## Updated at UTC 2025-12-23T13:39:27.495361

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2025-37164 10.0 74.82% 3 2 template 2025-12-23T12:30:17 A remote code execution issue exists in HPE OneView.
CVE-2023-52163 8.8 0.15% 5 0 2025-12-23T12:15:44.160000 Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injectio
CVE-2025-14733 9.8 31.40% 8 2 2025-12-23T11:34:46.317000 An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remot
CVE-2025-14388 9.8 0.00% 1 0 2025-12-23T10:15:43.673000 The PhastPress plugin for WordPress is vulnerable to Unauthenticated Arbitrary F
CVE-2025-65857 7.5 0.00% 2 1 2025-12-23T00:30:39 An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.00080
CVE-2023-53974 7.5 0.00% 2 0 2025-12-23T00:30:38 D-Link DSL-124 ME_1.00 contains a configuration file disclosure vulnerability th
CVE-2025-65856 9.8 0.00% 1 1 2025-12-22T22:16:08.360000 Authentication bypass vulnerability in Xiongmai XM530 IP cameras on Firmware V5.
CVE-2025-68475 7.5 0.00% 2 0 2025-12-22T21:36:56 Hi Fedify team! 👋 Thank you for your work on Fedify—it's a fantastic library fo
CVE-2025-67289 9.6 0.00% 1 0 2025-12-22T21:15:45.020000 An arbitrary file upload vulnerability in the Attachments module of Frappe Frame
CVE-2025-67418 9.8 0.00% 1 0 2025-12-22T20:15:45.303000 ClipBucket 5.5.2 is affected by an improper access control issue where the produ
CVE-2025-67288 10.0 0.00% 1 0 2025-12-22T19:15:49.710000 An arbitrary file upload vulnerability in Umbraco CMS v16.3.3 allows attackers t
CVE-2025-68613 10.0 0.22% 1 6 2025-12-22T16:19:13 ### Impact n8n contains a critical Remote Code Execution (RCE) vulnerability in
CVE-2025-12049 0 0.07% 1 0 2025-12-22T05:16:19.120000 Missing Authentication for Critical Function vulnerability in Sharp Display Solu
CVE-2025-14881 None 0.04% 1 0 2025-12-20T17:39:03 Multiple API endpoints allowed access to sensitive files from other users by kno
CVE-2025-63389 None 0.25% 1 0 2025-12-20T05:37:50 A critical authentication bypass vulnerability exists in Ollama platform's API e
CVE-2025-14761 5.3 0.02% 1 0 2025-12-20T05:31:03 ## Summary S3 Encryption Client for PHP is an open-source client-side encryptio
CVE-2025-68398 9.1 0.11% 1 0 2025-12-20T05:26:43 ### Impact It was possible to overwrite Git configuration remotely and override
CVE-2025-14299 None 0.06% 1 0 2025-12-20T03:31:40 The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length h
CVE-2025-14300 None 0.04% 1 0 2025-12-20T03:31:40 The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper a
CVE-2025-8065 None 0.02% 1 0 2025-12-20T03:31:40 A buffer overflow vulnerability exists in the ONVIF XML parser of Tapo C200 V3.
CVE-2025-63390 5.3 0.05% 1 0 2025-12-20T00:31:32 An authentication bypass vulnerability exists in AnythingLLM v1.8.5 in via the /
CVE-2025-68161 None 0.03% 2 0 2025-12-19T22:08:03 The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does
CVE-2025-34437 8.8 0.10% 1 0 2025-12-19T21:31:26 AVideo versions prior to 20.0 permit any authenticated user to upload comment im
CVE-2025-14964 9.8 0.08% 1 0 2025-12-19T21:30:26 A vulnerability has been found in TOTOLINK T10 4.1.8cu.5083_B20200521. This affe
CVE-2025-34436 8.8 0.10% 1 0 2025-12-19T21:30:17 AVideo versions prior to 20.0 allow any authenticated user to upload files into
CVE-2025-66908 5.3 0.04% 1 0 2025-12-19T18:32:25 Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an improper file t
CVE-2025-65568 7.5 0.04% 1 0 2025-12-19T18:32:20 A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp
CVE-2025-65565 7.5 0.05% 1 0 2025-12-19T18:32:19 A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp
CVE-2025-65564 7.5 0.05% 1 0 2025-12-19T18:32:19 A denial-of-service vulnerability exists in the omec-upf (upf-epc-pfcpiface) in
CVE-2025-52692 8.8 0.02% 1 0 2025-12-19T18:31:18 Successful exploitation of the vulnerability could allow an attacker with local
CVE-2025-65567 7.5 0.04% 1 0 2025-12-19T18:15:50.570000 A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp
CVE-2025-41697 6.8 0.02% 1 0 2025-12-19T18:12:09.187000 An attacker can use an undocumented UART port on the PCB as a side-channel to
CVE-2025-14878 9.8 0.05% 2 0 2025-12-19T18:00:54.283000 A security flaw has been discovered in Tenda WH450 1.0.0.18. This impacts an unk
CVE-2025-64469 7.8 0.01% 1 0 2025-12-19T18:00:54.283000 There is a stack-based buffer overflow vulnerability in NI LabVIEW in LVResFile:
CVE-2025-64466 7.8 0.01% 1 0 2025-12-19T18:00:54.283000 There is an out of bounds read vulnerability in NI LabVIEW in lvre!ExecPostedPro
CVE-2025-66909 7.5 0.08% 1 0 2025-12-19T18:00:18.330000 Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an image decompres
CVE-2025-14882 0 0.04% 1 0 2025-12-19T18:00:18.330000 An API endpoint allowed access to sensitive files from other users by knowing th
CVE-2025-1885 5.4 0.03% 1 0 2025-12-19T18:00:18.330000 URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Restajet In
CVE-2025-11747 6.4 0.03% 1 0 2025-12-19T18:00:18.330000 The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site
CVE-2025-66521 6.3 0.02% 1 0 2025-12-19T18:00:18.330000 A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com
CVE-2025-67843 8.3 0.23% 1 0 2025-12-19T18:00:18.330000 A Server-Side Template Injection (SSTI) vulnerability in the MDX Rendering Engin
CVE-2025-11774 8.2 0.03% 2 0 2025-12-19T18:00:18.330000 Improper Neutralization of Special Elements used in an OS Command ('OS Command I
CVE-2025-14900 4.7 0.03% 1 0 2025-12-19T18:00:18.330000 A security vulnerability has been detected in CodeAstro Real Estate Management S
CVE-2025-14908 6.3 0.06% 1 0 2025-12-19T18:00:18.330000 A security flaw has been discovered in JeecgBoot up to 3.9.0. The affected eleme
CVE-2025-14899 4.7 0.03% 1 0 2025-12-19T18:00:18.330000 A weakness has been identified in CodeAstro Real Estate Management System 1.0. T
CVE-2025-13427 0 0.12% 1 0 2025-12-19T18:00:18.330000 An authentication bypass vulnerability in Google Cloud Dialogflow CX Messenger a
CVE-2025-64677 8.2 0.07% 1 0 2025-12-19T18:00:18.330000 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2025-64676 7.2 0.11% 1 0 2025-12-19T18:00:18.330000 '.../...//' in Microsoft Purview allows an authorized attacker to execute code o
CVE-2025-64236 9.8 0.07% 1 0 2025-12-19T18:00:18.330000 Authentication Bypass Using an Alternate Path or Channel vulnerability in Amento
CVE-2025-14896 7.5 0.03% 1 0 2025-12-19T18:00:18.330000 due to insufficient sanitazation in Vega’s `convert()` function when `safeMode`
CVE-2025-14739 0 0.01% 1 0 2025-12-19T18:00:18.330000 Access of Uninitialized Pointer vulnerability in TP-Link WR940N and WR941ND allo
CVE-2025-63391 7.5 0.08% 1 0 2025-12-19T18:00:18.330000 An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api
CVE-2025-41749 7.1 0.09% 1 0 2025-12-19T16:46:12.343000 An XSS vulnerability in port_util.php can be used by an unauthenticated remote a
CVE-2025-41747 7.1 0.09% 1 0 2025-12-19T16:46:06.333000 An XSS vulnerability in pxc_vlanIntfCfg.php can be used by an unauthenticated re
CVE-2025-41751 7.1 0.09% 1 0 2025-12-19T16:45:53.940000 An XSS vulnerability in pxc_portCntr.php can be used by an unauthenticated remot
CVE-2025-1928 9.1 0.05% 1 0 2025-12-19T15:31:25 Improper Restriction of Excessive Authentication Attempts vulnerability in Resta
CVE-2025-1927 7.1 0.01% 1 0 2025-12-19T12:31:33 Cross-Site Request Forgery (CSRF) vulnerability in Restajet Information Technolo
CVE-2025-66522 6.3 0.03% 1 0 2025-12-19T09:30:40 A stored cross-site scripting (XSS) vulnerability exists in the Digital IDs func
CVE-2025-14151 6.1 0.09% 1 0 2025-12-19T09:30:39 The SlimStat Analytics plugin for WordPress is vulnerable to Stored Cross-Site S
CVE-2025-66520 6.3 0.03% 1 0 2025-12-19T09:30:39 A stored cross-site scripting (XSS) vulnerability exists in the Portfolio featur
CVE-2025-68490 None 0.00% 1 0 2025-12-19T06:30:34 Rejected reason: Not used
CVE-2025-68488 None 0.00% 1 0 2025-12-19T06:30:34 Rejected reason: Not used
CVE-2025-68487 None 0.00% 1 0 2025-12-19T06:30:34 Rejected reason: Not used
CVE-2025-68491 0 0.00% 1 0 2025-12-19T04:16:02.150000 Rejected reason: Not used
CVE-2025-68489 0 0.00% 1 0 2025-12-19T04:16:02.017000 Rejected reason: Not used
CVE-2025-13941 8.8 0.01% 1 0 2025-12-19T03:31:18 A local privilege escalation vulnerability exists in the Foxit PDF Reader/Editor
CVE-2025-64675 8.3 0.08% 1 0 2025-12-19T00:31:52 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2025-68382 6.5 0.04% 1 0 2025-12-19T00:31:47 Out-of-bounds read (CWE-125) allows an unauthenticated remote attacker to perfor
CVE-2025-65037 10.0 0.10% 1 0 2025-12-19T00:31:47 Improper control of generation of code ('code injection') in Azure Container App
CVE-2025-64663 10.0 0.08% 1 0 2025-12-19T00:31:47 Custom Question Answering Elevation of Privilege Vulnerability
CVE-2025-34452 None 0.38% 1 0 2025-12-19T00:31:47 Streama versions 1.10.0 through 1.10.5 and prior to commit b7c8767 contain a com
CVE-2025-65041 10.0 0.09% 2 0 2025-12-19T00:31:46 Improper authorization in Microsoft Partner Center allows an unauthorized attack
CVE-2025-68381 6.5 0.04% 1 0 2025-12-19T00:31:46 Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated
CVE-2025-53000 None 0.02% 1 0 2025-12-18T22:03:09 ### Summary On Windows, converting a notebook containing SVG output to a PDF re
CVE-2025-64374 10.0 0.04% 1 0 2025-12-18T21:32:49 Unrestricted Upload of File with Dangerous Type vulnerability in StylemixThemes
CVE-2025-66923 7.2 0.12% 1 0 2025-12-18T19:52:33.017000 A Cross-site scripting (XSS) vulnerability in Create/Update Customer(s) in Open
CVE-2025-68434 8.8 0.08% 1 1 2025-12-18T19:45:54.187000 Open Source Point of Sale (opensourcepos) is a web based point of sale applicati
CVE-2025-67074 6.5 0.04% 1 0 2025-12-18T19:16:34.560000 A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in
CVE-2025-14837 4.7 0.04% 1 0 2025-12-18T19:16:22.103000 A vulnerability has been found in ZZCMS 2025. Affected by this issue is the func
CVE-2025-66397 8.3 0.04% 1 0 2025-12-18T19:07:25.637000 ChurchCRM is an open-source church management system. Prior to version 6.5.3, th
CVE-2025-14764 5.3 0.01% 1 0 2025-12-18T18:50:44 ## Summary S3 Encryption Client for Go is an open-source client-side encryption
CVE-2025-59374 9.8 30.46% 9 0 2025-12-18T18:31:33 "UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were
CVE-2025-14884 7.2 0.19% 2 0 2025-12-18T18:30:38 A vulnerability was detected in D-Link DIR-605 202WWB03. Affected by this issue
CVE-2025-14879 9.8 0.05% 2 0 2025-12-18T18:30:37 A weakness has been identified in Tenda WH450 1.0.0.18. Affected is an unknown f
CVE-2025-14738 None 0.06% 1 0 2025-12-18T18:30:37 Improper authentication vulnerability in TP-Link WA850RE (httpd modules) allows
CVE-2025-14737 None 0.42% 1 0 2025-12-18T18:30:37 Command Injection vulnerability in TP-Link WA850RE (httpd modules) allows authen
CVE-2025-68400 8.8 0.03% 1 0 2025-12-18T16:46:12.477000 ChurchCRM is an open-source church management system. A SQL Injection vulnerabil
CVE-2025-68401 4.8 0.03% 1 0 2025-12-18T16:44:00.020000 ChurchCRM is an open-source church management system. Prior to version 6.0.0, th
CVE-2025-14763 5.3 0.01% 1 0 2025-12-18T15:47:08 ## Summary S3 Encryption Client for Java is an open-source client-side encrypti
CVE-2025-64468 7.8 0.01% 1 0 2025-12-18T15:30:51 There is a use-after-free vulnerability in sentry!sentry_span_set_data() when pa
CVE-2025-13110 4.3 0.03% 1 0 2025-12-18T15:30:51 The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is
CVE-2025-14437 7.5 0.06% 1 0 2025-12-18T15:30:51 The Hummingbird Performance plugin for WordPress is vulnerable to Sensitive Info
CVE-2025-65007 None 0.04% 1 0 2025-12-18T15:30:51 In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) due to lack of
CVE-2025-64467 7.8 0.01% 1 0 2025-12-18T15:30:45 There is an out of bounds read vulnerability in NI LabVIEW in LVResFile::FindRsr
CVE-2025-64465 7.8 0.01% 1 0 2025-12-18T15:30:45 There is an out of bounds read vulnerability in NI LabVIEW in lvre!DataSizeTDR()
CVE-2025-14277 4.3 0.03% 1 0 2025-12-18T15:30:43 The Prime Slider – Addons for Elementor plugin for WordPress is vulnerable to Se
CVE-2025-46295 9.8 0.33% 1 0 2025-12-18T15:08:06.237000 Apache Commons Text versions prior to 1.10.0 included interpolation features tha
CVE-2025-68463 4.9 0.03% 1 0 2025-12-18T15:07:42.550000 Bio.Entrez in Biopython through 186 allows doctype XXE.
CVE-2025-47382 7.8 0.01% 1 0 2025-12-18T15:07:42.550000 Memory corruption while loading an invalid firmware in boot loader.
CVE-2025-14856 6.3 0.04% 1 0 2025-12-18T15:07:42.550000 A security vulnerability has been detected in y_project RuoYi up to 4.8.1. The a
CVE-2025-68129 6.8 0.06% 1 0 2025-12-18T15:07:42.550000 Auth0-PHP is a PHP SDK for Auth0 Authentication and Management APIs. In applicat
CVE-2025-14759 5.3 0.01% 1 0 2025-12-18T15:07:42.550000 Missing cryptographic key commitment in the Amazon S3 Encryption Client for .NET
CVE-2025-14762 5.3 0.02% 1 0 2025-12-18T15:07:42.550000 Missing cryptographic key commitment in the AWS SDK for Ruby may allow a user wi
CVE-2022-23851 9.8 0.05% 1 0 2025-12-18T15:07:42.550000 Netaxis API Orchestrator (APIO) before 0.19.3 allows server side template inject
CVE-2025-14618 4.3 0.03% 1 0 2025-12-18T15:07:18.427000 The Sweet Energy Efficiency plugin for WordPress is vulnerable to unauthorized a
CVE-2025-40602 6.6 1.42% 5 2 2025-12-18T12:30:33 A local privilege escalation vulnerability due to insufficient authorization in
CVE-2025-10910 None 0.14% 2 0 2025-12-18T12:30:33 A flaw in the binding process of Govee’s cloud platform and devices allows a rem
CVE-2025-68459 7.2 0.17% 2 0 2025-12-18T06:30:19 RG - AP180, Indoor Wall Plate Wireless AP AP180 series provided by Ruijie Networ
CVE-2025-47372 9.0 0.02% 1 0 2025-12-18T06:30:19 Memory Corruption when a corrupted ELF image with an oversized file size is read
CVE-2025-68462 3.2 0.01% 1 0 2025-12-18T06:30:19 Freedombox before 25.17.1 does not set proper permissions for the backups-data d
CVE-2025-47387 7.8 0.01% 1 0 2025-12-18T06:30:19 Memory Corruption when processing IOCTLs for JPEG data without verification.
CVE-2025-12885 6.4 0.03% 1 0 2025-12-18T03:30:18 The Embed Any Document – Embed PDF, Word, PowerPoint and Excel Files plugin for
CVE-2025-14841 3.3 0.01% 1 0 2025-12-18T03:30:18 A flaw has been found in OFFIS DCMTK up to 3.6.9. The impacted element is the fu
CVE-2025-14202 None 0.05% 2 0 2025-12-18T00:34:16 A vulnerability in the file upload at bookmark + asset rendering pipeline allows
CVE-2023-53933 8.8 0.24% 1 0 2025-12-18T00:34:16 Serendipity 2.4.0 contains a remote code execution vulnerability that allows aut
CVE-2025-67172 7.2 0.27% 1 0 2025-12-17T21:31:53 RiteCMS v3.1.0 was discovered to contain an authenticated remote code execution
CVE-2025-66924 6.1 0.04% 1 0 2025-12-17T21:31:53 A Cross-site scripting (XSS) vulnerability in Create/Update Item Kit(s) in Open
CVE-2025-65203 7.1 0.01% 1 0 2025-12-17T21:31:53 KeePassXC-Browser thru 1.9.9.2 autofills or prompts to fill stored credentials i
CVE-2025-67073 9.8 0.15% 2 0 2025-12-17T21:30:56 A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in
CVE-2025-13326 3.9 0.01% 1 0 2025-12-17T21:30:56 Mattermost Desktop App versions <6.0.0 fail to enable the Hardened Runtime on th
CVE-2025-20393 10.0 4.56% 15 5 2025-12-17T21:30:47 Cisco is aware of a potential vulnerability.&nbsp; Cisco is currently investigat
CVE-2025-59718 9.8 5.95% 3 2 2025-12-17T13:54:45.390000 A improper verification of cryptographic signature vulnerability in Fortinet For
CVE-2025-68154 8.1 0.07% 1 0 2025-12-16T22:37:26 ## Summary The `fsSize()` function in `systeminformation` is vulnerable to **OS
CVE-2025-68260 None 0.02% 3 0 2025-12-16T15:30:56 In the Linux kernel, the following vulnerability has been resolved: rust_binder
CVE-2025-66471 7.5 0.02% 1 0 2025-12-10T16:10:33.500000 urllib3 is a user-friendly HTTP client library for Python. Starting in version 1
CVE-2025-59719 9.8 0.07% 2 0 2025-12-09T18:30:52 An improper verification of cryptographic signature vulnerability in Fortinet Fo
CVE-2025-41746 7.1 0.09% 1 0 2025-12-09T18:30:45 An XSS vulnerability in pxc_portSecCfg.php can be used by an unauthenticated rem
CVE-2025-41748 7.1 0.09% 1 0 2025-12-09T18:30:44 An XSS vulnerability in pxc_Dot1xCfg.php can be used by an unauthenticated remot
CVE-2025-41745 7.1 0.09% 1 0 2025-12-09T18:30:44 An XSS vulnerability in pxc_portCntr2.php can be used by an unauthenticated remo
CVE-2025-41695 7.1 0.09% 1 0 2025-12-09T18:30:44 An XSS vulnerability in dyn_conn.php can be used by an unauthenticated remote at
CVE-2025-41750 7.1 0.09% 1 0 2025-12-09T18:30:44 An XSS vulnerability in pxc_PortCfg.php can be used by an unauthenticated remote
CVE-2025-41696 4.6 0.02% 1 0 2025-12-09T18:30:44 An attacker can use an undocumented UART port on the PCB as a side-channel with
CVE-2025-41752 7.1 0.09% 1 0 2025-12-09T18:30:44 An XSS vulnerability in pxc_portSfp.php can be used by an unauthenticated remote
CVE-2025-41693 4.3 0.23% 1 0 2025-12-09T18:30:43 A low privileged remote attacker can use the ssh feature to execute commands dir
CVE-2025-41694 6.5 0.11% 1 0 2025-12-09T18:30:43 A low privileged remote attacker can run the webshell with an empty command cont
CVE-2025-41692 6.8 0.02% 1 0 2025-12-09T18:30:43 A high privileged remote attacker with admin privileges for the webUI can brute-
CVE-2025-55182 10.0 43.43% 3 100 template 2025-12-09T16:53:25 ### Impact There is an unauthenticated remote code execution vulnerability in R
CVE-2025-37899 7.8 0.01% 2 2 2025-12-06T22:15:50.277000 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix
CVE-2025-65945 7.5 0.01% 1 1 2025-12-04T22:50:04 ### Overview An improper signature verification vulnerability exists when using
CVE-2025-66478 0 0.00% 1 100 2025-12-03T18:15:47.200000 Rejected reason: This CVE is a duplicate of CVE-2025-55182.
CVE-2025-59230 7.8 8.49% 1 0 2025-12-03T13:47:09.720000 Improper access control in Windows Remote Access Connection Manager allows an au
CVE-2025-34352 None 0.02% 1 0 2025-12-02T21:31:37 JumpCloud Remote Assist for Windows versions prior to 0.317.0 include an uninsta
CVE-2025-40300 None 0.06% 1 0 2025-11-17T18:30:25 In the Linux kernel, the following vulnerability has been resolved: x86/vmscape
CVE-2025-11953 9.8 0.49% 1 3 2025-11-13T16:25:27 The Metro Development Server, which is opened by the React Native CLI, binds to
CVE-2025-9242 9.8 73.45% 1 2 template 2025-11-13T15:31:32 An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remot
CVE-2025-12480 9.1 78.02% 1 0 template 2025-11-12T15:32:32 Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access
CVE-2025-59287 9.8 77.27% 1 21 template 2025-11-11T15:32:22 Deserialization of untrusted data in Windows Server Update Service allows an una
CVE-2025-7962 7.5 0.01% 1 0 2025-11-05T20:31:47 In Jakarta Mail 2.2 it is possible to preform a SMTP Injection by utilizing the 
CVE-2025-53057 5.9 0.09% 1 0 2025-11-03T18:32:51 Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Ente
CVE-2025-53066 7.5 0.09% 1 0 2025-11-03T18:31:47 Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Ente
CVE-2025-31324 10.0 40.17% 1 19 template 2025-10-22T00:34:21 SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper a
CVE-2025-23006 9.8 56.66% 1 0 2025-10-22T00:34:17 Pre-authentication deserialization of untrusted data vulnerability has been iden
CVE-2024-53704 9.8 93.82% 1 1 template 2025-10-22T00:34:16 An Improper Authentication vulnerability in the SSLVPN authentication mechanism
CVE-2023-22518 9.1 94.38% 1 9 template 2025-10-22T00:32:54 All versions of Confluence Data Center and Server are affected by this unexploit
CVE-2025-50165 9.8 3.84% 1 1 2025-08-12T18:31:39 Untrusted pointer dereference in Microsoft Graphics Component allows an unauthor
CVE-2025-25231 7.5 10.75% 1 1 template 2025-08-11T19:15:27.343000 Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerabil
CVE-2025-24294 5.3 0.06% 1 0 2025-07-15T22:56:20 A denial of service vulnerability has been discovered in the resolv gem bundled
CVE-2025-30023 9.1 1.92% 1 0 2025-07-11T06:30:36 The communication protocol used between client and server had a flaw that could
CVE-2025-30026 None 0.03% 1 0 2025-07-11T06:30:36 The AXIS Camera Station Server had a flaw that allowed to bypass authentication
CVE-2025-6514 9.7 0.73% 1 2 2025-07-09T18:08:46 mcp-remote is exposed to OS command injection when connecting to untrusted MCP s
CVE-2025-49146 8.2 0.01% 1 0 2025-06-11T16:17:03 ### Impact When the PostgreSQL JDBC driver is configured with channel binding se
CVE-2025-5516 2.4 0.05% 1 0 2025-06-06T17:42:29.520000 A vulnerability, which was classified as problematic, was found in TOTOLINK X200
CVE-2025-5499 7.3 0.11% 1 0 2025-06-03T15:31:27 A vulnerability classified as critical has been found in slackero phpwcms up to
CVE-2025-29970 7.8 0.07% 2 0 2025-05-19T14:20:49.300000 Use after free in Microsoft Brokering File System allows an authorized attacker
CVE-2025-2039 4.7 0.10% 1 4 2025-05-13T20:57:18.117000 A vulnerability classified as critical has been found in code-projects Blood Ban
CVE-2025-32210 6.5 0.04% 1 0 2025-04-11T15:39:52.920000 Missing Authorization vulnerability in CreativeMindsSolutions CM Registration an
CVE-2024-44067 8.4 0.04% 1 0 2024-08-20T20:35:34.497000 The T-Head XuanTie C910 CPU in the TH1520 SoC and the T-Head XuanTie C920 CPU in
CVE-2025-14282 0 0.00% 1 0 N/A
CVE-2025-66387 0 0.00% 1 0 N/A
CVE-2025-67745 0 0.02% 1 0 N/A
CVE-2025-63821 0 0.00% 1 1 N/A
CVE-2025-63820 0 0.00% 1 1 N/A
CVE-2025-66029 0 0.03% 1 0 N/A
CVE-2025-68435 0 0.07% 2 0 N/A
CVE-2025-68147 0 0.03% 1 1 N/A
CVE-2025-68399 0 0.03% 1 0 N/A
CVE-2025-68275 0 0.03% 1 0 N/A
CVE-2025-14760 0 0.02% 1 0 N/A

