##
Updated at UTC 2025-10-28T13:33:32.774879
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-59287 | 9.8 | 9.02% | 35 | 10 | 2025-10-28T12:44:03.240000 | Deserialization of untrusted data in Windows Server Update Service allows an una | |
| CVE-2025-10151 | 0 | 0.00% | 1 | 0 | 2025-10-28T08:15:32.917000 | Improper locking vulnerability in Softing Industrial Automation GmbH gateways al | |
| CVE-2025-11735 | 7.5 | 0.00% | 1 | 0 | 2025-10-28T06:31:11 | The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is | |
| CVE-2025-12241 | 8.8 | 0.08% | 1 | 0 | 2025-10-28T02:16:41.547000 | A vulnerability was detected in TOTOLINK A3300R 17.0.0cu.557_B20221024. This imp | |
| CVE-2025-12259 | 8.8 | 0.08% | 1 | 0 | 2025-10-28T02:10:25.910000 | A flaw has been found in TOTOLINK A3300R 17.0.0cu.557_B20221024. The affected el | |
| CVE-2025-12273 | 8.8 | 0.00% | 1 | 0 | 2025-10-28T02:07:59.857000 | A weakness has been identified in Tenda CH22 1.0.0.1. Affected is the function f | |
| CVE-2025-54236 | 9.1 | 63.13% | 14 | 2 | template | 2025-10-28T01:00:01.903000 | Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2.4.5-p14, |
| CVE-2025-54969 | 6.1 | 0.00% | 1 | 0 | 2025-10-27T21:31:34 | An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Statu | |
| CVE-2025-12322 | 8.8 | 0.00% | 1 | 0 | 2025-10-27T21:30:34 | A flaw has been found in Tenda CH22 1.0.0.1. Affected by this issue is the funct | |
| CVE-2025-12313 | 6.3 | 0.00% | 1 | 0 | 2025-10-27T21:30:34 | A vulnerability has been found in D-Link DI-7001 MINI 19.09.19A1/24.04.18B1. The | |
| CVE-2025-12236 | 8.8 | 0.05% | 1 | 0 | 2025-10-27T21:30:27 | A vulnerability was determined in Tenda CH22 1.0.0.1. This issue affects the fun | |
| CVE-2025-12234 | 8.8 | 0.05% | 1 | 0 | 2025-10-27T21:30:26 | A vulnerability has been found in Tenda CH22 1.0.0.1. This affects the function | |
| CVE-2025-60425 | 8.6 | 0.00% | 1 | 1 | 2025-10-27T20:15:53.773000 | Nagios Fusion v2024R1.2 and v2024R2 does not invalidate already existing session | |
| CVE-2025-12233 | 8.8 | 0.05% | 1 | 0 | 2025-10-27T18:50:33.377000 | A flaw has been found in Tenda CH22 1.0.0.1. Affected by this issue is the funct | |
| CVE-2025-12235 | 8.0 | 0.03% | 1 | 0 | 2025-10-27T18:45:58.327000 | A vulnerability was found in Tenda CH22 1.0.0.1. This vulnerability affects the | |
| CVE-2025-61481 | 10.0 | 0.00% | 1 | 0 | 2025-10-27T18:32:16 | An issue in MikroTik RouterOS v.7.14.2 and SwitchOS v.2.18 allows a remote attac | |
| CVE-2025-12240 | 8.8 | 0.08% | 1 | 0 | 2025-10-27T18:32:16 | A security vulnerability has been detected in TOTOLINK A3300R 17.0.0cu.557_B2022 | |
| CVE-2025-60339 | 7.5 | 0.04% | 1 | 0 | 2025-10-27T18:32:15 | Multiple buffer overflow vulnerabilities in the openSchedWifi function of Tenda | |
| CVE-2025-60337 | 7.5 | 0.04% | 1 | 0 | 2025-10-27T18:32:15 | Tenda AC6 V2.0 15.03.06.50 was discovered to contain a buffer overflow in the sp | |
| CVE-2025-22175 | 5.4 | 0.04% | 1 | 0 | 2025-10-27T18:32:15 | Jira Align is vulnerable to an authorization issue. A low-privilege user can acc | |
| CVE-2025-12363 | None | 0.00% | 1 | 0 | 2025-10-27T18:31:24 | Email Password Disclosure.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: t | |
| CVE-2025-54970 | None | 0.00% | 1 | 0 | 2025-10-27T18:31:20 | An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Statu | |
| CVE-2025-12296 | 4.7 | 0.00% | 1 | 0 | 2025-10-27T18:31:19 | A security vulnerability has been detected in D-Link DAP-2695 2.00RC13. The impa | |
| CVE-2025-12364 | None | 0.00% | 1 | 0 | 2025-10-27T18:31:13 | Weak Password Policy.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: throug | |
| CVE-2025-54968 | None | 0.00% | 1 | 0 | 2025-10-27T18:31:13 | An issue was discovered in BAE SOCET GXP before 4.6.0.2. The SOCET GXP Job Servi | |
| CVE-2025-54967 | None | 0.00% | 1 | 0 | 2025-10-27T18:31:13 | An issue was discovered in BAE SOCET GXP before 4.6.0.3. It permits external ent | |
| CVE-2025-12295 | 6.6 | 0.00% | 1 | 0 | 2025-10-27T18:31:11 | A weakness has been identified in D-Link DAP-2695 2.00RC13. The affected element | |
| CVE-2025-12239 | 8.8 | 0.08% | 1 | 0 | 2025-10-27T18:00:52.427000 | A weakness has been identified in TOTOLINK A3300R 17.0.0cu.557_B20221024. The im | |
| CVE-2025-33073 | 8.8 | 36.78% | 4 | 6 | 2025-10-27T17:12:42.667000 | Improper access control in Windows SMB allows an authorized attacker to elevate | |
| CVE-2025-59230 | 7.8 | 9.53% | 1 | 2 | 2025-10-27T17:12:37.767000 | Improper access control in Windows Remote Access Connection Manager allows an au | |
| CVE-2025-2776 | 9.3 | 56.42% | 1 | 2 | template | 2025-10-27T16:58:51.230000 | SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML Exte |
| CVE-2025-9164 | None | 0.00% | 1 | 0 | 2025-10-27T15:30:49 | Docker Desktop Installer.exe is vulnerable to DLL hijacking due to insecure DLL | |
| CVE-2025-12274 | 8.8 | 0.00% | 1 | 0 | 2025-10-27T15:30:41 | A security vulnerability has been detected in Tenda CH22 1.0.0.1. Affected by th | |
| CVE-2025-12351 | 6.8 | 0.00% | 1 | 0 | 2025-10-27T15:15:37.653000 | Honeywell S35 Series Cameras contains an authorization bypass Vulnerability thro | |
| CVE-2025-62518 | 8.1 | 0.01% | 7 | 1 | 2025-10-27T15:13:04 | ## Summary Versions of `astral-tokio-tar` prior to 0.5.6 contain a boundary par | |
| CVE-2025-1679 | 0 | 0.04% | 1 | 0 | 2025-10-27T13:20:33.350000 | Cross-site Scripting has been identified in Moxa’s Ethernet switches, which allo | |
| CVE-2025-62820 | 4.9 | 0.04% | 1 | 0 | 2025-10-27T13:20:33.350000 | Slack Nebula before 1.9.7 mishandles CIDR in some configurations and thus accept | |
| CVE-2025-62396 | 5.3 | 0.03% | 1 | 0 | 2025-10-27T13:20:33.350000 | An error-handling issue in the Moodle router (r.php) could cause the application | |
| CVE-2025-62398 | 5.4 | 0.05% | 1 | 0 | 2025-10-27T13:20:33.350000 | A serious authentication flaw allowed attackers with valid credentials to bypass | |
| CVE-2025-62397 | 5.3 | 0.03% | 1 | 0 | 2025-10-27T13:20:33.350000 | The router’s inconsistent response to invalid course IDs allowed attackers to in | |
| CVE-2025-62400 | 4.3 | 0.03% | 1 | 0 | 2025-10-27T13:20:33.350000 | Moodle exposed the names of hidden groups to users who had permission to create | |
| CVE-2025-43995 | 9.8 | 0.17% | 2 | 0 | 2025-10-27T13:20:15.637000 | Dell Storage Center - Dell Storage Manager, version(s) 20.1.21, contain(s) an Im | |
| CVE-2025-59503 | 9.9 | 0.08% | 1 | 1 | 2025-10-27T13:20:15.637000 | Server-side request forgery (ssrf) in Azure Compute Gallery allows an authorized | |
| CVE-2025-59500 | 7.7 | 0.06% | 1 | 0 | 2025-10-27T13:20:15.637000 | Improper access control in Azure Notification Service allows an authorized attac | |
| CVE-2025-58428 | 9.9 | 0.40% | 1 | 0 | 2025-10-27T13:20:15.637000 | The TLS4B ATG system's SOAP-based interface is vulnerable due to its accessibili | |
| CVE-2025-62498 | 8.8 | 0.03% | 1 | 0 | 2025-10-27T13:20:15.637000 | A relative path traversal (ZipSlip) vulnerability was discovered in Productivity | |
| CVE-2025-10561 | 9.3 | 0.01% | 1 | 0 | 2025-10-27T13:19:49.063000 | The device is running an outdated operating system, which may be susceptible to | |
| CVE-2025-46583 | 5.3 | 0.04% | 1 | 0 | 2025-10-27T13:19:49.063000 | There is a Denial of Service(DoS)vulnerability in the ZTE MC889A Pro product. Du | |
| CVE-2025-40778 | 8.6 | 0.01% | 7 | 0 | 2025-10-27T13:15:44.780000 | Under certain circumstances, BIND is too lenient when accepting records from ans | |
| CVE-2025-12271 | 8.8 | 0.00% | 1 | 0 | 2025-10-27T12:33:03 | A vulnerability was identified in Tenda CH22 1.0.0.1. This affects the function | |
| CVE-2025-59460 | 7.5 | 0.04% | 1 | 0 | 2025-10-27T12:32:59 | The system is deployed in its default state, with configuration settings that do | |
| CVE-2025-59463 | 4.3 | 0.02% | 1 | 0 | 2025-10-27T12:32:59 | An attacker may cause chunk-size mismatches that block file transfers and preven | |
| CVE-2025-59459 | 5.5 | 0.01% | 1 | 0 | 2025-10-27T12:32:59 | An attacker that gains SSH access to an unprivileged account may be able to disr | |
| CVE-2025-12258 | 8.8 | 0.08% | 1 | 0 | 2025-10-27T12:32:58 | A vulnerability was detected in TOTOLINK A3300R 17.0.0cu.557_B20221024. Impacted | |
| CVE-2025-12260 | 8.8 | 0.08% | 1 | 0 | 2025-10-27T12:32:58 | A vulnerability has been found in TOTOLINK A3300R 17.0.0cu.557_B20221024. The im | |
| CVE-2025-12272 | 8.8 | 0.00% | 1 | 0 | 2025-10-27T12:32:53 | A security flaw has been discovered in Tenda CH22 1.0.0.1. This impacts the func | |
| CVE-2025-59462 | 6.5 | 0.02% | 1 | 0 | 2025-10-27T12:32:52 | An attacker who tampers with the C++ CLI client may crash the UpdateService duri | |
| CVE-2025-12265 | 8.8 | 0.05% | 1 | 0 | 2025-10-27T12:32:52 | A weakness has been identified in Tenda CH22 1.0.0.1. Affected by this issue is | |
| CVE-2025-59461 | 7.6 | 0.07% | 1 | 0 | 2025-10-27T12:32:52 | A remote unauthenticated attacker may use the unauthenticated C++ API to access | |
| CVE-2025-46582 | 7.7 | 0.03% | 1 | 0 | 2025-10-27T09:30:28 | A private key disclosure vulnerability exists in ZTE's ZXMP M721 product. A low- | |
| CVE-2025-12232 | 8.8 | 0.05% | 1 | 0 | 2025-10-27T09:30:27 | A vulnerability was detected in Tenda CH22 1.0.0.1. Affected by this vulnerabili | |
| CVE-2025-62393 | 4.3 | 0.02% | 1 | 0 | 2025-10-24T20:59:28 | A flaw was found in the course overview output function where user access permis | |
| CVE-2025-62394 | 4.3 | 0.03% | 1 | 0 | 2025-10-24T20:59:23 | Moodle failed to verify enrolment status correctly when sending quiz notificatio | |
| CVE-2025-62401 | 5.4 | 0.04% | 1 | 0 | 2025-10-24T20:58:54 | An issue in Moodle's timed assignment feature allowed students to bypass the tim | |
| CVE-2025-62399 | 7.5 | 0.07% | 1 | 0 | 2025-10-24T20:58:13 | Moodle's mobile and web service authentication endpoints did not sufficiently re | |
| CVE-2025-62506 | 8.1 | 0.04% | 6 | 1 | 2025-10-24T19:28:26 | ### Summary A privilege escalation vulnerability allows service accounts and STS | |
| CVE-2025-7850 | 7.2 | 1.45% | 1 | 0 | 2025-10-24T18:30:58 | A command injection vulnerability may be exploited after the admin's authenticat | |
| CVE-2025-7851 | 9.8 | 0.05% | 2 | 0 | 2025-10-24T17:15:43.390000 | An attacker may obtain the root shell on the underlying OS system with the restr | |
| CVE-2025-22178 | 4.3 | 0.04% | 1 | 0 | 2025-10-24T15:32:26 | Jira Align is vulnerable to an authorization issue. A low-privilege user can acc | |
| CVE-2025-22174 | 4.3 | 0.04% | 1 | 0 | 2025-10-24T15:32:26 | Jira Align is vulnerable to an authorization issue. A low-privilege user can acc | |
| CVE-2025-22173 | 4.3 | 0.04% | 1 | 0 | 2025-10-24T15:32:26 | Jira Align is vulnerable to an authorization issue. A low-privilege user can acc | |
| CVE-2025-22172 | 4.3 | 0.04% | 1 | 0 | 2025-10-24T15:32:26 | Jira Align is vulnerable to an authorization issue. A low-privilege user can acc | |
| CVE-2025-22171 | 4.3 | 0.04% | 1 | 0 | 2025-10-24T15:32:25 | Jira Align is vulnerable to an authorization issue. A low-privilege user is able | |
| CVE-2025-22170 | 4.3 | 0.04% | 1 | 0 | 2025-10-24T15:32:25 | Jira Align is vulnerable to an authorization issue. A low-privilege user without | |
| CVE-2025-22168 | 4.3 | 0.04% | 1 | 0 | 2025-10-24T15:32:25 | Jira Align is vulnerable to an authorization issue. A low-privilege user can acc | |
| CVE-2025-6541 | 8.8 | 0.05% | 2 | 0 | 2025-10-24T15:32:25 | An arbitrary OS command may be executed on the product by the user who can log i | |
| CVE-2025-22169 | 5.4 | 0.04% | 1 | 0 | 2025-10-24T14:24:57.253000 | Jira Align is vulnerable to an authorization issue. A low-privilege user can acc | |
| CVE-2025-22176 | 4.3 | 0.04% | 1 | 0 | 2025-10-24T14:20:53.383000 | Jira Align is vulnerable to an authorization issue. A low-privilege user can acc | |
| CVE-2025-22177 | 4.3 | 0.04% | 1 | 0 | 2025-10-24T14:20:40.950000 | Jira Align is vulnerable to an authorization issue. A low-privilege user can acc | |
| CVE-2025-2783 | 8.3 | 27.20% | 3 | 3 | 2025-10-24T14:06:49.887000 | Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome | |
| CVE-2025-6542 | 9.8 | 0.15% | 3 | 0 | 2025-10-24T13:50:10.897000 | An arbitrary OS command may be executed on the product by a remote unauthenticat | |
| CVE-2025-60340 | 7.5 | 0.04% | 1 | 0 | 2025-10-24T13:21:16.710000 | Multiple buffer overflows in the SetClientState function of Tenda AC6 v.15.03.06 | |
| CVE-2025-60343 | 7.5 | 0.04% | 1 | 0 | 2025-10-24T13:21:06.800000 | Multiple buffer overflows in the AdvSetMacMtuWan function of Tenda AC6 v.15.03.0 | |
| CVE-2025-60332 | 7.5 | 0.11% | 1 | 0 | 2025-10-24T13:19:20.730000 | A NULL pointer dereference in the SetWLanRadioSettings function of D-Link DIR-82 | |
| CVE-2025-60335 | 7.5 | 0.72% | 1 | 0 | 2025-10-24T13:18:55.290000 | A NULL pointer dereference in the main function of TOTOLINK N600R v4.3.0cu.7866_ | |
| CVE-2025-10020 | 8.5 | 0.79% | 1 | 0 | 2025-10-24T12:58:03.523000 | Zohocorp ManageEngine ADManager Plus version before 8024 are vulnerable to authe | |
| CVE-2025-59273 | 7.3 | 0.08% | 1 | 0 | 2025-10-24T00:30:58 | Improper access control in Azure Event Grid allows an unauthorized attacker to e | |
| CVE-2025-61934 | 10.0 | 0.23% | 1 | 0 | 2025-10-24T00:30:53 | A binding to an unrestricted IP address vulnerability was discovered in Producti | |
| CVE-2025-55067 | 7.1 | 0.08% | 1 | 0 | 2025-10-23T21:31:50 | The TLS4B ATG system is vulnerable to improper handling of Unix time values that | |
| CVE-2025-60336 | 7.5 | 1.27% | 1 | 0 | 2025-10-23T18:32:21 | A NULL pointer dereference in the sub_41773C function of TOTOLINK N600R v4.3.0cu | |
| CVE-2025-60334 | 7.5 | 0.10% | 1 | 0 | 2025-10-23T15:31:44 | TOTOLINK N600R v4.3.0cu.7866_B20220506 was discovered to contain a stack overflo | |
| CVE-2025-60331 | 7.5 | 0.02% | 1 | 0 | 2025-10-23T15:31:44 | D-Link DIR-823G A1 v1.0.2B05 was discovered to contain a buffer overflow in the | |
| CVE-2025-60342 | 7.5 | 0.04% | 1 | 0 | 2025-10-23T15:31:43 | Tenda AC6 V2.0 15.03.06.50 was discovered to contain a stack overflow in the pag | |
| CVE-2025-1680 | None | 0.02% | 1 | 0 | 2025-10-23T15:30:46 | An acceptance of extraneous untrusted data with trusted data vulnerability has b | |
| CVE-2025-53701 | None | 0.03% | 1 | 0 | 2025-10-23T15:30:46 | Vilar VS-IPC1002 IP cameras are vulnerable to Reflected XSS (Cross-site Scriptin | |
| CVE-2025-53702 | None | 0.03% | 1 | 0 | 2025-10-23T15:30:45 | Vilar VS-IPC1002 IP cameras are vulnerable to DoS (Denial-of-Service) attacks. A | |
| CVE-2025-60333 | 7.5 | 0.14% | 1 | 0 | 2025-10-23T15:30:35 | TOTOLINK N600R v4.3.0cu.7866_B20220506 was discovered to contain a stack overflo | |
| CVE-2025-60341 | 7.5 | 0.04% | 1 | 0 | 2025-10-23T12:32:24 | Tenda AC6 V2.0 15.03.06.50 was discovered to contain a stack overflow in the ssi | |
| CVE-2025-60338 | 7.5 | 0.04% | 1 | 0 | 2025-10-23T12:32:24 | Tenda AC6 V2.0 15.03.06.50 was discovered to contain a stack overflow in the pag | |
| CVE-2025-62395 | 4.3 | 0.02% | 1 | 0 | 2025-10-23T12:31:28 | A flaw in the cohort search web service allowed users with permissions in lower | |
| CVE-2025-61932 | 9.8 | 13.06% | 5 | 1 | 2025-10-23T00:30:34 | Lanscope Endpoint Manager (On-Premises) (Client program (MR) and Detection agent | |
| CVE-2025-58712 | 5.2 | 0.00% | 1 | 0 | 2025-10-22T21:31:33 | A container privilege escalation flaw was found in certain AMQ Broker images. Th | |
| CVE-2025-8556 | 3.7 | 0.01% | 7 | 0 | 2025-10-22T21:15:47.137000 | A flaw was found in CIRCL's implementation of the FourQ elliptic curve. This vul | |
| CVE-2025-41723 | 9.8 | 0.32% | 1 | 0 | 2025-10-22T21:12:48.953000 | The importFile SOAP method is vulnerable to a directory traversal attack. An una | |
| CVE-2025-41108 | 0 | 0.03% | 2 | 0 | 2025-10-22T21:12:48.953000 | The communication protocol implemented in Ghost Robotics Vision 60 v0.27.2 could | |
| CVE-2023-53691 | 8.3 | 0.07% | 1 | 0 | 2025-10-22T21:12:48.953000 | Hikvision CSMP (Comprehensive Security Management Platform) iSecure Center throu | |
| CVE-2025-62771 | 7.5 | 0.01% | 1 | 0 | 2025-10-22T21:12:48.953000 | Mercku M6a devices through 2.1.0 allow password changes via intranet CSRF attack | |
| CVE-2025-62774 | 3.1 | 0.01% | 1 | 0 | 2025-10-22T21:12:48.953000 | On Mercku M6a devices through 2.1.0, the authentication system uses predictable | |
| CVE-2025-57870 | 10.0 | 0.10% | 1 | 1 | 2025-10-22T21:12:32.330000 | A SQL Injection vulnerability exists in Esri ArcGIS Server versions 11.3, 11.4 a | |
