## Updated at UTC 2025-11-28T23:11:22.474305

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2025-13683 6.5 0.00% 1 0 2025-11-28T21:32:24 Exposure of credentials in unintended requests in Devolutions Server, Remote Des
CVE-2025-40934 9.3 0.01% 1 0 2025-11-28T21:32:24 XML-Sig versions 0.27 through 0.67 for Perl incorrectly validates XML files if s
CVE-2025-45311 8.8 0.01% 1 0 2025-11-28T21:31:18 Insecure permissions in fail2ban-client v0.11.2 allows attackers with limited su
CVE-2025-65681 3.3 0.02% 1 1 2025-11-28T21:15:48.280000 An issue was discovered in Overhang.IO (tutor-open-edx) (overhangio/tutor) 20.0.
CVE-2021-26829 5.4 0.25% 5 0 2025-11-28T19:15:44.900000 OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows stor
CVE-2025-51736 6.3 0.00% 1 0 2025-11-28T18:31:28 File upload vulnerability in HCL Technologies Ltd. Unica 12.0.0.
CVE-2025-51735 7.5 0.00% 1 0 2025-11-28T18:31:27 CSV formula injection vulnerability in HCL Technologies Ltd. Unica 12.0.0.
CVE-2025-51734 5.4 0.00% 1 0 2025-11-28T18:31:27 Cross-site scripting (XSS) vulnerability in HCL Technologies Ltd. Unica 12.0.0.
CVE-2025-51733 5.5 0.00% 1 0 2025-11-28T18:31:27 Cross-Site Request Forgery (CSRF) vulnerability in HCL Technologies Ltd. Unica 1
CVE-2025-13742 None 0.04% 1 0 2025-11-28T18:31:27 Emails sent by pretix can utilize placeholders that will be filled with customer
CVE-2025-12183 None 0.00% 2 0 2025-11-28T18:30:32 Out-of-bounds memory operations in org.lz4:lz4-java 1.8.0 and earlier allow remo
CVE-2025-59790 5.4 0.00% 1 0 2025-11-28T18:30:24 Improper Privilege Management vulnerability in Apache Kvrocks. This issue affec
CVE-2025-59792 5.3 0.00% 1 0 2025-11-28T18:30:24 Reveals plaintext credentials in the MONITOR command vulnerability in Apache Kvr
CVE-2025-59454 4.3 0.02% 1 0 2025-11-28T18:30:23 In Apache CloudStack, a gap in access control checks affected the APIs - createN
CVE-2025-59302 4.7 0.03% 1 0 2025-11-28T15:31:38 In Apache CloudStack improper control of generation of code ('Code Injection')
CVE-2025-12638 8.0 0.00% 2 0 2025-11-28T15:30:36 Keras version 3.11.3 is affected by a path traversal vulnerability in the keras.
CVE-2025-11156 None 0.00% 1 0 2025-11-28T15:30:36 Netskope was notified about a potential gap in its agent (NS Client) on Windows
CVE-2025-65202 8.0 0.16% 1 0 2025-11-28T15:16:03.483000 TRENDnet TEW-657BRM 1.00.1 has an authenticated remote OS command injection vuln
CVE-2025-12143 6.1 0.00% 1 0 2025-11-28T12:30:28 Stack-based Buffer Overflow vulnerability in ABB Terra AC wallbox.This issue aff
CVE-2025-66385 None 0.04% 3 0 2025-11-28T09:30:22 UsersController::edit in Cerebrate before 1.30 allows an authenticated non-privi
CVE-2025-13769 6.5 0.03% 1 0 2025-11-28T09:30:22 WebITR developed by Uniong has a SQL Injection vulnerability, allowing authentic
CVE-2025-13770 6.5 0.03% 1 0 2025-11-28T09:30:18 WebITR developed by Uniong has a SQL Injection vulnerability, allowing authentic
CVE-2025-13768 7.5 0.15% 1 0 2025-11-28T09:30:18 WebITR developed by Uniong has an Authentication Bypass vulnerability, allowing
CVE-2025-13771 6.5 0.04% 2 0 2025-11-28T09:30:17 WebITR developed by Uniong has an Arbitrary File Read vulnerability, allowing au
CVE-2025-66384 8.2 0.03% 2 0 2025-11-28T09:30:17 app/Controller/EventsController.php in MISP before 2.5.24 has invalid logic in c
CVE-2025-66382 2.9 0.01% 1 0 2025-11-28T09:30:17 In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can
CVE-2025-66386 4.1 0.03% 1 0 2025-11-28T07:15:59.900000 app/Model/EventReport.php in MISP before 2.5.27 allows path traversal in view pi
CVE-2025-58308 7.3 0.01% 1 0 2025-11-28T06:32:10 Vulnerability of improper criterion security check in the call module. Impact: S
CVE-2025-58305 6.2 0.01% 1 0 2025-11-28T06:32:10 Identity authentication bypass vulnerability in the Gallery app. Impact: Success
CVE-2025-58302 8.4 0.01% 3 0 2025-11-28T06:32:09 Permission control vulnerability in the Settings module. Impact: Successful expl
CVE-2025-64312 4.9 0.01% 1 0 2025-11-28T06:32:09 Permission control vulnerability in the file management module. Impact: Successf
CVE-2025-13737 4.3 0.01% 1 0 2025-11-28T06:32:09 The Nextend Social Login and Register plugin for WordPress is vulnerable to Cros
CVE-2025-66372 2.8 0.01% 1 0 2025-11-28T06:32:07 Mustang before 2.16.3 allows exfiltrating files via XXE attacks.
