows remote unauthenticated attackers to execute arbitrary code on all BeeStation OS versions.

**If you have Synology BeeStation network storage devices, check whether it has updated to BeeStation OS version 1.3.2-65648 or later. If not, force the update. And make sure to isolate it from the internet. This flaw was demonstrated at the Pwn2Own hacking competition and will probably be exploited soon**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2025-11-11T18:01:31.000Z ##

Synology patches critical remote code execution vulnerability in BeeStation OS

Synology has patched a critical buffer overflow vulnerability (CVE-2025-12686) discovered at Pwn2Own 2025 that allows remote unauthenticated attackers to execute arbitrary code on all BeeStation OS versions.

**If you have Synology BeeStation network storage devices, check whether it has updated to BeeStation OS version 1.3.2-65648 or later. If not, force the update. And make sure to isolate it from the internet. This flaw was demonstrated at the Pwn2Own hacking competition and will probably be exploited soon**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-9408
(0 None)

EPSS: 0.00%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-11T18:10:02.000Z ##

CVE-2025-9408 - Userspace privilege escalation vulnerability on Cortex M cvefeed.io/vuln/detail/CVE-202

##

nen@mementomori.social at 2025-11-11T08:50:12.000Z ##

@afterdawn Ymmärränköhän oikein, että tietoturva-aukon hyödyntämiseksi hyökkääjän pitää pystyä lähettämään dataa olemassa olevien langattomien yhteyksien kautta? Eli omassa yhdistetyssä Bluetooth-laitteessa tai yhdistetyssä wifi-verkossa olevassa laitteessa on oltava haittaohjelma, joka hyödyntää tätä haavoittuvuutta.

github.com/B1ack4sh/Blackash-C

##

spv@spv.sh at 2025-11-10T13:41:32.000Z ##

@harrysintonen is this the same bullshit ai-gen'd repo about that Android RCE? (github.com/B1ack4sh/Blackash-C)

##

osma@mas.to at 2025-11-10T13:00:48.000Z ##

Sure would be nice to know if the security update Samsung pushed out on Nov 5 but is labeled to contain October security patch actually covers CVE-2025-48593 or not.

##

CVE-2025-64513
(0 None)

EPSS: 0.24%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-10T23:25:04.000Z ##

CVE-2025-64513 - Milvus Proxy has Critical Authentication Bypass Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64507
(0 None)

EPSS: 0.01%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-10T23:25:03.000Z ##

CVE-2025-64507 - Incus vulnerable to local privilege escalation through custom storage volumes cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64484
(0 None)

EPSS: 0.06%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-10T23:25:03.000Z ##

CVE-2025-64484 - OAuth2-Proxy vulnerable to header smuggling via underscore, leading to potential privilege escalation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-49145
(0 None)

EPSS: 0.03%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-10T23:25:03.000Z ##

CVE-2025-49145 - iTop admin can drop iTop database using webhooks cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-48055
(0 None)

EPSS: 0.03%

2 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-10T23:25:02.000Z ##

CVE-2025-48055 - Combodo iTop has stored XSS in user portal's browse brick cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-10T22:20:02.000Z ##

CVE-2025-48055 - Combodo iTop has stored XSS in user portal's browse brick cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-47932
(0 None)

EPSS: 0.04%

2 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-10T23:25:02.000Z ##

CVE-2025-47932 - Combodo iTop vulnerable to reflected XSS in ajax.render.php render_dashboard cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-10T22:20:01.000Z ##

CVE-2025-47932 - Combodo iTop vulnerable to reflected XSS in ajax.render.php render_dashboard cvefeed.io/vuln/detail/CVE-202

##

Visit counter For Websites