| CVE-2025-8677 | 7.5 | 0.05% | 1 | 0 | 2025-10-22T18:30:45 | Querying for records within a specially crafted zone containing certain malforme | |
| CVE-2025-40780 | 8.6 | 0.01% | 3 | 0 | 2025-10-22T18:30:44 | In specific circumstances, due to a weakness in the Pseudo Random Number Generat | |
| CVE-2025-11411 | None | 0.01% | 3 | 0 | 2025-10-22T15:31:09 | NLnet Labs Unbound up to and including version 1.24.0 is vulnerable to possible | |
| CVE-2025-61757 | 9.8 | 0.11% | 1 | 0 | 2025-10-22T15:31:09 | Vulnerability in the Identity Manager product of Oracle Fusion Middleware (compo | |
| CVE-2025-41110 | None | 0.03% | 1 | 0 | 2025-10-22T09:30:26 | Encrypted WiFi and SSH credentials were found in the Ghost Robotics Vision 60 v0 | |
| CVE-2025-41109 | None | 0.02% | 1 | 0 | 2025-10-22T09:30:26 | Ghost Robotics Vision 60 v0.27.2 includes, among its physical interfaces, three | |
| CVE-2025-41724 | 7.5 | 0.08% | 1 | 0 | 2025-10-22T09:30:26 | An unauthenticated remote attacker can crash the wscserver by sending incomplete | |
| CVE-2025-41722 | 7.5 | 0.02% | 1 | 0 | 2025-10-22T09:30:25 | The wsc server uses a hard-coded certificate to check the authenticity of SOAP m | |
| CVE-2025-41720 | 4.3 | 0.02% | 1 | 2 | 2025-10-22T09:30:25 | A low privileged remote attacker can upload arbitrary data masked as a png file | |
| CVE-2025-41719 | 8.8 | 0.10% | 1 | 0 | 2025-10-22T09:30:25 | A low privileged remote attacker can corrupt the webserver users storage on the | |
| CVE-2025-41721 | 2.7 | 0.02% | 1 | 0 | 2025-10-22T09:30:25 | A high privileged remote attacker can influence the parameters passed to the ope | |
| CVE-2024-58274 | 8.3 | 0.06% | 1 | 0 | 2025-10-22T06:31:21 | Hikvision CSMP (Comprehensive Security Management Platform) iSecure Center throu | |
| CVE-2025-62773 | 2.4 | 0.01% | 1 | 0 | 2025-10-22T06:31:12 | Mercku M6a devices through 2.1.0 allow TELNET sessions via a router.telnet.enabl | |
| CVE-2025-62775 | 8.0 | 0.02% | 1 | 0 | 2025-10-22T06:31:12 | Mercku M6a devices through 2.1.0 allow root TELNET logins via the web admin pass | |
| CVE-2025-62772 | 3.1 | 0.02% | 1 | 0 | 2025-10-22T06:31:12 | On Mercku M6a devices through 2.1.0, session tokens remain valid for at least mo | |
| CVE-2025-24990 | 7.8 | 6.76% | 1 | 1 | 2025-10-22T00:34:29 | Microsoft is aware of vulnerabilities in the third party Agere Modem driver that | |
| CVE-2025-61884 | 7.5 | 10.21% | 1 | 6 | 2025-10-22T00:34:29 | Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (com | |
| CVE-2025-53770 | 9.8 | 87.23% | 4 | 45 | template | 2025-10-22T00:34:26 | Deserialization of untrusted data in on-premises Microsoft SharePoint Server all |
| CVE-2025-10035 | 10.0 | 47.55% | 1 | 3 | template | 2025-10-22T00:34:26 | A deserialization vulnerability in the License Servlet of Fortra's GoAnywhere MF |
| CVE-2025-49704 | 8.8 | 60.24% | 1 | 0 | 2025-10-22T00:34:25 | Improper control of generation of code ('code injection') in Microsoft Office Sh | |
| CVE-2025-2775 | 9.3 | 65.15% | 1 | 1 | template | 2025-10-22T00:34:21 | SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML Exte |
| CVE-2025-22457 | 9.1 | 77.49% | 1 | 5 | template | 2025-10-22T00:34:21 | A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6, |
| CVE-2022-48503 | 8.8 | 0.56% | 1 | 0 | 2025-10-22T00:33:52 | The issue was addressed with improved bounds checks. This issue is fixed in tvOS | |
| CVE-2025-2747 | 9.8 | 85.31% | 1 | 0 | template | 2025-10-22T00:33:17 | An authentication bypass vulnerability in Kentico Xperience allows authenticatio |
| CVE-2025-2746 | 9.8 | 77.34% | 1 | 0 | template | 2025-10-22T00:33:16 | An authentication bypass vulnerability in Kentico Xperience allows authenticatio |
| CVE-2019-1367 | 7.5 | 89.17% | 1 | 1 | 2025-10-22T00:32:47 | A remote code execution vulnerability exists in the way that the scripting engin | |
| CVE-2023-20118 | 6.5 | 2.28% | 1 | 0 | 2025-10-22T00:18:14.313000 | A vulnerability in the web-based management interface of Cisco Small Business Ro | |
| CVE-2025-8088 | 8.8 | 4.42% | 2 | 25 | 2025-10-21T23:17:10.660000 | A path traversal vulnerability affecting the Windows version of WinRAR allows th | |
| CVE-2025-20333 | 9.9 | 1.72% | 2 | 0 | 2025-10-21T23:16:46.667000 | A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security | |
| CVE-2025-62641 | 8.3 | 0.03% | 1 | 0 | 2025-10-21T21:33:53 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp | |
| CVE-2025-52079 | 5.3 | 0.04% | 1 | 0 | 2025-10-21T21:33:50 | The administrator password setting of the D-Link DIR-820L 1.06B02 is has Imprope | |
| CVE-2025-60344 | 6.6 | 0.05% | 1 | 0 | 2025-10-21T21:33:37 | An unauthenticated Local File Inclusion (LFI) vulnerability in D-Link DSR series | |
| CVE-2025-11534 | 0 | 0.10% | 1 | 2 | 2025-10-21T20:20:25.480000 | The affected Raisecom devices allow SSH sessions to be established without compl | |
| CVE-2025-11493 | 8.8 | 0.01% | 1 | 0 | 2025-10-21T19:31:50.020000 | The ConnectWise Automate Agent does not fully verify the authenticity of files d | |
| CVE-2025-40016 | 0 | 0.02% | 1 | 0 | 2025-10-21T19:31:25.450000 | In the Linux kernel, the following vulnerability has been resolved: media: uvcv | |
| CVE-2025-26392 | 5.4 | 0.10% | 1 | 0 | 2025-10-21T19:31:25.450000 | SolarWinds Observability Self-Hosted is susceptible to SQL injection vulnerabili | |
| CVE-2025-61301 | 7.5 | 0.05% | 1 | 1 | 2025-10-21T15:32:02 | Denial-of-analysis in reporting/mongodb.py and reporting/jsondump.py in CAPEv2 ( | |
| CVE-2025-11625 | None | 0.07% | 1 | 0 | 2025-10-21T15:30:58 | Improper host authentication vulnerability in wolfSSH version 1.4.20 and earlier | |
| CVE-2025-9133 | 8.1 | 0.04% | 2 | 0 | 2025-10-21T03:30:25 | A missing authorization vulnerability in Zyxel ATP series firmware versions from | |
| CVE-2025-8078 | 7.2 | 0.34% | 1 | 0 | 2025-10-21T03:30:25 | A post-authentication command injection vulnerability in Zyxel ATP series firmwa | |
| CVE-2025-54957 | 6.5 | 0.04% | 1 | 0 | 2025-10-20T18:31:37 | An issue was discovered in Dolby UDC 4.5 through 4.13. A crash of the DD+ decode | |
| CVE-2025-9574 | 9.1 | 0.08% | 1 | 0 | 2025-10-20T18:30:41 | Missing Authentication for Critical Function vulnerability in ABB ALS-mini-s4 IP | |
| CVE-2025-40005 | None | 0.02% | 1 | 0 | 2025-10-20T18:30:33 | In the Linux kernel, the following vulnerability has been resolved: spi: cadenc | |
| CVE-2025-59419 | None | 2.68% | 1 | 0 | 2025-10-17T21:32:40 | ### Summary An SMTP Command Injection (CRLF Injection) vulnerability in Netty's | |
| CVE-2025-9804 | 9.7 | 0.03% | 2 | 0 | 2025-10-17T18:31:07 | An improper access control vulnerability exists in multiple WSO2 products due to | |
| CVE-2025-9152 | 9.8 | 0.06% | 2 | 0 | 2025-10-17T18:31:07 | An improper privilege management vulnerability exists in WSO2 API Manager due to | |
| CVE-2025-60358 | 7.5 | 0.01% | 1 | 0 | 2025-10-17T15:32:08 | radare2 v.5.9.8 and before contains a memory leak in the function _load_relocati | |
| CVE-2025-2749 | 7.2 | 0.54% | 1 | 0 | 2025-10-17T10:32:54.807000 | An authenticated remote code execution in Kentico Xperience allows authenticated | |
| CVE-2025-11492 | 9.7 | 0.01% | 1 | 0 | 2025-10-16T21:31:20 | In the ConnectWise Automate Agent, communications could be configured to use HTT | |
| CVE-2025-10611 | 9.8 | 0.15% | 2 | 0 | 2025-10-16T15:30:49 | Due to an insufficient access control implementation in multiple WSO2 Products, | |
| CVE-2025-55315 | 9.9 | 0.09% | 17 | 6 | 2025-10-16T14:56:09.263000 | Inconsistent interpretation of http requests ('http request/response smuggling') | |
| CVE-2025-2905 | 9.1 | 0.14% | 2 | 0 | 2025-10-16T12:15:47.167000 | Due to the improper configuration of XML parser, user-supplied XML is parsed wit | |
| CVE-2025-7328 | None | 0.06% | 1 | 0 | 2025-10-14T15:31:33 | Multiple Broken Authentication security issues exist in the affected product. Th | |
| CVE-2025-59685 | 0 | 0.02% | 1 | 0 | 2025-10-02T19:11:46.753000 | Kazaar 1.25.12 allows a JWT with none in the alg field. | |
| CVE-2025-5717 | 6.7 | 0.32% | 2 | 2 | 2025-09-24T18:11:24.520000 | An authenticated remote code execution (RCE) vulnerability exists in multiple WS | |
| CVE-2025-8750 | 2.4 | 0.04% | 1 | 0 | 2025-08-09T09:30:20 | A vulnerability has been found in macrozheng mall up to 1.0.3 and classified as | |
| CVE-2025-47219 | 8.1 | 0.11% | 1 | 0 | 2025-08-08T18:33:23 | In GStreamer through 1.26.1, the isomp4 plugin's qtdemux_parse_trak function may | |
| CVE-2025-34033 | 8.8 | 0.27% | 1 | 0 | 2025-07-09T19:09:18.207000 | An OS command injection vulnerability exists in the Blue Angel Software Suite ru | |
| CVE-2023-4863 | 8.8 | 94.12% | 1 | 10 | 2025-07-09T15:52:20 | Heap buffer overflow in libwebp allow a remote attacker to perform an out of bou | |
| CVE-2025-20307 | 4.8 | 0.04% | 1 | 0 | 2025-07-02T18:30:42 | A vulnerability in the web-based management interface of Cisco BroadWorks Applic | |
| CVE-2025-2777 | 9.3 | 6.59% | 1 | 1 | template | 2025-05-07T15:31:49 | SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML Exte |
| CVE-2025-2778 | 0 | 0.00% | 1 | 1 | 2025-05-07T15:15:57.813000 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering | |
| CVE-2024-26700 | 5.5 | 0.01% | 1 | 0 | 2025-01-07T21:31:57 | In the Linux kernel, the following vulnerability has been resolved: drm/amd/dis | |
| CVE-2023-4617 | 10.0 | 0.54% | 1 | 0 | 2024-12-19T12:32:50 | Incorrect authorization vulnerability in HTTP POST method in Govee Home applicat | |
| CVE-2022-45460 | 9.8 | 54.02% | 1 | 1 | 2023-04-15T05:07:07 | Multiple Xiongmai NVR devices, including MBD6304T V4.02.R11.00000117.10001.13190 | |
| CVE-2025-52665 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2025-62516 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-12036 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2025-62525 | 0 | 0.02% | 1 | 0 | N/A | ||
| CVE-2025-62526 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2025-60722 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-11002 | 0 | 0.00% | 1 | 1 | N/A | ||
| CVE-2025-11001 | 0 | 0.00% | 1 | 2 | N/A |
updated 2025-10-28T12:44:03.240000
35 posts
10 repos
https://github.com/tecxx/CVE-2025-59287-WSUS
https://github.com/keeganparr1/CVE-2025-59287-hawktrace
https://github.com/RadzaRr/WSUSResponder
https://github.com/mubix/Find-WSUS
https://github.com/0xBruno/WSUSploit.NET
https://github.com/Lupovis/Honeypot-for-CVE-2025-59287-WSUS
https://github.com/jiansiting/CVE-2025-59287
https://github.com/mrk336/Breaking-the-Update-Chain-Inside-CVE-2025-59287-and-the-WSUS-RCE-Threat
https://github.com/garvitv14/CVE-2025-59287
https://github.com/AdityaBhatt3010/CVE-2025-59287-When-your-patch-server-becomes-the-attack-vector
Windows WSUS Vulnerability Under Active Exploitation: Critical Patch Urged Worldwide
A New Digital Threat in Motion A new critical vulnerability in Microsoft’s Windows Server Update Services (WSUS) has thrown cybersecurity teams into emergency mode. The flaw, officially tracked as CVE-2025-59287, allows remote attackers to execute arbitrary code on vulnerable systems—without any authentication or user interaction. Microsoft responded swiftly with an out-of-band patch,…
##⚪ Microsoft releases emergency patch for Windows Server Update Services (WSUS)
🗨️ Microsoft has released out-of-band patches for a critical vulnerability in Windows Server Update Services (WSUS), for which a public proof-of-concept exploit is already available. The issue is tracked as CVE-2025-59287 and allows remote code execution on vulnerable servers.
##Dans son dernier bulletin d'actualité, le CERT-FR revient sur certaines vulnérabilités significatives de la semaine dernière et insiste sur l'application des correctifs pour la vulnérabilité CVE-2025-59287 affectant Microsoft WSUS.
https://www.cert.ssi.gouv.fr/actualite/CERTFR-2025-ACT-046/
Patchez WSUS – CVE-2025-59287 : cette nouvelle faille critique est déjà exploitée ! https://www.it-connect.fr/patchez-wsus-cve-2025-59287-cette-nouvelle-faille-critique-est-deja-exploitee/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #WindowsServer #Microsoft #WSUS
##Microsoft Releases Out-of-Band Security Update to Mitigate Windows Server Update Service Vulnerability, CVE-2025-59287 | CISA https://www.cisa.gov/news-events/alerts/2025/10/24/microsoft-releases-out-band-security-update-mitigate-windows-server-update-service-vulnerability-cve
##CVE-2025-59287 WSUS Remote Code Execution https://hawktrace.com/blog/CVE-2025-59287
##@scottley Right, that's what the warning in the above links to. So my thing is, how unique to current Windows services is CVE-2025-59287's root cause?
##Shout-out to the original Hawktrace writeup (with PoC): https://hawktrace.com/blog/CVE-2025-59287
##So about the WSUS vuln.
Looking at the stack trace in this writeup: is the structure of Microsoft.UpdateServices.Internal.SoapUtilities.DeserializeObject unique to WSUS? Or could other DeserializeObject functions in MS web services have a similar issue?
https://research.eye.security/wsus-deserialization-exploit-in-the-wild-cve-2025-59287/
##Exploitation of Windows Server Update Services Remote Code Execution Vulnerability (CVE-2025-59287) | Huntress https://www.huntress.com/blog/exploitation-of-windows-server-update-services-remote-code-execution-vulnerability
##Python exploit for CVE-2025-59287 from HawkTrace https://gist.github.com/hawktrace/76b3ea4275a5e2191e6582bdc5a0dc8b
##Windows Serverの脆弱性(CVE-2025-59287)、マイクロソフトが修正パッチを再配布。攻撃活発化でCISAも警告 https://www.yayafa.com/2596434/ #autonews #HeadlineNews #SCIENCE #Science&Technology #Technology #サイバーセキュリティニュース #テクノロジー #科学 #科学&テクノロジー
##Voilà… 💥 dangerosité de cette vulnérabilité confirmée par @GossiTheDog
👇
https://cyberplace.social/@GossiTheDog/115430147992307420
Il soulève aussi la possibilité d’une attaque par envoi de mise à jour malveillante post-programmée.
...et effectivement des instances WSUS sont visibles sur Internet
⚠️ Exploitation active signalée par Huntress :
"Exploitation of Windows Server Update Services Remote Code Execution Vulnerability (CVE-2025-59287)"
👇
https://www.huntress.com/blog/exploitation-of-windows-server-update-services-remote-code-execution-vulnerability
📢 Exploitation active d’une vulnérabilité RCE dans WSUS (CVE-2025-59287)
📝 Source: Huntress — Le billet détaille l’exploitation active de la vulnérabilité **CVE-2025-59287** dans **Windows Serve...
📖 cyberveille : https://cyberveille.ch/posts/2025-10-25-exploitation-active-dune-vulnerabilite-rce-dans-wsus-cve-2025-59287/
🌐 source : https://www.huntress.com/blog/exploitation-of-windows-server-update-services-remote-code-execution-vulnerability
#CVE_2025_59287 #IOC #Cyberveille
Microsoft Releases Out-of-Band Security Update to Mitigate Windows Server Update Service Vulnerability, CVE-2025-59287 https://www.cisa.gov/news-events/alerts/2025/10/24/microsoft-releases-out-band-security-update-mitigate-windows-server-update-service-vulnerability-cve
##Microsoft Releases Out-of-Band Security Update to Mitigate Windows Server Update Service Vulnerability, CVE-2025-59287
##Microsoft Releases Out-of-Band Security Update to Mitigate Windows Server Update Service Vulnerability, CVE-2025-59287 https://www.cisa.gov/news-events/alerts/2025/10/24/microsoft-releases-out-band-security-update-mitigate-windows-server-update-service-vulnerability-cve
##Exploitation of Windows Server Update Services Remote Code Execution Vulnerability (CVE-2025-59287) https://www.huntress.com/blog/exploitation-of-windows-server-update-services-remote-code-execution-vulnerability
##Alerta máximo: Hackers já estão a explorar ativamente falha crítica no Windows Server (CVE-2025-59287)
🔗 https://tugatech.com.pt/t73369-alerta-maximo-hackers-ja-estao-a-explorar-ativamente-falha-critica-no-windows-server-cve-2025-59287
#ataque #cve #exploit #hackers #internet #microsoft #segurança #servidor #servidores #ti #vulnerabilidade #windows
##Microsoft releases emergency patches for actively exploited critical WSUS Deserialization flaw
Microsoft released emergency patches for CVE-2025-59287, a critical remote code execution vulnerability in Windows Server Update Services that has been actively exploited in the wild since October 24, 2025. The flaw was originally patched in October 2025 update, but the original patch proved insufficient. The flaw is potentially wormable across enterprise networks and affects all Windows Server versions with the WSUS Server Role enabled.
