## Updated at UTC 2025-06-11T02:57:07.451781

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2025-49091 8.2 0.00% 4 0 2025-06-11T01:15:20.547000 KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. I
CVE-2025-33053 8.8 0.00% 11 0 2025-06-11T01:00:01.443000 External control of file name or path in WebDAV allows an unauthorized attacker
CVE-2025-24016 9.9 78.54% 9 7 template 2025-06-11T01:00:01.443000 Wazuh is a free and open source platform used for threat prevention, detection,
CVE-2025-2884 None 0.00% 3 0 2025-06-10T21:31:22 TCG TPM2.0 Reference implementation's CryptHmacSign helper function is vulnerabl
CVE-2025-3052 8.2 0.00% 7 0 2025-06-10T21:15:22.450000 An arbitrary write vulnerability in Microsoft signed UEFI firmware allows for co
CVE-2025-27817 7.5 0.02% 1 0 2025-06-10T20:41:37 A possible arbitrary file read and SSRF vulnerability has been identified in Apa
CVE-2025-27819 8.8 0.02% 1 0 2025-06-10T20:21:19 In CVE-2023-25194, we announced the RCE/Denial of service attack via SASL JAAS J
CVE-2025-37100 7.7 0.00% 1 0 2025-06-10T18:33:27 A vulnerability in the APIs of HPE Aruba Networking Private 5G Core could potent
CVE-2025-43699 5.3 0.01% 1 0 2025-06-10T18:33:27 Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (Fle
CVE-2025-43700 7.5 0.01% 1 0 2025-06-10T18:33:27 Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (Fle
CVE-2025-43701 7.5 0.01% 1 0 2025-06-10T18:33:27 Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (Fle
CVE-2025-33112 8.4 0.00% 2 0 2025-06-10T18:32:36 IBM AIX 7.3 and IBM VIOS 4.1.1 Perl implementation could allow a non-privileged
CVE-2023-20599 7.9 0.00% 2 0 2025-06-10T18:32:30 Improper register access control in ASP may allow a privileged attacker to perfo
CVE-2025-2474 9.8 0.00% 2 0 2025-06-10T18:15:30.477000 Out-of-bounds write in the PCX image codec in QNX SDP versions 8.0, 7.1 and 7.0
CVE-2025-0052 0 0.00% 2 0 2025-06-10T18:15:30.180000 Improper input validation performed during the authentication process of FlashBl
CVE-2025-0051 0 0.00% 2 0 2025-06-10T18:15:30.030000 Improper input validation performed during the authentication process of FlashAr
CVE-2025-27818 8.8 0.02% 1 0 2025-06-10T16:15:36.917000 A possible security vulnerability has been identified in Apache Kafka. This requ
CVE-2025-27531 9.8 0.02% 1 0 2025-06-10T16:15:36.583000 Deserialization of Untrusted Data vulnerability in Apache InLong.  This issue a
CVE-2025-47827 8.4 0.02% 1 1 2025-06-10T15:31:45 In IGEL OS before 11, Secure Boot can be bypassed because the igel-flash-driver
CVE-2025-26395 7.0 0.00% 1 0 2025-06-10T15:30:53 SolarWinds Observability Self-Hosted was susceptible to a cross-site scripting
CVE-2025-5335 7.8 0.00% 1 0 2025-06-10T15:30:53 A maliciously crafted binary file when downloaded could lead to escalation of pr
CVE-2025-5353 8.8 0.00% 2 0 2025-06-10T15:30:53 A hardcoded key in Ivanti Workspace Control before version 10.19.10.0 allows a l
CVE-2025-22455 8.8 0.00% 2 0 2025-06-10T15:30:53 A hardcoded key in Ivanti Workspace Control before version 10.19.0.0 allows a lo
CVE-2025-22463 7.3 0.00% 2 0 2025-06-10T15:30:53 A hardcoded key in Ivanti Workspace Control before version 10.19.10.0 allows a l
CVE-2025-5606 6.3 2.89% 1 0 2025-06-10T15:30:41 A vulnerability was found in Tenda AC18 15.03.05.05. It has been declared as cri
CVE-2025-5600 9.8 0.10% 1 0 2025-06-10T15:30:40 A vulnerability, which was classified as critical, has been found in TOTOLINK EX
CVE-2025-26394 4.8 0.00% 1 0 2025-06-10T15:15:23.543000 SolarWinds Observability Self-Hosted is susceptible to an open redirection vul
CVE-2025-5604 7.3 0.04% 1 0 2025-06-10T15:08:53.860000 A vulnerability was found in Campcodes Hospital Management System 1.0 and classi
CVE-2025-5654 6.3 0.03% 1 0 2025-06-10T15:04:45.870000 A vulnerability was found in PHPGurukul Complaint Management System 2.0 and clas
CVE-2025-5685 8.8 0.05% 1 0 2025-06-10T15:01:39.320000 A vulnerability, which was classified as critical, was found in Tenda CH22 1.0.0
CVE-2025-43698 0 0.01% 1 0 2025-06-10T12:15:24.227000 Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (Fle
CVE-2025-43697 0 0.01% 1 0 2025-06-10T12:15:24.097000 Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (Dat
CVE-2025-1041 10.0 0.06% 1 0 2025-06-10T06:31:44 An improper input validation discovered in Avaya Call Management System could
CVE-2025-42989 9.6 0.04% 2 0 2025-06-10T01:15:22.183000 RFC inbound processing�does not perform necessary authorization checks for an au
CVE-2024-42009 9.3 68.50% 2 4 2025-06-10T01:00:02.087000 A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x throug
CVE-2025-3461 9.1 0.05% 1 0 2025-06-09T19:15:24.923000 The Quantenna Wi-Fi chips ship with an unauthenticated telnet interface by defau
CVE-2025-3460 7.7 0.11% 1 0 2025-06-09T19:15:24.810000 The Quantenna Wi-Fi chipset ships with a local control script, set_tx_pow, that
CVE-2025-5794 8.8 0.09% 1 0 2025-06-09T19:08:21.053000 A vulnerability, which was classified as critical, has been found in Tenda AC5 1
CVE-2025-5798 8.8 0.09% 1 0 2025-06-09T19:08:05.903000 A vulnerability was found in Tenda AC8 16.03.34.09. It has been classified as cr
CVE-2025-3357 9.8 0.40% 1 0 2025-06-09T18:56:33.710000 IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 19 could allow a remo
CVE-2025-31022 9.8 0.06% 2 0 2025-06-09T18:32:16 Authentication Bypass Using an Alternate Path or Channel vulnerability in PayU I
CVE-2025-5799 8.8 0.09% 1 0 2025-06-09T15:32:48 A vulnerability was found in Tenda AC8 16.03.34.09. It has been declared as crit
CVE-2025-5399 7.5 0.04% 1 0 2025-06-09T15:32:48 Due to a mistake in libcurl's WebSocket code, a malicious server can send a part
CVE-2025-5795 8.8 0.09% 1 0 2025-06-09T15:31:42 A vulnerability, which was classified as critical, was found in Tenda AC5 1.0/15
CVE-2025-5592 7.3 0.04% 1 0 2025-06-09T15:31:37 A vulnerability, which was classified as critical, has been found in FreeFloat F
CVE-2025-5715 3.8 0.02% 1 0 2025-06-09T14:15:24.393000 A vulnerability was found in Signal App 7.41.4 on Android. It has been declared
CVE-2025-3835 9.7 0.15% 3 0 2025-06-09T12:31:18 Zohocorp ManageEngine Exchange Reporter Plus versions 5721 and prior are vulnera
CVE-2025-36528 8.3 0.03% 1 0 2025-06-09T12:31:18 Zohocorp ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to aut
CVE-2025-27709 8.3 0.03% 1 0 2025-06-09T12:31:12 Zohocorp ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to aut
CVE-2025-41444 8.3 0.03% 1 0 2025-06-09T12:15:47.880000 Zohocorp ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to aut
CVE-2025-35005 7.1 0.10% 1 0 2025-06-09T12:15:47.880000 Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulner
CVE-2025-35008 7.1 0.10% 1 0 2025-06-09T12:15:47.880000 Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulner
CVE-2025-49113 10.0 0.54% 9 7 template 2025-06-09T06:30:22 Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execu
CVE-2025-35007 7.1 0.10% 1 0 2025-06-08T21:30:37 Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulner
CVE-2025-35009 7.1 0.10% 1 0 2025-06-08T21:30:37 Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulner
CVE-2025-35010 7.1 0.10% 1 0 2025-06-08T21:30:37 Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulner
CVE-2025-35006 7.1 0.10% 1 0 2025-06-08T21:30:37 Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulner
CVE-2025-3459 7.7 0.11% 1 0 2025-06-08T21:30:37 The Quantenna Wi-Fi chipset ships with a local control script, transmit_file, th
CVE-2025-32457 7.7 0.11% 1 0 2025-06-08T21:30:37 The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh
CVE-2025-35004 7.1 0.10% 1 0 2025-06-08T21:30:30 Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulner
CVE-2025-32459 7.7 0.11% 1 0 2025-06-08T21:30:30 The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh
CVE-2025-32458 7.7 0.11% 1 0 2025-06-08T21:30:30 The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh
CVE-2025-32455 7.7 0.11% 1 0 2025-06-08T21:30:29 The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh
CVE-2025-32456 7.7 0.11% 1 0 2025-06-08T21:30:29 The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh
CVE-2025-5652 6.3 0.03% 1 0 2025-06-06T21:31:29 A vulnerability, which was classified as critical, was found in PHPGurukul Compl
CVE-2025-5639 7.3 0.03% 1 0 2025-06-06T21:31:29 A vulnerability was found in PHPGurukul Notice Board System 1.0 and classified a
CVE-2025-5619 8.8 0.12% 1 0 2025-06-06T21:31:29 A vulnerability, which was classified as critical, has been found in Tenda CH22
CVE-2025-5572 8.8 0.04% 1 0 2025-06-06T21:31:29 A vulnerability was found in D-Link DCS-932L 2.18.01. It has been declared as cr
CVE-2025-5616 6.3 0.04% 1 0 2025-06-06T20:10:46.310000 A vulnerability was found in PHPGurukul Online Fire Reporting System 1.2. It has
CVE-2025-5573 6.3 0.10% 1 0 2025-06-06T18:48:46.463000 A vulnerability was found in D-Link DCS-932L 2.18.01. It has been rated as criti
CVE-2025-5624 9.8 0.07% 1 0 2025-06-06T18:31:34 A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been declared as c
CVE-2025-5621 7.3 0.34% 1 0 2025-06-06T18:31:34 A vulnerability has been found in D-Link DIR-816 1.10CNB05 and classified as cri
CVE-2025-5788 8.8 0.13% 1 0 2025-06-06T18:30:38 A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been rate
CVE-2025-5623 9.8 0.07% 1 0 2025-06-06T18:30:30 A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been classified as
CVE-2025-5622 9.8 0.07% 1 0 2025-06-06T18:30:29 A vulnerability was found in D-Link DIR-816 1.10CNB05 and classified as critical
CVE-2025-5620 7.3 0.34% 1 0 2025-06-06T18:30:29 A vulnerability, which was classified as critical, was found in D-Link DIR-816 1
CVE-2025-41646 9.8 0.35% 1 0 2025-06-06T15:31:04 An unauthorized remote attacker can bypass the authentication of the affected so
CVE-2025-49425 7.1 0.01% 1 0 2025-06-06T15:31:00 Cross-Site Request Forgery (CSRF) vulnerability in Adrian Hanft Konami Easter Eg
CVE-2025-47966 9.8 0.12% 3 0 2025-06-06T14:07:28.330000 Exposure of sensitive information to an unauthorized actor in Power Automate all
CVE-2025-5737 8.8 0.08% 1 0 2025-06-06T14:07:28.330000 A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been decl
CVE-2025-5738 8.8 0.08% 1 0 2025-06-06T14:07:28.330000 A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been rate
CVE-2025-3321 0 0.01% 1 0 2025-06-06T14:07:28.330000 A predefined administrative account is not documented and cannot be deactivated.
CVE-2025-5734 8.8 0.08% 1 0 2025-06-06T09:30:33 A vulnerability has been found in TOTOLINK X15 1.0.0-B20230714.1105 and classifi
CVE-2025-3365 9.8 0.05% 1 0 2025-06-06T09:30:33 A missing protection against path traversal allows to access any file on the ser
CVE-2025-5736 8.8 0.08% 1 0 2025-06-06T09:30:32 A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been clas
CVE-2025-5739 8.8 0.08% 1 0 2025-06-06T09:30:32 A vulnerability classified as critical has been found in TOTOLINK X15 1.0.0-B202
CVE-2025-5735 8.8 0.08% 1 0 2025-06-06T09:30:26 A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105 and classified as
CVE-2025-3322 None 0.45% 1 0 2025-06-06T09:30:26 An improper neutralization of inputs used in expression language allows remote c
CVE-2011-10007 8.8 0.05% 1 0 2025-06-06T04:15:41.237000 File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution
CVE-2025-5702 5.6 0.04% 1 0 2025-06-05T21:15:22.873000 The strcmp implementation optimized for the Power10 processor in the GNU C Libra
CVE-2025-1793 9.8 0.04% 2 0 2025-06-05T20:12:23.777000 Multiple vector store integrations in run-llama/llama_index version v0.12.21 hav
CVE-2025-49007 0 0.06% 1 0 2025-06-05T20:12:23.777000 Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior
CVE-2025-27445 0 0.08% 1 0 2025-06-05T20:12:23.777000 A path traversal vulnerability in RSFirewall component 2.9.7 - 3.1.5 for Joomla
CVE-2025-5642 2.5 0.01% 1 0 2025-06-05T20:12:23.777000 A vulnerability classified as problematic has been found in Radare2 5.9.9. Affec
CVE-2025-3054 8.8 0.24% 1 1 2025-06-05T20:12:23.777000 The WP User Frontend Pro plugin for WordPress is vulnerable to arbitrary file up
CVE-2025-5640 3.3 0.01% 1 0 2025-06-05T20:12:23.777000 A vulnerability was found in PX4-Autopilot 1.12.3. It has been classified as pro
CVE-2025-5608 8.8 0.05% 1 0 2025-06-05T20:12:23.777000 A vulnerability classified as critical has been found in Tenda AC18 15.03.05.05.
CVE-2025-22245 5.9 0.03% 1 0 2025-06-05T20:12:23.777000 VMware NSX contains a stored Cross-Site Scripting (XSS) vulnerability in the rou
CVE-2025-5607 8.8 0.05% 1 0 2025-06-05T20:12:23.777000 A vulnerability was found in Tenda AC18 15.03.05.05. It has been rated as critic
CVE-2025-27753 None 0.03% 1 0 2025-06-05T15:31:39 A SQLi vulnerability in RSMediaGallery component 1.7.4 - 2.1.6 for Joomla was di
CVE-2025-30084 None 0.03% 1 0 2025-06-05T15:31:38 A stored XSS vulnerability in RSMail! component 1.19.20 - 1.22.26 for Joomla was
CVE-2025-27754 6.5 0.04% 1 0 2025-06-05T15:31:38 A stored XSS vulnerability in RSBlog! component 1.11.6 - 1.14.4 for Joomla was d
CVE-2025-5658 6.3 0.03% 1 0 2025-06-05T15:31:38 A vulnerability classified as critical has been found in PHPGurukul Complaint Ma
CVE-2025-49002 9.8 0.05% 1 0 2025-06-05T14:07:36.847000 DataEase is an open source business intelligence and data visualization tool. Ve
CVE-2025-5701 9.8 0.07% 1 2 2025-06-05T12:31:20 The HyperComments plugin for WordPress is vulnerable to unauthorized modificatio
CVE-2025-5653 6.3 0.03% 1 0 2025-06-05T12:31:15 A vulnerability has been found in PHPGurukul Complaint Management System 2.0 and
CVE-2025-5648 2.5 0.01% 1 0 2025-06-05T09:30:33 A vulnerability was found in Radare2 5.9.9. It has been classified as problemati
CVE-2025-5647 2.5 0.01% 1 0 2025-06-05T09:30:33 A vulnerability was found in Radare2 5.9.9 and classified as problematic. This i
CVE-2025-5646 2.5 0.01% 1 0 2025-06-05T09:30:33 A vulnerability has been found in Radare2 5.9.9 and classified as problematic. T
CVE-2025-5641 2.5 0.01% 1 0 2025-06-05T09:30:33 A vulnerability was found in Radare2 5.9.9. It has been rated as problematic. Th
CVE-2025-5643 2.5 0.01% 1 0 2025-06-05T09:30:33 A vulnerability classified as problematic was found in Radare2 5.9.9. Affected b
CVE-2025-5644 2.5 0.01% 1 0 2025-06-05T09:30:33 A vulnerability, which was classified as problematic, has been found in Radare2
CVE-2025-5645 2.5 0.01% 1 0 2025-06-05T09:30:33 A vulnerability, which was classified as problematic, was found in Radare2 5.9.9
CVE-2025-4598 4.7 0.01% 1 0 2025-06-05T09:30:24 A vulnerability was found in systemd-coredump. This flaw allows an attacker to f
CVE-2025-3055 8.1 0.53% 1 0 2025-06-05T06:30:33 The WP User Frontend Pro plugin for WordPress is vulnerable to arbitrary file de
CVE-2025-5614 6.3 0.03% 1 0 2025-06-05T00:31:24 A vulnerability was found in PHPGurukul Online Fire Reporting System 1.2. It has
CVE-2025-5615 6.3 0.03% 1 0 2025-06-05T00:31:24 A vulnerability was found in PHPGurukul Online Fire Reporting System 1.2. It has
CVE-2025-5690 6.5 0.03% 1 0 2025-06-05T00:31:20 PostgreSQL Anonymizer v2.0 and v2.1 contain a vulnerability that allows a masked
CVE-2025-48935 None 0.05% 1 0 2025-06-04T22:57:14 ## Summary It is possible to bypass Deno's read/write permission checks by usin
CVE-2025-48934 None 0.07% 1 0 2025-06-04T22:57:04 ### Summary The [Deno.env.toObject](https://docs.deno.com/api/deno/~/Deno.Env.to
CVE-2025-48888 None 0.05% 1 0 2025-06-04T22:56:55 ### Summary `deno run --allow-read --deny-read main.ts` results in allowed, eve
CVE-2025-5610 6.3 0.03% 1 0 2025-06-04T21:31:23 A vulnerability, which was classified as critical, has been found in CodeAstro R
CVE-2025-5609 8.8 0.05% 1 0 2025-06-04T21:31:22 A vulnerability classified as critical was found in Tenda AC18 15.03.05.05. Affe
CVE-2025-22244 6.9 0.04% 1 0 2025-06-04T21:31:22 VMware NSX contains a stored Cross-Site Scripting (XSS) vulnerability in the gat
CVE-2025-22243 7.5 0.03% 1 0 2025-06-04T21:31:15 VMware NSX Manager UI is vulnerable to a stored Cross-Site Scripting (XSS) attac
CVE-2025-5583 7.3 0.04% 1 0 2025-06-04T18:32:00 A vulnerability classified as critical has been found in CodeAstro Real Estate M
CVE-2025-5596 7.3 0.05% 1 0 2025-06-04T18:31:05 A vulnerability was found in FreeFloat FTP Server 1.0. It has been classified as
CVE-2025-20286 9.9 0.13% 4 1 2025-06-04T18:30:58 A vulnerability in Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud
CVE-2025-5578 7.3 0.04% 1 0 2025-06-04T18:30:57 A vulnerability has been found in PHPGurukul Dairy Farm Shop Management System 1
CVE-2025-5579 7.3 0.04% 1 0 2025-06-04T18:30:57 A vulnerability was found in PHPGurukul Dairy Farm Shop Management System 1.3 an
CVE-2025-5577 7.3 0.04% 1 0 2025-06-04T18:28:13.103000 A vulnerability, which was classified as critical, was found in PHPGurukul Dairy
CVE-2025-27038 7.5 3.72% 1 0 2025-06-04T17:23:58.387000 Memory corruption while rendering graphics using Adreno GPU drivers in Chrome.
CVE-2025-20188 10.0 4.36% 1 0 template 2025-06-04T15:31:32 A vulnerability in the Out-of-Band Access Point (AP) Image Download feature of C
CVE-2025-48960 5.9 0.00% 1 0 2025-06-04T15:30:46 Weak server key used for TLS encryption. The following products are affected: Ac
CVE-2025-1701 None 0.03% 1 0 2025-06-04T15:30:46 CVE-2025-1701 is a high-severity vulnerability in the MIM Admin service. An atta
CVE-2025-48962 4.3 0.03% 1 0 2025-06-04T15:30:41 Sensitive information disclosure due to SSRF. The following products are affecte
CVE-2024-36486 7.8 0.02% 1 0 2025-06-04T14:54:33.783000 A privilege escalation vulnerability exists in the virtual machine archive resto
CVE-2024-52561 7.8 0.01% 1 0 2025-06-04T14:54:33.783000 A privilege escalation vulnerability exists in the Snapshot functionality of Par
CVE-2025-30415 7.5 0.08% 1 0 2025-06-04T14:54:33.783000 Denial of service due to improper handling of malformed input. The following pro
CVE-2025-20991 4.0 0.02% 1 0 2025-06-04T14:54:33.783000 Improper export of Android application components in Bluetooth prior to SMR Jun-
CVE-2025-5601 7.8 0.02% 1 0 2025-06-04T12:30:42 Column handling crashes in Wireshark 4.4.0 to 4.4.6 and 4.2.0 to 4.2.12 allows d
CVE-2025-5584 2.4 0.03% 1 0 2025-06-04T12:30:42 A vulnerability was found in PHPGurukul Hospital Management System 4.0. It has b
CVE-2024-13967 8.8 0.05% 1 0 2025-06-04T09:31:35 This vulnerability allows the successful attacker to gain unauthorized access to
CVE-2025-5571 6.3 0.84% 1 0 2025-06-04T06:30:38 A vulnerability was found in D-Link DCS-932L 2.18.01. It has been classified as
CVE-2025-5569 6.3 0.04% 1 0 2025-06-04T06:30:37 A vulnerability was found in IdeaCMS up to 1.7 and classified as critical. This
CVE-2025-5562 7.3 0.04% 1 0 2025-06-04T06:30:37 A vulnerability was found in PHPGurukul Curfew e-Pass Management System 1.0. It
CVE-2025-25022 9.7 0.04% 1 0 2025-06-03T18:30:52 IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Secur
CVE-2025-45542 7.3 0.17% 1 0 2025-06-03T16:15:25.397000 SQL injection vulnerability in the registrationform endpoint of CloudClassroom-P
CVE-2025-5419 8.8 3.78% 9 1 2025-06-03T15:32:28 Out of bounds read and write in V8 in Google Chrome prior to 137.0.7151.68 allow
CVE-2025-31359 8.8 0.05% 1 0 2025-06-03T12:30:37 A directory traversal vulnerability exists in the PVMP package unpacking functio
CVE-2024-54189 7.8 0.02% 1 0 2025-06-03T12:30:37 A privilege escalation vulnerability exists in the Snapshot functionality of Par
CVE-2025-21479 8.6 3.40% 1 0 2025-06-03T09:32:11 Memory corruption due to unauthorized command execution in GPU micronode while e
CVE-2025-21480 8.6 3.40% 1 0 2025-06-03T06:31:22 Memory corruption due to unauthorized command execution in GPU micronode while e
CVE-2025-23247 4.4 0.01% 1 0 2025-06-02T18:31:36 NVIDIA CUDA Toolkit for all platforms contains a vulnerability in the cuobjdump
CVE-2023-39780 8.8 51.22% 1 0 2025-06-02T18:30:26 ASUS RT-AX55 v3.0.0.4.386.51598 was discovered to contain an authenticated comma
CVE-2025-37093 9.8 0.07% 1 0 2025-06-02T17:32:17.397000 An authentication bypass vulnerability exists in HPE StoreOnce Software.
CVE-2025-5054 4.7 0.01% 1 1 2025-05-30T18:31:27 Race condition in Canonical apport up to and including 2.32.0 allows a local att
CVE-2025-21204 7.8 0.20% 1 1 2025-05-29T14:15:34.340000 Improper link resolution before file access ('link following') in Windows Update
CVE-2025-4009 None 0.24% 1 0 2025-05-28T09:31:27 The Evertz SVDN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Vi
CVE-2025-37899 0 0.02% 1 2 2025-05-24T19:15:23.640000 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix
CVE-2025-32813 7.2 0.15% 1 0 2025-05-23T21:32:17 An issue was discovered in Infoblox NETMRI before 7.6.1. Remote Unauthenticated
CVE-2025-32814 9.8 0.04% 1 0 2025-05-22T21:30:46 An issue was discovered in Infoblox NETMRI before 7.6.1. Unauthenticated SQL Inj
CVE-2025-47934 0 0.02% 11 0 2025-05-21T20:25:16.407000 OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. Startinf in v
CVE-2023-38950 7.5 86.74% 1 0 template 2025-05-21T18:34:59.360000 A path traversal vulnerability in the iclock API of ZKTeco BioTime v8.5.5 allows
CVE-2025-36560 8.6 0.04% 1 0 2025-05-19T13:35:20.460000 Server-side request forgery vulnerability exists in a-blog cms multiple versions
CVE-2025-32756 9.8 8.83% 3 5 2025-05-16T19:41:05.917000 A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiVoice ver
CVE-2025-30712 8.1 0.04% 1 0 2025-05-16T15:31:39 Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
CVE-2025-4664 4.3 0.06% 1 2 2025-05-14T21:31:18 Insufficient policy enforcement in Loader in Google Chrome prior to 136.0.7103.1
CVE-2025-37797 0 0.06% 1 0 2025-05-05T20:54:45.973000 In the Linux kernel, the following vulnerability has been resolved: net_sched:
CVE-2025-37798 None 0.03% 1 0 2025-05-02T15:31:57 In the Linux kernel, the following vulnerability has been resolved: codel: remo
CVE-2025-22869 7.5 0.05% 1 0 2025-04-14T15:39:01 SSH servers which implement file transfer protocols are vulnerable to a denial o
CVE-2025-32395 None 0.02% 1 3 2025-04-11T14:06:06 ### Summary The contents of arbitrary files can be returned to the browser if th
CVE-2013-0156 0 93.15% 1 8 2025-04-11T00:51:21.963000 active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.
CVE-2025-29927 9.1 93.16% 1 95 template 2025-04-08T14:15:33.973000 Next.js is a React framework for building full-stack web applications. Starting
CVE-2025-2992 5.3 0.18% 1 78 2025-04-07T14:40:55.240000 A vulnerability classified as critical was found in Tenda FH1202 1.2.0.14(408).
CVE-2025-1829 6.3 1.09% 1 0 2025-04-03T18:31:56 A vulnerability was found in TOTOLINK X18 9.1.0cu.2024_B20220329. It has been de
CVE-2023-52926 7.8 0.01% 1 0 2025-03-24T17:34:43.630000 In the Linux kernel, the following vulnerability has been resolved: IORING_OP_R
CVE-2024-24919 8.6 94.33% 1 60 template 2025-01-27T21:42:18.743000 Potentially allowing an attacker to read certain information on Check Point Secu
CVE-2024-56770 5.5 0.03% 1 0 2025-01-10T18:31:39 In the Linux kernel, the following vulnerability has been resolved: net/sched:
CVE-2024-53164 None 0.09% 1 0 2025-01-09T18:32:13 In the Linux kernel, the following vulnerability has been resolved: net: sched:
CVE-2024-53125 None 0.09% 1 0 2024-12-19T21:32:18 In the Linux kernel, the following vulnerability has been resolved: bpf: sync_l
CVE-2023-52922 7.8 0.03% 1 0 2024-12-11T15:32:22 In the Linux kernel, the following vulnerability has been resolved: can: bcm: F
CVE-2024-45318 8.1 0.25% 1 0 2024-12-05T18:32:07 A vulnerability in the SonicWall SMA100 SSLVPN web management interface allows r
CVE-2024-53702 5.3 0.04% 1 0 2024-12-05T18:32:07 Use of cryptographically weak pseudo-random number generator (PRNG) vulnerabilit
CVE-2024-40763 7.5 0.11% 1 0 2024-12-05T18:31:03 Heap-based buffer overflow vulnerability in the SonicWall SMA100 SSLVPN due to t
CVE-2024-45319 6.3 0.05% 1 0 2024-12-05T17:15:12.040000 A vulnerability in the SonicWall SMA100 SSLVPN firmware 10.2.1.13-72sv and ear
CVE-2024-53703 8.1 0.10% 1 1 2024-12-05T15:31:09 A vulnerability in the SonicWall SMA100 SSLVPN firmware 10.2.1.13-72sv and earli
CVE-2024-9143 4.3 0.42% 1 0 2024-11-08T18:31:50 Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted e
CVE-2017-0199 7.8 94.37% 1 26 2024-07-24T18:32:16 Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1,
CVE-2024-3721 6.3 51.14% 8 0 2024-04-13T12:30:30 A vulnerability was found in TBK DVR-4104 and DVR-4216 up to 20240412 and classi
CVE-2023-39910 7.5 0.14% 1 1 2024-04-04T06:43:16 The cryptocurrency wallet entropy seeding mechanism used in Libbitcoin Explorer
CVE-2023-25194 8.8 94.19% 1 4 template 2023-07-21T18:01:39 A possible security vulnerability has been identified in Apache Kafka Connect AP
CVE-2025-4275 0 0.00% 1 1 N/A
CVE-2025-32433 0 46.37% 2 25 template N/A
CVE-2025-49001 0 0.05% 1 0 N/A
CVE-2025-48999 0 0.04% 1 0 N/A
CVE-2025-48062 0 0.03% 1 0 N/A
CVE-2025-5688 0 0.02% 2 0 N/A
CVE-2025-49012 0 0.07% 1 0 N/A

