## Updated at UTC 2025-12-21T07:17:23.537050

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2025-14993 8.8 0.00% 1 0 2025-12-21T05:16:05.340000 A vulnerability was detected in Tenda AC18 15.03.05.05. This affects the functio
CVE-2025-9343 7.2 0.00% 1 0 2025-12-21T04:16:05.670000 The ELEX WordPress HelpDesk & Customer Ticketing System plugin for WordPress is
CVE-2025-12980 7.5 0.00% 1 0 2025-12-21T03:15:51.830000 The Post Grid Gutenberg Blocks for News, Magazines, Blog Websites – PostX plugin
CVE-2025-34290 0 0.00% 1 0 2025-12-20T20:15:50.553000 Versa SASE Client for Windows versions released between 7.8.7 and 7.9.4 contain
CVE-2025-14882 None 0.04% 1 0 2025-12-20T17:41:17 An API endpoint allowed access to sensitive files from other users by knowing th
CVE-2025-13619 9.8 0.07% 1 0 2025-12-20T07:15:44.197000 The Flex Store Users plugin for WordPress is vulnerable to Privilege Escalation
CVE-2025-13329 9.8 0.15% 1 0 2025-12-20T06:30:17 The File Uploader for WooCommerce plugin for WordPress is vulnerable to arbitrar
CVE-2025-63389 None 0.25% 1 0 2025-12-20T05:37:50 A critical authentication bypass vulnerability exists in Ollama platform's API e
CVE-2025-14761 5.3 0.02% 1 0 2025-12-20T05:31:03 ## Summary S3 Encryption Client for PHP is an open-source client-side encryptio
CVE-2025-68398 9.1 0.11% 1 0 2025-12-20T05:26:43 ### Impact It was possible to overwrite Git configuration remotely and override
CVE-2025-68129 6.8 0.06% 1 0 2025-12-20T05:14:17 ### Description In applications built with the Auth0-PHP SDK, the audience valid
CVE-2025-63390 5.3 0.05% 1 0 2025-12-19T22:15:52.180000 An authentication bypass vulnerability exists in AnythingLLM v1.8.5 in via the /
CVE-2025-34433 None 0.31% 1 0 2025-12-19T21:31:26 AVideo versions 14.3.1 prior to 20.1 contain an unauthenticated remote code exec
CVE-2025-34437 8.8 0.10% 1 0 2025-12-19T21:31:26 AVideo versions prior to 20.0 permit any authenticated user to upload comment im
CVE-2025-34436 8.8 0.10% 1 0 2025-12-19T19:15:51.073000 AVideo versions prior to 20.1 allow any authenticated user to upload files into
CVE-2025-14964 9.8 0.08% 2 0 2025-12-19T19:15:50.213000 A vulnerability has been found in TOTOLINK T10 4.1.8cu.5083_B20200521. This affe
CVE-2025-14733 9.8 31.40% 8 1 2025-12-19T19:15:48.973000 An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remot
CVE-2025-66909 7.5 0.08% 1 0 2025-12-19T18:32:24 Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an image decompres
CVE-2025-65567 7.5 0.04% 1 0 2025-12-19T18:32:20 A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp
CVE-2025-65564 7.5 0.05% 1 0 2025-12-19T18:32:19 A denial-of-service vulnerability exists in the omec-upf (upf-epc-pfcpiface) in
CVE-2025-65568 7.5 0.04% 1 0 2025-12-19T18:15:50.713000 A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp
CVE-2025-65565 7.5 0.05% 1 0 2025-12-19T18:15:50.277000 A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp
CVE-2025-41697 6.8 0.02% 1 0 2025-12-19T18:12:09.187000 An attacker can use an undocumented UART port on the PCB as a side-channel to
CVE-2025-41696 4.6 0.02% 1 0 2025-12-19T18:12:06.293000 An attacker can use an undocumented UART port on the PCB as a side-channel with
CVE-2025-41695 7.1 0.09% 1 0 2025-12-19T18:12:03.340000 An XSS vulnerability in dyn_conn.php can be used by an unauthenticated remote at
CVE-2025-14878 9.8 0.05% 2 0 2025-12-19T18:00:54.283000 A security flaw has been discovered in Tenda WH450 1.0.0.18. This impacts an unk
CVE-2025-64469 7.8 0.01% 1 0 2025-12-19T18:00:54.283000 There is a stack-based buffer overflow vulnerability in NI LabVIEW in LVResFile:
CVE-2025-64466 7.8 0.01% 1 0 2025-12-19T18:00:54.283000 There is an out of bounds read vulnerability in NI LabVIEW in lvre!ExecPostedPro
CVE-2025-65007 0 0.04% 1 0 2025-12-19T18:00:54.283000 In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) due to lack of
CVE-2025-66908 5.3 0.04% 1 0 2025-12-19T18:00:18.330000 Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an improper file t
CVE-2025-14881 0 0.04% 1 0 2025-12-19T18:00:18.330000 Multiple API endpoints allowed access to sensitive files from other users by kno
CVE-2025-1885 5.4 0.03% 1 0 2025-12-19T18:00:18.330000 URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Restajet In
CVE-2025-66522 6.3 0.03% 1 0 2025-12-19T18:00:18.330000 A stored cross-site scripting (XSS) vulnerability exists in the Digital IDs func
CVE-2025-52692 8.8 0.02% 1 0 2025-12-19T18:00:18.330000 Successful exploitation of the vulnerability could allow an attacker with local
CVE-2025-11774 8.2 0.03% 2 0 2025-12-19T18:00:18.330000 Improper Neutralization of Special Elements used in an OS Command ('OS Command I
CVE-2025-14908 6.3 0.06% 1 0 2025-12-19T18:00:18.330000 A security flaw has been discovered in JeecgBoot up to 3.9.0. The affected eleme
CVE-2025-14899 4.7 0.03% 1 0 2025-12-19T18:00:18.330000 A weakness has been identified in CodeAstro Real Estate Management System 1.0. T
CVE-2025-13427 0 0.12% 1 0 2025-12-19T18:00:18.330000 An authentication bypass vulnerability in Google Cloud Dialogflow CX Messenger a
CVE-2025-64677 8.2 0.07% 1 0 2025-12-19T18:00:18.330000 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2025-34452 0 0.38% 1 0 2025-12-19T18:00:18.330000 Streama versions 1.10.0 through 1.10.5 and prior to commit b7c8767 contain a com
CVE-2025-68161 0 0.03% 2 0 2025-12-19T18:00:18.330000 The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does
CVE-2025-64236 9.8 0.07% 1 0 2025-12-19T18:00:18.330000 Authentication Bypass Using an Alternate Path or Channel vulnerability in Amento
CVE-2025-14879 9.8 0.05% 2 0 2025-12-19T18:00:18.330000 A weakness has been identified in Tenda WH450 1.0.0.18. Affected is an unknown f
CVE-2025-14739 0 0.01% 1 0 2025-12-19T18:00:18.330000 Access of Uninitialized Pointer vulnerability in TP-Link WR940N and WR941ND allo
CVE-2025-41746 7.1 0.09% 1 0 2025-12-19T16:46:01.880000 An XSS vulnerability in pxc_portSecCfg.php can be used by an unauthenticated rem
CVE-2025-41750 7.1 0.09% 1 0 2025-12-19T16:45:56.357000 An XSS vulnerability in pxc_PortCfg.php can be used by an unauthenticated remote
CVE-2025-41745 7.1 0.09% 1 0 2025-12-19T16:09:15.357000 An XSS vulnerability in pxc_portCntr2.php can be used by an unauthenticated remo
CVE-2025-1928 9.1 0.05% 1 0 2025-12-19T15:31:25 Improper Restriction of Excessive Authentication Attempts vulnerability in Resta
CVE-2025-40602 6.6 1.42% 4 2 2025-12-19T13:57:43.150000 A local privilege escalation vulnerability due to insufficient authorization in
CVE-2025-1927 7.1 0.01% 1 0 2025-12-19T12:31:33 Cross-Site Request Forgery (CSRF) vulnerability in Restajet Information Technolo
CVE-2025-11747 6.4 0.03% 1 0 2025-12-19T09:30:39 The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site
CVE-2025-14151 6.1 0.09% 1 0 2025-12-19T09:30:39 The SlimStat Analytics plugin for WordPress is vulnerable to Stored Cross-Site S
CVE-2025-66521 6.3 0.02% 1 0 2025-12-19T09:30:39 A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com
CVE-2025-66520 6.3 0.03% 1 0 2025-12-19T09:30:39 A stored cross-site scripting (XSS) vulnerability exists in the Portfolio featur
CVE-2025-68491 None 0.00% 1 0 2025-12-19T06:30:34 Rejected reason: Not used
CVE-2025-68488 None 0.00% 1 0 2025-12-19T06:30:34 Rejected reason: Not used
CVE-2025-68487 None 0.00% 1 0 2025-12-19T06:30:34 Rejected reason: Not used
CVE-2025-68490 0 0.00% 1 0 2025-12-19T04:16:02.083000 Rejected reason: Not used
CVE-2025-68489 0 0.00% 1 0 2025-12-19T04:16:02.017000 Rejected reason: Not used
CVE-2025-67843 8.3 0.23% 1 0 2025-12-19T03:31:18 A Server-Side Template Injection (SSTI) vulnerability in the MDX Rendering Engin
CVE-2025-13941 8.8 0.01% 1 0 2025-12-19T03:31:18 A local privilege escalation vulnerability exists in the Foxit PDF Reader/Editor
CVE-2025-14900 4.7 0.03% 1 0 2025-12-19T03:31:18 A security vulnerability has been detected in CodeAstro Real Estate Management S
CVE-2025-64675 8.3 0.08% 1 0 2025-12-19T00:31:52 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2025-68382 6.5 0.04% 1 0 2025-12-19T00:31:47 Out-of-bounds read (CWE-125) allows an unauthenticated remote attacker to perfor
CVE-2025-65037 10.0 0.10% 1 0 2025-12-19T00:31:47 Improper control of generation of code ('code injection') in Azure Container App
CVE-2025-64663 10.0 0.08% 1 0 2025-12-19T00:31:47 Custom Question Answering Elevation of Privilege Vulnerability
CVE-2025-65041 10.0 0.09% 2 0 2025-12-19T00:31:46 Improper authorization in Microsoft Partner Center allows an unauthorized attack
CVE-2025-68381 6.5 0.04% 1 0 2025-12-19T00:31:46 Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated
CVE-2025-64676 7.2 0.11% 1 0 2025-12-19T00:31:46 '.../...//' in Microsoft Purview allows an authorized attacker to execute code o
CVE-2025-68463 4.9 0.03% 1 0 2025-12-18T22:16:30 Bio.Entrez in Biopython through 1.86 allows doctype XXE.
CVE-2025-53000 None 0.02% 1 0 2025-12-18T22:03:09 ### Summary On Windows, converting a notebook containing SVG output to a PDF re
CVE-2025-64374 10.0 0.04% 1 0 2025-12-18T21:32:49 Unrestricted Upload of File with Dangerous Type vulnerability in StylemixThemes
CVE-2025-68434 8.8 0.08% 1 1 2025-12-18T19:45:54.187000 Open Source Point of Sale (opensourcepos) is a web based point of sale applicati
CVE-2025-14837 4.7 0.04% 1 0 2025-12-18T19:16:22.103000 A vulnerability has been found in ZZCMS 2025. Affected by this issue is the func
CVE-2023-53933 8.8 0.24% 1 0 2025-12-18T19:16:20.433000 Serendipity 2.4.0 contains a remote code execution vulnerability that allows aut
CVE-2025-66397 8.3 0.04% 1 0 2025-12-18T19:07:25.637000 ChurchCRM is an open-source church management system. Prior to version 6.5.3, th
CVE-2025-14764 5.3 0.01% 1 0 2025-12-18T18:50:44 ## Summary S3 Encryption Client for Go is an open-source client-side encryption
CVE-2025-14884 7.2 0.19% 2 0 2025-12-18T18:30:38 A vulnerability was detected in D-Link DIR-605 202WWB03. Affected by this issue
CVE-2025-14896 7.5 0.03% 1 0 2025-12-18T18:30:37 due to insufficient sanitazation in Vega’s `convert()` function when `safeMode`
CVE-2025-14737 None 0.42% 1 0 2025-12-18T18:30:37 Command Injection vulnerability in TP-Link WA850RE (httpd modules) allows authen
CVE-2025-14738 None 0.06% 1 0 2025-12-18T18:30:37 Improper authentication vulnerability in TP-Link WA850RE (httpd modules) allows
CVE-2025-63391 7.5 0.08% 1 0 2025-12-18T18:30:37 An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api
CVE-2025-37164 10.0 70.93% 3 2 template 2025-12-18T17:15:47.853000 A remote code execution issue exists in HPE OneView.
CVE-2025-68399 5.4 0.03% 1 0 2025-12-18T16:47:11.970000 ChurchCRM is an open-source church management system. In versions prior to 6.5.4
CVE-2025-68401 4.8 0.03% 1 0 2025-12-18T16:44:00.020000 ChurchCRM is an open-source church management system. Prior to version 6.0.0, th
CVE-2025-14763 5.3 0.01% 1 0 2025-12-18T15:47:08 ## Summary S3 Encryption Client for Java is an open-source client-side encrypti
CVE-2025-14759 5.3 0.01% 1 0 2025-12-18T15:46:18 ## Summary S3 Encryption Client for .NET (S3EC) is an open-source client-side e
CVE-2025-59374 9.8 30.46% 5 0 2025-12-18T15:42:03.790000 "UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were
CVE-2025-20393 10.0 4.56% 15 6 2025-12-18T15:41:16.840000 Cisco is aware of a potential vulnerability.&nbsp; Cisco is currently investigat
CVE-2025-64468 7.8 0.01% 1 0 2025-12-18T15:30:51 There is a use-after-free vulnerability in sentry!sentry_span_set_data() when pa
CVE-2025-13110 4.3 0.03% 1 0 2025-12-18T15:30:51 The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is
CVE-2025-14437 7.5 0.06% 1 0 2025-12-18T15:30:51 The Hummingbird Performance plugin for WordPress is vulnerable to Sensitive Info
CVE-2025-64467 7.8 0.01% 1 0 2025-12-18T15:30:45 There is an out of bounds read vulnerability in NI LabVIEW in LVResFile::FindRsr
CVE-2025-64465 7.8 0.01% 1 0 2025-12-18T15:30:45 There is an out of bounds read vulnerability in NI LabVIEW in lvre!DataSizeTDR()
CVE-2025-46295 9.8 0.25% 1 0 2025-12-18T15:08:06.237000 Apache Commons Text versions prior to 1.10.0 included interpolation features tha
CVE-2025-68459 7.2 0.17% 2 0 2025-12-18T15:07:42.550000 RG - AP180, Indoor Wall Plate Wireless AP AP180 series provided by Ruijie Networ
CVE-2025-68462 3.2 0.01% 1 0 2025-12-18T15:07:42.550000 Freedombox before 25.17.1 does not set proper permissions for the backups-data d
CVE-2025-47382 7.8 0.01% 1 0 2025-12-18T15:07:42.550000 Memory corruption while loading an invalid firmware in boot loader.
CVE-2025-14841 3.3 0.01% 1 0 2025-12-18T15:07:42.550000 A flaw has been found in OFFIS DCMTK up to 3.6.9. The impacted element is the fu
CVE-2025-67073 9.8 0.15% 1 0 2025-12-18T15:07:42.550000 A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in
CVE-2025-14762 5.3 0.02% 1 0 2025-12-18T15:07:42.550000 Missing cryptographic key commitment in the AWS SDK for Ruby may allow a user wi
CVE-2025-14618 4.3 0.03% 1 0 2025-12-18T15:07:18.427000 The Sweet Energy Efficiency plugin for WordPress is vulnerable to unauthorized a
CVE-2025-14277 4.3 0.03% 1 0 2025-12-18T15:07:18.427000 The Prime Slider – Addons for Elementor plugin for WordPress is vulnerable to Se
CVE-2025-10910 None 0.14% 2 0 2025-12-18T12:30:33 A flaw in the binding process of Govee’s cloud platform and devices allows a rem
CVE-2025-47372 9.0 0.02% 1 0 2025-12-18T06:30:19 Memory Corruption when a corrupted ELF image with an oversized file size is read
CVE-2025-47387 7.8 0.01% 1 0 2025-12-18T06:30:19 Memory Corruption when processing IOCTLs for JPEG data without verification.
CVE-2025-14856 6.3 0.04% 1 0 2025-12-18T03:30:18 A security vulnerability has been detected in y_project RuoYi up to 4.8.1. The a
CVE-2025-12885 6.4 0.03% 1 0 2025-12-18T03:30:18 The Embed Any Document – Embed PDF, Word, PowerPoint and Excel Files plugin for
CVE-2025-14202 None 0.05% 2 0 2025-12-18T00:34:16 A vulnerability in the file upload at bookmark + asset rendering pipeline allows
CVE-2025-59718 9.8 5.57% 3 2 2025-12-17T13:54:45.390000 A improper verification of cryptographic signature vulnerability in Fortinet For
CVE-2025-68154 8.1 0.05% 1 0 2025-12-16T22:37:26 ## Summary The `fsSize()` function in `systeminformation` is vulnerable to **OS
CVE-2025-68260 None 0.02% 2 0 2025-12-16T15:30:56 In the Linux kernel, the following vulnerability has been resolved: rust_binder
CVE-2025-55182 10.0 44.14% 4 100 template 2025-12-10T02:00:02.557000 A pre-authentication remote code execution vulnerability exists in React Server
CVE-2025-59719 9.8 0.07% 2 0 2025-12-09T18:30:52 An improper verification of cryptographic signature vulnerability in Fortinet Fo
CVE-2025-41749 7.1 0.09% 1 0 2025-12-09T18:30:45 An XSS vulnerability in port_util.php can be used by an unauthenticated remote a
CVE-2025-41747 7.1 0.09% 1 0 2025-12-09T18:30:44 An XSS vulnerability in pxc_vlanIntfCfg.php can be used by an unauthenticated re
CVE-2025-41748 7.1 0.09% 1 0 2025-12-09T18:30:44 An XSS vulnerability in pxc_Dot1xCfg.php can be used by an unauthenticated remot
CVE-2025-41751 7.1 0.09% 1 0 2025-12-09T18:30:44 An XSS vulnerability in pxc_portCntr.php can be used by an unauthenticated remot
CVE-2025-41752 7.1 0.09% 1 0 2025-12-09T18:30:44 An XSS vulnerability in pxc_portSfp.php can be used by an unauthenticated remote
CVE-2025-41694 6.5 0.11% 1 0 2025-12-09T18:30:43 A low privileged remote attacker can run the webshell with an empty command cont
CVE-2025-41692 6.8 0.02% 1 0 2025-12-09T18:30:43 A high privileged remote attacker with admin privileges for the webUI can brute-
CVE-2025-41693 4.3 0.23% 1 0 2025-12-09T18:30:43 A low privileged remote attacker can use the ssh feature to execute commands dir
CVE-2025-66471 None 0.02% 1 0 2025-12-05T18:33:09 ### Impact urllib3's [streaming API](https://urllib3.readthedocs.io/en/2.5.0/ad
CVE-2025-65945 7.5 0.01% 1 1 2025-12-04T22:50:04 ### Overview An improper signature verification vulnerability exists when using
CVE-2025-34352 0 0.02% 1 0 2025-12-04T17:15:25.860000 JumpCloud Remote Assist for Windows versions prior to 0.317.0 include an uninsta
CVE-2025-66478 0 0.00% 1 100 2025-12-03T18:15:47.200000 Rejected reason: This CVE is a duplicate of CVE-2025-55182.
CVE-2025-40300 None 0.06% 1 0 2025-11-17T18:30:25 In the Linux kernel, the following vulnerability has been resolved: x86/vmscape
CVE-2025-9242 9.8 73.45% 1 2 template 2025-11-14T02:00:02.350000 An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remot
CVE-2025-7962 7.5 0.01% 1 0 2025-11-13T18:36:55.173000 In Jakarta Mail 2.0.2 it is possible to preform a SMTP Injection by utilizing th
CVE-2025-12480 9.1 74.31% 1 0 template 2025-11-12T15:32:32 Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access
CVE-2025-59287 9.8 76.76% 1 21 template 2025-11-11T15:32:22 Deserialization of untrusted data in Windows Server Update Service allows an una
CVE-2025-53066 7.5 0.09% 1 0 2025-11-03T18:31:47 Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Ente
CVE-2025-53057 5.9 0.07% 1 0 2025-11-03T18:16:56.973000 Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Ente
CVE-2025-61882 9.8 76.34% 1 13 template 2025-10-27T17:08:52.230000 Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business S
CVE-2025-31324 10.0 43.91% 1 19 template 2025-10-22T00:34:21 SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper a
CVE-2025-23006 9.8 53.22% 1 0 2025-10-22T00:34:17 Pre-authentication deserialization of untrusted data vulnerability has been iden
CVE-2024-53704 9.8 93.82% 1 1 template 2025-10-22T00:34:16 An Improper Authentication vulnerability in the SSLVPN authentication mechanism
CVE-2025-49146 8.2 0.01% 1 0 2025-10-06T19:29:58.977000 pgjdbc is an open source postgresql JDBC Driver. From 42.7.4 and until 42.7.7, w
CVE-2025-25231 7.5 10.75% 1 1 template 2025-08-11T21:31:39 Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerabil
CVE-2025-30023 9.0 1.92% 2 0 2025-07-15T13:14:49.980000 The communication protocol used between client and server had a flaw that could
CVE-2025-30026 0 0.03% 2 0 2025-07-15T13:14:49.980000 The AXIS Camera Station Server had a flaw that allowed to bypass authentication
CVE-2025-5516 2.4 0.05% 1 0 2025-06-06T17:42:29.520000 A vulnerability, which was classified as problematic, was found in TOTOLINK X200
CVE-2025-2039 4.7 0.09% 1 5 2025-05-13T20:57:18.117000 A vulnerability classified as critical has been found in code-projects Blood Ban
CVE-2025-32210 6.5 0.03% 1 0 2025-04-10T09:30:32 Missing Authorization vulnerability in CreativeMindsSolutions CM Registration an
CVE-2024-44067 8.4 0.04% 1 0 2024-08-20T20:35:34.497000 The T-Head XuanTie C910 CPU in the TH1520 SoC and the T-Head XuanTie C920 CPU in
CVE-2025-66580 0 0.15% 1 0 N/A
CVE-2025-68613 0 0.22% 1 0 N/A
CVE-2025-14282 0 0.00% 1 0 N/A
CVE-2025-66387 0 0.00% 1 0 N/A
CVE-2025-67745 0 0.02% 1 0 N/A
CVE-2025-63821 0 0.00% 1 1 N/A
CVE-2025-63820 0 0.00% 1 1 N/A
CVE-2025-66029 0 0.03% 1 0 N/A
CVE-2025-68435 0 0.07% 2 0 N/A
CVE-2025-68147 0 0.03% 1 1 N/A
CVE-2025-68400 0 0.03% 1 0 N/A
CVE-2025-68275 0 0.03% 1 0 N/A
CVE-2025-14760 0 0.02% 1 0 N/A