CVE-2025-37164
(10.0 CRITICAL)

EPSS: 74.82%

updated 2025-12-23T12:30:17

3 posts

A remote code execution issue exists in HPE OneView.

Nuclei template

2 repos

https://github.com/rxerium/CVE-2025-37164

https://github.com/g0vguy/CVE-2025-37164-PoC

GossiTheDog@cyberplace.social at 2025-12-19T15:10:26.000Z ##

@christopherkunz yeah... Rapid7 have a write up, I'd love to know how HPE ended up adding this feature rapid7.com/blog/post/etr-cve-2

##

GossiTheDog@cyberplace.social at 2025-12-19T10:14:00.000Z ##

HPE OneView CVE-2025-37164 worth paying attention to

- Widely used enterprise management software

- HPE added a REST command, executeCommand, which requires no authentication to execute commands. Obviously, this is dumb and now patched out

- Being on OneView allows attacker to access VMware, 3PAR storage etc by design

- Expect exploitation in the wild as it's so simple

- The vulnerability (executeCommand) was introduced around 2020, feels like a vulndoor

Shodan dork: product:"HPE OneView"

##

beyondmachines1@infosec.exchange at 2025-12-18T10:01:31.000Z ##

Critical remote code execution flaw reported in HPE OneView

HPE OneView has a critical unauthenticated remote code execution vulnerability (CVE-2025-37164) with a maximum CVSS score of 10.0, affecting all versions prior to 11.00. HPE has released version 11.00 as a patch and provides hotfixes for older versions to address this severe security flaw.

**Make sure all HPE OneView systems are isolated from the internet and accessible only from trusted networks. Reach out to HPE for details and plan a quick upgrade to version 11.00 or apply the appropriate hotfix for your current version (5.20-10.20).**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2023-52163
(8.8 HIGH)

EPSS: 0.15%

updated 2025-12-23T12:15:44.160000

5 posts

Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

DarkWebInformer at 2025-12-23T00:54:18.604Z ##

🚨 CISA has added on vulnerability to the KEV Catalog

CVE-2023-52163: Digiever DS-2105 Pro Missing Authorization Vulnerability

CVSS: 5.9

darkwebinformer.com/cisa-kev-c

Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

##

secdb at 2025-12-22T22:00:11.819Z ##

🚨 [CISA-2025:1222] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2023-52163 (secdb.nttzen.cloud/cve/detail/)
- Name: Digiever DS-2105 Pro Missing Authorization Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Digiever
- Product: DS-2105 Pro
- Notes: digiever.com/tw/support/faq-co ; nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2025-12-23T00:54:18.000Z ##

🚨 CISA has added on vulnerability to the KEV Catalog

CVE-2023-52163: Digiever DS-2105 Pro Missing Authorization Vulnerability

CVSS: 5.9

darkwebinformer.com/cisa-kev-c

Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

##

cisakevtracker@mastodon.social at 2025-12-22T19:00:55.000Z ##

CVE ID: CVE-2023-52163
Vendor: Digiever
Product: DS-2105 Pro
Date Added: 2025-12-22
Notes: digiever.com/tw/support/faq-co ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2025-12-22T18:00:39.000Z ##

CISA has added one vulnerability to the KEV catalogue.

CVE-2023-52163: Digiever DS-2105 Pro Missing Authorization Vulnerability cve.org/CVERecord?id=CVE-2023- #CISA #vulnerability #infosec

##

CVE-2025-14733
(9.8 CRITICAL)

EPSS: 31.40%

updated 2025-12-23T11:34:46.317000

8 posts

An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.5 and

2 repos

https://github.com/Ashwesker/Blackash-CVE-2025-14733

https://github.com/b1gchoi/CVE-2025-14733

undercodenews@mastodon.social at 2025-12-22T21:59:41.000Z ##

WatchGuard Firebox Zero-Day Under Attack: Critical Firewall Vulnerability Exploited + Video

Introduction A critical zero-day vulnerability in WatchGuard Firebox firewalls has entered the crosshairs of cybercriminals, highlighting an escalating trend of attacks on edge devices. This flaw, identified as CVE-2025-14733, allows remote code execution and exposes both enterprise and branch office networks to potential compromise. As organizations increasingly rely on edge…

undercodenews.com/watchguard-f

##

DarkWebInformer@infosec.exchange at 2025-12-19T21:00:51.000Z ##

🚨 CISA has added 1 vulnerability to the KEV Catalog

CVE-2025-14733: WatchGuard Firebox Out of Bounds Write Vulnerability

CVSS: 9.3

darkwebinformer.com/cisa-kev-c

##

cisakevtracker@mastodon.social at 2025-12-19T19:00:57.000Z ##

CVE ID: CVE-2025-14733
Vendor: WatchGuard
Product: Firebox
Date Added: 2025-12-19
Notes: Check for signs of potential compromise on all internet accessible instances after applying mitigations. For more information please see: watchguard.com/wgrd-psirt/advi ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

beyondmachines1@infosec.exchange at 2025-12-19T18:01:59.000Z ##

Critical actively exploited flaw in WatchGuard Fireware OS enables remote code execution through VPN service

WatchGuard patched a critical vulnerability (CVE-2025-14733) in Fireware OS that allows remote unauthenticated attackers to execute arbitrary code on devices with IKEv2 VPN configurations. The flaw is actively being exploited in the wild.

**If you have WatchGuard Firebox firewalls, you are under attack. Make a very quick update to the latest security updates from WatchGuard. After patching, change all passwords and security keys stored on the device, especially if you've ever used IKEv2 VPN configurations (even if now deleted). Old settings can still leave your firewall vulnerable.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

securityland@mastodon.social at 2025-12-19T13:24:20.000Z ##

Analysis of CVE-2025-14733, a critical WatchGuard Firebox security vulnerability. Learn why unauthenticated RCE persists even after deleting vulnerable VPN configurations.

#SecurityLand #CyberWatch #ZeroDay #Watchguard #SecurityVulnerability #Firewall #CVE

Read More: security.land/watchguard-cve-2

##

defendopsdiaries@infosec.exchange at 2025-12-19T10:37:04.000Z ##

Hackers can now take over WatchGuard Firebox firewalls with zero passwords needed, putting entire networks at risk. Is your organization’s gateway already compromised?

thedefendopsdiaries.com/exploi

##

jos1264@social.skynetcloud.site at 2025-12-19T02:30:01.000Z ##

CVE-2025-14733 - WatchGuard Firebox iked Out of Bounds Write Vulnerability cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-19T02:15:01.000Z ##

CVE-2025-14733 - WatchGuard Firebox iked Out of Bounds Write Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14388
(9.8 CRITICAL)

EPSS: 0.00%

updated 2025-12-23T10:15:43.673000

1 posts

The PhastPress plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Read via null byte injection in all versions up to, and including, 3.7. This is due to a discrepancy between the extension validation in `getExtensionForURL()` which operates on URL-decoded paths, and `appendNormalized()` which strips everything after a null byte before constructing the filesystem path. This makes

offseq at 2025-12-23T10:03:42.139Z ##

🚨 CVE-2025-14388: CRITICAL vuln in PhastPress (≤3.7) lets unauth attackers read files like wp-config.php using double-encoded null bytes. Patch unavailable—disable plugin, block %2500 in URLs, monitor logs! radar.offseq.com/threat/cve-20

##

CVE-2025-65857
(7.5 HIGH)

EPSS: 0.00%

updated 2025-12-23T00:30:39

2 posts

An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06. The GetStreamUri exposes RTSP URIs containing hardcoded credentials enabling direct unauthorized video stream access.

1 repos

https://github.com/LuisMirandaAcebedo/CVE-2025-65857

CVE-2023-53974
(7.5 HIGH)

EPSS: 0.00%

updated 2025-12-23T00:30:38

2 posts

D-Link DSL-124 ME_1.00 contains a configuration file disclosure vulnerability that allows unauthenticated attackers to retrieve router settings through a POST request. Attackers can send a specific POST request to the router's configuration endpoint to download a complete backup file containing sensitive network credentials and system configurations.

CVE-2025-65856
(9.8 CRITICAL)

EPSS: 0.00%

updated 2025-12-22T22:16:08.360000

1 posts

Authentication bypass vulnerability in Xiongmai XM530 IP cameras on Firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06 allows unauthenticated remote attackers to access sensitive device information and live video streams. The ONVIF implementation fails to enforce authentication on 31 critical endpoints, enabling direct unauthorized video stream access.

