##
Updated at UTC 2025-07-12T07:07:33.668739
CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
---|---|---|---|---|---|---|---|
CVE-2025-6058 | 9.8 | 0.00% | 1 | 0 | 2025-07-12T05:15:22.387000 | The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to | |
CVE-2025-5777 | 7.5 | 49.70% | 23 | 12 | template | 2025-07-12T03:30:20 | Insufficient input validation leading to memory overread on the NetScaler Manage |
CVE-2025-30402 | 8.1 | 0.00% | 2 | 0 | 2025-07-11T22:57:08 | A heap-buffer-overflow vulnerability in the loading of ExecuTorch methods can ca | |
CVE-2025-30403 | 8.1 | 0.00% | 2 | 0 | 2025-07-11T20:15:24.100000 | A heap-buffer-overflow vulnerability is possible in mvfst via a specially crafte | |
CVE-2025-7503 | 0 | 0.00% | 1 | 0 | 2025-07-11T19:15:24.217000 | An OEM IP camera manufactured by Shenzhen Liandian Communication Technology LTD | |
CVE-2025-45582 | 4.1 | 0.00% | 2 | 0 | 2025-07-11T18:30:35 | GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TA | |
CVE-2025-6771 | 7.2 | 0.66% | 2 | 0 | 2025-07-11T17:29:00.883000 | OS command injection in Ivanti Endpoint Manager Mobile (EPMM) before version 12. | |
CVE-2025-7028 | 0 | 0.00% | 1 | 0 | 2025-07-11T16:15:27.143000 | A vulnerability in the Software SMI handler (SwSmiInputValue 0x20) allows a loca | |
CVE-2025-7027 | 0 | 0.00% | 1 | 0 | 2025-07-11T16:15:27.053000 | A vulnerability in the Software SMI handler (SwSmiInputValue 0xB2) allows a loca | |
CVE-2025-51591 | 6.5 | 0.00% | 1 | 0 | 2025-07-11T15:31:37 | A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to ga | |
CVE-2025-52950 | 9.6 | 0.00% | 5 | 0 | 2025-07-11T15:15:25.570000 | A Missing Authorization vulnerability in Juniper Networks Security Director allo | |
CVE-2025-30025 | None | 0.02% | 1 | 0 | 2025-07-11T06:30:36 | The communication protocol used between the server process and the service contr | |
CVE-2025-30024 | 6.8 | 0.03% | 1 | 0 | 2025-07-11T06:30:36 | The communication protocol used between client and server had a flaw that could | |
CVE-2025-30023 | 9.1 | 0.66% | 1 | 0 | 2025-07-11T06:30:36 | The communication protocol used between client and server had a flaw that could | |
CVE-2025-30026 | None | 0.02% | 1 | 0 | 2025-07-11T06:30:36 | The AXIS Camera Station Server had a flaw that allowed to bypass authentication | |
CVE-2025-52579 | 9.4 | 0.03% | 1 | 0 | 2025-07-11T00:15:26.597000 | Emerson ValveLink Products store sensitive information in cleartext in memory. T | |
CVE-2025-34102 | None | 0.69% | 2 | 0 | 2025-07-10T21:32:00 | A remote code execution vulnerability exists in CryptoLog (PHP version, disconti | |
CVE-2025-53709 | 5.4 | 0.03% | 2 | 0 | 2025-07-10T21:31:59 | Secure-upload is a data submission service that validates single-use tokens when | |
CVE-2025-7365 | 5.4 | 0.01% | 1 | 0 | 2025-07-10T21:12:15 | A flaw was found in Keycloak. When an authenticated attacker attempts to merge a | |
CVE-2024-42516 | None | 0.04% | 1 | 0 | 2025-07-10T18:31:34 | HTTP response splitting in the core of Apache HTTP Server allows an attacker who | |
CVE-2025-23048 | None | 0.01% | 1 | 0 | 2025-07-10T18:31:34 | In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, a | |
CVE-2025-49812 | None | 0.02% | 1 | 0 | 2025-07-10T18:31:34 | In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, | |
CVE-2024-47252 | None | 0.02% | 1 | 0 | 2025-07-10T18:31:34 | Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4 | |
CVE-2025-47813 | 4.3 | 0.63% | 1 | 0 | template | 2025-07-10T18:31:34 | loginok.html in Wing FTP Server before 7.4.4 discloses the full local installati |
CVE-2025-47812 | 10.0 | 57.30% | 13 | 5 | template | 2025-07-10T18:31:28 | In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0 |
CVE-2025-49630 | None | 0.02% | 1 | 0 | 2025-07-10T18:31:28 | In certain proxy configurations, a denial of service attack against Apache HTTP | |
CVE-2024-43394 | None | 0.03% | 1 | 0 | 2025-07-10T18:31:27 | Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to po | |
CVE-2025-53371 | 9.1 | 0.03% | 1 | 0 | 2025-07-10T18:15:24.280000 | DiscordNotifications is an extension for MediaWiki that sends notifications of a | |
CVE-2025-53020 | 0 | 0.02% | 1 | 0 | 2025-07-10T17:15:48.337000 | Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Ser | |
CVE-2025-47811 | 4.1 | 0.02% | 1 | 0 | 2025-07-10T17:15:46.933000 | In Wing FTP Server through 7.4.4, the administrative web interface (listening by | |
CVE-2024-43204 | 0 | 0.02% | 1 | 0 | 2025-07-10T17:15:45.987000 | SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outb | |
CVE-2025-44251 | None | 0.02% | 1 | 0 | 2025-07-10T15:31:41 | Ecovacs Deebot T10 1.7.2 transmits Wi-Fi credentials in cleartext during the pai | |
CVE-2025-38246 | None | 0.02% | 1 | 0 | 2025-07-10T15:31:21 | In the Linux kernel, the following vulnerability has been resolved: bnxt: prope | |
CVE-2025-47981 | 9.8 | 0.17% | 6 | 0 | 2025-07-10T13:19:18.800000 | Heap-based buffer overflow in Windows SPNEGO Extended Negotiation allows an unau | |
CVE-2024-36357 | 5.6 | 0.01% | 1 | 0 | 2025-07-10T13:19:18.800000 | A transient execution vulnerability in some AMD processors may allow an attacker | |
CVE-2025-48804 | 6.8 | 0.03% | 1 | 0 | 2025-07-10T13:19:18.800000 | Acceptance of extraneous untrusted data with trusted data in Windows BitLocker a | |
CVE-2025-37103 | 9.8 | 0.20% | 1 | 0 | 2025-07-10T13:18:53.830000 | Hard-coded login credentials were found in HPE Networking Instant On Access Poi | |
CVE-2025-53513 | 8.8 | 0.05% | 1 | 0 | 2025-07-10T13:18:53.830000 | The /charms endpoint on a Juju controller lacked sufficient authorization checks | |
CVE-2025-5023 | 7.1 | 0.01% | 1 | 0 | 2025-07-10T13:17:30.017000 | Use of Hard-coded Credentials vulnerability in Mitsubishi Electric Corporation p | |
CVE-2025-46406 | 5.6 | 0.01% | 1 | 0 | 2025-07-10T13:17:30.017000 | A Privilege Context Switching Error (CWE-270) in the Command Center Server could | |
CVE-2025-6948 | 8.7 | 0.02% | 1 | 0 | 2025-07-10T13:17:30.017000 | An issue has been discovered in GitLab CE/EE affecting all versions from 17.11 b | |
CVE-2025-0139 | 0 | 0.01% | 1 | 0 | 2025-07-10T13:17:30.017000 | An incorrect privilege assignment vulnerability in Palo Alto Networks Autonomous | |
CVE-2025-53546 | 9.1 | 0.03% | 1 | 0 | 2025-07-10T13:17:30.017000 | Folo organizes feeds content into one timeline. Using pull_request_target on .gi | |
CVE-2025-3498 | 9.9 | 0.05% | 1 | 0 | 2025-07-10T13:17:30.017000 | An unauthenticated user with management network access can get and modify the R | |
CVE-2024-7650 | None | 0.05% | 1 | 0 | 2025-07-10T12:31:19 | Improper Control of Generation of Code ('Code Injection') vulnerability in OpenT | |
CVE-2025-5022 | 6.5 | 0.01% | 1 | 0 | 2025-07-10T09:32:40 | Weak Password Requirements vulnerability in Mitsubishi Electric Corporation phot | |
CVE-2025-6168 | 2.7 | 0.01% | 1 | 0 | 2025-07-10T09:32:40 | An issue has been discovered in GitLab EE affecting all versions from 18.0 befor | |
CVE-2025-4972 | 2.7 | 0.01% | 1 | 0 | 2025-07-10T09:32:40 | An issue has been discovered in GitLab EE affecting all versions from 18.0 befor | |
CVE-2025-3396 | 4.3 | 0.01% | 1 | 0 | 2025-07-10T09:32:39 | An issue has been discovered in GitLab EE affecting all versions from 13.3 befor | |
CVE-2025-44003 | 4.3 | 0.02% | 1 | 0 | 2025-07-10T03:32:17 | Missing Release of Resource after Effective Lifetime (CWE-772) in the Gallagher | |
CVE-2025-35983 | 6.5 | 0.03% | 1 | 0 | 2025-07-10T03:32:13 | Improper Certificate Validation (CWE-295) in the Controller 7000 OneLink impleme | |
CVE-2025-0141 | None | 0.01% | 3 | 0 | 2025-07-10T00:32:01 | An incorrect privilege assignment vulnerability in the Palo Alto Networks Global | |
CVE-2025-0140 | None | 0.01% | 1 | 0 | 2025-07-10T00:32:01 | An incorrect privilege assignment vulnerability in the Palo Alto Networks Global | |
CVE-2025-53547 | 8.5 | 0.01% | 7 | 1 | 2025-07-09T22:34:05 | A Helm contributor discovered that a specially crafted `Chart.yaml` file along w | |
CVE-2025-52364 | 7.5 | 0.06% | 1 | 0 | 2025-07-09T21:32:18 | Insecure Permissions vulnerability in Tenda CP3 Pro Firmware V22.5.4.93 allows t | |
CVE-2025-32463 | 9.4 | 0.33% | 2 | 33 | 2025-07-09T18:30:41 | Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswi | |
CVE-2025-32462 | 2.8 | 0.24% | 1 | 9 | 2025-07-09T18:30:40 | Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that i | |
CVE-2025-6514 | 9.7 | 0.10% | 4 | 1 | 2025-07-09T18:08:46 | mcp-remote is exposed to OS command injection when connecting to untrusted MCP s | |
CVE-2025-38261 | None | 0.02% | 1 | 0 | 2025-07-09T12:31:41 | In the Linux kernel, the following vulnerability has been resolved: riscv: save | |
CVE-2025-3497 | 8.7 | 0.05% | 1 | 0 | 2025-07-09T09:31:17 | The Linux distribution underlying the Radiflow iSAP Smart Collector (CentOS 7 - | |
CVE-2025-3499 | 10.0 | 0.32% | 1 | 0 | 2025-07-09T09:31:17 | The device has two web servers that expose unauthenticated REST APIs on the mana | |
CVE-2025-7345 | 7.5 | 0.06% | 1 | 0 | 2025-07-09T08:15:25.153000 | A flaw exists in gdk‑pixbuf within the gdk_pixbuf__jpeg_image_load_increment fun | |
CVE-2025-49533 | 9.8 | 1.28% | 1 | 0 | 2025-07-09T00:30:45 | Adobe Experience Manager (MS) versions 6.5.23.0 and earlier are affected by a De | |
CVE-2025-6759 | None | 0.01% | 1 | 1 | 2025-07-09T00:30:44 | Local Privilege escalation allows a low-privileged user to gain SYSTEM privilege | |
CVE-2025-27203 | 9.7 | 1.50% | 1 | 0 | 2025-07-09T00:30:32 | Adobe Connect versions 24.0 and earlier are affected by a Deserialization of Unt | |
CVE-2025-7192 | 6.3 | 0.63% | 1 | 0 | 2025-07-08T21:30:37 | A vulnerability was found in D-Link DIR-645 up to 1.05B01 and classified as crit | |
CVE-2025-37102 | 7.2 | 0.19% | 1 | 0 | 2025-07-08T21:30:32 | An authenticated command injection vulnerability exists in the Command line inte | |
CVE-2025-49719 | 7.5 | 0.23% | 1 | 1 | 2025-07-08T18:31:51 | Improper input validation in SQL Server allows an unauthorized attacker to discl | |
CVE-2025-48817 | 8.8 | 0.04% | 1 | 0 | 2025-07-08T18:31:50 | Relative path traversal in Remote Desktop Client allows an unauthorized attacker | |
CVE-2025-48799 | 7.8 | 0.07% | 2 | 2 | 2025-07-08T18:31:50 | Improper link resolution before file access ('link following') in Windows Update | |
CVE-2025-47178 | 8.0 | 0.35% | 1 | 0 | 2025-07-08T18:31:50 | Improper neutralization of special elements used in an sql command ('sql injecti | |
CVE-2024-36348 | 3.8 | 0.01% | 1 | 0 | 2025-07-08T18:31:49 | A transient execution vulnerability in some AMD processors may allow a user proc | |
CVE-2024-36349 | 3.8 | 0.01% | 1 | 0 | 2025-07-08T18:31:49 | A transient execution vulnerability in some AMD processors may allow a user proc | |
CVE-2025-49677 | 7.0 | 0.04% | 1 | 0 | 2025-07-08T18:31:47 | Use after free in Microsoft Brokering File System allows an authorized attacker | |
CVE-2025-47988 | 7.5 | 0.08% | 1 | 0 | 2025-07-08T18:31:45 | Improper control of generation of code ('code injection') in Azure Monitor Agent | |
CVE-2024-36350 | 5.6 | 0.01% | 1 | 0 | 2025-07-08T18:31:43 | A transient execution vulnerability in some AMD processors may allow an attacker | |
CVE-2012-5862 | None | 19.52% | 1 | 0 | 2025-07-08T18:30:28 | login.php on the Sinapsi eSolar Light Photovoltaic System Monitor (aka Schneider | |
CVE-2025-3648 | 0 | 0.04% | 6 | 0 | 2025-07-08T17:15:34.267000 | A vulnerability has been identified in the Now Platform that could result in dat | |
CVE-2025-42963 | 9.1 | 0.04% | 1 | 0 | 2025-07-08T16:18:14.207000 | A critical vulnerability in SAP NetWeaver Application server for Java Log Viewer | |
CVE-2025-42966 | 9.1 | 0.04% | 1 | 0 | 2025-07-08T16:18:14.207000 | SAP NetWeaver XML Data Archiving Service allows an authenticated attacker with a | |
CVE-2025-20686 | 9.8 | 0.02% | 1 | 0 | 2025-07-08T15:33:05 | In wlan AP driver, there is a possible out of bounds write due to an incorrect b | |
CVE-2025-6770 | 7.2 | 0.66% | 2 | 0 | 2025-07-08T15:32:10 | OS command injection in Ivanti Endpoint Manager Mobile (EPMM) before version 12. | |
CVE-2025-36600 | 8.3 | 0.01% | 1 | 0 | 2025-07-08T15:32:10 | Dell Client Platform BIOS contains an Improper Access Control Applied to Mirrore | |
CVE-2025-50130 | 7.8 | 0.01% | 1 | 0 | 2025-07-08T15:32:10 | A heap-based buffer overflow vulnerability exists in VS6Sim.exe contained in V-S | |
CVE-2025-40736 | 9.8 | 0.07% | 1 | 0 | 2025-07-08T12:31:10 | A vulnerability has been identified in SINEC NMS (All versions < V4.0). The affe | |
CVE-2025-42964 | 9.1 | 0.05% | 1 | 0 | 2025-07-08T03:31:08 | SAP NetWeaver Enterprise Portal Administration is vulnerable when a privileged u | |
CVE-2025-42980 | 9.1 | 0.05% | 1 | 0 | 2025-07-08T03:31:08 | SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a pr | |
CVE-2025-42959 | 8.1 | 0.07% | 1 | 0 | 2025-07-08T03:31:02 | An unauthenticated attacker may exploit a scenario where a Hashed Message Authen | |
CVE-2025-42953 | 8.1 | 0.04% | 1 | 0 | 2025-07-08T03:31:02 | SAP Netweaver System Configuration does not perform necessary authorization chec | |
CVE-2025-42967 | 9.1 | 0.26% | 2 | 0 | 2025-07-08T03:31:01 | SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vul | |
CVE-2025-6543 | 9.8 | 16.12% | 2 | 3 | 2025-07-01T18:30:34 | Memory overflow vulnerability leading to unintended control flow and Denial of S | |
CVE-2025-6554 | 8.1 | 5.30% | 1 | 5 | 2025-07-01T15:32:11 | Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote at | |
CVE-2025-6191 | 8.8 | 0.06% | 2 | 0 | 2025-06-18T21:30:35 | Integer overflow in V8 in Google Chrome prior to 137.0.7151.119 allowed a remote | |
CVE-2025-6192 | 8.8 | 0.11% | 2 | 0 | 2025-06-18T21:30:30 | Use after free in Metrics in Google Chrome prior to 137.0.7151.119 allowed a rem | |
CVE-2025-33073 | 8.8 | 0.31% | 1 | 2 | 2025-06-10T18:32:36 | Improper access control in Windows SMB allows an authorized attacker to elevate | |
CVE-2025-47934 | None | 0.01% | 2 | 0 | 2025-05-19T21:54:44 | ### Impact A maliciously modified message can be passed to either `openpgp.verif | |
CVE-2025-30012 | 3.9 | 0.17% | 1 | 0 | 2025-05-13T03:31:20 | The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) uses a de | |
CVE-2017-9765 | 8.1 | 23.64% | 1 | 0 | 2025-04-20T01:37:25.860000 | Integer overflow in the soap_get function in Genivia gSOAP 2.7.x and 2.8.x befor | |
CVE-2025-32461 | 9.9 | 0.11% | 1 | 0 | 2025-04-09T20:02:41.860000 | wikiplugin_includetpl in lib/wiki-plugins/wikiplugin_includetpl.php in Tiki befo | |
CVE-2025-24269 | 9.8 | 0.07% | 1 | 0 | 2025-04-04T18:23:37.283000 | The issue was addressed with improved memory handling. This issue is fixed in ma | |
CVE-2024-36401 | 9.8 | 94.42% | 1 | 20 | template | 2025-04-03T19:57:04.207000 | GeoServer is an open source server that allows users to share and edit geospatia |
CVE-2023-2868 | 9.4 | 90.10% | 2 | 4 | 2025-04-02T18:19:23.680000 | A remote command injection vulnerability exists in the Barracuda Email Security | |
CVE-2024-56346 | 10.0 | 0.11% | 1 | 0 | 2025-03-18T18:30:56 | IBM AIX 7.2 and 7.3 nimesis NIM master service could allow a remote attacker to | |
CVE-2024-3596 | 9.1 | 0.77% | 4 | 1 | 2025-03-18T18:30:44 | RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local atta | |
CVE-2023-52927 | None | 0.03% | 1 | 1 | 2025-03-14T15:32:10 | In the Linux kernel, the following vulnerability has been resolved: netfilter: | |
CVE-2019-9621 | 7.5 | 91.78% | 1 | 1 | 2024-04-04T00:24:27 | Zimbra Collaboration Suite before 8.6 patch 13, 8.7.x before 8.7.11 patch 10, an | |
CVE-2016-4484 | 6.8 | 0.46% | 1 | 0 | 2023-01-27T05:06:05 | The Debian initrd script for the cryptsetup package 2:1.7.3-2 and earlier allows | |
CVE-2025-25257 | 0 | 0.00% | 18 | 3 | N/A | ||
CVE-2024-47065 | 0 | 0.00% | 2 | 0 | N/A | ||
CVE-2025-48384 | 0 | 0.02% | 17 | 15 | N/A | ||
CVE-2025-53629 | 0 | 0.04% | 1 | 0 | N/A | ||
CVE-2025-53628 | 0 | 0.04% | 1 | 0 | N/A | ||
CVE-2025-53542 | 0 | 0.02% | 1 | 0 | N/A | ||
CVE-2025-48385 | 0 | 0.08% | 3 | 0 | N/A | ||
CVE-2025-1729 | 0 | 0.00% | 2 | 0 | N/A | ||
CVE-2025-44963 | 0 | 0.00% | 1 | 0 | N/A | ||
CVE-2025-6243 | 0 | 0.00% | 1 | 0 | N/A | ||
CVE-2025-44955 | 0 | 0.00% | 1 | 0 | N/A | ||
CVE-2025-44962 | 0 | 0.00% | 1 | 0 | N/A | ||
CVE-2025-44958 | 0 | 0.00% | 1 | 0 | N/A | ||
CVE-2025-44954 | 0 | 0.00% | 1 | 0 | N/A | ||
CVE-2025-44961 | 0 | 0.00% | 1 | 0 | N/A | ||
CVE-2025-44960 | 0 | 0.00% | 1 | 0 | N/A | ||
CVE-2025-44957 | 0 | 0.00% | 1 | 0 | N/A | ||
CVE-2025-48386 | 0 | 0.01% | 1 | 0 | N/A |
updated 2025-07-12T05:15:22.387000
1 posts
🚨 CRITICAL: WPBookit (≤1.0.4) allows unauthenticated arbitrary file uploads—potential RCE. Affects all sites using this plugin. Disable/uninstall immediately. CVE-2025-6058 | CVSS 9.8 https://radar.offseq.com/threat/cve-2025-6058-cwe-434-unrestricted-upload-of-file--85a2054d #OffSeq #WordPress #infosec #CVE20256058
##updated 2025-07-12T03:30:20
23 posts
12 repos
https://github.com/0xgh057r3c0n/CVE-2025-5777
https://github.com/Jishanluhar/CVE-2025-5777
https://github.com/RickGeex/CVE-2025-5777-CitrixBleed
https://github.com/win3zz/CVE-2025-5777
https://github.com/Chocapikk/CVE-2025-5777
https://github.com/FrenzisRed/CVE-2025-5777
https://github.com/nocerainfosec/cve-2025-5777
https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-
https://github.com/bughuntar/CVE-2025-5777
https://github.com/RaR1991/citrix_bleed_2
Imperva: CVE-2025-5777 Exposes Citrix NetScaler to Dangerous Memory Leak Attacks https://www.imperva.com/blog/cve-2025-5777-exposes-citrix-netscaler-to-dangerous-memory-leak-attacks/ #cybersecurity #infosec
##Critical CVE-2025-5777 Vulnerability in Citrix NetScaler ADC: What It Means for Your Security Posture
A New Threat Emerges in Enterprise VPN Infrastructure A newly disclosed security vulnerability, CVE-2025-5777, has sent waves through the cybersecurity landscape, especially among enterprises using Citrix NetScaler ADC and Gateway products. This flaw exposes organizations to serious risks tied to remote access and authentication tools, which are often at the core of…
##If you ask Citrix support for IOCs for CVE-2025-5777 and they send you a script to run that looks for .php files - they’ve sent you an unrelated script, which has nothing to do with session hijacking or memory overread.
##CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
The U.S. Cybersecurity & Infrastructure Security Agency has confirmed active exploitation of the CitrixBleed 2 vulnerability (CVE-2025-5777) in...
🔗️ [Bleepingcomputer] https://link.is.it/2FCULx
##CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
[...] Cybersecurity & Infrastructure Security Agency has confirmed active exploitation of the CitrixBleed 2 vulnerability (CVE-2025-5777) in Citrix NetScaler ADC and Gateway and is giving federal agencies one day to apply fixes. The U.S.
##Updated CitrixBleed2 scan results of vuln/not vuln
https://github.com/GossiTheDog/scanning/blob/main/CVE-2025-5777-CitrixBleed2-ElectricBoogaloo-patching.txt
Imperva: CVE-2025-5777 Exposes Citrix NetScaler to Dangerous Memory Leak Attacks https://www.imperva.com/blog/cve-2025-5777-exposes-citrix-netscaler-to-dangerous-memory-leak-attacks/ #cybersecurity #infosec
##If you ask Citrix support for IOCs for CVE-2025-5777 and they send you a script to run that looks for .php files - they’ve sent you an unrelated script, which has nothing to do with session hijacking or memory overread.
##CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
The U.S. Cybersecurity & Infrastructure Security Agency has confirmed active exploitation of the CitrixBleed 2 vulnerability (CVE-2025-5777) in...
🔗️ [Bleepingcomputer] https://link.is.it/2FCULx
##CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
[...] Cybersecurity & Infrastructure Security Agency has confirmed active exploitation of the CitrixBleed 2 vulnerability (CVE-2025-5777) in Citrix NetScaler ADC and Gateway and is giving federal agencies one day to apply fixes. The U.S.
##Updated CitrixBleed2 scan results of vuln/not vuln
https://github.com/GossiTheDog/scanning/blob/main/CVE-2025-5777-CitrixBleed2-ElectricBoogaloo-patching.txt
CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises – Source:thehackernews.com https://ciso2ciso.com/cisa-adds-citrix-netscaler-cve-2025-5777-to-kev-catalog-as-active-exploits-target-enterprises-sourcethehackernews-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #TheHackerNews #Citrix
##CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises https://thehackernews.com/2025/07/cisa-adds-citrix-netscaler-cve-2025.html
##CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises https://thehackernews.com/2025/07/cisa-adds-citrix-netscaler-cve-2025.html
##CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises https://thehackernews.com/2025/07/cisa-adds-citrix-netscaler-cve-2025.html
##CVE-2025-5777 aka CitrixBleed 2 has been added to CISA KEV now over evidence of active exploitation.
Citrix are still declining to comment about evidence of exploitation as of writing.
##CISA have modified the CVE-2025-5777 entry to link to my blog 🙌 I’m hoping this gets more visibility as a bunch of us can see from Netflow ongoing threat actor Netscaler sessions to.. sensitive orgs.
##If you’ve detected exploitation of CitrixBleed 2 aka CVE-2025-5777 I’d be interested to hear - Signal GossiTheDog.1337, obviously I won’t publish details.
I’ve already had one contact, which is an incident with a ransomware group initial access - I’d be interested to help people compare notes on IP addresses and such so there’s a common understanding of level of activity and scale of threat.
##CVE ID: CVE-2025-5777
Vendor: Citrix
Product: NetScaler ADC and Gateway
Date Added: 2025-07-10
Notes: https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420 ; https://nvd.nist.gov/vuln/detail/CVE-2025-5777
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-5777
I believe Citrix may have made a mistake in the patching instructions for CitrixBleed2 aka CVE-2025-5777.
They say to do the instructions on the left, but they appear to have missed other session types (e.g. AAA) which have session cookies that can be stolen and replayed with CitrixBleed2. On the right is the CitrixBleed1 instructions.
The net impact is, if you patched but a threat actor already took system memory, they can still reuse prior sessions.
Tell anybody you know at Citrix.
##Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777) https://www.helpnetsecurity.com/2025/07/08/cve-2025-5777-indicators-of-compromise/ #Horizon3ai #ReliaQuest #Don'tmiss #NetScaler #WatchTowr #Hotstuff #exploit #Citrix #News #PoC
##More from @greynoise telemetry - they now push CVE-2025-5777 (CitrixBleed 2) exploitation to June 23rd. I can push it back further, blog incoming.
##Public exploits released for CitrixBleed 2 NetScaler flaw, patch now
Researchers have released proof-of-concept (PoC) exploits for a critical Citrix NetScaler vulnerability, tracked as CVE-2025-5777 and dubbed...
🔗️ [Bleepingcomputer] https://link.is.it/UNCVV1
##updated 2025-07-11T22:57:08
2 posts
A Friday advisory from Facebook? Nice.
https://www.facebook.com/security/advisories/cve-2025-30402
##Description: A heap-buffer-overflow vulnerability in the loading of ExecuTorch methods can cause the runtime to crash and potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit 93b1a0c15f7eda49b2bc46b5b4c49557b4e9810f
A Friday advisory from Facebook? Nice.
https://www.facebook.com/security/advisories/cve-2025-30402
##Description: A heap-buffer-overflow vulnerability in the loading of ExecuTorch methods can cause the runtime to crash and potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit 93b1a0c15f7eda49b2bc46b5b4c49557b4e9810f
updated 2025-07-11T20:15:24.100000
2 posts
And another one.
https://www.facebook.com/security/advisories/cve-2025-30403
##A heap-buffer-overflow vulnerability is possible in mvfst via a specially crafted message during a QUIC session. This issue affects mvfst versions prior to v2025.07.07.00.
And another one.
https://www.facebook.com/security/advisories/cve-2025-30403
##A heap-buffer-overflow vulnerability is possible in mvfst via a specially crafted message during a QUIC session. This issue affects mvfst versions prior to v2025.07.07.00.
updated 2025-07-11T19:15:24.217000
1 posts
⚠️ CVE-2025-7503: V380 IP Camera (v1.0.6.0) has CRITICAL hard-coded Telnet creds, allowing root access! No fix—block port 23, segment cameras, monitor for Telnet. Replace devices ASAP. https://radar.offseq.com/threat/cve-2025-7503-cwe-798-use-of-hard-coded-credential-debb8405 #OffSeq #IoTSecurity #CVE2025
##updated 2025-07-11T18:30:35
2 posts
sev:MED 4.1 - CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L
##GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of \"Member name contains '..'\" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain \"x -> ../../../../../home/victim/.ssh\" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal.
sev:MED 4.1 - CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L
##GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of \"Member name contains '..'\" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain \"x -> ../../../../../home/victim/.ssh\" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal.
updated 2025-07-11T17:29:00.883000
2 posts
Ivanti July security update and advisories: https://www.ivanti.com/blog/july-security-update-2025
- July Security Advisory Ivanti Connect Secure and Ivanti Policy Secure (Multiple CVEs) https://forums.ivanti.com/s/article/July-Security-Advisory-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Multiple-CVEs?language=en_US
- Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2025-6770, CVE-2025-6771) https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2025-6770-CVE-2025-6771?language=en_US
- Security Advisory July 2025 for Ivanti EPM 2024 SU2 and EPM 2022 SU8 https://forums.ivanti.com/s/article/Security-Advisory-July-2025-for-Ivanti-EPM-2024-SU2-and-EPM-2022-SU8?language=en_US #cybersecurity #infoec #Ivanti
##Add a post-auth RCE or two to that list.
##OS command injection in Ivanti Endpoint Manager Mobile (EPMM) before version 12.5.0.2 allows a remote authenticated attacker with high privileges to achieve remote code execution
updated 2025-07-11T16:15:27.143000
1 posts
🛑 CRITICAL: CVE-2025-7028 in GIGABYTE UEFI-SmiFlash v1.0.0 enables local attackers to corrupt/exfiltrate SMRAM or install persistent implants. No patch yet—restrict admin access & enforce Secure Boot! https://radar.offseq.com/threat/cve-2025-7028-cwe-822-untrusted-pointer-dereferenc-6579825e #OffSeq #FirmwareThreat #CVE2025 #UEFI
##updated 2025-07-11T16:15:27.053000
1 posts
🚨 CVE-2025-7027: CRITICAL flaw in GIGABYTE UEFI-GenericComponentSmmEntry v1.0.0 allows local attackers to write arbitrary data in SMRAM for SMM-level escalation. No patch yet—restrict access, monitor, and check for updates! https://radar.offseq.com/threat/cve-2025-7027-cwe-822-untrusted-pointer-dereferenc-d882eaad #OffSeq #FirmwareSecurity #CVE2025 #GIGABYTE #VulnInfo
##updated 2025-07-11T15:31:37
1 posts
SSRF in JGM Pandoc.
https://github.com/jgm/pandoc/issues/10682
##A Server-Side Request Forgery (SSRF) in JGM Pandoc v3.6.4 allows attackers to gain access to and compromise the whole infrastructure via injecting a crafted iframe.
updated 2025-07-11T15:15:25.570000
5 posts
🚨 CVE-2025-52950 (CRITICAL, CVSS 9.6): Juniper Security Director 24.4.1 has a missing authorization flaw letting unauthenticated attackers read/tamper with sensitive resources via the web UI. Patch ASAP, restrict access, and monitor logs! https://radar.offseq.com/threat/cve-2025-52950-cwe-862-missing-authorization-in-ju-cd4c5f5d #OffSeq #Juniper #CVE202552950 #Infosec
##Authorization bypass flaw in Juniper Security Director enables access to sensitive resources
Juniper Networks patched a critical vulnerability (CVE-2025-52950) in its Security Director network management platform that allows unauthenticated attackers to access sensitive resources and potentially compromise downstream managed devices including firewalls, switches, and routers due to missing authorization controls.
**If you have Juniper Security Director network management platforms, make sure to isolate the web interface from the internet and make it available only through trusted networks. Then plan an update to Software Bundle Update 24.4.1-1703 or later. Not a panic mode if you have isolated the web interface, but still a lot of endpoints are problematic so better to patch.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/authentication-bypass-flaw-in-juniper-security-director-enables-unauthenticated-access-to-sensitive-resources-8-a-z-m-y/gD2P6Ple2L
Juniper has published a bunch of security advisories since Wednesday:
These two are the only ones they rated as sev:CRIT
but I haven't had time to actually read through any of them yet:
Authorization bypass flaw in Juniper Security Director enables access to sensitive resources
Juniper Networks patched a critical vulnerability (CVE-2025-52950) in its Security Director network management platform that allows unauthenticated attackers to access sensitive resources and potentially compromise downstream managed devices including firewalls, switches, and routers due to missing authorization controls.
**If you have Juniper Security Director network management platforms, make sure to isolate the web interface from the internet and make it available only through trusted networks. Then plan an update to Software Bundle Update 24.4.1-1703 or later. Not a panic mode if you have isolated the web interface, but still a lot of endpoints are problematic so better to patch.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/authentication-bypass-flaw-in-juniper-security-director-enables-unauthenticated-access-to-sensitive-resources-8-a-z-m-y/gD2P6Ple2L
Juniper has published a bunch of security advisories since Wednesday:
These two are the only ones they rated as sev:CRIT
but I haven't had time to actually read through any of them yet:
updated 2025-07-11T06:30:36
1 posts
Axis published some interesting advisories.
Here's a sev:CRIT
post-auth RCE:
https://www.axis.com/dam/public/9b/a5/72/cve-2025-30023pdf-en-US-485733.pdf
and an LPE:
https://www.axis.com/dam/public/40/0e/03/cve-2025-30025pdf-en-US-485736.pdf
But since those are post-auth, you first need access, right? Well you're in luck because here's an auth bypass:
https://www.axis.com/dam/public/a3/42/92/cve-2025-30026pdf-en-US-485735.pdf
And an AitM attack that the description is vague on:
https://www.axis.com/dam/public/01/d9/24/cve-2025-30024pdf-en-US-485734.pdf
No PoCs here but they were reported by Team82 so maybe there will be a write-up soon.
##updated 2025-07-11T06:30:36
1 posts
Axis published some interesting advisories.
Here's a sev:CRIT
post-auth RCE:
https://www.axis.com/dam/public/9b/a5/72/cve-2025-30023pdf-en-US-485733.pdf
and an LPE:
https://www.axis.com/dam/public/40/0e/03/cve-2025-30025pdf-en-US-485736.pdf
But since those are post-auth, you first need access, right? Well you're in luck because here's an auth bypass:
https://www.axis.com/dam/public/a3/42/92/cve-2025-30026pdf-en-US-485735.pdf
And an AitM attack that the description is vague on:
https://www.axis.com/dam/public/01/d9/24/cve-2025-30024pdf-en-US-485734.pdf
No PoCs here but they were reported by Team82 so maybe there will be a write-up soon.
##updated 2025-07-11T06:30:36
1 posts
Axis published some interesting advisories.
Here's a sev:CRIT
post-auth RCE:
https://www.axis.com/dam/public/9b/a5/72/cve-2025-30023pdf-en-US-485733.pdf
and an LPE:
https://www.axis.com/dam/public/40/0e/03/cve-2025-30025pdf-en-US-485736.pdf
But since those are post-auth, you first need access, right? Well you're in luck because here's an auth bypass:
https://www.axis.com/dam/public/a3/42/92/cve-2025-30026pdf-en-US-485735.pdf
And an AitM attack that the description is vague on:
https://www.axis.com/dam/public/01/d9/24/cve-2025-30024pdf-en-US-485734.pdf
No PoCs here but they were reported by Team82 so maybe there will be a write-up soon.