CVE-2025-14993
(8.8 HIGH)

EPSS: 0.00%

updated 2025-12-21T05:16:05.340000

1 posts

A vulnerability was detected in Tenda AC18 15.03.05.05. This affects the function sprintf of the file /goform/SetDlnaCfg of the component HTTP Request Handler. The manipulation of the argument scanList results in stack-based buffer overflow. The attack can be executed remotely. The exploit is now public and may be used.

offseq at 2025-12-21T05:36:01.423Z ##

🚨 CVE-2025-14993 (HIGH): Stack-based buffer overflow in Tenda AC18 (v15.03.05.05) via /goform/SetDlnaCfg. Public exploit out—disable DLNA, segment networks, monitor for attacks. Patch ASAP when available! radar.offseq.com/threat/cve-20

##

CVE-2025-9343
(7.2 HIGH)

EPSS: 0.00%

updated 2025-12-21T04:16:05.670000

1 posts

The ELEX WordPress HelpDesk & Customer Ticketing System plugin for WordPress is vulnerable to Stored Cross-Site Scripting via ticket subjects in all versions up to, and including, 3.3.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

offseq at 2025-12-21T04:04:58.204Z ##

🔒 HIGH severity XSS (CVE-2025-9343) in ELEX WordPress HelpDesk plugin—ALL versions affected. Unauthenticated attackers can inject scripts in ticket subjects, risking session hijack & data theft. Patch or mitigate now! Details: radar.offseq.com/threat/cve-20

##

CVE-2025-12980
(7.5 HIGH)

EPSS: 0.00%

updated 2025-12-21T03:15:51.830000

1 posts

The Post Grid Gutenberg Blocks for News, Magazines, Blog Websites – PostX plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the '/ultp/v2/get_dynamic_content/' REST API endpoint in all versions up to, and including, 5.0.3. This makes it possible for unauthenticated attackers to retrieve sensitive user metadata, including password hashes.

offseq at 2025-12-21T03:03:28.257Z ##

🔎 CVE-2025-12980 (HIGH): All PostX WordPress plugin versions up to 5.0.3 allow unauthenticated access to user metadata & password hashes via the '/ultp/v2/get_dynamic_content/' REST API endpoint. Patch or restrict ASAP! radar.offseq.com/threat/cve-20

##

CVE-2025-34290
(0 None)

EPSS: 0.00%

updated 2025-12-20T20:15:50.553000

1 posts

Versa SASE Client for Windows versions released between 7.8.7 and 7.9.4 contain a local privilege escalation vulnerability in the audit log export functionality. The client communicates user-controlled file paths to a privileged service, which performs file system operations without impersonating the requesting user. Due to improper privilege handling and a time-of-check time-of-use race condition

offseq at 2025-12-21T01:35:38.505Z ##

⚠️ CVE-2025-34290: HIGH severity local privilege escalation in Versa SASE Client for Windows (7.8.7–7.9.4). Authenticated users can exploit audit log export to gain SYSTEM rights. Patch and restrict local access! radar.offseq.com/threat/cve-20

##

CVE-2025-14882(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-12-20T17:41:17

1 posts

An API endpoint allowed access to sensitive files from other users by knowing the UUID of the file that were not intended to be accessible by UUID only.

CVE-2025-13619
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-12-20T07:15:44.197000

1 posts

The Flex Store Users plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.1.0. This is due to the 'fsUserHandle::signup' and the 'fsSellerRole::add_role_seller' functions not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administ

offseq at 2025-12-20T08:05:37.961Z ##

⚠️ CRITICAL: CVE-2025-13619 impacts all versions of CMSSuperHeroes Flex Store Users plugin for WordPress. Unauthenticated attackers can create admin accounts via improper privilege checks. Disable plugin, audit users, monitor for updates. radar.offseq.com/threat/cve-20

##

CVE-2025-13329
(9.8 CRITICAL)

EPSS: 0.15%

updated 2025-12-20T06:30:17

1 posts

The File Uploader for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the callback function for the 'add-image-data' REST API endpoint in all versions up to, and including, 1.0.3. This makes it possible for unauthenticated attackers to upload arbitrary files to the Uploadcare service and subsequently download them on the affected site

offseq at 2025-12-20T04:04:30.834Z ##

🚨 CRITICAL: CVE-2025-13329 in snowray File Uploader for WooCommerce lets unauthenticated users upload malicious files via REST API (all versions ≤1.0.3). RCE risk—disable plugin or restrict API. No patch yet. radar.offseq.com/threat/cve-20

##

CVE-2025-63389(CVSS UNKNOWN)

EPSS: 0.25%

updated 2025-12-20T05:37:50

1 posts

A critical authentication bypass vulnerability exists in Ollama platform's API endpoints in versions prior to and including v0.12.3. The platform exposes multiple API endpoints without requiring authentication, enabling remote attackers to perform unauthorized model management operations.

cR0w@infosec.exchange at 2025-12-18T15:29:52.000Z ##

Go hack more AI shit.

cve.org/CVERecord?id=CVE-2025-

A critical authentication bypass vulnerability exists in Ollama platform's API endpoints in versions prior to and including v0.12.3. The platform exposes multiple API endpoints without requiring authentication, enabling remote attackers to perform unauthorized model management operations.

##

CVE-2025-14761
(5.3 MEDIUM)

EPSS: 0.02%

updated 2025-12-20T05:31:03

1 posts

## Summary S3 Encryption Client for PHP is an open-source client-side encryption library used to facilitate writing and reading encrypted records to S3. When the encrypted data key (EDK) is stored in an "Instruction File" instead of S3's metadata record, the EDK is exposed to an "Invisible Salamanders" attack (https://eprint.iacr.org/2019/016), which could allow the EDK to be replaced with a

CVE-2025-68398
(9.1 CRITICAL)

EPSS: 0.11%

updated 2025-12-20T05:26:43

1 posts

### Impact It was possible to overwrite Git configuration remotely and override some of its behavior. ### Resources Thanks to Jason Marcello for responsible disclosure.

jos1264@social.skynetcloud.site at 2025-12-19T02:30:01.000Z ##

CVE-2025-68398 - Weblate has git config file overwrite vulnerability that leads to remote code execution cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68129
(6.8 MEDIUM)

EPSS: 0.06%

updated 2025-12-20T05:14:17

1 posts

### Description In applications built with the Auth0-PHP SDK, the audience validation in access tokens is performed improperly. Without proper validation, affected applications may accept ID tokens as Access tokens. ### Affected product and versions Projects are affected if they meet the following preconditions: - Applications using the Auth0-PHP SDK, versions between v8.0.0 and v8.17.0, or - App

jos1264@social.skynetcloud.site at 2025-12-17T22:45:01.000Z ##

CVE-2025-68129 - Auth0-PHP SDK has Improper Audience Validation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-63390
(5.3 MEDIUM)

EPSS: 0.05%

updated 2025-12-19T22:15:52.180000

1 posts

An authentication bypass vulnerability exists in AnythingLLM v1.8.5 in via the /api/workspaces endpoint. The endpoint fails to implement proper authentication checks, allowing unauthenticated remote attackers to enumerate and retrieve detailed information about all configured workspaces. Exposed data includes: workspace identifiers (id, name, slug), AI model configurations (chatProvider, chatModel

CVE-2025-34433(CVSS UNKNOWN)

EPSS: 0.31%

updated 2025-12-19T21:31:26

1 posts

AVideo versions 14.3.1 prior to 20.1 contain an unauthenticated remote code execution vulnerability caused by predictable generation of an installation salt using PHP uniqid(). The installation timestamp is exposed via a public endpoint, and a derived hash identifier is accessible through unauthenticated API responses, allowing attackers to brute-force the remaining entropy. The recovered salt can

offseq at 2025-12-20T05:35:10.890Z ##

🚨 CVE-2025-34433: CRITICAL RCE in AVideo ≤14.3.1. Predictable salts + exposed endpoints = unauthenticated code execution! Upgrade to 20.1+ or lock down vulnerable APIs. Full details: radar.offseq.com/threat/cve-20

##

CVE-2025-34437
(8.8 HIGH)

EPSS: 0.10%

updated 2025-12-19T21:31:26

1 posts

AVideo versions prior to 20.0 permit any authenticated user to upload comment images to videos owned by other users. The endpoint validates authentication but omits ownership checks, allowing attackers to perform unauthorized uploads to arbitrary video objects.

jos1264@social.skynetcloud.site at 2025-12-17T22:30:01.000Z ##

CVE-2025-34437 - AVideo < 20.0 IDOR Arbitrary Comment Image Upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-34436
(8.8 HIGH)

EPSS: 0.10%

updated 2025-12-19T19:15:51.073000

1 posts

AVideo versions prior to 20.1 allow any authenticated user to upload files into directories belonging to other users due to an insecure direct object reference. The upload functionality verifies authentication but does not enforce ownership checks.