1 repos

https://github.com/LuisMirandaAcebedo/CVE-2025-65856

offseq at 2025-12-23T01:05:47.496Z ##

⚠️ CVE-2025-65856 (CRITICAL): Auth bypass in Xiongmai XM530 IP cameras (Firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06) exposes live streams to unauth attackers. Disable ONVIF, restrict access, monitor for fixes. radar.offseq.com/threat/cve-20

##

CVE-2025-68475
(7.5 HIGH)

EPSS: 0.00%

updated 2025-12-22T21:36:56

2 posts

Hi Fedify team! 👋 Thank you for your work on Fedify—it's a fantastic library for building federated applications. While reviewing the codebase, I discovered a Regular Expression Denial of Service (ReDoS) vulnerability that I'd like to report. I hope this helps improve the project's security. --- ## Summary A Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document

CVE-2025-67289
(9.6 CRITICAL)

EPSS: 0.00%

updated 2025-12-22T21:15:45.020000

1 posts

An arbitrary file upload vulnerability in the Attachments module of Frappe Framework v15.89.0 allows attackers to execute arbitrary code via uploading a crafted XML file.

offseq at 2025-12-23T05:34:46.008Z ##

🚨 CVE-2025-67289 (CRITICAL): Frappe Framework v15.89.0 affected by arbitrary file upload flaw—unauthenticated attackers can gain code execution via malicious XML files. Restrict uploads & monitor activity ASAP. radar.offseq.com/threat/cve-20

##

CVE-2025-67418
(9.8 CRITICAL)

EPSS: 0.00%

updated 2025-12-22T20:15:45.303000

1 posts

ClipBucket 5.5.2 is affected by an improper access control issue where the product is shipped or deployed with hardcoded default administrative credentials. An unauthenticated remote attacker can log in to the administrative panel using these default credentials, resulting in full administrative control of the application.

offseq at 2025-12-23T02:36:03.765Z ##

🚨 CVE-2025-67418 (CRITICAL): ClipBucket 5.5.2 uses hardcoded default admin creds. Remote attackers can gain full admin access if creds aren't changed. Update creds ASAP, restrict access, and monitor logs. More: radar.offseq.com/threat/cve-20

##

CVE-2025-67288
(10.0 CRITICAL)

EPSS: 0.00%

updated 2025-12-22T19:15:49.710000

1 posts

An arbitrary file upload vulnerability in Umbraco CMS v16.3.3 allows attackers to execute arbitrary code via uploading a crafted PDF file.

offseq at 2025-12-23T04:04:43.317Z ##

🚨 CRITICAL: CVE-2025-67288 in Umbraco CMS 16.3.3 lets attackers upload malicious PDFs & run code remotely. No patch yet—enforce strict file validation, monitor uploads, & restrict access! radar.offseq.com/threat/cve-20

##

CVE-2025-68613
(10.0 CRITICAL)

EPSS: 0.22%

updated 2025-12-22T16:19:13

1 posts

### Impact n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary

6 repos

https://github.com/rxerium/CVE-2025-68613

https://github.com/wioui/n8n-CVE-2025-68613-exploit

https://github.com/ali-py3/Exploit-CVE-2025-68613

https://github.com/Ashwesker/Blackash-CVE-2025-68613

https://github.com/intbjw/CVE-2025-68613-poc-via-copilot

https://github.com/TheStingR/CVE-2025-68613-POC

beyondmachines1@infosec.exchange at 2025-12-22T09:01:31.000Z ##

Critical remote code execution flaw reported in n8n workflow automation platform

n8n's workflow automation platform reports a critical vulnerability (CVE-2025-68613, CVSS 10.0) allowing authenticated attackers to execute arbitrary code with full system privileges, potentially exposing sensitive workflows, API credentials, and corporate networks.

**If you're running self-hosted n8n, plan a quick upgrade to version 1.120.4, 1.121.1, or 1.122.0 to patch CVE-2025-68613. Until you upgrade, restrict workflow editing permissions to fully trusted users only.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-12049
(0 None)

EPSS: 0.07%

updated 2025-12-22T05:16:19.120000

1 posts

Missing Authentication for Critical Function vulnerability in Sharp Display Solutions Media Player MP-01 All Verisons allows a attacker may access to the web interface of the affected product without authentication and change settings or perform other operations, and deliver content from the authoring software to the affected product without authentication.

offseq at 2025-12-23T00:03:53.374Z ##

🛑 CRITICAL: CVE-2025-12049 in Sharp Media Player MP-01 (all versions)—missing authentication lets unauth'd attackers control device settings & inject content. Isolate devices, restrict access, monitor for abuse. No patch yet. radar.offseq.com/threat/cve-20

##

CVE-2025-14881(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-12-20T17:39:03

1 posts

Multiple API endpoints allowed access to sensitive files from other users by knowing the UUID of the file that were not intended to be accessible by UUID only.

CVE-2025-63389(CVSS UNKNOWN)

EPSS: 0.25%

updated 2025-12-20T05:37:50

1 posts

A critical authentication bypass vulnerability exists in Ollama platform's API endpoints in versions prior to and including v0.12.3. The platform exposes multiple API endpoints without requiring authentication, enabling remote attackers to perform unauthorized model management operations.

cR0w@infosec.exchange at 2025-12-18T15:29:52.000Z ##

Go hack more AI shit.

cve.org/CVERecord?id=CVE-2025-

A critical authentication bypass vulnerability exists in Ollama platform's API endpoints in versions prior to and including v0.12.3. The platform exposes multiple API endpoints without requiring authentication, enabling remote attackers to perform unauthorized model management operations.

##

CVE-2025-14761
(5.3 MEDIUM)

EPSS: 0.02%

updated 2025-12-20T05:31:03

1 posts

## Summary S3 Encryption Client for PHP is an open-source client-side encryption library used to facilitate writing and reading encrypted records to S3. When the encrypted data key (EDK) is stored in an "Instruction File" instead of S3's metadata record, the EDK is exposed to an "Invisible Salamanders" attack (https://eprint.iacr.org/2019/016), which could allow the EDK to be replaced with a

CVE-2025-68398
(9.1 CRITICAL)

EPSS: 0.11%

updated 2025-12-20T05:26:43

1 posts

### Impact It was possible to overwrite Git configuration remotely and override some of its behavior. ### Resources Thanks to Jason Marcello for responsible disclosure.

jos1264@social.skynetcloud.site at 2025-12-19T02:30:01.000Z ##

CVE-2025-68398 - Weblate has git config file overwrite vulnerability that leads to remote code execution cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14299(CVSS UNKNOWN)

EPSS: 0.06%

updated 2025-12-20T03:31:40

1 posts

The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length header, which can lead to an integer overflow. An unauthenticated attacker on the same local network segment can send crafted HTTPS requests to trigger excessive memory allocation, causing the device to crash and resulting in denial-of-service (DoS).

CVE-2025-14300(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-12-20T03:31:40

1 posts

The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper authentication. An unauthenticated attacker on the same local network segment can exploit this to modify the device’s Wi-Fi configuration, resulting in loss of connectivity and denial-of-service (DoS).

CVE-2025-8065(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-20T03:31:40

1 posts

A buffer overflow vulnerability exists in the ONVIF XML parser of Tapo C200 V3. An unauthenticated attacker on the same local network segment can send specially crafted SOAP XML requests, causing memory overflow and device crash, resulting in denial-of-service (DoS).

CVE-2025-63390
(5.3 MEDIUM)

EPSS: 0.05%

updated 2025-12-20T00:31:32

1 posts

An authentication bypass vulnerability exists in AnythingLLM v1.8.5 in via the /api/workspaces endpoint. The endpoint fails to implement proper authentication checks, allowing unauthenticated remote attackers to enumerate and retrieve detailed information about all configured workspaces. Exposed data includes: workspace identifiers (id, name, slug), AI model configurations (chatProvider, chatModel

CVE-2025-68161(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-12-19T22:08:03

2 posts

The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the [verifyHostName](https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName) configuration attribute or the [log4j2.sslVerifyHostName](https://logging.apache.org/log4j/2.x/manual/systemproperties

cR0w@infosec.exchange at 2025-12-18T21:10:12.000Z ##

1000 yard stare

logging.apache.org/security.ht

##

jschauma@mstdn.social at 2025-12-18T19:27:47.000Z ##

For my fellow Log4j victims celebrating 4 years #log4shell PTSD: CVE-2025-68161

"The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the verifyHostName configuration attribute or the log4j2.sslVerifyHostName system property is set to true."

logging.apache.org/security.ht

(It's not that terrible. Seeing the string "log4j" just makes me twitch. :-)

##

CVE-2025-34437
(8.8 HIGH)

EPSS: 0.10%

updated 2025-12-19T21:31:26

1 posts

AVideo versions prior to 20.0 permit any authenticated user to upload comment images to videos owned by other users. The endpoint validates authentication but omits ownership checks, allowing attackers to perform unauthorized uploads to arbitrary video objects.

jos1264@social.skynetcloud.site at 2025-12-17T22:30:01.000Z ##

CVE-2025-34437 - AVideo < 20.0 IDOR Arbitrary Comment Image Upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14964
(9.8 CRITICAL)

EPSS: 0.08%

updated 2025-12-19T21:30:26

1 posts

A vulnerability has been found in TOTOLINK T10 4.1.8cu.5083_B20200521. This affects the function sprintf of the file /cgi-bin/cstecgi.cgi. Such manipulation of the argument loginAuthUrl leads to stack-based buffer overflow. The attack may be performed from remote.

CVE-2025-34436
(8.8 HIGH)

EPSS: 0.10%

updated 2025-12-19T21:30:17

1 posts

AVideo versions prior to 20.0 allow any authenticated user to upload files into directories belonging to other users due to an insecure direct object reference. The upload functionality verifies authentication but does not enforce ownership checks.

CVE-2025-66908
(5.3 MEDIUM)

EPSS: 0.04%

updated 2025-12-19T18:32:25

1 posts

Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an improper file type validation vulnerability in the OCR image upload functionality. The OcrController in turms-ai-serving/src/main/java/im/turms/ai/domain/ocr/controller/OcrController.java uses the @FormData(contentType = MediaTypeConst.IMAGE) annotation to restrict uploads to image files, but this constraint is not properly enforced.

CVE-2025-65568
(7.5 HIGH)

EPSS: 0.04%

updated 2025-12-19T18:32:20

1 posts

A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2.1.3-dev. After PFCP association, a PFCP Session Establishment Request that includes a CreateFAR with an empty or truncated IPv4 address field is not properly validated. During parsing, parseFAR() calls ip2int(), which performs an out-of-bounds read on the IPv4 address buffer and tr

jos1264@social.skynetcloud.site at 2025-12-18T20:30:01.000Z ##

CVE-2025-65568 - OmeC-Project UPF pfcpiface Denial-of-Service Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65565
(7.5 HIGH)

EPSS: 0.05%

updated 2025-12-19T18:32:19

1 posts

A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2.1.3-dev. After PFCP association is established, a PFCP Session Establishment Request that is missing the mandatory F-SEID (CPF-SEID) Information Element is not properly validated. The session establishment handler calls IE.FSEID() on a nil pointer, which triggers a panic and termin

jos1264@social.skynetcloud.site at 2025-12-18T20:30:00.000Z ##

CVE-2025-65565 - "OmeC-Project UPF pfcpiface Denial-of-Service Vulnerability" cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65564
(7.5 HIGH)

EPSS: 0.05%

updated 2025-12-19T18:32:19

1 posts

A denial-of-service vulnerability exists in the omec-upf (upf-epc-pfcpiface) in version upf-epc-pfcpiface:2.1.3-dev. When the UPF receives a PFCP Association Setup Request that is missing the mandatory Recovery Time Stamp Information Element, the association setup handler dereferences a nil pointer via IE.RecoveryTimeStamp() instead of validating the message. This results in a panic and terminates

CVE-2025-52692
(8.8 HIGH)

EPSS: 0.02%

updated 2025-12-19T18:31:18

1 posts

Successful exploitation of the vulnerability could allow an attacker with local network access to send a specially crafted URL to access certain administration functions without login credentials.

CVE-2025-65567
(7.5 HIGH)

EPSS: 0.04%

updated 2025-12-19T18:15:50.570000

1 posts

A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2.1.3-dev. After PFCP association, a specially crafted PFCP Session Establishment Request with a CreatePDR that contains a malformed Flow-Description is not robustly validated. The Flow-Description parser (parseFlowDesc) can read beyond the bounds of the provided buffer, causing a pa

jos1264@social.skynetcloud.site at 2025-12-18T20:30:01.000Z ##

CVE-2025-65567 - OmeC-Project UPF Denial-of-Service Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-41697
(6.8 MEDIUM)

EPSS: 0.02%

updated 2025-12-19T18:12:09.187000

1 posts

An attacker can use an undocumented UART port on the PCB as a side-channel to get root access e.g. with the credentials obtained from CVE-2025-41692.

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-14878
(9.8 CRITICAL)

EPSS: 0.05%

updated 2025-12-19T18:00:54.283000

2 posts

A security flaw has been discovered in Tenda WH450 1.0.0.18. This impacts an unknown function of the file /goform/wirelessRestart of the component HTTP Request Handler. The manipulation of the argument GO results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be exploited.

CVE-2025-64469
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-19T18:00:54.283000

1 posts

There is a stack-based buffer overflow vulnerability in NI LabVIEW in LVResFile::FindRsrcListEntry() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64469 - Stack-based Buffer Overflow in LVResource::DetachResource() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64466
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-19T18:00:54.283000

1 posts

There is an out of bounds read vulnerability in NI LabVIEW in lvre!ExecPostedProcRecPost() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64466 - Out-of-Bounds Read in lvre!ExecPostedProcRecPost() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66909
(7.5 HIGH)

EPSS: 0.08%

updated 2025-12-19T18:00:18.330000

1 posts

Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an image decompression bomb denial of service vulnerability. The ExtendedOpenCVImage class in ai/djl/opencv/ExtendedOpenCVImage.java loads images using OpenCV's imread() function without validating dimensions or pixel count before decompression. An attacker can upload a specially crafted compressed image file (e.g., PNG) that is small w

CVE-2025-14882
(0 None)

EPSS: 0.04%

updated 2025-12-19T18:00:18.330000

1 posts

An API endpoint allowed access to sensitive files from other users by knowing the UUID of the file that were not intended to be accessible by UUID only.

CVE-2025-1885
(5.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-19T18:00:18.330000

1 posts

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Restajet Information Technologies Inc. Online Food Delivery System allows Phishing, Forceful Browsing.This issue affects Online Food Delivery System: through 19122025.

jos1264@social.skynetcloud.site at 2025-12-19T13:30:01.000Z ##

CVE-2025-1885 - Open Redirect in Restajet's Online Food Delivery System cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11747
(6.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-19T18:00:18.330000

1 posts

The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the colibri_blog_posts shortcode in all versions up to, and including, 1.0.345 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that

jos1264@social.skynetcloud.site at 2025-12-19T09:15:01.000Z ##

CVE-2025-11747 - Colibri Page Builder <= 1.0.345 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66521
(6.3 MEDIUM)

EPSS: 0.02%

updated 2025-12-19T18:00:18.330000

1 posts

A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com within the Trusted Certificates feature. A crafted payload can be injected as the certificate name, which is later rendered into the DOM without proper sanitization. As a result, the injected script executes each time the Trusted Certificates view is loaded.

jos1264@social.skynetcloud.site at 2025-12-19T09:15:01.000Z ##

CVE-2025-66521 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Trusted Certificates Feature cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67843
(8.3 HIGH)

EPSS: 0.23%

updated 2025-12-19T18:00:18.330000

1 posts

A Server-Side Template Injection (SSTI) vulnerability in the MDX Rendering Engine in Mintlify Platform before 2025-11-15 allows remote attackers to execute arbitrary code via inline JSX expressions in an MDX file.

CVE-2025-11774
(8.2 HIGH)

EPSS: 0.03%

updated 2025-12-19T18:00:18.330000

2 posts

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the software keyboard function (hereinafter referred to as "keypad function") of Mitsubishi Electric GENESIS64 versions 10.97.2 CFR3 and prior, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.2 CFR3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.2 CFR3 and

jos1264@social.skynetcloud.site at 2025-12-19T02:30:01.000Z ##

CVE-2025-11774 - Malicious Code Execution Vulnerability in the Software Keyboard Function of GENESIS64, ICONICS Suite, Mobile HMI, and MC Works64 cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-19T02:15:00.000Z ##

CVE-2025-11774 - Malicious Code Execution Vulnerability in the Software Keyboard Function of GENESIS64, ICONICS Suite, Mobile HMI, and MC Works64 cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14900
(4.7 MEDIUM)

EPSS: 0.03%

updated 2025-12-19T18:00:18.330000

1 posts

A security vulnerability has been detected in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /admin/userdelete.php of the component Administrator Endpoint. Such manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

jos1264@social.skynetcloud.site at 2025-12-19T02:15:01.000Z ##

CVE-2025-14900 - CodeAstro Real Estate Management System Administrator Endpoint userdelete.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14908
(6.3 MEDIUM)

EPSS: 0.06%

updated 2025-12-19T18:00:18.330000

1 posts

A security flaw has been discovered in JeecgBoot up to 3.9.0. The affected element is an unknown function of the file jeecg-boot/jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/controller/SysTenantController.java of the component Multi-Tenant Management Module. Performing manipulation of the argument ID results in improper authentication. The attack can be initiated rem

jos1264@social.skynetcloud.site at 2025-12-19T02:15:01.000Z ##

CVE-2025-14908 - JeecgBoot Multi-Tenant Management SysTenantController.java improper authentication cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14899
(4.7 MEDIUM)

EPSS: 0.03%

updated 2025-12-19T18:00:18.330000

1 posts

A weakness has been identified in CodeAstro Real Estate Management System 1.0. This impacts an unknown function of the file /admin/stateadd.php of the component Administrator Endpoint. This manipulation causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.

jos1264@social.skynetcloud.site at 2025-12-19T02:15:01.000Z ##

CVE-2025-14899 - CodeAstro Real Estate Management System Administrator Endpoint stateadd.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13427
(0 None)

EPSS: 0.12%

updated 2025-12-19T18:00:18.330000

1 posts

An authentication bypass vulnerability in Google Cloud Dialogflow CX Messenger allowed unauthenticated users to interact with restricted chat agents, gaining access to the agents' knowledge and the ability to trigger their intents, by manipulating initialization parameters or crafting specific API requests. All versions after August 20th, 2025 have been updated to protect from this vulnerability

jos1264@social.skynetcloud.site at 2025-12-19T00:15:01.000Z ##

CVE-2025-13427 - Authentication Bypass in Dialogflow CX Messenger cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64677
(8.2 HIGH)

EPSS: 0.07%

updated 2025-12-19T18:00:18.330000

1 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Office Out-of-Box Experience allows an unauthorized attacker to perform spoofing over a network.

jos1264@social.skynetcloud.site at 2025-12-18T22:30:01.000Z ##

CVE-2025-64677 - Office Out-of-Box Experience Spoofing Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64676
(7.2 HIGH)

EPSS: 0.11%

updated 2025-12-19T18:00:18.330000

1 posts

'.../...//' in Microsoft Purview allows an authorized attacker to execute code over a network.

cR0w@infosec.exchange at 2025-12-18T22:12:44.000Z ##

Microsoft patched several sev:CRIT cloud vulns, including this ../ in Purview. LMAO.

msrc.microsoft.com/update-guid

##

CVE-2025-64236
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-12-19T18:00:18.330000

1 posts

Authentication Bypass Using an Alternate Path or Channel vulnerability in AmentoTech Tuturn allows Authentication Abuse.This issue affects Tuturn: from n/a before 3.6.

jos1264@social.skynetcloud.site at 2025-12-18T19:15:01.000Z ##

CVE-2025-64236 - WordPress Tuturn plugin < 3.6 - Broken Authentication vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14896
(7.5 HIGH)

EPSS: 0.03%

updated 2025-12-19T18:00:18.330000

1 posts

due to insufficient sanitazation in Vega’s `convert()` function when `safeMode` is enabled and the spec variable is an array. An attacker can craft a malicious Vega diagram specification that will allow them to send requests to any URL, including local file system paths, leading to exposure of sensitive information.