**If you have Windows servers with WSUS enabled, prioritize patching with the Microsoft's October 23, 2025 out-of-band security update for CVE-2025-59287 and reboot - this vulnerability is actively exploited in the wild. Even if you already installed October's regular patches, you must apply this emergency update since the initial fix was incomplete.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/microsoft-releases-emergency-patches-for-actively-exploited-critical-wsus-deserialization-flaw-6-z-d-p-u/gD2P6Ple2L
CVE ID: CVE-2025-59287
Vendor: Microsoft
Product: Windows
Date Added: 2025-10-24
Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287 ; https://nvd.nist.gov/vuln/detail/CVE-2025-59287
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-59287
CIA has updated the KEV catalogue.
CVE-2025-59287: Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-59287
CVE-2025-54236: Adobe Commerce and Magento Improper Input Validation Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-54236 #CISA #Microsoft #Windows #Adobe #cybersecurity #infosec
##Microsoft has patched this.
New.
Huntress: Exploitation of Windows Server Update Services Remote Code Execution Vulnerability (CVE-2025-59287) https://www.huntress.com/blog/exploitation-of-windows-server-update-services-remote-code-execution-vulnerability @huntress #Microsoft #Windows #cybersecurity #infosec
##🚨CVE-2025-59287 PoC: https://gist.github.com/hawktrace/76b3ea4275a5e2191e6582bdc5a0dc8b
Blog: https://hawktrace.com/blog/CVE-2025-59287-UNAUTH
Microsoft: https://learn.microsoft.com/en-us/windows/release-health/windows-message-center#3668
Windows Server 2025 (KB5070881)
Windows Server, version 23H2 (KB5070879)
Windows Server 2022 (KB5070884)
Windows Server 2019 (KB5070883)
Windows Server 2016 (KB5070882)
Windows Server 2012 R2 (KB5070886)
Windows Server 2012 (KB5070887)
Not sure if anybody else has played with CVE-2025-59287 (out of band update for WSUS) but I just had a play in a lab - after getting RCE on the WSUS server, I was able to tamper with the updates offered to the clients and push out malicious updates to said clients.
I don't want to detail too much to prevent ransomware groups going nuts, but you can lift prior research and adapt it easily to add fake updates for clients.
So you might want to patch that.
##🚨CVE-2025-59287: Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.
CVSS: 9.8
Microsoft releases out-of-band (OOB) urgent fix for actively exploited WSUS vulnerability: https://www.helpnetsecurity.com/2025/10/24/wsus-vulnerability-cve-2025-59287-exploited/
##Microsoft Issues Emergency Patch for Actively Exploited Windows Server Flaw CVE-2025-59287
#Microsoft #Cybersecurity #WindowsServer #WSUS #PatchTuesday #InfoSec #CVE #Vulnerability #Security #PatchNow #RCE #SysAdmin #ITPros #ZeroDay #Exploit
##oh
oh yikes
low-complexity 9.8 sev RCE on Windows Server Update Service, with vulnerability going back to at least 2012, and a PoC already out.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287
##New.
Microsoft: Windows Server Update Service (WSUS) Remote Code Execution Vulnerability CVE-2025-59287 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287
"You didn't have plans, did you?"
The Register: Microsoft drops surprise Windows Server patch before weekend downtime https://www.theregister.com/2025/10/24/windows_server_patch/ @theregister #Microsoft #Windows
##The update addresses CVE-2025-59287">CVE-2025-59287, a remote code execution flaw affecting Windows Server versions 2012 through 2025. https://www.theregister.com/2025/10/24/windows_server_patch/
##Microsoft releases urgent fix for actively exploited WSUS vulnerability (CVE-2025-59287) https://www.helpnetsecurity.com/2025/10/24/wsus-vulnerability-cve-2025-59287-exploited/ #securityupdate #vulnerability #WindowsServer #enterprise #Don'tmiss #Hawktrace #Microsoft #Hotstuff #NCSC-NL #News #SMBs #BSI
##Microsoft Issues Emergency Patch for Critical WSUS Remote Code Execution Flaw (CVE-2025-59287) https://thecyberexpress.com/microsoft-fixes-cve-2025-59287/ #WindowsServerUpdateServices #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202559287 #CyberNews #WSUS #RCE
##Microsoft has released an out-of-band security update that “comprehensively” addresses CVE-2025-59287, a remote code execution vulnerability in the Windows Server Update Services (WSUS) that is reportedly being exploited in the wild.
https://www.helpnetsecurity.com/2025/10/24/wsus-vulnerability-cve-2025-59287-exploited/
##Pour la série: vendredi patch urgent & rush en prod 😅
Microsoft a publié une mise à jour hors-cycle corrigeant une RCE critique (CVE-2025-59287) dans Windows Server Update Services (WSUS pour les intimes).
« Si vous n’avez pas encore installé la mise à jour de sécurité Windows d’octobre 2025, nous vous recommandons d’appliquer cette mise à jour OOB à la place. Après l’installation, vous devrez redémarrer votre système. »
Une démonstration d’exploitation / PoC public est disponible : https://hawktrace.com/blog/CVE-2025-59287
La possibilité du "wormable" évoqué, fait monter la pression par les temps qui courent…
Actions recommandées :
⬇️
🔗 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287
Si vous ne pouvez pas patcher immédiatement : désactiver le rôle WSUS ou bloquer les ports 8530 et 8531 au niveau du pare-feu hôte en attendant
Gravité : CVSS élevé (~9.8)
👇
https://vulnerability.circl.lu/vuln/CVE-2025-59287
updated 2025-10-28T08:15:32.917000
1 posts
⚠️ CVE-2025-10151 (HIGH): Softing smartLink HW-PN (1.02–1.03) & HW-DP (1.31) vulnerable to improper locking—risks memory/resource leaks and data exposure in OT networks. Segment, restrict access, and patch ASAP! https://radar.offseq.com/threat/cve-2025-10151-cwe-667-improper-locking-in-softing-fdebb895 #OffSeq #ICS #Vuln
##updated 2025-10-28T06:31:11
1 posts
⚠️ CVE-2025-11735: HIGH severity blind SQL Injection in HUSKY – Products Filter Professional for WooCommerce (all versions). Unauthenticated attackers can exfiltrate sensitive DB info. Apply mitigations, monitor logs, and patch ASAP. https://radar.offseq.com/threat/cve-2025-11735-cwe-89-improper-neutralization-of-s-6dba87c5 #OffSeq #WordPress #WooCommerce #SQLi
##updated 2025-10-28T02:16:41.547000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-28T02:10:25.910000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-28T02:07:59.857000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-28T01:00:01.903000
14 posts
2 repos
Account takeover exploit write-up for Magento SessionReaper https://pentesttools.com/blog/sessionreaper-cve-2025-54236-exploit
##CVE ID: CVE-2025-54236
Vendor: Adobe
Product: Commerce and Magento
Date Added: 2025-10-24
Notes: https://experienceleague.adobe.com/en/docs/experience-cloud-kcs/kbarticles/ka-27397 ; https://nvd.nist.gov/vuln/detail/CVE-2025-54236
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-54236
CIA has updated the KEV catalogue.
CVE-2025-59287: Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-59287
CVE-2025-54236: Adobe Commerce and Magento Improper Input Validation Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-54236 #CISA #Microsoft #Windows #Adobe #cybersecurity #infosec
##The vulnerability in question is CVE-2025-54236 (CVSS score: 9.1), a critical improper input validation flaw that could be abused to take over customer accounts in Adobe Commerce through the Commerce REST API. https://thehackernews.com/2025/10/over-250-magento-stores-hit-overnight.html
##Critical Adobe Commerce, Magento vulnerability under attack (CVE-2025-54236) – Help Net Security https://www.macken.xyz/2025/10/critical-adobe-commerce-magento-vulnerability-under-attack-cve-2025-54236-help-net-security/?utm_source=dlvr.it&utm_medium=mastodon
##Looks like this has been happening over the past 24 hours, relating to critical Adobe vulnerability, CVE-2025-54236.
Sansec: SessionReaper attacks have started, 3 in 5 stores still vulnerable https://sansec.io/research/sessionreaper-exploitation
More:
The Hacker News: Over 250 Magento Stores Hit Overnight as Attackers Exploit New Adobe Commerce Flaw https://thehackernews.com/2025/10/over-250-magento-stores-hit-overnight.html @thehackernews #Adobe #cybersecurity #infosec
##🏴☠️ We built a #SessionReaper (CVE-2025-54236) exploit against Magento 2 & Adobe Commerce and documented the *full* hunt 🔦 — from repo diffs and endpoint discovery to a lab-tested PoC and Sniper automation.
If you research or defend e-commerce apps, this one’s practical: reproducible steps, debug tips, and what to look for on your instances.
Read the full breakdown and PoC by Matei "Mal" Badanoiu (aka CVE Jesus) & David Bors! 👉 https://pentest-tools.com/blog/sessionreaper-cve-2025-54236-exploit
##Critical Adobe Commerce, Magento vulnerability under attack (CVE-2025-54236) https://www.helpnetsecurity.com/2025/10/23/adobe-magento-cve-2025-54236-attack/ #SearchlightCyber #vulnerability #e-commerce #Don'tmiss #Assetnote #Hotstuff #Magento #Sansec #Adobe #News
##SessionReaper flaw in Adobe Magento actively exploited
Cybercriminals are actively exploiting CVE-2025-54236, dubbed "SessionReaper," a critical improper input validation vulnerability in Adobe Commerce/Magento that enables attackers to hijack customer account sessions through the Commerce REST API. The security firm Sansec blocking over 250 exploitation attempts in a single day. Despite Adobe releasing patches on September 8, 2025, 62% of Magento stores are not patched.
**If you are using Adobe Commerce/Magento this advisory is URGENT AND IMPORTANT - Patch your Commerce/Magento IMMEDIATELY. Because your e-commerce platform is being hacked.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/sessionreaper-flaw-in-adobe-magento-actively-exploited-6-g-k-n-n/gD2P6Ple2L
La faille SessionReaper d’Adobe Commerce (Magento) est exploitée : 3 sites web sur 5 vulnérables ! https://www.it-connect.fr/adobe-commerce-magento-cve-2025-54236-exploitation/ #ActuCybersécurité #Cybersécurité
##⚠️ "Six semaines après le correctif d’urgence d’Adobe pour #SessionReaper (CVE-2025-54236), la vulnérabilité est entrée dans une phase d’exploitation active."
➡️ Selon Sansec Seuls 38 % des sites #Magento sont à jour — 3 sur 5 restent vulnérables à une exécution de code à distance
Détails techniques et timeline complète sur le blog de Sansec.
👇
https://sansec.io/research/sessionreaper-exploitation
Article FR
👇
https://infosec.pub/post/36573308
Analyse technique / dff du patch
👇
https://slcyber.io/assetnote-security-research-center/why-nested-deserialization-is-still-harmful-magento-rce-cve-2025-54236/
Détails (G)CVE
👇
https://cve.circl.lu/vuln/CVE-2025-54236
🔥 SessionReaper (CVE-2025-54236) exploited in wild! 250+ Magento stores hit via Adobe Commerce REST API flaw—unauth RCE, webshells, account takeover. 62% still unpatched. Patch ASAP, audit uploads, monitor logs. https://radar.offseq.com/threat/over-250-magento-stores-hit-overnight-as-hackers-e-c68791e2 #OffSeq #Magento #AdobeCommerce #Infosec
##Hackers exploiting critical "SessionReaper" flaw in Adobe Magento
Hackers are actively exploiting the critical SessionReaper vulnerability (CVE-2025-54236) in Adobe Commerce (formerly Magento) platforms, with...
🔗️ [Bleepingcomputer] https://link.is.it/vNASEv
##Why nested deserialization is STILL harmful – Magento RCE (CVE-2025-54236) https://slcyber.io/assetnote-security-research-center/why-nested-deserialization-is-still-harmful-magento-rce-cve-2025-54236/
##updated 2025-10-27T21:31:34
1 posts
updated 2025-10-27T21:30:34
1 posts
updated 2025-10-27T21:30:34
1 posts
updated 2025-10-27T21:30:27
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T21:30:26
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T20:15:53.773000
1 posts
1 repos
https://github.com/aakashtyal/Session-Persistence-After-Enabling-2FA-CVE-2025-60425
LMAO. Whoopsie.
Nagios Fusion v2024R1.2 and v2024R2 does not invalidate already existing session tokens when the two-factor authentication mechanism is enabled, allowing attackers to perform a session hijacking attack.
https://github.com/aakashtyal/Session-Persistence-After-Enabling-2FA-CVE-2025-60425
##updated 2025-10-27T18:50:33.377000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T18:45:58.327000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T18:32:16
1 posts
updated 2025-10-27T18:32:16
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T18:32:15
1 posts
updated 2025-10-27T18:32:15
1 posts
updated 2025-10-27T18:32:15
1 posts
Go hack some Jira shit.
https://www.cve.org/CVERecord?id=CVE-2025-22168
https://www.cve.org/CVERecord?id=CVE-2025-22169
https://www.cve.org/CVERecord?id=CVE-2025-22170
https://www.cve.org/CVERecord?id=CVE-2025-22171
https://www.cve.org/CVERecord?id=CVE-2025-22172
https://www.cve.org/CVERecord?id=CVE-2025-22173
https://www.cve.org/CVERecord?id=CVE-2025-22174
https://www.cve.org/CVERecord?id=CVE-2025-22175
https://www.cve.org/CVERecord?id=CVE-2025-22176
##updated 2025-10-27T18:31:24
1 posts
🔒 CVE-2025-12363 (CRITICAL): Azure Access Tech BLU-IC2/IC4 ≤1.19.5 leaks email passwords (CWE-200). No authentication or patch! Restrict access, enable MFA, audit logs. More: https://radar.offseq.com/threat/cve-2025-12363-cwe-200-exposure-of-sensitive-infor-7417b286 #OffSeq #Azure #Vulnerability #CVE2025 #BlueTeam
##updated 2025-10-27T18:31:20
1 posts
updated 2025-10-27T18:31:19
1 posts
updated 2025-10-27T18:31:13
1 posts
🔒 CVE-2025-12364 (CVSS 10): Azure BLU-IC2/IC4 ≤1.19.5 has CRITICAL weak password policies (CWE-521). No exploit yet—enforce strong passwords & enable MFA. Monitor for updates and review access controls. Learn more: https://radar.offseq.com/threat/cve-2025-12364-cwe-521-weak-password-requirements--0d6651d6 #OffSeq #Azure #Vulnerability #CVE202512364
##updated 2025-10-27T18:31:13
1 posts
updated 2025-10-27T18:31:13
1 posts
updated 2025-10-27T18:31:11
1 posts
updated 2025-10-27T18:00:52.427000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T17:12:42.667000
4 posts
6 repos
https://github.com/SellMeFish/windows-smb-vulnerability-framework-cve-2025-33073
https://github.com/mverschu/CVE-2025-33073
https://github.com/cve-2025-33073/cve-2025-33073
https://github.com/obscura-cert/CVE-2025-33073
Windows – CVE-2025-33073 : la CISA alerte sur une faille SMB activement exploitée ! https://www.it-connect.fr/windows-cve-2025-33073-la-cisa-alerte-sur-une-faille-smb-activement-exploitee/ #ActuCybersécurité #Cybersécurité #Microsoft #Windows
##CISA warns of Windows SMB flaw under active exploitation (CVE-2025-33073) https://www.helpnetsecurity.com/2025/10/21/cisa-warns-of-windows-smb-flaw-under-active-exploitation-cve-2025-33073/ #GuidePointSecurity #WindowsServer #Don'tmiss #Synacktiv #WatchTowr #Hotstuff #Windows #News #CISA #PoC
##The bug, tracked as CVE-2025-33073, was added to CISA's Known Exploited Vulnerabilities (KEV) catalogue on October 20, confirming that real-world attackers are using the vulnerability in ongoing campaigns. https://www.theregister.com/2025/10/21/cisa_windows_smb_bug/
##CISA Warns of Active Exploitation of Critical Windows SMB Flaw CVE-2025-33073 https://thecyberexpress.com/windows-smb-flaw-cve-2025-33073-alert/ #TheCyberExpressNews #ServerMessageBlock #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202533073 #CyberNews #Windows #CISA #SMB
##updated 2025-10-27T17:12:37.767000
1 posts
2 repos
updated 2025-10-27T16:58:51.230000
1 posts
2 repos
https://github.com/mrk336/From-EternalBlue-to-CVE-2025-2776-The-Evolution-of-an-SMB-Attack
https://github.com/watchtowrlabs/watchTowr-vs-SysAid-PreAuth-RCE-Chain
🚨PoC for SysAid PreAuth RCE Chain (CVE-2025-2775, CVE-2025-2776, CVE-2025-2777, CVE-2025-2778)
GitHub: https://github.com/watchtowrlabs/watchTowr-vs-SysAid-PreAuth-RCE-Chain
Write-up: https://labs.watchtowr.com/sysowned-your-friendly-rce-support-ticket/
##updated 2025-10-27T15:30:49
1 posts
"How is this even still a thing in a project the size of Docker?" asked the crow with like 1000 ../ memes.
https://www.cve.org/CVERecord?id=CVE-2025-9164
##Docker Desktop Installer.exe is vulnerable to DLL hijacking due to insecure DLL search order. The installer searches for required DLLs in the user's Downloads folder before checking system directories, allowing local privilege escalation through malicious DLL placement.
This issue affects Docker Desktop: through 4.48.0.
updated 2025-10-27T15:30:41
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T15:15:37.653000
1 posts
updated 2025-10-27T15:13:04
7 posts
1 repos
🚨TARmageddon: High Profile Security Vulnerability In Popular Rust Library
CVE: CVE-2025-62518
CVSS: 8.1
GitHub: https://github.com/edera-dev/cve-tarmageddon
Write-up: https://edera.dev/stories/tarmageddon
##⚠️ TARmageddon flaw in abandoned Rust library enables RCE attacks
「 Tracked as CVE-2025-62518, this logic flaw results from a desynchronization issue that allows unauthenticated attackers to inject additional archive entries during TAR file extraction 」
##TARMAGEDDON (CVE-2025-62518): RCE Vulnerability Highlights the challenges of open source abandonware https://edera.dev/stories/tarmageddon
##RCE Vulnerability (CVE-2025-62518) Discovered in Popular Rust Library async-tar and Its Forks https://thecyberexpress.com/cve%E2%80%912025%E2%80%9162518-rce-flaw-in-async-tar/ #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #CVE‑2025‑62518 #FirewallDaily #Rustlibrary #CyberNews #tokio #RCE
##TARmageddon (CVE-2025-62518) highlights the challenges of open source abandonware https://lobste.rs/s/tbmns8 #rust #security
https://edera.dev/stories/tarmageddon
TARmageddon Strikes: High Profile Security Vulnerability In Popular Rust Library
Going public today is CVE-2025-62518, or better known by the name given by the security researchers involved: TARmageddon. The TARmageddon vulnerability affects the popular async-tar Rust library and its various forks like tokio-tar. In turn TARmageddon impacts the uv Python package manager and other users of this library...
https://www.phoronix.com/news/Rust-TARmageddon
updated 2025-10-27T13:20:33.350000
1 posts
updated 2025-10-27T13:20:33.350000
1 posts
I don't know what Nebula is but you would think Slack could handle IP network definitions properly by now.