CVE-2025-49091
(8.2 HIGH)

EPSS: 0.00%

updated 2025-06-11T01:15:20.547000

4 posts

KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from the scheme handlers such as a ssh:// or telnet:// or rlogin:// URL. This can be executed regardless of whether the ssh, telnet, or rlogin binary is available. In this mode, there is a code path where if that binary is not available, Konsole falls back to using /bin/bash for the given argume

cR0w at 2025-06-11T01:59:58.166Z ##

RCE in KDE Konsole.

kde.org/info/security/advisory

sev:HIGH 8.2 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L

KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from the scheme handlers such as a ssh:// or telnet:// or rlogin:// URL. This can be executed regardless of whether the ssh, telnet, or rlogin binary is available. In this mode, there is a code path where if that binary is not available, Konsole falls back to using /bin/bash for the given arguments (i.e., the URL) provided. This allows an attacker to execute arbitrary code.

nvd.nist.gov/vuln/detail/CVE-2

##

_r_netsec at 2025-06-10T17:58:06.193Z ##

Code execution from web browser using URL schemes handled by KDE's KTelnetService and Konsole (CVE-2025-49091) proofnet.de/publikationen/kons

##

cR0w@infosec.exchange at 2025-06-11T01:59:58.000Z ##

RCE in KDE Konsole.

kde.org/info/security/advisory

sev:HIGH 8.2 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L

KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from the scheme handlers such as a ssh:// or telnet:// or rlogin:// URL. This can be executed regardless of whether the ssh, telnet, or rlogin binary is available. In this mode, there is a code path where if that binary is not available, Konsole falls back to using /bin/bash for the given arguments (i.e., the URL) provided. This allows an attacker to execute arbitrary code.

nvd.nist.gov/vuln/detail/CVE-2

##

_r_netsec@infosec.exchange at 2025-06-10T17:58:06.000Z ##

Code execution from web browser using URL schemes handled by KDE's KTelnetService and Konsole (CVE-2025-49091) proofnet.de/publikationen/kons

##

CVE-2025-33053
(8.8 HIGH)

EPSS: 0.00%

updated 2025-06-11T01:00:01.443000

11 posts

External control of file name or path in WebDAV allows an unauthorized attacker to execute code over a network.

todb at 2025-06-10T20:45:08.439Z ##

So here's a dumb question. Does CVE-2025-33053 actually affect Apache after all?

seems to be implying this: "This vulnerability could affect various products that implement WebDAV, including but not limited to Microsoft Windows."

Like, is it a protocol bug, or a product bug? The CVE only lists Microsoft products as affected.

##

threatcodex at 2025-06-10T20:14:10.709Z ##

CVE-2025-33053, Stealth Falcon and Horus: A Saga of Middle Eastern Cyber Espionage

research.checkpoint.com/2025/s

##

cR0w at 2025-06-10T19:55:55.094Z ##

Write-up from Check Point Research on CVE-2025-33053: research.checkpoint.com/2025/s

##

cR0w at 2025-06-10T18:24:55.368Z ##

CVE-2025-33053 has already been added to the KEV Catalog.

##

cisakevtracker@mastodon.social at 2025-06-10T18:23:13.000Z ##

CVE ID: CVE-2025-33053
Vendor: Web Distributed Authoring and Versioning
Product: Web Distributed Authoring and Versioning (WebDAV)
Date Added: 2025-06-10
Notes: This vulnerability affects a common open-source project, third-party library, or a protocol used by different products. For more information, please see: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

campuscodi@mastodon.social at 2025-06-10T17:10:40.000Z ##

This month, Microsoft patched 67 vulnerabilities, including one actively exploited zero-days—CVE-2025-33053, a WebDAV RCE discovered by Check Point

rawcdn.githack.com/campuscodi/

msrc.microsoft.com/update-guid

##

todb@infosec.exchange at 2025-06-10T20:45:08.000Z ##

So here's a dumb question. Does CVE-2025-33053 actually affect Apache #mod_dav after all?

#CISA #KEV seems to be implying this: "This vulnerability could affect various products that implement WebDAV, including but not limited to Microsoft Windows."

Like, is it a protocol bug, or a product bug? The CVE only lists Microsoft products as affected.

##

cR0w@infosec.exchange at 2025-06-10T19:55:55.000Z ##

Write-up from Check Point Research on CVE-2025-33053: research.checkpoint.com/2025/s

##

cR0w@infosec.exchange at 2025-06-10T18:24:55.000Z ##

CVE-2025-33053 has already been added to the KEV Catalog.

##

cisakevtracker@mastodon.social at 2025-06-10T18:23:13.000Z ##

CVE ID: CVE-2025-33053
Vendor: Web Distributed Authoring and Versioning
Product: Web Distributed Authoring and Versioning (WebDAV)
Date Added: 2025-06-10
Notes: This vulnerability affects a common open-source project, third-party library, or a protocol used by different products. For more information, please see: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

campuscodi@mastodon.social at 2025-06-10T17:10:40.000Z ##

This month, Microsoft patched 67 vulnerabilities, including one actively exploited zero-days—CVE-2025-33053, a WebDAV RCE discovered by Check Point

rawcdn.githack.com/campuscodi/

msrc.microsoft.com/update-guid

##

CVE-2025-24016
(9.9 CRITICAL)

EPSS: 78.54%

updated 2025-06-11T01:00:01.443000

9 posts

Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. DistributedAPI parameters are a serialized as JSON and deserialized using `as_wazuh_object` (in `framework/wazuh/core/cluster/common.py`). If an attacker manages

Nuclei template

7 repos

https://github.com/celsius026/poc_CVE-2025-24016

https://github.com/0xjessie21/CVE-2025-24016

https://github.com/cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE-PoC

https://github.com/huseyinstif/CVE-2025-24016-Nuclei-Template

https://github.com/rxerium/CVE-2025-24016

https://github.com/MuhammadWaseem29/CVE-2025-24016

https://github.com/B1ack4sh/Blackash-CVE-2025-24016

rxerium at 2025-06-10T19:02:52.421Z ##

I've created a passive detection script for this Wazuh vulnerability. It is currently being exploited in the wild (as reported by CISA). The script can be found here:
github.com/rxerium/CVE-2025-24

Original article:
thehackernews.com/2025/06/botn

##

cR0w at 2025-06-10T18:26:14.472Z ##

nvd.nist.gov/vuln/detail/CVE-2 has been added to the KEV Catalog too.

##

cisakevtracker@mastodon.social at 2025-06-10T18:23:29.000Z ##

CVE ID: CVE-2025-24016
Vendor: Wazuh
Product: Wazuh Server
Date Added: 2025-06-10
Notes: github.com/wazuh/wazuh/securit ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

cR0w@infosec.exchange at 2025-06-10T18:26:14.000Z ##

nvd.nist.gov/vuln/detail/CVE-2 has been added to the KEV Catalog too.

##

cisakevtracker@mastodon.social at 2025-06-10T18:23:29.000Z ##

CVE ID: CVE-2025-24016
Vendor: Wazuh
Product: Wazuh Server
Date Added: 2025-06-10
Notes: github.com/wazuh/wazuh/securit ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

jbhall56@infosec.exchange at 2025-06-10T12:18:45.000Z ##

Akamai, which first discovered the exploitation efforts in late March 2025, said the malicious campaign targets CVE-2025-24016 (CVSS score: 9.9), an unsafe deserialization vulnerability that allows for remote code execution on Wazuh servers. thehackernews.com/2025/06/botn

##

jos1264@social.skynetcloud.site at 2025-06-10T10:55:03.000Z ##

Unpatched Wazuh servers targeted by Mirai botnets (CVE-2025-24016) helpnetsecurity.com/2025/06/10 #vulnerability #Don'tmiss #Hotstuff #Akamai #botnet #Wazuh #News #SIEM #PoC #XDR

##

campuscodi@mastodon.social at 2025-06-10T00:46:12.000Z ##

Akamai has spotted two Mirai botnets abusing a recently patched RCE (CVE-2025-24016) in the Wazuh SIEM

akamai.com/blog/security-resea

cvereports.com/cve-2025-24016-

##

beyondmachines1@infosec.exchange at 2025-06-07T10:01:08.000Z ##

Critical Wazuh Server vulnerability exploited by Mirai Botnet

A critical vulnerability (CVE-2025-24016, CVSS 9.9) in the widely-used Wazuh SIEM platform is being actively exploited by threat actors to deploy Mirai botnet variants for DDoS attacks.

**If you're running Wazuh server versions 4.4.0 through 4.9.0, first make sure to estrict API access to only essential authorized users. Then plan a quick update to version 4.9.1 or later. Exposed Wazuh instances will quickly become part of a botnet.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2025-2884(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-06-10T21:31:22

3 posts

TCG TPM2.0 Reference implementation's CryptHmacSign helper function is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key's algorithm. See Errata 1.83 of TCG standard TPM2.0

cR0w at 2025-06-10T17:53:28.893Z ##

AMD published a couple security bulletins today.

CVE-2023-20599 - Unauthorized Access to AMD Secure Processor’s Crypto-Co-Processor: amd.com/en/resources/product-s

CVE-2025-2884 - TPM Reference Implementation: amd.com/en/resources/product-s

##

cR0w@infosec.exchange at 2025-06-10T17:53:28.000Z ##

AMD published a couple security bulletins today.

CVE-2023-20599 - Unauthorized Access to AMD Secure Processor’s Crypto-Co-Processor: amd.com/en/resources/product-s

CVE-2025-2884 - TPM Reference Implementation: amd.com/en/resources/product-s

#patchTuesday

##

AAKL@infosec.exchange at 2025-06-10T16:09:14.000Z ##

AMD: TPM reference implementation out of bounds read vulnerability (medium) - CVE-2025-2884 amd.com/en/resources/product-s #AMD #cybersecurity #Infosec

##

CVE-2025-3052
(8.2 HIGH)

EPSS: 0.00%

updated 2025-06-10T21:15:22.450000

7 posts

An arbitrary write vulnerability in Microsoft signed UEFI firmware allows for code execution of untrusted software. This allows an attacker to control its value, leading to arbitrary memory writes, including modification of critical firmware settings stored in NVRAM. Exploiting this vulnerability could enable security bypasses, persistence mechanisms, or full system compromise.

undercodenews@mastodon.social at 2025-06-10T23:23:46.000Z ##

Critical Windows Vulnerability Exposes Nearly All Secure Boot-Enabled Devices to Bootkit Attacks

Introduction: A New Threat Targets the Heart of Secure Boot A severe new security flaw has shaken the core of modern PC and server security. Known as CVE-2025-3052, this vulnerability allows attackers to bypass Secure Boot—a fundamental defense mechanism on Windows systems—by exploiting a flaw in a BIOS update tool signed with Microsoft’s own UEFI certificate. The…

undercodenews.com/critical-win

##

technotenshi at 2025-06-10T20:57:08.635Z ##

Another major Secure Boot bypass (CVE-2025-3052) affects UEFI devices, letting attackers run unsigned code during boot via unsafe NVRAM variable handling. Microsoft’s Patch Tuesday adds 14 new dbx hashes to mitigate.

binarly.io/blog/another-crack-

##

oversecurity@mastodon.social at 2025-06-10T20:20:10.000Z ##

New Secure Boot flaw lets attackers install bootkit malware, patch now

Security researchers have disclosed a new Secure Boot bypass tracked as CVE-2025-3052 that can be used to turn off security on PCs and servers and...

🔗️ [Bleepingcomputer] link.is.it/OO3fqh

##

RedTeamNews at 2025-06-10T20:19:52.737Z ##

New Secure Boot bypass (CVE-2025-3052) lets attackers install bootkit malware by breaking UEFI trust. Patches are out, but firmware issues complicate fixes. Critical update for admins. Details: redteamnews.com/red-team/cve/n

##

jos1264@social.skynetcloud.site at 2025-06-10T22:50:02.000Z ##

Secure Boot firmado... pero vulnerable (CVE-2025-3052) hackplayers.com/2025/06/secure #vulnerabilidades #amenazas #boot

##

technotenshi@infosec.exchange at 2025-06-10T20:57:08.000Z ##

Another major Secure Boot bypass (CVE-2025-3052) affects UEFI devices, letting attackers run unsigned code during boot via unsafe NVRAM variable handling. Microsoft’s Patch Tuesday adds 14 new dbx hashes to mitigate.

binarly.io/blog/another-crack-

#UEFI #SecureBoot #SupplyChain #InfoSec

##

oversecurity@mastodon.social at 2025-06-10T20:20:10.000Z ##

New Secure Boot flaw lets attackers install bootkit malware, patch now

Security researchers have disclosed a new Secure Boot bypass tracked as CVE-2025-3052 that can be used to turn off security on PCs and servers and...

🔗️ [Bleepingcomputer] link.is.it/OO3fqh

##

CVE-2025-27817
(7.5 HIGH)

EPSS: 0.02%

updated 2025-06-10T20:41:37

1 posts

A possible arbitrary file read and SSRF vulnerability has been identified in Apache Kafka Client. Apache Kafka Clients accept configuration data for setting the SASL/OAUTHBEARER connection with the brokers, including "sasl.oauthbearer.token.endpoint.url" and "sasl.oauthbearer.jwks.endpoint.url". Apache Kafka allows clients to read an arbitrary file and return the content in the error log, or sendi

cR0w@infosec.exchange at 2025-06-10T12:54:24.000Z ##

Three new Apache Kafka CVEs with some specific configurations.

kafka.apache.org/cve-list

CVE-2025-27819 Apache Kafka: Possible RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration

In CVE-2023-25194, we announced the RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration in Kafka Connect API. But not only Kafka Connect API is vulnerable to this attack, the Apache Kafka brokers also have this vulnerability. To exploit this vulnerability, the attacker needs to be able to connect to the Kafka cluster and have the AlterConfigs permission on the cluster resource.

Since Apache Kafka 3.4.0, we have added a system property ("-Dorg.apache.kafka.disallowed.login.modules") to disable the problematic login modules usage in SASL JAAS configuration. Also by default "com.sun.security.auth.module.JndiLoginModule" is disabled in Apache Kafka 3.4.0, and "com.sun.security.auth.module.JndiLoginModule,com.sun.security.auth.module.LdapLoginModule" is disabled by default in Apache Kafka 3.9.1/4.0.0.

CVE-2025-27818 Apache Kafka: Possible RCE attack via SASL JAAS LdapLoginModule configuration

A possible security vulnerability has been identified in Apache Kafka. This requires access to a alterConfig to the cluster resource, or Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config and a SASL-based security protocol, which has been possible on Kafka clusters since Apache Kafka 2.0.0 (Kafka Connect 2.3.0). When configuring the broker via config file or AlterConfig command, or connector via the Kafka Kafka Connect REST API, an authenticated operator can set the sasl.jaas.config property for any of the connector's Kafka clients to "com.sun.security.auth.module.LdapLoginModule", which can be done via the producer.override.sasl.jaas.config, consumer.override.sasl.jaas.config, or admin.override.sasl.jaas.config properties. This will allow the server to connect to the attacker's LDAP server and deserialize the LDAP response, which the attacker can use to execute java deserialization gadget chains on the Kafka connect server. Attacker can cause unrestricted deserialization of untrusted data (or) RCE vulnerability when there are gadgets in the classpath.

Since Apache Kafka 3.9.1/4.0.0, we have added a system property ("-Dorg.apache.kafka.disallowed.login.modules") to disable the problematic login modules usage in SASL JAAS configuration. Also by default "com.sun.security.auth.module.JndiLoginModule,com.sun.security.auth.module.LdapLoginModule" are disabled in Apache Kafka Connect 3.9.1/4.0.0.

CVE-2025-27817 Apache Kafka Client: Arbitrary file read and SSRF vulnerability

A possible arbitrary file read and SSRF vulnerability has been identified in Apache Kafka Client. Apache Kafka Clients accept configuration data for setting the SASL/OAUTHBEARER connection with the brokers, including "sasl.oauthbearer.token.endpoint.url" and "sasl.oauthbearer.jwks.endpoint.url". Apache Kafka allows clients to read an arbitrary file and return the content in the error log, or sending requests to an unintended location. In applications where Apache Kafka Clients configurations can be specified by an untrusted party, attackers may use the "sasl.oauthbearer.token.endpoint.url" and "sasl.oauthbearer.jwks.endpoint.url" configuration to read arbitrary contents of the disk and environment variables or make requests to an unintended location. In particular, this flaw may be used in Apache Kafka Connect to escalate from REST API access to filesystem/environment/URL access, which may be undesirable in certain environments, including SaaS products.

Since Apache Kafka 3.9.1/4.0.0, we have added a system property ("-Dorg.apache.kafka.sasl.oauthbearer.allowed.urls") to set the allowed urls in SASL JAAS configuration. In 3.9.1, it accepts all urls by default for backward compatibility. However in 4.0.0 and newer, the default value is empty list and users have to set the allowed urls explicitly.

##

CVE-2025-27819
(8.8 HIGH)

EPSS: 0.02%

updated 2025-06-10T20:21:19

1 posts

In CVE-2023-25194, we announced the RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration in Kafka Connect API. But not only Kafka Connect API is vulnerable to this attack, the Apache Kafka brokers also have this vulnerability. To exploit this vulnerability, the attacker needs to be able to connect to the Kafka cluster and have the AlterConfigs permission on the cluster resource

cR0w@infosec.exchange at 2025-06-10T12:54:24.000Z ##

Three new Apache Kafka CVEs with some specific configurations.

kafka.apache.org/cve-list

CVE-2025-27819 Apache Kafka: Possible RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration

In CVE-2023-25194, we announced the RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration in Kafka Connect API. But not only Kafka Connect API is vulnerable to this attack, the Apache Kafka brokers also have this vulnerability. To exploit this vulnerability, the attacker needs to be able to connect to the Kafka cluster and have the AlterConfigs permission on the cluster resource.

Since Apache Kafka 3.4.0, we have added a system property ("-Dorg.apache.kafka.disallowed.login.modules") to disable the problematic login modules usage in SASL JAAS configuration. Also by default "com.sun.security.auth.module.JndiLoginModule" is disabled in Apache Kafka 3.4.0, and "com.sun.security.auth.module.JndiLoginModule,com.sun.security.auth.module.LdapLoginModule" is disabled by default in Apache Kafka 3.9.1/4.0.0.

CVE-2025-27818 Apache Kafka: Possible RCE attack via SASL JAAS LdapLoginModule configuration

A possible security vulnerability has been identified in Apache Kafka. This requires access to a alterConfig to the cluster resource, or Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config and a SASL-based security protocol, which has been possible on Kafka clusters since Apache Kafka 2.0.0 (Kafka Connect 2.3.0). When configuring the broker via config file or AlterConfig command, or connector via the Kafka Kafka Connect REST API, an authenticated operator can set the sasl.jaas.config property for any of the connector's Kafka clients to "com.sun.security.auth.module.LdapLoginModule", which can be done via the producer.override.sasl.jaas.config, consumer.override.sasl.jaas.config, or admin.override.sasl.jaas.config properties. This will allow the server to connect to the attacker's LDAP server and deserialize the LDAP response, which the attacker can use to execute java deserialization gadget chains on the Kafka connect server. Attacker can cause unrestricted deserialization of untrusted data (or) RCE vulnerability when there are gadgets in the classpath.

Since Apache Kafka 3.9.1/4.0.0, we have added a system property ("-Dorg.apache.kafka.disallowed.login.modules") to disable the problematic login modules usage in SASL JAAS configuration. Also by default "com.sun.security.auth.module.JndiLoginModule,com.sun.security.auth.module.LdapLoginModule" are disabled in Apache Kafka Connect 3.9.1/4.0.0.

CVE-2025-27817 Apache Kafka Client: Arbitrary file read and SSRF vulnerability

A possible arbitrary file read and SSRF vulnerability has been identified in Apache Kafka Client. Apache Kafka Clients accept configuration data for setting the SASL/OAUTHBEARER connection with the brokers, including "sasl.oauthbearer.token.endpoint.url" and "sasl.oauthbearer.jwks.endpoint.url". Apache Kafka allows clients to read an arbitrary file and return the content in the error log, or sending requests to an unintended location. In applications where Apache Kafka Clients configurations can be specified by an untrusted party, attackers may use the "sasl.oauthbearer.token.endpoint.url" and "sasl.oauthbearer.jwks.endpoint.url" configuration to read arbitrary contents of the disk and environment variables or make requests to an unintended location. In particular, this flaw may be used in Apache Kafka Connect to escalate from REST API access to filesystem/environment/URL access, which may be undesirable in certain environments, including SaaS products.