CVE-2025-14739
(0 None)

EPSS: 0.01%

updated 2025-12-19T18:00:18.330000

1 posts

Access of Uninitialized Pointer vulnerability in TP-Link WR940N and WR941ND allows local unauthenticated attackers the ability to execute DoS attack and potentially arbitrary code execution under the context of the ‘root’ user.This issue affects WR940N and WR941ND: ≤ WR940N v5 3.20.1 Build 200316, ≤ WR941ND v6 3.16.9 Build 151203.

CVE-2025-63391
(7.5 HIGH)

EPSS: 0.08%

updated 2025-12-19T18:00:18.330000

1 posts

An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api/config endpoint. The endpoint lacks proper authentication and authorization controls, exposing sensitive system configuration data to unauthenticated remote attackers.

cR0w@infosec.exchange at 2025-12-18T15:31:10.000Z ##

Auth bypass in Open-WebUI.

cve.org/CVERecord?id=CVE-2025-

An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api/config endpoint. The endpoint lacks proper authentication and authorization controls, exposing sensitive system configuration data to unauthenticated remote attackers.

##

CVE-2025-41749
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-19T16:46:12.343000

1 posts

An XSS vulnerability in port_util.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configu

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41747
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-19T16:46:06.333000

1 posts

An XSS vulnerability in pxc_vlanIntfCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to devic

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41751
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-19T16:45:53.940000

1 posts

An XSS vulnerability in pxc_portCntr.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device conf

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-1928
(9.1 CRITICAL)

EPSS: 0.05%

updated 2025-12-19T15:31:25

1 posts

Improper Restriction of Excessive Authentication Attempts vulnerability in Restajet Information Technologies Inc. Online Food Delivery System allows Password Recovery Exploitation.This issue affects Online Food Delivery System: through 19122025.

jos1264@social.skynetcloud.site at 2025-12-19T13:30:01.000Z ##

CVE-2025-1928 - Improper Authentication in Restajet's Online Food Delivery System cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-1927
(7.1 HIGH)

EPSS: 0.01%

updated 2025-12-19T12:31:33

1 posts

Cross-Site Request Forgery (CSRF) vulnerability in Restajet Information Technologies Inc. Online Food Delivery System allows Cross Site Request Forgery.This issue affects Online Food Delivery System: through 19122025.

jos1264@social.skynetcloud.site at 2025-12-19T13:30:01.000Z ##

CVE-2025-1927 - CSRF in Restajet's Online Food Delivery System cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66522
(6.3 MEDIUM)

EPSS: 0.03%

updated 2025-12-19T09:30:40

1 posts

A stored cross-site scripting (XSS) vulnerability exists in the Digital IDs functionality of the Foxit PDF Editor Cloud (pdfonline.foxit.com). The application does not properly sanitize or encode the Common Name field of Digital IDs before inserting user-supplied content into the DOM. As a result, embedded HTML or JavaScript may execute whenever the Digital IDs dialog is accessed or when the affec

jos1264@social.skynetcloud.site at 2025-12-19T09:15:01.000Z ##

CVE-2025-66522 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Digital IDs Common Name Field cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14151
(6.1 MEDIUM)

EPSS: 0.09%

updated 2025-12-19T09:30:39

1 posts

The SlimStat Analytics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'outbound_resource' parameter in the slimtrack AJAX action in all versions up to, and including, 5.3.2. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will

jos1264@social.skynetcloud.site at 2025-12-19T09:15:01.000Z ##

CVE-2025-14151 - SlimStat Analytics <= 5.3.2 - Unauthenticated Stored Cross-Site Scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66520
(6.3 MEDIUM)

EPSS: 0.03%

updated 2025-12-19T09:30:39

1 posts

A stored cross-site scripting (XSS) vulnerability exists in the Portfolio feature of the Foxit PDF Editor cloud (pdfonline.foxit.com). User-supplied SVG files are not properly sanitized or validated before being inserted into the HTML structure. As a result, embedded HTML or JavaScript within a crafted SVG may execute whenever the Portfolio file list is rendered.

jos1264@social.skynetcloud.site at 2025-12-19T09:15:00.000Z ##

CVE-2025-66520 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Portfolio SVG Handling cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68490(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-19T06:30:34

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-12-19T05:45:01.000Z ##

CVE-2025-68490 - Apache HTTP Server Cross-Site Request Forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68488(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-19T06:30:34

1 posts

Rejected reason: Not used

CVE-2025-68487(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-19T06:30:34

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-12-19T05:45:00.000Z ##

CVE-2025-68487 - Apache HTTP Server Cross-Site Request Forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68491
(0 None)

EPSS: 0.00%

updated 2025-12-19T04:16:02.150000

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-12-19T05:45:01.000Z ##

CVE-2025-68491 - Apache HTTP Server Buffer Overflow Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68489
(0 None)

EPSS: 0.00%

updated 2025-12-19T04:16:02.017000

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-12-19T05:45:01.000Z ##

CVE-2025-68489 - Apache HTTP Server Cross-Site Request Forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13941
(8.8 HIGH)

EPSS: 0.01%

updated 2025-12-19T03:31:18

1 posts

A local privilege escalation vulnerability exists in the Foxit PDF Reader/Editor Update Service. During plugin installation, incorrect file system permissions are assigned to resources used by the update service. A local attacker with low privileges could modify or replace these resources, which are later executed by the service, resulting in execution of arbitrary code with SYSTEM privileges.

jos1264@social.skynetcloud.site at 2025-12-19T05:15:00.000Z ##

CVE-2025-13941 - Foxit PDF Reader Update Service Incorrect Permission Assignment Local Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64675
(8.3 HIGH)

EPSS: 0.08%

updated 2025-12-19T00:31:52

1 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Azure Cosmos DB allows an unauthorized attacker to perform spoofing over a network.

CVE-2025-68382
(6.5 MEDIUM)

EPSS: 0.04%

updated 2025-12-19T00:31:47

1 posts

Out-of-bounds read (CWE-125) allows an unauthenticated remote attacker to perform a buffer overflow (CAPEC-100) via the NFS protocol dissector, leading to a denial-of-service (DoS) through a reliable process crash when handling truncated XDR-encoded RPC messages.

CVE-2025-65037
(10.0 CRITICAL)

EPSS: 0.10%

updated 2025-12-19T00:31:47

1 posts

Improper control of generation of code ('code injection') in Azure Container Apps allows an unauthorized attacker to execute code over a network.

jos1264@social.skynetcloud.site at 2025-12-18T22:30:01.000Z ##

CVE-2025-65037 - Azure Container Apps Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64663
(10.0 CRITICAL)

EPSS: 0.08%

updated 2025-12-19T00:31:47

1 posts

Custom Question Answering Elevation of Privilege Vulnerability

jos1264@social.skynetcloud.site at 2025-12-18T22:30:00.000Z ##

CVE-2025-64663 - Custom Question Answering Elevation of Privilege Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-34452(CVSS UNKNOWN)

EPSS: 0.38%

updated 2025-12-19T00:31:47

1 posts

Streama versions 1.10.0 through 1.10.5 and prior to commit b7c8767 contain a combination of path traversal and server-side request forgery (SSRF) vulnerabilities in that allow an authenticated attacker to write arbitrary files to the server filesystem. The issue exists in the subtitle download functionality, where user-controlled parameters are used to fetch remote content and construct file paths

jos1264@social.skynetcloud.site at 2025-12-18T22:30:00.000Z ##

CVE-2025-34452 - Streama Subtitle Download Path Traversal and SSRF Leading to Arbitrary File Write cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65041
(10.0 CRITICAL)

EPSS: 0.09%

updated 2025-12-19T00:31:46

2 posts

Improper authorization in Microsoft Partner Center allows an unauthorized attacker to elevate privileges over a network.

offseq@infosec.exchange at 2025-12-19T04:05:06.000Z ##

🚨 CRITICAL vuln: CVE-2025-65041 in Microsoft Partner Center enables unauthenticated remote privilege escalation (CVSS 10). No patch yet—segment networks, enforce MFA, and monitor for abuse. Stay updated! radar.offseq.com/threat/cve-20 #OffSeq #Microsoft #CloudSecurity #CVE2025_65041

##

jos1264@social.skynetcloud.site at 2025-12-18T22:30:01.000Z ##

CVE-2025-65041 - Microsoft Partner Center Elevation of Privilege Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68381
(6.5 MEDIUM)

EPSS: 0.04%

updated 2025-12-19T00:31:46

1 posts

Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated attacker to exploit a Buffer Overflow (CAPEC-100) and reliably crash the application or cause significant resource exhaustion via a single crafted UDP packet with an invalid fragment sequence number.

CVE-2025-53000(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-18T22:03:09

1 posts

### Summary On Windows, converting a notebook containing SVG output to a PDF results in unauthorized code execution. Specifically, a third party can create a `inkscape.bat` file that defines a [Windows batch script](https://en.wikipedia.org/wiki/Batch_file), capable of arbitrary code execution. When a user runs `jupyter nbconvert --to pdf` on a notebook containing SVG output to a PDF on a Window

jos1264@social.skynetcloud.site at 2025-12-17T22:30:02.000Z ##

CVE-2025-53000 - nbconvert has an uncontrolled search path that leads to unauthorized code execution on Windows cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64374
(10.0 CRITICAL)

EPSS: 0.04%

updated 2025-12-18T21:32:49

1 posts

Unrestricted Upload of File with Dangerous Type vulnerability in StylemixThemes Motors motors allows Using Malicious Files.This issue affects Motors: from n/a through <= 5.6.81.

beyondmachines1@infosec.exchange at 2025-12-18T09:01:32.000Z ##

Critical arbitrary file upload flaw reported in WordPress Motors theme

A critical vulnerability (CVE-2025-64374) in the Motors WordPress theme versions 5.6.81 and below allows any authenticated user with Subscriber-level access to upload and activate malicious plugins, potentially leading to complete website takeover due to missing permission checks.

**If you're using the Motors WordPress theme (version 5.6.81 or below), this is important and probably urgent. Plan a quick upgrade to version 5.6.82 or later. Review all user accounts with Subscriber-level or higher privileges and check for any unauthorized plugins that may have been installed.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-66923
(7.2 HIGH)

EPSS: 0.12%

updated 2025-12-18T19:52:33.017000

1 posts

A Cross-site scripting (XSS) vulnerability in Create/Update Customer(s) in Open Source Point of Sale v3.4.1 allows remote attackers to inject arbitrary web script or HTML via the phone_number parameter.

jos1264@social.skynetcloud.site at 2025-12-17T20:00:01.000Z ##

CVE-2025-66923 - Open Source Point of Sale XSS Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68434
(8.8 HIGH)

EPSS: 0.08%

updated 2025-12-18T19:45:54.187000

1 posts

Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests

1 repos

https://github.com/Nixon-H/CVE-2025-68434-OSPOS-CSRF

jos1264@social.skynetcloud.site at 2025-12-18T01:30:00.000Z ##

CVE-2025-68434 - opensourcepos has Cross-Site Request Forgery vulnerability that leads to Unauthorized Administrator Creation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67074
(6.5 MEDIUM)

EPSS: 0.04%

updated 2025-12-18T19:16:34.560000

1 posts

A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in Tenda AC10V4.0 V16.03.10.20 allows remote attackers to cause denial of service and possibly code execution by sending a post request with a crafted payload (field `serverName`) to /goform/AdvSetMacMtuWan.

CVE-2025-14837
(4.7 MEDIUM)

EPSS: 0.04%

updated 2025-12-18T19:16:22.103000

1 posts

A vulnerability has been found in ZZCMS 2025. Affected by this issue is the function stripfxg of the file /admin/siteconfig.php of the component Backend Website Settings Module. Such manipulation of the argument icp leads to code injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.

jos1264@social.skynetcloud.site at 2025-12-18T02:45:00.000Z ##

CVE-2025-14837 - ZZCMS Backend Website Settings siteconfig.php stripfxg code injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66397
(8.3 HIGH)

EPSS: 0.04%

updated 2025-12-18T19:07:25.637000

1 posts

ChurchCRM is an open-source church management system. Prior to version 6.5.3, the allowRegistration, acceptKiosk, reloadKiosk, and identifyKiosk functions in the Kiosk Manager feature suffers from broken access control, allowing any authenticated user to allow and accept kiosk registrations, and perform other Kiosk Manager actions such as reload and identify. Version 6.5.3 fixes the issue.

jos1264@social.skynetcloud.site at 2025-12-17T22:30:01.000Z ##

CVE-2025-66397 - ChurchCRM's Kiosk Manager Functions are vulnerable to Broken Access Control cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14764
(5.3 MEDIUM)

EPSS: 0.01%

updated 2025-12-18T18:50:44

1 posts

## Summary S3 Encryption Client for Go is an open-source client-side encryption library used to facilitate writing and reading encrypted records to S3. When the encrypted data key (EDK) is stored in an "Instruction File" instead of S3's metadata record, the EDK is exposed to an "Invisible Salamanders" attack (https://eprint.iacr.org/2019/016), which could allow the EDK to be replaced with a n

CVE-2025-59374
(9.8 CRITICAL)

EPSS: 30.46%

updated 2025-12-18T18:31:33

9 posts

"UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected. The Live Update client has

undercodenews@mastodon.social at 2025-12-22T19:46:31.000Z ##

ASUS Live Update Vulnerability CVE-2025-59374: Understanding the Real Threat

In the world of cybersecurity, older vulnerabilities often resurface when added to prominent databases like the CISA Known Exploited Vulnerabilities (KEV) catalog. The recent inclusion of ASUS Live Update's CVE-2025-59374 has sparked alarm across various infosec platforms, with some reports suggesting the vulnerability is part of a newly emerging threat. However, a closer look reveals a more…

undercodenews.com/asus-live-up

##

oversecurity@mastodon.social at 2025-12-22T19:10:06.000Z ##

CISA flags ASUS Live Update CVE, but the attack is years old

An ASUS Live Update vulnerability tracked as CVE-2025-59374 has been making the rounds in infosec feeds, with some headlines implying recent or...

🔗️ [Bleepingcomputer] link.is.it/NcIC9d

##

oversecurity@mastodon.social at 2025-12-22T19:10:06.000Z ##

CISA flags ASUS Live Update CVE, but the attack is years old

An ASUS Live Update vulnerability tracked as CVE-2025-59374 has been making the rounds in infosec feeds, with some headlines implying recent or...

🔗️ [Bleepingcomputer] link.is.it/NcIC9d

##

oversecurity@mastodon.social at 2025-12-22T11:20:14.000Z ##

Not all CISA-linked alerts are urgent: ASUS Live Update CVE-2025-59374

An ASUS Live Update vulnerability tracked as CVE-2025-59374 has been making the rounds in infosec feeds, with some headlines implying recent or...

🔗️ [Bleepingcomputer] link.is.it/Yiue33

##

beyondmachines1@infosec.exchange at 2025-12-19T10:01:31.000Z ##

CISA reports active exploitation of ASUS Live Update supply chain vulnerability

CISA is reporting active exploitation of CVE-2025-59374, a supply chain backdoor embedded in ASUS Live Update utility during the 2018 Operation ShadowHammer attack by Chinese state-sponsored hackers. The backdoor surgically targeted specific devices using hardcoded MAC addresses. Federal agencies must discontinue use of the now-discontinued utility by January 7, 2026. ASUS urges remaining users to update to version 3.6.8 or higher.

**If you have ASUS Live Update utility installed, immediately update to version 3.6.8 or higher, or better yet, uninstall it completely since it's now discontinued. Given the previous supply chain compromise and end-of-support status, remove the utility and download updates directly from ASUS's official website.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2025-12-18T17:51:46.000Z ##

New.

CISA Releases Nine Industrial Control Systems Advisories cisa.gov/news-events/alerts/20

KEV updates, from yesterday:

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #infosec #ASUS #Cisco #SonicWall

##

DarkWebInformer@infosec.exchange at 2025-12-18T02:57:36.000Z ##

🚨 CISA has added 3 vulnerabilities to the KEV Catalog

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability

darkwebinformer.com/cisa-kev-c

##

cisakevtracker@mastodon.social at 2025-12-17T21:00:59.000Z ##

CVE ID: CVE-2025-59374
Vendor: ASUS
Product: Live Update
Date Added: 2025-12-17
Notes: asus.com/support/faq/1018727/ ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

cR0w@infosec.exchange at 2025-12-17T20:43:21.000Z ##

EoL Asus Live Update was added to the KEV Catalog.

cve.org/CVERecord?id=CVE-2025-

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-14884
(7.2 HIGH)

EPSS: 0.19%

updated 2025-12-18T18:30:38

2 posts

A vulnerability was detected in D-Link DIR-605 202WWB03. Affected by this issue is some unknown functionality of the component Firmware Update Service. Performing manipulation results in command injection. The attack can be initiated remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVE-2025-14879
(9.8 CRITICAL)

EPSS: 0.05%

updated 2025-12-18T18:30:37

2 posts

A weakness has been identified in Tenda WH450 1.0.0.18. Affected is an unknown function of the file /goform/onSSIDChange of the component HTTP Request Handler. This manipulation of the argument ssid_index causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

CVE-2025-14738(CVSS UNKNOWN)

EPSS: 0.06%

updated 2025-12-18T18:30:37

1 posts

Improper authentication vulnerability in TP-Link WA850RE (httpd modules) allows unauthenticated attackers to download the configuration file.This issue affects: ≤ WA850RE V2_160527, ≤ WA850RE V3_160922.