##updated 2025-10-27T13:20:33.350000
1 posts
Hey kids, definitely don't go messing around with your Moodle classes.
https://www.cve.org/CVERecord?id=CVE-2025-62393
https://www.cve.org/CVERecord?id=CVE-2025-62394
https://www.cve.org/CVERecord?id=CVE-2025-62395
https://www.cve.org/CVERecord?id=CVE-2025-62396
https://www.cve.org/CVERecord?id=CVE-2025-62397
https://www.cve.org/CVERecord?id=CVE-2025-62398
https://www.cve.org/CVERecord?id=CVE-2025-62399
##updated 2025-10-27T13:20:33.350000
1 posts
Hey kids, definitely don't go messing around with your Moodle classes.
https://www.cve.org/CVERecord?id=CVE-2025-62393
https://www.cve.org/CVERecord?id=CVE-2025-62394
https://www.cve.org/CVERecord?id=CVE-2025-62395
https://www.cve.org/CVERecord?id=CVE-2025-62396
https://www.cve.org/CVERecord?id=CVE-2025-62397
https://www.cve.org/CVERecord?id=CVE-2025-62398
https://www.cve.org/CVERecord?id=CVE-2025-62399
##updated 2025-10-27T13:20:33.350000
1 posts
Hey kids, definitely don't go messing around with your Moodle classes.
https://www.cve.org/CVERecord?id=CVE-2025-62393
https://www.cve.org/CVERecord?id=CVE-2025-62394
https://www.cve.org/CVERecord?id=CVE-2025-62395
https://www.cve.org/CVERecord?id=CVE-2025-62396
https://www.cve.org/CVERecord?id=CVE-2025-62397
https://www.cve.org/CVERecord?id=CVE-2025-62398
https://www.cve.org/CVERecord?id=CVE-2025-62399
##updated 2025-10-27T13:20:33.350000
1 posts
Hey kids, definitely don't go messing around with your Moodle classes.
https://www.cve.org/CVERecord?id=CVE-2025-62393
https://www.cve.org/CVERecord?id=CVE-2025-62394
https://www.cve.org/CVERecord?id=CVE-2025-62395
https://www.cve.org/CVERecord?id=CVE-2025-62396
https://www.cve.org/CVERecord?id=CVE-2025-62397
https://www.cve.org/CVERecord?id=CVE-2025-62398
https://www.cve.org/CVERecord?id=CVE-2025-62399
##updated 2025-10-27T13:20:15.637000
2 posts
Multiple Dell Storage Manager vulnerabilities patched, at least one critical
Dell Technologies reports three vulnerabilities in Storage Manager software, at least one critical (CVE-2025-43995) that allow unauthenticated remote attackers to bypass authentication, access sensitive configuration data, and exfiltrate information through XML external entity exploitation.
**If you're using Dell Storage Manager, make sure the management interface is isolated from the internet and accessible only from trusted networks. Then plan a quick upgrade to version 2020 R1.22 or later. Not a panic mode patch, but wise to plan it out, updating storage components can be a longer process.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/multiple-dell-storage-manager-vulnerabilities-patched-at-least-one-critical-c-j-d-9-e/gD2P6Ple2L
Multiple Dell Storage Manager vulnerabilities patched, at least one critical
Dell Technologies reports three vulnerabilities in Storage Manager software, at least one critical (CVE-2025-43995) that allow unauthenticated remote attackers to bypass authentication, access sensitive configuration data, and exfiltrate information through XML external entity exploitation.
**If you're using Dell Storage Manager, make sure the management interface is isolated from the internet and accessible only from trusted networks. Then plan a quick upgrade to version 2020 R1.22 or later. Not a panic mode patch, but wise to plan it out, updating storage components can be a longer process.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/multiple-dell-storage-manager-vulnerabilities-patched-at-least-one-critical-c-j-d-9-e/gD2P6Ple2L
updated 2025-10-27T13:20:15.637000
1 posts
1 repos
Azure CVEs. Already fixed, not listed as exploited or publicly disclosed.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59500
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59273
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59503
##updated 2025-10-27T13:20:15.637000
1 posts
Azure CVEs. Already fixed, not listed as exploited or publicly disclosed.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59500
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59273
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59503
##updated 2025-10-27T13:20:15.637000
1 posts
Critical command injection flaw reported in Veeder-Root TLS4B automatic tank gauge system
Veeder-Root is reporting two vulnerabilities in its TLS4B Automatic Tank Gauge System: critical CVE-2025-58428, a command injection flaw in the SOAP interface allowing authenticated attackers to execute system-level commands and gain full shell access, and CVE-2025-55067, an integer overflow vulnerability related to the 2038 Unix epoch rollover that causes authentication failures and system disruption when exploited.
**If you use Veeder-Root TLS4B tank gauge systems, make sure they are isolated from the internet and accessible only from trusted networks. Then plan a patch to version 11.A or newer. The flaw still requires admin login so also work with the administrators for detecting phishing and avoiding malware.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-command-injection-flaw-reported-in-veeder-root-tls4b-automatic-tank-gauge-system-x-1-7-3-i/gD2P6Ple2L
updated 2025-10-27T13:20:15.637000
1 posts
Multiple vulnerabilities reported in AutomationDirect Productivity Suite and PLCs, at least one critical
AutomationDirect is reporting nine security vulnerabilities in its Productivity Suite programming software (version 4.2.1.9 and prior) and Productivity PLC controllers (firmware v4.4.1.19 and prior), including critical CVE-2025-61934 that allows unauthenticated remote attackers to read, write, or delete arbitrary files through the ProductivityService PLC simulator, and CVE-2025-62498 enabling arbitrary code execution via malicious project files.
**If you use AutomationDirect Productivity Suite software or PLCs, plan a quick update to version 4.5.0.x or later. In the meantime make sure they are isolated from the internet and accessible from trusted networks.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/multiple-vulnerabilities-reported-in-automationdirect-productivity-suite-and-plcs-at-least-one-critical-j-q-1-2-j/gD2P6Ple2L
updated 2025-10-27T13:19:49.063000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T13:19:49.063000
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T13:15:44.780000
7 posts
#DNS #sysAdmin
Petit rappel que si vous utilisez #BIND comme résolveur (alors qu'il existe d'autres choix), METTEZ À JOUR : il y a encore une faille on-va-tous-mourir https://kb.isc.org/docs/cve-2025-40778
#DNS #sysAdmin
Petit rappel que si vous utilisez #BIND comme résolveur (alors qu'il existe d'autres choix), METTEZ À JOUR : il y a encore une faille on-va-tous-mourir https://kb.isc.org/docs/cve-2025-40778
New BIND 9 Security Flaw (CVE-2025-40778) Threatens Global DNS Infrastructure https://thecyberexpress.com/cve-2025-40778-flaw-exposes-706k-servers/ #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #Cachepoisoning #FirewallDaily #CVE202540778 #CyberNews #BIND9DNS
##Running a #DNS server, depending on your setup, now might a good time to update.
CVE-2025-40778 and CVE-2025-40780
##🚨 The developers behind BIND, the Internet’s most widely used domain name resolution software, have issued a warning about two serious vulnerabilities that could let attackers poison entire DNS caches, redirecting users to malicious sites that appear completely legitimate.
CVE: CVE-2025-40778 and CVE-2025-40780
CVSS: Both 8.6
##Hmm, this BIND Cache poisoning attacks with unsolicited RRs (CVE-2025-40778) is light on details.
"Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache."
Anybody done the source spelunking to sort out the circumstances?
##Cache poisoning:
https://kb.isc.org/docs/cve-2025-40778
https://kb.isc.org/docs/cve-2025-40780
And DoS:
https://kb.isc.org/docs/cve-2025-8677
in BIND 9.
##updated 2025-10-27T12:33:03
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T12:32:59
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T12:32:59
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T12:32:59
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T12:32:58
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T12:32:58
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T12:32:53
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T12:32:52
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T12:32:52
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T12:32:52
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T09:30:28
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-27T09:30:27
1 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-12232
https://www.cve.org/CVERecord?id=CVE-2025-12233
https://www.cve.org/CVERecord?id=CVE-2025-12234
https://www.cve.org/CVERecord?id=CVE-2025-12235
https://www.cve.org/CVERecord?id=CVE-2025-12236
https://www.cve.org/CVERecord?id=CVE-2025-12265
https://www.cve.org/CVERecord?id=CVE-2025-12271
https://www.cve.org/CVERecord?id=CVE-2025-12272
https://www.cve.org/CVERecord?id=CVE-2025-12273
https://www.cve.org/CVERecord?id=CVE-2025-12274
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-12239
https://www.cve.org/CVERecord?id=CVE-2025-12240
https://www.cve.org/CVERecord?id=CVE-2025-12241
https://www.cve.org/CVERecord?id=CVE-2025-12258
https://www.cve.org/CVERecord?id=CVE-2025-12259
https://www.cve.org/CVERecord?id=CVE-2025-12260
SICK
https://www.cve.org/CVERecord?id=CVE-2025-10561
https://www.cve.org/CVERecord?id=CVE-2025-59459
https://www.cve.org/CVERecord?id=CVE-2025-59460
https://www.cve.org/CVERecord?id=CVE-2025-59461
https://www.cve.org/CVERecord?id=CVE-2025-59462
https://www.cve.org/CVERecord?id=CVE-2025-59463
ZTE
https://www.cve.org/CVERecord?id=CVE-2025-46582
##updated 2025-10-24T20:59:28
1 posts
Hey kids, definitely don't go messing around with your Moodle classes.
https://www.cve.org/CVERecord?id=CVE-2025-62393
https://www.cve.org/CVERecord?id=CVE-2025-62394
https://www.cve.org/CVERecord?id=CVE-2025-62395
https://www.cve.org/CVERecord?id=CVE-2025-62396
https://www.cve.org/CVERecord?id=CVE-2025-62397
https://www.cve.org/CVERecord?id=CVE-2025-62398
https://www.cve.org/CVERecord?id=CVE-2025-62399
##updated 2025-10-24T20:59:23
1 posts
Hey kids, definitely don't go messing around with your Moodle classes.
https://www.cve.org/CVERecord?id=CVE-2025-62393
https://www.cve.org/CVERecord?id=CVE-2025-62394
https://www.cve.org/CVERecord?id=CVE-2025-62395
https://www.cve.org/CVERecord?id=CVE-2025-62396
https://www.cve.org/CVERecord?id=CVE-2025-62397
https://www.cve.org/CVERecord?id=CVE-2025-62398
https://www.cve.org/CVERecord?id=CVE-2025-62399
##updated 2025-10-24T20:58:54
1 posts
Hey kids, definitely don't go messing around with your Moodle classes.
https://www.cve.org/CVERecord?id=CVE-2025-62393
https://www.cve.org/CVERecord?id=CVE-2025-62394
https://www.cve.org/CVERecord?id=CVE-2025-62395
https://www.cve.org/CVERecord?id=CVE-2025-62396
https://www.cve.org/CVERecord?id=CVE-2025-62397
https://www.cve.org/CVERecord?id=CVE-2025-62398
https://www.cve.org/CVERecord?id=CVE-2025-62399
##updated 2025-10-24T20:58:13
1 posts
Hey kids, definitely don't go messing around with your Moodle classes.
https://www.cve.org/CVERecord?id=CVE-2025-62393
https://www.cve.org/CVERecord?id=CVE-2025-62394
https://www.cve.org/CVERecord?id=CVE-2025-62395
https://www.cve.org/CVERecord?id=CVE-2025-62396
https://www.cve.org/CVERecord?id=CVE-2025-62397
https://www.cve.org/CVERecord?id=CVE-2025-62398
https://www.cve.org/CVERecord?id=CVE-2025-62399
##updated 2025-10-24T19:28:26
6 posts
1 repos
MinIO declines to release Docker builds resolving CVE-2025-62506
Link: https://github.com/minio/minio/issues/21647
Discussion: https://news.ycombinator.com/item?id=45684035
MinIO declines to release Docker builds resolving CVE-2025-62506
Link: https://github.com/minio/minio/issues/21647
Comments: https://news.ycombinator.com/item?id=45684035
MinIO declines to release Docker builds resolving CVE-2025-62506
Link: https://github.com/minio/minio/issues/21647
Discussion: https://news.ycombinator.com/item?id=45684035
MinIO declines to release Docker builds resolving CVE-2025-62506
https://github.com/minio/minio/issues/21647
#ycombinator
MinIO declines to release Docker builds resolving CVE-2025-62506
https://github.com/minio/minio/issues/21647
#HackerNews #MinIO #Docker #CVE-2025-62506 #security #vulnerability #open-source
##MinIO declines to release Docker builds resolving CVE-2025-62506
##updated 2025-10-24T18:30:58
1 posts
updated 2025-10-24T17:15:43.390000
2 posts
Critical command injection vulnerabilities in TP-Link Omada Gateways enable remote code execution
TP-Link has disclosed multiple critical vulnerabilities in its Omada gateway product line, including CVE-2025-6542, an unauthenticated remote command injection flaw that allows attackers to execute arbitrary OS commands without credentials, and three additional command injection and privilege escalation vulnerabilities (CVE-2025-6541, CVE-2025-8750, and CVE-2025-7851) affecting 13 different Omada gateway models.
**If you're using TP-Link Omada gateways, update to the latest firmware ASAP. There is at least one critical flaw that can be exploited remotely without authentication. Prioritize patching internet-facing gateways first. Isolating doesn't really work for a device that's designed to be a gateway to other networks.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-command-injection-vulnerabilities-in-tp-link-omada-gateways-enable-remote-code-execution-z-f-2-7-o/gD2P6Ple2L
TP-Link
https://www.cve.org/CVERecord?id=CVE-2025-7851
https://www.cve.org/CVERecord?id=CVE-2025-7850
https://www.cve.org/CVERecord?id=CVE-2025-6542
##updated 2025-10-24T15:32:26
1 posts
Go hack some Jira shit.
https://www.cve.org/CVERecord?id=CVE-2025-22168
https://www.cve.org/CVERecord?id=CVE-2025-22169
https://www.cve.org/CVERecord?id=CVE-2025-22170
https://www.cve.org/CVERecord?id=CVE-2025-22171
https://www.cve.org/CVERecord?id=CVE-2025-22172
https://www.cve.org/CVERecord?id=CVE-2025-22173
https://www.cve.org/CVERecord?id=CVE-2025-22174
https://www.cve.org/CVERecord?id=CVE-2025-22175
https://www.cve.org/CVERecord?id=CVE-2025-22176
##updated 2025-10-24T15:32:26
1 posts
Go hack some Jira shit.
https://www.cve.org/CVERecord?id=CVE-2025-22168
https://www.cve.org/CVERecord?id=CVE-2025-22169
https://www.cve.org/CVERecord?id=CVE-2025-22170
https://www.cve.org/CVERecord?id=CVE-2025-22171
https://www.cve.org/CVERecord?id=CVE-2025-22172
https://www.cve.org/CVERecord?id=CVE-2025-22173
https://www.cve.org/CVERecord?id=CVE-2025-22174
https://www.cve.org/CVERecord?id=CVE-2025-22175
https://www.cve.org/CVERecord?id=CVE-2025-22176
##updated 2025-10-24T15:32:26
1 posts
Go hack some Jira shit.
https://www.cve.org/CVERecord?id=CVE-2025-22168
https://www.cve.org/CVERecord?id=CVE-2025-22169
https://www.cve.org/CVERecord?id=CVE-2025-22170
https://www.cve.org/CVERecord?id=CVE-2025-22171
https://www.cve.org/CVERecord?id=CVE-2025-22172
https://www.cve.org/CVERecord?id=CVE-2025-22173
https://www.cve.org/CVERecord?id=CVE-2025-22174
https://www.cve.org/CVERecord?id=CVE-2025-22175
https://www.cve.org/CVERecord?id=CVE-2025-22176
##updated 2025-10-24T15:32:26
1 posts
Go hack some Jira shit.
https://www.cve.org/CVERecord?id=CVE-2025-22168
https://www.cve.org/CVERecord?id=CVE-2025-22169
https://www.cve.org/CVERecord?id=CVE-2025-22170
https://www.cve.org/CVERecord?id=CVE-2025-22171
https://www.cve.org/CVERecord?id=CVE-2025-22172
https://www.cve.org/CVERecord?id=CVE-2025-22173
https://www.cve.org/CVERecord?id=CVE-2025-22174
https://www.cve.org/CVERecord?id=CVE-2025-22175
https://www.cve.org/CVERecord?id=CVE-2025-22176
##updated 2025-10-24T15:32:25
1 posts
Go hack some Jira shit.
https://www.cve.org/CVERecord?id=CVE-2025-22168
https://www.cve.org/CVERecord?id=CVE-2025-22169
https://www.cve.org/CVERecord?id=CVE-2025-22170
https://www.cve.org/CVERecord?id=CVE-2025-22171
https://www.cve.org/CVERecord?id=CVE-2025-22172
https://www.cve.org/CVERecord?id=CVE-2025-22173
https://www.cve.org/CVERecord?id=CVE-2025-22174
https://www.cve.org/CVERecord?id=CVE-2025-22175
https://www.cve.org/CVERecord?id=CVE-2025-22176
##updated 2025-10-24T15:32:25
1 posts
Go hack some Jira shit.
https://www.cve.org/CVERecord?id=CVE-2025-22168
https://www.cve.org/CVERecord?id=CVE-2025-22169
https://www.cve.org/CVERecord?id=CVE-2025-22170
https://www.cve.org/CVERecord?id=CVE-2025-22171
https://www.cve.org/CVERecord?id=CVE-2025-22172
https://www.cve.org/CVERecord?id=CVE-2025-22173
https://www.cve.org/CVERecord?id=CVE-2025-22174
https://www.cve.org/CVERecord?id=CVE-2025-22175
https://www.cve.org/CVERecord?id=CVE-2025-22176
##updated 2025-10-24T15:32:25
1 posts
Go hack some Jira shit.
https://www.cve.org/CVERecord?id=CVE-2025-22168
https://www.cve.org/CVERecord?id=CVE-2025-22169
https://www.cve.org/CVERecord?id=CVE-2025-22170
https://www.cve.org/CVERecord?id=CVE-2025-22171
https://www.cve.org/CVERecord?id=CVE-2025-22172
https://www.cve.org/CVERecord?id=CVE-2025-22173
https://www.cve.org/CVERecord?id=CVE-2025-22174
https://www.cve.org/CVERecord?id=CVE-2025-22175
https://www.cve.org/CVERecord?id=CVE-2025-22176
##updated 2025-10-24T15:32:25
2 posts
Critical command injection vulnerabilities in TP-Link Omada Gateways enable remote code execution
TP-Link has disclosed multiple critical vulnerabilities in its Omada gateway product line, including CVE-2025-6542, an unauthenticated remote command injection flaw that allows attackers to execute arbitrary OS commands without credentials, and three additional command injection and privilege escalation vulnerabilities (CVE-2025-6541, CVE-2025-8750, and CVE-2025-7851) affecting 13 different Omada gateway models.
**If you're using TP-Link Omada gateways, update to the latest firmware ASAP. There is at least one critical flaw that can be exploited remotely without authentication. Prioritize patching internet-facing gateways first. Isolating doesn't really work for a device that's designed to be a gateway to other networks.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-command-injection-vulnerabilities-in-tp-link-omada-gateways-enable-remote-code-execution-z-f-2-7-o/gD2P6Ple2L
TP-Link
https://www.cve.org/CVERecord?id=CVE-2025-7851
https://www.cve.org/CVERecord?id=CVE-2025-7850
https://www.cve.org/CVERecord?id=CVE-2025-6542
##updated 2025-10-24T14:24:57.253000
1 posts
Go hack some Jira shit.
https://www.cve.org/CVERecord?id=CVE-2025-22168
https://www.cve.org/CVERecord?id=CVE-2025-22169
https://www.cve.org/CVERecord?id=CVE-2025-22170
https://www.cve.org/CVERecord?id=CVE-2025-22171
https://www.cve.org/CVERecord?id=CVE-2025-22172
https://www.cve.org/CVERecord?id=CVE-2025-22173
https://www.cve.org/CVERecord?id=CVE-2025-22174
https://www.cve.org/CVERecord?id=CVE-2025-22175
https://www.cve.org/CVERecord?id=CVE-2025-22176
##updated 2025-10-24T14:20:53.383000
1 posts
Go hack some Jira shit.
https://www.cve.org/CVERecord?id=CVE-2025-22168
https://www.cve.org/CVERecord?id=CVE-2025-22169
https://www.cve.org/CVERecord?id=CVE-2025-22170
https://www.cve.org/CVERecord?id=CVE-2025-22171
https://www.cve.org/CVERecord?id=CVE-2025-22172
https://www.cve.org/CVERecord?id=CVE-2025-22173
https://www.cve.org/CVERecord?id=CVE-2025-22174
https://www.cve.org/CVERecord?id=CVE-2025-22175
https://www.cve.org/CVERecord?id=CVE-2025-22176
##updated 2025-10-24T14:20:40.950000
1 posts
Go hack some Jira shit.
https://www.cve.org/CVERecord?id=CVE-2025-22168
https://www.cve.org/CVERecord?id=CVE-2025-22169
https://www.cve.org/CVERecord?id=CVE-2025-22170
https://www.cve.org/CVERecord?id=CVE-2025-22171
https://www.cve.org/CVERecord?id=CVE-2025-22172
https://www.cve.org/CVERecord?id=CVE-2025-22173
https://www.cve.org/CVERecord?id=CVE-2025-22174
https://www.cve.org/CVERecord?id=CVE-2025-22175
https://www.cve.org/CVERecord?id=CVE-2025-22176
##updated 2025-10-24T14:06:49.887000
3 posts
3 repos
https://github.com/Leviticus-Triage/ChromSploit-Framework
The vulnerability in question is CVE-2025-2783 (CVSS score: 8.3), a case of sandbox escape which the company disclosed in March 2025 as having come under active exploitation as part of a campaign dubbed Operation ForumTroll targeting organizations in Russia. https://thehackernews.com/2025/10/chrome-zero-day-exploited-to-deliver.html
##The vulnerability in question is CVE-2025-2783 (CVSS score: 8.3), a case of sandbox escape which the company disclosed in March 2025 as having come under active exploitation as part of a campaign dubbed Operation ForumTroll targeting organizations in Russia. https://thehackernews.com/2025/10/chrome-zero-day-exploited-to-deliver.html
##This relates to CVE-2025-2783.