Since Apache Kafka 3.9.1/4.0.0, we have added a system property ("-Dorg.apache.kafka.sasl.oauthbearer.allowed.urls") to set the allowed urls in SASL JAAS configuration. In 3.9.1, it accepts all urls by default for backward compatibility. However in 4.0.0 and newer, the default value is empty list and users have to set the allowed urls explicitly.

##

CVE-2025-37100
(7.7 HIGH)

EPSS: 0.00%

updated 2025-06-10T18:33:27

1 posts

A vulnerability in the APIs of HPE Aruba Networking Private 5G Core could potentially expose sensitive information to unauthorized users. A successful exploitation could allow an attacker to iteratively navigate through the filesystem and ultimately download protected system files containing sensitive information.

cR0w@infosec.exchange at 2025-06-10T15:58:12.000Z ##

Info disclosure in HPE Aruba Private 5G Core APIs.

support.hpe.com/hpesc/public/d

sev:HIGH 7.7 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

A vulnerability in the APIs of HPE Aruba Networking Private 5G Core could potentially expose sensitive information to unauthorized users.
A successful exploitation could allow an attacker to iteratively navigate through the filesystem and ultimately download protected system files containing sensitive information.

nvd.nist.gov/vuln/detail/CVE-2

#patchTuesday

##

CVE-2025-43699
(5.3 MEDIUM)

EPSS: 0.01%

updated 2025-06-10T18:33:27

1 posts

Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field level security controls for OmniUICard objects.  This impacts OmniStudio: before Spring 2025

cR0w@infosec.exchange at 2025-06-10T12:45:44.000Z ##

Five CVEs in Salesforce OmniStudio.

help.salesforce.com/s/articleV

Datamapper CVE:

CVE-2025-43697: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio’s DataMapper feature allows exposure of encrypted data. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score 7.5 (High)

Flexcard CVEs:

CVE-2025-43698: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field-level security controls for Salesforce objects. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 7.5 (High)

CVE-2025-43699: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field-level security controls for OmniUICard objects. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 5.3 (Medium)

CVE-2025-43700: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows exposure of encrypted data. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 7.5 (High)

CVE-2025-43701: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows exposure of Custom Settings data. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 7.5 (High)

##

CVE-2025-43700
(7.5 HIGH)

EPSS: 0.01%

updated 2025-06-10T18:33:27

1 posts

Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows exposure of encrypted data.  This impacts OmniStudio: before Spring 2025.

cR0w@infosec.exchange at 2025-06-10T12:45:44.000Z ##

Five CVEs in Salesforce OmniStudio.

help.salesforce.com/s/articleV

Datamapper CVE:

CVE-2025-43697: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio’s DataMapper feature allows exposure of encrypted data. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score 7.5 (High)

Flexcard CVEs:

CVE-2025-43698: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field-level security controls for Salesforce objects. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 7.5 (High)

CVE-2025-43699: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field-level security controls for OmniUICard objects. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 5.3 (Medium)

CVE-2025-43700: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows exposure of encrypted data. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 7.5 (High)

CVE-2025-43701: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows exposure of Custom Settings data. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 7.5 (High)

##

CVE-2025-43701
(7.5 HIGH)

EPSS: 0.01%

updated 2025-06-10T18:33:27

1 posts

Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows exposure of Custom Settings data.  This impacts OmniStudio: before version 254.

cR0w@infosec.exchange at 2025-06-10T12:45:44.000Z ##

Five CVEs in Salesforce OmniStudio.

help.salesforce.com/s/articleV

Datamapper CVE:

CVE-2025-43697: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio’s DataMapper feature allows exposure of encrypted data. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score 7.5 (High)

Flexcard CVEs:

CVE-2025-43698: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field-level security controls for Salesforce objects. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 7.5 (High)

CVE-2025-43699: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field-level security controls for OmniUICard objects. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 5.3 (Medium)

CVE-2025-43700: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows exposure of encrypted data. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 7.5 (High)

CVE-2025-43701: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows exposure of Custom Settings data. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 7.5 (High)

##

CVE-2025-33112
(8.4 HIGH)

EPSS: 0.00%

updated 2025-06-10T18:32:36

2 posts

IBM AIX 7.3 and IBM VIOS 4.1.1 Perl implementation could allow a non-privileged local user to exploit a vulnerability to execute arbitrary code due to improper neutralization of pathname input.

cR0w at 2025-06-10T17:55:32.746Z ##

../ -> command exec in IBM AIX.

ibm.com/support/pages/node/723

sev:HIGH 8.4 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability in AIX's Perl could allow an attacker to execute arbitrary commands (CVE-2025-33112). AIX uses Perl in various operating system components.

nvd.nist.gov/vuln/detail/CVE-2

##

cR0w@infosec.exchange at 2025-06-10T17:55:32.000Z ##

../ -> command exec in IBM AIX.

ibm.com/support/pages/node/723

sev:HIGH 8.4 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability in AIX's Perl could allow an attacker to execute arbitrary commands (CVE-2025-33112). AIX uses Perl in various operating system components.

nvd.nist.gov/vuln/detail/CVE-2

#patchTuesday

##

CVE-2023-20599
(7.9 HIGH)

EPSS: 0.00%

updated 2025-06-10T18:32:30

2 posts

Improper register access control in ASP may allow a privileged attacker to perform unauthorized access to ASP’s Crypto Co-Processor (CCP) registers from x86, resulting in potential loss of control of cryptographic key pointer/index, leading to loss of integrity or confidentiality.

cR0w at 2025-06-10T17:53:28.893Z ##

AMD published a couple security bulletins today.

CVE-2023-20599 - Unauthorized Access to AMD Secure Processor’s Crypto-Co-Processor: amd.com/en/resources/product-s

CVE-2025-2884 - TPM Reference Implementation: amd.com/en/resources/product-s

##

cR0w@infosec.exchange at 2025-06-10T17:53:28.000Z ##

AMD published a couple security bulletins today.

CVE-2023-20599 - Unauthorized Access to AMD Secure Processor’s Crypto-Co-Processor: amd.com/en/resources/product-s

CVE-2025-2884 - TPM Reference Implementation: amd.com/en/resources/product-s

#patchTuesday

##

CVE-2025-2474
(9.8 CRITICAL)

EPSS: 0.00%

updated 2025-06-10T18:15:30.477000

2 posts

Out-of-bounds write in the PCX image codec in QNX SDP versions 8.0, 7.1 and 7.0 could allow an unauthenticated attacker to cause a denial-of-service condition or execute code in the context of the process using the image codec.

cR0w at 2025-06-10T18:31:09.424Z ##

This looks like a fun one to dig into from Blackberry.

support.blackberry.com/pkb/s/a

sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Out-of-bounds write in the PCX image codec in QNX SDP versions 8.0, 7.1 and 7.0 could allow an unauthenticated attacker to cause a denial-of-service condition or execute code in the context of the process using the image codec.

nvd.nist.gov/vuln/detail/CVE-2

##

cR0w@infosec.exchange at 2025-06-10T18:31:09.000Z ##

This looks like a fun one to dig into from Blackberry.

support.blackberry.com/pkb/s/a

sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Out-of-bounds write in the PCX image codec in QNX SDP versions 8.0, 7.1 and 7.0 could allow an unauthenticated attacker to cause a denial-of-service condition or execute code in the context of the process using the image codec.

nvd.nist.gov/vuln/detail/CVE-2

#patchTuesday

##

CVE-2025-0052
(0 None)

EPSS: 0.00%

updated 2025-06-10T18:15:30.180000

2 posts

Improper input validation performed during the authentication process of FlashBlade could lead to a system Denial of Service.

cR0w at 2025-06-10T18:29:43.394Z ##

Pure Storage published a bulletin a few days ago which is supposed to include a couple DoS CVEs that were published today, but I don't see the CVEs in the bulletin. Good thing Pure Storage is never targeted or anything...

support.purestorage.com/bundle

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

##

cR0w@infosec.exchange at 2025-06-10T18:29:43.000Z ##

Pure Storage published a bulletin a few days ago which is supposed to include a couple DoS CVEs that were published today, but I don't see the CVEs in the bulletin. Good thing Pure Storage is never targeted or anything...

support.purestorage.com/bundle

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

#patchTuesday

##

CVE-2025-0051
(0 None)

EPSS: 0.00%

updated 2025-06-10T18:15:30.030000

2 posts

Improper input validation performed during the authentication process of FlashArray could lead to a system Denial of Service.

cR0w at 2025-06-10T18:29:43.394Z ##

Pure Storage published a bulletin a few days ago which is supposed to include a couple DoS CVEs that were published today, but I don't see the CVEs in the bulletin. Good thing Pure Storage is never targeted or anything...

support.purestorage.com/bundle

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

##

cR0w@infosec.exchange at 2025-06-10T18:29:43.000Z ##

Pure Storage published a bulletin a few days ago which is supposed to include a couple DoS CVEs that were published today, but I don't see the CVEs in the bulletin. Good thing Pure Storage is never targeted or anything...

support.purestorage.com/bundle

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

#patchTuesday

##

CVE-2025-27818
(8.8 HIGH)

EPSS: 0.02%

updated 2025-06-10T16:15:36.917000

1 posts

A possible security vulnerability has been identified in Apache Kafka. This requires access to a alterConfig to the cluster resource, or Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config and a SASL-based security protocol, which has been possible on Kafka clusters since Apache Kafka 2.0.0 (Kafka Connect 2.3.0). When configuring

cR0w@infosec.exchange at 2025-06-10T12:54:24.000Z ##

Three new Apache Kafka CVEs with some specific configurations.

kafka.apache.org/cve-list

CVE-2025-27819 Apache Kafka: Possible RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration

In CVE-2023-25194, we announced the RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration in Kafka Connect API. But not only Kafka Connect API is vulnerable to this attack, the Apache Kafka brokers also have this vulnerability. To exploit this vulnerability, the attacker needs to be able to connect to the Kafka cluster and have the AlterConfigs permission on the cluster resource.

Since Apache Kafka 3.4.0, we have added a system property ("-Dorg.apache.kafka.disallowed.login.modules") to disable the problematic login modules usage in SASL JAAS configuration. Also by default "com.sun.security.auth.module.JndiLoginModule" is disabled in Apache Kafka 3.4.0, and "com.sun.security.auth.module.JndiLoginModule,com.sun.security.auth.module.LdapLoginModule" is disabled by default in Apache Kafka 3.9.1/4.0.0.

CVE-2025-27818 Apache Kafka: Possible RCE attack via SASL JAAS LdapLoginModule configuration

A possible security vulnerability has been identified in Apache Kafka. This requires access to a alterConfig to the cluster resource, or Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config and a SASL-based security protocol, which has been possible on Kafka clusters since Apache Kafka 2.0.0 (Kafka Connect 2.3.0). When configuring the broker via config file or AlterConfig command, or connector via the Kafka Kafka Connect REST API, an authenticated operator can set the sasl.jaas.config property for any of the connector's Kafka clients to "com.sun.security.auth.module.LdapLoginModule", which can be done via the producer.override.sasl.jaas.config, consumer.override.sasl.jaas.config, or admin.override.sasl.jaas.config properties. This will allow the server to connect to the attacker's LDAP server and deserialize the LDAP response, which the attacker can use to execute java deserialization gadget chains on the Kafka connect server. Attacker can cause unrestricted deserialization of untrusted data (or) RCE vulnerability when there are gadgets in the classpath.

Since Apache Kafka 3.9.1/4.0.0, we have added a system property ("-Dorg.apache.kafka.disallowed.login.modules") to disable the problematic login modules usage in SASL JAAS configuration. Also by default "com.sun.security.auth.module.JndiLoginModule,com.sun.security.auth.module.LdapLoginModule" are disabled in Apache Kafka Connect 3.9.1/4.0.0.

CVE-2025-27817 Apache Kafka Client: Arbitrary file read and SSRF vulnerability

A possible arbitrary file read and SSRF vulnerability has been identified in Apache Kafka Client. Apache Kafka Clients accept configuration data for setting the SASL/OAUTHBEARER connection with the brokers, including "sasl.oauthbearer.token.endpoint.url" and "sasl.oauthbearer.jwks.endpoint.url". Apache Kafka allows clients to read an arbitrary file and return the content in the error log, or sending requests to an unintended location. In applications where Apache Kafka Clients configurations can be specified by an untrusted party, attackers may use the "sasl.oauthbearer.token.endpoint.url" and "sasl.oauthbearer.jwks.endpoint.url" configuration to read arbitrary contents of the disk and environment variables or make requests to an unintended location. In particular, this flaw may be used in Apache Kafka Connect to escalate from REST API access to filesystem/environment/URL access, which may be undesirable in certain environments, including SaaS products.

Since Apache Kafka 3.9.1/4.0.0, we have added a system property ("-Dorg.apache.kafka.sasl.oauthbearer.allowed.urls") to set the allowed urls in SASL JAAS configuration. In 3.9.1, it accepts all urls by default for backward compatibility. However in 4.0.0 and newer, the default value is empty list and users have to set the allowed urls explicitly.

##

CVE-2025-27531
(9.8 CRITICAL)

EPSS: 0.02%

updated 2025-06-10T16:15:36.583000

1 posts

Deserialization of Untrusted Data vulnerability in Apache InLong.  This issue affects Apache InLong: from 1.13.0 before 2.1.0, this issue would allow an authenticated attacker to read arbitrary files by double writing the param. Users are recommended to upgrade to version 2.1.0, which fixes the issue.

cR0w@infosec.exchange at 2025-06-06T15:39:44.000Z ##

Apache InLong: An arbitrary file read vulnerability for JDBC

lists.apache.org/thread/r62lkq

Deserialization of Untrusted Data vulnerability in Apache InLong.

This issue affects Apache InLong: from 1.13.0 before 2.1.0, this issue would allow an authenticated attacker to read arbitrary files by double writing the param.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-47827
(8.4 HIGH)

EPSS: 0.02%

updated 2025-06-10T15:31:45

1 posts

In IGEL OS before 11, Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image.

1 repos

https://github.com/Zedeldi/CVE-2025-47827

cR0w@infosec.exchange at 2025-06-05T14:59:06.000Z ##

IGEL OS Secure Boot bypass with PoC.

github.com/Zedeldi/CVE-2025-47

In IGEL OS before 11, Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-26395
(7.0 None)

EPSS: 0.00%

updated 2025-06-10T15:30:53

1 posts

SolarWinds Observability Self-Hosted was susceptible to a cross-site scripting (XSS) vulnerability due to an unsanitized field in the URL. The attack requires authentication using an administrator-level account and user interaction is required.

cR0w@infosec.exchange at 2025-06-10T16:00:26.000Z ##

SolarWinds released Observability Self-Hosted 2025.2 which patched some CVEs:

  • CVE-2025-26394 ( sev:MED )
  • CVE-2025-26395 ( sev:HIGH )
  • CVE-2024-9143 ( sev:MED )
  • CVE-2025-22869 ( sev:HIGH )

documentation.solarwinds.com/e

#patchTuesday

##

CVE-2025-5335
(7.8 HIGH)

EPSS: 0.00%

updated 2025-06-10T15:30:53

1 posts

A maliciously crafted binary file when downloaded could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to an untrusted search path being utilized in the Autodesk Installer application. Exploitation of this vulnerability may lead to code execution.

cR0w@infosec.exchange at 2025-06-10T15:53:53.000Z ##

PrivEsc in Autodesk Installer.

autodesk.com/trust/security-ad

sev:HIGH 7.8 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

A maliciously crafted binary file when downloaded could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to an untrusted search path being utilized in the Autodesk Installer application. Exploitation of this vulnerability may lead to code execution.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-5353
(8.8 HIGH)

EPSS: 0.00%

updated 2025-06-10T15:30:53

2 posts

A hardcoded key in Ivanti Workspace Control before version 10.19.10.0 allows a local authenticated attacker to decrypt stored SQL credentials.

AAKL@infosec.exchange at 2025-06-10T15:53:05.000Z ##

Ivanti: Security Advisory Ivanti Workspace Control (CVE-2025-5353, CVE- CVE-2025-22463, CVE-2025-22455) forums.ivanti.com/s/article/Se #cybersecurity #Infosec #Ivanti @cR0w

##

cR0w@infosec.exchange at 2025-06-10T15:51:17.000Z ##

Fucking Ivanti. What, do they think they're Cisco or something?

forums.ivanti.com/s/article/Se

sev:HIGH 8.8 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

A hardcoded key in Ivanti Workspace Control before version 10.19.10.0 allows a local authenticated attacker to decrypt stored SQL credentials.

sev:HIGH 7.3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L`

A hardcoded key in Ivanti Workspace Control before version 10.19.10.0 allows a local authenticated attacker to decrypt the stored environment password.

sev:HIGH 8.8 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

A hardcoded key in Ivanti Workspace Control before version 10.19.0.0 allows a local authenticated attacker to decrypt stored SQL credentials.

#patchTuesday

##

CVE-2025-22455
(8.8 HIGH)

EPSS: 0.00%

updated 2025-06-10T15:30:53

2 posts

A hardcoded key in Ivanti Workspace Control before version 10.19.0.0 allows a local authenticated attacker to decrypt stored SQL credentials.

AAKL@infosec.exchange at 2025-06-10T15:53:05.000Z ##

Ivanti: Security Advisory Ivanti Workspace Control (CVE-2025-5353, CVE- CVE-2025-22463, CVE-2025-22455) forums.ivanti.com/s/article/Se #cybersecurity #Infosec #Ivanti @cR0w

##

cR0w@infosec.exchange at 2025-06-10T15:51:17.000Z ##

Fucking Ivanti. What, do they think they're Cisco or something?

forums.ivanti.com/s/article/Se

sev:HIGH 8.8 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

A hardcoded key in Ivanti Workspace Control before version 10.19.10.0 allows a local authenticated attacker to decrypt stored SQL credentials.

sev:HIGH 7.3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L`

A hardcoded key in Ivanti Workspace Control before version 10.19.10.0 allows a local authenticated attacker to decrypt the stored environment password.

sev:HIGH 8.8 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

A hardcoded key in Ivanti Workspace Control before version 10.19.0.0 allows a local authenticated attacker to decrypt stored SQL credentials.

#patchTuesday

##

CVE-2025-22463
(7.3 HIGH)

EPSS: 0.00%

updated 2025-06-10T15:30:53

2 posts

A hardcoded key in Ivanti Workspace Control before version 10.19.10.0 allows a local authenticated attacker to decrypt the stored environment password.

AAKL@infosec.exchange at 2025-06-10T15:53:05.000Z ##

Ivanti: Security Advisory Ivanti Workspace Control (CVE-2025-5353, CVE- CVE-2025-22463, CVE-2025-22455) forums.ivanti.com/s/article/Se #cybersecurity #Infosec #Ivanti @cR0w

##

cR0w@infosec.exchange at 2025-06-10T15:51:17.000Z ##

Fucking Ivanti. What, do they think they're Cisco or something?

forums.ivanti.com/s/article/Se

sev:HIGH 8.8 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

A hardcoded key in Ivanti Workspace Control before version 10.19.10.0 allows a local authenticated attacker to decrypt stored SQL credentials.

sev:HIGH 7.3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L`

A hardcoded key in Ivanti Workspace Control before version 10.19.10.0 allows a local authenticated attacker to decrypt the stored environment password.

sev:HIGH 8.8 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

A hardcoded key in Ivanti Workspace Control before version 10.19.0.0 allows a local authenticated attacker to decrypt stored SQL credentials.

#patchTuesday

##

CVE-2025-5606
(6.3 MEDIUM)

EPSS: 2.89%

updated 2025-06-10T15:30:41

1 posts

A vulnerability was found in Tenda AC18 15.03.05.05. It has been declared as critical. This vulnerability affects the function formSetIptv of the file /goform/SetIPTVCfg. The manipulation of the argument list leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5600
(9.8 CRITICAL)

EPSS: 0.10%

updated 2025-06-10T15:30:40

1 posts

A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. This issue affects the function setLanguageCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument LangType leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-26394
(4.8 MEDIUM)

EPSS: 0.00%

updated 2025-06-10T15:15:23.543000

1 posts

SolarWinds Observability Self-Hosted is susceptible to an open redirection vulnerability. The URL is not properly sanitized, and an attacker could manipulate the string to redirect a user to a malicious site. The attack complexity is high, and authentication is required.

cR0w@infosec.exchange at 2025-06-10T16:00:26.000Z ##

SolarWinds released Observability Self-Hosted 2025.2 which patched some CVEs:

  • CVE-2025-26394 ( sev:MED )
  • CVE-2025-26395 ( sev:HIGH )
  • CVE-2024-9143 ( sev:MED )
  • CVE-2025-22869 ( sev:HIGH )

documentation.solarwinds.com/e

#patchTuesday

##

CVE-2025-5604
(7.3 HIGH)

EPSS: 0.04%

updated 2025-06-10T15:08:53.860000

1 posts

A vulnerability was found in Campcodes Hospital Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /user-login.php. The manipulation of the argument Username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5654
(6.3 MEDIUM)

EPSS: 0.03%

updated 2025-06-10T15:04:45.870000

1 posts

A vulnerability was found in PHPGurukul Complaint Management System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/edit-state.php. The manipulation of the argument description leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5685
(8.8 HIGH)

EPSS: 0.05%

updated 2025-06-10T15:01:39.320000

1 posts

A vulnerability, which was classified as critical, was found in Tenda CH22 1.0.0.1. This affects the function formNatlimit of the file /goform/Natlimit. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-43698
(0 None)

EPSS: 0.01%

updated 2025-06-10T12:15:24.227000

1 posts

Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field level security controls for Salesforce objects. This impacts OmniStudio: before Spring 2025

cR0w@infosec.exchange at 2025-06-10T12:45:44.000Z ##

Five CVEs in Salesforce OmniStudio.

help.salesforce.com/s/articleV

Datamapper CVE:

CVE-2025-43697: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio’s DataMapper feature allows exposure of encrypted data. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score 7.5 (High)

Flexcard CVEs:

CVE-2025-43698: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field-level security controls for Salesforce objects. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 7.5 (High)

CVE-2025-43699: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field-level security controls for OmniUICard objects. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 5.3 (Medium)

CVE-2025-43700: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows exposure of encrypted data. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 7.5 (High)

CVE-2025-43701: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows exposure of Custom Settings data. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 7.5 (High)

##

CVE-2025-43697
(0 None)

EPSS: 0.01%

updated 2025-06-10T12:15:24.097000

1 posts

Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (DataMapper) allows exposure of encrypted data. This impacts OmniStudio: before Spring 2025

cR0w@infosec.exchange at 2025-06-10T12:45:44.000Z ##

Five CVEs in Salesforce OmniStudio.

help.salesforce.com/s/articleV

Datamapper CVE:

CVE-2025-43697: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio’s DataMapper feature allows exposure of encrypted data. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score 7.5 (High)

Flexcard CVEs:

CVE-2025-43698: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field-level security controls for Salesforce objects. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 7.5 (High)

CVE-2025-43699: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field-level security controls for OmniUICard objects. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 5.3 (Medium)

CVE-2025-43700: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows exposure of encrypted data. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 7.5 (High)

CVE-2025-43701: Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows exposure of Custom Settings data. This impacts OmniStudio versions prior to Spring ‘25. CVSS 3.1 Scoring Link Base Score: 7.5 (High)

##

CVE-2025-1041
(10.0 CRITICAL)

EPSS: 0.06%

updated 2025-06-10T06:31:44

1 posts

An improper input validation discovered in Avaya Call Management System could allow an unauthorized remote command via a specially crafted web request. Affected versions include 18.x, 19.x prior to 19.2.0.7, and 20.x prior to 20.0.1.0.

cR0w@infosec.exchange at 2025-06-10T12:51:01.000Z ##

Avaya coming up just short of perfect here with command exec in their Call Management System.

support.avaya.com/css/public/d

sev:CRIT 9.9 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

An improper input validation discovered in Avaya Call Management System could allow an unauthorized remote command via a specially crafted web request. Affected versions include 18.x, 19.x prior to 19.2.0.7, and 20.x prior to 20.0.1.0.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-42989
(9.6 CRITICAL)

EPSS: 0.04%

updated 2025-06-10T01:15:22.183000

2 posts

RFC inbound processing�does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation the attacker could critically impact both integrity and availability of the application.

jbhall56@infosec.exchange at 2025-06-10T12:25:17.000Z ##

Tracked as CVE-2025-42989 (CVSS score of 9.6), the critical bug is described as a missing authorization check in the NetWeaver application server for ABAP. securityweek.com/critical-vuln

##

cR0w@infosec.exchange at 2025-06-10T01:49:04.000Z ##

SAP Patch Tuesday has begun. I'm too tired to go through them all but here's a taste if you're interested in a sev:CRIT:

nvd.nist.gov/vuln/detail/CVE-2

#patchTuesday

##

CVE-2024-42009
(9.3 CRITICAL)

EPSS: 68.50%

updated 2025-06-10T01:00:02.087000

2 posts

A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.

4 repos

https://github.com/DaniTheHack3r/CVE-2024-42009-PoC

https://github.com/Foxer131/CVE-2024-42008-9-exploit

https://github.com/Bhanunamikaze/CVE-2024-42009

https://github.com/0xbassiouny1337/CVE-2024-42009

AAKL@infosec.exchange at 2025-06-10T14:06:08.000Z ##

If you missed this, CISA added these vulnerabilities to the KEV catalogue yesterday.