CVE-2025-66370 5.0 0.03% 1 0 2025-11-28T06:32:07 Kivitendo before 3.9.2 allows XXE injection. By uploading an electronic invoice
CVE-2025-66371 5.0 0.03% 1 0 2025-11-28T04:16:01.293000 Peppol-py before 1.1.1 allows XXE attacks because of the Saxon configuration. Wh
CVE-2025-58311 5.8 0.01% 1 0 2025-11-28T04:16:00.807000 UAF vulnerability in the USB driver module. Impact: Successful exploitation of t
CVE-2025-58304 4.9 0.01% 1 0 2025-11-28T04:16:00.347000 Permission control vulnerability in the file management module. Impact: Successf
CVE-2025-58303 8.4 0.01% 1 0 2025-11-28T03:30:34 UAF vulnerability in the screen recording framework module. Impact: Successful e
CVE-2025-58310 8.0 0.01% 1 0 2025-11-28T03:30:33 Permission control vulnerability in the distributed component. Impact: Successfu
CVE-2025-64314 9.3 0.01% 2 0 2025-11-28T03:16:00.867000 Permission control vulnerability in the memory management module. Impact: Succes
CVE-2025-66360 None 0.04% 1 0 2025-11-28T00:30:28 An issue was discovered in Logpoint before 7.7.0. An improperly configured acces
CVE-2025-66361 None 0.04% 1 0 2025-11-28T00:30:27 An issue was discovered in Logpoint before 7.7.0. Sensitive information is expos
CVE-2025-66359 8.5 0.05% 2 0 2025-11-28T00:15:46.003000 An issue was discovered in Logpoint before 7.7.0. Insufficient input validation
CVE-2025-13338 0 0.00% 1 0 2025-11-27T23:15:50.550000 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering
CVE-2025-3261 None 0.07% 1 0 2025-11-27T18:30:34 ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload m
CVE-2025-12559 4.3 0.03% 1 0 2025-11-27T18:30:26 Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10
CVE-2025-12419 10.0 0.07% 2 0 2025-11-27T18:30:26 Mattermost versions 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12, 1
CVE-2025-13757 None 0.02% 1 0 2025-11-27T18:30:26 SQL Injection vulnerability in last usage logs in Devolutions Server.This issue
CVE-2025-13765 None 0.02% 1 0 2025-11-27T18:30:26 Exposure of email service credentials to users without administrative rights in
CVE-2025-12421 9.9 0.07% 2 0 2025-11-27T18:15:46.223000 Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10
CVE-2025-13758 0 0.02% 1 0 2025-11-27T16:15:47.257000 Exposure of credentials in unintended requests in Devolutions Server.This issue
CVE-2025-54057 None 0.03% 1 0 2025-11-27T15:32:27 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vu
CVE-2025-12140 None 0.08% 2 0 2025-11-27T15:31:32 The application contains an insecure 'redirectToUrl' mechanism that incorrectly
CVE-2025-13692 7.2 0.10% 1 0 2025-11-27T15:31:32 The Unlimited Elements For Elementor plugin for WordPress is vulnerable to Store
CVE-2025-8890 0 0.29% 2 0 2025-11-27T14:15:52.183000 Firmware in SDMC NE6037 routers prior to version 7.1.12.2.44 has a network diagn
CVE-2025-12971 4.3 0.03% 1 0 2025-11-27T13:15:58.547000 The Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts,
CVE-2025-10476 4.3 0.03% 1 0 2025-11-27T12:30:34 The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized modifica
CVE-2025-59025 6.1 0.03% 1 0 2025-11-27T12:30:34 Malicious e-mail content can be used to execute script code. Unintended actions
CVE-2025-30186 5.4 0.03% 1 0 2025-11-27T12:30:34 Malicious content uploaded as file can be used to execute script code when follo
CVE-2025-13378 6.5 0.04% 1 0 2025-11-27T12:30:34 The AI ChatBot with ChatGPT and Content Generator by AYS plugin for WordPress is
CVE-2025-12584 5.3 0.03% 1 0 2025-11-27T12:30:34 The Quick View for WooCommerce plugin for WordPress is vulnerable to Information