CVE-2025-14964
(9.8 CRITICAL)

EPSS: 0.08%

updated 2025-12-19T19:15:50.213000

2 posts

A vulnerability has been found in TOTOLINK T10 4.1.8cu.5083_B20200521. This affects the function sprintf of the file /cgi-bin/cstecgi.cgi. Such manipulation of the argument loginAuthUrl leads to stack-based buffer overflow. The attack may be performed from remote.

offseq at 2025-12-20T01:06:28.442Z ##

CRITICAL: CVE-2025-14964 in TOTOLINK T10 (v4.1.8cu.5083_B20200521) enables remote stack buffer overflow—RCE possible, no auth needed! Isolate, restrict access, and monitor for malicious loginAuthUrl usage. Patch or replace ASAP. radar.offseq.com/threat/cve-20

##

cR0w@infosec.exchange at 2025-12-19T19:20:07.000Z ##

TOTOLINK

cve.org/CVERecord?id=CVE-2025-

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-14733
(9.8 CRITICAL)

EPSS: 31.40%

updated 2025-12-19T19:15:48.973000

8 posts

An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.5 and

1 repos

https://github.com/Ashwesker/Blackash-CVE-2025-14733

offseq at 2025-12-20T09:35:15.098Z ##

⚠️ Active exploitation alert: WatchGuard Fireware OS hit by CRITICAL VPN vuln (CVE-2025-14733). Remote, unauthenticated RCE risk via IKEv2 configs. Patch now, restrict VPN access, and monitor logs for large CERT payloads. More: radar.offseq.com/threat/watchg

##

DarkWebInformer@infosec.exchange at 2025-12-19T21:00:51.000Z ##

🚨 CISA has added 1 vulnerability to the KEV Catalog

CVE-2025-14733: WatchGuard Firebox Out of Bounds Write Vulnerability

CVSS: 9.3

darkwebinformer.com/cisa-kev-c

##

cisakevtracker@mastodon.social at 2025-12-19T19:00:57.000Z ##

CVE ID: CVE-2025-14733
Vendor: WatchGuard
Product: Firebox
Date Added: 2025-12-19
Notes: Check for signs of potential compromise on all internet accessible instances after applying mitigations. For more information please see: watchguard.com/wgrd-psirt/advi ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

beyondmachines1@infosec.exchange at 2025-12-19T18:01:59.000Z ##

Critical actively exploited flaw in WatchGuard Fireware OS enables remote code execution through VPN service

WatchGuard patched a critical vulnerability (CVE-2025-14733) in Fireware OS that allows remote unauthenticated attackers to execute arbitrary code on devices with IKEv2 VPN configurations. The flaw is actively being exploited in the wild.

**If you have WatchGuard Firebox firewalls, you are under attack. Make a very quick update to the latest security updates from WatchGuard. After patching, change all passwords and security keys stored on the device, especially if you've ever used IKEv2 VPN configurations (even if now deleted). Old settings can still leave your firewall vulnerable.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

securityland@mastodon.social at 2025-12-19T13:24:20.000Z ##

Analysis of CVE-2025-14733, a critical WatchGuard Firebox security vulnerability. Learn why unauthenticated RCE persists even after deleting vulnerable VPN configurations.

#SecurityLand #CyberWatch #ZeroDay #Watchguard #SecurityVulnerability #Firewall #CVE

Read More: security.land/watchguard-cve-2

##

defendopsdiaries@infosec.exchange at 2025-12-19T10:37:04.000Z ##

Hackers can now take over WatchGuard Firebox firewalls with zero passwords needed, putting entire networks at risk. Is your organization’s gateway already compromised?

thedefendopsdiaries.com/exploi

##

jos1264@social.skynetcloud.site at 2025-12-19T02:30:01.000Z ##

CVE-2025-14733 - WatchGuard Firebox iked Out of Bounds Write Vulnerability cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-19T02:15:01.000Z ##

CVE-2025-14733 - WatchGuard Firebox iked Out of Bounds Write Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66909
(7.5 HIGH)

EPSS: 0.08%

updated 2025-12-19T18:32:24

1 posts

Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an image decompression bomb denial of service vulnerability. The ExtendedOpenCVImage class in ai/djl/opencv/ExtendedOpenCVImage.java loads images using OpenCV's imread() function without validating dimensions or pixel count before decompression. An attacker can upload a specially crafted compressed image file (e.g., PNG) that is small w

CVE-2025-65567
(7.5 HIGH)

EPSS: 0.04%

updated 2025-12-19T18:32:20

1 posts

A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2.1.3-dev. After PFCP association, a specially crafted PFCP Session Establishment Request with a CreatePDR that contains a malformed Flow-Description is not robustly validated. The Flow-Description parser (parseFlowDesc) can read beyond the bounds of the provided buffer, causing a pa

jos1264@social.skynetcloud.site at 2025-12-18T20:30:01.000Z ##

CVE-2025-65567 - OmeC-Project UPF Denial-of-Service Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65564
(7.5 HIGH)

EPSS: 0.05%

updated 2025-12-19T18:32:19

1 posts

A denial-of-service vulnerability exists in the omec-upf (upf-epc-pfcpiface) in version upf-epc-pfcpiface:2.1.3-dev. When the UPF receives a PFCP Association Setup Request that is missing the mandatory Recovery Time Stamp Information Element, the association setup handler dereferences a nil pointer via IE.RecoveryTimeStamp() instead of validating the message. This results in a panic and terminates

CVE-2025-65568
(7.5 HIGH)

EPSS: 0.04%

updated 2025-12-19T18:15:50.713000

1 posts

A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2.1.3-dev. After PFCP association, a PFCP Session Establishment Request that includes a CreateFAR with an empty or truncated IPv4 address field is not properly validated. During parsing, parseFAR() calls ip2int(), which performs an out-of-bounds read on the IPv4 address buffer and tr

jos1264@social.skynetcloud.site at 2025-12-18T20:30:01.000Z ##

CVE-2025-65568 - OmeC-Project UPF pfcpiface Denial-of-Service Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65565
(7.5 HIGH)

EPSS: 0.05%

updated 2025-12-19T18:15:50.277000

1 posts

A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2.1.3-dev. After PFCP association is established, a PFCP Session Establishment Request that is missing the mandatory F-SEID (CPF-SEID) Information Element is not properly validated. The session establishment handler calls IE.FSEID() on a nil pointer, which triggers a panic and termin

jos1264@social.skynetcloud.site at 2025-12-18T20:30:00.000Z ##

CVE-2025-65565 - "OmeC-Project UPF pfcpiface Denial-of-Service Vulnerability" cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-41697
(6.8 MEDIUM)

EPSS: 0.02%

updated 2025-12-19T18:12:09.187000

1 posts

An attacker can use an undocumented UART port on the PCB as a side-channel to get root access e.g. with the credentials obtained from CVE-2025-41692.

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41696
(4.6 MEDIUM)

EPSS: 0.02%

updated 2025-12-19T18:12:06.293000

1 posts

An attacker can use an undocumented UART port on the PCB as a side-channel with the user hardcoded credentials obtained from CVE-2025-41692 to gain read access to parts of the filesystem of the device.

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41695
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-19T18:12:03.340000

1 posts

An XSS vulnerability in dyn_conn.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device confi

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-14878
(9.8 CRITICAL)

EPSS: 0.05%

updated 2025-12-19T18:00:54.283000

2 posts

A security flaw has been discovered in Tenda WH450 1.0.0.18. This impacts an unknown function of the file /goform/wirelessRestart of the component HTTP Request Handler. The manipulation of the argument GO results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be exploited.

CVE-2025-64469
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-19T18:00:54.283000

1 posts

There is a stack-based buffer overflow vulnerability in NI LabVIEW in LVResFile::FindRsrcListEntry() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64469 - Stack-based Buffer Overflow in LVResource::DetachResource() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64466
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-19T18:00:54.283000

1 posts

There is an out of bounds read vulnerability in NI LabVIEW in lvre!ExecPostedProcRecPost() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64466 - Out-of-Bounds Read in lvre!ExecPostedProcRecPost() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65007
(0 None)

EPSS: 0.04%

updated 2025-12-19T18:00:54.283000

1 posts

In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) due to lack of authentication in the configuration change module in the adm.cgi endpoint, the unauthenticated attacker can execute commands including backup creation, device restart and resetting the device to factory settings. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerabil

CVE-2025-66908
(5.3 MEDIUM)

EPSS: 0.04%

updated 2025-12-19T18:00:18.330000

1 posts

Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an improper file type validation vulnerability in the OCR image upload functionality. The OcrController in turms-ai-serving/src/main/java/im/turms/ai/domain/ocr/controller/OcrController.java uses the @FormData(contentType = MediaTypeConst.IMAGE) annotation to restrict uploads to image files, but this constraint is not properly enforced.

CVE-2025-14881
(0 None)

EPSS: 0.04%

updated 2025-12-19T18:00:18.330000

1 posts

Multiple API endpoints allowed access to sensitive files from other users by knowing the UUID of the file that were not intended to be accessible by UUID only.

CVE-2025-1885
(5.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-19T18:00:18.330000

1 posts

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Restajet Information Technologies Inc. Online Food Delivery System allows Phishing, Forceful Browsing.This issue affects Online Food Delivery System: through 19122025.

jos1264@social.skynetcloud.site at 2025-12-19T13:30:01.000Z ##

CVE-2025-1885 - Open Redirect in Restajet's Online Food Delivery System cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66522
(6.3 MEDIUM)

EPSS: 0.03%

updated 2025-12-19T18:00:18.330000

1 posts

A stored cross-site scripting (XSS) vulnerability exists in the Digital IDs functionality of the Foxit PDF Editor Cloud (pdfonline.foxit.com). The application does not properly sanitize or encode the Common Name field of Digital IDs before inserting user-supplied content into the DOM. As a result, embedded HTML or JavaScript may execute whenever the Digital IDs dialog is accessed or when the affec

jos1264@social.skynetcloud.site at 2025-12-19T09:15:01.000Z ##

CVE-2025-66522 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Digital IDs Common Name Field cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-52692
(8.8 HIGH)

EPSS: 0.02%

updated 2025-12-19T18:00:18.330000

1 posts

Successful exploitation of the vulnerability could allow an attacker with local network access to send a specially crafted URL to access certain administration functions without login credentials.

CVE-2025-11774
(8.2 HIGH)

EPSS: 0.03%

updated 2025-12-19T18:00:18.330000

2 posts

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the software keyboard function (hereinafter referred to as "keypad function") of Mitsubishi Electric GENESIS64 versions 10.97.2 CFR3 and prior, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.2 CFR3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.2 CFR3 and

jos1264@social.skynetcloud.site at 2025-12-19T02:30:01.000Z ##

CVE-2025-11774 - Malicious Code Execution Vulnerability in the Software Keyboard Function of GENESIS64, ICONICS Suite, Mobile HMI, and MC Works64 cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-19T02:15:00.000Z ##

CVE-2025-11774 - Malicious Code Execution Vulnerability in the Software Keyboard Function of GENESIS64, ICONICS Suite, Mobile HMI, and MC Works64 cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14908
(6.3 MEDIUM)

EPSS: 0.06%

updated 2025-12-19T18:00:18.330000

1 posts

A security flaw has been discovered in JeecgBoot up to 3.9.0. The affected element is an unknown function of the file jeecg-boot/jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/controller/SysTenantController.java of the component Multi-Tenant Management Module. Performing manipulation of the argument ID results in improper authentication. The attack can be initiated rem

jos1264@social.skynetcloud.site at 2025-12-19T02:15:01.000Z ##

CVE-2025-14908 - JeecgBoot Multi-Tenant Management SysTenantController.java improper authentication cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14899
(4.7 MEDIUM)

EPSS: 0.03%

updated 2025-12-19T18:00:18.330000

1 posts

A weakness has been identified in CodeAstro Real Estate Management System 1.0. This impacts an unknown function of the file /admin/stateadd.php of the component Administrator Endpoint. This manipulation causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.

jos1264@social.skynetcloud.site at 2025-12-19T02:15:01.000Z ##

CVE-2025-14899 - CodeAstro Real Estate Management System Administrator Endpoint stateadd.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13427
(0 None)

EPSS: 0.12%

updated 2025-12-19T18:00:18.330000

1 posts

An authentication bypass vulnerability in Google Cloud Dialogflow CX Messenger allowed unauthenticated users to interact with restricted chat agents, gaining access to the agents' knowledge and the ability to trigger their intents, by manipulating initialization parameters or crafting specific API requests. All versions after August 20th, 2025 have been updated to protect from this vulnerability

jos1264@social.skynetcloud.site at 2025-12-19T00:15:01.000Z ##

CVE-2025-13427 - Authentication Bypass in Dialogflow CX Messenger cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64677
(8.2 HIGH)

EPSS: 0.07%

updated 2025-12-19T18:00:18.330000

1 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Office Out-of-Box Experience allows an unauthorized attacker to perform spoofing over a network.

jos1264@social.skynetcloud.site at 2025-12-18T22:30:01.000Z ##

CVE-2025-64677 - Office Out-of-Box Experience Spoofing Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-34452
(0 None)

EPSS: 0.38%

updated 2025-12-19T18:00:18.330000

1 posts

Streama versions 1.10.0 through 1.10.5 and prior to commit b7c8767 contain a combination of path traversal and server-side request forgery (SSRF) vulnerabilities in that allow an authenticated attacker to write arbitrary files to the server filesystem. The issue exists in the subtitle download functionality, where user-controlled parameters are used to fetch remote content and construct file paths

jos1264@social.skynetcloud.site at 2025-12-18T22:30:00.000Z ##

CVE-2025-34452 - Streama Subtitle Download Path Traversal and SSRF Leading to Arbitrary File Write cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68161
(0 None)

EPSS: 0.03%

updated 2025-12-19T18:00:18.330000

2 posts

The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName configuration attribute or the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html

cR0w@infosec.exchange at 2025-12-18T21:10:12.000Z ##

1000 yard stare

logging.apache.org/security.ht

##

jschauma@mstdn.social at 2025-12-18T19:27:47.000Z ##

For my fellow Log4j victims celebrating 4 years #log4shell PTSD: CVE-2025-68161

"The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the verifyHostName configuration attribute or the log4j2.sslVerifyHostName system property is set to true."

logging.apache.org/security.ht

(It's not that terrible. Seeing the string "log4j" just makes me twitch. :-)

##

CVE-2025-64236
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-12-19T18:00:18.330000

1 posts

Authentication Bypass Using an Alternate Path or Channel vulnerability in AmentoTech Tuturn allows Authentication Abuse.This issue affects Tuturn: from n/a before 3.6.

jos1264@social.skynetcloud.site at 2025-12-18T19:15:01.000Z ##

CVE-2025-64236 - WordPress Tuturn plugin < 3.6 - Broken Authentication vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14879
(9.8 CRITICAL)

EPSS: 0.05%

updated 2025-12-19T18:00:18.330000

2 posts

A weakness has been identified in Tenda WH450 1.0.0.18. Affected is an unknown function of the file /goform/onSSIDChange of the component HTTP Request Handler. This manipulation of the argument ssid_index causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

CVE-2025-14739
(0 None)

EPSS: 0.01%

updated 2025-12-19T18:00:18.330000

1 posts

Access of Uninitialized Pointer vulnerability in TP-Link WR940N and WR941ND allows local unauthenticated attackers the ability to execute DoS attack and potentially arbitrary code execution under the context of the ‘root’ user.This issue affects WR940N and WR941ND: ≤ WR940N v5 3.20.1 Build 200316, ≤ WR941ND v6 3.16.9 Build 151203.

CVE-2025-41746
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-19T16:46:01.880000

1 posts

An XSS vulnerability in pxc_portSecCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41750
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-19T16:45:56.357000

1 posts

An XSS vulnerability in pxc_PortCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device confi

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41745
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-19T16:09:15.357000

1 posts

An XSS vulnerability in pxc_portCntr2.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-1928
(9.1 CRITICAL)

EPSS: 0.05%

updated 2025-12-19T15:31:25

1 posts

Improper Restriction of Excessive Authentication Attempts vulnerability in Restajet Information Technologies Inc. Online Food Delivery System allows Password Recovery Exploitation.This issue affects Online Food Delivery System: through 19122025.

jos1264@social.skynetcloud.site at 2025-12-19T13:30:01.000Z ##

CVE-2025-1928 - Improper Authentication in Restajet's Online Food Delivery System cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-40602
(6.6 MEDIUM)

EPSS: 1.42%

updated 2025-12-19T13:57:43.150000

4 posts

A local privilege escalation vulnerability due to insufficient authorization in the SonicWall SMA1000 appliance management console (AMC).