##updated 2025-07-11T06:30:36
1 posts
Axis published some interesting advisories.
Here's a sev:CRIT
post-auth RCE:
https://www.axis.com/dam/public/9b/a5/72/cve-2025-30023pdf-en-US-485733.pdf
and an LPE:
https://www.axis.com/dam/public/40/0e/03/cve-2025-30025pdf-en-US-485736.pdf
But since those are post-auth, you first need access, right? Well you're in luck because here's an auth bypass:
https://www.axis.com/dam/public/a3/42/92/cve-2025-30026pdf-en-US-485735.pdf
And an AitM attack that the description is vague on:
https://www.axis.com/dam/public/01/d9/24/cve-2025-30024pdf-en-US-485734.pdf
No PoCs here but they were reported by Team82 so maybe there will be a write-up soon.
##updated 2025-07-11T00:15:26.597000
1 posts
CISA reports multiple vulnerabilities in Emerson ValveLink products, at least one critical
CISA reported multiple vulnerabilities in Emerson's ValveLink product line affecting critical manufacturing systems, including a critical flaw (CVE-2025-52579) that stores sensitive information in cleartext memory, potentially allowing attackers to read sensitive data, tamper with system parameters, and execute unauthorized code.
**If you have Emerson ValveLink products (SOLO, DTM, PRM, or SNAP-ON), make sure it's isolated from the internet and accessible only from trusted networks. Then check your version and plan an upgrade to ValveLink 14.0. The issues may not be immediately exploitable, but given enough time it will be exploited. Plan a regular patch.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/cisa-reports-multiple-vulnerabilities-in-emerson-valvelink-products-at-least-one-critical-9-j-n-f-7/gD2P6Ple2L
updated 2025-07-10T21:32:00
2 posts
Worth noting this: PHP version, discontinued since 2009.
Copied/pasted from https://nvd.nist.gov/vuln/detail/CVE-2025-34102
##🚨 CVE-2025-34102: CRITICAL RCE in discontinued CryptoLog PHP! Unauthenticated attackers can chain SQLi (login.php) ➡️ command injection (logshares_ajax.php) for shell access. No patch—migrate or isolate now. https://radar.offseq.com/threat/cve-2025-34102-cwe-89-improper-neutralization-of-s-7d380c2e #OffSeq #Vulnerability #RCE #PHP #Infosec
##updated 2025-07-10T21:31:59
2 posts
@Cali Probably not on the site yet.
https://github.com/CVEProject/cvelistV5/blob/main/cves/2025/53xxx/CVE-2025-53709.json
##I don't see Palantir CVEs often but when I do, they definitely catch my eye.
##Secure-upload is a data submission service that validates single-use tokens when accepting submissions to channels. The service only installed on a small number of environments. Under specific circumstances, privileged users of secure-upload could have selected email templates not necessarily created for their enrollment when sending data upload requests. Authenticated and privileged users of one enrollment could have abused an endpoint to redirect existing submission channels to a dataset they control. An endpoint handling domain validation allowed unauthenticated users to enumerate existing enrollments. Finally, other endpoints allowed enumerating if a resource with a known RID exists across enrollments. The affected service has been patched with version 0.815.0 and automatically deployed to all Apollo-managed Foundry instances.
An attacker exploits a weakness in the configuration of access controls and is able to bypass the intended protection that these measures guard against and thereby obtain unauthorized access to the system or network. Sensitive functionality should always be protected with access controls. However configuring all but the most trivial access control systems can be very complicated and there are many opportunities for mistakes. If an attacker can learn of incorrectly configured access security settings, they may be able to exploit this in an attack.
updated 2025-07-10T21:12:15
1 posts
That's an interesting workflow.
https://access.redhat.com/security/cve/CVE-2025-7365
##A flaw was found in Keycloak. When an authenticated attacker attempts to merge accounts with another existing account during an identity provider (IdP) login, the attacker will subsequently be prompted to "review profile" information. This vulnerability allows the attacker to modify their email address to match that of a victim's account, triggering a verification email sent to the victim's email address. The attacker's email address is not present in the verification email content, making it a potential phishing opportunity. If the victim clicks the verification link, the attacker can gain access to the victim's account.
updated 2025-07-10T18:31:34
1 posts
Eight CVEs patched today in Apache HTTP server. All sev:LOW
or sev:MED
per Apache.
https://httpd.apache.org/security/vulnerabilities_24.html
https://www.cve.org/CVERecord?id=CVE-2024-42516
https://www.cve.org/CVERecord?id=CVE-2024-43204
https://www.cve.org/CVERecord?id=CVE-2024-43394
https://www.cve.org/CVERecord?id=CVE-2024-47252
https://www.cve.org/CVERecord?id=CVE-2025-23048
https://www.cve.org/CVERecord?id=CVE-2025-49630
##updated 2025-07-10T18:31:34
1 posts
Eight CVEs patched today in Apache HTTP server. All sev:LOW
or sev:MED
per Apache.
https://httpd.apache.org/security/vulnerabilities_24.html
https://www.cve.org/CVERecord?id=CVE-2024-42516
https://www.cve.org/CVERecord?id=CVE-2024-43204
https://www.cve.org/CVERecord?id=CVE-2024-43394
https://www.cve.org/CVERecord?id=CVE-2024-47252
https://www.cve.org/CVERecord?id=CVE-2025-23048
https://www.cve.org/CVERecord?id=CVE-2025-49630
##updated 2025-07-10T18:31:34
1 posts
Eight CVEs patched today in Apache HTTP server. All sev:LOW
or sev:MED
per Apache.
https://httpd.apache.org/security/vulnerabilities_24.html
https://www.cve.org/CVERecord?id=CVE-2024-42516
https://www.cve.org/CVERecord?id=CVE-2024-43204
https://www.cve.org/CVERecord?id=CVE-2024-43394
https://www.cve.org/CVERecord?id=CVE-2024-47252
https://www.cve.org/CVERecord?id=CVE-2025-23048
https://www.cve.org/CVERecord?id=CVE-2025-49630
##updated 2025-07-10T18:31:34
1 posts
Eight CVEs patched today in Apache HTTP server. All sev:LOW
or sev:MED
per Apache.
https://httpd.apache.org/security/vulnerabilities_24.html
https://www.cve.org/CVERecord?id=CVE-2024-42516
https://www.cve.org/CVERecord?id=CVE-2024-43204
https://www.cve.org/CVERecord?id=CVE-2024-43394
https://www.cve.org/CVERecord?id=CVE-2024-47252
https://www.cve.org/CVERecord?id=CVE-2025-23048
https://www.cve.org/CVERecord?id=CVE-2025-49630
##updated 2025-07-10T18:31:34
1 posts
And more info ( PoCs ) on this one and its relatives. Might be of interest to @Dio9sys and @da_667
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2025-47811.txt
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2025-47812.txt
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2025-47813.txt
##updated 2025-07-10T18:31:28
13 posts
5 repos
https://github.com/0xcan1337/CVE-2025-47812-poC
https://github.com/ill-deed/WingFTP-CVE-2025-47812-illdeed
https://github.com/pevinkumar10/CVE-2025-47812
What the NULL?! Wing FTP Server RCE (CVE-2025-47812)
#CVE_2025_47812
https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/
Critical RCE Exploit in Wing FTP Server (CVE-2025-47812) Actively Targeted Within 24 Hours of Disclosure
A Fast-Moving Threat Demands Swift Action A newly disclosed zero-day vulnerability in the widely used Wing FTP Server has already been weaponized by threat actors within hours of its announcement. Identified as CVE-2025-47812, this remote code execution (RCE) flaw exposes countless enterprise systems to full compromise, allowing attackers to gain root or…
##Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild – Source:thehackernews.com https://ciso2ciso.com/critical-wing-ftp-server-vulnerability-cve-2025-47812-actively-being-exploited-in-the-wild-sourcethehackernews-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #TheHackerNews #Critical
##Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812) https://www.helpnetsecurity.com/2025/07/11/critical-wing-ftp-server-vulnerability-exploited-in-the-wild-cve-2025-47812/ #vulnerability #WingFTPServer #filesharing #RCESecurity #Don'tmiss #Hotstuff #Huntress #exploit #Censys #News #SMBs #MSP #PoC
##Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild https://thehackernews.com/2025/07/critical-wing-ftp-server-vulnerability.html
##Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild https://thehackernews.com/2025/07/critical-wing-ftp-server-vulnerability.html
##Huntress's John Hammond, Jamie Levy, Lindsey O'Donnell-Welch & Michael Tigges observed exploitation of a remote code execution Wing FTP Server bug (CVE-2025-47812). Organizations running Wing FTP Server should update to the fixed version. https://www.huntress.com/blog/wing-ftp-server-remote-code-execution-cve-2025-47812-exploited-in-wild
##Threat actors started exploiting a vulnerability in Wing FTP servers a day after disclosure
The vulnerability (CVE-2025-47812) allows attackers to bypass authentication on the FTP server's web interface by appending a null byte to the username.
https://www.huntress.com/blog/wing-ftp-server-remote-code-execution-cve-2025-47812-exploited-in-wild
##And more info ( PoCs ) on this one and its relatives. Might be of interest to @Dio9sys and @da_667
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2025-47811.txt
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2025-47812.txt
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2025-47813.txt
##Per Huntress, CVE-2025-47812 is EITW.
https://www.huntress.com/blog/wing-ftp-server-remote-code-execution-cve-2025-47812-exploited-in-wild
TL;DR: Huntress saw active exploitation of Wing FTP Server remote code execution (CVE-2025-47812) on a customer on July 1, 2025. Organizations running Wing FTP Server should update to the fixed version, version 7.4.4, as soon as possible.
CVE-2025-47812 is a null byte and Lua injection flaw that can lead to root/SYSTEM-level remote code execution if exploited. The vulnerability was first publicly disclosed on June 30 by Julien Ahrens in versions prior to 7.4.4 of the Wing FTP Server, its file transfer protocol software for Windows, Linux, and macOS.
Edit to add more info:
https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
🥳
##In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.
Huntress: Wing FTP Server Remote Code Execution (CVE-2025-47812) Exploited in the Wild https://www.huntress.com/blog/wing-ftp-server-remote-code-execution-cve-2025-47812-exploited-in-wild @huntress #cybersecurity #infosec
##What the NULL?! Wing FTP Server RCE (CVE-2025-47812) https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/
##updated 2025-07-10T18:31:28
1 posts
Eight CVEs patched today in Apache HTTP server. All sev:LOW
or sev:MED
per Apache.
https://httpd.apache.org/security/vulnerabilities_24.html
https://www.cve.org/CVERecord?id=CVE-2024-42516
https://www.cve.org/CVERecord?id=CVE-2024-43204
https://www.cve.org/CVERecord?id=CVE-2024-43394
https://www.cve.org/CVERecord?id=CVE-2024-47252
https://www.cve.org/CVERecord?id=CVE-2025-23048
https://www.cve.org/CVERecord?id=CVE-2025-49630
##updated 2025-07-10T18:31:27
1 posts
Eight CVEs patched today in Apache HTTP server. All sev:LOW
or sev:MED
per Apache.
https://httpd.apache.org/security/vulnerabilities_24.html
https://www.cve.org/CVERecord?id=CVE-2024-42516
https://www.cve.org/CVERecord?id=CVE-2024-43204
https://www.cve.org/CVERecord?id=CVE-2024-43394
https://www.cve.org/CVERecord?id=CVE-2024-47252
https://www.cve.org/CVERecord?id=CVE-2025-23048
https://www.cve.org/CVERecord?id=CVE-2025-49630
##updated 2025-07-10T18:15:24.280000
1 posts
Go hack Discord shit.
https://github.com/miraheze/DiscordNotifications/security/advisories/GHSA-gvfx-p3h5-qf65
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H
##DiscordNotifications is an extension for MediaWiki that sends notifications of actions in your Wiki to a Discord channel. DiscordNotifications allows sending requests via curl and file_get_contents to arbitrary URLs set via $wgDiscordIncomingWebhookUrl and $wgDiscordAdditionalIncomingWebhookUrls. This allows for DOS by causing the server to read large files. SSRF is also possible if there are internal unprotected APIs that can be accessed using HTTP POST requests, which could also possibly lead to RCE. This vulnerability is fixed in commit 1f20d850cbcce5b15951c7c6127b87b927a5415e.
updated 2025-07-10T17:15:48.337000
1 posts
Eight CVEs patched today in Apache HTTP server. All sev:LOW
or sev:MED
per Apache.
https://httpd.apache.org/security/vulnerabilities_24.html
https://www.cve.org/CVERecord?id=CVE-2024-42516
https://www.cve.org/CVERecord?id=CVE-2024-43204
https://www.cve.org/CVERecord?id=CVE-2024-43394
https://www.cve.org/CVERecord?id=CVE-2024-47252
https://www.cve.org/CVERecord?id=CVE-2025-23048
https://www.cve.org/CVERecord?id=CVE-2025-49630
##updated 2025-07-10T17:15:46.933000
1 posts
And more info ( PoCs ) on this one and its relatives. Might be of interest to @Dio9sys and @da_667
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2025-47811.txt
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2025-47812.txt
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2025-47813.txt
##updated 2025-07-10T17:15:45.987000
1 posts
Eight CVEs patched today in Apache HTTP server. All sev:LOW
or sev:MED
per Apache.
https://httpd.apache.org/security/vulnerabilities_24.html
https://www.cve.org/CVERecord?id=CVE-2024-42516
https://www.cve.org/CVERecord?id=CVE-2024-43204
https://www.cve.org/CVERecord?id=CVE-2024-43394
https://www.cve.org/CVERecord?id=CVE-2024-47252
https://www.cve.org/CVERecord?id=CVE-2025-23048
https://www.cve.org/CVERecord?id=CVE-2025-49630
##updated 2025-07-10T15:31:41
1 posts
Ecovacs Whoopsie.
##During the pairing process, the Ecovacs Deebot T10 creates an open Wi-Fi network, and the mobile app instructs the user to connect to this open, unencrypted Wi-Fi network. Once connected, the mobile app sends the user’s home Wi-Fi network password to the Ecovacs Deebot T10 through cleartext HTTP protocol over the cleartext open Wi-Fi network using the endpoint /rcp.do via POST request.
updated 2025-07-10T15:31:21
1 posts
updated 2025-07-10T13:19:18.800000
6 posts
The weekly Cyber Intel Brief by AJ Nash is out! ⚠️
A suspected North American APT, NightEagle, targets Chinese tech sectors. Meanwhile, AI-powered impersonation attacks hit high-profile U.S. figures like Secretary of State Marco Rubio.
🔧 Microsoft patches 137 vulnerabilities including a wormable SPNEGO flaw (CVE-2025-47981).
🛡️ CISA adds 6 more to the KEV catalog—compliance due July 28–31.
Dive into the full brief ⬇️
https://bit.ly/4lKU9M9
The weekly Cyber Intel Brief by AJ Nash is out! ⚠️
A suspected North American APT, NightEagle, targets Chinese tech sectors. Meanwhile, AI-powered impersonation attacks hit high-profile U.S. figures like Secretary of State Marco Rubio.
🔧 Microsoft patches 137 vulnerabilities including a wormable SPNEGO flaw (CVE-2025-47981).
🛡️ CISA adds 6 more to the KEV catalog—compliance due July 28–31.
Dive into the full brief ⬇️
https://bit.ly/4lKU9M9
Bad enough Microsoft patched their old shit, update your servers folks.
https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-47981
##Microsoft fixes critical wormable Windows flaw (CVE-2025-47981) https://www.helpnetsecurity.com/2025/07/09/microsoft-fixes-critical-wormable-windows-flaw-cve-2025-47981/ #MicrosoftEdge #WindowsServer #PatchTuesday #SharePoint #TrendMicro #Don'tmiss #Hotstuff #MSOffice #Tenable #Windows #Ivanti #Qualys #News
##Microsoft releases July 2025 Patch fixing one critical zero-day, 129 other flaws
Microsoft's July 2025 Patch Tuesday addressed 130 vulnerabilities including one publicly disclosed zero-day in SQL Server (CVE-2025-49719) and 14 critical-severity flaws. One critical flaw (CVE-2025-47981) marked as "More Likely" to be exploited within 30 days.
**This month prioritize patching of Microsoft Office, SQL Server, SharePoint, and Windows domain controllers. Those are impacted by the critical issues. Don't forget to update your Windows PCs/Laptops, since we all use them on the internet and this list of flaws will be abused by hackers.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/microsoft-releases-july-2025-patch-fixing-one-critical-zero-day-129-other-flaws-1-g-c-c-f/gD2P6Ple2L
SPNEGO RCE again.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47981
sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
updated 2025-07-10T13:19:18.800000
1 posts
Posted yesterday: AMD Transient Scheduler Attacks, relating to CVE-2024-36350, CVE-2024-36357, CVE-2024-36348, and CVE-2024-36349 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html #AMD #cybersecurity #infosec
##updated 2025-07-10T13:19:18.800000
1 posts
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48804
Acceptance of extraneous untrusted data with trusted data in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.
Huh, I wonder what they mean by a feature
.
A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.
Oh, so like the main feature of BitLocker. Got it.
An attacker could exploit this vulnerability by loading a WinRE.wim file while the OS volume is unlocked, granting access to BitLocker encrypted data.
😶
##updated 2025-07-10T13:18:53.830000
1 posts
Oh hello, this one is even better. Hardcoded creds FTW. HPE really does copy Cisco, don't they?
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04894en_us&docLocale=en_US
sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
##Hard-coded login credentials were found in HPE Networking Instant On Access Points, allowing anyone with knowledge of it to bypass normal device authentication. Successful exploitation could allow a remote attacker to gain administrative access to the system.
updated 2025-07-10T13:18:53.830000
1 posts
ZipSlip in Juju. That counts as a ../
https://github.com/juju/juju/security/advisories/GHSA-24ch-w38v-xmh8
sev:HIGH 8.8 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
##Any user with a Juju account on a controller can upload a charm to the /charms endpoint.