CVE-2025-30190 5.4 0.03% 1 0 2025-11-27T12:30:29 Malicious content at office documents can be used to inject script code when edi
CVE-2025-59890 7.3 0.01% 1 0 2025-11-27T11:15:48.080000 Improper input sanitization in the file archives upload functionality of Eaton G
CVE-2025-59026 5.4 0.03% 1 0 2025-11-27T10:15:52.007000 Malicious content uploaded as file can be used to execute script code when follo
CVE-2025-13381 5.3 0.04% 1 0 2025-11-27T10:15:51.220000 The AI ChatBot with ChatGPT and Content Generator by AYS plugin for WordPress is
CVE-2025-13536 8.8 0.22% 2 0 2025-11-27T09:30:26 The Blubrry PowerPress plugin for WordPress is vulnerable to arbitrary file uplo
CVE-2025-13157 5.3 0.03% 1 0 2025-11-27T09:30:26 The QODE Wishlist for WooCommerce plugin for WordPress is vulnerable to Insecure
CVE-2025-13441 5.3 0.05% 1 0 2025-11-27T09:30:25 The Hide Category by User Role for WooCommerce plugin for WordPress is vulnerabl
CVE-2025-66028 None 0.04% 1 0 2025-11-27T09:01:21 ### Summary During the login process, the server response included a parameter
CVE-2025-62703 8.8 0.33% 1 0 2025-11-27T09:00:41 ### Summary The Fugue framework implements an RPC server system for distributed
CVE-2025-13540 9.8 0.07% 2 0 2025-11-27T06:31:33 The Tiare Membership plugin for WordPress is vulnerable to Privilege Escalation
CVE-2025-13675 9.8 0.07% 2 0 2025-11-27T06:31:33 The Tiger theme for WordPress is vulnerable to Privilege Escalation in all versi
CVE-2025-12758 7.5 0.04% 1 0 2025-11-27T06:31:32 Versions of the package validator before 13.15.22 are vulnerable to Incomplete F
CVE-2025-12151 6.4 0.03% 1 0 2025-11-27T06:31:32 The Simple Folio plugin for WordPress is vulnerable to Stored Cross-Site Scripti
CVE-2025-12185 4.4 0.02% 1 0 2025-11-27T06:31:26 The StaffList plugin for WordPress is vulnerable to Stored Cross-Site Scripting
CVE-2025-12123 6.1 0.07% 1 0 2025-11-27T06:31:26 The Customer Reviews Collector for WooCommerce plugin for WordPress is vulnerabl
CVE-2025-13539 9.8 0.19% 2 0 2025-11-27T06:31:26 The FindAll Membership plugin for WordPress is vulnerable to Authentication Bypa
CVE-2025-7820 7.5 0.09% 1 0 2025-11-27T06:31:26 The SKT PayPal for WooCommerce plugin for WordPress is vulnerable to Payment Byp
CVE-2025-13525 6.1 0.09% 1 0 2025-11-27T06:15:46.830000 The WP Directory Kit plugin for WordPress is vulnerable to Reflected Cross-Site
CVE-2025-13143 4.3 0.01% 1 0 2025-11-27T06:15:46.657000 The Poll, Survey & Quiz Maker Plugin by Opinion Stage plugin for WordPress is vu
CVE-2025-3784 5.5 0.01% 1 0 2025-11-27T05:16:15.467000 Cleartext Storage of Sensitive Information Vulnerability in GX Works2 all versio
CVE-2025-13680 8.8 0.04% 2 0 2025-11-27T05:16:15.253000 The Tiger theme for WordPress is vulnerable to Privilege Escalation in all versi
CVE-2025-13538 9.8 0.07% 2 0 2025-11-27T05:16:12.453000 The FindAll Listing plugin for WordPress is vulnerable to Privilege Escalation i
CVE-2025-66314 7.5 0.03% 1 0 2025-11-27T03:30:32 Improper Privilege Management vulnerability in ZTE ElasticNet UME R32 on Linux a
CVE-2025-34351 None 0.47% 2 0 2025-11-27T03:30:32 Anyscale Ray 2.52.0 contains an insecure default configuration in which token-ba
CVE-2024-5539 None 0.04% 2 0 2025-11-27T03:30:32 The Access Control Bypass vulnerability found in ALC WebCTRL and Carrier i-Vu in
CVE-2024-5540 None 0.05% 1 0 2025-11-27T03:30:32 The reflective cross-site scripting vulnerability found in ALC WebCTRL and Carri
CVE-2025-0657 None 0.04% 2 0 2025-11-27T03:30:26 A weakness in Automated Logic and Carrier i-Vu Gen5 router on driver version
CVE-2025-0658 0 0.08% 2 0 2025-11-27T01:15:46.583000 A vulnerability in Automated Logic and Carrier's Zone Controller via BACnet prot