2 repos

https://github.com/cyberleelawat/CVE-2025-40602

https://github.com/rxerium/CVE-2025-40602

beyondmachines1@infosec.exchange at 2025-12-19T09:01:31.000Z ##

SonicWall patches actively exploited flaw vulnerability chain in SMA 1000 appliances

SonicWall SMA 1000 appliances are being actively exploited through a vulnerability chain combining CVE-2025-40602 (a local privilege escalation flaw) with CVE-2025-23006 (a previously patched deserialization vulnerability), enabling unauthenticated remote code execution with root privileges.

**If you have SonicWall SMA 1000 appliances, make sure their SSH and management access is isolated from the public internet and only accessible from trusted networks. Review latest version, and if not up-to date patched, plan a very quick upgrade to platform-hotfix 12.4.3-03245 or 12.5.0-02283 (or higher). Your devices are being hacked, and you can't really hide them from the internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2025-12-18T17:51:46.000Z ##

New.

CISA Releases Nine Industrial Control Systems Advisories cisa.gov/news-events/alerts/20

KEV updates, from yesterday:

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #infosec #ASUS #Cisco #SonicWall

##

DarkWebInformer@infosec.exchange at 2025-12-18T02:57:36.000Z ##

🚨 CISA has added 3 vulnerabilities to the KEV Catalog

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability

darkwebinformer.com/cisa-kev-c

##

cisakevtracker@mastodon.social at 2025-12-17T21:01:14.000Z ##

CVE ID: CVE-2025-40602
Vendor: SonicWall
Product: SMA1000 appliance
Date Added: 2025-12-17
Notes: Check for signs of potential compromise on all internet accessible SonicWall SMA1000 instances after applying mitigations. For more information please see: psirt.global.sonicwall.com/vul ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-1927
(7.1 HIGH)

EPSS: 0.01%

updated 2025-12-19T12:31:33

1 posts

Cross-Site Request Forgery (CSRF) vulnerability in Restajet Information Technologies Inc. Online Food Delivery System allows Cross Site Request Forgery.This issue affects Online Food Delivery System: through 19122025.

jos1264@social.skynetcloud.site at 2025-12-19T13:30:01.000Z ##

CVE-2025-1927 - CSRF in Restajet's Online Food Delivery System cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11747
(6.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-19T09:30:39

1 posts

The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the colibri_blog_posts shortcode in all versions up to, and including, 1.0.345 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that

jos1264@social.skynetcloud.site at 2025-12-19T09:15:01.000Z ##

CVE-2025-11747 - Colibri Page Builder <= 1.0.345 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14151
(6.1 MEDIUM)

EPSS: 0.09%

updated 2025-12-19T09:30:39

1 posts

The SlimStat Analytics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'outbound_resource' parameter in the slimtrack AJAX action in all versions up to, and including, 5.3.2. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will

jos1264@social.skynetcloud.site at 2025-12-19T09:15:01.000Z ##

CVE-2025-14151 - SlimStat Analytics <= 5.3.2 - Unauthenticated Stored Cross-Site Scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66521
(6.3 MEDIUM)

EPSS: 0.02%

updated 2025-12-19T09:30:39

1 posts

A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com within the Trusted Certificates feature. A crafted payload can be injected as the certificate name, which is later rendered into the DOM without proper sanitization. As a result, the injected script executes each time the Trusted Certificates view is loaded.

jos1264@social.skynetcloud.site at 2025-12-19T09:15:01.000Z ##

CVE-2025-66521 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Trusted Certificates Feature cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66520
(6.3 MEDIUM)

EPSS: 0.03%

updated 2025-12-19T09:30:39

1 posts

A stored cross-site scripting (XSS) vulnerability exists in the Portfolio feature of the Foxit PDF Editor cloud (pdfonline.foxit.com). User-supplied SVG files are not properly sanitized or validated before being inserted into the HTML structure. As a result, embedded HTML or JavaScript within a crafted SVG may execute whenever the Portfolio file list is rendered.

jos1264@social.skynetcloud.site at 2025-12-19T09:15:00.000Z ##

CVE-2025-66520 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Portfolio SVG Handling cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68491(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-19T06:30:34

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-12-19T05:45:01.000Z ##

CVE-2025-68491 - Apache HTTP Server Buffer Overflow Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68488(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-19T06:30:34

1 posts

Rejected reason: Not used

CVE-2025-68487(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-19T06:30:34

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-12-19T05:45:00.000Z ##

CVE-2025-68487 - Apache HTTP Server Cross-Site Request Forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68490
(0 None)

EPSS: 0.00%

updated 2025-12-19T04:16:02.083000

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-12-19T05:45:01.000Z ##

CVE-2025-68490 - Apache HTTP Server Cross-Site Request Forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68489
(0 None)

EPSS: 0.00%

updated 2025-12-19T04:16:02.017000

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-12-19T05:45:01.000Z ##

CVE-2025-68489 - Apache HTTP Server Cross-Site Request Forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67843
(8.3 HIGH)

EPSS: 0.23%

updated 2025-12-19T03:31:18

1 posts

A Server-Side Template Injection (SSTI) vulnerability in the MDX Rendering Engine in Mintlify Platform before 2025-11-15 allows remote attackers to execute arbitrary code via inline JSX expressions in an MDX file.

CVE-2025-13941
(8.8 HIGH)

EPSS: 0.01%

updated 2025-12-19T03:31:18

1 posts

A local privilege escalation vulnerability exists in the Foxit PDF Reader/Editor Update Service. During plugin installation, incorrect file system permissions are assigned to resources used by the update service. A local attacker with low privileges could modify or replace these resources, which are later executed by the service, resulting in execution of arbitrary code with SYSTEM privileges.

jos1264@social.skynetcloud.site at 2025-12-19T05:15:00.000Z ##

CVE-2025-13941 - Foxit PDF Reader Update Service Incorrect Permission Assignment Local Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14900
(4.7 MEDIUM)

EPSS: 0.03%

updated 2025-12-19T03:31:18

1 posts

A security vulnerability has been detected in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /admin/userdelete.php of the component Administrator Endpoint. Such manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

jos1264@social.skynetcloud.site at 2025-12-19T02:15:01.000Z ##

CVE-2025-14900 - CodeAstro Real Estate Management System Administrator Endpoint userdelete.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64675
(8.3 HIGH)

EPSS: 0.08%

updated 2025-12-19T00:31:52

1 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Azure Cosmos DB allows an unauthorized attacker to perform spoofing over a network.

CVE-2025-68382
(6.5 MEDIUM)

EPSS: 0.04%

updated 2025-12-19T00:31:47

1 posts

Out-of-bounds read (CWE-125) allows an unauthenticated remote attacker to perform a buffer overflow (CAPEC-100) via the NFS protocol dissector, leading to a denial-of-service (DoS) through a reliable process crash when handling truncated XDR-encoded RPC messages.

CVE-2025-65037
(10.0 CRITICAL)

EPSS: 0.10%

updated 2025-12-19T00:31:47

1 posts

Improper control of generation of code ('code injection') in Azure Container Apps allows an unauthorized attacker to execute code over a network.

jos1264@social.skynetcloud.site at 2025-12-18T22:30:01.000Z ##

CVE-2025-65037 - Azure Container Apps Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64663
(10.0 CRITICAL)

EPSS: 0.08%

updated 2025-12-19T00:31:47

1 posts

Custom Question Answering Elevation of Privilege Vulnerability

jos1264@social.skynetcloud.site at 2025-12-18T22:30:00.000Z ##

CVE-2025-64663 - Custom Question Answering Elevation of Privilege Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65041
(10.0 CRITICAL)

EPSS: 0.09%

updated 2025-12-19T00:31:46

2 posts

Improper authorization in Microsoft Partner Center allows an unauthorized attacker to elevate privileges over a network.

offseq@infosec.exchange at 2025-12-19T04:05:06.000Z ##

🚨 CRITICAL vuln: CVE-2025-65041 in Microsoft Partner Center enables unauthenticated remote privilege escalation (CVSS 10). No patch yet—segment networks, enforce MFA, and monitor for abuse. Stay updated! radar.offseq.com/threat/cve-20 #OffSeq #Microsoft #CloudSecurity #CVE2025_65041

##

jos1264@social.skynetcloud.site at 2025-12-18T22:30:01.000Z ##

CVE-2025-65041 - Microsoft Partner Center Elevation of Privilege Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68381
(6.5 MEDIUM)

EPSS: 0.04%

updated 2025-12-19T00:31:46

1 posts

Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated attacker to exploit a Buffer Overflow (CAPEC-100) and reliably crash the application or cause significant resource exhaustion via a single crafted UDP packet with an invalid fragment sequence number.

CVE-2025-64676
(7.2 HIGH)

EPSS: 0.11%

updated 2025-12-19T00:31:46

1 posts

'.../...//' in Microsoft Purview allows an authorized attacker to execute code over a network.

cR0w@infosec.exchange at 2025-12-18T22:12:44.000Z ##

Microsoft patched several sev:CRIT cloud vulns, including this ../ in Purview. LMAO.

msrc.microsoft.com/update-guid

##

CVE-2025-68463
(4.9 MEDIUM)

EPSS: 0.03%

updated 2025-12-18T22:16:30

1 posts

Bio.Entrez in Biopython through 1.86 allows doctype XXE.

CVE-2025-53000(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-18T22:03:09

1 posts

### Summary On Windows, converting a notebook containing SVG output to a PDF results in unauthorized code execution. Specifically, a third party can create a `inkscape.bat` file that defines a [Windows batch script](https://en.wikipedia.org/wiki/Batch_file), capable of arbitrary code execution. When a user runs `jupyter nbconvert --to pdf` on a notebook containing SVG output to a PDF on a Window

jos1264@social.skynetcloud.site at 2025-12-17T22:30:02.000Z ##

CVE-2025-53000 - nbconvert has an uncontrolled search path that leads to unauthorized code execution on Windows cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64374
(10.0 CRITICAL)

EPSS: 0.04%

updated 2025-12-18T21:32:49

1 posts

Unrestricted Upload of File with Dangerous Type vulnerability in StylemixThemes Motors motors allows Using Malicious Files.This issue affects Motors: from n/a through <= 5.6.81.

beyondmachines1@infosec.exchange at 2025-12-18T09:01:32.000Z ##

Critical arbitrary file upload flaw reported in WordPress Motors theme

A critical vulnerability (CVE-2025-64374) in the Motors WordPress theme versions 5.6.81 and below allows any authenticated user with Subscriber-level access to upload and activate malicious plugins, potentially leading to complete website takeover due to missing permission checks.

**If you're using the Motors WordPress theme (version 5.6.81 or below), this is important and probably urgent. Plan a quick upgrade to version 5.6.82 or later. Review all user accounts with Subscriber-level or higher privileges and check for any unauthorized plugins that may have been installed.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-68434
(8.8 HIGH)

EPSS: 0.08%

updated 2025-12-18T19:45:54.187000

1 posts

Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests

1 repos

https://github.com/Nixon-H/CVE-2025-68434-OSPOS-CSRF

jos1264@social.skynetcloud.site at 2025-12-18T01:30:00.000Z ##

CVE-2025-68434 - opensourcepos has Cross-Site Request Forgery vulnerability that leads to Unauthorized Administrator Creation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14837
(4.7 MEDIUM)

EPSS: 0.04%

updated 2025-12-18T19:16:22.103000

1 posts

A vulnerability has been found in ZZCMS 2025. Affected by this issue is the function stripfxg of the file /admin/siteconfig.php of the component Backend Website Settings Module. Such manipulation of the argument icp leads to code injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.

jos1264@social.skynetcloud.site at 2025-12-18T02:45:00.000Z ##

CVE-2025-14837 - ZZCMS Backend Website Settings siteconfig.php stripfxg code injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2023-53933
(8.8 HIGH)

EPSS: 0.24%

updated 2025-12-18T19:16:20.433000

1 posts

Serendipity 2.4.0 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files with .phar extension. Attackers can upload files with system command payloads to the media upload endpoint and execute arbitrary commands on the server.

jos1264@social.skynetcloud.site at 2025-12-18T01:30:00.000Z ##

CVE-2023-53933 - Serendipity 2.4.0 Authenticated Remote Code Execution via File Upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66397
(8.3 HIGH)

EPSS: 0.04%

updated 2025-12-18T19:07:25.637000

1 posts

ChurchCRM is an open-source church management system. Prior to version 6.5.3, the allowRegistration, acceptKiosk, reloadKiosk, and identifyKiosk functions in the Kiosk Manager feature suffers from broken access control, allowing any authenticated user to allow and accept kiosk registrations, and perform other Kiosk Manager actions such as reload and identify. Version 6.5.3 fixes the issue.

jos1264@social.skynetcloud.site at 2025-12-17T22:30:01.000Z ##

CVE-2025-66397 - ChurchCRM's Kiosk Manager Functions are vulnerable to Broken Access Control cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14764
(5.3 MEDIUM)

EPSS: 0.01%

updated 2025-12-18T18:50:44

1 posts

## Summary S3 Encryption Client for Go is an open-source client-side encryption library used to facilitate writing and reading encrypted records to S3. When the encrypted data key (EDK) is stored in an "Instruction File" instead of S3's metadata record, the EDK is exposed to an "Invisible Salamanders" attack (https://eprint.iacr.org/2019/016), which could allow the EDK to be replaced with a n

CVE-2025-14884
(7.2 HIGH)

EPSS: 0.19%

updated 2025-12-18T18:30:38

2 posts

A vulnerability was detected in D-Link DIR-605 202WWB03. Affected by this issue is some unknown functionality of the component Firmware Update Service. Performing manipulation results in command injection. The attack can be initiated remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVE-2025-14896
(7.5 HIGH)

EPSS: 0.03%

updated 2025-12-18T18:30:37

1 posts

due to insufficient sanitazation in Vega’s `convert()` function when `safeMode` is enabled and the spec variable is an array. An attacker can craft a malicious Vega diagram specification that will allow them to send requests to any URL, including local file system paths, leading to exposure of sensitive information.

CVE-2025-14737(CVSS UNKNOWN)

EPSS: 0.42%

updated 2025-12-18T18:30:37

1 posts

Command Injection vulnerability in TP-Link WA850RE (httpd modules) allows authenticated adjacent attacker to inject arbitrary commands.This issue affects: ≤ WA850RE V2_160527, ≤ WA850RE V3_160922.

CVE-2025-14738(CVSS UNKNOWN)

EPSS: 0.06%

updated 2025-12-18T18:30:37

1 posts

Improper authentication vulnerability in TP-Link WA850RE (httpd modules) allows unauthenticated attackers to download the configuration file.This issue affects: ≤ WA850RE V2_160527, ≤ WA850RE V3_160922.

CVE-2025-63391
(7.5 HIGH)

EPSS: 0.08%

updated 2025-12-18T18:30:37

1 posts

An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api/config endpoint. The endpoint lacks proper authentication and authorization controls, exposing sensitive system configuration data to unauthenticated remote attackers.

cR0w@infosec.exchange at 2025-12-18T15:31:10.000Z ##

Auth bypass in Open-WebUI.

cve.org/CVERecord?id=CVE-2025-

An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api/config endpoint. The endpoint lacks proper authentication and authorization controls, exposing sensitive system configuration data to unauthenticated remote attackers.

##

CVE-2025-37164
(10.0 CRITICAL)

EPSS: 70.93%

updated 2025-12-18T17:15:47.853000

3 posts

A remote code execution issue exists in HPE OneView.

Nuclei template

2 repos

https://github.com/g0vguy/CVE-2025-37164-PoC

https://github.com/rxerium/CVE-2025-37164

GossiTheDog@cyberplace.social at 2025-12-19T15:10:26.000Z ##

@christopherkunz yeah... Rapid7 have a write up, I'd love to know how HPE ended up adding this feature rapid7.com/blog/post/etr-cve-2

##

GossiTheDog@cyberplace.social at 2025-12-19T10:14:00.000Z ##

HPE OneView CVE-2025-37164 worth paying attention to

- Widely used enterprise management software

- HPE added a REST command, executeCommand, which requires no authentication to execute commands. Obviously, this is dumb and now patched out

- Being on OneView allows attacker to access VMware, 3PAR storage etc by design

- Expect exploitation in the wild as it's so simple

- The vulnerability (executeCommand) was introduced around 2020, feels like a vulndoor

Shodan dork: product:"HPE OneView"

##

beyondmachines1@infosec.exchange at 2025-12-18T10:01:31.000Z ##

Critical remote code execution flaw reported in HPE OneView

HPE OneView has a critical unauthenticated remote code execution vulnerability (CVE-2025-37164) with a maximum CVSS score of 10.0, affecting all versions prior to 11.00. HPE has released version 11.00 as a patch and provides hotfixes for older versions to address this severe security flaw.