- CVE-2025-32433: Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2024-42009: RoundCube Webmail Cross-Site Scripting Vulnerability cve.org/CVERecord?id=CVE-2024- #CISA #cybersecurity #Infosec

##

cisakevtracker@mastodon.social at 2025-06-09T18:00:53.000Z ##

CVE ID: CVE-2024-42009
Vendor: Roundcube
Product: Webmail
Date Added: 2025-06-09
Vulnerability: RoundCube Webmail Cross-Site Scripting Vulnerability
Notes: roundcube.net/news/2024/08/04/ ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-3461
(9.1 CRITICAL)

EPSS: 0.05%

updated 2025-06-09T19:15:24.923000

1 posts

The Quantenna Wi-Fi chips ship with an unauthenticated telnet interface by default. This is an instance of CWE-306, "Missing Authentication for Critical Function," and is estimated as a CVSS 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first pub

CVE-2025-3460
(7.7 HIGH)

EPSS: 0.11%

updated 2025-06-09T19:15:24.810000

1 posts

The Quantenna Wi-Fi chipset ships with a local control script, set_tx_pow, that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, a

CVE-2025-5794
(8.8 HIGH)

EPSS: 0.09%

updated 2025-06-09T19:08:21.053000

1 posts

A vulnerability, which was classified as critical, has been found in Tenda AC5 15.03.06.47. Affected by this issue is the function formSetPPTPUserList of the file /goform/setPptpUserList. The manipulation of the argument list leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5798
(8.8 HIGH)

EPSS: 0.09%

updated 2025-06-09T19:08:05.903000

1 posts

A vulnerability was found in Tenda AC8 16.03.34.09. It has been classified as critical. Affected is the function fromSetSysTime of the file /goform/SetSysTimeCfg. The manipulation of the argument timeType leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-3357
(9.8 CRITICAL)

EPSS: 0.40%

updated 2025-06-09T18:56:33.710000

1 posts

IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 19 could allow a remote attacker to execute arbitrary code due to improper validation of an index value of a dynamically allocated array.

beyondmachines1@infosec.exchange at 2025-06-06T12:01:08.000Z ##

IBM Tivoli Monitoring critical vulnerability allows remote code execution

IBM addressed a critical vulnerability (CVE-2025-3357) in its Tivoli Monitoring infrastructure software that allows unauthenticated remote attackers to execute arbitrary code through improper validation of dynamically allocated array index values. Organizations should immediately upgrade to IBM Tivoli Monitoring version 6.3.0.7-SP0020. No workarounds are available.

**If you are running IBM Tivoli Monitoring, make sure it's isolated from the internet and accessible only from trusted networks. Then plan a quick patch cycle. Don't ignore this one, someone will find a way to exploit it.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-31022
(9.8 CRITICAL)

EPSS: 0.06%

updated 2025-06-09T18:32:16

2 posts

Authentication Bypass Using an Alternate Path or Channel vulnerability in PayU India PayU India allows Authentication Abuse. This issue affects PayU India: from n/a through 3.8.5.

AAKL@infosec.exchange at 2025-06-10T13:37:41.000Z ##

This is critical CVE-2025-31022 vulnerability. There's no patch.

“If you’re a PayU CommercePro user, please deactivate and delete the plugin.”

Infosecurity-Magazine: PayU Plugin Flaw Allows Account Takeover on 5000 WordPress Sites infosecurity-magazine.com/news #cybersecurity #Infosec #WordPress

##

beyondmachines1@infosec.exchange at 2025-06-10T12:01:10.000Z ##

Critical account takeover flaw reported in WordPress PayU India plugin

A critical vulnerability (CVE-2025-31022) in the WordPress PayU India plugin allows unauthenticated attackers to hijack any user account, including administrators, through exploitation of insecure API routes and hardcoded email validation that enables token generation and session manipulation.

**If you are PayU India plugin, be aware that it's critically vulnerable with no fixes. Immediately deactivate and the plugin from your WordPress installations.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-5799
(8.8 HIGH)

EPSS: 0.09%

updated 2025-06-09T15:32:48

1 posts

A vulnerability was found in Tenda AC8 16.03.34.09. It has been declared as critical. Affected by this vulnerability is the function fromSetWirelessRepeat of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5399
(7.5 HIGH)

EPSS: 0.04%

updated 2025-06-09T15:32:48

1 posts

Due to a mistake in libcurl's WebSocket code, a malicious server can send a particularly crafted packet which makes libcurl get trapped in an endless busy-loop. There is no other way for the application to escape or exit this loop other than killing the thread/process. This might be used to DoS libcurl-using application.

bagder@mastodon.social at 2025-06-04T05:53:52.000Z ##

The new #curl CVE-2025-5399 is an infinite loop in the WebSocket code: curl.se/docs/CVE-2025-5399.html

##

CVE-2025-5795
(8.8 HIGH)

EPSS: 0.09%

updated 2025-06-09T15:31:42

1 posts

A vulnerability, which was classified as critical, was found in Tenda AC5 1.0/15.03.06.47. This affects the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5592
(7.3 HIGH)

EPSS: 0.04%

updated 2025-06-09T15:31:37

1 posts

A vulnerability, which was classified as critical, has been found in FreeFloat FTP Server 1.0. Affected by this issue is some unknown functionality of the component PASSIVE Command Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5715
(3.8 LOW)

EPSS: 0.02%

updated 2025-06-09T14:15:24.393000

1 posts

A vulnerability was found in Signal App 7.41.4 on Android. It has been declared as problematic. This vulnerability affects unknown code of the component Biometric Authentication Handler. The manipulation leads to missing critical step in authentication. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation appears to be difficult.

cR0w@infosec.exchange at 2025-06-06T10:10:32.000Z ##

Make sure Signal is up to date, especially on Android. This seems like an unlikely vuln to have much impact, but different threat models, etc.

A vulnerability was found in Signal App 7.41.4 on Android. It has been declared as problematic. This vulnerability affects unknown code of the component Biometric Authentication Handler. The manipulation leads to missing critical step in authentication. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-3835
(9.7 CRITICAL)

EPSS: 0.15%

updated 2025-06-09T12:31:18

3 posts

Zohocorp ManageEngine Exchange Reporter Plus versions 5721 and prior are vulnerable to Remote code execution in the Content Search module.

beyondmachines1 at 2025-06-10T18:01:10.196Z ##

Critical vulnerability discovered in ManageEngine Exchange Reporter Plus

ManageEngine addressed a critical vulnerability (CVE-2025-3835) in its Exchange Reporter Plus email monitoring solution that allows authenticated attackers to execute arbitrary commands through the Content Search module, affecting all builds numbered 5721 and below.

**If you're running ManageEngine Exchange Reporter Plus build 5721 or older, you have a critical vulnerability that lets attackers take over your server completely. You are not safe just because this tool is internal to your organizations - hackers can breach credentials, and malicious insiders can abuse the system. Update to build 5722 or later ASAP.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2025-06-10T18:01:10.000Z ##

Critical vulnerability discovered in ManageEngine Exchange Reporter Plus

ManageEngine addressed a critical vulnerability (CVE-2025-3835) in its Exchange Reporter Plus email monitoring solution that allows authenticated attackers to execute arbitrary commands through the Content Search module, affecting all builds numbered 5721 and below.

**If you're running ManageEngine Exchange Reporter Plus build 5721 or older, you have a critical vulnerability that lets attackers take over your server completely. You are not safe just because this tool is internal to your organizations - hackers can breach credentials, and malicious insiders can abuse the system. Update to build 5722 or later ASAP.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

cR0w@infosec.exchange at 2025-06-09T12:36:48.000Z ##

Zohocorp ManageEngine with a sev:CRIT and three sev:HIGH CVEs.

manageengine.com/products/exch

manageengine.com/products/acti

manageengine.com/products/acti

manageengine.com/products/acti

##

CVE-2025-36528
(8.3 HIGH)

EPSS: 0.03%

updated 2025-06-09T12:31:18

1 posts

Zohocorp ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to authenticated SQL injection in Service Account Auditing reports.

CVE-2025-27709
(8.3 HIGH)

EPSS: 0.03%

updated 2025-06-09T12:31:12

1 posts

Zohocorp ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to authenticated SQL injection in the Service Account Auditing reports.

CVE-2025-41444
(8.3 HIGH)

EPSS: 0.03%

updated 2025-06-09T12:15:47.880000

1 posts

Zohocorp ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to authenticated SQL injection in the alerts module.

CVE-2025-35005
(7.1 HIGH)

EPSS: 0.10%

updated 2025-06-09T12:15:47.880000

1 posts

Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFMAC command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This is

CVE-2025-35008
(7.1 HIGH)

EPSS: 0.10%

updated 2025-06-09T12:15:47.880000

1 posts

Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MMNAME command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This i

CVE-2025-49113
(10.0 CRITICAL)

EPSS: 0.54%

updated 2025-06-09T06:30:22

9 posts

Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execution by authenticated users because the _from parameter in a URL is not validated in program/actions/settings/upload.php, leading to PHP Object Deserialization.

Nuclei template

7 repos

https://github.com/BiiTts/Roundcube-CVE-2025-49113

https://github.com/rxerium/CVE-2025-49113

https://github.com/Ademking/CVE-2025-49113-nuclei-template

https://github.com/rasool13x/exploit-CVE-2025-49113

https://github.com/hakaioffsec/CVE-2025-49113-exploit

https://github.com/fearsoff-org/CVE-2025-49113

https://github.com/SyFi/CVE-2025-49113

DarkWebInformer@infosec.exchange at 2025-06-09T20:21:09.000Z ##

🚨CVE-2025-49113: Proof of Concept Demonstrating Remote Code Execution Through Insecure Deserialization in Roundcube

darkwebinformer.com/cve-2025-4

##

oversecurity@mastodon.social at 2025-06-09T20:20:31.000Z ##

Over 84,000 Roundcube instances vulnerable to actively exploited flaw

Over 84,000 instances of the Roundcube webmail software are vulnerable to CVE-2025-49113, a critical remote code execution (RCE) vulnerability with...

🔗️ [Bleepingcomputer] link.is.it/ru6ss2

##

cR0w@infosec.exchange at 2025-06-09T18:02:07.000Z ##

Today. It took until today for CVE-2025-49113 to get added to the KEV Catalog.

##

alternativeto@mas.to at 2025-06-09T14:36:33.000Z ##

A critical RCE vulnerability in Roundcube webmail, CVE-2025-49113, affects versions 1.1.0 to 1.6.10. It allows attacks via PHP object deserialization, impacting 1.2M instances. A patch was issued on June 1, 2025 alternativeto.net/news/2025/6/

##

jos1264@social.skynetcloud.site at 2025-06-09T12:15:03.000Z ##

Roundcube RCE: Dark web activity signals imminent attacks (CVE-2025-49113) helpnetsecurity.com/2025/06/09 #vulnerability #Shadowserver #Don'tmiss #Roundcube #Hotstuff #FearsOff #CERT-PL #exploit #News #PoC

##

beyondmachines1@infosec.exchange at 2025-06-06T14:01:08.000Z ##

Critical Roundcube Webmail vulnerability exploited within days of disclosure

The critical decade-old Roundcube vulnerability (CVE-2025-49113, CVSS 9.9) is now being actively exploited and dubbed "email armageddon". Cybercriminals are selling working exploits on underground forums just 48 hours after patches were released. The vulnerability affects an estimated 53 million hosts globally including major hosting providers like GoDaddy and Hostinger.

**If you still didn't patch your Roundcube webmail installations, DO IT NOW! The critical flaw is already weaponized and attacks have started. And with leaked passwords, be certain that you will be hacked.**
#cybersecurity #infosec #attack #activeattack
beyondmachines.net/event_detai

##

oversecurity@mastodon.social at 2025-06-05T17:10:36.000Z ##

Hacker selling critical Roundcube webmail exploit as tech info disclosed

Hackers are actively exploiting CVE-2025-49113, a critical vulnerability in the widely used Roundcube open-source webmail application that allows...

🔗️ [Bleepingcomputer] link.is.it/SheHlV

##

todb@infosec.exchange at 2025-06-04T13:22:38.000Z ##

#RoundCube bugs are nearly always a big deal. Pay attention to this one, CVE-2025-49113. I’d be surprised if a #PoC #exploit takes longer than a day or two to surface.

It does require the attacker to have an account, but that’s sometimes a pretty low barrier to entry (depending on the site).
infosec.exchange/@securityaffa

##

beyondmachines1@infosec.exchange at 2025-06-04T09:01:08.000Z ##

Critical decade-old flaw in Roundcube Webmail enables remote code execution

A critical decade-old vulnerability (CVE-2025-49113) has been discovered in Roundcube Webmail, allowing post-authenticated remote code execution through PHP object deserialization flaws in URL parameter handling.

**Update your Roundcube webmail installations to version 1.6.11 or 1.5.10 LTS immediately. This is a critical flaw and the only barrier is a valid login - which can be easily bypassed with phishing or through recycled passwords. Since proof-of-concept exploit code will be released soon, hackers will be attacking your Roundcube.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-35007
(7.1 HIGH)

EPSS: 0.10%

updated 2025-06-08T21:30:37

1 posts

Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFRULE command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This i

CVE-2025-35009
(7.1 HIGH)

EPSS: 0.10%

updated 2025-06-08T21:30:37

1 posts

Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNNETSP command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This

CVE-2025-35010
(7.1 HIGH)

EPSS: 0.10%

updated 2025-06-08T21:30:37

1 posts

Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNPINGTM command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This

CVE-2025-35006
(7.1 HIGH)

EPSS: 0.10%

updated 2025-06-08T21:30:37

1 posts

Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFPORTFWD command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). Thi

CVE-2025-3459
(7.7 HIGH)

EPSS: 0.11%

updated 2025-06-08T21:30:37

1 posts

The Quantenna Wi-Fi chipset ships with a local control script, transmit_file, that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:

CVE-2025-32457
(7.7 HIGH)

EPSS: 0.11%

updated 2025-06-08T21:30:37

1 posts

The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_file_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVS

CVE-2025-35004
(7.1 HIGH)

EPSS: 0.10%

updated 2025-06-08T21:30:30

1 posts

Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFIP command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). This iss

CVE-2025-32459
(7.7 HIGH)

EPSS: 0.11%

updated 2025-06-08T21:30:30

1 posts

The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the sync_time argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV

CVE-2025-32458
(7.7 HIGH)

EPSS: 0.11%

updated 2025-06-08T21:30:30

1 posts

The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_syslog_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#C

CVE-2025-32455
(7.7 HIGH)

EPSS: 0.11%

updated 2025-06-08T21:30:29

1 posts

The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the run_cmd argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L

CVE-2025-32456
(7.7 HIGH)

EPSS: 0.11%

updated 2025-06-08T21:30:29

1 posts

The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the put_file_to_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 ( CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) https://www.first.org/cvss/calculator/3-1#CVSS:

CVE-2025-5652
(6.3 MEDIUM)

EPSS: 0.03%

updated 2025-06-06T21:31:29

1 posts

A vulnerability, which was classified as critical, was found in PHPGurukul Complaint Management System 2.0. Affected is an unknown function of the file /admin/between-date-complaintreport.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5639
(7.3 HIGH)

EPSS: 0.03%

updated 2025-06-06T21:31:29

1 posts

A vulnerability was found in PHPGurukul Notice Board System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /forgot-password.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5619
(8.8 HIGH)

EPSS: 0.12%

updated 2025-06-06T21:31:29

1 posts

A vulnerability, which was classified as critical, has been found in Tenda CH22 1.0.0.1. This issue affects the function formaddUserName of the file /goform/addUserName. The manipulation of the argument Password leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5572
(8.8 HIGH)

EPSS: 0.04%

updated 2025-06-06T21:31:29

1 posts

A vulnerability was found in D-Link DCS-932L 2.18.01. It has been declared as critical. Affected by this vulnerability is the function setSystemEmail of the file /setSystemEmail. The manipulation of the argument EmailSMTPPortNumber leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects

CVE-2025-5616
(6.3 MEDIUM)

EPSS: 0.04%

updated 2025-06-06T20:10:46.310000

1 posts

A vulnerability was found in PHPGurukul Online Fire Reporting System 1.2. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/profile.php. The manipulation of the argument mobilenumber leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as wel

CVE-2025-5573
(6.3 MEDIUM)

EPSS: 0.10%

updated 2025-06-06T18:48:46.463000

1 posts

A vulnerability was found in D-Link DCS-932L 2.18.01. It has been rated as critical. Affected by this issue is the function setSystemWizard/setSystemControl of the file /setSystemWizard. The manipulation of the argument AdminID leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products t

CVE-2025-5624
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-06-06T18:31:34

1 posts

A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been declared as critical. This vulnerability affects the function QoSPortSetup of the file /goform/QoSPortSetup. The manipulation of the argument port0_group/port0_remarker/ssid0_group/ssid0_remarker leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5621
(7.3 HIGH)

EPSS: 0.34%

updated 2025-06-06T18:31:34

1 posts

A vulnerability has been found in D-Link DIR-816 1.10CNB05 and classified as critical. Affected by this vulnerability is the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affect

CVE-2025-5788
(8.8 HIGH)

EPSS: 0.13%

updated 2025-06-06T18:30:38

1 posts

A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been rated as critical. Affected by this issue is some unknown functionality of the file /boafrm/formReflashClientTbl of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used

CVE-2025-5623
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-06-06T18:30:30

1 posts

A vulnerability was found in D-Link DIR-816 1.10CNB05. It has been classified as critical. This affects the function qosClassifier of the file /goform/qosClassifier. The manipulation of the argument dip_address/sip_address leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affec

CVE-2025-5622
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-06-06T18:30:29

1 posts

A vulnerability was found in D-Link DIR-816 1.10CNB05 and classified as critical. Affected by this issue is the function wirelessApcli_5g of the file /goform/wirelessApcli_5g. The manipulation of the argument apcli_mode_5g/apcli_enc_5g/apcli_default_key_5g leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This v

CVE-2025-5620
(7.3 HIGH)

EPSS: 0.34%

updated 2025-06-06T18:30:29

1 posts

A vulnerability, which was classified as critical, was found in D-Link DIR-816 1.10CNB05. Affected is the function setipsec_config of the file /goform/setipsec_config. The manipulation of the argument localIP/remoteIP leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products th

CVE-2025-41646
(9.8 CRITICAL)

EPSS: 0.35%

updated 2025-06-06T15:31:04

1 posts

An unauthorized remote attacker can bypass the authentication of the affected software package by misusing an incorrect type conversion. This leads to full compromise of the device

cR0w@infosec.exchange at 2025-06-06T15:43:24.000Z ##

Industrial Raspberry Pi? Да нет.

kunbus.com/en/productsecurity/

sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

The RevPi Webstatus application is vulnerable to an authentication bypass. The password check is vulnerable to a implicit type conversion. That results in a wrong authentication if the JSON value TRUE is provided in the password parameter hashcode.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-49425
(7.1 HIGH)

EPSS: 0.01%

updated 2025-06-06T15:31:00

1 posts

Cross-Site Request Forgery (CSRF) vulnerability in Adrian Hanft Konami Easter Egg allows Stored XSS. This issue affects Konami Easter Egg: from n/a through v0.4.

cR0w@infosec.exchange at 2025-06-06T13:46:45.000Z ##

Go hack the Konami code.

Cross-Site Request Forgery (CSRF) vulnerability in Adrian Hanft Konami Easter Egg allows Stored XSS. This issue affects Konami Easter Egg: from n/a through v0.4.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-47966
(9.8 CRITICAL)

EPSS: 0.12%

updated 2025-06-06T14:07:28.330000

3 posts

Exposure of sensitive information to an unauthorized actor in Power Automate allows an unauthorized attacker to elevate privileges over a network.

beyondmachines1@infosec.exchange at 2025-06-07T19:01:08.000Z ##

Microsoft reports critical flaw in Power Automate

Microsoft disclosed a critical vulnerability (CVE-2025-47966) in its Power Automate platform that enabled threat actors to access sensitive information and escalate privileges across target networks, potentially leading to complete system compromise. Microsoft has already implemented server-side patches. It's not clear whether the flaw was exploited before remediation.

**You don't need to do anything about this flaw. It's already patched. But be aware that the provider had a flaw. If you have an Enterprise account, reach out for more details about any possible breaches that may have affected you.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2025-06-06T18:22:46.000Z ##

Microsoft posted this new vulnerability yesterday.

Power Automate Elevation of Privilege Vulnerability - CVE-2025-47966 - msrc.microsoft.com/update-guid #Microsoft #cybersecurity #infosec

##

cR0w@infosec.exchange at 2025-06-05T21:12:38.000Z ##

Power Automate Elevation of Privilege Vulnerability

The vulnerability documented by this CVE requires no customer action to resolve

sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

msrc.microsoft.com/update-guid

Exposure of sensitive information to an unauthorized actor in Power Automate allows an unauthorized attacker to elevate privileges over a network.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-5737
(8.8 HIGH)

EPSS: 0.08%

updated 2025-06-06T14:07:28.330000

1 posts

A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formDosCfg of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5738
(8.8 HIGH)

EPSS: 0.08%

updated 2025-06-06T14:07:28.330000

1 posts

A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been rated as critical. Affected by this issue is some unknown functionality of the file /boafrm/formStats of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-3321
(0 None)

EPSS: 0.01%

updated 2025-06-06T14:07:28.330000

1 posts

A predefined administrative account is not documented and cannot be deactivated. This account cannot be misused from the network, only by local users on the server.

CVE-2025-5734
(8.8 HIGH)

EPSS: 0.08%

updated 2025-06-06T09:30:33

1 posts

A vulnerability has been found in TOTOLINK X15 1.0.0-B20230714.1105 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formWlanRedirect of the component HTTP POST Request Handler. The manipulation of the argument redirect-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-3365
(9.8 CRITICAL)

EPSS: 0.05%

updated 2025-06-06T09:30:33

1 posts

A missing protection against path traversal allows to access any file on the server.

CVE-2025-5736
(8.8 HIGH)

EPSS: 0.08%

updated 2025-06-06T09:30:32

1 posts

A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been classified as critical. Affected is an unknown function of the file /boafrm/formNtp of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5739
(8.8 HIGH)

EPSS: 0.08%

updated 2025-06-06T09:30:32

1 posts

A vulnerability classified as critical has been found in TOTOLINK X15 1.0.0-B20230714.1105. This affects an unknown part of the file /boafrm/formSaveConfig of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5735
(8.8 HIGH)

EPSS: 0.08%

updated 2025-06-06T09:30:26

1 posts

A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105 and classified as critical. This issue affects some unknown processing of the file /boafrm/formSetLg of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-3322(CVSS UNKNOWN)

EPSS: 0.45%

updated 2025-06-06T09:30:26

1 posts

An improper neutralization of inputs used in expression language allows remote code execution with the highest privileges on the server.

CVE-2011-10007
(8.8 HIGH)

EPSS: 0.05%

updated 2025-06-06T04:15:41.237000

1 posts

File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename. A file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed. Example: $ mkdir /tmp/poc; echo > "/tmp/poc/|id" $ perl -MFile::Find::Rule

cR0w@infosec.exchange at 2025-06-05T12:58:26.000Z ##

Oh look, there's a new CVE published for perl. I better make sure it's the current version so the nerds don't make a thing of it.

rt.cpan.org/Public/Bug/Display

Wed Jan 05 15:47:17 2011

Never mind then.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-5702
(5.6 MEDIUM)

EPSS: 0.04%

updated 2025-06-05T21:15:22.873000

1 posts

The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the functi

cR0w@infosec.exchange at 2025-06-05T19:03:56.000Z ##

Ooh, this could be a fun one for some of you.

sourceware.org/bugzilla/show_b

The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-1793
(9.8 CRITICAL)

EPSS: 0.04%

updated 2025-06-05T20:12:23.777000

2 posts

Multiple vector store integrations in run-llama/llama_index version v0.12.21 have SQL injection vulnerabilities. These vulnerabilities allow an attacker to read and write data using SQL, potentially leading to unauthorized access to data of other users depending on the usage of the llama-index library in a web application.

Sempf@infosec.exchange at 2025-06-09T17:00:39.000Z ##

Endor Labs emailed me with an analysis of this Llama index SQL Injection vulnerability. Yeah, it's an ad, but it's a good writeup.

endorlabs.com/learn/critical-s

#genai #vulnerability

##

cR0w@infosec.exchange at 2025-06-05T12:03:24.000Z ##

Go SQLi more AI shit.

huntr.com/bounties/8cb1555a-96

sev:CRIT 9.8 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Multiple vector store integrations in run-llama/llama_index version v0.12.21 have SQL injection vulnerabilities. These vulnerabilities allow an attacker to read and write data using SQL, potentially leading to unauthorized access to data of other users depending on the usage of the llama-index library in a web application.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-49007
(0 None)

EPSS: 0.06%

updated 2025-06-05T20:12:23.777000

1 posts

Rack is a modular Ruby web server interface. Starting in version 3.1.0 and prior to version 3.1.16, there is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571. Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting i

andrewnez@mastodon.social at 2025-06-07T19:57:40.000Z ##

Analyzing 30 days of Dependabot PR data shows how security vulnerabilities propagate through package ecosystems.