No specific permissions are required - it's just sufficient for the user to exist in the controller user database.
A charm which exploits the zip slip vulnerability may be used to allow such a user to get access to a machine running a unit using the affected charm.
updated 2025-07-10T13:17:30.017000
1 posts
Mitsubishi Electric getting in on the hardcoded creds game. Also in the advisory is a weak password requirements vuln but that's to be expected in OT stuff.
https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-007_en.pdf
##updated 2025-07-10T13:17:30.017000
1 posts
Gallagher Security with a few CVEs. Mostly posting these because PHYSEC is always fun and seeing 125kHz gives me the nostalgia.
https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2025-44003
https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2025-35983
https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2025-46406
##updated 2025-07-10T13:17:30.017000
1 posts
GitLab with another release with security fixes. Nothing too interesting, at least to me before my coffee.
https://about.gitlab.com/releases/2025/07/09/patch-release-gitlab-18-1-2-released/
https://nvd.nist.gov/vuln/detail/CVE-2025-6948
https://nvd.nist.gov/vuln/detail/CVE-2025-3396
##updated 2025-07-10T13:17:30.017000
1 posts
New.
Palo Alto just listed several security advisories: Main portal: https://security.paloaltonetworks.com/
- CVE-2025-0139 Autonomous Digital Experience Manager: Privilege Escalation (PE) Vulnerability https://security.paloaltonetworks.com/CVE-2025-0139
- CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App https://security.paloaltonetworks.com/CVE-2025-0140
- CVE-2025-0141 GlobalProtect App: Privilege Escalation (PE) Vulnerability https://security.paloaltonetworks.com/CVE-2025-0141
Update bulletin: https://security.paloaltonetworks.com/PAN-SA-2025-0012 #cybersecurity #infosec #PaloAlto
##updated 2025-07-10T13:17:30.017000
1 posts
Heads-up, RSS nerds.
https://github.com/RSSNext/Folo/security/advisories/GHSA-h87r-5w74-qfm4
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
##Folo organizes feeds content into one timeline. Using pull_request_target on .github/workflows/auto-fix-lint-format-commit.yml can be exploited by attackers, since untrusted code can be executed having full access to secrets (from the base repo). By exploiting the vulnerability is possible to exfiltrate GITHUB_TOKEN which has high privileges. GITHUB_TOKEN can be used to completely overtake the repo since the token has content write privileges. This vulnerability is fixed in commit 585c6a591440cd39f92374230ac5d65d7dd23d6a.
updated 2025-07-10T13:17:30.017000
1 posts
Perfect 10 and another good effort in Radiflow iSAP Smart Collector with its EoL OS. Good thing these are only used in airgapped zero trust something something networks.
https://www.cvcn.gov.it/cvcn/cve/CVE-2025-3499
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
The device has two web servers that expose unauthenticated REST APIs on the management network (TCP
ports 8084 and 8086). Exploiting OS command injection through these APIs, an attacker can send arbitrary
commands that are executed with administrative permissions by the underlying operating system.
https://nvd.nist.gov/vuln/detail/CVE-2025-3499
https://www.cvcn.gov.it/cvcn/cve/CVE-2025-3498
sev:CRIT 9.9 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L
An unauthenticated user with management network access can get and
modify the Radiflow iSAP Smart Collector (CentOS 7 - VSAP 1.20)
configuration. The device has two web servers that expose unauthenticated REST APIs on the management network (TCP
ports 8084 and 8086). An attacker can use these APIs to get access to all system settings, modify the configuration
and execute some commands (e.g., system reboot).
https://nvd.nist.gov/vuln/detail/CVE-2025-3498
https://www.cvcn.gov.it/cvcn/cve/CVE-2025-3497
sev:HIGH 8.7 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H
##The Linux distribution underlying the Radiflow iSAP Smart Collector
(CentOS 7 - VSAP 1.20) is obsolete and
reached end of life (EOL) on
June 30, 2024. Thus, any
unmitigated vulnerability could be exploited to affect this product.
updated 2025-07-10T12:31:19
1 posts
Code execution in OpenText Directory Services.
sev:MED 6.3 - CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/S:N/AU:Y/R:A/V:D/RE:L/U:Clear
##Improper Control of Generation of Code ('Code Injection') vulnerability in OpenText™ Directory Services allows Remote Code Inclusion. The vulnerability could allow access to the system via script injection.This issue affects Directory Services: 23.4.
updated 2025-07-10T09:32:40
1 posts
Mitsubishi Electric getting in on the hardcoded creds game. Also in the advisory is a weak password requirements vuln but that's to be expected in OT stuff.
https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-007_en.pdf
##updated 2025-07-10T09:32:40
1 posts
GitLab with another release with security fixes. Nothing too interesting, at least to me before my coffee.
https://about.gitlab.com/releases/2025/07/09/patch-release-gitlab-18-1-2-released/
https://nvd.nist.gov/vuln/detail/CVE-2025-6948
https://nvd.nist.gov/vuln/detail/CVE-2025-3396
##updated 2025-07-10T09:32:40
1 posts
GitLab with another release with security fixes. Nothing too interesting, at least to me before my coffee.
https://about.gitlab.com/releases/2025/07/09/patch-release-gitlab-18-1-2-released/
https://nvd.nist.gov/vuln/detail/CVE-2025-6948
https://nvd.nist.gov/vuln/detail/CVE-2025-3396
##updated 2025-07-10T09:32:39
1 posts
GitLab with another release with security fixes. Nothing too interesting, at least to me before my coffee.
https://about.gitlab.com/releases/2025/07/09/patch-release-gitlab-18-1-2-released/
https://nvd.nist.gov/vuln/detail/CVE-2025-6948
https://nvd.nist.gov/vuln/detail/CVE-2025-3396
##updated 2025-07-10T03:32:17
1 posts
Gallagher Security with a few CVEs. Mostly posting these because PHYSEC is always fun and seeing 125kHz gives me the nostalgia.
https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2025-44003
https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2025-35983
https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2025-46406
##updated 2025-07-10T03:32:13
1 posts
Gallagher Security with a few CVEs. Mostly posting these because PHYSEC is always fun and seeing 125kHz gives me the nostalgia.
https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2025-44003
https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2025-35983
https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2025-46406
##updated 2025-07-10T00:32:01
3 posts
@cR0w As I wrote elsewhere, the CVSS for CVE-2025-0141 makes no sense to me. Why is initial system Confidentiality impact Low?
##New.
Palo Alto just listed several security advisories: Main portal: https://security.paloaltonetworks.com/
- CVE-2025-0139 Autonomous Digital Experience Manager: Privilege Escalation (PE) Vulnerability https://security.paloaltonetworks.com/CVE-2025-0139
- CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App https://security.paloaltonetworks.com/CVE-2025-0140
- CVE-2025-0141 GlobalProtect App: Privilege Escalation (PE) Vulnerability https://security.paloaltonetworks.com/CVE-2025-0141
Update bulletin: https://security.paloaltonetworks.com/PAN-SA-2025-0012 #cybersecurity #infosec #PaloAlto
##I think we can quibble with the CVSS score on this one (I think it's higher), but hey: a local cross-platform privesc in Global Protect. The wording is confusing, but impacted apps suggests it's a problem on Windows/Mac/Linux.
##updated 2025-07-10T00:32:01
1 posts
New.
Palo Alto just listed several security advisories: Main portal: https://security.paloaltonetworks.com/
- CVE-2025-0139 Autonomous Digital Experience Manager: Privilege Escalation (PE) Vulnerability https://security.paloaltonetworks.com/CVE-2025-0139
- CVE-2025-0140 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App https://security.paloaltonetworks.com/CVE-2025-0140
- CVE-2025-0141 GlobalProtect App: Privilege Escalation (PE) Vulnerability https://security.paloaltonetworks.com/CVE-2025-0141
Update bulletin: https://security.paloaltonetworks.com/PAN-SA-2025-0012 #cybersecurity #infosec #PaloAlto
##updated 2025-07-09T22:34:05
7 posts
1 repos
Helm local code execution via a malicious chart – CVE-2025-53547 https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm
##Helm local code execution via a malicious chart – CVE-2025-53547
Link: https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm
Discussion: https://news.ycombinator.com/item?id=44506696
Helm local code execution via a malicious chart – CVE-2025-53547
Link: https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm
Comments: https://news.ycombinator.com/item?id=44506696
Helm local code execution via a malicious chart – CVE-2025-53547
https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm
#ycombinator
Helm local code execution via a malicious chart – CVE-2025-53547
https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm
##Helm local code execution via a malicious chart – CVE-2025-53547
https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm
#HackerNews #Helm #local #code #execution #CVE-2025-53547 #security #vulnerability #malicious #chart
##Code exec in Helm.
https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm
sev:HIGH 8.5 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H
##Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.
updated 2025-07-09T21:32:18
1 posts
A Tenda vuln with no credited reporter and no PoC? Huh.
https://nvd.nist.gov/vuln/detail/CVE-2025-52364
##Insecure Permissions vulnerability in Tenda CP3 Pro Firmware V22.5.4.93 allows the telnet service (telnetd) by default at boot via the initialization script /etc/init.d/eth.sh. This allows remote attackers to connect to the device s shell over the network, potentially without authentication if default or weak credentials are present
updated 2025-07-09T18:30:41
2 posts
33 repos
https://github.com/mirchr/CVE-2025-32463-sudo-chwoot
https://github.com/SpongeBob-369/cve-2025-32463
https://github.com/san8383/CVE-2025-32463
https://github.com/junxian428/CVE-2025-32463
https://github.com/morgenm/sudo-chroot-CVE-2025-32463
https://github.com/4f-kira/CVE-2025-32463
https://github.com/Adonijah01/cve-2025-32463-lab
https://github.com/SysMancer/CVE-2025-32463
https://github.com/K3ysTr0K3R/CVE-2025-32463-EXPLOIT
https://github.com/abrewer251/CVE-2025-32463_Sudo_PoC
https://github.com/nflatrea/CVE-2025-32463
https://github.com/0xAkarii/CVE-2025-32463
https://github.com/cyberpoul/CVE-2025-32463-POC
https://github.com/ill-deed/CVE-2025-32463_illdeed
https://github.com/toohau/CVE-2025-32462-32463-Detection-Script-
https://github.com/zhaduchanhzz/CVE-2025-32463_POC
https://github.com/SkylerMC/CVE-2025-32463
https://github.com/MAAYTHM/CVE-2025-32462_32463-Lab
https://github.com/Mikivirus0/sudoinjection
https://github.com/Chocapikk/CVE-2025-32463-lab
https://github.com/kh4sh3i/CVE-2025-32463
https://github.com/neko205-mx/CVE-2025-32463_Exploit
https://github.com/lowercasenumbers/CVE-2025-32463_sudo_chroot
https://github.com/pevinkumar10/CVE-2025-32463
https://github.com/0xb0rn3/CVE-2025-32463-EXPLOIT
https://github.com/robbert1978/CVE-2025-32463_POC
https://github.com/yeremeu/CVE-2025-32463_chwoot
https://github.com/FreeDurok/CVE-2025-32463-PoC
https://github.com/CIA911/sudo_patch_CVE-2025-32463
https://github.com/pr0v3rbs/CVE-2025-32463_chwoot
https://github.com/B1ack4sh/Blackash-CVE-2025-32463
@BigOld @OldBig @board
我找到了漏洞的官方文档可以看一下
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
CVE-2025-32463
Sudo 1.9.14+ 版本存在漏洞:它在切换环境(chroot)后过早解析路径,导致攻击者能通过伪造/etc/nsswitch.conf等文件,诱骗Sudo加载恶意库(如libnss_xxx.so)。无需特殊权限即可获得root权限,危害极大。
受影响版本:Sudo 1.9.14至1.9.17全系列
最新补丁于2025年6月30日发布
@board
updated 2025-07-09T18:30:40
1 posts
9 repos
https://github.com/cyberpoul/CVE-2025-32462-POC
https://github.com/CryingN/CVE-2025-32462
https://github.com/cybersentinelx1/CVE-2025-32462-Exploit
https://github.com/mylovem313/CVE-2025-32462
https://github.com/toohau/CVE-2025-32462-32463-Detection-Script-
https://github.com/SpongeBob-369/cve-2025-32462
https://github.com/MAAYTHM/CVE-2025-32462_32463-Lab
CVE-2025-32462: sudo: LPE via host option https://access.redhat.com/security/cve/cve-2025-32462
##updated 2025-07-09T18:08:46
4 posts
1 repos
JFrog, from yesterday: Critical RCE Vulnerability in mcp-remote: CVE-2025-6514 Threatens LLM Clients https://jfrog.com/blog/2025-6514-critical-mcp-remote-rce-vulnerability/
More:
The Hacker News: Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads @thehackernews #cybersecurity #infosec #LLM #AI
##Critical RCE Vulnerability in mcp-remote: CVE-2025-6514 Threatens LLM Clients https://jfrog.com/blog/2025-6514-critical-mcp-remote-rce-vulnerability/
##updated 2025-07-09T12:31:41
1 posts
updated 2025-07-09T09:31:17
1 posts
Perfect 10 and another good effort in Radiflow iSAP Smart Collector with its EoL OS. Good thing these are only used in airgapped zero trust something something networks.
https://www.cvcn.gov.it/cvcn/cve/CVE-2025-3499
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
The device has two web servers that expose unauthenticated REST APIs on the management network (TCP
ports 8084 and 8086). Exploiting OS command injection through these APIs, an attacker can send arbitrary
commands that are executed with administrative permissions by the underlying operating system.
https://nvd.nist.gov/vuln/detail/CVE-2025-3499
https://www.cvcn.gov.it/cvcn/cve/CVE-2025-3498
sev:CRIT 9.9 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L
An unauthenticated user with management network access can get and
modify the Radiflow iSAP Smart Collector (CentOS 7 - VSAP 1.20)
configuration. The device has two web servers that expose unauthenticated REST APIs on the management network (TCP
ports 8084 and 8086). An attacker can use these APIs to get access to all system settings, modify the configuration
and execute some commands (e.g., system reboot).
https://nvd.nist.gov/vuln/detail/CVE-2025-3498
https://www.cvcn.gov.it/cvcn/cve/CVE-2025-3497
sev:HIGH 8.7 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H
##The Linux distribution underlying the Radiflow iSAP Smart Collector
(CentOS 7 - VSAP 1.20) is obsolete and
reached end of life (EOL) on
June 30, 2024. Thus, any
unmitigated vulnerability could be exploited to affect this product.
updated 2025-07-09T09:31:17
1 posts
Perfect 10 and another good effort in Radiflow iSAP Smart Collector with its EoL OS. Good thing these are only used in airgapped zero trust something something networks.
https://www.cvcn.gov.it/cvcn/cve/CVE-2025-3499
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
The device has two web servers that expose unauthenticated REST APIs on the management network (TCP
ports 8084 and 8086). Exploiting OS command injection through these APIs, an attacker can send arbitrary
commands that are executed with administrative permissions by the underlying operating system.
https://nvd.nist.gov/vuln/detail/CVE-2025-3499
https://www.cvcn.gov.it/cvcn/cve/CVE-2025-3498
sev:CRIT 9.9 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L
An unauthenticated user with management network access can get and
modify the Radiflow iSAP Smart Collector (CentOS 7 - VSAP 1.20)
configuration. The device has two web servers that expose unauthenticated REST APIs on the management network (TCP
ports 8084 and 8086). An attacker can use these APIs to get access to all system settings, modify the configuration
and execute some commands (e.g., system reboot).
https://nvd.nist.gov/vuln/detail/CVE-2025-3498
https://www.cvcn.gov.it/cvcn/cve/CVE-2025-3497
sev:HIGH 8.7 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H
##The Linux distribution underlying the Radiflow iSAP Smart Collector
(CentOS 7 - VSAP 1.20) is obsolete and
reached end of life (EOL) on
June 30, 2024. Thus, any
unmitigated vulnerability could be exploited to affect this product.
updated 2025-07-09T08:15:25.153000
1 posts
Post more malicious images.
https://access.redhat.com/security/cve/CVE-2025-7345
sev:HIGH 7.5 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
##A flaw exists in gdk‑pixbuf within the gdk_pixbuf__jpeg_image_load_increment function (io-jpeg.c) and in glib’s g_base64_encode_step (glib/gbase64.c). When processing maliciously crafted JPEG images, a heap buffer overflow can occur during Base64 encoding, allowing out-of-bounds reads from heap memory, potentially causing application crashes or arbitrary code execution.`
updated 2025-07-09T00:30:45
1 posts
This one is above a 9.5 though.
https://helpx.adobe.com/security/products/aem-forms/apsb25-67.html
sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
##Adobe Experience Manager (MS) versions 6.5.23.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does not require user interaction. Scope is unchanged.
updated 2025-07-09T00:30:44
1 posts
1 repos
PrivEsc in Windows Virtual Delivery Agent for CVAD and Citrix DaaS.
https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694820
sev:HIGH 7.3 - CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
##Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges in Windows Virtual Delivery Agent for CVAD and Citrix DaaS
updated 2025-07-09T00:30:32
1 posts
Ooh, this one could be fun. And it's below a 9.5, @campuscodi 😉
https://helpx.adobe.com/security/products/connect/apsb25-61.html
sev:CRIT 9.3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
##Adobe Connect versions 24.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does require user interaction and scope is changed.
updated 2025-07-08T21:30:37
1 posts
Some D-Link PoCs for @Dio9sys and @da_667 .
https://github.com/Thir0th/Thir0th-CVE
The newest one in there just had its CVE published about five minutes ago: CVE-2025-7192
##updated 2025-07-08T21:30:32
1 posts
Post-auth command injection in HPE WAPs.