Kaspersky: Mem3nt0 mori – The Hacking Team is back! https://securelist.com/forumtroll-apt-hacking-team-dante-spyware/117851/ @Kaspersky #phishing #Google #Chrome #zeroday
##updated 2025-10-24T13:50:10.897000
3 posts
Critical command injection vulnerabilities in TP-Link Omada Gateways enable remote code execution
TP-Link has disclosed multiple critical vulnerabilities in its Omada gateway product line, including CVE-2025-6542, an unauthenticated remote command injection flaw that allows attackers to execute arbitrary OS commands without credentials, and three additional command injection and privilege escalation vulnerabilities (CVE-2025-6541, CVE-2025-8750, and CVE-2025-7851) affecting 13 different Omada gateway models.
**If you're using TP-Link Omada gateways, update to the latest firmware ASAP. There is at least one critical flaw that can be exploited remotely without authentication. Prioritize patching internet-facing gateways first. Isolating doesn't really work for a device that's designed to be a gateway to other networks.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-command-injection-vulnerabilities-in-tp-link-omada-gateways-enable-remote-code-execution-z-f-2-7-o/gD2P6Ple2L
🚨 TP-Link discloses 4 security flaws in Omada gateways
🔹 Critical pre-auth OS command injection (CVE-2025-6542, CVSS 9.3)
🔹 Three other high-severity flaws allow command execution or root shell access
🔒 Patch now—13 models affected
💬 Impacts SMBs using Omada as firewall/VPN/router
#TechNews #Cybersecurity #Gateway #TPLink #Router #Modem #Infosec #Vulnerability #DataSecurity #Firmware #Networking #Network #IT #Privacy #OpenSource #Linux #Hacking #SysAdmin
##TP-Link
https://www.cve.org/CVERecord?id=CVE-2025-7851
https://www.cve.org/CVERecord?id=CVE-2025-7850
https://www.cve.org/CVERecord?id=CVE-2025-6542
##updated 2025-10-24T13:21:16.710000
1 posts
updated 2025-10-24T13:21:06.800000
1 posts
updated 2025-10-24T13:19:20.730000
1 posts
Hikvision
https://www.cve.org/CVERecord?id=CVE-2023-53691
https://www.cve.org/CVERecord?id=CVE-2024-58274
Sauter
https://www.cve.org/CVERecord?id=CVE-2025-41719
https://www.cve.org/CVERecord?id=CVE-2025-41720
https://www.cve.org/CVERecord?id=CVE-2025-41721
https://www.cve.org/CVERecord?id=CVE-2025-41722
https://www.cve.org/CVERecord?id=CVE-2025-41723
https://www.cve.org/CVERecord?id=CVE-2025-41724
Ghost Robotics
https://www.cve.org/CVERecord?id=CVE-2025-41108
https://www.cve.org/CVERecord?id=CVE-2025-41109
https://www.cve.org/CVERecord?id=CVE-2025-41110
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-60338
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60333
https://www.cve.org/CVERecord?id=CVE-2025-60334
https://www.cve.org/CVERecord?id=CVE-2025-60335
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60331
https://www.cve.org/CVERecord?id=CVE-2025-60332
OpenWRT
https://www.cve.org/CVERecord?id=CVE-2025-62525
https://www.cve.org/CVERecord?id=CVE-2025-62526
##updated 2025-10-24T13:18:55.290000
1 posts
Hikvision
https://www.cve.org/CVERecord?id=CVE-2023-53691
https://www.cve.org/CVERecord?id=CVE-2024-58274
Sauter
https://www.cve.org/CVERecord?id=CVE-2025-41719
https://www.cve.org/CVERecord?id=CVE-2025-41720
https://www.cve.org/CVERecord?id=CVE-2025-41721
https://www.cve.org/CVERecord?id=CVE-2025-41722
https://www.cve.org/CVERecord?id=CVE-2025-41723
https://www.cve.org/CVERecord?id=CVE-2025-41724
Ghost Robotics
https://www.cve.org/CVERecord?id=CVE-2025-41108
https://www.cve.org/CVERecord?id=CVE-2025-41109
https://www.cve.org/CVERecord?id=CVE-2025-41110
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-60338
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60333
https://www.cve.org/CVERecord?id=CVE-2025-60334
https://www.cve.org/CVERecord?id=CVE-2025-60335
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60331
https://www.cve.org/CVERecord?id=CVE-2025-60332
OpenWRT
https://www.cve.org/CVERecord?id=CVE-2025-62525
https://www.cve.org/CVERecord?id=CVE-2025-62526
##updated 2025-10-24T12:58:03.523000
1 posts
sev:CRIT post-auth command injection in ManageEngine ADManager Plus.
https://www.manageengine.com/products/ad-manager/admanager-kb/cve-2025-10020.html
##updated 2025-10-24T00:30:58
1 posts
Azure CVEs. Already fixed, not listed as exploited or publicly disclosed.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59500
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59273
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59503
##updated 2025-10-24T00:30:53
1 posts
Multiple vulnerabilities reported in AutomationDirect Productivity Suite and PLCs, at least one critical
AutomationDirect is reporting nine security vulnerabilities in its Productivity Suite programming software (version 4.2.1.9 and prior) and Productivity PLC controllers (firmware v4.4.1.19 and prior), including critical CVE-2025-61934 that allows unauthenticated remote attackers to read, write, or delete arbitrary files through the ProductivityService PLC simulator, and CVE-2025-62498 enabling arbitrary code execution via malicious project files.
**If you use AutomationDirect Productivity Suite software or PLCs, plan a quick update to version 4.5.0.x or later. In the meantime make sure they are isolated from the internet and accessible from trusted networks.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/multiple-vulnerabilities-reported-in-automationdirect-productivity-suite-and-plcs-at-least-one-critical-j-q-1-2-j/gD2P6Ple2L
updated 2025-10-23T21:31:50
1 posts
Critical command injection flaw reported in Veeder-Root TLS4B automatic tank gauge system
Veeder-Root is reporting two vulnerabilities in its TLS4B Automatic Tank Gauge System: critical CVE-2025-58428, a command injection flaw in the SOAP interface allowing authenticated attackers to execute system-level commands and gain full shell access, and CVE-2025-55067, an integer overflow vulnerability related to the 2038 Unix epoch rollover that causes authentication failures and system disruption when exploited.
**If you use Veeder-Root TLS4B tank gauge systems, make sure they are isolated from the internet and accessible only from trusted networks. Then plan a patch to version 11.A or newer. The flaw still requires admin login so also work with the administrators for detecting phishing and avoiding malware.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-command-injection-flaw-reported-in-veeder-root-tls4b-automatic-tank-gauge-system-x-1-7-3-i/gD2P6Ple2L
updated 2025-10-23T18:32:21
1 posts
updated 2025-10-23T15:31:44
1 posts
Hikvision
https://www.cve.org/CVERecord?id=CVE-2023-53691
https://www.cve.org/CVERecord?id=CVE-2024-58274
Sauter
https://www.cve.org/CVERecord?id=CVE-2025-41719
https://www.cve.org/CVERecord?id=CVE-2025-41720
https://www.cve.org/CVERecord?id=CVE-2025-41721
https://www.cve.org/CVERecord?id=CVE-2025-41722
https://www.cve.org/CVERecord?id=CVE-2025-41723
https://www.cve.org/CVERecord?id=CVE-2025-41724
Ghost Robotics
https://www.cve.org/CVERecord?id=CVE-2025-41108
https://www.cve.org/CVERecord?id=CVE-2025-41109
https://www.cve.org/CVERecord?id=CVE-2025-41110
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-60338
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60333
https://www.cve.org/CVERecord?id=CVE-2025-60334
https://www.cve.org/CVERecord?id=CVE-2025-60335
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60331
https://www.cve.org/CVERecord?id=CVE-2025-60332
OpenWRT
https://www.cve.org/CVERecord?id=CVE-2025-62525
https://www.cve.org/CVERecord?id=CVE-2025-62526
##updated 2025-10-23T15:31:44
1 posts
Hikvision
https://www.cve.org/CVERecord?id=CVE-2023-53691
https://www.cve.org/CVERecord?id=CVE-2024-58274
Sauter
https://www.cve.org/CVERecord?id=CVE-2025-41719
https://www.cve.org/CVERecord?id=CVE-2025-41720
https://www.cve.org/CVERecord?id=CVE-2025-41721
https://www.cve.org/CVERecord?id=CVE-2025-41722
https://www.cve.org/CVERecord?id=CVE-2025-41723
https://www.cve.org/CVERecord?id=CVE-2025-41724
Ghost Robotics
https://www.cve.org/CVERecord?id=CVE-2025-41108
https://www.cve.org/CVERecord?id=CVE-2025-41109
https://www.cve.org/CVERecord?id=CVE-2025-41110
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-60338
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60333
https://www.cve.org/CVERecord?id=CVE-2025-60334
https://www.cve.org/CVERecord?id=CVE-2025-60335
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60331
https://www.cve.org/CVERecord?id=CVE-2025-60332
OpenWRT
https://www.cve.org/CVERecord?id=CVE-2025-62525
https://www.cve.org/CVERecord?id=CVE-2025-62526
##updated 2025-10-23T15:31:43
1 posts
updated 2025-10-23T15:30:46
1 posts
Another perfect 0, this time in Moxa. :apartyblobcat:
https://www.cve.org/CVERecord?id=CVE-2025-1680
An acceptance of extraneous untrusted data with trusted data vulnerability has been identified in Moxa’s Ethernet switches, which allows attackers with administrative privileges to manipulate HTTP Host headers by injecting a specially crafted Host header into HTTP requests sent to an affected device’s web service. This vulnerability is classified as Host Header Injection, where invalid Host headers can manipulate to redirect users, forge links, or phishing attacks. There is no impact to the confidentiality, integrity, and availability of the affected device; no loss of confidentiality, integrity, and availability within any subsequent systems.
sev:NONE 0.0 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
updated 2025-10-23T15:30:46
1 posts
updated 2025-10-23T15:30:45
1 posts
updated 2025-10-23T15:30:35
1 posts
Hikvision
https://www.cve.org/CVERecord?id=CVE-2023-53691
https://www.cve.org/CVERecord?id=CVE-2024-58274
Sauter
https://www.cve.org/CVERecord?id=CVE-2025-41719
https://www.cve.org/CVERecord?id=CVE-2025-41720
https://www.cve.org/CVERecord?id=CVE-2025-41721
https://www.cve.org/CVERecord?id=CVE-2025-41722
https://www.cve.org/CVERecord?id=CVE-2025-41723
https://www.cve.org/CVERecord?id=CVE-2025-41724
Ghost Robotics
https://www.cve.org/CVERecord?id=CVE-2025-41108
https://www.cve.org/CVERecord?id=CVE-2025-41109
https://www.cve.org/CVERecord?id=CVE-2025-41110
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-60338
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60333
https://www.cve.org/CVERecord?id=CVE-2025-60334
https://www.cve.org/CVERecord?id=CVE-2025-60335
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60331
https://www.cve.org/CVERecord?id=CVE-2025-60332
OpenWRT
https://www.cve.org/CVERecord?id=CVE-2025-62525
https://www.cve.org/CVERecord?id=CVE-2025-62526
##updated 2025-10-23T12:32:24
1 posts
updated 2025-10-23T12:32:24
1 posts
Hikvision
https://www.cve.org/CVERecord?id=CVE-2023-53691
https://www.cve.org/CVERecord?id=CVE-2024-58274
Sauter
https://www.cve.org/CVERecord?id=CVE-2025-41719
https://www.cve.org/CVERecord?id=CVE-2025-41720
https://www.cve.org/CVERecord?id=CVE-2025-41721
https://www.cve.org/CVERecord?id=CVE-2025-41722
https://www.cve.org/CVERecord?id=CVE-2025-41723
https://www.cve.org/CVERecord?id=CVE-2025-41724
Ghost Robotics
https://www.cve.org/CVERecord?id=CVE-2025-41108
https://www.cve.org/CVERecord?id=CVE-2025-41109
https://www.cve.org/CVERecord?id=CVE-2025-41110
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-60338
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60333
https://www.cve.org/CVERecord?id=CVE-2025-60334
https://www.cve.org/CVERecord?id=CVE-2025-60335
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60331
https://www.cve.org/CVERecord?id=CVE-2025-60332
OpenWRT
https://www.cve.org/CVERecord?id=CVE-2025-62525
https://www.cve.org/CVERecord?id=CVE-2025-62526
##updated 2025-10-23T12:31:28
1 posts
Hey kids, definitely don't go messing around with your Moodle classes.
https://www.cve.org/CVERecord?id=CVE-2025-62393
https://www.cve.org/CVERecord?id=CVE-2025-62394
https://www.cve.org/CVERecord?id=CVE-2025-62395
https://www.cve.org/CVERecord?id=CVE-2025-62396
https://www.cve.org/CVERecord?id=CVE-2025-62397
https://www.cve.org/CVERecord?id=CVE-2025-62398
https://www.cve.org/CVERecord?id=CVE-2025-62399
##updated 2025-10-23T00:30:34
5 posts
1 repos
CVE-2025-61932 detail, updated today: https://nvd.nist.gov/vuln/detail/CVE-2025-61932
Bleeping Computer: CISA warns of Lanscope Endpoint Manager flaw exploited in attacks https://www.bleepingcomputer.com/news/security/cisa-warns-of-lanscope-endpoint-manager-flaw-exploited-in-attacks/ @BleepingComputer #CISA #cybersecurity #infosec
##Lanscope Endpoint Manager vulnerability exploited in zero-day attacks (CVE-2025-61932) https://www.helpnetsecurity.com/2025/10/23/cve-2025-61932-lanscope-endpoint-manager-exploited/ #endpointmanagement #endpointsecurity #securityupdate #Don'tmiss #JPCERT/CC #Hotstuff #0-day #Japan #Motex #News #CISA
##CVE ID: CVE-2025-61932
Vendor: Motex
Product: LANSCOPE Endpoint Manager
Date Added: 2025-10-22
Notes: https://www.motex.co.jp/news/notice/2025/release251020/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-61932
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-61932
CISA has updated the KEV catalogue.
CVE-2025-61932: Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-61932 #CISA #cybersecurity #infosec
##Critical remote code execution flaw in LANSCOPE Endpoint Manager actively exploited
A critical remote code execution vulnerability, CVE-2025-61932, in LANSCOPE Endpoint Manager's on-premise edition that allows unauthenticated attackers to execute arbitrary commands with high privileges. Exploit attempts are already observed in live customer environments. The flaw affects Client Program (MR) and Detection Agent (DA) versions 9.4.7.1 and earlier.
**If you're using LANSCOPE Endpoint Manager on-premise edition (version 9.4.7.1 or earlier), this is urgent. Start updating all client endpoints to the latest patched version. Attackers are already exploiting the flaw to to gain full system control. Prioritize patching internet-facing systems first.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-remote-code-execution-flaw-in-lanscope-endpoint-manager-actively-exploited-4-r-q-a-q/gD2P6Ple2L
updated 2025-10-22T21:31:33
1 posts
lol. lmao even.
##A container privilege escalation flaw was found in certain AMQ Broker images. This issue stems from the /etc/passwd file being created with group-writable permissions during build time. In certain conditions, an attacker who can execute commands within an affected container, even as a non-root user, can leverage their membership in the root group to modify the /etc/passwd file. This could allow the attacker to add a new user with any arbitrary UID, including UID 0, leading to full root privileges within the container.
updated 2025-10-22T21:15:47.137000
7 posts
Cryptographic Issues in Cloudflare's Circl FourQ Implementation (CVE-2025-8556) https://www.botanica.software/blog/cryptographic-issues-in-cloudflares-circl-fourq-implementation
##Cryptographic Issues in Cloudflare's Circl FourQ Implementation (CVE-2025-8556)
Link: https://www.botanica.software/blog/cryptographic-issues-in-cloudflares-circl-fourq-implementation
Discussion: https://news.ycombinator.com/item?id=45669593
Cryptographic Issues in Cloudflare's Circl FourQ Implementation (CVE-2025-8556)
Link: https://www.botanica.software/blog/cryptographic-issues-in-cloudflares-circl-fourq-implementation
Discussion: https://news.ycombinator.com/item?id=45669593
Cryptographic Issues in Cloudflare's Circl FourQ Implementation (CVE-2025-8556)
Link: https://www.botanica.software/blog/cryptographic-issues-in-cloudflares-circl-fourq-implementation
Comments: https://news.ycombinator.com/item?id=45669593
Cryptographic Issues in Cloudflare's Circl FourQ Implementation (CVE-2025-8556)
https://www.botanica.software/blog/cryptographic-issues-in-cloudflares-circl-fourq-implementation
#ycombinator
Cryptographic Issues in Cloudflare's Circl FourQ Implementation (CVE-2025-8556)
https://www.botanica.software/blog/cryptographic-issues-in-cloudflares-circl-fourq-implementation
#HackerNews #Cryptography #Cloudflare #FourQ #CVE2025 #Cybersecurity
##Cryptographic Issues in Cloudflare's Circl FourQ Implementation (CVE-2025-8556) https://www.botanica.software/blog/cryptographic-issues-in-cloudflares-circl-fourq-implementation
##updated 2025-10-22T21:12:48.953000
1 posts
Hikvision
https://www.cve.org/CVERecord?id=CVE-2023-53691
https://www.cve.org/CVERecord?id=CVE-2024-58274
Sauter
https://www.cve.org/CVERecord?id=CVE-2025-41719
https://www.cve.org/CVERecord?id=CVE-2025-41720
https://www.cve.org/CVERecord?id=CVE-2025-41721
https://www.cve.org/CVERecord?id=CVE-2025-41722
https://www.cve.org/CVERecord?id=CVE-2025-41723
https://www.cve.org/CVERecord?id=CVE-2025-41724
Ghost Robotics
https://www.cve.org/CVERecord?id=CVE-2025-41108
https://www.cve.org/CVERecord?id=CVE-2025-41109
https://www.cve.org/CVERecord?id=CVE-2025-41110
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-60338
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60333
https://www.cve.org/CVERecord?id=CVE-2025-60334
https://www.cve.org/CVERecord?id=CVE-2025-60335
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60331
https://www.cve.org/CVERecord?id=CVE-2025-60332
OpenWRT
https://www.cve.org/CVERecord?id=CVE-2025-62525
https://www.cve.org/CVERecord?id=CVE-2025-62526
##updated 2025-10-22T21:12:48.953000
2 posts
Hikvision
https://www.cve.org/CVERecord?id=CVE-2023-53691
https://www.cve.org/CVERecord?id=CVE-2024-58274
Sauter
https://www.cve.org/CVERecord?id=CVE-2025-41719
https://www.cve.org/CVERecord?id=CVE-2025-41720
https://www.cve.org/CVERecord?id=CVE-2025-41721
https://www.cve.org/CVERecord?id=CVE-2025-41722
https://www.cve.org/CVERecord?id=CVE-2025-41723
https://www.cve.org/CVERecord?id=CVE-2025-41724
Ghost Robotics
https://www.cve.org/CVERecord?id=CVE-2025-41108
https://www.cve.org/CVERecord?id=CVE-2025-41109
https://www.cve.org/CVERecord?id=CVE-2025-41110
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-60338
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60333
https://www.cve.org/CVERecord?id=CVE-2025-60334
https://www.cve.org/CVERecord?id=CVE-2025-60335
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60331
https://www.cve.org/CVERecord?id=CVE-2025-60332
OpenWRT
https://www.cve.org/CVERecord?id=CVE-2025-62525
https://www.cve.org/CVERecord?id=CVE-2025-62526
##⚠️ CVE-2025-41108 (CRITICAL): Ghost Robotics Vision 60 v0.27.2 lets attackers hijack robots by spoofing control commands over MAVLink (no auth/encryption). Segment networks & monitor traffic while awaiting patch. https://radar.offseq.com/threat/cve-2025-41108-cwe-287-improper-authentication-in--fef464fa #OffSeq #CVE202541108 #Robotics #IoTSec
##updated 2025-10-22T21:12:48.953000
1 posts
Hikvision
https://www.cve.org/CVERecord?id=CVE-2023-53691
https://www.cve.org/CVERecord?id=CVE-2024-58274
Sauter
https://www.cve.org/CVERecord?id=CVE-2025-41719
https://www.cve.org/CVERecord?id=CVE-2025-41720
https://www.cve.org/CVERecord?id=CVE-2025-41721
https://www.cve.org/CVERecord?id=CVE-2025-41722
https://www.cve.org/CVERecord?id=CVE-2025-41723
https://www.cve.org/CVERecord?id=CVE-2025-41724
Ghost Robotics
https://www.cve.org/CVERecord?id=CVE-2025-41108
https://www.cve.org/CVERecord?id=CVE-2025-41109
https://www.cve.org/CVERecord?id=CVE-2025-41110
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-60338
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60333
https://www.cve.org/CVERecord?id=CVE-2025-60334
https://www.cve.org/CVERecord?id=CVE-2025-60335
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60331
https://www.cve.org/CVERecord?id=CVE-2025-60332
OpenWRT
https://www.cve.org/CVERecord?id=CVE-2025-62525
https://www.cve.org/CVERecord?id=CVE-2025-62526
##updated 2025-10-22T21:12:48.953000
1 posts
@Dio9sys @da_667 CVEs are published for this now.
https://www.cve.org/CVERecord?id=CVE-2025-62771
https://www.cve.org/CVERecord?id=CVE-2025-62772
https://www.cve.org/CVERecord?id=CVE-2025-62773
https://www.cve.org/CVERecord?id=CVE-2025-62774
##updated 2025-10-22T21:12:48.953000
1 posts
@Dio9sys @da_667 CVEs are published for this now.
https://www.cve.org/CVERecord?id=CVE-2025-62771
https://www.cve.org/CVERecord?id=CVE-2025-62772
https://www.cve.org/CVERecord?id=CVE-2025-62773
https://www.cve.org/CVERecord?id=CVE-2025-62774
##updated 2025-10-22T21:12:32.330000
1 posts
1 repos
updated 2025-10-22T18:30:45
1 posts
Cache poisoning:
https://kb.isc.org/docs/cve-2025-40778
https://kb.isc.org/docs/cve-2025-40780
And DoS:
https://kb.isc.org/docs/cve-2025-8677
in BIND 9.