CVE-2025-14737(CVSS UNKNOWN)

EPSS: 0.42%

updated 2025-12-18T18:30:37

1 posts

Command Injection vulnerability in TP-Link WA850RE (httpd modules) allows authenticated adjacent attacker to inject arbitrary commands.This issue affects: ≤ WA850RE V2_160527, ≤ WA850RE V3_160922.

CVE-2025-68400
(8.8 HIGH)

EPSS: 0.03%

updated 2025-12-18T16:46:12.477000

1 posts

ChurchCRM is an open-source church management system. A SQL Injection vulnerability exists in the legacy endpoint `/Reports/ConfirmReportEmail.php` in ChurchCRM prior to version 6.5.3. Although the feature was removed from the UI, the file remains deployed and reachable directly via URL. This is a classic case of *dead but reachable code*. Any authenticated user - including one with zero assigned

jos1264@social.skynetcloud.site at 2025-12-17T22:45:01.000Z ##

CVE-2025-68400 - ChurchCRM vulnerable to time-based blind SQL Injection in ConfirmReportEmail.php cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68401
(4.8 MEDIUM)

EPSS: 0.03%

updated 2025-12-18T16:44:00.020000

1 posts

ChurchCRM is an open-source church management system. Prior to version 6.0.0, the application stores user-supplied HTML/JS without sufficient sanitization/encoding. When other users later view this content, attacker-controlled JavaScript executes in their browser (stored XSS). In affected contexts the script can access web origin data and perform privileged actions as the victim. Where session coo

jos1264@social.skynetcloud.site at 2025-12-17T22:45:01.000Z ##

CVE-2025-68401 - ChurchCRM has Stored Cross-Site Scripting (XSS) vulnerability that leads to session theft and account takeover cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14763
(5.3 MEDIUM)

EPSS: 0.01%

updated 2025-12-18T15:47:08

1 posts

## Summary S3 Encryption Client for Java is an open-source client-side encryption library used to facilitate writing and reading encrypted records to S3. When the encrypted data key (EDK) is stored in an "Instruction File" instead of S3's metadata record, the EDK is exposed to an "Invisible Salamanders" attack (https://eprint.iacr.org/2019/016), which could allow the EDK to be replaced with a

CVE-2025-64468
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-18T15:30:51

1 posts

There is a use-after-free vulnerability in sentry!sentry_span_set_data() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64468 - Use-after-Free in sentry!sentry_span_set_data() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13110
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-12-18T15:30:51

1 posts

The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.3.7.3 via the "woof_add_subscr" function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with subscriber level access and above, to create product messenger subscriptions on be

jos1264@social.skynetcloud.site at 2025-12-18T15:15:01.000Z ##

CVE-2025-13110 - HUSKY – Products Filter Professional for WooCommerce <= 1.3.7.3 - Authenticated (Subscriber+) Insecure Direct Object Reference via 'woof_add_subscr' cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14437
(7.5 HIGH)

EPSS: 0.06%

updated 2025-12-18T15:30:51

1 posts

The Hummingbird Performance plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.18.0 via the 'request' function. This makes it possible for unauthenticated attackers to extract sensitive data including Cloudflare API credentials.

jos1264@social.skynetcloud.site at 2025-12-18T15:15:01.000Z ##

CVE-2025-14437 - Hummingbird <= 3.18.0 - Unauthenticated Sensitive Information Exposure via Log File cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65007(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-12-18T15:30:51

1 posts

In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) due to lack of authentication in the configuration change module in the adm.cgi endpoint, the unauthenticated attacker can execute commands including backup creation, device restart and resetting the device to factory settings. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerabil

CVE-2025-64467
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-18T15:30:45

1 posts

There is an out of bounds read vulnerability in NI LabVIEW in LVResFile::FindRsrcListEntry() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64467 - Out-of-Bounds Read in LVResFile::FindRsrcListEntry() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64465
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-18T15:30:45

1 posts

There is an out of bounds read vulnerability in NI LabVIEW in lvre!DataSizeTDR() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64465 - Out-of-Bounds Read in lvre!DataSizeTDR() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14277
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-12-18T15:30:43

1 posts

The Prime Slider – Addons for Elementor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 4.0.9 via the import_elementor_template AJAX action. This makes it possible for authenticated attackers, with subscriber level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and m

jos1264@social.skynetcloud.site at 2025-12-18T15:15:01.000Z ##

CVE-2025-14277 - Prime Slider – Addons for Elementor <= 4.0.9 - Authenticated (Subscriber+) Server-Side Request Forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-46295
(9.8 CRITICAL)

EPSS: 0.33%

updated 2025-12-18T15:08:06.237000

1 posts

Apache Commons Text versions prior to 1.10.0 included interpolation features that could be abused when applications passed untrusted input into the text-substitution API. Because some interpolators could trigger actions like executing commands or accessing external resources, an attacker could potentially achieve remote code execution. This vulnerability has been fully addressed in FileMaker Serve

beyondmachines1@infosec.exchange at 2025-12-19T08:01:31.000Z ##

Critical remote code execution flaw reported in Apache Commons Text library

Apache Commons Text versions prior to 1.10.0 contain a critical remote code execution vulnerability (CVE-2025-46295,) that allows attackers to inject malicious code through the text-substitution API when processing untrusted input. The flaw was patched in late 2022 but is not updated in many deployed applications.

**If you use Apache Commons Text in your Java applications, check your version immediately and upgrade to at least version 1.10.0 (or preferably 1.15.0). Thi flaw allows remote code execution, so treat this update as very important. Exploits will start soon.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-68463
(4.9 MEDIUM)

EPSS: 0.03%

updated 2025-12-18T15:07:42.550000

1 posts

Bio.Entrez in Biopython through 186 allows doctype XXE.

CVE-2025-47382
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-18T15:07:42.550000

1 posts

Memory corruption while loading an invalid firmware in boot loader.

CVE-2025-14856
(6.3 MEDIUM)

EPSS: 0.04%

updated 2025-12-18T15:07:42.550000

1 posts

A security vulnerability has been detected in y_project RuoYi up to 4.8.1. The affected element is an unknown function of the file /monitor/cache/getnames. Such manipulation of the argument fragment leads to code injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.

CVE-2025-68129
(6.8 MEDIUM)

EPSS: 0.06%

updated 2025-12-18T15:07:42.550000

1 posts

Auth0-PHP is a PHP SDK for Auth0 Authentication and Management APIs. In applications built with the Auth0-PHP SDK, the audience validation in access tokens is performed improperly. Without proper validation, affected applications may accept ID tokens as Access tokens. Projects are affected if they use Auth0-PHP SDK versions between v8.0.0 and v8.17.0, or applications using the following SDKs that

jos1264@social.skynetcloud.site at 2025-12-17T22:45:01.000Z ##

CVE-2025-68129 - Auth0-PHP SDK has Improper Audience Validation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14759
(5.3 MEDIUM)

EPSS: 0.01%

updated 2025-12-18T15:07:42.550000

1 posts

Missing cryptographic key commitment in the Amazon S3 Encryption Client for .NET may allow a user with write access to the S3 bucket to introduce a new EDK that decrypts to different plaintext when the encrypted data key is stored in an "instruction file" instead of S3's metadata record. To mitigate this issue, upgrade Amazon S3 Encryption Client for .NET to version 3.2.0 or later.

CVE-2025-14762
(5.3 MEDIUM)

EPSS: 0.02%

updated 2025-12-18T15:07:42.550000

1 posts

Missing cryptographic key commitment in the AWS SDK for Ruby may allow a user with write access to the S3 bucket to introduce a new EDK that decrypts to different plaintext when the encrypted data key is stored in an "instruction file" instead of S3's metadata record. To mitigate this issue, upgrade AWS SDK for Ruby to version 1.208.0 or later.

CVE-2022-23851
(9.8 CRITICAL)

EPSS: 0.05%

updated 2025-12-18T15:07:42.550000

1 posts

Netaxis API Orchestrator (APIO) before 0.19.3 allows server side template injection (SSTI).

jos1264@social.skynetcloud.site at 2025-12-17T19:00:01.000Z ##

CVE-2022-23851 - Netaxis API Orchestrator SSTI Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14618
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-12-18T15:07:18.427000

1 posts

The Sweet Energy Efficiency plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on the 'sweet_energy_efficiency_action' AJAX handler in all versions up to, and including, 1.0.6. This makes it possible for authenticated attackers, with subscriber level access and above, to read, modify, and delete arbitrary graphs.

jos1264@social.skynetcloud.site at 2025-12-18T15:15:01.000Z ##

CVE-2025-14618 - Sweet Energy Efficiency <= 1.0.6 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Graph Deletion cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-40602
(6.6 MEDIUM)

EPSS: 1.42%

updated 2025-12-18T12:30:33

5 posts

A local privilege escalation vulnerability due to insufficient authorization in the SonicWall SMA1000 appliance management console (AMC).

2 repos

https://github.com/cyberleelawat/CVE-2025-40602

https://github.com/rxerium/CVE-2025-40602

beyondmachines1@infosec.exchange at 2025-12-19T09:01:31.000Z ##

SonicWall patches actively exploited flaw vulnerability chain in SMA 1000 appliances

SonicWall SMA 1000 appliances are being actively exploited through a vulnerability chain combining CVE-2025-40602 (a local privilege escalation flaw) with CVE-2025-23006 (a previously patched deserialization vulnerability), enabling unauthenticated remote code execution with root privileges.

**If you have SonicWall SMA 1000 appliances, make sure their SSH and management access is isolated from the public internet and only accessible from trusted networks. Review latest version, and if not up-to date patched, plan a very quick upgrade to platform-hotfix 12.4.3-03245 or 12.5.0-02283 (or higher). Your devices are being hacked, and you can't really hide them from the internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2025-12-18T17:51:46.000Z ##

New.

CISA Releases Nine Industrial Control Systems Advisories cisa.gov/news-events/alerts/20

KEV updates, from yesterday:

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #infosec #ASUS #Cisco #SonicWall

##

DarkWebInformer@infosec.exchange at 2025-12-18T02:57:36.000Z ##

🚨 CISA has added 3 vulnerabilities to the KEV Catalog

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability

darkwebinformer.com/cisa-kev-c

##

cisakevtracker@mastodon.social at 2025-12-17T21:01:14.000Z ##

CVE ID: CVE-2025-40602
Vendor: SonicWall
Product: SMA1000 appliance
Date Added: 2025-12-17
Notes: Check for signs of potential compromise on all internet accessible SonicWall SMA1000 instances after applying mitigations. For more information please see: psirt.global.sonicwall.com/vul ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

jos1264@social.skynetcloud.site at 2025-12-17T20:15:01.000Z ##

SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances thehackernews.com/2025/12/soni

##

CVE-2025-10910(CVSS UNKNOWN)

EPSS: 0.14%

updated 2025-12-18T12:30:33

2 posts

A flaw in the binding process of Govee’s cloud platform and devices allows a remote attacker to bind an existing, online Govee device to the attacker’s account, resulting in full control of the device and removal of the device from its legitimate owner’s account. The server‑side API allows device association using a set of identifiers: "device", "sku", "type", and a client‑computed "value", that a

jos1264@social.skynetcloud.site at 2025-12-18T15:15:01.000Z ##

CVE-2025-10910 - Gaining remote control over Govee devices cvefeed.io/vuln/detail/CVE-202

##

cR0w@infosec.exchange at 2025-12-18T14:23:26.000Z ##

cert.pl/en/posts/2025/12/CVE-2

A flaw in the binding process of Govee’s cloud platform and devices allows a remote attacker to bind an existing, online Govee device to the attacker’s account, resulting in full control of the device and removal of the device from its legitimate owner’s account.

#internetOfShit

##

CVE-2025-68459
(7.2 HIGH)

EPSS: 0.17%

updated 2025-12-18T06:30:19

2 posts

RG - AP180, Indoor Wall Plate Wireless AP AP180 series provided by Ruijie Networks Co., Ltd. contain an OS command injection vulnerability. An arbitrary OS command may be executed on the product by an attacker who logs in to the CLI service.

jos1264@social.skynetcloud.site at 2025-12-18T07:45:00.000Z ##

CVE-2025-68459 - Ruijie Networks Co., Ltd. AP180 Command Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-18T07:15:00.000Z ##

CVE-2025-68459 - Ruijie Networks Co., Ltd. AP180 Command Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-47372
(9.0 None)

EPSS: 0.02%

updated 2025-12-18T06:30:19

1 posts

Memory Corruption when a corrupted ELF image with an oversized file size is read into a buffer without authentication.

jos1264@social.skynetcloud.site at 2025-12-18T07:45:00.000Z ##

CVE-2025-47372 - Buffer Copy Without Checking Size of Input in Boot cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68462
(3.2 LOW)

EPSS: 0.01%

updated 2025-12-18T06:30:19

1 posts

Freedombox before 25.17.1 does not set proper permissions for the backups-data directory, allowing the reading of dump files of databases.

jos1264@social.skynetcloud.site at 2025-12-18T07:15:01.000Z ##

CVE-2025-68462 - Freedombox Unauthenticated Database Backup File Disclosure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-47387
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-18T06:30:19

1 posts

Memory Corruption when processing IOCTLs for JPEG data without verification.

CVE-2025-12885
(6.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-18T03:30:18

1 posts

The Embed Any Document – Embed PDF, Word, PowerPoint and Excel Files plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the sanitize_pdf_src function regex bypass in all versions up to, and including, 2.7.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary

jos1264@social.skynetcloud.site at 2025-12-18T04:45:00.000Z ##

CVE-2025-12885 - Embed Any Document <= 2.7.10 - Authenticated (Contributor+) Stored Cross-Site Scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14841
(3.3 LOW)

EPSS: 0.01%

updated 2025-12-18T03:30:18

1 posts

A flaw has been found in OFFIS DCMTK up to 3.6.9. The impacted element is the function DcmQueryRetrieveIndexDatabaseHandle::startFindRequest/DcmQueryRetrieveIndexDatabaseHandle::startMoveRequest in the library dcmqrdb/libsrc/dcmqrdbi.cc of the component dcmqrscp. This manipulation causes null pointer dereference. The attack requires local access. Upgrading to version 3.7.0 is sufficient to resolve

jos1264@social.skynetcloud.site at 2025-12-18T04:45:00.000Z ##

CVE-2025-14841 - OFFIS DCMTK dcmqrscp dcmqrdbi.cc startMoveRequest null pointer dereference cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14202(CVSS UNKNOWN)

EPSS: 0.05%

updated 2025-12-18T00:34:16

2 posts

A vulnerability in the file upload at bookmark + asset rendering pipeline allows an attacker to upload a malicious SVG file with JavaScript content. When an authenticated admin user views the SVG file with embedded JavaScript code of shared bookmark, JavaScript executes in the admin’s browser, retrieves the CSRF token, and sends a request to change the admin's password resulting in a full account

jos1264@social.skynetcloud.site at 2025-12-18T02:45:00.000Z ##

CVE-2025-14202 - Cross-Site Request Forgery (CSRF) Leading to Account Takeover via SVG File Upload cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-18T01:30:01.000Z ##

CVE-2025-14202 - Cross-Site Request Forgery (CSRF) Leading to Account Takeover via SVG File Upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2023-53933
(8.8 HIGH)

EPSS: 0.24%

updated 2025-12-18T00:34:16

1 posts

Serendipity 2.4.0 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files with .phar extension. Attackers can upload files with system command payloads to the media upload endpoint and execute arbitrary commands on the server.

jos1264@social.skynetcloud.site at 2025-12-18T01:30:00.000Z ##

CVE-2023-53933 - Serendipity 2.4.0 Authenticated Remote Code Execution via File Upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67172
(7.2 HIGH)

EPSS: 0.27%

updated 2025-12-17T21:31:53

1 posts

RiteCMS v3.1.0 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the parse_special_tags() function.

jos1264@social.skynetcloud.site at 2025-12-17T20:00:01.000Z ##

CVE-2025-67172 - RiteCMS Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66924
(6.1 MEDIUM)

EPSS: 0.04%

updated 2025-12-17T21:31:53

1 posts

A Cross-site scripting (XSS) vulnerability in Create/Update Item Kit(s) in Open Source Point of Sale v3.4.1 allows remote attackers to inject arbitrary web script or HTML via the "name" parameter.

jos1264@social.skynetcloud.site at 2025-12-17T20:00:01.000Z ##

CVE-2025-66924 - Open Source Point of Sale XSS Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65203
(7.1 HIGH)

EPSS: 0.01%

updated 2025-12-17T21:31:53

1 posts

KeePassXC-Browser thru 1.9.9.2 autofills or prompts to fill stored credentials into documents rendered under a browser-enforced CSP directive and iframe attribute sandbox, allowing attacker-controlled script in the sandboxed document to access populated form fields and exfiltrate credentials.

jos1264@social.skynetcloud.site at 2025-12-17T20:00:01.000Z ##

CVE-2025-65203 - KeePassXC-Browser thru 1.9.9.2 autofills or prompt cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67073
(9.8 CRITICAL)

EPSS: 0.15%

updated 2025-12-17T21:30:56

2 posts

A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in Tenda AC10V4.0 V16.03.10.20 allows remote attackers to cause denial of service and possibly code execution by sending a post request with a crafted payload (field `serviceName`) to /goform/AdvSetMacMtuWan.