The recent rack security fix (CVE-2025-49007, github.com/advisories/GHSA-47m) generated 1,407 dependabot pull requests across GitHub repositories between June 4-7, representing about 23% of all repositories that received rack updates during this period.

##

CVE-2025-27445
(0 None)

EPSS: 0.08%

updated 2025-06-05T20:12:23.777000

1 posts

A path traversal vulnerability in RSFirewall component 2.9.7 - 3.1.5 for Joomla was discovered. This vulnerability allows authenticated users to read arbitrary files outside the Joomla root directory. The flaw is caused by insufficient sanitization of user-supplied input in file path parameters, allowing attackers to exploit directory traversal sequences (e.g., ../) to access sensitive files

CVE-2025-5642
(2.5 LOW)

EPSS: 0.01%

updated 2025-06-05T20:12:23.777000

1 posts

A vulnerability classified as problematic has been found in Radare2 5.9.9. Affected is the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation leads to memory corruption. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and m

CVE-2025-3054
(8.8 HIGH)

EPSS: 0.24%

updated 2025-06-05T20:12:23.777000

1 posts

The WP User Frontend Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload_files() function in all versions up to, and including, 4.1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. Please

1 repos

https://github.com/frogchung/CVE-2025-3054-Exploit

CVE-2025-5640
(3.3 LOW)

EPSS: 0.01%

updated 2025-06-05T20:12:23.777000

1 posts

A vulnerability was found in PX4-Autopilot 1.12.3. It has been classified as problematic. This affects the function MavlinkReceiver::handle_message_trajectory_representation_waypoints of the file mavlink_receiver.cpp of the component TRAJECTORY_REPRESENTATION_WAYPOINTS Message Handler. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The expl

CVE-2025-5608
(8.8 HIGH)

EPSS: 0.05%

updated 2025-06-05T20:12:23.777000

1 posts

A vulnerability classified as critical has been found in Tenda AC18 15.03.05.05. Affected is the function formsetreboottimer of the file /goform/SetSysAutoRebbotCfg. The manipulation of the argument rebootTime leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-22245
(5.9 MEDIUM)

EPSS: 0.03%

updated 2025-06-05T20:12:23.777000

1 posts

VMware NSX contains a stored Cross-Site Scripting (XSS) vulnerability in the router port due to improper input validation.

cR0w@infosec.exchange at 2025-06-04T20:40:14.000Z ##

VMWare with a sev:HIGH advisory for three CVEs in NSX. CVE-2025-22243, CVE-2025-22244, CVE-2025-22245

support.broadcom.com/web/ecx/s

##

CVE-2025-5607
(8.8 HIGH)

EPSS: 0.05%

updated 2025-06-05T20:12:23.777000

1 posts

A vulnerability was found in Tenda AC18 15.03.05.05. It has been rated as critical. This issue affects the function formSetPPTPUserList of the file /goform/setPptpUserList. The manipulation of the argument list leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-27753(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-06-05T15:31:39

1 posts

A SQLi vulnerability in RSMediaGallery component 1.7.4 - 2.1.6 for Joomla was discovered. The vulnerability is due to the use of unescaped user-supplied parameters in SQL queries within the dashboard component. This allows an authenticated attacker to inject malicious SQL code through unsanitized input fields, which are used directly in SQL queries. Exploiting this flaw can lead to unauthorized da

CVE-2025-30084(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-06-05T15:31:38

1 posts

A stored XSS vulnerability in RSMail! component 1.19.20 - 1.22.26 for Joomla was discovered. The issue occurs within the dashboard component, where user-supplied input is not properly sanitized before being stored and rendered. An attacker can inject malicious JavaScript code into text fields or other input points, which is subsequently executed in the browser of any user who clicks on the crafte

CVE-2025-27754
(6.5 MEDIUM)

EPSS: 0.04%

updated 2025-06-05T15:31:38

1 posts

A stored XSS vulnerability in RSBlog! component 1.11.6 - 1.14.4 for Joomla was discovered. The vulnerability allows authenticated users to inject malicious JavaScript into the plugin's resource. The injected payload is stored by the application and later executed when other users view the affected content.

CVE-2025-5658
(6.3 MEDIUM)

EPSS: 0.03%

updated 2025-06-05T15:31:38

1 posts

A vulnerability classified as critical has been found in PHPGurukul Complaint Management System 2.0. Affected is an unknown function of the file /admin/updatecomplaint.php. The manipulation of the argument Status leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-49002
(9.8 CRITICAL)

EPSS: 0.05%

updated 2025-06-05T14:07:36.847000

1 posts

DataEase is an open source business intelligence and data visualization tool. Versions prior to version 2.10.10 have a flaw in the patch for CVE-2025-32966 that allow the patch to be bypassed through case insensitivity because INIT and RUNSCRIPT are prohibited. The vulnerability has been fixed in v2.10.10. No known workarounds are available.

beyondmachines1@infosec.exchange at 2025-06-10T13:01:09.000Z ##

Multiple vulnerabilities reported in DataEase Platform exposing risk of system compromise

DataEase, an open-source business intelligence platform, disclosed multiple critical vulnerabilities including authentication bypass (CVE-2025-49001) that allows JWT token forging and remote code execution flaws (CVE-2025-49002 and CVE-2025-48999) that bypass previous security patches through case sensitivity variations and malicious JDBC statements.

**If you are using DataEase, pmake sure to isolate it from the internet and allow access only from trusted networks. Then plan a quick upgrade to version 2.10.10 or later. There are at least two scary (and fairly dumb) exploits that can compromise your DataEase.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-5701
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-06-05T12:31:20

1 posts

The HyperComments plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the hc_request_handler function in all versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for r

2 repos

https://github.com/Nxploited/CVE-2025-5701

https://github.com/Harley21211/CVE-2025-5701-Exploit

CVE-2025-5653
(6.3 MEDIUM)

EPSS: 0.03%

updated 2025-06-05T12:31:15

1 posts

A vulnerability has been found in PHPGurukul Complaint Management System 2.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/between-date-userreport.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5648
(2.5 LOW)

EPSS: 0.01%

updated 2025-06-05T09:30:33

1 posts

A vulnerability was found in Radare2 5.9.9. It has been classified as problematic. Affected is the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. An attack has to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been discl

CVE-2025-5647
(2.5 LOW)

EPSS: 0.01%

updated 2025-06-05T09:30:33

1 posts

A vulnerability was found in Radare2 5.9.9 and classified as problematic. This issue affects the function r_cons_context_break_pop in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has

CVE-2025-5646
(2.5 LOW)

EPSS: 0.01%

updated 2025-06-05T09:30:33

1 posts

A vulnerability has been found in Radare2 5.9.9 and classified as problematic. This vulnerability affects the function r_cons_rainbow_free in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult

CVE-2025-5641
(2.5 LOW)

EPSS: 0.01%

updated 2025-06-05T09:30:33

1 posts

A vulnerability was found in Radare2 5.9.9. It has been rated as problematic. This issue affects the function r_cons_is_breaked in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation is known to be difficult. The exp

CVE-2025-5643
(2.5 LOW)

EPSS: 0.01%

updated 2025-06-05T09:30:33

1 posts

A vulnerability classified as problematic was found in Radare2 5.9.9. Affected by this vulnerability is the function cons_stack_load in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has be

CVE-2025-5644
(2.5 LOW)

EPSS: 0.01%

updated 2025-06-05T09:30:33

1 posts

A vulnerability, which was classified as problematic, has been found in Radare2 5.9.9. Affected by this issue is the function r_cons_flush in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to use after free. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitation is known to be difficult. The

CVE-2025-5645
(2.5 LOW)

EPSS: 0.01%

updated 2025-06-05T09:30:33

1 posts

A vulnerability, which was classified as problematic, was found in Radare2 5.9.9. This affects the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed

CVE-2025-4598
(4.7 MEDIUM)

EPSS: 0.01%

updated 2025-06-05T09:30:24

1 posts

A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a special type of permission, which allows the process to run

Ubuntu@activitypub.awakari.com at 2025-05-29T17:16:00.000Z ## Qualys TRU Discovers Two Local Information Disclosure Vulnerabilities in Apport and systemd-coredump: CVE-2025-5054 and CVE-2025-4598 The Qualys Threat Research Unit (TRU) has discovered two loca...

#Vulnerabilities #and #Threat #Research #Qualys #Threat #Research #TRU #TruRisk #Eliminate #vulnerabilities

Origin | Interest | Match ##

CVE-2025-3055
(8.1 HIGH)

EPSS: 0.53%

updated 2025-06-05T06:30:33

1 posts

The WP User Frontend Pro plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_avatar_ajax() function in all versions up to, and including, 4.1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the r

CVE-2025-5614
(6.3 MEDIUM)

EPSS: 0.03%

updated 2025-06-05T00:31:24

1 posts

A vulnerability was found in PHPGurukul Online Fire Reporting System 1.2. It has been classified as critical. Affected is an unknown function of the file /search-report-result.php. The manipulation of the argument serachdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5615
(6.3 MEDIUM)

EPSS: 0.03%

updated 2025-06-05T00:31:24

1 posts

A vulnerability was found in PHPGurukul Online Fire Reporting System 1.2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /details.php. The manipulation of the argument requestid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5690
(6.5 MEDIUM)

EPSS: 0.03%

updated 2025-06-05T00:31:20

1 posts

PostgreSQL Anonymizer v2.0 and v2.1 contain a vulnerability that allows a masked user to bypass the masking rules defined on a table and read the original data using a database cursor or the --insert option of pg_dump. This problem occurs only when dynamic masking is enabled, which is not the default setting. The problem is resolved in version 2.2.1

CVE-2025-48935(CVSS UNKNOWN)

EPSS: 0.05%

updated 2025-06-04T22:57:14

1 posts

## Summary It is possible to bypass Deno's read/write permission checks by using `ATTACH DATABASE` statement. ## PoC ```js // poc.js import { DatabaseSync } from "node:sqlite" const db = new DatabaseSync(":memory:"); db.exec("ATTACH DATABASE 'test.db' as test;"); db.exec("CREATE TABLE test.test (id INTEGER PRIMARY KEY, name TEXT);"); ``` ``` $ deno poc.js ```

wasm@activitypub.awakari.com at 2025-06-04T19:31:26.000Z ## Deno has --allow-read / --allow-write permission bypass in `node:sqlite`Deno ... Deno is a JavaSc...

https://cve.threatint.eu/CVE/CVE-2025-48935?utm_campaign=info&utm_medium=rss&utm_source=website

Result Details ##

CVE-2025-48934(CVSS UNKNOWN)

EPSS: 0.07%

updated 2025-06-04T22:57:04

1 posts

### Summary The [Deno.env.toObject](https://docs.deno.com/api/deno/~/Deno.Env.toObject) method ignores any variables listed in the `--deny-env` option of the `deno run` command. When looking at the [documentation](https://docs.deno.com/runtime/fundamentals/security/#environment-variables) of the `--deny-env` option this might lead to a false impression that variables listed in the option are impos

wasm@activitypub.awakari.com at 2025-06-04T19:21:17.000Z ## Deno.env.toObject() ignores the variables listed in --deny-env and returns al... Deno is a JavaSc...

https://cve.threatint.eu/CVE/CVE-2025-48934?utm_campaign=info&utm_medium=rss&utm_source=website

Result Details ##

CVE-2025-48888(CVSS UNKNOWN)

EPSS: 0.05%

updated 2025-06-04T22:56:55

1 posts

### Summary `deno run --allow-read --deny-read main.ts` results in allowed, even though 'deny' should be stronger. Same with all global unary permissions given as `--allow-* --deny-*`. ### Details Caused by the fast exit logic in #22894. ### PoC Run the above command expecting no permissions to be passed. ### Impact This only affects a nonsensical combination of flags, so there shouldn't be

wasm@activitypub.awakari.com at 2025-06-04T19:15:55.000Z ## Deno run with --allow-read and --deny-read flags results in allowedDeno is a ... Deno is a JavaSc...

https://cve.threatint.eu/CVE/CVE-2025-48888?utm_campaign=info&utm_medium=rss&utm_source=website

Result Details ##

CVE-2025-5610
(6.3 MEDIUM)

EPSS: 0.03%

updated 2025-06-04T21:31:23

1 posts

A vulnerability, which was classified as critical, has been found in CodeAstro Real Estate Management System 1.0. Affected by this issue is some unknown functionality of the file /submitpropertydelete.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5609
(8.8 HIGH)

EPSS: 0.05%

updated 2025-06-04T21:31:22

1 posts

A vulnerability classified as critical was found in Tenda AC18 15.03.05.05. Affected by this vulnerability is the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-22244
(6.9 MEDIUM)

EPSS: 0.04%

updated 2025-06-04T21:31:22

1 posts

VMware NSX contains a stored Cross-Site Scripting (XSS) vulnerability in the gateway firewall due to improper input validation.

cR0w@infosec.exchange at 2025-06-04T20:40:14.000Z ##

VMWare with a sev:HIGH advisory for three CVEs in NSX. CVE-2025-22243, CVE-2025-22244, CVE-2025-22245

support.broadcom.com/web/ecx/s

##

CVE-2025-22243
(7.5 HIGH)

EPSS: 0.03%

updated 2025-06-04T21:31:15

1 posts

VMware NSX Manager UI is vulnerable to a stored Cross-Site Scripting (XSS) attack due to improper input validation.

cR0w@infosec.exchange at 2025-06-04T20:40:14.000Z ##

VMWare with a sev:HIGH advisory for three CVEs in NSX. CVE-2025-22243, CVE-2025-22244, CVE-2025-22245

support.broadcom.com/web/ecx/s

##

CVE-2025-5583
(7.3 HIGH)

EPSS: 0.04%

updated 2025-06-04T18:32:00

1 posts

A vulnerability classified as critical has been found in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /register.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5596
(7.3 HIGH)

EPSS: 0.05%

updated 2025-06-04T18:31:05

1 posts

A vulnerability was found in FreeFloat FTP Server 1.0. It has been classified as critical. Affected is an unknown function of the component REGET Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-20286
(9.9 CRITICAL)

EPSS: 0.13%

updated 2025-06-04T18:30:58

4 posts

A vulnerability in Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems. This vulnerability exists because credentia

1 repos

https://github.com/noeneal/CVE-2025-20286

jos1264@social.skynetcloud.site at 2025-06-05T19:35:02.000Z ##

CVE-2025-20286 Vulnerability Exploitation: Critical Cisco ISE Flaw Affects AWS, Microsoft Azure, and OCI Cloud Deployments – Source: socprime.com ciso2ciso.com/cve-2025-20286-v #rssfeedpostgeneratorecho #CyberSecurityNews #CVE-2025-20286 #Latestthreats #Vulnerability #socprimecom #socprime #Blog #CVE

##

jbhall56@infosec.exchange at 2025-06-05T12:26:16.000Z ##

The security defect, tracked as CVE-2025-20286, carries a CVSS score of 9.9 out of 10.0. It has been described as a static credential vulnerability. thehackernews.com/2025/06/crit

##

beyondmachines1@infosec.exchange at 2025-06-05T08:01:24.000Z ##

Critical flaw in Cisco Identity Services Engine Cloud Deployment exposes multiple platforms

Cisco reports a critical vulnerability (CVE-2025-20286, CVSS 9.9) in cloud deployments of its Identity Services Engine where generated static credentials are shared across multiple separate ISE installations, allowing attackers to access other cloud environments using extracted credentials from one deployment.

**If you're running Cisco ISE in cloud environments (AWS, Azure, or OCI), time for an urgent but painful action. Either apply the hotfixes, upgrade to the latest patched versions or isolate the Cisco ISE to be onlyu accessible from trusted network and even do a factory reset. None of these actions are easy or less painful. So it's best to do the patching.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

cR0w@infosec.exchange at 2025-06-04T16:44:58.000Z ##

Fucking Cisco. Static creds strike again. Bugdoors forever.

sec.cloudapps.cisco.com/securi

sev:CRIT 9.9: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H/E:X/RL:X/RC:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:X/MI:X/MA:X

Platform Cisco ISE Vulnerable Releases
AWS 3.1, 3.2, 3.3, and 3.4
Azure 3.2, 3.3, and 3.4
OCI 3.2, 3.3, and 3.4

A vulnerability in Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI) cloud deployments of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems.

This vulnerability exists because credentials are improperly generated when Cisco ISE is being deployed on cloud platforms, resulting in different Cisco ISE deployments sharing the same credentials. These credentials are shared across multiple Cisco ISE deployments as long as the software release and cloud platform are the same. An attacker could exploit this vulnerability by extracting the user credentials from Cisco ISE that is deployed in the cloud and then using them to access Cisco ISE that is deployed in other cloud environments through unsecured ports. A successful exploit could allow the attacker to access sensitive data, execute limited administrative operations, modify system configurations, or disrupt services within the impacted systems.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-5578
(7.3 HIGH)

EPSS: 0.04%

updated 2025-06-04T18:30:57

1 posts

A vulnerability has been found in PHPGurukul Dairy Farm Shop Management System 1.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /sales-report-details.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5579
(7.3 HIGH)

EPSS: 0.04%

updated 2025-06-04T18:30:57

1 posts

A vulnerability was found in PHPGurukul Dairy Farm Shop Management System 1.3 and classified as critical. Affected by this issue is some unknown functionality of the file /search-product.php. The manipulation of the argument productname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-5577
(7.3 HIGH)

EPSS: 0.04%

updated 2025-06-04T18:28:13.103000

1 posts

A vulnerability, which was classified as critical, was found in PHPGurukul Dairy Farm Shop Management System 1.3. Affected is an unknown function of the file /profile.php. The manipulation of the argument mobilenumber leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-27038
(7.5 HIGH)

EPSS: 3.72%

updated 2025-06-04T17:23:58.387000

1 posts

Memory corruption while rendering graphics using Adreno GPU drivers in Chrome.

beyondmachines1@infosec.exchange at 2025-06-05T11:01:08.000Z ##

Qualcomm patches actively exploited vulnerabilities in Adreno GPU Drivers

Qualcomm reports multiple vulnerabilities in its Adreno GPU drivers with three critical flaws (CVE-2025-21479, CVE-2025-21480, CVE-2025-27038) confirmed to be under active limited exploitation by Google's Threat Analysis Group. The vulnerabilities affect flagship Snapdragon processors and various connectivity modules.

**Unfortunately, you as users can't apply these patches directly. All you can do is be diligent with updating your phone OS and firmware as the updates from the vendor are released.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-20188
(10.0 CRITICAL)

EPSS: 4.36%

updated 2025-06-04T15:31:32

1 posts

A vulnerability in the Out-of-Band Access Point (AP) Image Download feature of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system. This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafte

Nuclei template

AAKL@infosec.exchange at 2025-06-06T16:22:48.000Z ##

Cisco updated this critical vulnerability today.

Cisco IOS XE Wireless Controller Software Arbitrary File Upload Vulnerability - CVE-2025-20188 sec.cloudapps.cisco.com/securi @TalosSecurity #cybersecurity #infosec

##

CVE-2025-48960
(5.9 MEDIUM)

EPSS: 0.00%

updated 2025-06-04T15:30:46

1 posts

Weak server key used for TLS encryption. The following products are affected: Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39938.

linux@activitypub.awakari.com at 2025-06-04T13:26:27.000Z ## Weak server key used for TLS encryption. The following products are affected:... Weak server key ...

https://cve.threatint.eu/CVE/CVE-2025-48960?utm_campaign=info&utm_medium=rss&utm_source=website

Result Details ##

CVE-2025-1701(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-06-04T15:30:46

1 posts

CVE-2025-1701 is a high-severity vulnerability in the MIM Admin service. An attacker could exploit this vulnerability by sending a specially crafted request over the RMI interface to execute arbitrary code with the privileges of the MIM Admin service. The RMI interface is only accessible locally (listening on 127.0.0.1), limiting the attack vector to the local machine. This means that in a proper

cR0w@infosec.exchange at 2025-06-04T13:34:38.000Z ##

Another healthcare imaging vuln.

mimsoftware.com/cve-2025-1701

sev:HIGH 8.9 - CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

CVE-2025-1701 is a high-severity vulnerability in the MIM Admin service. An attacker could exploit this vulnerability by sending a specially crafted request over the RMI interface to execute arbitrary code with the privileges of the MIM Admin service. The RMI interface is only accessible locally (listening on 127.0.0.1), limiting the attack vector to the local machine. This means that in a properly configured hospital environment, an attacker must have already compromised the network and additionally compromised the system where the MIM Admin service is running. From there, attackers with sufficient knowledge of MIM's implementation, library usage, and functionality with access to extend the MIM RMI library could force the MIM Admin service to run commands on the local machine with its privileges. Users of MIM Software products exposed via RDP or multi-user application virtualization system should take note that the system being exposed is the environment hosting the virtualized MIM client. This issue affects MIM Admin Service: before 7.2.13, 7.3.8, 7.4.3

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-48962
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-06-04T15:30:41

1 posts

Sensitive information disclosure due to SSRF. The following products are affected: Acronis Cyber Protect 16 (Windows, Linux) before build 39938.

linux@activitypub.awakari.com at 2025-06-04T13:27:43.000Z ## Sensitive information disclosure due to SSRF. The following products are affe... Sensitive inform...

https://cve.threatint.eu/CVE/CVE-2025-48962?utm_campaign=info&utm_medium=rss&utm_source=website

Result Details ##

CVE-2024-36486
(7.8 HIGH)

EPSS: 0.02%

updated 2025-06-04T14:54:33.783000

1 posts

A privilege escalation vulnerability exists in the virtual machine archive restoration functionality of Parallels Desktop for Mac version 20.1.1 (55740). When an archived virtual machine is restored, the prl_vmarchiver tool decompresses the file and writes the content back to its original location using root privileges. An attacker can exploit this process by using a hard link to write to an arbit

AAKL@infosec.exchange at 2025-06-05T16:16:39.000Z ##

Cisco has tagged Bloomberg for zero-day reports (five listings) relating to CVE-2024-52561, CVE-2025-31359, CVE-2024-36486, CVE-2024-54189, and CVE-2025-23247 talosintelligence.com/vulnerab #cybersecurity #Infosec #Cisco #zeroday

##

CVE-2024-52561
(7.8 HIGH)

EPSS: 0.01%

updated 2025-06-04T14:54:33.783000

1 posts

A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is deleted, a root service verifies and modifies the ownership of the snapshot files. By using a symlink, an attacker can change the ownership of files owned by root to a lower-privilege user, potentially leading to privilege esca

AAKL@infosec.exchange at 2025-06-05T16:16:39.000Z ##

Cisco has tagged Bloomberg for zero-day reports (five listings) relating to CVE-2024-52561, CVE-2025-31359, CVE-2024-36486, CVE-2024-54189, and CVE-2025-23247 talosintelligence.com/vulnerab #cybersecurity #Infosec #Cisco #zeroday

##

CVE-2025-30415
(7.5 HIGH)

EPSS: 0.08%

updated 2025-06-04T14:54:33.783000

1 posts

Denial of service due to improper handling of malformed input. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 40077.

linux@activitypub.awakari.com at 2025-06-04T12:02:21.000Z ## Denial of service due to improper handling of malformed input. The following ... Denial of servic...

https://cve.threatint.eu/CVE/CVE-2025-30415?utm_campaign=info&utm_medium=rss&utm_source=website

Result Details ##

CVE-2025-20991
(4.0 MEDIUM)

EPSS: 0.02%

updated 2025-06-04T14:54:33.783000

1 posts

Improper export of Android application components in Bluetooth prior to SMR Jun-2025 Release 1 allows local attackers to make devices discoverable.