##updated 2025-10-22T18:30:44
3 posts
Running a #DNS server, depending on your setup, now might a good time to update.
CVE-2025-40778 and CVE-2025-40780
##🚨 The developers behind BIND, the Internet’s most widely used domain name resolution software, have issued a warning about two serious vulnerabilities that could let attackers poison entire DNS caches, redirecting users to malicious sites that appear completely legitimate.
CVE: CVE-2025-40778 and CVE-2025-40780
CVSS: Both 8.6
##Cache poisoning:
https://kb.isc.org/docs/cve-2025-40778
https://kb.isc.org/docs/cve-2025-40780
And DoS:
https://kb.isc.org/docs/cve-2025-8677
in BIND 9.
##updated 2025-10-22T15:31:09
3 posts
This apparently impacts other DNS implementations (h/t @paulehoffman). For example Unbound https://nlnetlabs.nl/projects/unbound/security-advisories/ notes CVE-2025-11411 for this.
##Domain hijacking in Unbound.
https://www.nlnetlabs.nl/downloads/unbound/CVE-2025-11411.txt
##updated 2025-10-22T15:31:09
1 posts
🚨 CRITICAL: CVE-2025-61757 hits Oracle Identity Manager (12.2.1.4.0, 14.1.2.1.0). Unauthenticated attackers can take over via HTTP REST WebServices. Restrict access & monitor for Oracle patches! https://radar.offseq.com/threat/cve-2025-61757-easily-exploitable-vulnerability-al-e6a75922 #OffSeq #CVE202561757 #Oracle #InfoSec
##updated 2025-10-22T09:30:26
1 posts
Hikvision
https://www.cve.org/CVERecord?id=CVE-2023-53691
https://www.cve.org/CVERecord?id=CVE-2024-58274
Sauter
https://www.cve.org/CVERecord?id=CVE-2025-41719
https://www.cve.org/CVERecord?id=CVE-2025-41720
https://www.cve.org/CVERecord?id=CVE-2025-41721
https://www.cve.org/CVERecord?id=CVE-2025-41722
https://www.cve.org/CVERecord?id=CVE-2025-41723
https://www.cve.org/CVERecord?id=CVE-2025-41724
Ghost Robotics
https://www.cve.org/CVERecord?id=CVE-2025-41108
https://www.cve.org/CVERecord?id=CVE-2025-41109
https://www.cve.org/CVERecord?id=CVE-2025-41110
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-60338
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60333
https://www.cve.org/CVERecord?id=CVE-2025-60334
https://www.cve.org/CVERecord?id=CVE-2025-60335
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60331
https://www.cve.org/CVERecord?id=CVE-2025-60332
OpenWRT
https://www.cve.org/CVERecord?id=CVE-2025-62525
https://www.cve.org/CVERecord?id=CVE-2025-62526
##updated 2025-10-22T09:30:26
1 posts
Hikvision
https://www.cve.org/CVERecord?id=CVE-2023-53691
https://www.cve.org/CVERecord?id=CVE-2024-58274
Sauter
https://www.cve.org/CVERecord?id=CVE-2025-41719
https://www.cve.org/CVERecord?id=CVE-2025-41720
https://www.cve.org/CVERecord?id=CVE-2025-41721
https://www.cve.org/CVERecord?id=CVE-2025-41722
https://www.cve.org/CVERecord?id=CVE-2025-41723
https://www.cve.org/CVERecord?id=CVE-2025-41724
Ghost Robotics
https://www.cve.org/CVERecord?id=CVE-2025-41108
https://www.cve.org/CVERecord?id=CVE-2025-41109
https://www.cve.org/CVERecord?id=CVE-2025-41110
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-60338
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60333
https://www.cve.org/CVERecord?id=CVE-2025-60334
https://www.cve.org/CVERecord?id=CVE-2025-60335
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60331
https://www.cve.org/CVERecord?id=CVE-2025-60332
OpenWRT
https://www.cve.org/CVERecord?id=CVE-2025-62525
https://www.cve.org/CVERecord?id=CVE-2025-62526
##updated 2025-10-22T09:30:26
1 posts
Hikvision
https://www.cve.org/CVERecord?id=CVE-2023-53691
https://www.cve.org/CVERecord?id=CVE-2024-58274
Sauter
https://www.cve.org/CVERecord?id=CVE-2025-41719
https://www.cve.org/CVERecord?id=CVE-2025-41720
https://www.cve.org/CVERecord?id=CVE-2025-41721
https://www.cve.org/CVERecord?id=CVE-2025-41722
https://www.cve.org/CVERecord?id=CVE-2025-41723
https://www.cve.org/CVERecord?id=CVE-2025-41724
Ghost Robotics
https://www.cve.org/CVERecord?id=CVE-2025-41108
https://www.cve.org/CVERecord?id=CVE-2025-41109
https://www.cve.org/CVERecord?id=CVE-2025-41110
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-60338
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60333
https://www.cve.org/CVERecord?id=CVE-2025-60334
https://www.cve.org/CVERecord?id=CVE-2025-60335
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60331
https://www.cve.org/CVERecord?id=CVE-2025-60332
OpenWRT
https://www.cve.org/CVERecord?id=CVE-2025-62525
https://www.cve.org/CVERecord?id=CVE-2025-62526
##updated 2025-10-22T09:30:25
1 posts
Hikvision
https://www.cve.org/CVERecord?id=CVE-2023-53691
https://www.cve.org/CVERecord?id=CVE-2024-58274
Sauter
https://www.cve.org/CVERecord?id=CVE-2025-41719
https://www.cve.org/CVERecord?id=CVE-2025-41720
https://www.cve.org/CVERecord?id=CVE-2025-41721
https://www.cve.org/CVERecord?id=CVE-2025-41722
https://www.cve.org/CVERecord?id=CVE-2025-41723
https://www.cve.org/CVERecord?id=CVE-2025-41724
Ghost Robotics
https://www.cve.org/CVERecord?id=CVE-2025-41108
https://www.cve.org/CVERecord?id=CVE-2025-41109
https://www.cve.org/CVERecord?id=CVE-2025-41110
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-60338
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60333
https://www.cve.org/CVERecord?id=CVE-2025-60334
https://www.cve.org/CVERecord?id=CVE-2025-60335
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60331
https://www.cve.org/CVERecord?id=CVE-2025-60332
OpenWRT
https://www.cve.org/CVERecord?id=CVE-2025-62525
https://www.cve.org/CVERecord?id=CVE-2025-62526
##updated 2025-10-22T09:30:25
1 posts
2 repos
Hikvision
https://www.cve.org/CVERecord?id=CVE-2023-53691
https://www.cve.org/CVERecord?id=CVE-2024-58274
Sauter
https://www.cve.org/CVERecord?id=CVE-2025-41719
https://www.cve.org/CVERecord?id=CVE-2025-41720
https://www.cve.org/CVERecord?id=CVE-2025-41721
https://www.cve.org/CVERecord?id=CVE-2025-41722
https://www.cve.org/CVERecord?id=CVE-2025-41723
https://www.cve.org/CVERecord?id=CVE-2025-41724
Ghost Robotics
https://www.cve.org/CVERecord?id=CVE-2025-41108
https://www.cve.org/CVERecord?id=CVE-2025-41109
https://www.cve.org/CVERecord?id=CVE-2025-41110
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-60338
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60333
https://www.cve.org/CVERecord?id=CVE-2025-60334
https://www.cve.org/CVERecord?id=CVE-2025-60335
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60331
https://www.cve.org/CVERecord?id=CVE-2025-60332
OpenWRT
https://www.cve.org/CVERecord?id=CVE-2025-62525
https://www.cve.org/CVERecord?id=CVE-2025-62526
##updated 2025-10-22T09:30:25
1 posts
Hikvision
https://www.cve.org/CVERecord?id=CVE-2023-53691
https://www.cve.org/CVERecord?id=CVE-2024-58274
Sauter
https://www.cve.org/CVERecord?id=CVE-2025-41719
https://www.cve.org/CVERecord?id=CVE-2025-41720
https://www.cve.org/CVERecord?id=CVE-2025-41721
https://www.cve.org/CVERecord?id=CVE-2025-41722
https://www.cve.org/CVERecord?id=CVE-2025-41723
https://www.cve.org/CVERecord?id=CVE-2025-41724
Ghost Robotics
https://www.cve.org/CVERecord?id=CVE-2025-41108
https://www.cve.org/CVERecord?id=CVE-2025-41109
https://www.cve.org/CVERecord?id=CVE-2025-41110
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-60338
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60333
https://www.cve.org/CVERecord?id=CVE-2025-60334
https://www.cve.org/CVERecord?id=CVE-2025-60335
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60331
https://www.cve.org/CVERecord?id=CVE-2025-60332
OpenWRT
https://www.cve.org/CVERecord?id=CVE-2025-62525
https://www.cve.org/CVERecord?id=CVE-2025-62526
##updated 2025-10-22T09:30:25
1 posts
Hikvision
https://www.cve.org/CVERecord?id=CVE-2023-53691
https://www.cve.org/CVERecord?id=CVE-2024-58274
Sauter
https://www.cve.org/CVERecord?id=CVE-2025-41719
https://www.cve.org/CVERecord?id=CVE-2025-41720
https://www.cve.org/CVERecord?id=CVE-2025-41721
https://www.cve.org/CVERecord?id=CVE-2025-41722
https://www.cve.org/CVERecord?id=CVE-2025-41723
https://www.cve.org/CVERecord?id=CVE-2025-41724
Ghost Robotics
https://www.cve.org/CVERecord?id=CVE-2025-41108
https://www.cve.org/CVERecord?id=CVE-2025-41109
https://www.cve.org/CVERecord?id=CVE-2025-41110
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-60338
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60333
https://www.cve.org/CVERecord?id=CVE-2025-60334
https://www.cve.org/CVERecord?id=CVE-2025-60335
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60331
https://www.cve.org/CVERecord?id=CVE-2025-60332
OpenWRT
https://www.cve.org/CVERecord?id=CVE-2025-62525
https://www.cve.org/CVERecord?id=CVE-2025-62526
##updated 2025-10-22T06:31:21
1 posts
Hikvision
https://www.cve.org/CVERecord?id=CVE-2023-53691
https://www.cve.org/CVERecord?id=CVE-2024-58274
Sauter
https://www.cve.org/CVERecord?id=CVE-2025-41719
https://www.cve.org/CVERecord?id=CVE-2025-41720
https://www.cve.org/CVERecord?id=CVE-2025-41721
https://www.cve.org/CVERecord?id=CVE-2025-41722
https://www.cve.org/CVERecord?id=CVE-2025-41723
https://www.cve.org/CVERecord?id=CVE-2025-41724
Ghost Robotics
https://www.cve.org/CVERecord?id=CVE-2025-41108
https://www.cve.org/CVERecord?id=CVE-2025-41109
https://www.cve.org/CVERecord?id=CVE-2025-41110
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-60338
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60333
https://www.cve.org/CVERecord?id=CVE-2025-60334
https://www.cve.org/CVERecord?id=CVE-2025-60335
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60331
https://www.cve.org/CVERecord?id=CVE-2025-60332
OpenWRT
https://www.cve.org/CVERecord?id=CVE-2025-62525
https://www.cve.org/CVERecord?id=CVE-2025-62526
##updated 2025-10-22T06:31:12
1 posts
@Dio9sys @da_667 CVEs are published for this now.
https://www.cve.org/CVERecord?id=CVE-2025-62771
https://www.cve.org/CVERecord?id=CVE-2025-62772
https://www.cve.org/CVERecord?id=CVE-2025-62773
https://www.cve.org/CVERecord?id=CVE-2025-62774
##updated 2025-10-22T06:31:12
1 posts
@Dio9sys @da_667 CVEs are published for this now.
https://www.cve.org/CVERecord?id=CVE-2025-62771
https://www.cve.org/CVERecord?id=CVE-2025-62772
https://www.cve.org/CVERecord?id=CVE-2025-62773
https://www.cve.org/CVERecord?id=CVE-2025-62774
##updated 2025-10-22T06:31:12
1 posts
@Dio9sys @da_667 CVEs are published for this now.
https://www.cve.org/CVERecord?id=CVE-2025-62771
https://www.cve.org/CVERecord?id=CVE-2025-62772
https://www.cve.org/CVERecord?id=CVE-2025-62773
https://www.cve.org/CVERecord?id=CVE-2025-62774
##updated 2025-10-22T00:34:29
1 posts
1 repos
updated 2025-10-22T00:34:29
1 posts
6 repos
https://github.com/siddu7575/CVE-2025-61882-CVE-2025-61884
https://github.com/shinyhunt/CVE-2025-61884
https://github.com/pakagronglb/oracle-security-breaches-analysis-case-study
https://github.com/rxerium/CVE-2025-61882-CVE-2025-61884
CISA confirms hackers exploited Oracle E-Business Suite SSRF flaw
CISA has confirmed that an Oracle E-Business Suite flaw tracked as CVE-2025-61884 is being exploited in attacks, adding it to its Known Exploited...
🔗️ [Bleepingcomputer] https://link.is.it/S9MGzZ
##updated 2025-10-22T00:34:26
4 posts
45 repos
https://github.com/0xh3g4z1/CVE-2025-53770-SharePoint-RCE
https://github.com/CyprianAtsyor/ToolShell-CVE-2025-53770-SharePoint-Exploit-Lab-LetsDefend
https://github.com/0x-crypt/CVE-2025-53770-Scanner
https://github.com/bitsalv/ToolShell-Honeypot
https://github.com/behnamvanda/CVE-2025-53770-Checker
https://github.com/hazcod/CVE-2025-53770
https://github.com/GreenForceNetworks/Toolshell_CVE-2025-53770
https://github.com/unk9vvn/sharepoint-toolpane
https://github.com/Bluefire-Redteam-Cybersecurity/bluefire-sharepoint-cve-2025-53770
https://github.com/MuhammadWaseem29/CVE-2025-53770
https://github.com/ghostn4444/CVE-2025-53770
https://github.com/imbas007/CVE-2025-53770-Vulnerable-Scanner
https://github.com/0xray5c68616e37/cve-2025-53770
https://github.com/BirdsAreFlyingCameras/CVE-2025-53770_Raw-HTTP-Request-Generator
https://github.com/bossnick98/-SOC342---CVE-2025-53770-SharePoint-ToolShell-Auth-Bypass-and-RCE
https://github.com/Rabbitbong/OurSharePoint-CVE-2025-53770
https://github.com/Immersive-Labs-Sec/SharePoint-CVE-2025-53770-POC
https://github.com/exfil0/CVE-2025-53770
https://github.com/r3xbugbounty/CVE-2025-53770
https://github.com/peiqiF4ck/WebFrameworkTools-5.5-enhance
https://github.com/Udyz/CVE-2025-53770-Exploit
https://github.com/daryllundy/CVE-2025-53770
https://github.com/Agampreet-Singh/CVE-2025-53770
https://github.com/saladin0x1/CVE-2025-53770
https://github.com/soltanali0/CVE-2025-53770-Exploit
https://github.com/siag-itsec/CVE-2025-53770-Hunting
https://github.com/Michaael01/LetsDefend--SOC-342-CVE-2025-53770-SharePoint-Exploit-ToolShell
https://github.com/ZephrFish/CVE-2025-53770-Scanner
https://github.com/n1chr0x/ZeroPoint
https://github.com/tripoloski1337/CVE-2025-53770-scanner
https://github.com/kaizensecurity/CVE-2025-53770
https://github.com/bharath-cyber-root/sharepoint-toolshell-cve-2025-53770
https://github.com/zach115th/ToolShellFinder
https://github.com/AdityaBhatt3010/CVE-2025-53770-SharePoint-Zero-Day-Variant-Exploited-for-Full-RCE
https://github.com/B1ack4sh/Blackash-CVE-2025-53770
https://github.com/fentnttntnt/CVE-2025-53770
https://github.com/RukshanaAlikhan/CVE-2025-53770
https://github.com/Sec-Dan/CVE-2025-53770-Scanner
https://github.com/nisargsuthar/suricata-rule-CVE-2025-53770
https://github.com/paolokappa/SharePointSecurityMonitor
https://github.com/3a7/CVE-2025-53770
https://github.com/go-bi/sharepoint-CVE-2025-53770
https://github.com/harryhaxor/CVE-2025-53770-SharePoint-Deserialization-RCE-PoC
「 Experts at the Symantec and Carbon Black Threat Hunter Team tracked multiple compromises involving CVE-2025-53770 — a vulnerability that caused alarm this summer when Microsoft warned its on-premises SharePoint customers that three separate China-based groups were exploiting it. Hundreds of governments and prominent businesses use SharePoint, particularly for maintaining their intranets 」
https://therecord.media/sharepoint-toolshell-bug-breaches-governments-africa-south-america
##⚠️ Foreign hackers breached a US nuclear weapons plant via SharePoint flaws
「 The attackers exploited two recently disclosed Microsoft SharePoint vulnerabilities — CVE-2025-53770, a spoofing flaw, and CVE-2025-49704, a remote code execution (RCE) bug — both affecting on-premises servers. Microsoft issued fixes for the vulnerabilities on July 19 」
#sharepoint #hacking #cybersecurity #CVE202549704 #CVE202553770
##Hackers believed to be associated with China have leveraged the ToolShell vulnerability (CVE-2025-53770) in Microsoft SharePoint in attacks targeting government agencies, universities, telecommunication service providers, and finance organizations. https://www.bleepingcomputer.com/news/security/sharepoint-toolshell-attacks-targeted-orgs-across-four-continents/
##Sharepoint ToolShell attacks targeted orgs across four continents
Hackers believed to be associated with China have leveraged the ToolShell vulnerability (CVE-2025-53770) in Microsoft SharePoint in attacks...