CVE-2025-13326
(3.9 LOW)

EPSS: 0.01%

updated 2025-12-17T21:30:56

1 posts

Mattermost Desktop App versions <6.0.0 fail to enable the Hardened Runtime on the Mattermost Desktop App when packaged for Mac App Store which allows an attacker to inherit TCC permissions via copying the binary to a tmp folder.

jos1264@social.skynetcloud.site at 2025-12-17T20:00:01.000Z ##

CVE-2025-13326 - Mattermost Desktop App fails to enable Hardened Runtime when packaged for Mac App Store cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-20393
(10.0 CRITICAL)

EPSS: 4.56%

updated 2025-12-17T21:30:47

15 posts

Cisco is aware of a potential vulnerability.&nbsp; Cisco is currently investigating and&nbsp;will update these details as appropriate&nbsp;as more information becomes available.

5 repos

https://github.com/Ashwesker/Blackash-CVE-2025-20393

https://github.com/StasonJatham/cisco-sa-sma-attack-N9bf4

https://github.com/cyberleelawat/CVE-2025-20393

https://github.com/KingHacker353/CVE-2025-20393

https://github.com/thesystemowner/CVE-2025-20393-POC

LLMs@activitypub.awakari.com at 2025-12-21T03:04:49.000Z ## CVE-2025-20393: explotación activa en Cisco AsyncOS permite ejecutar comandos con privilegios root Entre el 17 y el 18 de diciembre de 2025, Cisco Talos y varios CERTs han alertado sobre una campa...

#Seguridad

Origin | Interest | Match ##

DarkWebInformer@infosec.exchange at 2025-12-18T20:07:52.000Z ##

🚨 CVE-2025-20393: Script to detect for Cisco Secure Email Gateway And Cisco Secure Email and Web Manager

CVSS: 10

Currently no patch and zero-day

GitHub: github.com/StasonJatham/cisco-

##

Andy_Thompson@infosec.exchange at 2025-12-18T18:07:33.000Z ##

🔥 Cisco AsyncOS Zero-Day (CVE-2025-20393)
• BleepingComputer
bleepingcomputer.com/news/secu
• The Hacker News
thehackernews.com/2025/12/cisc
• SecurityWeek
securityweek.com/china-linked-
• The Register
theregister.com/2025/12/17/att
• Dark Reading (CISA KEV addition)
darkreading.com/attacks-breach
• SOCRadar analysis
socradar.io/blog/cve-2025-2039

##

AAKL@infosec.exchange at 2025-12-18T17:51:46.000Z ##

New.

CISA Releases Nine Industrial Control Systems Advisories cisa.gov/news-events/alerts/20

KEV updates, from yesterday:

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #infosec #ASUS #Cisco #SonicWall

##

golang@activitypub.awakari.com at 2025-12-18T16:45:45.000Z ## 🚩 Chinese-Nexus APT UAT-9686 Actively Compromises Cisco Secure Email Appliances and Drops AquaShell Persistence Chinese APT UAT-9686 exploits Cisco Email Gateway zero-day CVE-2025-20393 (CVSS 10...

#TIGR #cybercriminal #nation #state #vulnerability

Origin | Interest | Match ##

AAKL@infosec.exchange at 2025-12-18T15:46:37.000Z ##

Security Week: China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear securityweek.com/china-linked- @SecurityWeek

Cisco:

- Critical: CVE-2025-20393: Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager sec.cloudapps.cisco.com/securi

- Critical: CVE-2025-55182: Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability #zeroday

##

beyondmachines1@infosec.exchange at 2025-12-18T14:01:31.000Z ##

Cisco Email Security appliances actively exploited

Cisco is warning of an active cyberattack campaign exploiting a critical zero-day vulnerability (CVE-2025-20393) in Cisco Secure Email Gateway and Email and Web Manager appliances, allowing attackers to execute arbitrary commands with root privileges. The flaw affects appliances with the Spam Quarantine feature enabled and exposed to the internet. Atacks date back to late November 2025.

**If you have Cisco Secure Email Gateway or Cisco Email and Web Manager appliances, this is urgent: Immediately check if the Spam Quarantine feature is enabled and exposed to the public ports - if it is, disable it on all public ports until a patch is available for CVE-2025-20393. If your appliance may have been compromised, contact Cisco support and prepare to rebuild the system from scratch. This is currently the only way to fully remove the threat from a compromised system.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

decio@infosec.exchange at 2025-12-18T13:14:47.000Z ##

[VULN] ⚠️ Zero‑day sur les appliances e‑mail Cisco : compromission, backdoors et logs effacés
👇
cyberveille.ch/posts/2025-12-1

🔗 Source originale : helpnetsecurity.com/2025/12/17

Advisory officiel:

sec.cloudapps.cisco.com/securi

Analyse de Cisco Talos:

UAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web Manager

Résumé FR ➡️ Campagne UAT-9686: un APT à nexus chinois cible Cisco Secure Email via le backdoor AquaShell

💬
⬇️
infosec.pub/post/39234259

#CyberVeille #0day #Cisco

##

DarkWebInformer@infosec.exchange at 2025-12-18T02:57:36.000Z ##

🚨 CISA has added 3 vulnerabilities to the KEV Catalog

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability

darkwebinformer.com/cisa-kev-c

##

campuscodi@mastodon.social at 2025-12-17T22:36:28.000Z ##

A suspected Chinese APT is exploiting a new Cisco zero-day

-impacts Cisco Secure Email Gateway And Cisco Secure Email and Web Manager
-CVE-2025-20393
-CVSS score: 10
-APT is UAT-9686

blog.talosintelligence.com/uat

##

zl2tod@mastodon.online at 2025-12-17T21:13:52.000Z ##

@cisakevtracker

Severity: 10.0

CVE ID: CVE-2025-20393
Vendor: Cisco
Product: Multiple Products
Date Added: 2025-12-17

nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2025-12-17T21:01:30.000Z ##

CVE ID: CVE-2025-20393
Vendor: Cisco
Product: Multiple Products
Date Added: 2025-12-17
Notes: Please adhere to Cisco's guidelines to assess exposure and mitigate risks. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

christopherkunz@chaos.social at 2025-12-17T21:00:41.000Z ##

@ljrk OK, two more Fleißsternchen for SonicWall: psirt.global.sonicwall.com/vul
And for Cisco: cve.org/CVERecord?id=CVE-2025-
Kudos to both for making CISA KEV on 0day (it seems).

##

jos1264@social.skynetcloud.site at 2025-12-17T20:15:01.000Z ##

Cisco email security appliances rooted and backdoored via still unpatched zero-day helpnetsecurity.com/2025/12/17 #cyberespionage #emailsecurity #enterprise #Don'tmiss #Hotstuff #backdoor #China #Cisco #News #APT

##

DarkWebInformer@infosec.exchange at 2025-12-17T19:15:59.000Z ##

🚨 CVE-2025-20393: Cisco Secure Email Gateway and Cisco Secure Email and Web Manager Remote Command Execution Vulnerability

Status: Unpatched Zero-Day
CVSS: 10
Vendor: Cisco
CWE-20: Improper Input Validation

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-59718
(9.8 CRITICAL)

EPSS: 5.95%

updated 2025-12-17T13:54:45.390000

3 posts

A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7

2 repos

https://github.com/exfil0/CVE-2025-59718-PoC

https://github.com/Ashwesker/Blackash-CVE-2025-59718

hbrpgm@adalta.social at 2025-12-18T18:33:36.000Z ##

📰 ** Information Briefing: **

✨ FortiCloud SSO Login Bypass: Exploited in the Wild
- Critical vulnerabilities: CVE-2025-59718 and CVE-2025-59719
- Unauthenticated adversaries bypass FortiCloud SSO login
- Exploitation observed in the wild
- Affected products: FortiOS, FortiProxy, FortiSwitchManager, FortiWeb

🔗 adalta.info/pdf/index.html?tit
(Available in 🇩🇪 🇺🇸 🇫🇷)

#AISummary #Bot

##

AAKL@infosec.exchange at 2025-12-18T18:32:45.000Z ##

New. This relates to two vulnerabilities disclosed by Fortinet last week: CVE-2025-59718 and CVE-2025-59719.

VulnCheck: FortiCloud SSO Login Bypass Vulnerabilities Exploited in the Wild vulncheck.com/blog/forticloud- @vulncheck #infosec #Fortinet #threatresearch

##

catc0n@infosec.exchange at 2025-12-18T15:28:05.000Z ##

We wrote a little bit on FortiCloud SSO login bypass CVE-2025-59718 (and 59719). Both the known PoCs for the former are fake / invalid. There does appear to be real exploitation evidence, but detections based on fake PoCs ain't it (and it seems like that's where a lot of chatter is coming from)

vulncheck.com/blog/forticloud-

##

CVE-2025-68154
(8.1 HIGH)

EPSS: 0.07%

updated 2025-12-16T22:37:26

1 posts

## Summary The `fsSize()` function in `systeminformation` is vulnerable to **OS Command Injection (CWE-78)** on Windows systems. The optional `drive` parameter is directly concatenated into a PowerShell command without sanitization, allowing arbitrary command execution when user-controlled input reaches this function. **Affected Platforms:** Windows only **CVSS Breakdown:** - **Attack Vector

beyondmachines1@infosec.exchange at 2025-12-18T17:01:32.000Z ##

Command injection flaw reported in Node.js systeminformation package

A command injection vulnerability (CVE-2025-68154) in the systeminformation Node.js library's fsSize() function allows attackers to execute arbitrary PowerShell commands on Windows systems through unsanitized user input in the drive parameter. The vulnerability has been patched in version 5.27.14.

**If you're using the systeminformation Node.js library on Windows, plan an upgrade to version 5.27.14 or newer to patch this command injection flaw. Review all applications using this library, especially web APIs or tools that accept user input for disk queries, to ensure they're running the patched version.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-68260(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-16T15:30:56

3 posts

In the Linux kernel, the following vulnerability has been resolved: rust_binder: fix race condition on death_list Rust Binder contains the following unsafe operation: // SAFETY: A `NodeDeath` is never inserted into the death list // of any node other than its owner, so it is either in this // death list or in no death list. unsafe { node_inner.death_list.remove(self) }; This operation is u

rustaceans@mastodon.social at 2025-12-22T08:42:35.000Z ##

3. Rust joined the Linux kernel mainline last week and immediately checked off a rite of passage: its first CVE.
lore.kernel.org/linux-cve-anno

##

Linux-Maintainers@activitypub.awakari.com at 2025-12-18T16:10:07.000Z ## Linux Kernel’s First Rust CVE: Race Condition in Binder Driver The Linux kernel has assigned its first CVE to Rust code: CVE-2025-68260, a race condition in the Rust-rewritten Android Binder driv...

#CybersecurityUpdate #DevNews #Android #Binder #driver #CVE-2025-68260 #Linux #kernel #Rust #CVE #Rust

Origin | Interest | Match ##

rustaceans@mastodon.social at 2025-12-17T23:44:42.000Z ##

Linux Kernel Rust Code Sees Its First CVE Vulnerability

#rust #rustlang #programming

lore.kernel.org/linux-cve-anno

##

CVE-2025-66471
(7.5 HIGH)

EPSS: 0.02%

updated 2025-12-10T16:10:33.500000

1 posts

urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can

mmguero@infosec.exchange at 2025-12-18T14:46:11.000Z ##

Malcolm v25.12.1 contains a few critical bug fixes and component version updates.

github.com/idaholab/Malcolm/co

  • ✨ Features and enhancements
    • Installer splash screen shows "HEDGEHOG" when using Hedgehog run profile
  • ✅ Component version updates
  • 🐛 Bug fixes
    • Changed field used in Threat Intelligence dashboard's file type table from zeek.intel.file_mime_type to file.mime_type so filters created from it can work on other dashboards
    • link for threat intelligence URL doesn't work correctly from dashboards (behind reverse proxy) (#832)
    • self-signed certificates not accepted by Chrome (#833)
    • Malcolm ISO installer's automatic partitioning may create too-small /var partition (#835)
  • 🧹 Code and project maintenance

Malcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻‍♀️.

Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.

Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.

As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.

#Malcolm #HedgehogLinux #Zeek #Arkime #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #INL

##

CVE-2025-59719
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-12-09T18:30:52

2 posts

An improper verification of cryptographic signature vulnerability in Fortinet FortiWeb 8.0.0, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9 may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.

hbrpgm@adalta.social at 2025-12-18T18:33:36.000Z ##

📰 ** Information Briefing: **

✨ FortiCloud SSO Login Bypass: Exploited in the Wild
- Critical vulnerabilities: CVE-2025-59718 and CVE-2025-59719
- Unauthenticated adversaries bypass FortiCloud SSO login
- Exploitation observed in the wild
- Affected products: FortiOS, FortiProxy, FortiSwitchManager, FortiWeb

🔗 adalta.info/pdf/index.html?tit
(Available in 🇩🇪 🇺🇸 🇫🇷)

#AISummary #Bot

##

AAKL@infosec.exchange at 2025-12-18T18:32:45.000Z ##

New. This relates to two vulnerabilities disclosed by Fortinet last week: CVE-2025-59718 and CVE-2025-59719.

VulnCheck: FortiCloud SSO Login Bypass Vulnerabilities Exploited in the Wild vulncheck.com/blog/forticloud- @vulncheck #infosec #Fortinet #threatresearch

##

CVE-2025-41746
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:30:45

1 posts

An XSS vulnerability in pxc_portSecCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41748
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:30:44

1 posts

An XSS vulnerability in pxc_Dot1xCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device conf

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41745
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:30:44

1 posts

An XSS vulnerability in pxc_portCntr2.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41695
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:30:44

1 posts

An XSS vulnerability in dyn_conn.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device confi

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41750
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:30:44

1 posts

An XSS vulnerability in pxc_PortCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device confi

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41696
(4.6 MEDIUM)

EPSS: 0.02%

updated 2025-12-09T18:30:44

1 posts

An attacker can use an undocumented UART port on the PCB as a side-channel with the user hardcoded credentials obtained from CVE-2025-41692 to gain read access to parts of the filesystem of the device.

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41752
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:30:44

1 posts

An XSS vulnerability in pxc_portSfp.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device confi

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41693
(4.3 MEDIUM)

EPSS: 0.23%

updated 2025-12-09T18:30:43

1 posts

A low privileged remote attacker can use the ssh feature to execute commands directly after login. The process stays open and uses resources which leads to a reduced performance of the management functions. Switching functionality is not affected.

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41694
(6.5 MEDIUM)

EPSS: 0.11%

updated 2025-12-09T18:30:43

1 posts

A low privileged remote attacker can run the webshell with an empty command containing whitespace. The server will then block until it receives more data, resulting in a DoS condition of the websserver.

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41692
(6.8 MEDIUM)

EPSS: 0.02%

updated 2025-12-09T18:30:43

1 posts

A high privileged remote attacker with admin privileges for the webUI can brute-force the "root" and "user" passwords of the underlying OS due to a weak password generation algorithm.

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-55182
(10.0 CRITICAL)

EPSS: 43.43%

updated 2025-12-09T16:53:25

3 posts

### Impact There is an unauthenticated remote code execution vulnerability in React Server Components. We recommend upgrading immediately. The vulnerability is present in versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 of: * [react-server-dom-webpack](https://www.npmjs.com/package/react-server-dom-webpack) * [react-server-dom-parcel](https://www.npmjs.com/package/react-server-dom-parcel) * [react-s

Nuclei template

100 repos

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web

https://github.com/VeilVulp/RscScan-cve-2025-55182

https://github.com/xkillbit/cve-2025-55182-scanner

https://github.com/zr0n/react2shell

https://github.com/f0xyx/CVE-2025-55182-Scanner

https://github.com/hidden-investigations/react2shell-scanner

https://github.com/ejpir/CVE-2025-55182-bypass

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/subhdotsol/CVE-2025-55182

https://github.com/freeqaz/react2shell

https://github.com/Rsatan/Next.js-Exploit-Tool

https://github.com/raivenLockdown/RCE_React2Shell_ButCooler-SomeUselessUsefulThingsLMAO-

https://github.com/shyambhanushali/React2Shell

https://github.com/kOaDT/poc-cve-2025-55182

https://github.com/nehkark/CVE-2025-55182

https://github.com/MoLeft/React2Shell-Toolbox

https://github.com/hoosin/CVE-2025-55182

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/shamo0/react2shell-PoC

https://github.com/techgaun/cve-2025-55182-scanner

https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE

https://github.com/mrknow001/RSC_Detector

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool

https://github.com/sickwell/CVE-2025-55182

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/Pizz33/CVE-2025-55182-burpscanner

https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-

https://github.com/LemonTeatw1/CVE-2025-55182-exploit

https://github.com/zzhorc/CVE-2025-55182

https://github.com/sumanrox/rschunter

https://github.com/santihabib/CVE-2025-55182-analysis

https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS

https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182

https://github.com/gensecaihq/react2shell-scanner

https://github.com/alsaut1/react2shell-lab

https://github.com/timsonner/React2Shell-CVE-2025-55182

https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/AliHzSec/CVE-2025-55182

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/Spritualkb/CVE-2025-55182-exp

https://github.com/ejpir/CVE-2025-55182-research

https://github.com/RuoJi6/CVE-2025-55182-RCE-shell

https://github.com/EynaExp/CVE-2025-55182-POC

https://github.com/SainiONHacks/CVE-2025-55182-Scanner

https://github.com/logesh-GIT001/CVE-2025-55182

https://github.com/alfazhossain/CVE-2025-55182-Exploiter

https://github.com/surajhacx/react2shellpoc

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/andrei2308/react2shell

https://github.com/Ashwesker/Blackash-CVE-2025-55182

https://github.com/xcanwin/CVE-2025-55182-React-RCE

https://github.com/xiaopeng-ye/react2shell-detector

https://github.com/sho-luv/React2Shell

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/GelukCrab/React-Server-Components-RCE

https://github.com/ynsmroztas/NextRce

https://github.com/dwisiswant0/CVE-2025-55182

https://github.com/acheong08/CVE-2025-55182-poc

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/Call123X/-cve-2025-55182

https://github.com/hualy13/CVE-2025-55182

https://github.com/zack0x01/vuln-app-CVE-2025-55182

https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-

https://github.com/c0rydoras/CVE-2025-55182

https://github.com/C00LN3T/React2Shell

https://github.com/yanoshercohen/React2Shell_CVE-2025-55182

https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive

https://github.com/theori-io/reactguard

https://github.com/StealthMoud/CVE-2025-55182-Scanner

https://github.com/XiaomingX/CVE-2025-55182-poc

https://github.com/AggressiveUser/React2Hell

https://github.com/websecuritylabs/React2Shell-Library

https://github.com/SoICT-BKSEC/CVE-2025-55182-docker-lab

https://github.com/fullhunt/react2shell-test-server

https://github.com/xalgord/React2Shell

https://github.com/emredavut/CVE-2025-55182

https://github.com/fatguru/CVE-2025-55182-scanner

https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/Chocapikk/CVE-2025-55182

https://github.com/whiteov3rflow/CVE-2025-55182-poc

https://github.com/im-ezboy/CVE-2025-55182-zoomeye

https://github.com/keklick1337/CVE-2025-55182-golang-PoC

https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell

https://github.com/msanft/CVE-2025-55182

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/Saturate/CVE-2025-55182-Scanner

https://github.com/sudo-Yangziran/CVE-2025-55182POC

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/assetnote/react2shell-scanner

https://github.com/TrixSec/CVE-2025-55182-Scanner

https://github.com/kavienanj/CVE-2025-55182

https://github.com/yz9yt/React2Shell-CTF

https://github.com/jf0x3a/CVE-2025-55182-exploit

https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI

https://github.com/7amzahard/React2shell

https://github.com/ThemeHackers/CVE-2025-55182

hrbrmstr@mastodon.social at 2025-12-22T02:17:58.000Z ##

This is legit a Christmas miracle b/c I rly did not want to spend the break tending to #React2Shell

viz.greynoise.io/tags/react-se

##

Kubernetes@activitypub.awakari.com at 2025-12-15T19:35:00.000Z ## Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components CVE-2025-55182 (also referred to as React2Shell and includes CVE-2025-66478, which was merged into it) is...