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04894en_us&docLocale=en_US
sev:HIGH 7.2 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
##An authenticated command injection vulnerability exists in the Command line interface of HPE Networking Instant On Access Points. A successful exploitation could allow a remote attacker with elevated privileges to execute arbitrary commands on the underlying operating system as a highly privileged user.
updated 2025-07-08T18:31:51
1 posts
1 repos
Microsoft releases July 2025 Patch fixing one critical zero-day, 129 other flaws
Microsoft's July 2025 Patch Tuesday addressed 130 vulnerabilities including one publicly disclosed zero-day in SQL Server (CVE-2025-49719) and 14 critical-severity flaws. One critical flaw (CVE-2025-47981) marked as "More Likely" to be exploited within 30 days.
**This month prioritize patching of Microsoft Office, SQL Server, SharePoint, and Windows domain controllers. Those are impacted by the critical issues. Don't forget to update your Windows PCs/Laptops, since we all use them on the internet and this list of flaws will be abused by hackers.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/microsoft-releases-july-2025-patch-fixing-one-critical-zero-day-129-other-flaws-1-g-c-c-f/gD2P6Ple2L
updated 2025-07-08T18:31:50
1 posts
Calling @cR0w. You probably saw this, but RCE in Remote Desktop via directory traversal seems...special.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48817
##updated 2025-07-08T18:31:50
2 posts
2 repos
And another one for CVE-2025-48799:
##PoC for CVE-2025-48799, an elevation of privilege vulnerability in Windows Update service https://github.com/Wh04m1001/CVE-2025-48799
##updated 2025-07-08T18:31:50
1 posts
SQLi in Configuration Manager? LMAO. Copilot does it again, huh?
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47178
##Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Configuration Manager allows an authorized attacker to execute code over an adjacent network.
updated 2025-07-08T18:31:49
1 posts
Posted yesterday: AMD Transient Scheduler Attacks, relating to CVE-2024-36350, CVE-2024-36357, CVE-2024-36348, and CVE-2024-36349 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html #AMD #cybersecurity #infosec
##updated 2025-07-08T18:31:49
1 posts
Posted yesterday: AMD Transient Scheduler Attacks, relating to CVE-2024-36350, CVE-2024-36357, CVE-2024-36348, and CVE-2024-36349 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html #AMD #cybersecurity #infosec
##updated 2025-07-08T18:31:47
1 posts
Exploit Wednesday is underway. Unconfirmed PoC for CVE-2025-49677:
##updated 2025-07-08T18:31:45
1 posts
Code injection in Azure Monitor Agent? Damn vibe coding.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47988
##Improper control of generation of code ('code injection') in Azure Monitor Agent allows an unauthorized attacker to execute code over an adjacent network.
updated 2025-07-08T18:31:43
1 posts
Posted yesterday: AMD Transient Scheduler Attacks, relating to CVE-2024-36350, CVE-2024-36357, CVE-2024-36348, and CVE-2024-36349 https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html #AMD #cybersecurity #infosec
##updated 2025-07-08T18:30:28
1 posts
@reverseics It's an old hardcoded password one that was updated today.
https://nvd.nist.gov/vuln/detail/CVE-2012-5862
sev:CRIT 10.0 - AV:N/AC:L/Au:N/C:C/I:C/A:C
🥳
Old Description:
login.php on the Sinapsi eSolar Light Photovoltaic System Monitor (aka Schneider Electric Ezylog photovoltaic SCADA management server), Sinapsi eSolar, and Sinapsi eSolar DUO with firmware before 2.0.2870_2.2.12 establishes multiple hardcoded accounts, which makes it easier for remote attackers to obtain administrative access by leveraging a (1) cleartext password or (2) password hash contained in this script, as demonstrated by a password of astridservice or 36e44c9b64.
New Description:
These Sinapsi devices store hard-coded passwords in the PHP file of the device. By using the hard-coded passwords in the device, attackers can log into the device with administrative privileges. This could allow the attacker to have unauthorized access.
The Finder got changed today too which is what caught my eye:
##Roberto Paleari and Ivan Speziale identified vulnerabilities and released proof-of-concept (exploit) code for the Sinapsi eSolar Light Photovoltaic System Monitor without coordination with Sinapsi or ICS-CERT.
updated 2025-07-08T17:15:34.267000
6 posts
ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs https://thehackernews.com/2025/07/servicenow-flaw-cve-2025-3648-could.html
##ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs https://thehackernews.com/2025/07/servicenow-flaw-cve-2025-3648-could.html
##ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs https://thehackernews.com/2025/07/servicenow-flaw-cve-2025-3648-could.html
##The vulnerability, tracked as CVE-2025-3648 (CVSS score: 8.2), has been described as a case of data inference in Now Platform through conditional access control list (ACL) rules. It has been codenamed Count(er) Strike. https://thehackernews.com/2025/07/servicenow-flaw-cve-2025-3648-could.html
##ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs – Source:thehackernews.com https://ciso2ciso.com/servicenow-flaw-cve-2025-3648-could-lead-to-data-exposure-via-misconfigured-acls-sourcethehackernews-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #TheHackerNews #ServiceNow
##https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB2139567
sev:HIGH 8.2 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
##A vulnerability has been identified in the Now Platform that could result in data being inferred without authorization. Under certain conditional access control list (ACL) configurations, this vulnerability could enable unauthenticated and authenticated users to use range query requests to infer instance data that is not intended to be accessible to them.
updated 2025-07-08T16:18:14.207000
1 posts
Here are some interesting CVEs while we wait for the SAP advisory to be published. Fortunately, they're all post-auth.
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
https://nvd.nist.gov/vuln/detail/CVE-2025-42980
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vulnerability. This allows an attacker with high privileges to create a new report with his own code potentially gaining full control of the affected SAP system causing high impact on confidentiality, integrity, and availability of the application.
https://nvd.nist.gov/vuln/detail/CVE-2025-42967
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver XML Data Archiving Service allows an authenticated attacker with administrative privileges to exploit an insecure Java deserialization vulnerability by sending a specially crafted serialized Java object. This could lead to high impact on confidentiality, integrity, and availability of the application.
https://nvd.nist.gov/vuln/detail/CVE-2025-42966
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver Enterprise Portal Administration is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
https://nvd.nist.gov/vuln/detail/CVE-2025-42964
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
A critical vulnerability in SAP NetWeaver Application server for Java Log Viewer enables authenticated administrator users to exploit unsafe Java object deserialization. Successful exploitation can lead to full operating system compromise, granting attackers complete control over the affected system. This results in a severe impact on the confidentiality, integrity, and availability of the application and host environment.
https://nvd.nist.gov/vuln/detail/CVE-2025-42963
sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.
https://nvd.nist.gov/vuln/detail/CVE-2025-42959
sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
##SAP Netweaver System Configuration does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could completely compromise the integrity and availability with no impact on confidentiality of the system.
updated 2025-07-08T16:18:14.207000
1 posts
Here are some interesting CVEs while we wait for the SAP advisory to be published. Fortunately, they're all post-auth.
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
https://nvd.nist.gov/vuln/detail/CVE-2025-42980
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vulnerability. This allows an attacker with high privileges to create a new report with his own code potentially gaining full control of the affected SAP system causing high impact on confidentiality, integrity, and availability of the application.
https://nvd.nist.gov/vuln/detail/CVE-2025-42967
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver XML Data Archiving Service allows an authenticated attacker with administrative privileges to exploit an insecure Java deserialization vulnerability by sending a specially crafted serialized Java object. This could lead to high impact on confidentiality, integrity, and availability of the application.
https://nvd.nist.gov/vuln/detail/CVE-2025-42966
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver Enterprise Portal Administration is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
https://nvd.nist.gov/vuln/detail/CVE-2025-42964
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
A critical vulnerability in SAP NetWeaver Application server for Java Log Viewer enables authenticated administrator users to exploit unsafe Java object deserialization. Successful exploitation can lead to full operating system compromise, granting attackers complete control over the affected system. This results in a severe impact on the confidentiality, integrity, and availability of the application and host environment.
https://nvd.nist.gov/vuln/detail/CVE-2025-42963
sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.
https://nvd.nist.gov/vuln/detail/CVE-2025-42959
sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
##SAP Netweaver System Configuration does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could completely compromise the integrity and availability with no impact on confidentiality of the system.
updated 2025-07-08T15:33:05
1 posts
⚠️ CRITICAL: CVE-2025-20686 heap overflow in MediaTek MT6890/MT7915/MT7916/MT7981/MT7986. Remote code execution possible via Wi-Fi, no user interaction needed. Patch when available; segment networks & monitor closely. https://radar.offseq.com/threat/cve-2025-20686-cwe-122-heap-overflow-in-mediatek-i-2e97569f #OffSeq #CVE202520686 #MediaTek #Infosec
##updated 2025-07-08T15:32:10
2 posts
Ivanti July security update and advisories: https://www.ivanti.com/blog/july-security-update-2025
- July Security Advisory Ivanti Connect Secure and Ivanti Policy Secure (Multiple CVEs) https://forums.ivanti.com/s/article/July-Security-Advisory-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Multiple-CVEs?language=en_US
- Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2025-6770, CVE-2025-6771) https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2025-6770-CVE-2025-6771?language=en_US
- Security Advisory July 2025 for Ivanti EPM 2024 SU2 and EPM 2022 SU8 https://forums.ivanti.com/s/article/Security-Advisory-July-2025-for-Ivanti-EPM-2024-SU2-and-EPM-2022-SU8?language=en_US #cybersecurity #infoec #Ivanti
##Add a post-auth RCE or two to that list.
##OS command injection in Ivanti Endpoint Manager Mobile (EPMM) before version 12.5.0.2 allows a remote authenticated attacker with high privileges to achieve remote code execution
updated 2025-07-08T15:32:10
1 posts
Dell published a BIOS security advisory.
https://www.dell.com/support/kbdoc/en-us/000320876/dsa-2025-205
sev:HIGH 8.2 - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
##Dell Client Platform BIOS contains an Improper Access Control Applied to Mirrored or Aliased Memory Regions vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.
updated 2025-07-08T15:32:10
1 posts
Code exec in Fuji Electronic V-SFT and TELLUS provided by FUJI ELECTRIC CO., LTD.
sev:HIGH 8.5 - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
##Opening V9 files or X1 files specially crafted by an attacker on the affected product may lead to arbitrary code execusion.
updated 2025-07-08T12:31:10
1 posts
Multiple vulnerabilities reported in Siemens SINEC NMS, at least one critical
Siemens patched multiple critical vulnerabilities in its SINEC NMS network management system, including a critical flaw (CVE-2025-40736). The company released SINEC NMS version V4.0 to address the vulnerabilities.
**If you have Siemens SINEC NMS network management systems, make sure they are islated from the internet and accessible only from trusted networks. If you are running versions prior to V4.0, plan an update to version V4.0. There is at least one critical flaw that can easily be exploited if a hacker reaches the system. And given enough time, they will. No isolation is perfect.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/multiple-vulnerabilities-reported-in-siemens-sinec-nms-at-least-one-critical-2-0-m-a-h/gD2P6Ple2L
updated 2025-07-08T03:31:08
1 posts
Here are some interesting CVEs while we wait for the SAP advisory to be published. Fortunately, they're all post-auth.
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
https://nvd.nist.gov/vuln/detail/CVE-2025-42980
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vulnerability. This allows an attacker with high privileges to create a new report with his own code potentially gaining full control of the affected SAP system causing high impact on confidentiality, integrity, and availability of the application.
https://nvd.nist.gov/vuln/detail/CVE-2025-42967
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver XML Data Archiving Service allows an authenticated attacker with administrative privileges to exploit an insecure Java deserialization vulnerability by sending a specially crafted serialized Java object. This could lead to high impact on confidentiality, integrity, and availability of the application.
https://nvd.nist.gov/vuln/detail/CVE-2025-42966
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver Enterprise Portal Administration is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
https://nvd.nist.gov/vuln/detail/CVE-2025-42964
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
A critical vulnerability in SAP NetWeaver Application server for Java Log Viewer enables authenticated administrator users to exploit unsafe Java object deserialization. Successful exploitation can lead to full operating system compromise, granting attackers complete control over the affected system. This results in a severe impact on the confidentiality, integrity, and availability of the application and host environment.
https://nvd.nist.gov/vuln/detail/CVE-2025-42963
sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.
https://nvd.nist.gov/vuln/detail/CVE-2025-42959
sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
##SAP Netweaver System Configuration does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could completely compromise the integrity and availability with no impact on confidentiality of the system.
updated 2025-07-08T03:31:08
1 posts
Here are some interesting CVEs while we wait for the SAP advisory to be published. Fortunately, they're all post-auth.
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
https://nvd.nist.gov/vuln/detail/CVE-2025-42980
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vulnerability. This allows an attacker with high privileges to create a new report with his own code potentially gaining full control of the affected SAP system causing high impact on confidentiality, integrity, and availability of the application.
https://nvd.nist.gov/vuln/detail/CVE-2025-42967
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver XML Data Archiving Service allows an authenticated attacker with administrative privileges to exploit an insecure Java deserialization vulnerability by sending a specially crafted serialized Java object. This could lead to high impact on confidentiality, integrity, and availability of the application.
https://nvd.nist.gov/vuln/detail/CVE-2025-42966
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver Enterprise Portal Administration is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
https://nvd.nist.gov/vuln/detail/CVE-2025-42964
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
A critical vulnerability in SAP NetWeaver Application server for Java Log Viewer enables authenticated administrator users to exploit unsafe Java object deserialization. Successful exploitation can lead to full operating system compromise, granting attackers complete control over the affected system. This results in a severe impact on the confidentiality, integrity, and availability of the application and host environment.
https://nvd.nist.gov/vuln/detail/CVE-2025-42963
sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.
https://nvd.nist.gov/vuln/detail/CVE-2025-42959
sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
##SAP Netweaver System Configuration does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could completely compromise the integrity and availability with no impact on confidentiality of the system.
updated 2025-07-08T03:31:02
1 posts
Here are some interesting CVEs while we wait for the SAP advisory to be published. Fortunately, they're all post-auth.
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
https://nvd.nist.gov/vuln/detail/CVE-2025-42980
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vulnerability. This allows an attacker with high privileges to create a new report with his own code potentially gaining full control of the affected SAP system causing high impact on confidentiality, integrity, and availability of the application.
https://nvd.nist.gov/vuln/detail/CVE-2025-42967
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver XML Data Archiving Service allows an authenticated attacker with administrative privileges to exploit an insecure Java deserialization vulnerability by sending a specially crafted serialized Java object. This could lead to high impact on confidentiality, integrity, and availability of the application.
https://nvd.nist.gov/vuln/detail/CVE-2025-42966
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver Enterprise Portal Administration is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
https://nvd.nist.gov/vuln/detail/CVE-2025-42964
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
A critical vulnerability in SAP NetWeaver Application server for Java Log Viewer enables authenticated administrator users to exploit unsafe Java object deserialization. Successful exploitation can lead to full operating system compromise, granting attackers complete control over the affected system. This results in a severe impact on the confidentiality, integrity, and availability of the application and host environment.
https://nvd.nist.gov/vuln/detail/CVE-2025-42963
sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.
https://nvd.nist.gov/vuln/detail/CVE-2025-42959
sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
##SAP Netweaver System Configuration does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could completely compromise the integrity and availability with no impact on confidentiality of the system.
updated 2025-07-08T03:31:02
1 posts
Here are some interesting CVEs while we wait for the SAP advisory to be published. Fortunately, they're all post-auth.
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
https://nvd.nist.gov/vuln/detail/CVE-2025-42980
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vulnerability. This allows an attacker with high privileges to create a new report with his own code potentially gaining full control of the affected SAP system causing high impact on confidentiality, integrity, and availability of the application.
https://nvd.nist.gov/vuln/detail/CVE-2025-42967
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver XML Data Archiving Service allows an authenticated attacker with administrative privileges to exploit an insecure Java deserialization vulnerability by sending a specially crafted serialized Java object. This could lead to high impact on confidentiality, integrity, and availability of the application.
https://nvd.nist.gov/vuln/detail/CVE-2025-42966
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver Enterprise Portal Administration is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
https://nvd.nist.gov/vuln/detail/CVE-2025-42964
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
A critical vulnerability in SAP NetWeaver Application server for Java Log Viewer enables authenticated administrator users to exploit unsafe Java object deserialization. Successful exploitation can lead to full operating system compromise, granting attackers complete control over the affected system. This results in a severe impact on the confidentiality, integrity, and availability of the application and host environment.
https://nvd.nist.gov/vuln/detail/CVE-2025-42963
sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.
https://nvd.nist.gov/vuln/detail/CVE-2025-42959
sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
##SAP Netweaver System Configuration does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could completely compromise the integrity and availability with no impact on confidentiality of the system.
updated 2025-07-08T03:31:01
2 posts
CVE-2025-42967 was updated and almost got that perfect 10.
sev:CRIT 9.9 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
The rest of the SAP #patchTuesday advisories are here:
https://support.sap.com/en/my-support/knowledge-base/security-notes-news/july-2025.html
##Here are some interesting CVEs while we wait for the SAP advisory to be published. Fortunately, they're all post-auth.