🔗️ [Bleepingcomputer] https://link.is.it/FS0LGi
##updated 2025-10-22T00:34:26
1 posts
3 repos
https://github.com/orange0Mint/CVE-2025-10035_GoAnywhere
Just 1 day after Microsoft confirmed ransomware groups are exploiting 💥 CVE-2025-10035 in Fortra GoAnywhere, we added a custom detection module into Sniper to deliver:
✅ Real payload execution paths
✅ Detailed request/response evidence
✅ A multi-dimensional view of risk you can export into a report.
🔄 We’ve also had detection for the related auth bypass (unauthenticated exposure) live in the Network Vulnerability Scanner since September 25.
🧠 Why this matters:
This deserialization vulnerability is an active #ransomware entry point targeting critical file transfer systems.
Because orgs often use Fortra GoAnywhere MFT to handle sensitive file transfers in finance, healthcare, and enterprise environments, this CVE's blast radius includes PII exposure, data exfiltration, and operational downtime.
📍If you run GoAnywhere, don't sleep on validating exposure with precision - not just detection.
##updated 2025-10-22T00:34:25
1 posts
⚠️ Foreign hackers breached a US nuclear weapons plant via SharePoint flaws
「 The attackers exploited two recently disclosed Microsoft SharePoint vulnerabilities — CVE-2025-53770, a spoofing flaw, and CVE-2025-49704, a remote code execution (RCE) bug — both affecting on-premises servers. Microsoft issued fixes for the vulnerabilities on July 19 」
#sharepoint #hacking #cybersecurity #CVE202549704 #CVE202553770
##updated 2025-10-22T00:34:21
1 posts
1 repos
https://github.com/watchtowrlabs/watchTowr-vs-SysAid-PreAuth-RCE-Chain
🚨PoC for SysAid PreAuth RCE Chain (CVE-2025-2775, CVE-2025-2776, CVE-2025-2777, CVE-2025-2778)
GitHub: https://github.com/watchtowrlabs/watchTowr-vs-SysAid-PreAuth-RCE-Chain
Write-up: https://labs.watchtowr.com/sysowned-your-friendly-rce-support-ticket/
##updated 2025-10-22T00:34:21
1 posts
5 repos
https://github.com/sfewer-r7/CVE-2025-22457
https://github.com/securekomodo/CVE-2025-22457
https://github.com/Vinylrider/ivantiunlocker
🚨CVE-2025-22457: Python Exploit POC Scanner to Detect Ivanti Connect Secure RCE
GitHub: https://github.com/securekomodo/CVE-2025-22457
Redline Blog: https://www.redlinecybersecurity.com/blog/cve-2025-22457-python-exploit-poc-scanner-to-detect-ivanti-connect-secure-rce
CVSS: 9.0
KEV: Yes
##updated 2025-10-22T00:33:52
1 posts
CISA warns of active exploitation of three years old Apple JavaScriptCore vulnerability
CISA is warning of active exploitation of CVE-2022-48503, a critical JavaScriptCore vulnerability in Apple products that enables arbitrary code execution through malicious web content, affecting macOS, iOS, iPadOS, Safari, tvOS, and watchOS. Despite Apple releasing patches in July 2022, the vulnerability is actively exploited against unpatched and end-of-life systems.
**If you're using older Apple devices (macOS, iOS, iPadOS, Safari, tvOS, or watchOS from before mid-2022), update immediately to the latest supported version. Attackers are actively exploiting a three-year-old flaw in devices that were never patched. If your device is too old to receive updates anymore, either use an alternate update to push up the version (this works only on macOS) or stop using it for sensitive tasks and replace it with a supported device.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-warns-of-active-exploitation-of-three-years-old-apple-javascriptcore-vulnerability-b-q-d-p-7/gD2P6Ple2L
updated 2025-10-22T00:33:17
1 posts
CISA warns of active exploitation of critical authentication bypass flaws in Kentico Xperience CMS
CISA is warning of active exploitation of two critical authentication bypass vulnerabilities (CVE-2025-2746 and CVE-2025-2747, both CVSS 9.8) in Kentico Xperience CMS's Staging Sync Server component that allow unauthenticated attackers to gain administrative control. Researchers have chained with a file upload flaw (CVE-2025-2749) to achieve complete remote code execution and server compromise.
**If you're using Kentico Xperience CMS with the Staging Sync Server enabled (any version before 13.0.179), update immediately to version 13.0.179 or later. Attackers are actively exploiting flaws to take complete control of systems. If you can't update, disable the Staging Sync Server entirely or restrict network access to trusted internal IPs.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-warns-of-active-exploitation-of-critical-authentication-bypass-flaws-in-kentico-xperience-cms-p-o-2-8-l/gD2P6Ple2L
updated 2025-10-22T00:33:16
1 posts
CISA warns of active exploitation of critical authentication bypass flaws in Kentico Xperience CMS
CISA is warning of active exploitation of two critical authentication bypass vulnerabilities (CVE-2025-2746 and CVE-2025-2747, both CVSS 9.8) in Kentico Xperience CMS's Staging Sync Server component that allow unauthenticated attackers to gain administrative control. Researchers have chained with a file upload flaw (CVE-2025-2749) to achieve complete remote code execution and server compromise.
**If you're using Kentico Xperience CMS with the Staging Sync Server enabled (any version before 13.0.179), update immediately to version 13.0.179 or later. Attackers are actively exploiting flaws to take complete control of systems. If you can't update, disable the Staging Sync Server entirely or restrict network access to trusted internal IPs.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-warns-of-active-exploitation-of-critical-authentication-bypass-flaws-in-kentico-xperience-cms-p-o-2-8-l/gD2P6Ple2L
updated 2025-10-22T00:32:47
1 posts
1 repos
Microsoft Update causing Print Spooler Problems - CVE-2019-1367 | https://techygeekshome.info/cve-2019-1367/?fsp_sid=16684 | #Guide #Microsoft #News #security #Updates #Windows
https://techygeekshome.info/cve-2019-1367/?fsp_sid=16684
updated 2025-10-22T00:18:14.313000
1 posts
PolarEdge Backdoor on QNAP (CVE-2023-20118) – Full Analysis https://blog.sekoia.io/polaredge-backdoor-qnap-cve-2023-20118-analysis/
##updated 2025-10-21T23:17:10.660000
2 posts
25 repos
https://github.com/knight0x07/WinRAR-CVE-2025-8088-PoC-RAR
https://github.com/pentestfunctions/best-CVE-2025-8088
https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-Edition
https://github.com/hexsecteam/CVE-2025-8088-Winrar-Tool
https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC
https://github.com/Shinkirou789/Cve-2025-8088-WinRar-vulnerability
https://github.com/hbesljx/CVE-2025-8088-EXP
https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-
https://github.com/lucyna77/winrar-exploit
https://github.com/ghostn4444/CVE-2025-8088
https://github.com/onlytoxi/CVE-2025-8088-Winrar-Tool
https://github.com/Syrins/CVE-2025-8088-Winrar-Tool-Gui
https://github.com/Fathi-MO/POC-CVE-2025-8088
https://github.com/AdityaBhatt3010/CVE-2025-8088-WinRAR-Zero-Day-Path-Traversal
https://github.com/techcorp/CVE-2025-8088-Exploit
https://github.com/pentestfunctions/CVE-2025-8088-Multi-Document
https://github.com/0xAbolfazl/CVE-2025-8088-WinRAR-PathTraversal-PoC
https://github.com/nhattanhh/CVE-2025-8088
https://github.com/travisbgreen/cve-2025-8088
https://github.com/walidpyh/CVE-2025-8088
https://github.com/mocred/cve-2025-8088
https://github.com/jordan922/CVE-2025-8088
https://github.com/papcaii2004/CVE-2025-8088-WinRAR-builder
https://github.com/DeepBlue-dot/CVE-2025-8088-WinRAR-Startup-PoC
📢 Earth Estries (alias Salt Typhoon) exploite une faille WinRAR (CVE-2025-8088)
📝 Source: Blaze's Security Blog (Bart Blaze).
📖 cyberveille : https://cyberveille.ch/posts/2025-10-28-earth-estries-alias-salt-typhoon-exploite-une-faille-winrar-cve-2025-8088/
🌐 source : https://bartblaze.blogspot.com/2025/10/earth-estries-alive-and-kicking.html
#APT #CVE_2025_8088 #Cyberveille
Silent Infection: Gamaredon Exploits WinRAR Flaw in a Stealthy Government Targeting Campaign
A Hidden War in the Digital Shadows A new cyber offensive has emerged from one of Eastern Europe’s most notorious threat actors, Gamaredon, known for its relentless espionage operations against government networks. This time, the group has weaponized a critical WinRAR vulnerability (CVE-2025-8088) to deliver malware with almost surgical precision. The attack doesn’t rely on the…
##updated 2025-10-21T23:16:46.667000
2 posts
An observation from CVE-2025-20333 (Cisco ASA AnyConnect vuln) - orgs just don't patch ASA.
The patch rate is really, really poor - ransomware groups are likely going to reinvest in targeting Cisco ASA product security, even just n-days, as realistically tens of thousands of organisations are years behind with patching their edge VPN appliances -- it's an open door into the world's largest companies.
Upwards of 70% of orgs never patched this one - thankfully it's just China with the exploit.
##An observation from CVE-2025-20333 (Cisco ASA AnyConnect vuln) - orgs just don't patch ASA.
The patch rate is really, really poor - ransomware groups are likely going to reinvest in targeting Cisco ASA product security, even just n-days, as realistically tens of thousands of organisations are years behind with patching their edge VPN appliances -- it's an open door into the world's largest companies.
Upwards of 70% of orgs never patched this one - thankfully it's just China with the exploit.
##updated 2025-10-21T21:33:53
1 posts
🚨CVE-2025-62641: Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.12 and 7.2.2. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox.
CVSS: 8.2
Oracle Advisory: https://www.oracle.com/security-alerts/cpuoct2025.html
##updated 2025-10-21T21:33:50
1 posts
updated 2025-10-21T21:33:37
1 posts
updated 2025-10-21T20:20:25.480000
1 posts
2 repos
CISA warns of critical authentication bypass flaw in Raisecomm RAX701-GC Series
CISA is reporting CVE-2025-11534, a critical authentication bypass vulnerability in Raisecomm RAX701-GC Series devices that allows unauthenticated attackers to gain root shell access via SSH without credentials. Raisecomm has not responded to CISA's mitigation requests and no patches are available as of October 21, 2025.
**If you're using Raisecomm RAX701-GC devices make sure they are isolated from the internet and accessible only from trusted networks. Then reach out to the vendor for possible patches. Consider replacing these devices with supported alternatives if possible, since the manufacturer hasn't responded to fix this flaw.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/cisa-warns-of-critical-authentication-bypass-flaw-in-raisecomm-rax701-gc-series-h-0-b-w-h/gD2P6Ple2L
updated 2025-10-21T19:31:50.020000
1 posts
updated 2025-10-21T19:31:25.450000
1 posts
If you missed this, Microsoft updated its security guide yesterday with new listings affecting Azure Linux: https://msrc.microsoft.com/update-guide
spi: cadence-quadspi: Implement refcount to handle unbind during busy
CVE-2025-40005 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40005
media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID New
CVE-2025-40016 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40016 #Microsoft #Linux #cybersecurity #infosec #Azure
updated 2025-10-21T19:31:25.450000
1 posts
Post-auth SQLi in SolarWinds. Too bad they put a bad link in the CVE.
https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-26392
##updated 2025-10-21T15:32:02
1 posts
1 repos
updated 2025-10-21T15:30:58
1 posts
Go hack more SSHit.
https://www.cve.org/CVERecord?id=CVE-2025-11625
##Improper host authentication vulnerability in wolfSSH version 1.4.20 and earlier clients that allows authentication bypass and leaking of clients credentials.
updated 2025-10-21T03:30:25
2 posts
Une faille dangereuse (CVE-2025-9133) a été identifiée dans les dispositifs de la série Zyxel ATP/USG : même avec l’authentification à deux facteurs activée, un attaquant disposant de creds (ayant franchi seulement la 1ʳᵉ étape du 2FA) peut potentiellement contourner les contrôles d’accès et accéder à la configuration complète du système.
En envoyant une commande commençant par un élément autorisé (ex : show version), puis en enchaînant ;show running-config, la validation ne détecte pas la seconde commande et la base entière est exposée.
Rainpwn
Impact : divulgation de mots de passe, clés, configurations réseau — c’est un accès potentiel complet à l’appareil.
Rainpwn
Recommandations : appliquer rapidement les correctifs proposés par Zyxel, bloquer les chaînes de commandes (; ou pipeline), renforcer l’autorisation per-commande.
Rainpwn
Si vous gérez ou utilisez une Zyxel ATP/USG : vérifiez que vous êtes à jour, restreignez l’accès à l’interface d’administration, et surveillez toute activité suspecte.
⬇️
2025-08-15 : ZYXEL a été informé de la vulnérabilité
2025-08-15 : ZYXEL a accusé réception de mon rapport de vulnérabilité.
2025-08-19 : ZYXEL a attribué l’identifiant CVE-2025-9133 aux problèmes signalés et m’a informé de son intention de publier un avis de sécurité le 30 septembre 2025.
2025-09-08 : ZYXEL a demandé de reporter la divulgation publique au 21 octobre 2025, car le correctif du firmware devait être publié le 20 octobre 2025. Cela devait permettre aux utilisateurs d’appliquer la mise à jour et de sécuriser leurs systèmes avant la divulgation de la faille.
2025-10-21 : ZYXEL a publié son avis de sécurité, conformément au calendrier de divulgation coordonnée.
⬇️
CVE-2025-9133: Configuration Exposure via Authorization Bypass
👇
https://rainpwn.blog/blog/cve-2025-9133/
🩹⬇️
"The missing authorization vulnerability in certain ZLD firewall versions could allow a semi-authenticated attacker—who has completed only the first stage of the two-factor authentication (2FA) process—to view and download the system configuration from an affected device."
⬇️
"Zyxel security advisory for post-authentication command injection and missing authorization vulnerabilities in ZLD firewalls"
👇
https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-post-authentication-command-injection-and-missing-authorization-vulnerabilities-in-zld-firewalls-10-21-2025
CVE-2025-9133: ZYXEL Configuration Exposure via Authorization Bypass https://rainpwn.blog/blog/cve-2025-9133/
##updated 2025-10-21T03:30:25
1 posts
CVE-2025-8078: ZYXEL Remote Code Execution via CLI Command Injection https://rainpwn.blog/blog/cve-2025-8078/
##updated 2025-10-20T18:31:37
1 posts
updated 2025-10-20T18:30:41
1 posts
Critical vulnerability discovered in End-of-Life ASKI Energy industrial controllers
ASKI Energy (now owned by ABB) is reporting CVE-2025-9574, a critical missing authentication vulnerability in the embedded web server of ALS-Mini-S8 and ALS-Mini-S4 IP industrial controllers that allows unauthenticated remote attackers to gain full control, read and modify critical configuration parameters, and potentially enable lateral movement in OT networks. ABB has confirmed the affected products reached end-of-life in 2022 and no security patches are planned.
**If you're still using ASKI Energy ALS-Mini-S4 or ALS-Mini-S8 industrial controllers, know that they have a critical flaw with no fix coming (product support ended in 2022). Make sure that these devices are isolated from the internet, ideally on a completely separate network, and start planning to replace them with supported equipment as soon as possible.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-vulnerability-discovered-in-end-of-life-aski-energy-industrial-controllers-5-1-0-m-9/gD2P6Ple2L
updated 2025-10-20T18:30:33
1 posts
If you missed this, Microsoft updated its security guide yesterday with new listings affecting Azure Linux: https://msrc.microsoft.com/update-guide
spi: cadence-quadspi: Implement refcount to handle unbind during busy
CVE-2025-40005 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40005
media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID New
CVE-2025-40016 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40016 #Microsoft #Linux #cybersecurity #infosec #Azure
updated 2025-10-17T21:32:40
1 posts
Casting a Net(ty) for Bugs, and Catching a Big One (CVE-2025-59419) https://www.depthfirst.com/post/our-ai-agent-found-a-netty-zero-day-that-bypasses-email-authentication-the-story-of-cve-2025-59419
##updated 2025-10-17T18:31:07
2 posts
WSO2 #2: The many ways to bypass authentication in WSO2 products (CVE-2025-9152, CVE-2025-10611, CVE-2025-9804) https://crnkovic.dev/wso2-the-authentication-bypasses/
##WSO2 #2: The many ways to bypass authentication in WSO2 products (CVE-2025-9152, CVE-2025-10611, CVE-2025-9804) https://crnkovic.dev/wso2-the-authentication-bypasses/
##updated 2025-10-17T18:31:07
2 posts
WSO2 #2: The many ways to bypass authentication in WSO2 products (CVE-2025-9152, CVE-2025-10611, CVE-2025-9804) https://crnkovic.dev/wso2-the-authentication-bypasses/
##WSO2 #2: The many ways to bypass authentication in WSO2 products (CVE-2025-9152, CVE-2025-10611, CVE-2025-9804) https://crnkovic.dev/wso2-the-authentication-bypasses/
##updated 2025-10-17T15:32:08
1 posts
updated 2025-10-17T10:32:54.807000
1 posts
CISA warns of active exploitation of critical authentication bypass flaws in Kentico Xperience CMS
CISA is warning of active exploitation of two critical authentication bypass vulnerabilities (CVE-2025-2746 and CVE-2025-2747, both CVSS 9.8) in Kentico Xperience CMS's Staging Sync Server component that allow unauthenticated attackers to gain administrative control. Researchers have chained with a file upload flaw (CVE-2025-2749) to achieve complete remote code execution and server compromise.
**If you're using Kentico Xperience CMS with the Staging Sync Server enabled (any version before 13.0.179), update immediately to version 13.0.179 or later. Attackers are actively exploiting flaws to take complete control of systems. If you can't update, disable the Staging Sync Server entirely or restrict network access to trusted internal IPs.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-warns-of-active-exploitation-of-critical-authentication-bypass-flaws-in-kentico-xperience-cms-p-o-2-8-l/gD2P6Ple2L
updated 2025-10-16T21:31:20
1 posts
updated 2025-10-16T15:30:49
2 posts
WSO2 #2: The many ways to bypass authentication in WSO2 products (CVE-2025-9152, CVE-2025-10611, CVE-2025-9804) https://crnkovic.dev/wso2-the-authentication-bypasses/
##WSO2 #2: The many ways to bypass authentication in WSO2 products (CVE-2025-9152, CVE-2025-10611, CVE-2025-9804) https://crnkovic.dev/wso2-the-authentication-bypasses/
##updated 2025-10-16T14:56:09.263000
17 posts
6 repos
https://github.com/RootAid/CVE-2025-55315
https://github.com/nickcopi/CVE-2025-55315-detection-playground
https://github.com/sirredbeard/CVE-2025-55315-repro
https://github.com/jlinebau/CVE-2025-55315-Scanner-Monitor
📜 Latest Top Story on #HackerNews: Understanding the Worst .NET Vulnerability
🔍 Original Story: https://andrewlock.net/understanding-the-worst-dotnet-vulnerability-request-smuggling-and-cve-2025-55315/
👤 Author: ingve
⭐ Score: 74
💬 Number of Comments: 6
🕒 Posted At: 2025-10-28 11:03:38 UTC
🔗 URL: https://news.ycombinator.com/item?id=45731315
#hackernews #bot #hackernewsbot #news
Understanding the Worst .NET Vulnerability
Link: https://andrewlock.net/understanding-the-worst-dotnet-vulnerability-request-smuggling-and-cve-2025-55315/
Discussion: https://news.ycombinator.com/item?id=45731315
Understanding the Worst .NET Vulnerability
Link: https://andrewlock.net/understanding-the-worst-dotnet-vulnerability-request-smuggling-and-cve-2025-55315/
Comments: https://news.ycombinator.com/item?id=45731315
Understanding the Worst .NET Vulnerability
https://andrewlock.net/understanding-the-worst-dotnet-vulnerability-request-smuggling-and-cve-2025-55315/
#ycombinator
📜 Latest Top Story on #HackerNews: Understanding the Worst .NET Vulnerability
🔍 Original Story: https://andrewlock.net/understanding-the-worst-dotnet-vulnerability-request-smuggling-and-cve-2025-55315/
👤 Author: ingve
⭐ Score: 16
💬 Number of Comments: 1
🕒 Posted At: 2025-10-28 11:03:38 UTC
🔗 URL: https://news.ycombinator.com/item?id=45731315
#hackernews #bot #hackernewsbot #news
Understanding the Worst .NET Vulnerability - https://andrewlock.net/understanding-the-worst-dotnet-vulnerability-request-smuggling-and-cve-2025-55315/
##🔍😱 Behold, the #apocalyptic #.NET #vulnerability that scores a 9.9 on the "CVSS #scale of doom"—because who doesn't love a good #disaster flick with code? Our hero embarks on a 24-minute epic saga, unraveling the mysteries of #request #smuggling while holding a Dometrain discount code like a sword of wisdom. 🛡️🎢
https://andrewlock.net/understanding-the-worst-dotnet-vulnerability-request-smuggling-and-cve-2025-55315/ #CVSS #HackerNews #ngated
Understanding the Worst .NET Vulnerability
#HackerNews #Understanding #.NET #Vulnerability #Request #Smuggling #CVE-2025-55315 #Cybersecurity
##Critical ASP.NET Core flaw affects QNAP NetBak PC Agent and Enterprise web applications
QNAP issued a security advisory warning that its NetBak PC Agent backup software is vulnerable to a critical HTTP request smuggling flaw (CVE-2025-55315) in the ASP.NET Core Kestrel web server component, which could allow authenticated attackers to bypass security features, hijack credentials, and gain unauthorized access.