**Make sure all HPE OneView systems are isolated from the internet and accessible only from trusted networks. Reach out to HPE for details and plan a quick upgrade to version 11.00 or apply the appropriate hotfix for your current version (5.20-10.20).**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-68399
(5.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-18T16:47:11.970000

1 posts

ChurchCRM is an open-source church management system. In versions prior to 6.5.4, there is a Stored Cross-Site Scripting (XSS) vulnerability within the GroupEditor.php page of the application. When a user attempts to create a group role, they can execute malicious JavaScript. However, for this to work, the user must have permission to view and modify groups in the application. Version 6.5.4 fixes

jos1264@social.skynetcloud.site at 2025-12-17T22:45:01.000Z ##

CVE-2025-68399 - ChurchCRM has Stored Cross-Site Scripting (XSS) In GroupEditor.php cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68401
(4.8 MEDIUM)

EPSS: 0.03%

updated 2025-12-18T16:44:00.020000

1 posts

ChurchCRM is an open-source church management system. Prior to version 6.0.0, the application stores user-supplied HTML/JS without sufficient sanitization/encoding. When other users later view this content, attacker-controlled JavaScript executes in their browser (stored XSS). In affected contexts the script can access web origin data and perform privileged actions as the victim. Where session coo

jos1264@social.skynetcloud.site at 2025-12-17T22:45:01.000Z ##

CVE-2025-68401 - ChurchCRM has Stored Cross-Site Scripting (XSS) vulnerability that leads to session theft and account takeover cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14763
(5.3 MEDIUM)

EPSS: 0.01%

updated 2025-12-18T15:47:08

1 posts

## Summary S3 Encryption Client for Java is an open-source client-side encryption library used to facilitate writing and reading encrypted records to S3. When the encrypted data key (EDK) is stored in an "Instruction File" instead of S3's metadata record, the EDK is exposed to an "Invisible Salamanders" attack (https://eprint.iacr.org/2019/016), which could allow the EDK to be replaced with a

CVE-2025-14759
(5.3 MEDIUM)

EPSS: 0.01%

updated 2025-12-18T15:46:18

1 posts

## Summary S3 Encryption Client for .NET (S3EC) is an open-source client-side encryption library used to facilitate writing and reading encrypted records to S3. When the encrypted data key (EDK) is stored in an "Instruction File" instead of S3's metadata record, the EDK is exposed to an "Invisible Salamanders" attack (https://eprint.iacr.org/2019/016), which could allow the EDK to be replaced

CVE-2025-59374
(9.8 CRITICAL)

EPSS: 30.46%

updated 2025-12-18T15:42:03.790000

5 posts

"UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected. The Live Update client has

beyondmachines1@infosec.exchange at 2025-12-19T10:01:31.000Z ##

CISA reports active exploitation of ASUS Live Update supply chain vulnerability

CISA is reporting active exploitation of CVE-2025-59374, a supply chain backdoor embedded in ASUS Live Update utility during the 2018 Operation ShadowHammer attack by Chinese state-sponsored hackers. The backdoor surgically targeted specific devices using hardcoded MAC addresses. Federal agencies must discontinue use of the now-discontinued utility by January 7, 2026. ASUS urges remaining users to update to version 3.6.8 or higher.

**If you have ASUS Live Update utility installed, immediately update to version 3.6.8 or higher, or better yet, uninstall it completely since it's now discontinued. Given the previous supply chain compromise and end-of-support status, remove the utility and download updates directly from ASUS's official website.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2025-12-18T17:51:46.000Z ##

New.

CISA Releases Nine Industrial Control Systems Advisories cisa.gov/news-events/alerts/20

KEV updates, from yesterday:

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #infosec #ASUS #Cisco #SonicWall

##

DarkWebInformer@infosec.exchange at 2025-12-18T02:57:36.000Z ##

🚨 CISA has added 3 vulnerabilities to the KEV Catalog

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability

darkwebinformer.com/cisa-kev-c

##

cisakevtracker@mastodon.social at 2025-12-17T21:00:59.000Z ##

CVE ID: CVE-2025-59374
Vendor: ASUS
Product: Live Update
Date Added: 2025-12-17
Notes: asus.com/support/faq/1018727/ ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

cR0w@infosec.exchange at 2025-12-17T20:43:21.000Z ##

EoL Asus Live Update was added to the KEV Catalog.

cve.org/CVERecord?id=CVE-2025-

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-20393
(10.0 CRITICAL)

EPSS: 4.56%

updated 2025-12-18T15:41:16.840000

15 posts

Cisco is aware of a potential vulnerability.&nbsp; Cisco is currently investigating and&nbsp;will update these details as appropriate&nbsp;as more information becomes available.

6 repos

https://github.com/cyberleelawat/CVE-2025-20393

https://github.com/b1gchoi/CVE-2025-20393

https://github.com/thesystemowner/CVE-2025-20393-POC

https://github.com/StasonJatham/cisco-sa-sma-attack-N9bf4

https://github.com/KingHacker353/CVE-2025-20393

https://github.com/Ashwesker/Blackash-CVE-2025-20393

gh4rib@mastodon.social at 2025-12-20T10:45:29.000Z ##

1/5 React2Shell (CVE-2025-55182) ⚛️
The big one. A CVSS 10.0 in React Server Components. Attackers are sending single HTTP requests to get root access.
⚠️ Status: Active exploitation by APTs and botnets. If you use Next.js, check your version NOW.

Cisco’s Nightmare (CVE-2025-20393) 🛡️
A maximum-severity zero-day in Cisco Secure Email Gateway. APT groups are using it to deploy "AquaShell"—a silent backdoor that hides in your mail logs.
Check for any unauthorized tunneling tools like ReverseSSH.

##

LLMs@activitypub.awakari.com at 2025-12-21T03:04:49.000Z ## CVE-2025-20393: explotación activa en Cisco AsyncOS permite ejecutar comandos con privilegios root Entre el 17 y el 18 de diciembre de 2025, Cisco Talos y varios CERTs han alertado sobre una campa...

#Seguridad

Origin | Interest | Match ##

DarkWebInformer@infosec.exchange at 2025-12-18T20:07:52.000Z ##

🚨 CVE-2025-20393: Script to detect for Cisco Secure Email Gateway And Cisco Secure Email and Web Manager

CVSS: 10

Currently no patch and zero-day

GitHub: github.com/StasonJatham/cisco-

##

Andy_Thompson@infosec.exchange at 2025-12-18T18:07:33.000Z ##

🔥 Cisco AsyncOS Zero-Day (CVE-2025-20393)
• BleepingComputer
bleepingcomputer.com/news/secu
• The Hacker News
thehackernews.com/2025/12/cisc
• SecurityWeek
securityweek.com/china-linked-
• The Register
theregister.com/2025/12/17/att
• Dark Reading (CISA KEV addition)
darkreading.com/attacks-breach
• SOCRadar analysis
socradar.io/blog/cve-2025-2039

##

AAKL@infosec.exchange at 2025-12-18T17:51:46.000Z ##

New.

CISA Releases Nine Industrial Control Systems Advisories cisa.gov/news-events/alerts/20

KEV updates, from yesterday:

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #infosec #ASUS #Cisco #SonicWall

##

golang@activitypub.awakari.com at 2025-12-18T16:45:45.000Z ## 🚩 Chinese-Nexus APT UAT-9686 Actively Compromises Cisco Secure Email Appliances and Drops AquaShell Persistence Chinese APT UAT-9686 exploits Cisco Email Gateway zero-day CVE-2025-20393 (CVSS 10...

#TIGR #cybercriminal #nation #state #vulnerability

Origin | Interest | Match ##

AAKL@infosec.exchange at 2025-12-18T15:46:37.000Z ##

Security Week: China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear securityweek.com/china-linked- @SecurityWeek

Cisco:

- Critical: CVE-2025-20393: Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager sec.cloudapps.cisco.com/securi

- Critical: CVE-2025-55182: Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability #zeroday

##

beyondmachines1@infosec.exchange at 2025-12-18T14:01:31.000Z ##

Cisco Email Security appliances actively exploited

Cisco is warning of an active cyberattack campaign exploiting a critical zero-day vulnerability (CVE-2025-20393) in Cisco Secure Email Gateway and Email and Web Manager appliances, allowing attackers to execute arbitrary commands with root privileges. The flaw affects appliances with the Spam Quarantine feature enabled and exposed to the internet. Atacks date back to late November 2025.

**If you have Cisco Secure Email Gateway or Cisco Email and Web Manager appliances, this is urgent: Immediately check if the Spam Quarantine feature is enabled and exposed to the public ports - if it is, disable it on all public ports until a patch is available for CVE-2025-20393. If your appliance may have been compromised, contact Cisco support and prepare to rebuild the system from scratch. This is currently the only way to fully remove the threat from a compromised system.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

decio@infosec.exchange at 2025-12-18T13:14:47.000Z ##

[VULN] ⚠️ Zero‑day sur les appliances e‑mail Cisco : compromission, backdoors et logs effacés
👇
cyberveille.ch/posts/2025-12-1

🔗 Source originale : helpnetsecurity.com/2025/12/17

Advisory officiel:

sec.cloudapps.cisco.com/securi

Analyse de Cisco Talos:

UAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web Manager

Résumé FR ➡️ Campagne UAT-9686: un APT à nexus chinois cible Cisco Secure Email via le backdoor AquaShell

💬
⬇️
infosec.pub/post/39234259

#CyberVeille #0day #Cisco

##

DarkWebInformer@infosec.exchange at 2025-12-18T02:57:36.000Z ##

🚨 CISA has added 3 vulnerabilities to the KEV Catalog

CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability

CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability

CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability

darkwebinformer.com/cisa-kev-c

##

campuscodi@mastodon.social at 2025-12-17T22:36:28.000Z ##

A suspected Chinese APT is exploiting a new Cisco zero-day

-impacts Cisco Secure Email Gateway And Cisco Secure Email and Web Manager
-CVE-2025-20393
-CVSS score: 10
-APT is UAT-9686

blog.talosintelligence.com/uat

##

zl2tod@mastodon.online at 2025-12-17T21:13:52.000Z ##

@cisakevtracker

Severity: 10.0

CVE ID: CVE-2025-20393
Vendor: Cisco
Product: Multiple Products
Date Added: 2025-12-17

nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2025-12-17T21:01:30.000Z ##

CVE ID: CVE-2025-20393
Vendor: Cisco
Product: Multiple Products
Date Added: 2025-12-17
Notes: Please adhere to Cisco's guidelines to assess exposure and mitigate risks. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

christopherkunz@chaos.social at 2025-12-17T21:00:41.000Z ##

@ljrk OK, two more Fleißsternchen for SonicWall: psirt.global.sonicwall.com/vul
And for Cisco: cve.org/CVERecord?id=CVE-2025-
Kudos to both for making CISA KEV on 0day (it seems).

##

jos1264@social.skynetcloud.site at 2025-12-17T20:15:01.000Z ##

Cisco email security appliances rooted and backdoored via still unpatched zero-day helpnetsecurity.com/2025/12/17 #cyberespionage #emailsecurity #enterprise #Don'tmiss #Hotstuff #backdoor #China #Cisco #News #APT

##

CVE-2025-64468
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-18T15:30:51

1 posts

There is a use-after-free vulnerability in sentry!sentry_span_set_data() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64468 - Use-after-Free in sentry!sentry_span_set_data() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13110
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-12-18T15:30:51

1 posts

The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.3.7.3 via the "woof_add_subscr" function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with subscriber level access and above, to create product messenger subscriptions on be

jos1264@social.skynetcloud.site at 2025-12-18T15:15:01.000Z ##

CVE-2025-13110 - HUSKY – Products Filter Professional for WooCommerce <= 1.3.7.3 - Authenticated (Subscriber+) Insecure Direct Object Reference via 'woof_add_subscr' cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14437
(7.5 HIGH)

EPSS: 0.06%

updated 2025-12-18T15:30:51

1 posts

The Hummingbird Performance plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.18.0 via the 'request' function. This makes it possible for unauthenticated attackers to extract sensitive data including Cloudflare API credentials.

jos1264@social.skynetcloud.site at 2025-12-18T15:15:01.000Z ##

CVE-2025-14437 - Hummingbird <= 3.18.0 - Unauthenticated Sensitive Information Exposure via Log File cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64467
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-18T15:30:45

1 posts

There is an out of bounds read vulnerability in NI LabVIEW in LVResFile::FindRsrcListEntry() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64467 - Out-of-Bounds Read in LVResFile::FindRsrcListEntry() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64465
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-18T15:30:45

1 posts

There is an out of bounds read vulnerability in NI LabVIEW in lvre!DataSizeTDR() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64465 - Out-of-Bounds Read in lvre!DataSizeTDR() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-46295
(9.8 CRITICAL)

EPSS: 0.25%

updated 2025-12-18T15:08:06.237000

1 posts

Apache Commons Text versions prior to 1.10.0 included interpolation features that could be abused when applications passed untrusted input into the text-substitution API. Because some interpolators could trigger actions like executing commands or accessing external resources, an attacker could potentially achieve remote code execution. This vulnerability has been fully addressed in FileMaker Serve

beyondmachines1@infosec.exchange at 2025-12-19T08:01:31.000Z ##

Critical remote code execution flaw reported in Apache Commons Text library

Apache Commons Text versions prior to 1.10.0 contain a critical remote code execution vulnerability (CVE-2025-46295,) that allows attackers to inject malicious code through the text-substitution API when processing untrusted input. The flaw was patched in late 2022 but is not updated in many deployed applications.

**If you use Apache Commons Text in your Java applications, check your version immediately and upgrade to at least version 1.10.0 (or preferably 1.15.0). Thi flaw allows remote code execution, so treat this update as very important. Exploits will start soon.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-68459
(7.2 HIGH)

EPSS: 0.17%

updated 2025-12-18T15:07:42.550000

2 posts

RG - AP180, Indoor Wall Plate Wireless AP AP180 series provided by Ruijie Networks Co., Ltd. contain an OS command injection vulnerability. An arbitrary OS command may be executed on the product by an attacker who logs in to the CLI service.

jos1264@social.skynetcloud.site at 2025-12-18T07:45:00.000Z ##

CVE-2025-68459 - Ruijie Networks Co., Ltd. AP180 Command Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-18T07:15:00.000Z ##

CVE-2025-68459 - Ruijie Networks Co., Ltd. AP180 Command Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68462
(3.2 LOW)

EPSS: 0.01%

updated 2025-12-18T15:07:42.550000

1 posts

Freedombox before 25.17.1 does not set proper permissions for the backups-data directory, allowing the reading of dump files of databases.

jos1264@social.skynetcloud.site at 2025-12-18T07:15:01.000Z ##

CVE-2025-68462 - Freedombox Unauthenticated Database Backup File Disclosure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-47382
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-18T15:07:42.550000

1 posts

Memory corruption while loading an invalid firmware in boot loader.

CVE-2025-14841
(3.3 LOW)

EPSS: 0.01%

updated 2025-12-18T15:07:42.550000

1 posts

A flaw has been found in OFFIS DCMTK up to 3.6.9. The impacted element is the function DcmQueryRetrieveIndexDatabaseHandle::startFindRequest/DcmQueryRetrieveIndexDatabaseHandle::startMoveRequest in the library dcmqrdb/libsrc/dcmqrdbi.cc of the component dcmqrscp. This manipulation causes null pointer dereference. The attack requires local access. Upgrading to version 3.7.0 is sufficient to resolve

jos1264@social.skynetcloud.site at 2025-12-18T04:45:00.000Z ##

CVE-2025-14841 - OFFIS DCMTK dcmqrscp dcmqrdbi.cc startMoveRequest null pointer dereference cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67073
(9.8 CRITICAL)

EPSS: 0.15%

updated 2025-12-18T15:07:42.550000

1 posts

A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in Tenda AC10V4.0 V16.03.10.20 allows remote attackers to cause denial of service and possibly code execution by sending a post request with a crafted payload (field `serviceName`) to /goform/AdvSetMacMtuWan.

jos1264@social.skynetcloud.site at 2025-12-17T22:30:01.000Z ##

CVE-2025-67073 - Tenda HTTPd Buffer Overflow Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14762
(5.3 MEDIUM)

EPSS: 0.02%

updated 2025-12-18T15:07:42.550000

1 posts

Missing cryptographic key commitment in the AWS SDK for Ruby may allow a user with write access to the S3 bucket to introduce a new EDK that decrypts to different plaintext when the encrypted data key is stored in an "instruction file" instead of S3's metadata record. To mitigate this issue, upgrade AWS SDK for Ruby to version 1.208.0 or later.