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver Enterprise Portal Federated Portal Network is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
https://nvd.nist.gov/vuln/detail/CVE-2025-42980
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP S/4HANA and SAP SCM Characteristic Propagation has remote code execution vulnerability. This allows an attacker with high privileges to create a new report with his own code potentially gaining full control of the affected SAP system causing high impact on confidentiality, integrity, and availability of the application.
https://nvd.nist.gov/vuln/detail/CVE-2025-42967
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver XML Data Archiving Service allows an authenticated attacker with administrative privileges to exploit an insecure Java deserialization vulnerability by sending a specially crafted serialized Java object. This could lead to high impact on confidentiality, integrity, and availability of the application.
https://nvd.nist.gov/vuln/detail/CVE-2025-42966
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
SAP NetWeaver Enterprise Portal Administration is vulnerable when a privileged user can upload untrusted or malicious content which, when deserialized, could potentially lead to a compromise of confidentiality, integrity, and availability of the host system.
https://nvd.nist.gov/vuln/detail/CVE-2025-42964
sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
A critical vulnerability in SAP NetWeaver Application server for Java Log Viewer enables authenticated administrator users to exploit unsafe Java object deserialization. Successful exploitation can lead to full operating system compromise, granting attackers complete control over the affected system. This results in a severe impact on the confidentiality, integrity, and availability of the application and host environment.
https://nvd.nist.gov/vuln/detail/CVE-2025-42963
sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
An unauthenticated attacker may exploit a scenario where a Hashed Message Authentication Code (HMAC) credential, extracted from a system missing specific security patches, is reused in a replay attack against a different system. Even if the target system is fully patched, successful exploitation could result in complete system compromise, affecting confidentiality, integrity, and availability.
https://nvd.nist.gov/vuln/detail/CVE-2025-42959
sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
##SAP Netweaver System Configuration does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could completely compromise the integrity and availability with no impact on confidentiality of the system.
updated 2025-07-01T18:30:34
2 posts
3 repos
https://github.com/abrewer251/CVE-2025-6543_CitrixNetScaler_PoC
@GossiTheDog this one is for CVE-2025-6543
##@GossiTheDog this one is for CVE-2025-6543
##updated 2025-07-01T15:32:11
1 posts
5 repos
https://github.com/9Insomnie/CVE-2025-6554
https://github.com/ghostn4444/POC-CVE-2025-6554
https://github.com/PwnToday/CVE-2025-6554
updated 2025-06-18T21:30:35
2 posts
AhnLab: Grafana Labs Product Security Update Advisory Affecting CVE-2025-6191 and CVE-2025-6192 https://asec.ahnlab.com/en/89002/ #cybersecurity #infosec
##AhnLab: Grafana Labs Product Security Update Advisory Affecting CVE-2025-6191 and CVE-2025-6192 https://asec.ahnlab.com/en/89002/ #cybersecurity #infosec
##updated 2025-06-18T21:30:30
2 posts
AhnLab: Grafana Labs Product Security Update Advisory Affecting CVE-2025-6191 and CVE-2025-6192 https://asec.ahnlab.com/en/89002/ #cybersecurity #infosec
##AhnLab: Grafana Labs Product Security Update Advisory Affecting CVE-2025-6191 and CVE-2025-6192 https://asec.ahnlab.com/en/89002/ #cybersecurity #infosec
##updated 2025-06-10T18:32:36
1 posts
2 repos
The Birth and Death of “LoopyTicket” – Our Story on CVE-2025-33073 https://www.guidepointsecurity.com/blog/the-birth-and-death-of-loopyticket/
##updated 2025-05-19T21:54:44
2 posts
From yesterday.
Coadean Labs: A Write-up of CVE-2025-47934 – Spoofing OpenPGP.js signature verification https://codeanlabs.com/blog/research/cve-2025-47934-spoofing-openpgp-js-signatures/ #cybersecurity #infosec
##From yesterday.
Coadean Labs: A Write-up of CVE-2025-47934 – Spoofing OpenPGP.js signature verification https://codeanlabs.com/blog/research/cve-2025-47934-spoofing-openpgp-js-signatures/ #cybersecurity #infosec
##updated 2025-05-13T03:31:20
1 posts
SAP July 2025 patch day fixes 31 vulnerabilities, one maximum severity
SAP's July 2025 Security Patch Day fixes 31 vulnerabilities across its enterprise software, including a maximum severity vulnerability (CVE-2025-30012) that allows unauthenticated attackers to execute arbitrary OS commands on SAP Supplier Relationship Management systems.
**If you use SAP products, review the advisory in detail. Prioritize SAP Supplier Relationship Management which has a critical unauthenticated remote code execution vulnerability (CVE-2025-30012), then SAP S/4HANA and SAP SCM as well as SAP NetWeaver sustems.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/sap-july-2025-patch-day-fixes-31-vulnerabilities-one-maximum-severity-u-5-r-n-6/gD2P6Ple2L
updated 2025-04-20T01:37:25.860000
1 posts
If you have a #Brother #printer, take a quick #security break, so your printer doesn’t get commandeered into a botnet! 🖨️💪
1. Check if your printer model is on this list and has updated firmware available:
https://support.brother.com/g/s/id/security/CVE-2017-9765.pdf
2. If new firmware is available, download the appropriate updater here:
(EDIT: See replies to this post for alternative, better ideas!)
3. Story for context:
https://www.securityweek.com/new-vulnerabilities-expose-millions-of-brother-printers-to-hacking/
##updated 2025-04-09T20:02:41.860000
1 posts
[CVE-2025-32461] Tiki Wiki CMS Groupware <= 28.3 Two SSTI Vulnerabilities https://karmainsecurity.com/KIS-2025-03
##updated 2025-04-04T18:23:37.283000
1 posts
Critical macOS SMBClient flaws enable remote code execution
Security researchers discovered three vulnerabilities in macOS SMBClient, including a critical remote code execution flaw (CVE-2025-24269) that allows malicious SMB servers to execute with minimal user interaction. Apple has patched all vulnerabilities in macOS Sequoia 15.4.
**Another reason to update to macOS Sequoia 15.4. In the meantime, disable SMB services if you don't need file sharing, and avoid clicking smb:// links from untrusted sources until you've patched.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-macos-smbclient-flaws-enable-remote-code-execution-x-5-t-r-r/gD2P6Ple2L
updated 2025-04-03T19:57:04.207000
1 posts
20 repos
https://github.com/Chocapikk/CVE-2024-36401
https://github.com/daniellowrie/CVE-2024-36401-PoC
https://github.com/0x0d3ad/CVE-2024-36401
https://github.com/amoy6228/CVE-2024-36401_Geoserver_RCE_POC
https://github.com/thestar0/CVE-2024-36401-WoodpeckerPlugin
https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
https://github.com/RevoltSecurities/CVE-2024-36401
https://github.com/netuseradministrator/CVE-2024-36401
https://github.com/justin-p/geoexplorer
https://github.com/bmth666/GeoServer-Tools-CVE-2024-36401
https://github.com/kkhackz0013/CVE-2024-36401
https://github.com/bigb0x/CVE-2024-36401
https://github.com/XiaomingX/cve-2024-36401-poc
https://github.com/Mr-xn/CVE-2024-36401
https://github.com/whitebear-ch/GeoServerExploit
https://github.com/y1s4s/CVE-2024-36401-PoC
https://github.com/ahisec/geoserver-
https://github.com/jakabakos/CVE-2024-36401-GeoServer-RCE
updated 2025-04-02T18:19:23.680000
2 posts
4 repos
https://github.com/cfielding-r7/poc-cve-2023-2868
https://github.com/krmxd/CVE-2023-2868
There is a lot less stuff so far using GNU tar than I expected. Lots of roll-your-own shit though like we saw with CVE-2023-2868 in Barracudas.
##There is a lot less stuff so far using GNU tar than I expected. Lots of roll-your-own shit though like we saw with CVE-2023-2868 in Barracudas.
##updated 2025-03-18T18:30:56
1 posts
Remember the perfect 10 CVE-2024-56346 in IBM NIM? They are just now publishing an advisory that IBM Virtualization Engine TS7700 is vulnerable to it. I know IBM is large, but that seems like a long time to wait to publish that an IBM product is impacted by another IBM vulnerability, especially that one.
##updated 2025-03-18T18:30:44
4 posts
1 repos
Juniper releases patches for Junos OS and Junos OS Evolved to fix "BlastRADIUS" RADIUS protocol flaw
Juniper Networks patched a critical vulnerability called "BlastRADIUS" (CVE-2024-3596) affecting the RADIUS protocol in Junos OS and Junos OS Evolved that allows attackers to bypass authentication and gain unauthorized access to network devices due to improper validation of integrity check values.
**Review your Juniper device configuration. If you have Juniper devices using RADIUS authentication (configurations with [access radius-server]), update to the latest patched Junos OS or Junos OS Evolved versions to fix the BlastRADIUS flaw. If you can't patch, enable RADIUS over TLS (RADSEC) as a temporary workaround to encrypt RADIUS traffic and prevent exploitation of BlastRadius.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/juniper-releases-patches-for-junos-os-and-junos-os-evolved-to-fix-blastradius-radius-protocol-flaw-x-l-7-1-q/gD2P6Ple2L
Juniper has published a bunch of security advisories since Wednesday:
These two are the only ones they rated as sev:CRIT
but I haven't had time to actually read through any of them yet:
Juniper releases patches for Junos OS and Junos OS Evolved to fix "BlastRADIUS" RADIUS protocol flaw
Juniper Networks patched a critical vulnerability called "BlastRADIUS" (CVE-2024-3596) affecting the RADIUS protocol in Junos OS and Junos OS Evolved that allows attackers to bypass authentication and gain unauthorized access to network devices due to improper validation of integrity check values.
**Review your Juniper device configuration. If you have Juniper devices using RADIUS authentication (configurations with [access radius-server]), update to the latest patched Junos OS or Junos OS Evolved versions to fix the BlastRADIUS flaw. If you can't patch, enable RADIUS over TLS (RADSEC) as a temporary workaround to encrypt RADIUS traffic and prevent exploitation of BlastRadius.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/juniper-releases-patches-for-junos-os-and-junos-os-evolved-to-fix-blastradius-radius-protocol-flaw-x-l-7-1-q/gD2P6Ple2L
Juniper has published a bunch of security advisories since Wednesday:
These two are the only ones they rated as sev:CRIT
but I haven't had time to actually read through any of them yet:
updated 2025-03-14T15:32:10
1 posts
1 repos
CVE-2023-52927: Turning a Forgotten #Syzkaller Report into #kCTF #Exploit
##updated 2024-04-04T00:24:27
1 posts
1 repos
CISA warns of actively exploited Zimbra Collaboration Suite flaw
CISA has issued a warning about the active exploitation of CVE-2019-9621, a server-side request forgery (SSRF) vulnerability in Synacor's Zimbra Collaboration Suite that enables remote attackers to achieve code execution, data exfiltration, and system compromise through the ProxyServlet component.
**If you are using Zimbra Collaboration Suite and haven't patched it since 2019, it's time to patch it YESTERDAY! Since you can't patch then, patch now to the latest patched versions. There is an actively exploited SSRF flaw, and Zimbra is by design exposed to the internet. So don't wait for the hackers to call you.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-warns-of-actively-exploited-zimbra-collaboration-suite-flaw-f-p-7-0-1/gD2P6Ple2L
updated 2023-01-27T05:06:05
1 posts
18 posts
3 repos
https://github.com/barbaraogmgf/CVE-2025-25257
https://github.com/0xbigshaq/CVE-2025-25257
https://github.com/watchtowrlabs/watchTowr-vs-FortiWeb-CVE-2025-25257
🚨 Critical alert: A pre-auth RCE exploit (CVE-2025-25257) targeting Fortinet FortiWeb is now public. Patch to 7.6.4+/7.4.8+ immediately or disable HTTP admin interfaces. Unpatched systems are at high risk. Details: https://redteamnews.com/red-team/cve/critical-pre-auth-rce-exploit-released-for-fortinet-fortiweb-patch-immediately/
##🚨CVE-2025-25257: Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector
PoC: https://github.com/watchtowrlabs/watchTowr-vs-FortiWeb-CVE-2025-25257
##New.
WatchTower: Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257) https://labs.watchtowr.com/pre-auth-sql-injection-to-rce-fortinet-fortiweb-fabric-connector-cve-2025-25257/ @watchtower #cybersecurity #infosec
##Critical SQL Injection Flaw in FortiWeb: Urgent Patch Required
Fortinet's Latest Security Challenge Fortinet has disclosed a critical SQL injection vulnerability affecting its FortiWeb product, posing a significant risk to unpatched systems. The flaw, identified as CVE-2025-25257, carries a CVSS severity score of 9.6/10, making it one of the most serious vulnerabilities reported this year. This vulnerability allows unauthenticated attackers to execute arbitrary SQL…
https://undercodenews.com/critical-sql-injection-flaw-in-fortiweb-urgent-patch-required/
##Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257) – Source:thehackernews.com https://ciso2ciso.com/fortinet-releases-patch-for-critical-sql-injection-flaw-in-fortiweb-cve-2025-25257-sourcethehackernews-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #TheHackerNews #Fortinet
##🚨 Critical alert: A pre-auth RCE exploit (CVE-2025-25257) targeting Fortinet FortiWeb is now public. Patch to 7.6.4+/7.4.8+ immediately or disable HTTP admin interfaces. Unpatched systems are at high risk. Details: https://redteamnews.com/red-team/cve/critical-pre-auth-rce-exploit-released-for-fortinet-fortiweb-patch-immediately/
##🚨CVE-2025-25257: Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector
PoC: https://github.com/watchtowrlabs/watchTowr-vs-FortiWeb-CVE-2025-25257
##New.
WatchTower: Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257) https://labs.watchtowr.com/pre-auth-sql-injection-to-rce-fortinet-fortiweb-fabric-connector-cve-2025-25257/ @watchtower #cybersecurity #infosec
##Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257) https://thehackernews.com/2025/07/fortinet-releases-patch-for-critical.html
##Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257) https://thehackernews.com/2025/07/fortinet-releases-patch-for-critical.html
##FortiWeb Pre-Auth RCE (CVE-2025-25257) https://pwner.gg/blog/2025-07-10-fortiweb-fabric-rce
##watchTowr has an even better write-up on CVE-2025-25257 in Fortinet FortiWeb.
##Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257) - watchTowr Labs https://labs.watchtowr.com/pre-auth-sql-injection-to-rce-fortinet-fortiweb-fabric-connector-cve-2025-25257
##Critical SQL injection vulnerability in Fortinet FortiWeb enables unauthenticated remote code execution
Fortinet patched a critical SQL injection vulnerability (CVE-2025-25257) in its FortiWeb web application firewall that allows unauthenticated attackers to execute unauthorized SQL commands and achieve remote code execution through the GUI component.
**If you have Fortinet FortiWeb systems running versions 7.0 through 7.6.3, make sure it's web admin interface is isolated from the internet and accessible from trusted networks. Then plan a quick patch. If you can't patch for extended period (more than a few weeks), consider disabling the web admin interface since that blocks the attacks, but also blocks your normal admin work. Seems easier to patch.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-sql-injection-vulnerability-in-fortinet-fortiweb-enables-unauthenticated-remote-code-execution-f-e-i-9-a/gD2P6Ple2L
I must have posted my Fortinet post too early because I missed this sev:CRIT
SQLi in FortiWeb.
https://fortiguard.fortinet.com/psirt/FG-IR-25-151
Which has a write-up by Arctic Wolf.
##Fortinet : cette injection SQL dans FortiWeb ouvre la porte à l’exécution de commandes malveillantes https://www.it-connect.fr/fortinet-fortiweb-vulnerabilite-cve-2025-25257/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Fortinet
##Looks like this was reported a while ago. CVE was reserved in September 2024.
##Looks like this was reported a while ago. CVE was reserved in September 2024.
##17 posts
15 repos
https://github.com/acheong08/CVE-2025-48384
https://github.com/greatyy/CVE-2025-48384-p
https://github.com/testsssssssss-sss/CVE-2025-48384
https://github.com/kallydev/cve-2025-48384-hook
https://github.com/vinieger/vinieger-CVE-2025-48384-Dockerfile
https://github.com/testdjshan/CVE-2025-48384
https://github.com/NigelX/CVE-2025-48384
https://github.com/altm4n/cve-2025-48384
https://github.com/fishyyh/CVE-2025-48384-POC
https://github.com/liamg/CVE-2025-48384
https://github.com/liamg/CVE-2025-48384-submodule
https://github.com/ppd520/CVE-2025-48384
https://github.com/altm4n/cve-2025-48384-hub
Datadog has a write-up on CVE-2025-48384 in git.
https://securitylabs.datadoghq.com/articles/git-arbitrary-file-write/
##Definitely a day to patch your git installs. There's a PoC for a new git CVE.
I wanted to test it but we all know you don't run PoC code on machines you care about... literally 1 min later on a fresh https://labs.iximiuz.com/ playground test confirms it works!
##@dgl git CVE-2025-48384 👆
Mitigation is not to use submodule functionality from untrusted repos, including via git clone --recursive, which certain IDEs/tools might be doing automatically.
##And another one for CVE-2025-48384:
##CVE-2025-48384: Breaking Git with a carriage return and cloning RCE https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384
##I found a vulnerability in git. CVE-2025-48384: Breaking git with a carriage return and cloning RCE - https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384
As the post explains this is one of my favourite classes of vulnerability, using characters that are old and sometimes forgotten.
##Breaking Git with a carriage return and cloning RCE
Link: https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384
Discussion: https://news.ycombinator.com/item?id=44502330
Breaking Git with a carriage return and cloning RCE
Link: https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384
Comments: https://news.ycombinator.com/item?id=44502330
CVE-2025-48384: Breaking git with a carriage return and cloning RCE https://lobste.rs/s/awmqgc #security #vcs
https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384
CVE-2025-48384: Breaking Git with a carriage return and cloning RCE
Link: https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384
Discussion: https://news.ycombinator.com/item?id=44502330
On Unix-like platforms, if you use git clone --recursive on an untrusted repo, it could achieve remote code execution. Update to a fixed version of git and other software that embeds Git (including GitHub Desktop) https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384
##CVE-2025-48384: A Git flaw allows RCE when cloning malicious repos with --recursive
, due to mishandling of carriage returns in .gitmodules
. Affects GitHub Desktop too. Update now.
Three new advisories in git.
https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9
sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout.
https://nvd.nist.gov/vuln/detail/CVE-2025-48384
https://github.com/git/git/security/advisories/GHSA-m98c-vgpc-9655
sev:HIGH 8.6 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
When cloning a repository Git knows to optionally fetch a bundle advertised by the remote server, which allows the server-side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection.
This protocol injection can cause the client to write the fetched bundle to a location controlled by the adversary. The fetched content is fully controlled by the server, which can in the worst case lead to arbitrary code execution.
https://nvd.nist.gov/vuln/detail/CVE-2025-48385
https://github.com/git/git/security/advisories/GHSA-4v56-3xvj-xvfr
sev:MED 6.3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
##The wincred credential helper uses a static buffer (
target
) as a unique key for storing and comparing against internal storage. This credential helper does not properly bounds check the available space remaining in the buffer before appending to it withwcsncat()
, leading to potential buffer overflows.