CVE-2025-5601
(7.8 HIGH)

EPSS: 0.02%

updated 2025-06-04T12:30:42

1 posts

Column handling crashes in Wireshark 4.4.0 to 4.4.6 and 4.2.0 to 4.2.12 allows denial of service via packet injection or crafted capture file

cR0w@infosec.exchange at 2025-06-04T12:06:27.000Z ##

Fire up Scapy and piss off your network engineers with one weird trick.

gitlab.com/wireshark/wireshark

sev:HIGH 7.8 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Column handling crashes in Wireshark 4.4.0 to 4.4.6 and 4.2.0 to 4.2.12 allows denial of service via packet injection or crafted capture file

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-5584
(2.4 LOW)

EPSS: 0.03%

updated 2025-06-04T12:30:42

1 posts

A vulnerability was found in PHPGurukul Hospital Management System 4.0. It has been classified as problematic. Affected is an unknown function of the file /doctor/edit-patient.php?editid=2 of the component POST Parameter Handler. The manipulation of the argument patname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may

CVE-2024-13967
(8.8 HIGH)

EPSS: 0.05%

updated 2025-06-04T09:31:35

1 posts

This vulnerability allows the successful attacker to gain unauthorized access to a configuration web page delivered by the integrated web Server of EIBPORT. This issue affects EIBPORT V3 KNX: through 3.9.8; EIBPORT V3 KNX GSM: through 3.9.8.

cR0w@infosec.exchange at 2025-06-04T12:04:01.000Z ##

ABB EIBPORT Session Management Fail ( their words, not mine )

search.abb.com/library/Downloa

sev:CRIT 9.4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

This vulnerability allows the successful attacker to gain unauthorized access to a configuration web page delivered by the integrated web Server of EIBPORT. This issue affects EIBPORT V3 KNX: through 3.9.8; EIBPORT V3 KNX GSM: through 3.9.8.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-5571
(6.3 MEDIUM)

EPSS: 0.84%

updated 2025-06-04T06:30:38

1 posts

A vulnerability was found in D-Link DCS-932L 2.18.01. It has been classified as critical. Affected is the function setSystemAdmin of the file /setSystemAdmin. The manipulation of the argument AdminID leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer s

CVE-2025-5569
(6.3 MEDIUM)

EPSS: 0.04%

updated 2025-06-04T06:30:37

1 posts

A vulnerability was found in IdeaCMS up to 1.7 and classified as critical. This issue affects the function Article/Goods of the file /api/v1.index.article/getList.html. The manipulation of the argument Field leads to sql injection. The attack may be initiated remotely. Upgrading to version 1.8 is able to address this issue. The patch is named 935aceb4c21338633de6d41e13332f7b9db4fa6a. It is recomme

CVE-2025-5562
(7.3 HIGH)

EPSS: 0.04%

updated 2025-06-04T06:30:37

1 posts

A vulnerability was found in PHPGurukul Curfew e-Pass Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/edit-category-detail.php. The manipulation of the argument editid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-25022
(9.7 CRITICAL)

EPSS: 0.04%

updated 2025-06-03T18:30:52

1 posts

IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could allow an unauthenticated user in the environment to obtain highly sensitive information in configuration files.

beyondmachines1@infosec.exchange at 2025-06-05T10:01:08.000Z ##

IBM reports multiple flaws in QRadar Suite, including one critical

IBM reports multiple vulnerabilities in its QRadar Suite Software and Cloud Pak for Security platforms, including a critical flaw (CVE-2025-25022) that allows unauthenticated attackers to access configuration files containing passwords and sensitive system information.

**Your IBM QRadar Suite Software stores passwords from configuration files which can be accessed without authentication. Make sure that QRadar is isolated and accessible only from trusted networks. Then patch to version 1.11.3.0 or later ASAP - because isolation can be broken and malicious insiders can still exploit the flaw.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-45542
(7.3 HIGH)

EPSS: 0.17%

updated 2025-06-03T16:15:25.397000

1 posts

SQL injection vulnerability in the registrationform endpoint of CloudClassroom-PHP-Project v1.0. The pass parameter is vulnerable due to improper input validation, allowing attackers to inject SQL queries.

oversecurity@mastodon.social at 2025-06-04T13:20:06.000Z ##

CVE-2025-45542: problemi di SQL Injection in PHP CloudClassroom

Un nuovo caso di SQL Injection time-based blind è emerso nel progetto open-source CloudClassroom PHP versione 1.0, assegnato alla CVE-2025-45542. La

🔗️ [Insicurezzadigitale] link.is.it/okqyhP

##

CVE-2025-5419
(8.8 HIGH)

EPSS: 3.78%

updated 2025-06-03T15:32:28

9 posts

Out of bounds read and write in V8 in Google Chrome prior to 137.0.7151.68 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

1 repos

https://github.com/alegrason/CVE-2025-5419

authentic8@mastodon.social at 2025-06-06T22:13:52.000Z ##

In this week’s Cyber Intelligence Brief, AJ Nash dives into some urgent developments in the threat landscape. 🚨

This week:
Active exploitation of a Chrome zero-day (CVE-2025-5419) 🛠️
900+ confirmed Play ransomware victims 🎯
New ICS advisories highlighting critical infrastructure risks ⚠️

Get the insights you need to stay ahead of evolving threats and guidance on how to respond.

bit.ly/3ZjosRs

#threatintel #cyberthreats #zeroday

##

AAKL@infosec.exchange at 2025-06-06T18:40:45.000Z ##

New. There's a new version that addresses several vulnerabilities.

- High CVE-2025-4664 Insufficient policy enforcement in Loader
- High CVE-2025-5419 Out of bounds read and write in V8
- Fixes for CVE-2024-53164, CVE-2024-56770, CVE-2024-53125, CVE-2023-52926

Google: Long Term Support Channel Update for ChromeOS chromereleases.googleblog.com/ #Google #Chrome #cybersecurity #infoesc

##

jos1264@social.skynetcloud.site at 2025-06-06T15:00:03.000Z ##

CVE-2025-5419 Vulnerability: New Google Chrome Zero-Day Actively Exploited in the Wild – Source: socprime.com ciso2ciso.com/cve-2025-5419-vu #socprime.com #0CISO2CISO

##

researchbuzz_firehose@rbfirehose.com at 2025-06-06T12:44:29.000Z ##

The Register: Google quietly pushes emergency fix for Chrome 0-day as exploit runs wild. “Google Threat Analysis Group (TAG) team members Clement Lecigne and Benoît Sevens spotted the high-severity bug, tracked as CVE-2025-5419, on May 27. It’s an out-of-bounds read and write vulnerability in Chrome’s V8 JavaScript engine that could allow a remote attacker to corrupt memory and potentially […]

https://rbfirehose.com/2025/06/06/the-register-google-quietly-pushes-emergency-fix-for-chrome-0-day-as-exploit-runs-wild/

##

techpuran@mastodon.social at 2025-06-06T02:53:57.000Z ##

📢 6 June Tech & Cyber Updates
#TechNews #CyberAlert #India 🇮🇳

🔹 ChatGPT Upgrade
Now records meetings + reads Google Drive & OneDrive files. 💼📁

🔹 Starlink in India
@JM_Scindia confirms Elon Musk’s satellite internet to launch soon. 🛰️

🔹 Noida Betting Scam Busted
Illegal call centre exposed in cybercrime crackdown. 📞💸

🔹 Emergency Chrome Update!
Patch critical vulnerability CVE-2025-5419 now! 🛡️

🔹 WhatsApp Image = Malware
Just downloading a photo can infect your phone. No OTP or link needed. ⚠️📷

##

cR0w@infosec.exchange at 2025-06-05T18:02:52.000Z ##

CVE-2025-5419 in Chromium was added to the CISA KEV Catalog.

cisa.gov/known-exploited-vulne

##

cisakevtracker@mastodon.social at 2025-06-05T18:01:00.000Z ##

CVE ID: CVE-2025-5419
Vendor: Google
Product: Chromium V8
Date Added: 2025-06-05
Vulnerability: Google Chromium V8 Out-of-Bounds Read and Write Vulnerability
Notes: chromereleases.googleblog.com/; nvd.nist.gov/vuln/detail/CVE-2",
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

wasm@activitypub.awakari.com at 2025-06-04T11:16:12.000Z ## Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419) Google has fixed two Chrome...

https://www.helpnetsecurity.com/2025/06/04/google-fixes-chrome-zero-day-with-in-the-wild-exploit-cve-2025-5419/

#Don't #miss #Hot #stuff #News #0-day #Chrome #Google #Microsoft #Edge

Result Details ##

jos1264@social.skynetcloud.site at 2025-06-04T12:15:03.000Z ##

Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419) helpnetsecurity.com/2025/06/04 #MicrosoftEdge #Don'tmiss #Hotstuff #Chrome #Google #0-day #News

##

CVE-2025-31359
(8.8 HIGH)

EPSS: 0.05%

updated 2025-06-03T12:30:37

1 posts

A directory traversal vulnerability exists in the PVMP package unpacking functionality of Parallels Desktop for Mac version 20.2.2 (55879). This vulnerability can be exploited by an attacker to write to arbitrary files, potentially leading to privilege escalation.

AAKL@infosec.exchange at 2025-06-05T16:16:39.000Z ##

Cisco has tagged Bloomberg for zero-day reports (five listings) relating to CVE-2024-52561, CVE-2025-31359, CVE-2024-36486, CVE-2024-54189, and CVE-2025-23247 talosintelligence.com/vulnerab #cybersecurity #Infosec #Cisco #zeroday

##

CVE-2024-54189
(7.8 HIGH)

EPSS: 0.02%

updated 2025-06-03T12:30:37

1 posts

A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is taken, a root service writes to a file owned by a normal user. By using a hard link, an attacker can write to an arbitrary file, potentially leading to privilege escalation.

AAKL@infosec.exchange at 2025-06-05T16:16:39.000Z ##

Cisco has tagged Bloomberg for zero-day reports (five listings) relating to CVE-2024-52561, CVE-2025-31359, CVE-2024-36486, CVE-2024-54189, and CVE-2025-23247 talosintelligence.com/vulnerab #cybersecurity #Infosec #Cisco #zeroday

##

CVE-2025-21479
(8.6 HIGH)

EPSS: 3.40%

updated 2025-06-03T09:32:11

1 posts

Memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands.

beyondmachines1@infosec.exchange at 2025-06-05T11:01:08.000Z ##

Qualcomm patches actively exploited vulnerabilities in Adreno GPU Drivers

Qualcomm reports multiple vulnerabilities in its Adreno GPU drivers with three critical flaws (CVE-2025-21479, CVE-2025-21480, CVE-2025-27038) confirmed to be under active limited exploitation by Google's Threat Analysis Group. The vulnerabilities affect flagship Snapdragon processors and various connectivity modules.

**Unfortunately, you as users can't apply these patches directly. All you can do is be diligent with updating your phone OS and firmware as the updates from the vendor are released.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-21480
(8.6 HIGH)

EPSS: 3.40%

updated 2025-06-03T06:31:22

1 posts

Memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands.

beyondmachines1@infosec.exchange at 2025-06-05T11:01:08.000Z ##

Qualcomm patches actively exploited vulnerabilities in Adreno GPU Drivers

Qualcomm reports multiple vulnerabilities in its Adreno GPU drivers with three critical flaws (CVE-2025-21479, CVE-2025-21480, CVE-2025-27038) confirmed to be under active limited exploitation by Google's Threat Analysis Group. The vulnerabilities affect flagship Snapdragon processors and various connectivity modules.

**Unfortunately, you as users can't apply these patches directly. All you can do is be diligent with updating your phone OS and firmware as the updates from the vendor are released.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-23247
(4.4 MEDIUM)

EPSS: 0.01%

updated 2025-06-02T18:31:36

1 posts

NVIDIA CUDA Toolkit for all platforms contains a vulnerability in the cuobjdump binary, where a failure to check the length of a buffer could allow a user to cause the tool to crash or execute arbitrary code by passing in a malformed ELF file. A successful exploit of this vulnerability might lead to arbitrary code execution.

AAKL@infosec.exchange at 2025-06-05T16:16:39.000Z ##

Cisco has tagged Bloomberg for zero-day reports (five listings) relating to CVE-2024-52561, CVE-2025-31359, CVE-2024-36486, CVE-2024-54189, and CVE-2025-23247 talosintelligence.com/vulnerab #cybersecurity #Infosec #Cisco #zeroday

##

CVE-2023-39780
(8.8 HIGH)

EPSS: 51.22%

updated 2025-06-02T18:30:26

1 posts

ASUS RT-AX55 v3.0.0.4.386.51598 was discovered to contain an authenticated command injection vulnerability.

JackRacc@furry.engineer at 2025-06-08T19:51:47.000Z ##

If anyone can confirm CVE-2023-39780 is patched in the last ASUS Merlin firmware ever released for the RT-AC86U, I can withhold selling it, but will be doing a 30/30/30 reset.

##

CVE-2025-37093
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-06-02T17:32:17.397000

1 posts

An authentication bypass vulnerability exists in HPE StoreOnce Software.

beyondmachines1@infosec.exchange at 2025-06-04T10:01:08.000Z ##

HPE patches multiple flaws in StoreOnce Backup, at least one critical authentication bypass

HPE reports eight vulnerabilities in its StoreOnce backup solution, including a critical authentication bypass flaw (CVE-2025-37093) that allows unauthenticated remote attackers to gain complete system access to enterprise backup infrastructure. Organizations using StoreOnce systems must immediately update to version 4.3.11.

**If you're using HPE StoreOnce backup systems, first make sure it's isolated and accessible only from trusted networks. Then plan a quick upgrade to version 4.3.11. Just isolating the system is not enough, hackers will find a way in the network via some other mechanism (phishing or vulnerable edge device).**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-5054
(4.7 MEDIUM)

EPSS: 0.01%

updated 2025-05-30T18:31:27

1 posts

Race condition in Canonical apport up to and including 2.32.0 allows a local attacker to leak sensitive information via PID-reuse by leveraging namespaces. When handling a crash, the function `_check_global_pid_and_forward`, which detects if the crashing process resided in a container, was being called before `consistency_checks`, which attempts to detect if the crashing process had been repla

1 repos

https://github.com/daryllundy/cve-2025-5054

Ubuntu@activitypub.awakari.com at 2025-05-29T17:16:00.000Z ## Qualys TRU Discovers Two Local Information Disclosure Vulnerabilities in Apport and systemd-coredump: CVE-2025-5054 and CVE-2025-4598 The Qualys Threat Research Unit (TRU) has discovered two loca...

#Vulnerabilities #and #Threat #Research #Qualys #Threat #Research #TRU #TruRisk #Eliminate #vulnerabilities

Origin | Interest | Match ##

CVE-2025-21204
(7.8 HIGH)

EPSS: 0.20%

updated 2025-05-29T14:15:34.340000

1 posts

Improper link resolution before file access ('link following') in Windows Update Stack allows an authorized attacker to elevate privileges locally.

1 repos

https://github.com/mmotti/Reset-inetpub

LMGsecurity@infosec.exchange at 2025-06-09T14:13:30.000Z ##

Windows Admins—Don’t Delete That Empty inetpub Folder!

Microsoft has released a PowerShell script to restore the C:\inetpub folder created by the April 2025 security update after many users mistakenly deleted it, not realizing it plays a critical role in mitigating a high-severity privilege escalation vulnerability (CVE-2025-21204).

This seemingly empty folder helps protect against attackers escalating privileges using symbolic link abuse, and deleting it can leave your organization vulnerable. If you have already deleted it, Microsoft has a restoration script.

Read the details: bleepingcomputer.com/news/micr

#WindowsSecurity #PowerShell #CVE202521204 #PrivilegeEscalation #PatchManagement #Cybersecurity #ITAdmin #Microsoft #CISO #Infosec #IT

##

CVE-2025-4009(CVSS UNKNOWN)

EPSS: 0.24%

updated 2025-05-28T09:31:27

1 posts

The Evertz SVDN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Video Application. This device exposes a web management interface on port 80. This web management interface can be used by administrators to control product features, setup network switching, and register license among other features. The application has been developed in PHP with the webEASY SDK, also named ‘ewb’ by Eve

CVE-2025-37899
(0 None)

EPSS: 0.02%

updated 2025-05-24T19:15:23.640000

1 posts

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in session logoff The sess->user object can currently be in use by another thread, for example if another connection has sent a session setup request to bind to the session being free'd. The handler for that connection could be in the smb2_sess_setup function which makes use of sess->user.

2 repos

https://github.com/vett3x/SMB-LINUX-CVE-2025-37899

https://github.com/SeanHeelan/o3_finds_cve-2025-37899

marcelweiss@mastodon.social at 2025-06-04T12:02:45.000Z ##

Es ist mit dieser Studie ein bisschen wie mit dem Zero-Day-Bug in Linux, den jemand letzte Woche mit o3 gefunden hat:

sean.heelan.io/2025/05/22/how-

Wenn man kein Gegenargument findet, wird es im Zweifel einfach verschwiegen.

Die Absurdität dieser "Debatten" nimmt schon extreme Züge an.

##

CVE-2025-32813
(7.2 HIGH)

EPSS: 0.15%

updated 2025-05-23T21:32:17

1 posts

An issue was discovered in Infoblox NETMRI before 7.6.1. Remote Unauthenticated Command Injection can occur.

cR0w@infosec.exchange at 2025-06-04T13:58:39.000Z ##

And if you want easy mode, here is the Metasploit config for CVE-2025-32813:

use exploit/multi/http/rails_secret_deserialization
set COOKIE_NAME _netmri
set RPORT 443
set SSL true
set SECRET b525fc341ce5f4d76505e7664863750f865823ba866c536e0246c195cd6cf19cc63771d6becd71c99f5beef080ac27bc3b4f72430840d83cb4efd62acb7c6dcf
set TARGETURI /webui/gui_states/index.json
run

##

CVE-2025-32814
(9.8 CRITICAL)

EPSS: 0.04%

updated 2025-05-22T21:30:46

1 posts

An issue was discovered in Infoblox NETMRI before 7.6.1. Unauthenticated SQL Injection can occur.

beyondmachines1@infosec.exchange at 2025-06-06T09:01:07.000Z ##

Multiple vulnerabilities reported in Infoblox NetMRI Network Management Platform, at least one critical

Infoblox patched multiple critical vulnerabilities in its NetMRI network management solution, including a severe unauthenticated SQL injection flaw (CVE-2025-32814) and hardcoded credentials that could enable complete system compromise through various attack vectors including command injection and privilege escalation.

**If you're running Infoblox NetMRI version 7.5.4.104695 or earlier upgrade to 7.6.1. There are a bunch of security vulnerabilities that could allow complete system takeover. A mitigation measure is restricting network access to your NetMRI systems, but that doesn't really helo long term. Don't delay this one, there are too many flaws to just isolate the system.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-47934
(0 None)

EPSS: 0.02%

updated 2025-05-21T20:25:16.407000

11 posts

OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. Startinf in version 5.0.1 and prior to versions 5.11.3 and 6.1.1, a maliciously modified message can be passed to either `openpgp.verify` or `openpgp.decrypt`, causing these functions to return a valid signature verification result while returning data that was not actually signed. This flaw allows signature verifications of inline

hackernewsdaily@bsd.cafe at 2025-06-10T19:00:10.000Z ##

📰 Today's Top 25 Hacker News Stories (Sorted by Score) 📰
----------------------------------------
🔖 Title: Containerization is a Swift package for running Linux containers on macOS
🔗 URL: github.com/apple/containerizat
👍 Score: [699]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Magistral — the first reasoning model by Mistral AI
🔗 URL: mistral.ai/news/magistral
👍 Score: [461]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Denuvo Analysis
🔗 URL: connorjaydunn.github.io/blog/p
👍 Score: [139]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Animate a mesh across a sphere's surface
🔗 URL: garden.bradwoods.io/notes/java
👍 Score: [118]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: OpenAI dropped the price of o3 by 80%
🔗 URL: twitter.com/sama/status/193243
👍 Score: [101]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Show HN: High End Color Quantizer
🔗 URL: github.com/big-nacho/patolette
👍 Score: [89]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Faster, easier 2D vector rendering [video]
🔗 URL: youtube.com/watch?v=_sv8K190Zp
👍 Score: [84]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Show HN: PyDoll – Async Python scraping engine with native CAPTCHA bypass
🔗 URL: github.com/autoscrape-labs/pyd
👍 Score: [81]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Malleable software: Restoring user agency in a world of locked-down apps
🔗 URL: inkandswitch.com/essay/malleab
👍 Score: [77]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: A Primer on Molecular Dynamics
🔗 URL: owlposting.com/p/a-primer-on-m
👍 Score: [63]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Spoofing OpenPGP.js signature verification
🔗 URL: codeanlabs.com/blog/research/c
👍 Score: [58]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Dubious Math in Infinite Jest (2009)
🔗 URL: thehowlingfantods.com/dfw/dubi
👍 Score: [50]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Reinforcement Pre-Training
🔗 URL: arxiv.org/abs/2506.08007
👍 Score: [41]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: A Blacklisted American Magician Became a Hero in Brazil
🔗 URL: wsj.com/lifestyle/careers/magi
👍 Score: [39]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Low-background Steel: content without AI contamination
🔗 URL: blog.jgc.org/2025/06/low-backg
👍 Score: [37]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Teaching National Security Policy with AI
🔗 URL: steveblank.com/2025/06/10/teac
👍 Score: [29]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: JavelinGuard: Low-Cost Transformer Architectures for LLM Security
🔗 URL: arxiv.org/abs/2506.07330
👍 Score: [19]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Mikeal Rogers has died
🔗 URL: b.h4x.zip/mikeal/
👍 Score: [17]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: The Concurrency Trap: How an Atomic Counter Stalled a Pipeline
🔗 URL: conviva.com/platform/the-concu
👍 Score: [14]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Wharton Esherick and the Armstrong Linoleum Company
🔗 URL: whartonesherickmuseum.org/whar
👍 Score: [13]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Android 16 Is Here
🔗 URL: blog.google/products/android/a
👍 Score: [8]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------

##

hn50@social.lansky.name at 2025-06-10T17:55:18.000Z ##

Spoofing OpenPGP.js signature verification

Link: codeanlabs.com/blog/research/c
Discussion: news.ycombinator.com/item?id=4

##

hn50@social.lansky.name at 2025-06-10T17:55:18.000Z ##

Spoofing OpenPGP.js signature verification

Link: codeanlabs.com/blog/research/c
Discussion: news.ycombinator.com/item?id=4

##

lobsters@mastodon.social at 2025-06-10T16:25:15.000Z ##

CVE-2025-47934 - Spoofing OpenPGP.js signature verification lobste.rs/s/uafcpg #cryptography #security
codeanlabs.com/blog/research/c

##

technotenshi@infosec.exchange at 2025-06-10T16:24:32.000Z ##

Critical flaw in OpenPGP.js (CVE-2025-47934) lets attackers spoof valid signatures on arbitrary data, tricking verifiers into trusting malicious content. Patch available in v5.11.3 and v6.1.1.

codeanlabs.com/blog/research/c

#infosec #PGP #crypto #OpenPGPjs

##

newsycombinator@framapiaf.org at 2025-06-10T15:00:15.000Z ##

Spoofing OpenPGP.js signature verification
Link: codeanlabs.com/blog/research/c
Comments: news.ycombinator.com/item?id=4

##

ycombinator@rss-mstdn.studiofreesia.com at 2025-06-10T14:15:40.000Z ##

Spoofing OpenPGP.js signature verification
codeanlabs.com/blog/research/c
#ycombinator

##

h4ckernews@mastodon.social at 2025-06-10T14:06:33.000Z ##

Spoofing OpenPGP.js signature verification

codeanlabs.com/blog/research/c

#HackerNews #Spoofing #OpenPGP.js #signature #verification #OpenPGPjs #CVE2025 #cybersecurity #research

##

cR0w@infosec.exchange at 2025-06-10T14:01:10.000Z ##

My posts on CVE-2025-47934 have rolled off but there's a write-up for it now.

codeanlabs.com/blog/research/c

##

AAKL@infosec.exchange at 2025-06-10T14:00:42.000Z ##

This has been patched.

Codean Labs: CVE-2025-47934 – Spoofing OpenPGP.js signature verification codeanlabs.com/blog/research/c #cybersecurity #Infosec

##

_r_netsec@infosec.exchange at 2025-06-10T13:58:06.000Z ##

CVE-2025-47934 - Spoofing OpenPGP.js signature verification codeanlabs.com/blog/research/c

##

CVE-2023-38950
(7.5 HIGH)

EPSS: 86.74%

updated 2025-05-21T18:34:59.360000

1 posts

A path traversal vulnerability in the iclock API of ZKTeco BioTime v8.5.5 allows unauthenticated attackers to read arbitrary files via supplying a crafted payload.

Nuclei template

beyondmachines1@infosec.exchange at 2025-06-05T09:01:08.000Z ##

CISA warns of ZKTeco BioTime flaw actively exploited in State-Sponsored attacks

CISA reports active exploitation of CVE-2023-38950 (CVSS 7.5) affecting ZKTeco BioTime time and attendance management software. The path traversal vulnerability allows unauthenticated attackers to read arbitrary files through the iclock API.

**If you are using ZKTeco BioTime time to patch it. The attackers targeting these systems are well funded and skilled. Check for any indicators of compromise and patch ASAP!**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2025-36560
(8.6 HIGH)

EPSS: 0.04%

updated 2025-05-19T13:35:20.460000

1 posts

Server-side request forgery vulnerability exists in a-blog cms multiple versions. If this vulnerability is exploited, a remote unauthenticated attacker may gain access to sensitive information by sending a specially crafted request.