CVE-2025-14618
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-12-18T15:07:18.427000

1 posts

The Sweet Energy Efficiency plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on the 'sweet_energy_efficiency_action' AJAX handler in all versions up to, and including, 1.0.6. This makes it possible for authenticated attackers, with subscriber level access and above, to read, modify, and delete arbitrary graphs.

jos1264@social.skynetcloud.site at 2025-12-18T15:15:01.000Z ##

CVE-2025-14618 - Sweet Energy Efficiency <= 1.0.6 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Graph Deletion cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14277
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-12-18T15:07:18.427000

1 posts

The Prime Slider – Addons for Elementor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 4.0.9 via the import_elementor_template AJAX action. This makes it possible for authenticated attackers, with subscriber level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and m

jos1264@social.skynetcloud.site at 2025-12-18T15:15:01.000Z ##

CVE-2025-14277 - Prime Slider – Addons for Elementor <= 4.0.9 - Authenticated (Subscriber+) Server-Side Request Forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-10910(CVSS UNKNOWN)

EPSS: 0.14%

updated 2025-12-18T12:30:33

2 posts

A flaw in the binding process of Govee’s cloud platform and devices allows a remote attacker to bind an existing, online Govee device to the attacker’s account, resulting in full control of the device and removal of the device from its legitimate owner’s account. The server‑side API allows device association using a set of identifiers: "device", "sku", "type", and a client‑computed "value", that a

jos1264@social.skynetcloud.site at 2025-12-18T15:15:01.000Z ##

CVE-2025-10910 - Gaining remote control over Govee devices cvefeed.io/vuln/detail/CVE-202

##

cR0w@infosec.exchange at 2025-12-18T14:23:26.000Z ##

cert.pl/en/posts/2025/12/CVE-2

A flaw in the binding process of Govee’s cloud platform and devices allows a remote attacker to bind an existing, online Govee device to the attacker’s account, resulting in full control of the device and removal of the device from its legitimate owner’s account.

#internetOfShit

##

CVE-2025-47372
(9.0 None)

EPSS: 0.02%

updated 2025-12-18T06:30:19

1 posts

Memory Corruption when a corrupted ELF image with an oversized file size is read into a buffer without authentication.

jos1264@social.skynetcloud.site at 2025-12-18T07:45:00.000Z ##

CVE-2025-47372 - Buffer Copy Without Checking Size of Input in Boot cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-47387
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-18T06:30:19

1 posts

Memory Corruption when processing IOCTLs for JPEG data without verification.

CVE-2025-14856
(6.3 MEDIUM)

EPSS: 0.04%

updated 2025-12-18T03:30:18

1 posts

A security vulnerability has been detected in y_project RuoYi up to 4.8.1. The affected element is an unknown function of the file /monitor/cache/getnames. Such manipulation of the argument fragment leads to code injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.

CVE-2025-12885
(6.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-18T03:30:18

1 posts

The Embed Any Document – Embed PDF, Word, PowerPoint and Excel Files plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the sanitize_pdf_src function regex bypass in all versions up to, and including, 2.7.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary

jos1264@social.skynetcloud.site at 2025-12-18T04:45:00.000Z ##

CVE-2025-12885 - Embed Any Document <= 2.7.10 - Authenticated (Contributor+) Stored Cross-Site Scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14202(CVSS UNKNOWN)

EPSS: 0.05%

updated 2025-12-18T00:34:16

2 posts

A vulnerability in the file upload at bookmark + asset rendering pipeline allows an attacker to upload a malicious SVG file with JavaScript content. When an authenticated admin user views the SVG file with embedded JavaScript code of shared bookmark, JavaScript executes in the admin’s browser, retrieves the CSRF token, and sends a request to change the admin's password resulting in a full account

jos1264@social.skynetcloud.site at 2025-12-18T02:45:00.000Z ##

CVE-2025-14202 - Cross-Site Request Forgery (CSRF) Leading to Account Takeover via SVG File Upload cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-18T01:30:01.000Z ##

CVE-2025-14202 - Cross-Site Request Forgery (CSRF) Leading to Account Takeover via SVG File Upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59718
(9.8 CRITICAL)

EPSS: 5.57%

updated 2025-12-17T13:54:45.390000

3 posts

A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7

2 repos

https://github.com/Ashwesker/Blackash-CVE-2025-59718

https://github.com/exfil0/CVE-2025-59718-PoC

hbrpgm@adalta.social at 2025-12-18T18:33:36.000Z ##

📰 ** Information Briefing: **

✨ FortiCloud SSO Login Bypass: Exploited in the Wild
- Critical vulnerabilities: CVE-2025-59718 and CVE-2025-59719
- Unauthenticated adversaries bypass FortiCloud SSO login
- Exploitation observed in the wild
- Affected products: FortiOS, FortiProxy, FortiSwitchManager, FortiWeb

🔗 adalta.info/pdf/index.html?tit
(Available in 🇩🇪 🇺🇸 🇫🇷)

#AISummary #Bot

##

AAKL@infosec.exchange at 2025-12-18T18:32:45.000Z ##

New. This relates to two vulnerabilities disclosed by Fortinet last week: CVE-2025-59718 and CVE-2025-59719.

VulnCheck: FortiCloud SSO Login Bypass Vulnerabilities Exploited in the Wild vulncheck.com/blog/forticloud- @vulncheck #infosec #Fortinet #threatresearch

##

catc0n@infosec.exchange at 2025-12-18T15:28:05.000Z ##

We wrote a little bit on FortiCloud SSO login bypass CVE-2025-59718 (and 59719). Both the known PoCs for the former are fake / invalid. There does appear to be real exploitation evidence, but detections based on fake PoCs ain't it (and it seems like that's where a lot of chatter is coming from)

vulncheck.com/blog/forticloud-

##

CVE-2025-68154
(8.1 HIGH)

EPSS: 0.05%

updated 2025-12-16T22:37:26

1 posts

## Summary The `fsSize()` function in `systeminformation` is vulnerable to **OS Command Injection (CWE-78)** on Windows systems. The optional `drive` parameter is directly concatenated into a PowerShell command without sanitization, allowing arbitrary command execution when user-controlled input reaches this function. **Affected Platforms:** Windows only **CVSS Breakdown:** - **Attack Vector

beyondmachines1@infosec.exchange at 2025-12-18T17:01:32.000Z ##

Command injection flaw reported in Node.js systeminformation package

A command injection vulnerability (CVE-2025-68154) in the systeminformation Node.js library's fsSize() function allows attackers to execute arbitrary PowerShell commands on Windows systems through unsanitized user input in the drive parameter. The vulnerability has been patched in version 5.27.14.

**If you're using the systeminformation Node.js library on Windows, plan an upgrade to version 5.27.14 or newer to patch this command injection flaw. Review all applications using this library, especially web APIs or tools that accept user input for disk queries, to ensure they're running the patched version.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-68260(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-16T15:30:56

2 posts

In the Linux kernel, the following vulnerability has been resolved: rust_binder: fix race condition on death_list Rust Binder contains the following unsafe operation: // SAFETY: A `NodeDeath` is never inserted into the death list // of any node other than its owner, so it is either in this // death list or in no death list. unsafe { node_inner.death_list.remove(self) }; This operation is u

Linux-Maintainers@activitypub.awakari.com at 2025-12-18T16:10:07.000Z ## Linux Kernel’s First Rust CVE: Race Condition in Binder Driver The Linux kernel has assigned its first CVE to Rust code: CVE-2025-68260, a race condition in the Rust-rewritten Android Binder driv...

#CybersecurityUpdate #DevNews #Android #Binder #driver #CVE-2025-68260 #Linux #kernel #Rust #CVE #Rust

Origin | Interest | Match ##

rustaceans@mastodon.social at 2025-12-17T23:44:42.000Z ##

Linux Kernel Rust Code Sees Its First CVE Vulnerability

#rust #rustlang #programming

lore.kernel.org/linux-cve-anno

##

CVE-2025-55182
(10.0 CRITICAL)

EPSS: 44.14%

updated 2025-12-10T02:00:02.557000

4 posts

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Nuclei template

100 repos

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/fatguru/CVE-2025-55182-scanner

https://github.com/timsonner/React2Shell-CVE-2025-55182

https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-

https://github.com/ejpir/CVE-2025-55182-research

https://github.com/Call123X/-cve-2025-55182

https://github.com/AliHzSec/CVE-2025-55182

https://github.com/MoLeft/React2Shell-Toolbox

https://github.com/Saturate/CVE-2025-55182-Scanner

https://github.com/assetnote/react2shell-scanner

https://github.com/Spritualkb/CVE-2025-55182-exp

https://github.com/theori-io/reactguard

https://github.com/f0xyx/CVE-2025-55182-Scanner

https://github.com/RuoJi6/CVE-2025-55182-RCE-shell

https://github.com/whiteov3rflow/CVE-2025-55182-poc

https://github.com/SainiONHacks/CVE-2025-55182-Scanner

https://github.com/Chocapikk/CVE-2025-55182

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/raivenLockdown/RCE_React2Shell_ButCooler-SomeUselessUsefulThingsLMAO-

https://github.com/gensecaihq/react2shell-scanner

https://github.com/logesh-GIT001/CVE-2025-55182

https://github.com/sudo-Yangziran/CVE-2025-55182POC

https://github.com/jf0x3a/CVE-2025-55182-exploit

https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/zr0n/react2shell

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS

https://github.com/fullhunt/react2shell-test-server

https://github.com/yanoshercohen/React2Shell_CVE-2025-55182

https://github.com/alsaut1/react2shell-lab

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/LemonTeatw1/CVE-2025-55182-exploit

https://github.com/xiaopeng-ye/react2shell-detector

https://github.com/im-ezboy/CVE-2025-55182-zoomeye

https://github.com/yz9yt/React2Shell-CTF

https://github.com/zzhorc/CVE-2025-55182

https://github.com/c0rydoras/CVE-2025-55182

https://github.com/sumanrox/rschunter

https://github.com/C00LN3T/React2Shell

https://github.com/websecuritylabs/React2Shell-Library

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/ayoub-intigriti/react2shell-cve

https://github.com/msanft/CVE-2025-55182

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web

https://github.com/Pizz33/CVE-2025-55182-burpscanner

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/mrknow001/RSC_Detector

https://github.com/alfazhossain/CVE-2025-55182-Exploiter

https://github.com/ThemeHackers/CVE-2025-55182

https://github.com/xcanwin/CVE-2025-55182-React-RCE

https://github.com/shamo0/react2shell-PoC

https://github.com/AggressiveUser/React2Hell

https://github.com/surajhacx/react2shellpoc

https://github.com/freeqaz/react2shell

https://github.com/techgaun/cve-2025-55182-scanner

https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive

https://github.com/ejpir/CVE-2025-55182-bypass

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/EynaExp/CVE-2025-55182-POC

https://github.com/dwisiswant0/CVE-2025-55182

https://github.com/VeilVulp/RscScan-cve-2025-55182

https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell

https://github.com/acheong08/CVE-2025-55182-poc

https://github.com/kavienanj/CVE-2025-55182

https://github.com/subhdotsol/CVE-2025-55182

https://github.com/Ashwesker/Blackash-CVE-2025-55182

https://github.com/andrei2308/react2shell

https://github.com/xkillbit/cve-2025-55182-scanner

https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-

https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool

https://github.com/GelukCrab/React-Server-Components-RCE

https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI

https://github.com/Rsatan/Next.js-Exploit-Tool

https://github.com/hidden-investigations/react2shell-scanner

https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE

https://github.com/santihabib/CVE-2025-55182-analysis

https://github.com/zack0x01/vuln-app-CVE-2025-55182

https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell

https://github.com/XiaomingX/CVE-2025-55182-poc

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/sho-luv/React2Shell

https://github.com/sickwell/CVE-2025-55182

https://github.com/keklick1337/CVE-2025-55182-golang-PoC

https://github.com/hoosin/CVE-2025-55182

https://github.com/nehkark/CVE-2025-55182

https://github.com/shyambhanushali/React2Shell

https://github.com/emredavut/CVE-2025-55182

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/StealthMoud/CVE-2025-55182-Scanner

https://github.com/7amzahard/React2shell

https://github.com/xalgord/React2Shell

https://github.com/kOaDT/poc-cve-2025-55182

https://github.com/ynsmroztas/NextRce

https://github.com/SoICT-BKSEC/CVE-2025-55182-docker-lab

https://github.com/hualy13/CVE-2025-55182

dailydrop.hrbrmstr.dev@dailydrop.hrbrmstr.dev at 2025-12-20T19:59:04.000Z ##

Bonus Drop #105 (2025-12-20): Exploits • Errors • Education

RSC Explorer; Cloudflare Error Page Generator; SQL Quest: The Bank Job

I spent much of Q3 and early Q4 revamping my CMU course. I gave said lecture this past week, and the work for that, along with the need to spend an inordinate amount of time tracking React2Shell nonsense has made December Drops pretty sparse.

If you’re interested in “data-driven threat intelligence” or just cyber-curious, this repo has “A Practical Guide to Cyber Threat Intelligence” and “Operationalizing CTI: Considerations for Security Leaders”. They’re two additional resources I developed for the course, since I found other threat intel content was not really aimed at security leaders (existing or budding ones). Full Typst + Markdown sources are available.

I also finally carved out time to finish up and publish a thinkpiece/essay/whitepaper titled “Children Of The MagentAI” which contains a critical analysis of automation dependency patterns in modern cybersecurity and software development, drawing parallels to aviation’s “magenta line” phenomenon.

(So, I have definitely not been slacking off. 🙂

Today, we have three pretty diverse resources for y’all to ponder. Yes, the “exploits” does have something to with React2Shell, but it’s a super cool way to learn some front-end skills as you also learn more about RSC and how to hack things.

TL;DR

(This is an LLM/GPT-generated summary of today’s Drop. This week, I have been — for lack of a better word — forced into using Gemini, so today’s summary was provided by that model. Sigh. This is also the last Drop that will be using Gemini for the TL;DR.)

  • Dan Abramov’s RSC Explorer provides a hands-on, client-side tool to visualize the React Server Components protocol and understand security vulnerabilities like CVE-2025-55182 (https://rscexplorer.dev/).
  • The Cloudflare Error Page Generator by Anthony Donlon allows users to create fast-loading, customized error pages that mimic Cloudflare’s design to humorously shift blame for site downtime (https://virt.moe/cferr/editor/).
  • SQL Quest: The Bank Job offers a gamified detective story where players solve a robbery by writing complex SQL queries against realistic, messy data to sharpen their analytical skills (https://www.sqlhabit.com/quests/the-bank-job).

RSC Explorer

[🖼 hrbrmstrsdailydrop.wordpress.c…]

Dan Abramov just dropped something genuinely useful for anyone trying to understand what actually happened with the React Server Components vulnerability I keep blathering about and that we’ve been tracking at work. His RSC Explorer (GH) is designed to show how the exploits work under the hood, and has full source for you to play with and expand upon.

If you’ve been following the React2Shell situation at all, you know that CVE-2025-55182 caused a lot of confusion. Part of that confusion stems from the fact that most developers using React Server Components don’t really understand the protocol that makes RSC tick. It’s an implementation detail that React intentionally doesn’t document heavily, which gives the React team flexibility to evolve it, but also means that when something goes wrong, people are left scrambling to understand what they’re even looking at.

React2Shell exploited a flaw in how the RSC protocol handles certain payloads, allowing attackers to achieve remote code execution on vulnerable servers. We saw thousands of exploitation attempts in the wild, with threat actors probing for vulnerable Next.js and other RSC-enabled applications. The vulnerability was serious enough that it drew comparisons to Log4Shell, and while the scope was different, the urgency was real.