CVE-2025-48384: Breaking Git with a carriage return and cloning RCE
Link: https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384
Discussion: https://news.ycombinator.com/item?id=44502330
CVE-2025-48384: Breaking Git with a carriage return and cloning RCE
https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384
#ycombinator
CVE-2025-48384: Breaking Git with a carriage return and cloning RCE
Link: https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384
Comments: https://news.ycombinator.com/item?id=44502330
CVE-2025-48384: Breaking Git with a carriage return and cloning RCE
https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384
#HackerNews #CVE202548384 #Git #Vulnerability #RCE #Cybersecurity #Exploit
##CVE-2025-53628
##cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.20.1, cpp-httplib does not have a limit for a unique line, permitting an attacker to explore this to allocate memory arbitrarily. This vulnerability is fixed in 0.20.1. NOTE: This vulnerability is related to CVE-2025-53629.
CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2025-53628
##cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.20.1, cpp-httplib does not have a limit for a unique line, permitting an attacker to explore this to allocate memory arbitrarily. This vulnerability is fixed in 0.20.1. NOTE: This vulnerability is related to CVE-2025-53629.
CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')
Go hack more Kubernetes shit.
https://github.com/kubernetes-sigs/headlamp/security/advisories/GHSA-34rf-485x-g5h7
sev:HIGH 7.8 - CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
##An attacker who can control any of the affected environment variables can execute arbitrary shell commands on the macOS build system during the packaging process. This is particularly impactful in CI/CD environments where workflows might automatically set environment variables or build unsigned packages without strict checks.
@stsp thanks! Agree, definitely would limit the possibility of code execution; although I'd be careful saying "fairly harmless", consider some sort of supply chain attack that drops an object file but covered by .gitignore. (This is less relevant with the submodule issue, as it's still covered by the submodule's checksum, but potentially more relevant for the other issue I found in bundle-uri -- CVE-2025-48385, luckily that one is not yet on by default).
##Coordinated #git vuln disclosure:
https://lwn.net/ml/all/xmqq5xg2wrd1.fsf@gitster.g/
"CVE-2025-48385, Git:
When cloning a repository Git knows to optionally fetch a bundle
advertised by the remote server, which allows the server-side to
offload parts of the clone to a CDN. The Git client does not
perform sufficient validation of the advertised bundles, which
allows the remote side to perform protocol injection.
This protocol injection can cause the client to write the fetched
bundle to a location controlled by the adversary. The fetched
content is fully controlled by the server, which can in the worst
case lead to arbitrary code execution."
Three new advisories in git.
https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9
sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout.
https://nvd.nist.gov/vuln/detail/CVE-2025-48384
https://github.com/git/git/security/advisories/GHSA-m98c-vgpc-9655
sev:HIGH 8.6 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
When cloning a repository Git knows to optionally fetch a bundle advertised by the remote server, which allows the server-side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection.
This protocol injection can cause the client to write the fetched bundle to a location controlled by the adversary. The fetched content is fully controlled by the server, which can in the worst case lead to arbitrary code execution.
https://nvd.nist.gov/vuln/detail/CVE-2025-48385
https://github.com/git/git/security/advisories/GHSA-4v56-3xvj-xvfr
sev:MED 6.3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
##The wincred credential helper uses a static buffer (
target
) as a unique key for storing and comparing against internal storage. This credential helper does not properly bounds check the available space remaining in the buffer before appending to it withwcsncat()
, leading to potential buffer overflows.
🟥𝐋𝐂𝐒𝐂-𝐈𝐄 𝐃𝐚𝐢𝐥𝐲 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐅𝐢𝐧𝐝𝐢𝐧𝐠𝐬-𝟗 𝐉𝐮𝐥𝐲 𝟐𝟎𝟐𝟓🟥
News:
1. NIS2 Revamps Ireland’s Cybersecurity Landscape: Old Regulators, New Powers
https://www.jdsupra.com/legalnews/ireland-nis2-revamps-ireland-s-2249211/
2. Russian actors suspected of AI deepfakes impersonating US State Secretary Marco Rubio
https://cybernews.com/security/marco-rubio-ai-deepfakes-russian-hackers-secretary-state-department/
3. Hackers Target Employee Credentials Amid Spike in ID Attacks
https://www.infosecurity-magazine.com/news/hackers-target-employee-credentials/
4. Sanctions Imposed on DPRK IT Workers Generating Revenue for the Kim Regime
https://home.treasury.gov/news/press-releases/sb0190
5. M&S Chair Details Ransomware Attack, Declines to Confirm if Payment Was Made
https://committees.parliament.uk/event/24543/formal-meeting-oral-evidence-session/
6. Malicious Open Source Packages Surge 188% Annually
https://www.infosecurity-magazine.com/news/malicious-open-source-surge-188/
7. Microsoft fixes 130 bugs, 12 critical, in July Patch Tuesday release
https://www.scworld.com/news/microsoft-fixes-130-bugs-12-critical-in-july-patch-tuesday-release
8. Anatsa mobile malware returns to victimize North American bank customers
9. Gulf Bank Partners with CrowdStrike to Strengthen Cybersecurity in Kuwait
10. German defense faces major cyberattack as investigators trace Russian link
https://newsukraine.rbc.ua/news/german-defense-faces-major-cyberattack-as-1752052645.html
---
Global Breaches and Data Leaks:
1. Nippon Steel Solutions 0-Day Network Vulnerability Exposes Users Personal Information
https://www.nssol.nipponsteel.com/press/2025/20250708_160000.html
2. IES Communications notifies 6,000+ employees of data breach that compromised SSNs and payroll info
---
Tactical Reports with IOCs:
1. Pay2Key’s Resurgence: Iranian Cyber Warfare Targets the West
https://engage.morphisec.com/hubfs/Pay2Key_Iranian_Cyber_Warfare_Targets_the_West_Whitepaper.pdf
2. ClickFix Campaign: How Clipboard Injection Leads to RAT Infection (Part 2)
3. From Click to Compromise: Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities
4. Technical Analysis of Ducex: Packer of Triada Android Malware
https://any.run/cybersecurity-blog/ducex-packer-analysis/
5. CoinMiner Attacks Exploiting GeoServer Vulnerability
https://asec.ahnlab.com/en/88917/
6. Gafgyt aka Bashlite Malware
https://rewterz.com/threat-advisory/gafgyt-aka-bashlite-malware-active-iocs-18
7. BlackMoon Banking Trojan aka KrBanker
https://rewterz.com/threat-advisory/blackmoon-banking-trojan-aka-krbanker-active-iocs-6
8. AsyncRAT
https://rewterz.com/threat-advisory/asyncrat-active-iocs-22
9. An Emerging Ducktail Infostealer
https://rewterz.com/threat-advisory/an-emerging-ducktail-infostealer-active-iocs-45
10. June 2025 Security Issues in Korean & Global Financial Sector
https://asec.ahnlab.com/en/88936/
11. Malicious pull request infects VS Code extension
https://www.reversinglabs.com/blog/malicious-pull-request-infects-vscode-extension
12. Defending the Cloud: Stopping Cyber Threats in Azure and AWS with Darktrace
---
APT IOCs:
1. Kimsuky
http://27.102.137[.]242
verifyserve.live-on[.]net
an.verifyserve.live-on[.]net
---
Threat Hunting / DFIR/ Malware:
1. GIFTEDCROOK’s Strategic Pivot: UAC-0226’s Espionage Surge Amid Ukraine’s Geopolitical Flashpoints
2. BaitTrap: The Rise of Baiting News Sites behind online Investment Fraud
https://cdn.prod.website-files.com/66fbdb04ee8bb0436308fc15/686ba57ad93bc718938e5e0f_BaitTrap.pdf
3. SafePay ransomware: Threat Profile and Analysis
https://www.porthas.com/blog/safepay-ransomware-threat-profile-and-analysis/
4. AmateraStealer Analysis
https://github.com/VenzoV/MalwareAnalysisReports/blob/main/AmateraStealer/Amatera%20shark.exe.md
5. Threat Actor Profile: Mustang Panda
https://blog.dexpose.io/threat-actor-profile-mustang-panda/
6. CVE-2025-1729 - Privilege Escalation Using TPQMAssistant.exe
https://trustedsec.com/blog/cve-2025-1729-privilege-escalation-using-tpqmassistant-exe
7. Revisiting Cross Session Activation Attacks
https://www.r-tec.net/r-tec-blog-revisiting-cross-session-activation-attacks.html
8. Set Sail: Remote Code Execution in SailPoint IQService via Default Encryption Key
9. TapTrap: Animation-Driven Tapjacking on Android
https://taptrap.click/usenix25_taptrap_paper.pdf
10. Root Shell on Credit Card Terminal
https://stefan-gloor.ch/yomani-hack
---
Light Reading:
1. Mobilizing Cyber Power: The Growing Role of Cyber Militias in China’s Network Warfare Force Structure
https://margin.re/content/files/2025/07/Mobilizing-Cyber-Power-Final-Release-Copy-July-8.pdf
https://margin.re/content/files/2025/07/PRC-Cyber-Militias-Data-Sheet-July-8.xlsx
2. The Urgent Cybersecurity Imperative for Europe’s Critical Sectors
3. The Cosmos Bank Cyber Attack: How Hackers Stole ?94 Crore in Minutes
4. Statistics Report on Malware Targeting Windows Database Servers in Q2 2025
https://asec.ahnlab.com/en/88920/
5. Statistics Report on Malware Targeting Windows Web Servers in Q2 2025
https://asec.ahnlab.com/en/88925/
6. Statistics Report on Malware Targeting Linux SSH Servers in Q2 2025
https://asec.ahnlab.com/en/88927/
7. Threat Group Intelligence Report: American Futurist (AmFut)
---
##Privilege Escalation Using TPQMAssistant.exe on Lenovo https://trustedsec.com/blog/cve-2025-1729-privilege-escalation-using-tpqmassistant-exe
##Ruckus getting in on that sweet hardcoded secrets game.
https://kb.cert.org/vuls/id/613753
##Multiple vulnerabilities were reported in these Ruckus Wireless products that are described here:
[CVE-2025-44957] Hardcoded Secrets, including JWT Signing Key, API keys in Code (CWE-287: Improper Authentication). Multiple secrets are hardcoded into the vSZ application, making them vulnerable to access thus allowing elevated privileges. Using HTTP headers and a valid API key, it is possible to logically bypass the authentication methods, providing administrator-level access to anyone that does this.
[CVE-2025-44962] Authenticated Arbitrary File Read (CWE-23: Relative Path Traversal). Ruckus vSZ allows for users to download files from an allowed directory, but by hardcoding a directory path, a user could traverse other directory paths with ../ to read sensitive files.
[CVE-2025-44954] Unauthenticated RCE in SSH due to Hardcoded Default Public/Private Keys (CWE-1394: Use of Default Cryptographic Key). Ruckus vSZ has a built-in user with all of the same privileges as root. This user also has default public and private RSA keys in its /home/$USER/.ssh/ directory. Anyone with a Ruckus device would also have this private key and be able to ssh as this and then have root-level permissions.
[CVE-2025-44960] Remote Code Execution (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')). A parameter in a vSZ API route is user-controlled and not sanitized before being executed in an OS command. An attacker could supply a malicious payload to result in code execution.
[CVE-2025-44961] Remote Code Execution (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')). An authenticated vSZ user supplies an IP address as an argument to be run in an OS command, but this IP address is not sanitized. A user could supply other commands instead of an IP address to achieve RCE.
[CVE-2025-44963] Hardcoded Secrets, including JWT token (CWE-321: Use of Hard-coded Cryptographic Key). RND uses a secret key on the backend web server to ensure that session JWTs are valid. This secret key is hardcoded into the web server. Anyone with knowledge of the secret key could create a valid JWT, thus bypassing the typical authentication to access the server with administrator privileges.
[CVE-2025-44955] Hardcoded Secrets (CWE-259: Use of Hard-coded Password). RND includes a jailed environment to allow users to configure devices without complete shell access to the underlying operating system. The jailed environment includes a built-in jailbreak for technicians to elevate privileges. The jailbreak requires a weak password that is hardcoded into the environment. Anyone with this password can access an RND server with root permissions.
[CVE-2025-6243] Hardcoded SSH Public Key (CWE-321: Use of Hard-coded Cryptographic Key). A built-in user called sshuser, with root privileges, exists on the RND platform. Both public and private ssh keys exist in the sshuser home directory. Anyone with the private key can access an RND server as sshuser.
[CVE-2025-44958] Recoverable passwords (CWE-257: Storing Passwords in a Recoverable Format). RND encrypts passwords with a hardcoded weak secret key and returns the passwords in plaintext. If the server were compromised, an attacker could gain all the plaintext passwords and decrypt them.
Ruckus getting in on that sweet hardcoded secrets game.
https://kb.cert.org/vuls/id/613753
##Multiple vulnerabilities were reported in these Ruckus Wireless products that are described here:
[CVE-2025-44957] Hardcoded Secrets, including JWT Signing Key, API keys in Code (CWE-287: Improper Authentication). Multiple secrets are hardcoded into the vSZ application, making them vulnerable to access thus allowing elevated privileges. Using HTTP headers and a valid API key, it is possible to logically bypass the authentication methods, providing administrator-level access to anyone that does this.
[CVE-2025-44962] Authenticated Arbitrary File Read (CWE-23: Relative Path Traversal). Ruckus vSZ allows for users to download files from an allowed directory, but by hardcoding a directory path, a user could traverse other directory paths with ../ to read sensitive files.
[CVE-2025-44954] Unauthenticated RCE in SSH due to Hardcoded Default Public/Private Keys (CWE-1394: Use of Default Cryptographic Key). Ruckus vSZ has a built-in user with all of the same privileges as root. This user also has default public and private RSA keys in its /home/$USER/.ssh/ directory. Anyone with a Ruckus device would also have this private key and be able to ssh as this and then have root-level permissions.
[CVE-2025-44960] Remote Code Execution (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')). A parameter in a vSZ API route is user-controlled and not sanitized before being executed in an OS command. An attacker could supply a malicious payload to result in code execution.
[CVE-2025-44961] Remote Code Execution (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')). An authenticated vSZ user supplies an IP address as an argument to be run in an OS command, but this IP address is not sanitized. A user could supply other commands instead of an IP address to achieve RCE.
[CVE-2025-44963] Hardcoded Secrets, including JWT token (CWE-321: Use of Hard-coded Cryptographic Key). RND uses a secret key on the backend web server to ensure that session JWTs are valid. This secret key is hardcoded into the web server. Anyone with knowledge of the secret key could create a valid JWT, thus bypassing the typical authentication to access the server with administrator privileges.
[CVE-2025-44955] Hardcoded Secrets (CWE-259: Use of Hard-coded Password). RND includes a jailed environment to allow users to configure devices without complete shell access to the underlying operating system. The jailed environment includes a built-in jailbreak for technicians to elevate privileges. The jailbreak requires a weak password that is hardcoded into the environment. Anyone with this password can access an RND server with root permissions.
[CVE-2025-6243] Hardcoded SSH Public Key (CWE-321: Use of Hard-coded Cryptographic Key). A built-in user called sshuser, with root privileges, exists on the RND platform. Both public and private ssh keys exist in the sshuser home directory. Anyone with the private key can access an RND server as sshuser.
[CVE-2025-44958] Recoverable passwords (CWE-257: Storing Passwords in a Recoverable Format). RND encrypts passwords with a hardcoded weak secret key and returns the passwords in plaintext. If the server were compromised, an attacker could gain all the plaintext passwords and decrypt them.
Ruckus getting in on that sweet hardcoded secrets game.
https://kb.cert.org/vuls/id/613753
##Multiple vulnerabilities were reported in these Ruckus Wireless products that are described here:
[CVE-2025-44957] Hardcoded Secrets, including JWT Signing Key, API keys in Code (CWE-287: Improper Authentication). Multiple secrets are hardcoded into the vSZ application, making them vulnerable to access thus allowing elevated privileges. Using HTTP headers and a valid API key, it is possible to logically bypass the authentication methods, providing administrator-level access to anyone that does this.
[CVE-2025-44962] Authenticated Arbitrary File Read (CWE-23: Relative Path Traversal). Ruckus vSZ allows for users to download files from an allowed directory, but by hardcoding a directory path, a user could traverse other directory paths with ../ to read sensitive files.
[CVE-2025-44954] Unauthenticated RCE in SSH due to Hardcoded Default Public/Private Keys (CWE-1394: Use of Default Cryptographic Key). Ruckus vSZ has a built-in user with all of the same privileges as root. This user also has default public and private RSA keys in its /home/$USER/.ssh/ directory. Anyone with a Ruckus device would also have this private key and be able to ssh as this and then have root-level permissions.
[CVE-2025-44960] Remote Code Execution (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')). A parameter in a vSZ API route is user-controlled and not sanitized before being executed in an OS command. An attacker could supply a malicious payload to result in code execution.
[CVE-2025-44961] Remote Code Execution (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')). An authenticated vSZ user supplies an IP address as an argument to be run in an OS command, but this IP address is not sanitized. A user could supply other commands instead of an IP address to achieve RCE.
[CVE-2025-44963] Hardcoded Secrets, including JWT token (CWE-321: Use of Hard-coded Cryptographic Key). RND uses a secret key on the backend web server to ensure that session JWTs are valid. This secret key is hardcoded into the web server. Anyone with knowledge of the secret key could create a valid JWT, thus bypassing the typical authentication to access the server with administrator privileges.
[CVE-2025-44955] Hardcoded Secrets (CWE-259: Use of Hard-coded Password). RND includes a jailed environment to allow users to configure devices without complete shell access to the underlying operating system. The jailed environment includes a built-in jailbreak for technicians to elevate privileges. The jailbreak requires a weak password that is hardcoded into the environment. Anyone with this password can access an RND server with root permissions.
[CVE-2025-6243] Hardcoded SSH Public Key (CWE-321: Use of Hard-coded Cryptographic Key). A built-in user called sshuser, with root privileges, exists on the RND platform. Both public and private ssh keys exist in the sshuser home directory. Anyone with the private key can access an RND server as sshuser.
[CVE-2025-44958] Recoverable passwords (CWE-257: Storing Passwords in a Recoverable Format). RND encrypts passwords with a hardcoded weak secret key and returns the passwords in plaintext. If the server were compromised, an attacker could gain all the plaintext passwords and decrypt them.