**If you're using QNAP NetBak PC Agent backup software, immediately reinstall the latest version from QNAP's website - this will automatically update the vulnerable ASP.NET Core components to fix CVE-2025-55315. Alternatively, manually download and install the latest ASP.NET Core Runtime Hosting Bundle (version 8.0.21 or newer) from Microsoft's .NET download page and restart your system.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-asp-net-core-flaw-affects-qnap-netbak-pc-agent-and-enterprise-web-applications-7-n-x-4-e/gD2P6Ple2L
QNAP Issues Urgent Warning: Patch Critical ASPNET Core Vulnerability Affecting NetBak PC Agent
Cybersecurity Alert Shakes NAS Users as CVE-2025-55315 Emerges QNAP, one of the leading providers of network-attached storage (NAS) solutions, has issued a critical security warning to its customers, urging them to patch a severe ASP.NET Core vulnerability that directly affects its NetBak PC Agent software. The flaw, now tracked as CVE-2025-55315, has been described as one of…
##Critical Flaw CVE-2025-55315 Exposes QNAP NetBak PC Agent to Security Bypass Attacks https://thecyberexpress.com/cve-2025-55315-hits-qnap-netbak-pc-agent/ #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202555315 #HTTPRequests #CyberNews #NetBakPC #CWE444
##Understanding the Worst .NET Vulnerability
Link: https://andrewlock.net/understanding-the-worst-dotnet-vulnerability-request-smuggling-and-cve-2025-55315/
Discussion: https://news.ycombinator.com/item?id=45731315
Understanding the Worst .NET Vulnerability
Link: https://andrewlock.net/understanding-the-worst-dotnet-vulnerability-request-smuggling-and-cve-2025-55315/
Comments: https://news.ycombinator.com/item?id=45731315
Understanding the Worst .NET Vulnerability
https://andrewlock.net/understanding-the-worst-dotnet-vulnerability-request-smuggling-and-cve-2025-55315/
#ycombinator
Understanding the Worst .NET Vulnerability
#HackerNews #Understanding #.NET #Vulnerability #Request #Smuggling #CVE-2025-55315 #Cybersecurity
##Critical ASP.NET Core flaw affects QNAP NetBak PC Agent and Enterprise web applications
QNAP issued a security advisory warning that its NetBak PC Agent backup software is vulnerable to a critical HTTP request smuggling flaw (CVE-2025-55315) in the ASP.NET Core Kestrel web server component, which could allow authenticated attackers to bypass security features, hijack credentials, and gain unauthorized access.
**If you're using QNAP NetBak PC Agent backup software, immediately reinstall the latest version from QNAP's website - this will automatically update the vulnerable ASP.NET Core components to fix CVE-2025-55315. Alternatively, manually download and install the latest ASP.NET Core Runtime Hosting Bundle (version 8.0.21 or newer) from Microsoft's .NET download page and restart your system.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-asp-net-core-flaw-affects-qnap-netbak-pc-agent-and-enterprise-web-applications-7-n-x-4-e/gD2P6Ple2L
It's going to be a long week...
CVE-2025-55315
##updated 2025-10-16T12:15:47.167000
2 posts
404 to arbitrary file read in WSO2 API Manager (CVE-2025-2905) https://crnkovic.dev/wso2-404-to-arbitrary-file-read/
##404 to arbitrary file read in WSO2 API Manager (CVE-2025-2905) https://crnkovic.dev/wso2-404-to-arbitrary-file-read/
##updated 2025-10-14T15:31:33
1 posts
CISA warns of critical vulnerabilities in Rockwell Automation 1783-NATR
CISA is reporting multiple vulnerabilities in Rockwell Automation's 1783-NATR router, including critical CVE-2025-7328 that allows attackers to bypass authentication on critical functions leading to denial-of-service, admin takeover, or NAT rule modification. The other two flaws enable stored XSS and CSRF attacks.
**If you're using Rockwell Automation 1783-NATR routers make sure they are isolated from the internet and accessible only from trusted networks. Then plan a quick update to to firmware version 1.007 or later. Some of these flaws require admin privileges, so isolation and phishing awareness will go a long way until you patch.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/cisa-warns-of-critical-vulnerabilities-in-rockwell-automation-1783-natr-k-m-i-j-f/gD2P6Ple2L
updated 2025-10-02T19:11:46.753000
1 posts
updated 2025-09-24T18:11:24.520000
2 posts
2 repos
"Out of the multiple vulnerabilities we reported, WSO2 addressed and assigned a CVE identifier to only one: the Siddhi RCE via SOAP administration services (CVE-2025-5717 ). The remaining vulnerabilities were not remediated, and no CVEs were assigned by WSO2"
Le sigh...
##"Out of the multiple vulnerabilities we reported, WSO2 addressed and assigned a CVE identifier to only one: the Siddhi RCE via SOAP administration services (CVE-2025-5717 ). The remaining vulnerabilities were not remediated, and no CVEs were assigned by WSO2"
Le sigh...
##updated 2025-08-09T09:30:20
1 posts
Critical command injection vulnerabilities in TP-Link Omada Gateways enable remote code execution
TP-Link has disclosed multiple critical vulnerabilities in its Omada gateway product line, including CVE-2025-6542, an unauthenticated remote command injection flaw that allows attackers to execute arbitrary OS commands without credentials, and three additional command injection and privilege escalation vulnerabilities (CVE-2025-6541, CVE-2025-8750, and CVE-2025-7851) affecting 13 different Omada gateway models.
**If you're using TP-Link Omada gateways, update to the latest firmware ASAP. There is at least one critical flaw that can be exploited remotely without authentication. Prioritize patching internet-facing gateways first. Isolating doesn't really work for a device that's designed to be a gateway to other networks.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-command-injection-vulnerabilities-in-tp-link-omada-gateways-enable-remote-code-execution-z-f-2-7-o/gD2P6Ple2L
updated 2025-08-08T18:33:23
1 posts
updated 2025-07-09T19:09:18.207000
1 posts
webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? https://isc.sans.edu/diary/32410
##updated 2025-07-09T15:52:20
1 posts
10 repos
https://github.com/GTGalaxi/ElectronVulnerableVersion
https://github.com/mistymntncop/CVE-2023-4863
https://github.com/OITApps/Find-VulnerableElectronVersion
https://github.com/caoweiquan322/NotEnough
https://github.com/CrackerCat/CVE-2023-4863-
https://github.com/bbaranoff/CVE-2023-4863
https://github.com/talbeerysec/BAD-WEBP-CVE-2023-4863
https://github.com/huiwen-yayaya/CVE-2023-4863
CodeMender od Google DeepMind: AI, która sama znajduje i naprawia błędy bezpieczeństwa
Google DeepMind zaprezentowało wyniki badań nad CodeMender – nowym agentem AI zaprojektowanym do automatycznego poprawiania bezpieczeństwa kodu.
Rozwiązanie to ma odpowiadać na rosnący problem: choć tradycyjne metody i nowe narzędzia AI, takie jak Big Sleep czy OSS-Fuzz, są coraz skuteczniejsze w odkrywaniu luk, ich ręczne naprawianie jest czasochłonne. W miarę postępów w wykrywaniu podatności, programiści (ludzie) mogą przestać nadążać z ich usuwaniem.
Agent działa na dwa sposoby: reaktywnie, natychmiast łatając nowe luki, oraz proaktywnie, przepisując istniejący kod w celu wyeliminowania całych klas podatności. CodeMender wykorzystuje zdolności rozumowania modeli Gemini Deep Think, aby działać jako autonomiczny agent. Kluczowym elementem jest proces automatycznej walidacji, który gwarantuje, że proponowane poprawki są właściwe, nie powodują regresji (czyli nie psują innych funkcji w kodzie programu) i są zgodne z wytycznymi projektu, zanim zostaną przedstawione człowiekowi do weryfikacji.
Aby skutecznie znaleźć źródło problemu, CodeMender wykorzystuje zaawansowane techniki analizy programu, w tym analizę statyczną, dynamiczną i tzw. fuzzing (testowanie odporności kodu losowymi, celowo zniekształconymi danymi). Pozwala mu to zidentyfikować rzeczywistą przyczynę błędu, a nie tylko jego objawy – jak informuje Google DeepMind w swoim wpisie na oficjalnym blogu, w jednym z przykładów agent odkrył, że zgłaszany błąd przepełnienia bufora był w rzeczywistości spowodowany nieprawidłowym zarządzaniem stosu podczas parsowania XML. System korzysta również z wyspecjalizowanych agentów (systemy wieloagentowe), np. narzędzia opartego na LLM, które weryfikuje zmiany i pomaga w autokorekcie.
Google DeepMind poinformowało, że w ciągu ostatnich sześciu miesięcy, odkąd rozwijany jest CodeMender, zespół przesłał już 72 poprawki bezpieczeństwa do różnych projektów open source, z których wiele zostało już zaakceptowanych. Niektóre z tych projektów liczą nawet 4,5 miliona linii kodu. W ramach działań proaktywnych, CodeMender został użyty m.in. do biblioteki libwebp, aby dodać adnotacje -fbounds-safety. Mechanizm ten pomógłby zapobiec wykorzystaniu słynnej luki (CVE-2023-4863), która w przeszłości była używana do ataków na urządzenia z systemem iOS.
Badacze podkreślają, że choć wczesne wyniki są obiecujące, podchodzą do projektu ostrożnie, stawiając na niezawodność. Obecnie wszystkie poprawki generowane przez CodeMender są sprawdzane przez ekspertów DeepMind przed ich wysłaniem. Zespół planuje stopniowo zwiększać ten proces i kontaktować się z opiekunami krytycznych projektów open source, aby rozwijać własne dzieło na podstawie ich opinii. Celem jest udostępnienie CodeMender jako narzędzia, z którego będą mogli korzystać wszyscy programiści.
#AI #Bezpieczeństwo #CodeMender #cyberbezpieczeństwo #Gemini #GeminiDeepThink #Google #GoogleDeepMind #kod #lukiWOprogramowaniu #news #openSource #programowanie #sztucznaInteligencja
##updated 2025-07-02T18:30:42
1 posts
Cisco posted this yesterday, if you missed it:
CVE-2025-20307: Cisco BroadWorks CommPilot Application Software Cross-Site Scripting Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-broadworks-xss-O696ymRA @TalosSecurity #cybersecurity #infosec #Cisco
##updated 2025-05-07T15:31:49
1 posts
1 repos
https://github.com/watchtowrlabs/watchTowr-vs-SysAid-PreAuth-RCE-Chain
🚨PoC for SysAid PreAuth RCE Chain (CVE-2025-2775, CVE-2025-2776, CVE-2025-2777, CVE-2025-2778)
GitHub: https://github.com/watchtowrlabs/watchTowr-vs-SysAid-PreAuth-RCE-Chain
Write-up: https://labs.watchtowr.com/sysowned-your-friendly-rce-support-ticket/
##updated 2025-05-07T15:15:57.813000
1 posts
1 repos
https://github.com/watchtowrlabs/watchTowr-vs-SysAid-PreAuth-RCE-Chain
🚨PoC for SysAid PreAuth RCE Chain (CVE-2025-2775, CVE-2025-2776, CVE-2025-2777, CVE-2025-2778)
GitHub: https://github.com/watchtowrlabs/watchTowr-vs-SysAid-PreAuth-RCE-Chain
Write-up: https://labs.watchtowr.com/sysowned-your-friendly-rce-support-ticket/
##updated 2025-01-07T21:31:57
1 posts
updated 2024-12-19T12:32:50
1 posts
Bezpieczeństwo IoT nie może być traktowane po macoszemu! 🚨
Jan Adamski i Marcin Rytel podzielą się wynikami badań i testów penetracyjnych wybranych urządzeń IoT, pokazując, jak krytyczne luki mogą realnie zagrozić milionom użytkowników.
➡️ Poznaj autorską metodologię PMIoT, umożliwiającą wykrywanie podatności na wielu warstwach: od aplikacji mobilnych, przez komunikację sieciową, po analizę kryptograficzną.
➡️ Zobacz kulisy odkrycia CVE-2023-4617 (CVSS 10.0) - krytycznej luki umożliwiającej zdalny dostęp do popularnych urządzeń smart.
➡️ Poznaj bazę VARIoT, która agreguje informacje o podatnościach w świecie IoT.
➡️ Dowiedz się, jak przebiega proces odpowiedzialnego ujawniania podatności.
🎯 Nie przegap szansy i dowiedz się, jak realnie chronić użytkowników i systemy w erze IoT! Dołącz do #OMHconf 👉 https://bit.ly/OMH-bilety
##updated 2023-04-15T05:07:07
1 posts
1 repos
For today's morning 😭 injection for @neurovagrant we turn to a recent spike in res. proxy traffic from Sudan.
Some sleuthing led to an odd spike in CVE-2022-45460 (9.8 CVSS) traffic — a stack-based buffer overflow in Xiongmai NVR (Network Video Recorder) devices.
Nearly 20K source IPs (mostly res proxies) have been involved in the steady elevated campaign + spike in the last 30 days.
Tis unknown if the source country networks were "luck of the draw" or deliberately selected by the attacker.
##Critical authentication bypass flaw reported in Ubiquiti UniFi Access
Ubiquiti Networks disclosed a critical authentication bypass vulnerability (CVE-2025-52665) in its UniFi Access physical security management application affecting versions 3.3.22 through 3.4.31, which exposes the management API and could allow attackers to gain complete control over door access systems, modify permissions, create unauthorized credentials, and disable security controls.
**If you're using Ubiquiti UniFi Access for door control, make sure it's isolated from untrusted networks and very difficult to reach. It can be hacked to let attackers unlock doors and control your entire physical security system. Plan a very quick update to version 4.0.21 or newer and review your access logs for any suspicious door unlocks or new credentials that shouldn't exist.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-authentication-bypass-flaw-reported-in-ubiquiti-unifi-access-g-m-6-u-4/gD2P6Ple2L
Critical authentication bypass flaw reported in Ubiquiti UniFi Access
Ubiquiti Networks disclosed a critical authentication bypass vulnerability (CVE-2025-52665) in its UniFi Access physical security management application affecting versions 3.3.22 through 3.4.31, which exposes the management API and could allow attackers to gain complete control over door access systems, modify permissions, create unauthorized credentials, and disable security controls.
**If you're using Ubiquiti UniFi Access for door control, make sure it's isolated from untrusted networks and very difficult to reach. It can be hacked to let attackers unlock doors and control your entire physical security system. Plan a very quick update to version 4.0.21 or newer and review your access logs for any suspicious door unlocks or new credentials that shouldn't exist.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-authentication-bypass-flaw-reported-in-ubiquiti-unifi-access-g-m-6-u-4/gD2P6Ple2L
⚠️ CRITICAL: CVE-2025-62516 in TurboTenant landlord onboarding (≤2.0.0) lets unauthenticated remote attackers access Stripe payment & tenant data via APIs. Patch or restrict API access now! https://radar.offseq.com/threat/cve-2025-62516-cwe-200-exposure-of-sensitive-infor-60b50e0f #OffSeq #infosec #privacy #CVE2025_62516
##Trivalent 141.0.7390.127-440331 released:
This release pulls in V8 14.1.146.13, which fixes CVE-2025-12036. This V8 version was supposed to be pulled into Chromium in 141.0.7390.122. This issue has been ack'd by Google here: issues.chromium.org/issues/45435...
github.com/secureblue/T...
Release 141.0.7390.127-440331 ...
Google releases emergency security update for Chrome V8 Engine flaw
Google has released an emergency security update for Chrome patching CVE-2025-12036, a high-severity vulnerability in the V8 JavaScript engine. This is the second emergency Chrome patch in less than a week. Technical details remain restricted until most users apply the update. The patch is available as version 141.0.7390.122/.123 across Windows, Mac, Linux, and Android platforms.
**Google doesn't just push new emergency releases "just because". If you are using Google Chrome or other Chromium-based browsers (Edge, Brave, Vivaldi, Opera...) patch your browsers ASAP. Updating is trivial, all your tabs reopen.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/google-releases-emergency-security-update-for-chrome-v8-engine-flaw-n-f-j-i-c/gD2P6Ple2L
Hikvision
https://www.cve.org/CVERecord?id=CVE-2023-53691
https://www.cve.org/CVERecord?id=CVE-2024-58274
Sauter
https://www.cve.org/CVERecord?id=CVE-2025-41719
https://www.cve.org/CVERecord?id=CVE-2025-41720
https://www.cve.org/CVERecord?id=CVE-2025-41721
https://www.cve.org/CVERecord?id=CVE-2025-41722
https://www.cve.org/CVERecord?id=CVE-2025-41723
https://www.cve.org/CVERecord?id=CVE-2025-41724
Ghost Robotics
https://www.cve.org/CVERecord?id=CVE-2025-41108
https://www.cve.org/CVERecord?id=CVE-2025-41109
https://www.cve.org/CVERecord?id=CVE-2025-41110
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-60338
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60333
https://www.cve.org/CVERecord?id=CVE-2025-60334
https://www.cve.org/CVERecord?id=CVE-2025-60335
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60331
https://www.cve.org/CVERecord?id=CVE-2025-60332
OpenWRT
https://www.cve.org/CVERecord?id=CVE-2025-62525
https://www.cve.org/CVERecord?id=CVE-2025-62526
##Hikvision
https://www.cve.org/CVERecord?id=CVE-2023-53691
https://www.cve.org/CVERecord?id=CVE-2024-58274
Sauter
https://www.cve.org/CVERecord?id=CVE-2025-41719
https://www.cve.org/CVERecord?id=CVE-2025-41720
https://www.cve.org/CVERecord?id=CVE-2025-41721
https://www.cve.org/CVERecord?id=CVE-2025-41722
https://www.cve.org/CVERecord?id=CVE-2025-41723
https://www.cve.org/CVERecord?id=CVE-2025-41724
Ghost Robotics
https://www.cve.org/CVERecord?id=CVE-2025-41108
https://www.cve.org/CVERecord?id=CVE-2025-41109
https://www.cve.org/CVERecord?id=CVE-2025-41110
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-60338
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60333
https://www.cve.org/CVERecord?id=CVE-2025-60334
https://www.cve.org/CVERecord?id=CVE-2025-60335
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60331
https://www.cve.org/CVERecord?id=CVE-2025-60332
OpenWRT
https://www.cve.org/CVERecord?id=CVE-2025-62525
https://www.cve.org/CVERecord?id=CVE-2025-62526
##7-Zip users on Windows are urged to update their software after the disclosure of two “path traversal” vulnerabilities, CVE-2025-11001 and CVE-2025-11002.
##All versions of 7-Zip from 21.02 to 24.09 are at risk, and the sole mitigation is to upgrade to version 25.00 or later, where stricter handling of symbolic links resolves the risk.
7-Zip users on Windows are urged to update their software after the disclosure of two “path traversal” vulnerabilities, CVE-2025-11001 and CVE-2025-11002.
##All versions of 7-Zip from 21.02 to 24.09 are at risk, and the sole mitigation is to upgrade to version 25.00 or later, where stricter handling of symbolic links resolves the risk.