Dan’s Explorer lets you step through the RSC protocol in your browser. The whole thing runs client-side, with the server portion running in a web worker, so you’re not making any network requests. But it uses the actual React packages that read and write the RSC protocol, so everything you see is real.

The way it works is pretty clever. You write some server and client code in the left pane, and then you can step through the execution one chunk at a time. You see the raw protocol output, the JSON-like format that React uses to serialize component trees, and then you see what the client reconstructs from that data. It makes visible what’s normally invisible.

There’s even a specific example for CVE-2025-55182, though you have to select version 19.2.0 in the corner to see it work since that was the vulnerable version. Being able to actually watch the exploit flow through the protocol is educational in a way that reading about it just isn’t.

Beyond the security angle, the tool is just a really nice way to build intuition for how RSC actually works. You can watch streaming in action, see how Suspense boundaries create “holes” that get filled in as data arrives, understand how client components get referenced rather than having their code sent over the wire, and see how server actions work in the opposite direction. There’s an example showing how a router refresh works without a framework, which demystifies a lot of the magic that Next.js and similar frameworks provide.

As noted, the source is available on GitHub if you want to dig into how he built it, and the whole thing is embeddable so you can include live examples in your own documentation or blog posts.

If you’re doing any work with RSC, or if you’re just curious about what was actually happening with React2Shell at the protocol level, I’d encourage you to spend some time with this and the blog post walking through it.

Cloudflare Error Page Generator

[🖼 hrbrmstrsdailydrop.wordpress.c…]

This definitely made the rounds, but it deserves some preservation in the Drop.

Cloudflare is one of the most harmful and evil corporations to have ever existed. It’s one of those “you have to be a sociopath to work there” kind of places, and they’ve likely irreparably harmed what was the open internet. Some of you will also remember they took down most of said internet a couple times in the past few weeks.

This project (GH) by Anthony Donlon creates customized error pages that mimics the very well-known Cloudflare error page. You can also embed it into your website, and put the blame on them when your own site goes down (but that may send a signal you use Cloudflare, which I would be somewhat embarassed to even remotely have errantly associated with me).

The editor is super-easy to use, and the pages do not load any other static resources, so they are served up super fast, unlike all the sites Cloudflare took down this past year due to sheer incompetence.

There are some examples you can poke through to see what’s possible in terms of customization, and the sources for the editor and pages themselves are very grok-able, especially if you’re looking to get better at javascript/typescript.

SQL Quest: The Bank Job

[🖼 hrbrmstrsdailydrop.wordpress.c…]

I do code “katas” all the time to keep concepts and syntax fresh in active, human RAM. While I tend to do this with practical mini-projects, there are times I find it a bit more fun when there’s gamification involved, especially when it’s framed as a mystery to solved (we’ve covered more than a few of these types of things in previous Drops).

Either this week or last week I came across a neat way to practice SQL that doesn’t feel like practice at all. SQL Habit just released something called SQL Quest, and the first one is called “The Bank Job.” The premise is simple: a bank has been robbed, and you’re the detective. Your job is to follow the trail of evidence through the bank’s database, figure out what happened, and ultimately help Interpol catch the thief. You solve puzzles by writing SQL queries, and each chapter teaches you something new while advancing the story.

Most SQL tutorials teach you syntax in isolation. You learn how to write a JOIN or a window function, but you’re working with clean, obvious data where the answer is basically handed to you. Real data work is 100% definitely NOT like that. Real data work is messy and ambiguous, and you have to figure out what question to even ask before you can write the query to answer it.

The Bank Job uses realistic, messy data and gives you context and clues instead of step-by-step instructions. You have to turn those clues into insights, which is much closer to actual data analysis work. The creator, Anatoli Makarevich, comes from a background building startups and working on growth and BI at Blinkist, so he’s clearly seen the difference between textbook SQL and the kind of SQL you actually need to get things done.

The whole thing takes somewhere between 20 minutes and an hour depending on your skill level. If you can write window functions without looking anything up, you’ll breeze through it. If you’re still building those muscles, plan for the longer end and use it as a learning opportunity. Each chapter has three levels of hints if you get stuck, though using them adds time penalties if you’re competing for the leaderboard.

It’s completely free and doesn’t require a credit card or bitcoin wallet. If you’re looking for a way to sharpen your SQL skills that’s more engaging than working through another set of exercises about employees and departments, this seems like a pretty spiffy option.

FIN

Remember, you can follow and interact with the full text of The Daily Drop’s free posts on:

  • 🐘 Mastodon via @dailydrop.hrbrmstr.dev@dailydrop.hrbrmstr.dev
  • 🦋 Bluesky via https://bsky.app/profile/dailydrop.hrbrmstr.dev.web.brid.gy

☮️

##

gh4rib@mastodon.social at 2025-12-20T10:45:29.000Z ##

1/5 React2Shell (CVE-2025-55182) ⚛️
The big one. A CVSS 10.0 in React Server Components. Attackers are sending single HTTP requests to get root access.
⚠️ Status: Active exploitation by APTs and botnets. If you use Next.js, check your version NOW.

Cisco’s Nightmare (CVE-2025-20393) 🛡️
A maximum-severity zero-day in Cisco Secure Email Gateway. APT groups are using it to deploy "AquaShell"—a silent backdoor that hides in your mail logs.
Check for any unauthorized tunneling tools like ReverseSSH.

##

Kubernetes@activitypub.awakari.com at 2025-12-15T19:35:00.000Z ## Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components CVE-2025-55182 (also referred to as React2Shell and includes CVE-2025-66478, which was merged into it) is...


Origin | Interest | Match ##

AAKL@infosec.exchange at 2025-12-18T15:46:37.000Z ##

Security Week: China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear securityweek.com/china-linked- @SecurityWeek

Cisco:

- Critical: CVE-2025-20393: Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager sec.cloudapps.cisco.com/securi

- Critical: CVE-2025-55182: Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability #zeroday

##

CVE-2025-59719
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-12-09T18:30:52

2 posts

An improper verification of cryptographic signature vulnerability in Fortinet FortiWeb 8.0.0, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9 may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.

hbrpgm@adalta.social at 2025-12-18T18:33:36.000Z ##

📰 ** Information Briefing: **

✨ FortiCloud SSO Login Bypass: Exploited in the Wild
- Critical vulnerabilities: CVE-2025-59718 and CVE-2025-59719
- Unauthenticated adversaries bypass FortiCloud SSO login
- Exploitation observed in the wild
- Affected products: FortiOS, FortiProxy, FortiSwitchManager, FortiWeb

🔗 adalta.info/pdf/index.html?tit
(Available in 🇩🇪 🇺🇸 🇫🇷)

#AISummary #Bot

##

AAKL@infosec.exchange at 2025-12-18T18:32:45.000Z ##

New. This relates to two vulnerabilities disclosed by Fortinet last week: CVE-2025-59718 and CVE-2025-59719.

VulnCheck: FortiCloud SSO Login Bypass Vulnerabilities Exploited in the Wild vulncheck.com/blog/forticloud- @vulncheck #infosec #Fortinet #threatresearch

##

CVE-2025-41749
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:30:45

1 posts

An XSS vulnerability in port_util.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configu

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41747
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:30:44

1 posts

An XSS vulnerability in pxc_vlanIntfCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to devic

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41748
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:30:44

1 posts

An XSS vulnerability in pxc_Dot1xCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device conf

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41751
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:30:44

1 posts

An XSS vulnerability in pxc_portCntr.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device conf

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41752
(7.1 HIGH)

EPSS: 0.09%

updated 2025-12-09T18:30:44

1 posts

An XSS vulnerability in pxc_portSfp.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device confi

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41694
(6.5 MEDIUM)

EPSS: 0.11%

updated 2025-12-09T18:30:43

1 posts

A low privileged remote attacker can run the webshell with an empty command containing whitespace. The server will then block until it receives more data, resulting in a DoS condition of the websserver.

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41692
(6.8 MEDIUM)

EPSS: 0.02%

updated 2025-12-09T18:30:43

1 posts

A high privileged remote attacker with admin privileges for the webUI can brute-force the "root" and "user" passwords of the underlying OS due to a weak password generation algorithm.

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-41693
(4.3 MEDIUM)

EPSS: 0.23%

updated 2025-12-09T18:30:43

1 posts

A low privileged remote attacker can use the ssh feature to execute commands directly after login. The process stays open and uses resources which leads to a reduced performance of the management functions. Switching functionality is not affected.

cR0w@infosec.exchange at 2025-12-18T14:29:07.000Z ##

Phoenix Contact

CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752

seclists.org/fulldisclosure/20

cc: @Dio9sys @da_667

#internetOfShit

##

CVE-2025-66471(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-05T18:33:09

1 posts

### Impact urllib3's [streaming API](https://urllib3.readthedocs.io/en/2.5.0/advanced-usage.html#streaming-and-i-o) is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding

mmguero@infosec.exchange at 2025-12-18T14:46:11.000Z ##

Malcolm v25.12.1 contains a few critical bug fixes and component version updates.

github.com/idaholab/Malcolm/co

  • ✨ Features and enhancements
    • Installer splash screen shows "HEDGEHOG" when using Hedgehog run profile
  • ✅ Component version updates
  • 🐛 Bug fixes
    • Changed field used in Threat Intelligence dashboard's file type table from zeek.intel.file_mime_type to file.mime_type so filters created from it can work on other dashboards
    • link for threat intelligence URL doesn't work correctly from dashboards (behind reverse proxy) (#832)
    • self-signed certificates not accepted by Chrome (#833)
    • Malcolm ISO installer's automatic partitioning may create too-small /var partition (#835)
  • 🧹 Code and project maintenance

Malcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻‍♀️.

Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.

Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.

As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.

#Malcolm #HedgehogLinux #Zeek #Arkime #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #INL

##

CVE-2025-65945
(7.5 HIGH)

EPSS: 0.01%

updated 2025-12-04T22:50:04

1 posts

### Overview An improper signature verification vulnerability exists when using auth0/node-jws with the HS256 algorithm under specific conditions. ### Am I Affected? You are affected by this vulnerability if you meet all of the following preconditions: 1. Application uses the auth0/node-jws implementation of JSON Web Signatures, versions <=3.2.2 || 4.0.0 2. Application uses the jws.createVerify(

1 repos

https://github.com/jedisct1/CVE-2025-65945-poc

raptor@infosec.exchange at 2025-12-19T07:36:13.000Z ##

#PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws)

github.com/jedisct1/CVE-2025-6

##

CVE-2025-34352
(0 None)

EPSS: 0.02%

updated 2025-12-04T17:15:25.860000

1 posts

JumpCloud Remote Assist for Windows versions prior to 0.317.0 include an uninstaller that is invoked by the JumpCloud Windows Agent as NT AUTHORITY\SYSTEM during agent uninstall or update operations. The Remote Assist uninstaller performs privileged create, write, execute, and delete actions on predictable files inside a user-writable %TEMP% subdirectory without validating that the directory is tr

CVE-2025-66478
(0 None)

EPSS: 0.00%

updated 2025-12-03T18:15:47.200000

1 posts

Rejected reason: This CVE is a duplicate of CVE-2025-55182.

100 repos

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-calcom-yarn-monorepo

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-devdeps

https://github.com/gagaltotal/tot-react-rce-CVE-2025-55182

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-caret

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-15x

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-hoisting

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-overrides

https://github.com/assetnote/react2shell-scanner

https://github.com/ExpTechTW/CVE-2025-66478

https://github.com/FurkanKAYAPINAR/ReactNext2Shell

https://github.com/alessiodos/react2shell-scanner

https://github.com/ancs21/react2shell-scanner-rust

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-v-prefix

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/Saad-Ayady/react2shellNSE

https://github.com/mio-qwq/nextjs-cve-2025-66478-ctf

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-14x

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn

https://github.com/enesbuyuk/react2shell-security-tool

https://github.com/Code42Cate/nexts-cve-2025-66478-exploit

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-resolutions

https://github.com/arashiyans/CVE-2025-55182-CVE-2025-66478

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/strainxx/react2shell-honeypot

https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script

https://github.com/Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-berry

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-range

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-catalog

https://github.com/mounta11n/CHECK-CVE-2025-55182-AND-CVE-2025-66478

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/cypholab/evilact

https://github.com/xiaopeng-ye/react2shell-detector

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-rsc-webpack

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-peer-conflict

https://github.com/abdozkaya/rsc-security-auditor

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-yarn-workspaces

https://github.com/DavionGowie/-vercel-application-is-vulnerable-to-CVE-2025-66478.

https://github.com/sumanrox/rschunter

https://github.com/C00LN3T/React2Shell

https://github.com/lincemorado97/CVE-2025-55182_CVE-2025-66478

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tag-latest

https://github.com/mattcbarrett/check-cve-2025-66478

https://github.com/grp-ops/react2shell

https://github.com/ayoub-intigriti/react2shell-cve

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-16x

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-overrides

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-transitive

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-optional-deps

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-nested-versions

https://github.com/shamo0/react2shell-PoC

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm-symlinks

https://github.com/freeqaz/react2shell

https://github.com/Mustafa1p/Next.js-RCE-Scanner---CVE-2025-55182-CVE-2025-66478

https://github.com/Letalandroid/cve-2025-66478_rce_vulnerable

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-packagemanager-field

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-build-metadata

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/abhirajranjan/cve-2025-66478

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-bun

https://github.com/zhixiangyao/CVE-2025-66478-Exploit-PoC

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-no-lockfile

https://github.com/namest504/CVE-2025-66478-Exploit-Poc

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-alias

https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI

https://github.com/Rhyru9/CVE-2025-66478

https://github.com/hidden-investigations/react2shell-scanner

https://github.com/Jibaru/CVE-2025-66478-github-patcher

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-git-dep

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-dub-pnpm-monorepo

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-supabase-pnpm-monorepo

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-shrinkwrap

https://github.com/changgun-lee/Next.js-RSC-RCE-Scanner-CVE-2025-66478

https://github.com/abtonc/next-cve-2025-66478

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-lockfile-mismatch

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-zero-installs

https://github.com/vercel-labs/fix-react2shell-next

https://github.com/jctommasi/react2shellVulnApp

https://github.com/aiexz/CVE-2025-66478-kinda-waf

https://github.com/nehkark/CVE-2025-55182

https://github.com/shyambhanushali/React2Shell

https://github.com/emredavut/CVE-2025-55182

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-pnp

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-turborepo

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tilde

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-patch-package

https://github.com/wangxso/CVE-2025-66478-POC

https://github.com/Geekujin/React2-PowerShell-CVE-Checker

Kubernetes@activitypub.awakari.com at 2025-12-15T19:35:00.000Z ## Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components CVE-2025-55182 (also referred to as React2Shell and includes CVE-2025-66478, which was merged into it) is...


Origin | Interest | Match ##

CVE-2025-40300(CVSS UNKNOWN)

EPSS: 0.06%

updated 2025-11-17T18:30:25

1 posts

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors af

Ubuntu@activitypub.awakari.com at 2025-12-17T18:01:15.000Z ## Ubuntu 24.04: Linux Kernel Azure FIPS Critical Info Exposure CVE-2025-40300 Several security issues were fixed in the Linux kernel.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-9242
(9.8 CRITICAL)

EPSS: 73.45%

updated 2025-11-14T02:00:02.350000

1 posts

An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.3 and

Nuclei template

2 repos

https://github.com/Ashwesker/Blackash-CVE-2025-9242

https://github.com/watchtowrlabs/watchTowr-vs-WatchGuard-CVE-2025-9242

RedTeamNews@infosec.exchange at 2025-12-19T10:35:38.000Z ##

Urgent: A critical WatchGuard Firebox RCE flaw (CVE-2025-9242) is being actively exploited. CISA has mandated patching. Over 54k devices are still vulnerable. Patch immediately and rotate all credentials. redteamnews.com/red-team/cve/c

##

CVE-2025-7962
(7.5 HIGH)

EPSS: 0.01%

updated 2025-11-13T18:36:55.173000

1 posts

In Jakarta Mail 2.0.2 it is possible to preform a SMTP Injection by utilizing the \r and \n UTF-8 characters to separate different messages.

AAKL@infosec.exchange at 2025-12-18T15:24:55.000Z ##

This critical advisory was posted yesterday. It relates to CVE-2025-7962, CVE-2025-49146, and CVE-2025-5516.