Origin | Interest | Match ##

AAKL@infosec.exchange at 2025-12-18T15:46:37.000Z ##

Security Week: China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear securityweek.com/china-linked- @SecurityWeek

Cisco:

- Critical: CVE-2025-20393: Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager sec.cloudapps.cisco.com/securi

- Critical: CVE-2025-55182: Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability #zeroday

##

CVE-2025-37899
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-06T22:15:50.277000

2 posts

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in session logoff The sess->user object can currently be in use by another thread, for example if another connection has sent a session setup request to bind to the session being free'd. The handler for that connection could be in the smb2_sess_setup function which makes use of sess->user.

2 repos

https://github.com/SeanHeelan/o3_finds_cve-2025-37899

https://github.com/vett3x/SMB-LINUX-CVE-2025-37899

resplendent606@climatejustice.social at 2025-12-23T04:26:38.000Z ##

Very good question! I hope you’ll forgive me for a long response, it is something I have a lot of thoughts on.

I used to think newer is better, but after plenty of distro-hopping (I had a real good time on Arch), I realized that Debian’s version of "stability" is actually its greatest feature. Here is how I’ve come to see it, using your Fedora experience as a comparison:

Fist, with Debian, stable means unchanging. Fedora is a fast-moving target. It was an early adopter for Wayland and Pipewire. That is exciting, but it can feel like a version of whiplash. Debian is the opposite. Once a version is released, the APIs, file locations, and package behaviors are locked in. Its predictability means my system feels the same on Day 1 as it does on Day 300.

Debian prioritizes reliability over cutting-edge performance. While Fedora pushes the new thing, Debian’s conservative defaults ensure maximum compatibility. It is the "just works" philosophy. It is not just that it doesn't crash, it is that it doesn't surprise you.

I also find APT to be incredibly satisfying compared to DNF. The sheer size of the repositories is massive, but APT Pinning is THE feature for me. Being able to set numeric priorities in /etc/apt/preferences allows me to do things like pull a specific package from Backports while keeping the rest of the system on the Stable branch. It gives you control over dependency resolution that is hard to match.

Regarding your question on security, Debian is unique because it is a 100% community-led project. Unlike Fedora (Red Hat) or Ubuntu (Canonical), there is no corporate entity at the top. This is one of the most important traits to me. If Red Hat wanted to, Fedora could start showing ads in the application menu with the next update. I don’t think that will happen with Fedora, but who knows, Canonical is now showing ads in the cli. Enough is enough.

I also appreciate Debian’s focus on inclusion. It is one of the most inclusive projects in tech. As a member of the queer community, it is important to me to use tools that are created and supported by those who do not hate me for being different. To quote their Diversity Statement: “No matter how you identify yourself or how others perceive you: we welcome you. We welcome contributions from everyone as long as they interact constructively with our community.” They forbid discrimination against any person or group. Because it is a global meritocracy, you have contributors from every corner of the world. This diversity is actually a security feature because with so many different eyes on the code, it is much harder for a backdoor or a bias to slip through unnoticed.

For your "backdoor-proof" concern, Debian’s Social Contract and strict adherence to free software guidelines mean every line of code is scrutinized by volunteers around the world. It is transparent by design. While no distro/OS is unhackable, Debian’s slow and steady release cycle means security patches are thoroughly vetted before they hit your machine, reducing the risk of zero day regressions. Fedora has been vulnerable to zero day attacks in the past and will probably continue to be in the future. For instance, because Fedora is always on the latest versions, Fedora Users are often vulnerable to new attack. Earlier in 2025, the latest kernel which Fedora had pushed to users had a zero day vulnerability. Debian stable users did not have that vulnerability because they would not see that update for quite some time.

Sources:

Ubuntu Showing Ads in Terminal - linuxiac.com/ubuntu-once-again

Debian Social Contract - debian.org/social_contract

Debian Diversity Statement - debian.org/intro/diversity

Zero day vulnerability mentioned -cve.org/CVERecord?id=CVE-2025-

#Debian

##

resplendent606@climatejustice.social at 2025-12-23T04:26:38.000Z ##

Very good question! I hope you’ll forgive me for a long response, it is something I have a lot of thoughts on.

I used to think newer is better, but after plenty of distro-hopping (I had a real good time on Arch), I realized that Debian’s version of "stability" is actually its greatest feature. Here is how I’ve come to see it, using your Fedora experience as a comparison:

Fist, with Debian, stable means unchanging. Fedora is a fast-moving target. It was an early adopter for Wayland and Pipewire. That is exciting, but it can feel like a version of whiplash. Debian is the opposite. Once a version is released, the APIs, file locations, and package behaviors are locked in. Its predictability means my system feels the same on Day 1 as it does on Day 300.

Debian prioritizes reliability over cutting-edge performance. While Fedora pushes the new thing, Debian’s conservative defaults ensure maximum compatibility. It is the "just works" philosophy. It is not just that it doesn't crash, it is that it doesn't surprise you.

I also find APT to be incredibly satisfying compared to DNF. The sheer size of the repositories is massive, but APT Pinning is THE feature for me. Being able to set numeric priorities in /etc/apt/preferences allows me to do things like pull a specific package from Backports while keeping the rest of the system on the Stable branch. It gives you control over dependency resolution that is hard to match.

Regarding your question on security, Debian is unique because it is a 100% community-led project. Unlike Fedora (Red Hat) or Ubuntu (Canonical), there is no corporate entity at the top. This is one of the most important traits to me. If Red Hat wanted to, Fedora could start showing ads in the application menu with the next update. I don’t think that will happen with Fedora, but who knows, Canonical is now showing ads in the cli. Enough is enough.

I also appreciate Debian’s focus on inclusion. It is one of the most inclusive projects in tech. As a member of the queer community, it is important to me to use tools that are created and supported by those who do not hate me for being different. To quote their Diversity Statement: “No matter how you identify yourself or how others perceive you: we welcome you. We welcome contributions from everyone as long as they interact constructively with our community.” They forbid discrimination against any person or group. Because it is a global meritocracy, you have contributors from every corner of the world. This diversity is actually a security feature because with so many different eyes on the code, it is much harder for a backdoor or a bias to slip through unnoticed.

For your "backdoor-proof" concern, Debian’s Social Contract and strict adherence to free software guidelines mean every line of code is scrutinized by volunteers around the world. It is transparent by design. While no distro/OS is unhackable, Debian’s slow and steady release cycle means security patches are thoroughly vetted before they hit your machine, reducing the risk of zero day regressions. Fedora has been vulnerable to zero day attacks in the past and will probably continue to be in the future. For instance, because Fedora is always on the latest versions, Fedora Users are often vulnerable to new attack. Earlier in 2025, the latest kernel which Fedora had pushed to users had a zero day vulnerability. Debian stable users did not have that vulnerability because they would not see that update for quite some time.

Sources:

Ubuntu Showing Ads in Terminal - linuxiac.com/ubuntu-once-again

Debian Social Contract - debian.org/social_contract

Debian Diversity Statement - debian.org/intro/diversity

Zero day vulnerability mentioned -cve.org/CVERecord?id=CVE-2025-

#Debian

##

CVE-2025-65945
(7.5 HIGH)

EPSS: 0.01%

updated 2025-12-04T22:50:04

1 posts

### Overview An improper signature verification vulnerability exists when using auth0/node-jws with the HS256 algorithm under specific conditions. ### Am I Affected? You are affected by this vulnerability if you meet all of the following preconditions: 1. Application uses the auth0/node-jws implementation of JSON Web Signatures, versions <=3.2.2 || 4.0.0 2. Application uses the jws.createVerify(

1 repos

https://github.com/jedisct1/CVE-2025-65945-poc

raptor@infosec.exchange at 2025-12-19T07:36:13.000Z ##

#PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws)

github.com/jedisct1/CVE-2025-6

##

CVE-2025-66478
(0 None)

EPSS: 0.00%

updated 2025-12-03T18:15:47.200000

1 posts

Rejected reason: This CVE is a duplicate of CVE-2025-55182.

100 repos

https://github.com/Letalandroid/cve-2025-66478_rce_vulnerable

https://github.com/mounta11n/CHECK-CVE-2025-55182-AND-CVE-2025-66478

https://github.com/hidden-investigations/react2shell-scanner

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-hoisting

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/freeqaz/react2shell

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm-symlinks

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-overrides

https://github.com/shyambhanushali/React2Shell

https://github.com/nehkark/CVE-2025-55182

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/wangxso/CVE-2025-66478-POC

https://github.com/shamo0/react2shell-PoC

https://github.com/FurkanKAYAPINAR/ReactNext2Shell

https://github.com/namest504/CVE-2025-66478-Exploit-Poc

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-devdeps

https://github.com/vercel-labs/fix-react2shell-next

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-shrinkwrap

https://github.com/Rhyru9/CVE-2025-66478

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/zhixiangyao/CVE-2025-66478-Exploit-PoC

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-alias

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-pnp

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/cypholab/evilact

https://github.com/sumanrox/rschunter

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-14x

https://github.com/alessiodos/react2shell-scanner

https://github.com/strainxx/react2shell-honeypot

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn

https://github.com/aiexz/CVE-2025-66478-kinda-waf

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-berry

https://github.com/Jibaru/CVE-2025-66478-github-patcher

https://github.com/lincemorado97/CVE-2025-55182_CVE-2025-66478

https://github.com/Mustafa1p/Next.js-RCE-Scanner---CVE-2025-55182-CVE-2025-66478

https://github.com/Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/mattcbarrett/check-cve-2025-66478

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-zero-installs

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tag-latest

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-resolutions

https://github.com/DavionGowie/-vercel-application-is-vulnerable-to-CVE-2025-66478.

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-calcom-yarn-monorepo

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-yarn-workspaces

https://github.com/abtonc/next-cve-2025-66478

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tilde

https://github.com/abdozkaya/rsc-security-auditor

https://github.com/xiaopeng-ye/react2shell-detector

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-patch-package

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-catalog

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-nested-versions

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-optional-deps

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-transitive

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-16x

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/arashiyans/CVE-2025-55182-CVE-2025-66478

https://github.com/ancs21/react2shell-scanner-rust

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/gagaltotal/tot-react-rce-CVE-2025-55182

https://github.com/aseemyash/krle

https://github.com/grp-ops/react2shell

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-git-dep

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-peer-conflict

https://github.com/dr4xp/react2shell

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-rsc-webpack

https://github.com/enesbuyuk/react2shell-security-tool

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-supabase-pnpm-monorepo

https://github.com/C00LN3T/React2Shell

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-lockfile-mismatch

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-caret

https://github.com/ExpTechTW/CVE-2025-66478

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-dub-pnpm-monorepo

https://github.com/emredavut/CVE-2025-55182

https://github.com/changgun-lee/Next.js-RSC-RCE-Scanner-CVE-2025-66478

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-packagemanager-field

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-bun

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-v-prefix

https://github.com/Geekujin/React2-PowerShell-CVE-Checker

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-overrides

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm

https://github.com/jctommasi/react2shellVulnApp

https://github.com/abhirajranjan/cve-2025-66478

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-turborepo

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/assetnote/react2shell-scanner

https://github.com/Code42Cate/nexts-cve-2025-66478-exploit

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-range

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-build-metadata

https://github.com/Saad-Ayady/react2shellNSE

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-15x

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-no-lockfile

https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI

Kubernetes@activitypub.awakari.com at 2025-12-15T19:35:00.000Z ## Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components CVE-2025-55182 (also referred to as React2Shell and includes CVE-2025-66478, which was merged into it) is...


Origin | Interest | Match ##

CVE-2025-59230
(7.8 HIGH)

EPSS: 8.49%

updated 2025-12-03T13:47:09.720000

1 posts

Improper access control in Windows Remote Access Connection Manager allows an authorized attacker to elevate privileges locally.

allaboutsecurity@mastodon.social at 2025-12-23T06:58:14.000Z ##

Windows RasMan DoS-Lücke: 0patch bietet kostenlosen Schutz vor aktuellem 0-Day

Sicherheitslücke in Windows Remote Access Connection Manager entdeckt

Bei der Analyse der im Oktober 2025 von Microsoft geschlossenen Schwachstelle CVE-2025-59230 im Windows Remote Access Connection Manager stieß das Team von 0patch auf eine bislang ungepatchte Sicherheitslücke.

all-about-security.de/windows-

#windows #zeroday #CVE

##

CVE-2025-34352(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-02T21:31:37

1 posts

JumpCloud Remote Assist for Windows versions prior to 0.317.0 include an uninstaller that is invoked by the JumpCloud Windows Agent as NT AUTHORITY\SYSTEM during agent uninstall or update operations. The Remote Assist uninstaller performs privileged create, write, execute, and delete actions on predictable files inside a user-writable %TEMP% subdirectory without validating that the directory is tr

CVE-2025-40300(CVSS UNKNOWN)

EPSS: 0.06%

updated 2025-11-17T18:30:25

1 posts

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors af

Ubuntu@activitypub.awakari.com at 2025-12-17T18:01:15.000Z ## Ubuntu 24.04: Linux Kernel Azure FIPS Critical Info Exposure CVE-2025-40300 Several security issues were fixed in the Linux kernel.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-11953
(9.8 CRITICAL)

EPSS: 0.49%

updated 2025-11-13T16:25:27

1 posts

The Metro Development Server, which is opened by the React Native CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server and run arbitrary executables. On Windows, the attackers can also execute arbitrary shell commands with fully controlled arguments

3 repos

https://github.com/SaidBenaissa/cve-2025-11953-vulnerability-demo

https://github.com/N3k0t-dev/PoC-CVE-collection

https://github.com/Ashwesker/Blackash-CVE-2025-11953

pentesttools@infosec.exchange at 2025-12-22T16:22:12.000Z ##

🚨 Active exploitation confirmed: CVE-2025-11953

VulnCheck is reporting active exploitation attempts in the wild against the React Native Metro server.

The issue? It binds to 0.0.0.0 by default, exposing a "local" dev tool to the internet.

⚠️ Crucial Detail: While the exposure is general, the current RCE exploit specifically targets Windows environments.

We’ve updated Pentest-Tools.com to help you validate this:

Network Scanner: Detects exposed Metro servers.

Sniper Auto-Exploiter: Safely executes a PoC (on Windows) to confirm RCE.

Fix: Update @react-native-community/cli-server-api to v20.0.0+ or bind to 127.0.0.1.

Validate your risk.

🔗 pentest-tools.com/vulnerabilit

#InfoSec #AppSec #RedTeam #VulnerabilityManagement #ReactNative #CVE202511953

##

CVE-2025-9242
(9.8 CRITICAL)

EPSS: 73.45%

updated 2025-11-13T15:31:32

1 posts

An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.3 and

Nuclei template

2 repos

https://github.com/watchtowrlabs/watchTowr-vs-WatchGuard-CVE-2025-9242

https://github.com/Ashwesker/Blackash-CVE-2025-9242

RedTeamNews@infosec.exchange at 2025-12-19T10:35:38.000Z ##

Urgent: A critical WatchGuard Firebox RCE flaw (CVE-2025-9242) is being actively exploited. CISA has mandated patching. Over 54k devices are still vulnerable. Patch immediately and rotate all credentials. redteamnews.com/red-team/cve/c

##

CVE-2025-12480
(9.1 CRITICAL)

EPSS: 78.02%

updated 2025-11-12T15:32:32

1 posts

Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.