Ruckus getting in on that sweet hardcoded secrets game.
https://kb.cert.org/vuls/id/613753
##Multiple vulnerabilities were reported in these Ruckus Wireless products that are described here:
[CVE-2025-44957] Hardcoded Secrets, including JWT Signing Key, API keys in Code (CWE-287: Improper Authentication). Multiple secrets are hardcoded into the vSZ application, making them vulnerable to access thus allowing elevated privileges. Using HTTP headers and a valid API key, it is possible to logically bypass the authentication methods, providing administrator-level access to anyone that does this.
[CVE-2025-44962] Authenticated Arbitrary File Read (CWE-23: Relative Path Traversal). Ruckus vSZ allows for users to download files from an allowed directory, but by hardcoding a directory path, a user could traverse other directory paths with ../ to read sensitive files.
[CVE-2025-44954] Unauthenticated RCE in SSH due to Hardcoded Default Public/Private Keys (CWE-1394: Use of Default Cryptographic Key). Ruckus vSZ has a built-in user with all of the same privileges as root. This user also has default public and private RSA keys in its /home/$USER/.ssh/ directory. Anyone with a Ruckus device would also have this private key and be able to ssh as this and then have root-level permissions.
[CVE-2025-44960] Remote Code Execution (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')). A parameter in a vSZ API route is user-controlled and not sanitized before being executed in an OS command. An attacker could supply a malicious payload to result in code execution.
[CVE-2025-44961] Remote Code Execution (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')). An authenticated vSZ user supplies an IP address as an argument to be run in an OS command, but this IP address is not sanitized. A user could supply other commands instead of an IP address to achieve RCE.
[CVE-2025-44963] Hardcoded Secrets, including JWT token (CWE-321: Use of Hard-coded Cryptographic Key). RND uses a secret key on the backend web server to ensure that session JWTs are valid. This secret key is hardcoded into the web server. Anyone with knowledge of the secret key could create a valid JWT, thus bypassing the typical authentication to access the server with administrator privileges.
[CVE-2025-44955] Hardcoded Secrets (CWE-259: Use of Hard-coded Password). RND includes a jailed environment to allow users to configure devices without complete shell access to the underlying operating system. The jailed environment includes a built-in jailbreak for technicians to elevate privileges. The jailbreak requires a weak password that is hardcoded into the environment. Anyone with this password can access an RND server with root permissions.
[CVE-2025-6243] Hardcoded SSH Public Key (CWE-321: Use of Hard-coded Cryptographic Key). A built-in user called sshuser, with root privileges, exists on the RND platform. Both public and private ssh keys exist in the sshuser home directory. Anyone with the private key can access an RND server as sshuser.
[CVE-2025-44958] Recoverable passwords (CWE-257: Storing Passwords in a Recoverable Format). RND encrypts passwords with a hardcoded weak secret key and returns the passwords in plaintext. If the server were compromised, an attacker could gain all the plaintext passwords and decrypt them.
Ruckus getting in on that sweet hardcoded secrets game.
https://kb.cert.org/vuls/id/613753
##Multiple vulnerabilities were reported in these Ruckus Wireless products that are described here:
[CVE-2025-44957] Hardcoded Secrets, including JWT Signing Key, API keys in Code (CWE-287: Improper Authentication). Multiple secrets are hardcoded into the vSZ application, making them vulnerable to access thus allowing elevated privileges. Using HTTP headers and a valid API key, it is possible to logically bypass the authentication methods, providing administrator-level access to anyone that does this.
[CVE-2025-44962] Authenticated Arbitrary File Read (CWE-23: Relative Path Traversal). Ruckus vSZ allows for users to download files from an allowed directory, but by hardcoding a directory path, a user could traverse other directory paths with ../ to read sensitive files.
[CVE-2025-44954] Unauthenticated RCE in SSH due to Hardcoded Default Public/Private Keys (CWE-1394: Use of Default Cryptographic Key). Ruckus vSZ has a built-in user with all of the same privileges as root. This user also has default public and private RSA keys in its /home/$USER/.ssh/ directory. Anyone with a Ruckus device would also have this private key and be able to ssh as this and then have root-level permissions.
[CVE-2025-44960] Remote Code Execution (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')). A parameter in a vSZ API route is user-controlled and not sanitized before being executed in an OS command. An attacker could supply a malicious payload to result in code execution.
[CVE-2025-44961] Remote Code Execution (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')). An authenticated vSZ user supplies an IP address as an argument to be run in an OS command, but this IP address is not sanitized. A user could supply other commands instead of an IP address to achieve RCE.
[CVE-2025-44963] Hardcoded Secrets, including JWT token (CWE-321: Use of Hard-coded Cryptographic Key). RND uses a secret key on the backend web server to ensure that session JWTs are valid. This secret key is hardcoded into the web server. Anyone with knowledge of the secret key could create a valid JWT, thus bypassing the typical authentication to access the server with administrator privileges.
[CVE-2025-44955] Hardcoded Secrets (CWE-259: Use of Hard-coded Password). RND includes a jailed environment to allow users to configure devices without complete shell access to the underlying operating system. The jailed environment includes a built-in jailbreak for technicians to elevate privileges. The jailbreak requires a weak password that is hardcoded into the environment. Anyone with this password can access an RND server with root permissions.
[CVE-2025-6243] Hardcoded SSH Public Key (CWE-321: Use of Hard-coded Cryptographic Key). A built-in user called sshuser, with root privileges, exists on the RND platform. Both public and private ssh keys exist in the sshuser home directory. Anyone with the private key can access an RND server as sshuser.
[CVE-2025-44958] Recoverable passwords (CWE-257: Storing Passwords in a Recoverable Format). RND encrypts passwords with a hardcoded weak secret key and returns the passwords in plaintext. If the server were compromised, an attacker could gain all the plaintext passwords and decrypt them.
Ruckus getting in on that sweet hardcoded secrets game.
https://kb.cert.org/vuls/id/613753
##Multiple vulnerabilities were reported in these Ruckus Wireless products that are described here:
[CVE-2025-44957] Hardcoded Secrets, including JWT Signing Key, API keys in Code (CWE-287: Improper Authentication). Multiple secrets are hardcoded into the vSZ application, making them vulnerable to access thus allowing elevated privileges. Using HTTP headers and a valid API key, it is possible to logically bypass the authentication methods, providing administrator-level access to anyone that does this.
[CVE-2025-44962] Authenticated Arbitrary File Read (CWE-23: Relative Path Traversal). Ruckus vSZ allows for users to download files from an allowed directory, but by hardcoding a directory path, a user could traverse other directory paths with ../ to read sensitive files.
[CVE-2025-44954] Unauthenticated RCE in SSH due to Hardcoded Default Public/Private Keys (CWE-1394: Use of Default Cryptographic Key). Ruckus vSZ has a built-in user with all of the same privileges as root. This user also has default public and private RSA keys in its /home/$USER/.ssh/ directory. Anyone with a Ruckus device would also have this private key and be able to ssh as this and then have root-level permissions.
[CVE-2025-44960] Remote Code Execution (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')). A parameter in a vSZ API route is user-controlled and not sanitized before being executed in an OS command. An attacker could supply a malicious payload to result in code execution.
[CVE-2025-44961] Remote Code Execution (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')). An authenticated vSZ user supplies an IP address as an argument to be run in an OS command, but this IP address is not sanitized. A user could supply other commands instead of an IP address to achieve RCE.
[CVE-2025-44963] Hardcoded Secrets, including JWT token (CWE-321: Use of Hard-coded Cryptographic Key). RND uses a secret key on the backend web server to ensure that session JWTs are valid. This secret key is hardcoded into the web server. Anyone with knowledge of the secret key could create a valid JWT, thus bypassing the typical authentication to access the server with administrator privileges.
[CVE-2025-44955] Hardcoded Secrets (CWE-259: Use of Hard-coded Password). RND includes a jailed environment to allow users to configure devices without complete shell access to the underlying operating system. The jailed environment includes a built-in jailbreak for technicians to elevate privileges. The jailbreak requires a weak password that is hardcoded into the environment. Anyone with this password can access an RND server with root permissions.
[CVE-2025-6243] Hardcoded SSH Public Key (CWE-321: Use of Hard-coded Cryptographic Key). A built-in user called sshuser, with root privileges, exists on the RND platform. Both public and private ssh keys exist in the sshuser home directory. Anyone with the private key can access an RND server as sshuser.
[CVE-2025-44958] Recoverable passwords (CWE-257: Storing Passwords in a Recoverable Format). RND encrypts passwords with a hardcoded weak secret key and returns the passwords in plaintext. If the server were compromised, an attacker could gain all the plaintext passwords and decrypt them.
Ruckus getting in on that sweet hardcoded secrets game.
https://kb.cert.org/vuls/id/613753
##Multiple vulnerabilities were reported in these Ruckus Wireless products that are described here:
[CVE-2025-44957] Hardcoded Secrets, including JWT Signing Key, API keys in Code (CWE-287: Improper Authentication). Multiple secrets are hardcoded into the vSZ application, making them vulnerable to access thus allowing elevated privileges. Using HTTP headers and a valid API key, it is possible to logically bypass the authentication methods, providing administrator-level access to anyone that does this.
[CVE-2025-44962] Authenticated Arbitrary File Read (CWE-23: Relative Path Traversal). Ruckus vSZ allows for users to download files from an allowed directory, but by hardcoding a directory path, a user could traverse other directory paths with ../ to read sensitive files.
[CVE-2025-44954] Unauthenticated RCE in SSH due to Hardcoded Default Public/Private Keys (CWE-1394: Use of Default Cryptographic Key). Ruckus vSZ has a built-in user with all of the same privileges as root. This user also has default public and private RSA keys in its /home/$USER/.ssh/ directory. Anyone with a Ruckus device would also have this private key and be able to ssh as this and then have root-level permissions.
[CVE-2025-44960] Remote Code Execution (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')). A parameter in a vSZ API route is user-controlled and not sanitized before being executed in an OS command. An attacker could supply a malicious payload to result in code execution.
[CVE-2025-44961] Remote Code Execution (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')). An authenticated vSZ user supplies an IP address as an argument to be run in an OS command, but this IP address is not sanitized. A user could supply other commands instead of an IP address to achieve RCE.
[CVE-2025-44963] Hardcoded Secrets, including JWT token (CWE-321: Use of Hard-coded Cryptographic Key). RND uses a secret key on the backend web server to ensure that session JWTs are valid. This secret key is hardcoded into the web server. Anyone with knowledge of the secret key could create a valid JWT, thus bypassing the typical authentication to access the server with administrator privileges.
[CVE-2025-44955] Hardcoded Secrets (CWE-259: Use of Hard-coded Password). RND includes a jailed environment to allow users to configure devices without complete shell access to the underlying operating system. The jailed environment includes a built-in jailbreak for technicians to elevate privileges. The jailbreak requires a weak password that is hardcoded into the environment. Anyone with this password can access an RND server with root permissions.
[CVE-2025-6243] Hardcoded SSH Public Key (CWE-321: Use of Hard-coded Cryptographic Key). A built-in user called sshuser, with root privileges, exists on the RND platform. Both public and private ssh keys exist in the sshuser home directory. Anyone with the private key can access an RND server as sshuser.
[CVE-2025-44958] Recoverable passwords (CWE-257: Storing Passwords in a Recoverable Format). RND encrypts passwords with a hardcoded weak secret key and returns the passwords in plaintext. If the server were compromised, an attacker could gain all the plaintext passwords and decrypt them.
Ruckus getting in on that sweet hardcoded secrets game.
https://kb.cert.org/vuls/id/613753
##Multiple vulnerabilities were reported in these Ruckus Wireless products that are described here:
[CVE-2025-44957] Hardcoded Secrets, including JWT Signing Key, API keys in Code (CWE-287: Improper Authentication). Multiple secrets are hardcoded into the vSZ application, making them vulnerable to access thus allowing elevated privileges. Using HTTP headers and a valid API key, it is possible to logically bypass the authentication methods, providing administrator-level access to anyone that does this.
[CVE-2025-44962] Authenticated Arbitrary File Read (CWE-23: Relative Path Traversal). Ruckus vSZ allows for users to download files from an allowed directory, but by hardcoding a directory path, a user could traverse other directory paths with ../ to read sensitive files.
[CVE-2025-44954] Unauthenticated RCE in SSH due to Hardcoded Default Public/Private Keys (CWE-1394: Use of Default Cryptographic Key). Ruckus vSZ has a built-in user with all of the same privileges as root. This user also has default public and private RSA keys in its /home/$USER/.ssh/ directory. Anyone with a Ruckus device would also have this private key and be able to ssh as this and then have root-level permissions.
[CVE-2025-44960] Remote Code Execution (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')). A parameter in a vSZ API route is user-controlled and not sanitized before being executed in an OS command. An attacker could supply a malicious payload to result in code execution.
[CVE-2025-44961] Remote Code Execution (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')). An authenticated vSZ user supplies an IP address as an argument to be run in an OS command, but this IP address is not sanitized. A user could supply other commands instead of an IP address to achieve RCE.
[CVE-2025-44963] Hardcoded Secrets, including JWT token (CWE-321: Use of Hard-coded Cryptographic Key). RND uses a secret key on the backend web server to ensure that session JWTs are valid. This secret key is hardcoded into the web server. Anyone with knowledge of the secret key could create a valid JWT, thus bypassing the typical authentication to access the server with administrator privileges.
[CVE-2025-44955] Hardcoded Secrets (CWE-259: Use of Hard-coded Password). RND includes a jailed environment to allow users to configure devices without complete shell access to the underlying operating system. The jailed environment includes a built-in jailbreak for technicians to elevate privileges. The jailbreak requires a weak password that is hardcoded into the environment. Anyone with this password can access an RND server with root permissions.
[CVE-2025-6243] Hardcoded SSH Public Key (CWE-321: Use of Hard-coded Cryptographic Key). A built-in user called sshuser, with root privileges, exists on the RND platform. Both public and private ssh keys exist in the sshuser home directory. Anyone with the private key can access an RND server as sshuser.
[CVE-2025-44958] Recoverable passwords (CWE-257: Storing Passwords in a Recoverable Format). RND encrypts passwords with a hardcoded weak secret key and returns the passwords in plaintext. If the server were compromised, an attacker could gain all the plaintext passwords and decrypt them.
Ruckus getting in on that sweet hardcoded secrets game.
https://kb.cert.org/vuls/id/613753
##Multiple vulnerabilities were reported in these Ruckus Wireless products that are described here:
[CVE-2025-44957] Hardcoded Secrets, including JWT Signing Key, API keys in Code (CWE-287: Improper Authentication). Multiple secrets are hardcoded into the vSZ application, making them vulnerable to access thus allowing elevated privileges. Using HTTP headers and a valid API key, it is possible to logically bypass the authentication methods, providing administrator-level access to anyone that does this.
[CVE-2025-44962] Authenticated Arbitrary File Read (CWE-23: Relative Path Traversal). Ruckus vSZ allows for users to download files from an allowed directory, but by hardcoding a directory path, a user could traverse other directory paths with ../ to read sensitive files.
[CVE-2025-44954] Unauthenticated RCE in SSH due to Hardcoded Default Public/Private Keys (CWE-1394: Use of Default Cryptographic Key). Ruckus vSZ has a built-in user with all of the same privileges as root. This user also has default public and private RSA keys in its /home/$USER/.ssh/ directory. Anyone with a Ruckus device would also have this private key and be able to ssh as this and then have root-level permissions.
[CVE-2025-44960] Remote Code Execution (CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')). A parameter in a vSZ API route is user-controlled and not sanitized before being executed in an OS command. An attacker could supply a malicious payload to result in code execution.
[CVE-2025-44961] Remote Code Execution (CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')). An authenticated vSZ user supplies an IP address as an argument to be run in an OS command, but this IP address is not sanitized. A user could supply other commands instead of an IP address to achieve RCE.
[CVE-2025-44963] Hardcoded Secrets, including JWT token (CWE-321: Use of Hard-coded Cryptographic Key). RND uses a secret key on the backend web server to ensure that session JWTs are valid. This secret key is hardcoded into the web server. Anyone with knowledge of the secret key could create a valid JWT, thus bypassing the typical authentication to access the server with administrator privileges.
[CVE-2025-44955] Hardcoded Secrets (CWE-259: Use of Hard-coded Password). RND includes a jailed environment to allow users to configure devices without complete shell access to the underlying operating system. The jailed environment includes a built-in jailbreak for technicians to elevate privileges. The jailbreak requires a weak password that is hardcoded into the environment. Anyone with this password can access an RND server with root permissions.
[CVE-2025-6243] Hardcoded SSH Public Key (CWE-321: Use of Hard-coded Cryptographic Key). A built-in user called sshuser, with root privileges, exists on the RND platform. Both public and private ssh keys exist in the sshuser home directory. Anyone with the private key can access an RND server as sshuser.
[CVE-2025-44958] Recoverable passwords (CWE-257: Storing Passwords in a Recoverable Format). RND encrypts passwords with a hardcoded weak secret key and returns the passwords in plaintext. If the server were compromised, an attacker could gain all the plaintext passwords and decrypt them.
Three new advisories in git.
https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9
sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout.
https://nvd.nist.gov/vuln/detail/CVE-2025-48384
https://github.com/git/git/security/advisories/GHSA-m98c-vgpc-9655
sev:HIGH 8.6 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
When cloning a repository Git knows to optionally fetch a bundle advertised by the remote server, which allows the server-side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection.
This protocol injection can cause the client to write the fetched bundle to a location controlled by the adversary. The fetched content is fully controlled by the server, which can in the worst case lead to arbitrary code execution.
https://nvd.nist.gov/vuln/detail/CVE-2025-48385
https://github.com/git/git/security/advisories/GHSA-4v56-3xvj-xvfr
sev:MED 6.3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
##The wincred credential helper uses a static buffer (
target
) as a unique key for storing and comparing against internal storage. This credential helper does not properly bounds check the available space remaining in the buffer before appending to it withwcsncat()
, leading to potential buffer overflows.