DarkWebInformer@infosec.exchange at 2025-06-05T00:26:11.000Z ##

🚨CVE-2025-36560: Server-side Request Forgery Vulnerability

FOFA Link: en.fofa.info/result?qbase64=YX

FOFA Query: app="a-blog-cms"

Results: 5,072

Advisory: github.com/advisories/GHSA-9fj

CVSS: 9.2

##

CVE-2025-32756
(9.8 CRITICAL)

EPSS: 8.83%

updated 2025-05-16T19:41:05.917000

3 posts

A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiVoice versions 7.2.0, 7.0.0 through 7.0.6, 6.4.0 through 6.4.10, FortiRecorder versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.5, 6.4.0 through 6.4.5, FortiMail versions 7.6.0 through 7.6.2, 7.4.0 through 7.4.4, 7.2.0 through 7.2.7, 7.0.0 through 7.0.8, FortiNDR versions 7.6.0, 7.4.0 through 7.4.7, 7.2.0 through 7.2.4, 7.0.0 th

5 repos

https://github.com/exfil0/CVE-2025-32756-POC

https://github.com/B1ack4sh/Blackash-CVE-2025-32756

https://github.com/alm6no5/CVE-2025-32756-POC

https://github.com/kn0x0x/CVE-2025-32756-POC

https://github.com/becrevex/CVE-2025-32756

DarkWebInformer at 2025-06-10T18:04:19.542Z ##

CVE-2025-32756 Proof of Concept: A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products

darkwebinformer.com/cve-2025-3

##

DarkWebInformer@infosec.exchange at 2025-06-10T18:04:19.000Z ##

CVE-2025-32756 Proof of Concept: A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products

darkwebinformer.com/cve-2025-3

##

DarkWebInformer@infosec.exchange at 2025-06-04T17:06:53.000Z ##

🚨CVE-2025-32756: Critical Stack-Based Buffer Overflow in Fortinet Products

FOFA Link: en.fofa.info/result?qbase64=YX

FOFA Query: app="FORTINET-FortiVoice" || app="Fortinet-FortiNDR" || app="FORTINET-FortiCamera" || app="FORTINET-FortiMail" || app="FORTINET-FortiRecorder"

Results: 48,224

Advisory: github.com/advisories/GHSA-fcp

CVSS: 9.8

##

CVE-2025-30712
(8.1 HIGH)

EPSS: 0.04%

updated 2025-05-16T15:31:39

1 posts

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.1.6. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact

somebody@tech.lgbt at 2025-06-04T17:11:46.000Z ##

github.com/google/security-res Didn't see a ton of attention being paid to CVE-2025-30712 on here

VM escape using VGA on VirtualBox

##

CVE-2025-4664
(4.3 MEDIUM)

EPSS: 0.06%

updated 2025-05-14T21:31:18

1 posts

Insufficient policy enforcement in Loader in Google Chrome prior to 136.0.7103.113 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)

2 repos

https://github.com/Leviticus-Triage/ChromSploit-Framework

https://github.com/speinador/CVE-2025-4664

AAKL@infosec.exchange at 2025-06-06T18:40:45.000Z ##

New. There's a new version that addresses several vulnerabilities.

- High CVE-2025-4664 Insufficient policy enforcement in Loader
- High CVE-2025-5419 Out of bounds read and write in V8
- Fixes for CVE-2024-53164, CVE-2024-56770, CVE-2024-53125, CVE-2023-52926

Google: Long Term Support Channel Update for ChromeOS chromereleases.googleblog.com/ #Google #Chrome #cybersecurity #infoesc

##

CVE-2025-37797
(0 None)

EPSS: 0.06%

updated 2025-05-05T20:54:45.973000

1 posts

In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerability works as follows: 1. hfsc

AAKL@infosec.exchange at 2025-06-04T17:18:40.000Z ##

Malwarebytes: Google fixes another actively exploited vulnerability in Chrome malwarebytes.com/blog/news/202

Google Security Bulletins: CVE-2025-37798 and CVE-2025-37797, both high severity, were updated yesterday cloud.google.com/support/bulle #Google #Chrome #cybersecurity #infosec

##

CVE-2025-37798(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-05-02T15:31:57

1 posts

In the Linux kernel, the following vulnerability has been resolved: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() After making all ->qlen_notify() callbacks idempotent, now it is safe to remove the check of qlen!=0 from both fq_codel_dequeue() and codel_qdisc_dequeue().

AAKL@infosec.exchange at 2025-06-04T17:18:40.000Z ##

Malwarebytes: Google fixes another actively exploited vulnerability in Chrome malwarebytes.com/blog/news/202

Google Security Bulletins: CVE-2025-37798 and CVE-2025-37797, both high severity, were updated yesterday cloud.google.com/support/bulle #Google #Chrome #cybersecurity #infosec

##

CVE-2025-22869
(7.5 HIGH)

EPSS: 0.05%

updated 2025-04-14T15:39:01

1 posts

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.

cR0w@infosec.exchange at 2025-06-10T16:00:26.000Z ##

SolarWinds released Observability Self-Hosted 2025.2 which patched some CVEs:

  • CVE-2025-26394 ( sev:MED )
  • CVE-2025-26395 ( sev:HIGH )
  • CVE-2024-9143 ( sev:MED )
  • CVE-2025-22869 ( sev:HIGH )

documentation.solarwinds.com/e

#patchTuesday

##

CVE-2025-32395(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-04-11T14:06:06

1 posts

### Summary The contents of arbitrary files can be returned to the browser if the dev server is running on Node or Bun. ### Impact Only apps with the following conditions are affected. - explicitly exposing the Vite dev server to the network (using --host or [server.host config option](https://vitejs.dev/config/server-options.html#server-host)) - running the Vite dev server on runtimes that are

3 repos

https://github.com/ruiwenya/CVE-2025-32395

https://github.com/xuemian168/CVE-2025-30208

https://github.com/nkuty/CVE-2025-30208-31125-31486-32395

DarkWebInformer@infosec.exchange at 2025-06-09T19:21:22.000Z ##

🚨CVE-2025-32395: Vite HTTP Request Target Denial of Service

FOFA Link: en.fofa.info/result?qbase64=Ym

FOFA Query: body="/@vite/client"

Results: 130,393

Advisory/PoC: github.com/advisories/GHSA-356

CVSS: 6.0

##

CVE-2013-0156
(0 None)

EPSS: 93.15%

updated 2025-04-11T00:51:21.963000

1 posts

active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging A

8 repos

https://github.com/heroku/heroku-CVE-2013-0156

https://github.com/josal/crack-0.1.8-fixed

https://github.com/Jjdt12/kuang_grade_mk11

https://github.com/terracatta/name_reverser

https://github.com/oxben10/CVE-2013-0156

https://github.com/bsodmike/rails-exploit-cve-2013-0156

https://github.com/mitaku/rails_cve_2013_0156_patch

https://github.com/R3dKn33-zz/CVE-2013-0156

cR0w@infosec.exchange at 2025-06-04T13:56:42.000Z ##

This is absolute bananas. And I forgot to put that the write-up is pretty full, including PoC. And it's web-based so maybe some easy sigs for @Dio9sys and @da_667 .

This is possible due to a netmri ALL = NOPASSWD: /bin/sh entry in /etc/sudoers .

and

This allows Remote Code Execution via a hardcoded ruby cookie secret. This vulnerability was not assigned a CVE ID by Infoblox as it was stated the underlying vulnerability is a known flaw with it’s own CVE referencing CVE-2013-0156.

The NetMRI virtual appliance includes a Ruby on Rails web component. We discovered the Rails session cookie signing key is hardcoded in the VM, located at:

/skipjack/app/rails/config/session_secret.txt

This value is hardcoded and was the same on every boot and VM downloaded.

Ruby on Rails deserializes session cookies if the signing key is valid. With access to this key, it’s possible to craft a malicious session leading to remote code execution (RCE).

##

CVE-2025-29927
(9.1 CRITICAL)

EPSS: 93.16%

updated 2025-04-08T14:15:33.973000

1 posts

Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the

Nuclei template

95 repos

https://github.com/0xpr4bin/vulnerable-next_js_cve-2025-29927

https://github.com/furmak331/CVE-2025-29927

https://github.com/l1uk/nextjs-middleware-exploit

https://github.com/websecnl/CVE-2025-29927-PoC-Exploit

https://github.com/serhalp/test-cve-2025-29927

https://github.com/enochgitgamefied/NextJS-CVE-2025-29927

https://github.com/hed1ad/CVE-2025-29927

https://github.com/Oyst3r1ng/CVE-2025-29927

https://github.com/jmbowes/NextSecureScan

https://github.com/t3tra-dev/cve-2025-29927-demo

https://github.com/ferpalma21/Automated-Next.js-Security-Scanner-for-CVE-2025-29927

https://github.com/m2hcz/m2hcz-Next.js-security-flaw-CVE-2025-29927---PoC-exploit

https://github.com/strobes-security/nextjs-vulnerable-app

https://github.com/Kamal-418/Vulnerable-Lab-NextJS-CVE-2025-29927

https://github.com/kuzushiki/CVE-2025-29927-test

https://github.com/w3shi/CVE-2025-29927

https://github.com/0xnxt1me/CVE-2025-29927

https://github.com/fahimalshihab/NextBypass

https://github.com/iSee857/CVE-2025-29927

https://github.com/yugo-eliatrope/test-cve-2025-29927

https://github.com/olimpiofreitas/CVE-2025-29927_scanner

https://github.com/c0dejump/CVE-2025-29927-check

https://github.com/Jull3Hax0r/next.js-exploit

https://github.com/azu/nextjs-cve-2025-29927-poc

https://github.com/aleongx/CVE-2025-29927_Scanner

https://github.com/0xPb1/Next.js-CVE-2025-29927

https://github.com/alihussainzada/CVE-2025-29927-PoC

https://github.com/luq0x/0xMiddleware

https://github.com/lem0n817/CVE-2025-29927

https://github.com/dante01yoon/CVE-2025-29927

https://github.com/enochgitgamefied/NextJS-CVE-2025-29927-Docker-Lab

https://github.com/6mile/nextjs-CVE-2025-29927

https://github.com/EarthAngel666/x-middleware-exploit

https://github.com/nicknisi/next-attack

https://github.com/jeymo092/cve-2025-29927

https://github.com/TheresAFewConors/CVE-2025-29927-Testing

https://github.com/Gokul-Krishnan-V-R/cve-2025-29927

https://github.com/ThemeHackers/CVE-2025-29972

https://github.com/Ademking/CVE-2025-29927

https://github.com/pixilated730/NextJS-Exploit-

https://github.com/nyctophile0969/CVE-2025-29927

https://github.com/Naveen-005/Next.Js-middleware-bypass-vulnerability-CVE-2025-29927

https://github.com/YEONDG/nextjs-cve-2025-29927

https://github.com/arvion-agent/next-CVE-2025-29927

https://github.com/moften/CVE-2025-29927

https://github.com/UNICORDev/exploit-CVE-2025-29927

https://github.com/RoyCampos/CVE-2025-29927

https://github.com/B1ack4sh/Blackash-CVE-2025-29927

https://github.com/yuzu-juice/CVE-2025-29927_demo

https://github.com/Hirainsingadia/CVE-2025-29927

https://github.com/Neoxs/nextjs-middleware-vuln-poc

https://github.com/MuhammadWaseem29/CVE-2025-29927-POC

https://github.com/ethanol1310/POC-CVE-2025-29927-

https://github.com/rubbxalc/CVE-2025-29927

https://github.com/pickovven/vulnerable-nextjs-14-CVE-2025-29927

https://github.com/aleongx/CVE-2025-29927

https://github.com/mhamzakhattak/CVE-2025-29927

https://github.com/Balajih4kr/cve-2025-29927

https://github.com/alastair66/CVE-2025-29927

https://github.com/BilalGns/CVE-2025-29927

https://github.com/kh4sh3i/CVE-2025-29927

https://github.com/fourcube/nextjs-middleware-bypass-demo

https://github.com/HoumanPashaei/CVE-2025-29927

https://github.com/0xcucumbersalad/cve-2025-29927

https://github.com/Grand-Moomin/Vuln-Next.js-CVE-2025-29927

https://github.com/sn1p3rt3s7/NextJS_CVE-2025-29927

https://github.com/gotr00t0day/CVE-2025-29927

https://github.com/KaztoRay/CVE-2025-29927-Research

https://github.com/lirantal/vulnerable-nextjs-14-CVE-2025-29927

https://github.com/AnonKryptiQuz/NextSploit

https://github.com/narasimhauppala/nextjs-middleware-bypass

https://github.com/elshaheedy/CVE-2025-29927-Sigma-Rule

https://github.com/ValGrace/middleware-auth-bypass

https://github.com/ricsirigu/CVE-2025-29927

https://github.com/w2hcorp/CVE-2025-29927-PoC

https://github.com/0xWhoknows/CVE-2025-29927

https://github.com/Nekicj/CVE-2025-29927-exploit

https://github.com/ticofookfook/poc-nextjs-CVE-2025-29927

https://github.com/nocomp/CVE-2025-29927-scanner

https://github.com/Knotsecurity/CVE-2025-29927-NextJs-Middleware-Simulation

https://github.com/pouriam23/Next.js-Middleware-Bypass-CVE-2025-29927-

https://github.com/SugiB3o/vulnerable-nextjs-14-CVE-2025-29927

https://github.com/aydinnyunus/CVE-2025-29927

https://github.com/Eve-SatOrU/POC-CVE-2025-29927

https://github.com/0xPThree/next.js_cve-2025-29927

https://github.com/maronnjapan/claude-create-CVE-2025-29927

https://github.com/darklotuskdb/nextjs-CVE-2025-29927-hunter

https://github.com/takumade/ghost-route

https://github.com/Heimd411/CVE-2025-29927-PoC

https://github.com/sagsooz/CVE-2025-29927

https://github.com/ayato-shitomi/WebLab_CVE-2025-29927

https://github.com/emadshanab/CVE-2025-29927

https://github.com/EQSTLab/CVE-2025-29927

https://github.com/kOaDT/poc-cve-2025-29927

https://github.com/TH-SecForge/CVE-2025-29972

CVE-2025-2992
(5.3 MEDIUM)

EPSS: 0.18%

updated 2025-04-07T14:40:55.240000

1 posts

A vulnerability classified as critical was found in Tenda FH1202 1.2.0.14(408). Affected by this vulnerability is an unknown functionality of the file /goform/AdvSetWrlsafeset of the component Web Management Interface. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

78 repos

https://github.com/0xpr4bin/vulnerable-next_js_cve-2025-29927

https://github.com/furmak331/CVE-2025-29927

https://github.com/websecnl/CVE-2025-29927-PoC-Exploit

https://github.com/serhalp/test-cve-2025-29927

https://github.com/enochgitgamefied/NextJS-CVE-2025-29927

https://github.com/hed1ad/CVE-2025-29927

https://github.com/Oyst3r1ng/CVE-2025-29927

https://github.com/t3tra-dev/cve-2025-29927-demo

https://github.com/ferpalma21/Automated-Next.js-Security-Scanner-for-CVE-2025-29927

https://github.com/m2hcz/m2hcz-Next.js-security-flaw-CVE-2025-29927---PoC-exploit

https://github.com/Kamal-418/Vulnerable-Lab-NextJS-CVE-2025-29927

https://github.com/kuzushiki/CVE-2025-29927-test

https://github.com/w3shi/CVE-2025-29927

https://github.com/0xnxt1me/CVE-2025-29927

https://github.com/iSee857/CVE-2025-29927

https://github.com/yugo-eliatrope/test-cve-2025-29927

https://github.com/olimpiofreitas/CVE-2025-29927_scanner

https://github.com/c0dejump/CVE-2025-29927-check

https://github.com/azu/nextjs-cve-2025-29927-poc

https://github.com/aleongx/CVE-2025-29927_Scanner

https://github.com/0xPb1/Next.js-CVE-2025-29927

https://github.com/alihussainzada/CVE-2025-29927-PoC

https://github.com/enochgitgamefied/NextJS-CVE-2025-29927-Docker-Lab

https://github.com/lem0n817/CVE-2025-29927

https://github.com/dante01yoon/CVE-2025-29927

https://github.com/6mile/nextjs-CVE-2025-29927

https://github.com/jeymo092/cve-2025-29927

https://github.com/TheresAFewConors/CVE-2025-29927-Testing

https://github.com/Gokul-Krishnan-V-R/cve-2025-29927

https://github.com/Ademking/CVE-2025-29927

https://github.com/nyctophile0969/CVE-2025-29927

https://github.com/Naveen-005/Next.Js-middleware-bypass-vulnerability-CVE-2025-29927

https://github.com/YEONDG/nextjs-cve-2025-29927

https://github.com/arvion-agent/next-CVE-2025-29927

https://github.com/moften/CVE-2025-29927

https://github.com/UNICORDev/exploit-CVE-2025-29927

https://github.com/RoyCampos/CVE-2025-29927

https://github.com/B1ack4sh/Blackash-CVE-2025-29927

https://github.com/yuzu-juice/CVE-2025-29927_demo

https://github.com/Hirainsingadia/CVE-2025-29927

https://github.com/MuhammadWaseem29/CVE-2025-29927-POC

https://github.com/ethanol1310/POC-CVE-2025-29927-

https://github.com/rubbxalc/CVE-2025-29927

https://github.com/pickovven/vulnerable-nextjs-14-CVE-2025-29927

https://github.com/aleongx/CVE-2025-29927

https://github.com/mhamzakhattak/CVE-2025-29927

https://github.com/Balajih4kr/cve-2025-29927

https://github.com/alastair66/CVE-2025-29927

https://github.com/BilalGns/CVE-2025-29927

https://github.com/kh4sh3i/CVE-2025-29927

https://github.com/HoumanPashaei/CVE-2025-29927

https://github.com/0xcucumbersalad/cve-2025-29927

https://github.com/Grand-Moomin/Vuln-Next.js-CVE-2025-29927

https://github.com/sn1p3rt3s7/NextJS_CVE-2025-29927

https://github.com/gotr00t0day/CVE-2025-29927

https://github.com/KaztoRay/CVE-2025-29927-Research

https://github.com/lirantal/vulnerable-nextjs-14-CVE-2025-29927

https://github.com/elshaheedy/CVE-2025-29927-Sigma-Rule

https://github.com/ricsirigu/CVE-2025-29927

https://github.com/w2hcorp/CVE-2025-29927-PoC

https://github.com/0xWhoknows/CVE-2025-29927

https://github.com/Nekicj/CVE-2025-29927-exploit

https://github.com/ticofookfook/poc-nextjs-CVE-2025-29927

https://github.com/nocomp/CVE-2025-29927-scanner

https://github.com/Knotsecurity/CVE-2025-29927-NextJs-Middleware-Simulation

https://github.com/pouriam23/Next.js-Middleware-Bypass-CVE-2025-29927-

https://github.com/SugiB3o/vulnerable-nextjs-14-CVE-2025-29927

https://github.com/aydinnyunus/CVE-2025-29927

https://github.com/Eve-SatOrU/POC-CVE-2025-29927

https://github.com/0xPThree/next.js_cve-2025-29927

https://github.com/maronnjapan/claude-create-CVE-2025-29927

https://github.com/darklotuskdb/nextjs-CVE-2025-29927-hunter

https://github.com/Heimd411/CVE-2025-29927-PoC

https://github.com/sagsooz/CVE-2025-29927

https://github.com/ayato-shitomi/WebLab_CVE-2025-29927

https://github.com/emadshanab/CVE-2025-29927

https://github.com/EQSTLab/CVE-2025-29927

https://github.com/kOaDT/poc-cve-2025-29927

CVE-2025-1829
(6.3 MEDIUM)

EPSS: 1.09%

updated 2025-04-03T18:31:56

1 posts

A vulnerability was found in TOTOLINK X18 9.1.0cu.2024_B20220329. It has been declared as critical. This vulnerability affects the function setMtknatCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument mtkhnatEnable leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early abou

heinen@infosec.exchange at 2025-06-06T15:14:41.000Z ##

Just noticed CVE-2025-1829 an RCE in the mtkhnatEnable parameter of /cgi-bin/cstecgi.cgi on TOTOLINK devices being actively exploited.

Exploitation started since 23/03 though which is ~3 weeks after the vuln became public?

#honeypot #dfir

##

CVE-2023-52926
(7.8 HIGH)

EPSS: 0.01%

updated 2025-03-24T17:34:43.630000

1 posts

In the Linux kernel, the following vulnerability has been resolved: IORING_OP_READ did not correctly consume the provided buffer list when read i/o returned < 0 (except for -EAGAIN and -EIOCBQUEUED return). This can lead to a potential use-after-free when the completion via io_rw_done runs at separate context.

AAKL@infosec.exchange at 2025-06-06T18:40:45.000Z ##

New. There's a new version that addresses several vulnerabilities.

- High CVE-2025-4664 Insufficient policy enforcement in Loader
- High CVE-2025-5419 Out of bounds read and write in V8
- Fixes for CVE-2024-53164, CVE-2024-56770, CVE-2024-53125, CVE-2023-52926

Google: Long Term Support Channel Update for ChromeOS chromereleases.googleblog.com/ #Google #Chrome #cybersecurity #infoesc

##

CVE-2024-24919
(8.6 HIGH)

EPSS: 94.33%

updated 2025-01-27T21:42:18.743000

1 posts

Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.

Nuclei template

60 repos

https://github.com/Praison001/CVE-2024-24919-Check-Point-Remote-Access-VPN

https://github.com/zam89/CVE-2024-24919

https://github.com/LuisMateo1/Arbitrary-File-Read-CVE-2024-24919

https://github.com/RevoltSecurities/CVE-2024-24919

https://github.com/r4p3c4/CVE-2024-24919-Checkpoint-Firewall-VPN-Check

https://github.com/0xkalawy/CVE-2024-24919

https://github.com/ejaboz/cve-2024-24919

https://github.com/sar-3mar/CVE-2024-24919_POC

https://github.com/protonnegativo/CVE-2024-24919

https://github.com/NingXin2002/Check-Point_poc

https://github.com/Cappricio-Securities/CVE-2024-24919

https://github.com/H3KEY/CVE-2024-24919

https://github.com/geniuszly/CVE-2024-24919

https://github.com/J4F9S5D2Q7/CVE-2024-24919-CHECKPOINT

https://github.com/ShadowByte1/CVE-2024-24919

https://github.com/AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-

https://github.com/SalehLardhi/CVE-2024-24919

https://github.com/GuayoyoCyber/CVE-2024-24919

https://github.com/hashdr1ft/SOC_287

https://github.com/fernandobortotti/CVE-2024-24919

https://github.com/starlox0/CVE-2024-24919-POC

https://github.com/0nin0hanz0/CVE-2024-24919-PoC

https://github.com/Vulnpire/CVE-2024-24919

https://github.com/emanueldosreis/CVE-2024-24919

https://github.com/CyprianAtsyor/CVE-2024-24919-Incident-Report.md

https://github.com/smackerdodi/CVE-2024-24919-nuclei-templater

https://github.com/spider00009/CVE-2024-24919-POC

https://github.com/Expl0itD0g/CVE-2024-24919---Poc

https://github.com/zxcod3/CVE-2024-24919

https://github.com/GoatSecurity/CVE-2024-24919

https://github.com/0xYumeko/CVE-2024-24919

https://github.com/nullcult/CVE-2024-24919-Exploit

https://github.com/YN1337/CVE-2024-24919

https://github.com/c3rrberu5/CVE-2024-24919

https://github.com/hendprw/CVE-2024-24919

https://github.com/gurudattch/CVE-2024-24919

https://github.com/satchhacker/cve-2024-24919

https://github.com/0xans/CVE-2024-24919

https://github.com/Bytenull00/CVE-2024-24919

https://github.com/Jutrm/cve-2024-24919

https://github.com/birdlex/cve-2024-24919-checker

https://github.com/funixone/CVE-2024-24919---Exploit-Script

https://github.com/satriarizka/CVE-2024-24919

https://github.com/CyberBibs/Event-ID-263-Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-

https://github.com/r4p3c4/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN

https://github.com/GlobalsecureAcademy/CVE-2024-24919

https://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner

https://github.com/un9nplayer/CVE-2024-24919

https://github.com/LucasKatashi/CVE-2024-24919

https://github.com/am-eid/CVE-2024-24919

https://github.com/mr-kasim-mehar/CVE-2024-24919-Exploit

https://github.com/bigb0x/CVE-2024-24919-Sniper

https://github.com/P3wc0/CVE-2024-24919

https://github.com/Rug4lo/CVE-2024-24919-Exploit

https://github.com/Tim-Hoekstra/CVE-2024-24919

https://github.com/B1naryo/CVE-2024-24919-POC

https://github.com/nexblade12/CVE-2024-24919

https://github.com/nicolvsrlr27/CVE-2024-24919

https://github.com/verylazytech/CVE-2024-24919

https://github.com/seed1337/CVE-2024-24919-POC

DarkWebInformer@infosec.exchange at 2025-06-06T18:18:41.000Z ##

🚨CVE-2024-24919: Check Point Remote Access VPN vulnerability

FOFA Link: en.fofa.info/result?qbase64=dG

FOFA Query 1: app="Check_Point-SSL-Network-Extender"

OR

FOFA Query 2: title="Check Point SSL Network Extender"

Results: 45,343

Advisory: nvd.nist.gov/vuln/detail/cve-2

PoC: labs.watchtowr.com/check-point

CVSS: 8.6

##

CVE-2024-56770
(5.5 MEDIUM)

EPSS: 0.03%

updated 2025-01-10T18:31:39

1 posts

In the Linux kernel, the following vulnerability has been resolved: net/sched: netem: account for backlog updates from child qdisc In general, 'qlen' of any classful qdisc should keep track of the number of packets that the qdisc itself and all of its children holds. In case of netem, 'qlen' only accounts for the packets in its internal tfifo. When netem is used with a child qdisc, the child qdi

AAKL@infosec.exchange at 2025-06-06T18:40:45.000Z ##

New. There's a new version that addresses several vulnerabilities.

- High CVE-2025-4664 Insufficient policy enforcement in Loader
- High CVE-2025-5419 Out of bounds read and write in V8
- Fixes for CVE-2024-53164, CVE-2024-56770, CVE-2024-53125, CVE-2023-52926

Google: Long Term Support Channel Update for ChromeOS chromereleases.googleblog.com/ #Google #Chrome #cybersecurity #infoesc

##

CVE-2024-53164(CVSS UNKNOWN)

EPSS: 0.09%

updated 2025-01-09T18:32:13

1 posts

In the Linux kernel, the following vulnerability has been resolved: net: sched: fix ordering of qlen adjustment Changes to sch->q.qlen around qdisc_tree_reduce_backlog() need to happen _before_ a call to said function because otherwise it may fail to notify parent qdiscs when the child is about to become empty.