Nuclei template

catc0n@infosec.exchange at 2025-12-19T01:52:20.000Z ##

Yooo @yeslikethefood wrote a neat bunch of words about developing an exploit for Gladinet Triofox CVE-2025-12480 that closely followed the real-world attack pattern Mandiant wrote about last month and attributed to UNC6485.

20+ requests, an AV config trigger, and an embedded PostgreSQL server later:

vulncheck.com/blog/triofox-exp

##

beyondmachines1@infosec.exchange at 2025-12-19T11:01:32.000Z ##

Critical WSUS flaw reported in Schneider Electric Foxboro DCS systems

Schneider Electric issued a critical security advisory for a vulnerability (CVE-2025-59287) in its EcoStruxure Foxboro DCS Advisor services caused by a flaw in Microsoft WSUS that allows unauthenticated attackers to execute arbitrary code with SYSTEM privileges via ports 8530/8531. Active exploitation is observed in the wild.

**This one is important and kind of urgent, there is active exploitation. If you have Schneider Electric EcoStruxure Foxboro DCS Advisor systems, make sure to block WSUS ports 8530/8531 from the internet, or even better, make sure they are isolated from the internet and only accessible from trusted networks. Then apply Microsoft patches KB5070882 and KB5070884 and verify patch with Schneider Electric Global Customer Support.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-7962
(7.5 HIGH)

EPSS: 0.01%

updated 2025-11-05T20:31:47

1 posts

In Jakarta Mail 2.2 it is possible to preform a SMTP Injection by utilizing the \r and \n UTF-8 characters to separate different messages.

AAKL@infosec.exchange at 2025-12-18T15:24:55.000Z ##

This critical advisory was posted yesterday. It relates to CVE-2025-7962, CVE-2025-49146, and CVE-2025-5516.

HPESBNW04986 rev.1 - HPE Telco Service Activator, Multiple Vulnerabilities support.hpe.com/hpesc/public/d

More:

The Hacker News: HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution thehackernews.com/2025/12/hpe- @thehackernews #infosec #HPE #vulnerability

##

CVE-2025-53057
(5.9 MEDIUM)

EPSS: 0.09%

updated 2025-11-03T18:32:51

1 posts

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25; Oracle GraalVM for JDK: 17.0.16 and 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15. Difficult to exploit vulnerability allows unauthenticated at

AAKL@infosec.exchange at 2025-12-18T17:39:39.000Z ##

New. This addresses high-risk CVE-2025-53057 and CVE-2025-53066.

Security Update for Dell APEX Cloud Platform for Microsoft Azure and Dell APEX Cloud Platform Foundation Software Multiple Third-Party Component Vulnerabilities dell.com/support/kbdoc/en-us/0 #Dell #Microsoft #infosec #Azure #vulnerability

##

CVE-2025-53066
(7.5 HIGH)

EPSS: 0.09%

updated 2025-11-03T18:31:47

1 posts

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25; Oracle GraalVM for JDK: 17.0.16 and 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15. Easily exploitable vulnerability allows unauthenticated attacker

AAKL@infosec.exchange at 2025-12-18T17:39:39.000Z ##

New. This addresses high-risk CVE-2025-53057 and CVE-2025-53066.

Security Update for Dell APEX Cloud Platform for Microsoft Azure and Dell APEX Cloud Platform Foundation Software Multiple Third-Party Component Vulnerabilities dell.com/support/kbdoc/en-us/0 #Dell #Microsoft #infosec #Azure #vulnerability

##

hackmag@infosec.exchange at 2025-12-19T16:27:43.000Z ##

⚪ Vulnerability in SAP NetWeaver Exploited to Deploy Auto-Color Linux Malware

🗨️ Experts at Darktrace warned that hackers exploited a critical vulnerability in SAP NetWeaver (CVE-2025-31324) to deploy Linux malware Auto-Color into the network of an unnamed American chemical company.

🔗 hackmag.com/news/auto-color-at

#news

##

CVE-2025-23006
(9.8 CRITICAL)

EPSS: 56.66%

updated 2025-10-22T00:34:17

1 posts

Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands.

beyondmachines1@infosec.exchange at 2025-12-19T09:01:31.000Z ##

SonicWall patches actively exploited flaw vulnerability chain in SMA 1000 appliances

SonicWall SMA 1000 appliances are being actively exploited through a vulnerability chain combining CVE-2025-40602 (a local privilege escalation flaw) with CVE-2025-23006 (a previously patched deserialization vulnerability), enabling unauthenticated remote code execution with root privileges.

**If you have SonicWall SMA 1000 appliances, make sure their SSH and management access is isolated from the public internet and only accessible from trusted networks. Review latest version, and if not up-to date patched, plan a very quick upgrade to platform-hotfix 12.4.3-03245 or 12.5.0-02283 (or higher). Your devices are being hacked, and you can't really hide them from the internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2024-53704
(9.8 CRITICAL)

EPSS: 93.82%

updated 2025-10-22T00:34:16

1 posts

An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication.

Nuclei template

1 repos

https://github.com/istagmbh/CVE-2024-53704

cR0w@infosec.exchange at 2025-12-19T18:20:10.000Z ##

CVE-2024-53704 in SonicWall SSLVPN has been added to the KEV Catalog.

cve.org/CVERecord?id=CVE-2024-

##

CVE-2023-22518
(9.1 CRITICAL)

EPSS: 94.38%

updated 2025-10-22T00:32:54

1 posts

All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. There is no impact to confidentiality as an attacker cannot exfiltrate any instance data. Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.

Nuclei template

9 repos

https://github.com/bibo318/CVE-2023-22518

https://github.com/ForceFledgling/CVE-2023-22518

https://github.com/0x0d3ad/CVE-2023-22518

https://github.com/0x00sector/CVE_2023_22518_Checker

https://github.com/ductink98lhp/analyze-Exploit-CVE-2023-22518-Confluence

https://github.com/davidfortytwo/CVE-2023-22518

https://github.com/RevoltSecurities/CVE-2023-22518

https://github.com/C1ph3rX13/CVE-2023-22518

https://github.com/Lilly-dox/Exploit-CVE-2023-22518

devto_vn_bot@mastodon.maobui.com at 2025-12-22T19:16:22.000Z ##

Cảnh báo: Lỗ hổng CVE-2023-22518 ảnh hưởng nghiêm trọng đến Atlassian Confluence Data Center và Server.

Lỗi phân quyền này cho phép kẻ tấn công không cần xác thực có thể gây mất dữ liệu hệ thống trên quy mô lớn. Dù không có nguy cơ rò rỉ thông tin (tính bảo mật), nhưng rủi ro mất mát dữ liệu là cực kỳ cao.

Người dùng cần thực hiện cập nhật bản vá hoặc các biện pháp giảm thiểu theo hướng dẫn của Atlassian ngay lập tức.

#AnNinhMang #CyberSecurity #CVE202322518 #Atlassian #Confluence #BaoMat #Vu

##

CVE-2025-50165
(9.8 CRITICAL)

EPSS: 3.84%

updated 2025-08-12T18:31:39

1 posts

Untrusted pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.

1 repos

https://github.com/encrypter15/CVE-2025-50165-x64-Exploit

CVE-2025-25231
(7.5 HIGH)

EPSS: 10.75%

updated 2025-08-11T19:15:27.343000

1 posts

Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerability. A malicious actor may be able to gain access to sensitive information by sending crafted GET requests (read-only) to restricted API endpoints.

Nuclei template

1 repos

https://github.com/ashkan-pu/CVE-CVE-2025-25231

CVE-2025-24294
(5.3 MEDIUM)

EPSS: 0.06%

updated 2025-07-15T22:56:20

1 posts

A denial of service vulnerability has been discovered in the resolv gem bundled with Ruby. ## Details The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a l

linux@activitypub.awakari.com at 2025-12-21T15:51:20.000Z ## Debian: Rails Severe Command Manipulation DSA-6090-2 CVE-2025-24294 Multiple security issues were discovered in the Rails web framework which could result in command injection or logging of unescap...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-30023
(9.1 CRITICAL)

EPSS: 1.92%

updated 2025-07-11T06:30:36

1 posts

The communication protocol used between client and server had a flaw that could lead to an authenticated user performing a remote code execution attack.

beyondmachines1@infosec.exchange at 2025-12-20T12:01:31.000Z ##

Critical vulnerabilities reported in Axis Communications Camera management systems

Axis Communications patched four security vulnerabilities (CVE-2025-30023 through CVE-2025-30026) in its camera management software, including a critical remote code execution flaw and authentication bypass issues affecting surveillance systems in government facilities and critical infrastructure.

**If you have Axis Communications camera management systems (AXIS Camera Station Pro, AXIS Camera Station, or AXIS Device Manager), make sure they are isolated from the internet and only accessible from trusted internal networks. Then plan an update to the latest patched versions (Camera Station Pro 6.9+, Camera Station 5.58+, Device Manager 5.32+).**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-30026(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-07-11T06:30:36

1 posts

The AXIS Camera Station Server had a flaw that allowed to bypass authentication that is normally required.

beyondmachines1@infosec.exchange at 2025-12-20T12:01:31.000Z ##

Critical vulnerabilities reported in Axis Communications Camera management systems

Axis Communications patched four security vulnerabilities (CVE-2025-30023 through CVE-2025-30026) in its camera management software, including a critical remote code execution flaw and authentication bypass issues affecting surveillance systems in government facilities and critical infrastructure.

**If you have Axis Communications camera management systems (AXIS Camera Station Pro, AXIS Camera Station, or AXIS Device Manager), make sure they are isolated from the internet and only accessible from trusted internal networks. Then plan an update to the latest patched versions (Camera Station Pro 6.9+, Camera Station 5.58+, Device Manager 5.32+).**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-6514
(9.7 CRITICAL)

EPSS: 0.73%

updated 2025-07-09T18:08:46

1 posts

mcp-remote is exposed to OS command injection when connecting to untrusted MCP servers due to crafted input from the authorization_endpoint response URL

2 repos

https://github.com/Cyberency/CVE-2025-6514

https://github.com/ChaseHCS/CVE-2025-6514

_r_netsec@infosec.exchange at 2025-12-22T04:13:06.000Z ##

When OAuth Becomes a Weapon: Lessons from CVE-2025-6514 amlalabs.com/blog/oauth-cve-20

##

CVE-2025-49146
(8.2 HIGH)

EPSS: 0.01%

updated 2025-06-11T16:17:03

1 posts

### Impact When the PostgreSQL JDBC driver is configured with channel binding set to `required` (default value is `prefer`), the driver would incorrectly allow connections to proceed with authentication methods that do not support channel binding (such as password, MD5, GSS, or SSPI authentication). This could allow a man-in-the-middle attacker to intercept connections that users believed were pr

AAKL@infosec.exchange at 2025-12-18T15:24:55.000Z ##

This critical advisory was posted yesterday. It relates to CVE-2025-7962, CVE-2025-49146, and CVE-2025-5516.

HPESBNW04986 rev.1 - HPE Telco Service Activator, Multiple Vulnerabilities support.hpe.com/hpesc/public/d

More:

The Hacker News: HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution thehackernews.com/2025/12/hpe- @thehackernews #infosec #HPE #vulnerability

##

CVE-2025-5516
(2.4 LOW)

EPSS: 0.05%

updated 2025-06-06T17:42:29.520000

1 posts

A vulnerability, which was classified as problematic, was found in TOTOLINK X2000R 1.0.0-B20230726.1108. This affects an unknown part of the file /boafrm/formFilter of the component URL Filtering Page. The manipulation of the argument URL Address leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor w

AAKL@infosec.exchange at 2025-12-18T15:24:55.000Z ##

This critical advisory was posted yesterday. It relates to CVE-2025-7962, CVE-2025-49146, and CVE-2025-5516.

HPESBNW04986 rev.1 - HPE Telco Service Activator, Multiple Vulnerabilities support.hpe.com/hpesc/public/d

More:

The Hacker News: HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution thehackernews.com/2025/12/hpe- @thehackernews #infosec #HPE #vulnerability

##

CVE-2025-5499
(7.3 HIGH)

EPSS: 0.11%

updated 2025-06-03T15:31:27

1 posts

A vulnerability classified as critical has been found in slackero phpwcms up to 1.9.45/1.10.8. Affected is the function is_file/getimagesize of the file image_resized.php. The manipulation of the argument imgfile leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9.46 and 1.10.9 is able to add

CVE-2025-29970
(7.8 HIGH)

EPSS: 0.07%

updated 2025-05-19T14:20:49.300000

2 posts

Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.

cyberveille@mastobot.ping.moi at 2025-12-23T12:00:04.000Z ##

📢 CVE-2025-29970 : use-after-free dans bfs.sys (Windows) permettant une élévation de privilèges
📝 Selon PixiePoint Security (22 décembre 2025), CVE-2025-29970 affecte le driver Windows Brokering File System (bfs.sys) utilisé...
📖 cyberveille : cyberveille.ch/posts/2025-12-2
🌐 source : pixiepointsecurity.com/blog/nd
#CVE_2025_29970 #IOC #Cyberveille

##

_r_netsec@infosec.exchange at 2025-12-22T10:13:06.000Z ##

Microsoft Brokering File System Elevation of Privilege Vulnerability (CVE--2025-29970) pixiepointsecurity.com/blog/nd

##

CVE-2025-2039
(4.7 MEDIUM)

EPSS: 0.10%

updated 2025-05-13T20:57:18.117000

1 posts

A vulnerability classified as critical has been found in code-projects Blood Bank Management System 1.0. Affected is an unknown function of the file /admin/delete_members.php. The manipulation of the argument member_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

4 repos

https://github.com/Ashwesker/Blackash-CVE-2025-20393

https://github.com/cyberleelawat/CVE-2025-20393

https://github.com/KingHacker353/CVE-2025-20393

https://github.com/thesystemowner/CVE-2025-20393-POC

CVE-2025-32210
(6.5 MEDIUM)

EPSS: 0.04%

updated 2025-04-11T15:39:52.920000

1 posts

Missing Authorization vulnerability in CreativeMindsSolutions CM Registration and Invitation Codes allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects CM Registration and Invitation Codes: from n/a through 2.5.2.

beyondmachines1@infosec.exchange at 2025-12-18T08:01:32.000Z ##

Flaw in NVIDIA Isaac Lab enables remote code execution

NVIDIA patched a critical deserialization vulnerability (CVE-2025-32210) in Isaac Lab that allows authenticated low-privilege users to execute arbitrary code, affecting all versions prior to v2.3.0.

**Make sure all devices running NVIDIA Isaac Lab are isolated from the internet and accessible from trusted networks only. Then plan a quick upgrade to Isaac Lab v2.3.0.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2024-44067
(8.4 HIGH)

EPSS: 0.04%

updated 2024-08-20T20:35:34.497000

1 posts

The T-Head XuanTie C910 CPU in the TH1520 SoC and the T-Head XuanTie C920 CPU in the SOPHON SG2042 have instructions that allow unprivileged attackers to write to arbitrary physical memory locations, aka GhostWrite.

erai@furry.engineer at 2025-12-19T20:20:49.000Z ##

somehow nfs feels faster too. Kinda sad about CVE-2024-44067 on this board but i don't really care because i just want more architectures

##

CVE-2025-14282
(0 None)

EPSS: 0.00%

1 posts

N/A

linux@activitypub.awakari.com at 2025-12-19T19:30:37.000Z ## Debian: Urgent Vulnerability in Dropbear DSA-6086-1 CVE-2025-14282 "Turistu" discovered that incorrect permission handling in the Dropbear SSH server could result in privilege escalation. T...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-66387
(0 None)

EPSS: 0.00%

1 posts

N/A

PostgreSQL@activitypub.awakari.com at 2025-12-18T15:46:25.000Z ## LevelBlue SpiderLabs: SQL Injection in Orkes Conductor: CVE-2025-66387 LevelBlue SpiderLabs has discovered a vulnerability in the Orkes Conductor platform (version 5.2.4 | v1.19.12) that allows aut...

#Database #Protection #Security #Research #Data #Breach

Origin | Interest | Match ##

CVE-2025-67745
(0 None)

EPSS: 0.02%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-18T20:30:01.000Z ##

CVE-2025-67745 - Myhoard logs backup encryption key in plain text cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-63821
(0 None)

EPSS: 0.00%

1 posts

N/A

1 repos

https://github.com/Xernary/CVE-2025-63821

CVE-2025-63820
(0 None)

EPSS: 0.00%

1 posts

N/A

1 repos

https://github.com/Xernary/CVE-2025-63820

CVE-2025-66029
(0 None)

EPSS: 0.03%

1 posts

N/A

offseq@infosec.exchange at 2025-12-18T04:34:35.000Z ##

🚨 CVE-2025-66029 (HIGH): OSC ondemand ≤4.0.8 exposes sensitive creds via Apache proxy headers—attackers can harvest tokens if users hit malicious servers. Patch in v4.1; config workarounds available now. Details: radar.offseq.com/threat/cve-20 #OffSeq #HPC #Vuln #Security

##

CVE-2025-68435
(0 None)

EPSS: 0.07%

2 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-18T02:45:00.000Z ##

CVE-2025-68435 - Zerobyte has Authentication Bypass by Primary Weakness cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-18T01:30:00.000Z ##

CVE-2025-68435 - Zerobyte has Authentication Bypass by Primary Weakness cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-18T01:30:00.000Z ##

CVE-2025-68147 - opensourcepos has a Cross-site Scripting vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68399
(0 None)

EPSS: 0.03%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-17T22:45:01.000Z ##

CVE-2025-68399 - ChurchCRM has Stored Cross-Site Scripting (XSS) In GroupEditor.php cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68275
(0 None)

EPSS: 0.03%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-17T22:45:01.000Z ##

CVE-2025-68275 - ChurchCRM vulnerable to Stored XSS - Group name > Person Listing cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14760
(0 None)

EPSS: 0.02%

1 posts

N/A

Visit counter For Websites