HPESBNW04986 rev.1 - HPE Telco Service Activator, Multiple Vulnerabilities support.hpe.com/hpesc/public/d

More:

The Hacker News: HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution thehackernews.com/2025/12/hpe- @thehackernews #infosec #HPE #vulnerability

##

CVE-2025-12480
(9.1 CRITICAL)

EPSS: 74.31%

updated 2025-11-12T15:32:32

1 posts

Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.

Nuclei template

catc0n@infosec.exchange at 2025-12-19T01:52:20.000Z ##

Yooo @yeslikethefood wrote a neat bunch of words about developing an exploit for Gladinet Triofox CVE-2025-12480 that closely followed the real-world attack pattern Mandiant wrote about last month and attributed to UNC6485.

20+ requests, an AV config trigger, and an embedded PostgreSQL server later:

vulncheck.com/blog/triofox-exp

##

beyondmachines1@infosec.exchange at 2025-12-19T11:01:32.000Z ##

Critical WSUS flaw reported in Schneider Electric Foxboro DCS systems

Schneider Electric issued a critical security advisory for a vulnerability (CVE-2025-59287) in its EcoStruxure Foxboro DCS Advisor services caused by a flaw in Microsoft WSUS that allows unauthenticated attackers to execute arbitrary code with SYSTEM privileges via ports 8530/8531. Active exploitation is observed in the wild.

**This one is important and kind of urgent, there is active exploitation. If you have Schneider Electric EcoStruxure Foxboro DCS Advisor systems, make sure to block WSUS ports 8530/8531 from the internet, or even better, make sure they are isolated from the internet and only accessible from trusted networks. Then apply Microsoft patches KB5070882 and KB5070884 and verify patch with Schneider Electric Global Customer Support.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-53066
(7.5 HIGH)

EPSS: 0.09%

updated 2025-11-03T18:31:47

1 posts

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25; Oracle GraalVM for JDK: 17.0.16 and 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15. Easily exploitable vulnerability allows unauthenticated attacker

AAKL@infosec.exchange at 2025-12-18T17:39:39.000Z ##

New. This addresses high-risk CVE-2025-53057 and CVE-2025-53066.

Security Update for Dell APEX Cloud Platform for Microsoft Azure and Dell APEX Cloud Platform Foundation Software Multiple Third-Party Component Vulnerabilities dell.com/support/kbdoc/en-us/0 #Dell #Microsoft #infosec #Azure #vulnerability

##

CVE-2025-53057
(5.9 MEDIUM)

EPSS: 0.07%

updated 2025-11-03T18:16:56.973000

1 posts

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25; Oracle GraalVM for JDK: 17.0.16 and 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15. Difficult to exploit vulnerability allows unauthenticated at

AAKL@infosec.exchange at 2025-12-18T17:39:39.000Z ##

New. This addresses high-risk CVE-2025-53057 and CVE-2025-53066.

Security Update for Dell APEX Cloud Platform for Microsoft Azure and Dell APEX Cloud Platform Foundation Software Multiple Third-Party Component Vulnerabilities dell.com/support/kbdoc/en-us/0 #Dell #Microsoft #infosec #Azure #vulnerability

##

gh4rib@mastodon.social at 2025-12-20T10:46:04.000Z ##

2/3 The Oracle EBS Breach 🏦
Clop ransomware is back, targeting Oracle EBS (CVE-2025-61882). They’ve already hit GlobalLogic and several NHS providers.
Supply chain attacks are the new "Front Door" for ransomware.

Analysis: Why is this happening?
Attackers are moving up the stack. They aren't just hacking servers; they're hacking the Frameworks (React) and the Infrastructure (Cisco). One vulnerability now grants access to 1,000s of companies at once.

##

hackmag@infosec.exchange at 2025-12-19T16:27:43.000Z ##

⚪ Vulnerability in SAP NetWeaver Exploited to Deploy Auto-Color Linux Malware

🗨️ Experts at Darktrace warned that hackers exploited a critical vulnerability in SAP NetWeaver (CVE-2025-31324) to deploy Linux malware Auto-Color into the network of an unnamed American chemical company.

🔗 hackmag.com/news/auto-color-at

#news

##

CVE-2025-23006
(9.8 CRITICAL)

EPSS: 53.22%

updated 2025-10-22T00:34:17

1 posts

Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands.

beyondmachines1@infosec.exchange at 2025-12-19T09:01:31.000Z ##

SonicWall patches actively exploited flaw vulnerability chain in SMA 1000 appliances

SonicWall SMA 1000 appliances are being actively exploited through a vulnerability chain combining CVE-2025-40602 (a local privilege escalation flaw) with CVE-2025-23006 (a previously patched deserialization vulnerability), enabling unauthenticated remote code execution with root privileges.

**If you have SonicWall SMA 1000 appliances, make sure their SSH and management access is isolated from the public internet and only accessible from trusted networks. Review latest version, and if not up-to date patched, plan a very quick upgrade to platform-hotfix 12.4.3-03245 or 12.5.0-02283 (or higher). Your devices are being hacked, and you can't really hide them from the internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2024-53704
(9.8 CRITICAL)

EPSS: 93.82%

updated 2025-10-22T00:34:16

1 posts

An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication.

Nuclei template

1 repos

https://github.com/istagmbh/CVE-2024-53704

cR0w@infosec.exchange at 2025-12-19T18:20:10.000Z ##

CVE-2024-53704 in SonicWall SSLVPN has been added to the KEV Catalog.

cve.org/CVERecord?id=CVE-2024-

##

CVE-2025-49146
(8.2 HIGH)

EPSS: 0.01%

updated 2025-10-06T19:29:58.977000

1 posts

pgjdbc is an open source postgresql JDBC Driver. From 42.7.4 and until 42.7.7, when the PostgreSQL JDBC driver is configured with channel binding set to required (default value is prefer), the driver would incorrectly allow connections to proceed with authentication methods that do not support channel binding (such as password, MD5, GSS, or SSPI authentication). This could allow a man-in-the-middl

AAKL@infosec.exchange at 2025-12-18T15:24:55.000Z ##

This critical advisory was posted yesterday. It relates to CVE-2025-7962, CVE-2025-49146, and CVE-2025-5516.

HPESBNW04986 rev.1 - HPE Telco Service Activator, Multiple Vulnerabilities support.hpe.com/hpesc/public/d

More:

The Hacker News: HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution thehackernews.com/2025/12/hpe- @thehackernews #infosec #HPE #vulnerability

##

CVE-2025-25231
(7.5 HIGH)

EPSS: 10.75%

updated 2025-08-11T21:31:39

1 posts

Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerability. A malicious actor may be able to gain access to sensitive information by sending crafted GET requests (read-only) to restricted API endpoints.

Nuclei template

1 repos

https://github.com/ashkan-pu/CVE-CVE-2025-25231

CVE-2025-30023
(9.0 CRITICAL)

EPSS: 1.92%

updated 2025-07-15T13:14:49.980000

2 posts

The communication protocol used between client and server had a flaw that could lead to an authenticated user performing a remote code execution attack.

beyondmachines1 at 2025-12-20T12:01:31.846Z ##

Critical vulnerabilities reported in Axis Communications Camera management systems

Axis Communications patched four security vulnerabilities (CVE-2025-30023 through CVE-2025-30026) in its camera management software, including a critical remote code execution flaw and authentication bypass issues affecting surveillance systems in government facilities and critical infrastructure.

**If you have Axis Communications camera management systems (AXIS Camera Station Pro, AXIS Camera Station, or AXIS Device Manager), make sure they are isolated from the internet and only accessible from trusted internal networks. Then plan an update to the latest patched versions (Camera Station Pro 6.9+, Camera Station 5.58+, Device Manager 5.32+).**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2025-12-20T12:01:31.000Z ##

Critical vulnerabilities reported in Axis Communications Camera management systems

Axis Communications patched four security vulnerabilities (CVE-2025-30023 through CVE-2025-30026) in its camera management software, including a critical remote code execution flaw and authentication bypass issues affecting surveillance systems in government facilities and critical infrastructure.

**If you have Axis Communications camera management systems (AXIS Camera Station Pro, AXIS Camera Station, or AXIS Device Manager), make sure they are isolated from the internet and only accessible from trusted internal networks. Then plan an update to the latest patched versions (Camera Station Pro 6.9+, Camera Station 5.58+, Device Manager 5.32+).**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-30026
(0 None)

EPSS: 0.03%

updated 2025-07-15T13:14:49.980000

2 posts

The AXIS Camera Station Server had a flaw that allowed to bypass authentication that is normally required.

beyondmachines1 at 2025-12-20T12:01:31.846Z ##

Critical vulnerabilities reported in Axis Communications Camera management systems

Axis Communications patched four security vulnerabilities (CVE-2025-30023 through CVE-2025-30026) in its camera management software, including a critical remote code execution flaw and authentication bypass issues affecting surveillance systems in government facilities and critical infrastructure.

**If you have Axis Communications camera management systems (AXIS Camera Station Pro, AXIS Camera Station, or AXIS Device Manager), make sure they are isolated from the internet and only accessible from trusted internal networks. Then plan an update to the latest patched versions (Camera Station Pro 6.9+, Camera Station 5.58+, Device Manager 5.32+).**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2025-12-20T12:01:31.000Z ##

Critical vulnerabilities reported in Axis Communications Camera management systems

Axis Communications patched four security vulnerabilities (CVE-2025-30023 through CVE-2025-30026) in its camera management software, including a critical remote code execution flaw and authentication bypass issues affecting surveillance systems in government facilities and critical infrastructure.

**If you have Axis Communications camera management systems (AXIS Camera Station Pro, AXIS Camera Station, or AXIS Device Manager), make sure they are isolated from the internet and only accessible from trusted internal networks. Then plan an update to the latest patched versions (Camera Station Pro 6.9+, Camera Station 5.58+, Device Manager 5.32+).**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-5516
(2.4 LOW)

EPSS: 0.05%

updated 2025-06-06T17:42:29.520000

1 posts

A vulnerability, which was classified as problematic, was found in TOTOLINK X2000R 1.0.0-B20230726.1108. This affects an unknown part of the file /boafrm/formFilter of the component URL Filtering Page. The manipulation of the argument URL Address leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor w

AAKL@infosec.exchange at 2025-12-18T15:24:55.000Z ##

This critical advisory was posted yesterday. It relates to CVE-2025-7962, CVE-2025-49146, and CVE-2025-5516.

HPESBNW04986 rev.1 - HPE Telco Service Activator, Multiple Vulnerabilities support.hpe.com/hpesc/public/d

More:

The Hacker News: HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution thehackernews.com/2025/12/hpe- @thehackernews #infosec #HPE #vulnerability

##

CVE-2025-2039
(4.7 MEDIUM)

EPSS: 0.09%

updated 2025-05-13T20:57:18.117000

1 posts

A vulnerability classified as critical has been found in code-projects Blood Bank Management System 1.0. Affected is an unknown function of the file /admin/delete_members.php. The manipulation of the argument member_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

5 repos

https://github.com/cyberleelawat/CVE-2025-20393

https://github.com/thesystemowner/CVE-2025-20393-POC

https://github.com/KingHacker353/CVE-2025-20393

https://github.com/b1gchoi/CVE-2025-20393

https://github.com/Ashwesker/Blackash-CVE-2025-20393

CVE-2025-32210
(6.5 MEDIUM)

EPSS: 0.03%

updated 2025-04-10T09:30:32

1 posts

Missing Authorization vulnerability in CreativeMindsSolutions CM Registration and Invitation Codes allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects CM Registration and Invitation Codes: from n/a through 2.5.2.

beyondmachines1@infosec.exchange at 2025-12-18T08:01:32.000Z ##

Flaw in NVIDIA Isaac Lab enables remote code execution

NVIDIA patched a critical deserialization vulnerability (CVE-2025-32210) in Isaac Lab that allows authenticated low-privilege users to execute arbitrary code, affecting all versions prior to v2.3.0.

**Make sure all devices running NVIDIA Isaac Lab are isolated from the internet and accessible from trusted networks only. Then plan a quick upgrade to Isaac Lab v2.3.0.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2024-44067
(8.4 HIGH)

EPSS: 0.04%

updated 2024-08-20T20:35:34.497000

1 posts

The T-Head XuanTie C910 CPU in the TH1520 SoC and the T-Head XuanTie C920 CPU in the SOPHON SG2042 have instructions that allow unprivileged attackers to write to arbitrary physical memory locations, aka GhostWrite.

erai@furry.engineer at 2025-12-19T20:20:49.000Z ##

somehow nfs feels faster too. Kinda sad about CVE-2024-44067 on this board but i don't really care because i just want more architectures

##

CVE-2025-66580
(0 None)

EPSS: 0.15%

1 posts

N/A

offseq at 2025-12-20T02:34:58.170Z ##

🔒 CRITICAL: CVE-2025-66580 in OpenAgentPlatform Dive (<0.11.1) enables stored XSS via Mermaid diagrams—can lead to remote code execution! Upgrade to 0.11.1 now. radar.offseq.com/threat/cve-20

##

CVE-2025-68613
(0 None)

EPSS: 0.22%

1 posts

N/A

offseq at 2025-12-20T00:05:14.507Z ##

⚠️ CRITICAL: CVE-2025-68613 in n8n enables authenticated RCE (CVSS 10). Affects >=0.211.0, <1.120.4, and 1.121.0. Upgrade to 1.120.4, 1.121.1, or 1.122.0 ASAP! Full compromise risk. radar.offseq.com/threat/cve-20

##

CVE-2025-14282
(0 None)

EPSS: 0.00%

1 posts

N/A

linux@activitypub.awakari.com at 2025-12-19T19:30:37.000Z ## Debian: Urgent Vulnerability in Dropbear DSA-6086-1 CVE-2025-14282 "Turistu" discovered that incorrect permission handling in the Dropbear SSH server could result in privilege escalation. T...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-66387
(0 None)

EPSS: 0.00%

1 posts

N/A

PostgreSQL@activitypub.awakari.com at 2025-12-18T15:46:25.000Z ## LevelBlue SpiderLabs: SQL Injection in Orkes Conductor: CVE-2025-66387 LevelBlue SpiderLabs has discovered a vulnerability in the Orkes Conductor platform (version 5.2.4 | v1.19.12) that allows aut...

#Database #Protection #Security #Research #Data #Breach

Origin | Interest | Match ##

CVE-2025-67745
(0 None)

EPSS: 0.02%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-18T20:30:01.000Z ##

CVE-2025-67745 - Myhoard logs backup encryption key in plain text cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-63821
(0 None)

EPSS: 0.00%

1 posts

N/A

1 repos

https://github.com/Xernary/CVE-2025-63821

CVE-2025-63820
(0 None)

EPSS: 0.00%

1 posts

N/A

1 repos

https://github.com/Xernary/CVE-2025-63820

CVE-2025-66029
(0 None)

EPSS: 0.03%

1 posts

N/A

offseq@infosec.exchange at 2025-12-18T04:34:35.000Z ##

🚨 CVE-2025-66029 (HIGH): OSC ondemand ≤4.0.8 exposes sensitive creds via Apache proxy headers—attackers can harvest tokens if users hit malicious servers. Patch in v4.1; config workarounds available now. Details: radar.offseq.com/threat/cve-20 #OffSeq #HPC #Vuln #Security

##

CVE-2025-68435
(0 None)

EPSS: 0.07%

2 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-18T02:45:00.000Z ##

CVE-2025-68435 - Zerobyte has Authentication Bypass by Primary Weakness cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-18T01:30:00.000Z ##

CVE-2025-68435 - Zerobyte has Authentication Bypass by Primary Weakness cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-18T01:30:00.000Z ##

CVE-2025-68147 - opensourcepos has a Cross-site Scripting vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68400
(0 None)

EPSS: 0.03%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-17T22:45:01.000Z ##

CVE-2025-68400 - ChurchCRM vulnerable to time-based blind SQL Injection in ConfirmReportEmail.php cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68275
(0 None)

EPSS: 0.03%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-17T22:45:01.000Z ##

CVE-2025-68275 - ChurchCRM vulnerable to Stored XSS - Group name > Person Listing cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14760
(0 None)

EPSS: 0.02%

1 posts

N/A

Visit counter For Websites