AAKL@infosec.exchange at 2025-06-06T18:40:45.000Z ##

New. There's a new version that addresses several vulnerabilities.

- High CVE-2025-4664 Insufficient policy enforcement in Loader
- High CVE-2025-5419 Out of bounds read and write in V8
- Fixes for CVE-2024-53164, CVE-2024-56770, CVE-2024-53125, CVE-2023-52926

Google: Long Term Support Channel Update for ChromeOS chromereleases.googleblog.com/ #Google #Chrome #cybersecurity #infoesc

##

CVE-2024-53125(CVSS UNKNOWN)

EPSS: 0.09%

updated 2024-12-19T21:32:18

1 posts

In the Linux kernel, the following vulnerability has been resolved: bpf: sync_linked_regs() must preserve subreg_def Range propagation must not affect subreg_def marks, otherwise the following example is rewritten by verifier incorrectly when BPF_F_TEST_RND_HI32 flag is set: 0: call bpf_ktime_get_ns call bpf_ktime_get_ns 1: r0 &= 0x7fffffff after verifier r0 &= 0x7

AAKL@infosec.exchange at 2025-06-06T18:40:45.000Z ##

New. There's a new version that addresses several vulnerabilities.

- High CVE-2025-4664 Insufficient policy enforcement in Loader
- High CVE-2025-5419 Out of bounds read and write in V8
- Fixes for CVE-2024-53164, CVE-2024-56770, CVE-2024-53125, CVE-2023-52926

Google: Long Term Support Channel Update for ChromeOS chromereleases.googleblog.com/ #Google #Chrome #cybersecurity #infoesc

##

CVE-2023-52922
(7.8 HIGH)

EPSS: 0.03%

updated 2024-12-11T15:32:22

1 posts

In the Linux kernel, the following vulnerability has been resolved: can: bcm: Fix UAF in bcm_proc_show() BUG: KASAN: slab-use-after-free in bcm_proc_show+0x969/0xa80 Read of size 8 at addr ffff888155846230 by task cat/7862 CPU: 1 PID: 7862 Comm: cat Not tainted 6.5.0-rc1-00153-gc8746099c197 #230 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 Call Trace: <TASK>

alleleintel@infosec.exchange at 2025-06-09T12:58:30.000Z ##

We wrote a blog post about a Linux kernel vulnerability we reported to Red Hat in July 2024. The vulnerability had been fixed upstream a year before, but Red Hat and derivatives distributions didn't backport the patch. It was assigned the CVE-2023-52922 after we reported it.

The vulnerability is a use-after-free read. We could abuse it to leak the encoded freelist pointer of an object. This allows an attacker to craft an encoded freelist pointer that decodes to an arbitrary address.

It also allows an attacker to leak the addresses of objects from the kernel heap, defeating physmap/heap address randomization.These primitives facilitate exploitation of the system by providing the attacker with useful primitives.

Additionally, we highlighted a typical pattern in the subsystem, as two similar vulnerabilities had been discovered. However, before publishing the blog post, we noticed that the patch for this vulnerability doesn't fix it. We could still trigger the use-after-free issue.

This finding confirms the point raised by the blog post. Furthermore, we discovered another vulnerability in the subsystem. An out-of-bounds read. We've reported them, and these two new vulnerabilities were already patched. A new blog post about them will be written.

Use-after-free vulnerability in CAN BCM subsystem leading to information disclosure (CVE-2023-52922)

allelesecurity.com/use-after-f

##

CVE-2024-45318
(8.1 HIGH)

EPSS: 0.25%

updated 2024-12-05T18:32:07

1 posts

A vulnerability in the SonicWall SMA100 SSLVPN web management interface allows remote attackers to cause Stack-based buffer overflow and potentially lead to code execution.

cR0w@infosec.exchange at 2025-06-05T12:29:26.000Z ##

Write-up on exploiting CVE-2024-40763, CVE-2024-45318, CVE-2024-45319, CVE-2024-53702, and CVE-2024-53703 in SonicWALL SMA, which I'm sure everyone has patched by now...

blog.scrt.ch/2025/06/04/sonicd

##

CVE-2024-53702
(5.3 MEDIUM)

EPSS: 0.04%

updated 2024-12-05T18:32:07

1 posts

Use of cryptographically weak pseudo-random number generator (PRNG) vulnerability in the SonicWall SMA100 SSLVPN backup code generator that, in certain cases, can be predicted by an attacker, potentially exposing the generated secret.

cR0w@infosec.exchange at 2025-06-05T12:29:26.000Z ##

Write-up on exploiting CVE-2024-40763, CVE-2024-45318, CVE-2024-45319, CVE-2024-53702, and CVE-2024-53703 in SonicWALL SMA, which I'm sure everyone has patched by now...

blog.scrt.ch/2025/06/04/sonicd

##

CVE-2024-40763
(7.5 HIGH)

EPSS: 0.11%

updated 2024-12-05T18:31:03

1 posts

Heap-based buffer overflow vulnerability in the SonicWall SMA100 SSLVPN due to the use of strcpy. This allows remote authenticated attackers to cause Heap-based buffer overflow and potentially lead to code execution.

cR0w@infosec.exchange at 2025-06-05T12:29:26.000Z ##

Write-up on exploiting CVE-2024-40763, CVE-2024-45318, CVE-2024-45319, CVE-2024-53702, and CVE-2024-53703 in SonicWALL SMA, which I'm sure everyone has patched by now...

blog.scrt.ch/2025/06/04/sonicd

##

CVE-2024-45319
(6.3 MEDIUM)

EPSS: 0.05%

updated 2024-12-05T17:15:12.040000

1 posts

A vulnerability in the SonicWall SMA100 SSLVPN firmware 10.2.1.13-72sv and earlier versions allows a remote authenticated attacker can circumvent the certificate requirement during authentication.

cR0w@infosec.exchange at 2025-06-05T12:29:26.000Z ##

Write-up on exploiting CVE-2024-40763, CVE-2024-45318, CVE-2024-45319, CVE-2024-53702, and CVE-2024-53703 in SonicWALL SMA, which I'm sure everyone has patched by now...

blog.scrt.ch/2025/06/04/sonicd

##

CVE-2024-53703
(8.1 HIGH)

EPSS: 0.10%

updated 2024-12-05T15:31:09

1 posts

A vulnerability in the SonicWall SMA100 SSLVPN firmware 10.2.1.13-72sv and earlier versions mod_httprp library loaded by the Apache web server allows remote attackers to cause Stack-based buffer overflow and potentially lead to code execution.

1 repos

https://github.com/scrt/cve-2024-53703-poc

cR0w@infosec.exchange at 2025-06-05T12:29:26.000Z ##

Write-up on exploiting CVE-2024-40763, CVE-2024-45318, CVE-2024-45319, CVE-2024-53702, and CVE-2024-53703 in SonicWALL SMA, which I'm sure everyone has patched by now...

blog.scrt.ch/2025/06/04/sonicd

##

CVE-2024-9143
(4.3 MEDIUM)

EPSS: 0.42%

updated 2024-11-08T18:31:50

1 posts

Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes. Impact summary: Out of bound memory writes can lead to an application crash or even a possibility of a remote code execution, however, in all the protocols involving Elliptic Curve Cryptography that we're aware of, either only "n

cR0w@infosec.exchange at 2025-06-10T16:00:26.000Z ##

SolarWinds released Observability Self-Hosted 2025.2 which patched some CVEs:

  • CVE-2025-26394 ( sev:MED )
  • CVE-2025-26395 ( sev:HIGH )
  • CVE-2024-9143 ( sev:MED )
  • CVE-2025-22869 ( sev:HIGH )

documentation.solarwinds.com/e

#patchTuesday

##

CVE-2017-0199
(7.8 HIGH)

EPSS: 94.37%

updated 2024-07-24T18:32:16

1 posts

Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API."

26 repos

https://github.com/n1shant-sinha/CVE-2017-0199

https://github.com/nicpenning/RTF-Cleaner

https://github.com/TheCyberWatchers/CVE-2017-0199-v5.0

https://github.com/SyFi/cve-2017-0199

https://github.com/Winter3un/cve_2017_0199

https://github.com/joke998/Cve-2017-0199

https://github.com/Sunqiz/CVE-2017-0199-reprofuction

https://github.com/kn0wm4d/htattack

https://github.com/jacobsoo/RTF-Cleaner

https://github.com/NotAwful/CVE-2017-0199-Fix

https://github.com/Exploit-install/CVE-2017-0199

https://github.com/haibara3839/CVE-2017-0199-master

https://github.com/SwordSheath/CVE-2017-8570

https://github.com/joke998/Cve-2017-0199-

https://github.com/Phantomlancer123/CVE-2017-0199

https://github.com/mzakyz666/PoC-CVE-2017-0199

https://github.com/Nacromencer/cve2017-0199-in-python

https://github.com/stealth-ronin/CVE-2017-0199-PY-KIT

https://github.com/sUbc0ol/Microsoft-Word-CVE-2017-0199-

https://github.com/likekabin/CVE-2017-0199

https://github.com/viethdgit/CVE-2017-0199

https://github.com/ryhanson/CVE-2017-0199

https://github.com/BRAINIAC22/CVE-2017-0199

https://github.com/kash-123/CVE-2017-0199

https://github.com/bhdresh/CVE-2017-0199

https://github.com/herbiezimmerman/2017-11-17-Maldoc-Using-CVE-2017-0199

CVE-2024-3721
(6.3 MEDIUM)

EPSS: 51.14%

updated 2024-04-13T12:30:30

8 posts

A vulnerability was found in TBK DVR-4104 and DVR-4216 up to 20240412 and classified as critical. This issue affects some unknown processing of the file /device.rsp?opt=sys&cmd=___S_O_S_T_R_E_A_MAX___. The manipulation of the argument mdb/mdc leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260573

jos1264@social.skynetcloud.site at 2025-06-10T04:25:01.000Z ##

New Mirai botnet targets TBK DVRs by exploiting CVE-2024-3721 – Source: securityaffairs.com ciso2ciso.com/new-mirai-botnet #rssfeedpostgeneratorecho #informationsecuritynews #SecurityAffairscom #CyberSecurityNews #PierluigiPaganini #internetofthings #SecurityAffairs #SecurityAffairs #CVE-2024-3721 #BreakingNews #SecurityNews #hackingnews #Cybercrime #Security #hacking #Malware #botnet #Mirai #DVR #IoT

##

beyondmachines1@infosec.exchange at 2025-06-09T11:01:08.000Z ##

Mirai Botnet variant exploits TBK DVR Devices flaw

A new Mirai botnet variant is actively exploiting CVE-2024-3721 (CVSS 6.3) in TBK DVR devices to execute command injection attacks that download ARM32 binaries and add vulnerable systems into a botnet infrastructure. An estimated 50,000-114,000 internet-exposed devices are potentially at risk. The attack is complicated by extensive device rebranding across multiple vendors, making patch availability unclear.

**If you have TBK DVR devices (or rebranded versions like Novo, CeNova, QSee, Pulnix, Night OWL, etc.), make sure to isolate these devices from the internet. Then check for and apply any available firmware updates from your vendor to patch CVE-2024-3721. If the device has been exposed, consider performing a factory reset before isolating it in a protected network.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

linux@activitypub.awakari.com at 2025-06-09T08:54:53.000Z ## New Mirai botnet targets TBK DVRs by exploiting CVE-2024-3721 A new variant of the Mirai botnet e...


#Breaking #News #Internet #of #Things #Malware #Security #botnet #CVE-2024-3721 #Cybercrime #DVR
Origin | Interest | Match ##

RedTeamNews@infosec.exchange at 2025-06-08T15:23:21.000Z ##

New Mirai botnet variant exploits TBK DVR devices via CVE-2024-3721, infecting 50K+ devices globally. Check IoCs and patch now to avoid DDoS attacks. Details: redteamnews.com/red-team/cve/n

##

AAKL@infosec.exchange at 2025-06-06T17:52:49.000Z ##

Kaspersky: Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721 securelist.com/mirai-botnet-va @Kaspersky #cybersecurity #infosec

##

jos1264@social.skynetcloud.site at 2025-06-06T17:10:03.000Z ##

Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721 – Source: securelist.com ciso2ciso.com/analysis-of-the- #Vulnerabilitiesandexploits #rssfeedpostgeneratorecho #Secureenvironment(IoT) #MalwareTechnologies #CyberSecurityNews #internetofthings #vulnerabilities #DataEncryption #GReATresearch #securelistcom #Honeypot #botnets #Malware #LINUX #Mirai #CVE #RC4

##

linux@activitypub.awakari.com at 2025-06-06T10:05:38.000Z ## Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721 The abuse of know...


#Malware #News
Origin | Interest | Match ##

oversecurity@mastodon.social at 2025-06-06T10:20:10.000Z ##

Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721

Kaspersky GReAT experts describe the new features of a Mirai variant: the latest botnet infections target TBK DVR devices with CVE-2024-3721.

🔗️ [Securelist] link.is.it/PluQDL

##

CVE-2023-39910
(7.5 HIGH)

EPSS: 0.14%

updated 2024-04-04T06:43:16

1 posts

The cryptocurrency wallet entropy seeding mechanism used in Libbitcoin Explorer 3.0.0 through 3.6.0 is weak, aka the Milk Sad issue. The use of an mt19937 Mersenne Twister PRNG restricts the internal entropy to 32 bits regardless of settings. This allows remote attackers to recover any wallet private keys generated from "bx seed" entropy output and steal funds. (Affected users need to move funds t

1 repos

https://github.com/z1ph1us/MilkSad-Mnemonic-Generator

z1ph1us@defcon.social at 2025-06-04T09:11:38.000Z ##

github.com/z1ph1us/MilkSad-Mne
This tool generates BIP-39 mnemonic phrases derived from Unix timestamps, exploring the 'Milk Sad' vulnerability's implications (CVE-2023-39910)
#Cybersecurity #Tech #Blockchain #Crypto #Mnemonic #Seed #Bitcoin

##

CVE-2023-25194
(8.8 HIGH)

EPSS: 94.19%

updated 2023-07-21T18:01:39

1 posts

A possible security vulnerability has been identified in Apache Kafka Connect API. This requires access to a Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config and a SASL-based security protocol, which has been possible on Kafka Connect clusters since Apache Kafka Connect 2.3.0. When configuring the connector via the Kafka Connec

Nuclei template

4 repos

https://github.com/Avento/Apache_Druid_JNDI_Vuln

https://github.com/ohnonoyesyes/CVE-2023-25194

https://github.com/YongYe-Security/CVE-2023-25194

https://github.com/vulncheck-oss/cve-2023-25194

cR0w@infosec.exchange at 2025-06-10T12:54:24.000Z ##

Three new Apache Kafka CVEs with some specific configurations.

kafka.apache.org/cve-list

CVE-2025-27819 Apache Kafka: Possible RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration

In CVE-2023-25194, we announced the RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration in Kafka Connect API. But not only Kafka Connect API is vulnerable to this attack, the Apache Kafka brokers also have this vulnerability. To exploit this vulnerability, the attacker needs to be able to connect to the Kafka cluster and have the AlterConfigs permission on the cluster resource.

Since Apache Kafka 3.4.0, we have added a system property ("-Dorg.apache.kafka.disallowed.login.modules") to disable the problematic login modules usage in SASL JAAS configuration. Also by default "com.sun.security.auth.module.JndiLoginModule" is disabled in Apache Kafka 3.4.0, and "com.sun.security.auth.module.JndiLoginModule,com.sun.security.auth.module.LdapLoginModule" is disabled by default in Apache Kafka 3.9.1/4.0.0.

CVE-2025-27818 Apache Kafka: Possible RCE attack via SASL JAAS LdapLoginModule configuration

A possible security vulnerability has been identified in Apache Kafka. This requires access to a alterConfig to the cluster resource, or Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config and a SASL-based security protocol, which has been possible on Kafka clusters since Apache Kafka 2.0.0 (Kafka Connect 2.3.0). When configuring the broker via config file or AlterConfig command, or connector via the Kafka Kafka Connect REST API, an authenticated operator can set the sasl.jaas.config property for any of the connector's Kafka clients to "com.sun.security.auth.module.LdapLoginModule", which can be done via the producer.override.sasl.jaas.config, consumer.override.sasl.jaas.config, or admin.override.sasl.jaas.config properties. This will allow the server to connect to the attacker's LDAP server and deserialize the LDAP response, which the attacker can use to execute java deserialization gadget chains on the Kafka connect server. Attacker can cause unrestricted deserialization of untrusted data (or) RCE vulnerability when there are gadgets in the classpath.

Since Apache Kafka 3.9.1/4.0.0, we have added a system property ("-Dorg.apache.kafka.disallowed.login.modules") to disable the problematic login modules usage in SASL JAAS configuration. Also by default "com.sun.security.auth.module.JndiLoginModule,com.sun.security.auth.module.LdapLoginModule" are disabled in Apache Kafka Connect 3.9.1/4.0.0.

CVE-2025-27817 Apache Kafka Client: Arbitrary file read and SSRF vulnerability

A possible arbitrary file read and SSRF vulnerability has been identified in Apache Kafka Client. Apache Kafka Clients accept configuration data for setting the SASL/OAUTHBEARER connection with the brokers, including "sasl.oauthbearer.token.endpoint.url" and "sasl.oauthbearer.jwks.endpoint.url". Apache Kafka allows clients to read an arbitrary file and return the content in the error log, or sending requests to an unintended location. In applications where Apache Kafka Clients configurations can be specified by an untrusted party, attackers may use the "sasl.oauthbearer.token.endpoint.url" and "sasl.oauthbearer.jwks.endpoint.url" configuration to read arbitrary contents of the disk and environment variables or make requests to an unintended location. In particular, this flaw may be used in Apache Kafka Connect to escalate from REST API access to filesystem/environment/URL access, which may be undesirable in certain environments, including SaaS products.

Since Apache Kafka 3.9.1/4.0.0, we have added a system property ("-Dorg.apache.kafka.sasl.oauthbearer.allowed.urls") to set the allowed urls in SASL JAAS configuration. In 3.9.1, it accepts all urls by default for backward compatibility. However in 4.0.0 and newer, the default value is empty list and users have to set the allowed urls explicitly.

##

CVE-2025-4275
(0 None)

EPSS: 0.00%

1 posts

N/A

1 repos

https://github.com/NikolajSchlej/Hydroph0bia

AAKL@infosec.exchange at 2025-06-10T14:06:08.000Z ##

If you missed this, CISA added these vulnerabilities to the KEV catalogue yesterday.

- CVE-2025-32433: Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2024-42009: RoundCube Webmail Cross-Site Scripting Vulnerability cve.org/CVERecord?id=CVE-2024- #CISA #cybersecurity #Infosec

##

cisakevtracker@mastodon.social at 2025-06-09T18:01:08.000Z ##

CVE ID: CVE-2025-32433
Vendor: Erlang
Product: Erlang/OTP
Date Added: 2025-06-09
Vulnerability: Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability
Notes: This vulnerability affects a common open-source project, third-party library, or a protocol used by different products. For more information, please see: github.com/erlang/otp/security ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-49001
(0 None)

EPSS: 0.05%

1 posts

N/A

beyondmachines1@infosec.exchange at 2025-06-10T13:01:09.000Z ##

Multiple vulnerabilities reported in DataEase Platform exposing risk of system compromise

DataEase, an open-source business intelligence platform, disclosed multiple critical vulnerabilities including authentication bypass (CVE-2025-49001) that allows JWT token forging and remote code execution flaws (CVE-2025-49002 and CVE-2025-48999) that bypass previous security patches through case sensitivity variations and malicious JDBC statements.

**If you are using DataEase, pmake sure to isolate it from the internet and allow access only from trusted networks. Then plan a quick upgrade to version 2.10.10 or later. There are at least two scary (and fairly dumb) exploits that can compromise your DataEase.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-48999
(0 None)

EPSS: 0.04%

1 posts

N/A

beyondmachines1@infosec.exchange at 2025-06-10T13:01:09.000Z ##

Multiple vulnerabilities reported in DataEase Platform exposing risk of system compromise

DataEase, an open-source business intelligence platform, disclosed multiple critical vulnerabilities including authentication bypass (CVE-2025-49001) that allows JWT token forging and remote code execution flaws (CVE-2025-49002 and CVE-2025-48999) that bypass previous security patches through case sensitivity variations and malicious JDBC statements.

**If you are using DataEase, pmake sure to isolate it from the internet and allow access only from trusted networks. Then plan a quick upgrade to version 2.10.10 or later. There are at least two scary (and fairly dumb) exploits that can compromise your DataEase.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-48062
(0 None)

EPSS: 0.03%

1 posts

N/A

cR0w@infosec.exchange at 2025-06-09T12:54:18.000Z ##

Go hack some Discourse.

github.com/discourse/discourse

sev:HIGH 7.1 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

Discourse is an open-source discussion platform. Prior to version 3.4.4 of the stable branch, version 3.5.0.beta5 of the beta branch, and version 3.5.0.beta6-dev of the tests-passed branch, certain invites via email may result in HTML injection in the email body if the topic title includes HTML. This includes inviting someone (without an account) to a PM and inviting someone (without an account) to a topic with a custom message. This issue is patched in version 3.4.4 of the stable branch, version 3.5.0.beta5 of the beta branch, and version 3.5.0.beta6-dev of the tests-passed branch. This can be worked around if the relevant templates are overridden without {topic_title}.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-5688
(0 None)

EPSS: 0.02%

2 posts

N/A

beyondmachines1@infosec.exchange at 2025-06-07T08:01:08.000Z ##

Out-of-Bounds write flaw in FreeRTOS-Plus-TCP can enable arbitrary code execution

AWS disclosed a memory corruption vulnerability (CVE-2025-5688) in FreeRTOS-Plus-TCP affecting embedded and IoT devices, where out-of-bounds writes in LLMNR or mDNS processing can lead to arbitrary code execution or system crashes.

**This one is quite complex. First, check your FreeRTOS-Plus-TCP versions, and check if you are using Buffer Allocation Scheme 1 and have LLMNR or mDNS enabled. As usual, make sure that your devices are isolated from the internet and accessible only from trusted networks. Then if you are running a vulnerable combination of the version and buffer/DNS enabled, plan a patch cycle.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

cR0w@infosec.exchange at 2025-06-04T17:38:25.000Z ##

Oh this is a fun one.

aws.amazon.com/security/securi

sev:HIGH 7.5 - CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

FreeRTOS-Plus-TCP is an open source TCP/IP stack implementation specifically designed for FreeRTOS. The stack provides a standard Berkeley sockets interface and supports essential networking protocols including IPv6, ARP, DHCP, DNS, LLMNR, mDNS, NBNS, RA, ND, ICMP, and ICMPv6. FreeRTOS-Plus-TCP offers two Buffer Allocation Schemes for buffer management:

  • Buffer Allocation Scheme 1 - Allocates buffers from a pre-defined pool of fixed-size buffers.
  • Buffer Allocation Scheme 2 - Allocates buffers of required size dynamically from the heap.

We identified CVE-2025-5688, that may allow out-of-bounds write when processing LLMNR or mDNS queries with very long DNS names. This issue only affects systems using Buffer Allocation Scheme 1 with LLMNR or mDNS enabled.

Affected version:

  • v2.3.4 through v4.3.1, if LLMNR is used with Buffer Allocation Scheme 1.
  • v4.0.0 through v4.3.1, if mDNS is used with Buffer Allocation Scheme 1.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-49012
(0 None)

EPSS: 0.07%

1 posts

N/A

cR0w@infosec.exchange at 2025-06-05T23:19:18.000Z ##

I don't know how widespread this system is, but it looks like a handy vuln if you're on a pentest now or soon and come across it.

github.com/himmelblau-idm/himm

Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Himmelblau versions 0.9.0 through 0.9.14 and 1.00-alpha are vulnerable to a privilege escalation issue when Entra ID group-based access restrictions are configured using group display names instead of object IDs. Starting in version 0.9.0, Himmelblau introduced support for specifying group names in the pam_allow_groups configuration option. However, Microsoft Entra ID permits the creation of multiple groups with the same displayName via the Microsoft Graph API—even by non-admin users, depending on tenant settings. As a result, a user could create a personal group with the same name as a legitimate access group (e.g., "Allow-Linux-Login"), add themselves to it, and be granted authentication or sudo rights by Himmelblau. Because affected Himmelblau versions compare group names by either displayName or by the immutable objectId, this allows bypassing access control mechanisms intended to restrict login to members of official, centrally-managed groups. This issue is fixed in Himmelblau version 0.9.15 and later. In these versions, group name matching in pam_allow_groups has been deprecated and removed, and only group objectIds (GUIDs) may be specified for secure group-based filtering. To mitigate the issue without upgrading, replace all entries in pam_allow_groups with the objectId of the target Entra ID group(s) and/or audit your tenant for groups with duplicate display names using the Microsoft Graph API.

nvd.nist.gov/vuln/detail/CVE-2

##

Visit counter For Websites