CVE-2020-36871 None 0.34% 2 0 2025-11-27T00:30:38 ESCAM QD-900 WIFI HD cameras contain an unauthenticated configuration disclosure
CVE-2020-36874 None 0.36% 1 0 2025-11-27T00:30:27 ACE SECURITY WIP-90113 HD cameras contain an unauthenticated configuration discl
CVE-2020-36872 None 0.16% 1 0 2025-11-27T00:30:27 BACnet Test Server versions up to and including 1.01 contains a remote denial of
CVE-2019-25226 None 0.22% 1 0 2025-11-27T00:30:27 Dongyoung Media DM-AP240T/W wireless access points contain an unauthenticated co
CVE-2025-66040 3.6 0.03% 1 0 2025-11-27T00:15:55.343000 Spotipy is a Python library for the Spotify Web API. Prior to version 2.25.2, th
CVE-2025-59390 9.8 0.09% 1 1 2025-11-26T23:19:19 Apache Druid’s Kerberos authenticator uses a weak fallback secret when the `drui
CVE-2025-66035 None 0.05% 1 0 2025-11-26T23:18:51 The vulnerability is a **Credential Leak by App Logic** that leads to the **unau
CVE-2025-66030 0 0.03% 1 0 2025-11-26T23:15:49.237000 Forge (also called `node-forge`) is a native implementation of Transport Layer S
CVE-2025-64335 7.5 0.05% 1 0 2025-11-26T23:15:48.913000 Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Inform
CVE-2025-64330 7.5 0.04% 1 0 2025-11-26T23:15:48.093000 Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Inform
CVE-2025-62593 0 0.02% 2 1 2025-11-26T23:15:47.927000 Ray is an AI compute engine. Prior to version 2.52.0, developers working with Ra
CVE-2020-36873 0 0.17% 1 0 2025-11-26T23:15:47.397000 Astak CM-818T3 2.4GHz wireless security surveillance cameras contain an unauthen
CVE-2019-25227 0 0.21% 2 0 2025-11-26T23:15:46.880000 Tellion HN-2204AP routers contain an unauthenticated configuration disclosure vu
CVE-2025-66031 None 0.09% 2 0 2025-11-26T22:08:40 ### Summary An Uncontrolled Recursion (CWE-674) vulnerability in node-forge ver
CVE-2025-6195 4.3 0.01% 1 0 2025-11-26T21:31:37 GitLab has remediated an issue in GitLab EE affecting all versions from 13.7 bef
CVE-2025-7449 6.5 0.03% 1 0 2025-11-26T21:31:37 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 8.3 b
CVE-2025-13611 2.0 0.01% 1 0 2025-11-26T21:31:37 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.2
CVE-2025-65676 None 0.02% 1 1 2025-11-26T21:31:37 Stored Cross site scripting (XSS) vulnerability in Classroomio LMS 0.1.13 allows
CVE-2025-65675 None 0.02% 1 1 2025-11-26T21:31:26 Stored Cross site scripting (XSS) vulnerability in Classroomio LMS 0.1.13 allows
CVE-2025-12653 6.5 0.03% 1 0 2025-11-26T20:15:49.023000 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.3
CVE-2025-12571 7.5 0.04% 1 0 2025-11-26T20:15:47.943000 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10
CVE-2025-66020 7.5 0.04% 1 0 2025-11-26T19:33:36 ### Summary The `EMOJI_REGEX` used in the `emoji` action is vulnerable to a Reg
CVE-2025-65966 None 0.04% 2 0 2025-11-26T19:33:10 ### Summary A low-permission user can create new accounts through a direct API r
CVE-2025-64128 10.0 3.18% 1 0 2025-11-26T18:31:15 An OS command injection vulnerability exists due to incomplete validation of us
CVE-2025-64127 10.0 3.18% 1 0 2025-11-26T18:31:15 An OS command injection vulnerability exists due to insufficient sanitization o
CVE-2025-64126 10.0 3.18% 1 0 2025-11-26T18:31:15 An OS command injection vulnerability exists due to improper input validation.
CVE-2025-65239 4.3 0.03% 1 0 2025-11-26T18:31:15 Incorrect access control in the /aux1/ocussd/trace endpoint of OpenCode Systems
CVE-2025-65238 None 0.02% 1 0 2025-11-26T18:31:15 Incorrect access control in the getSubUsersByProvider function of OpenCode Syste
CVE-2025-64130 9.8 0.11% 1 0 2025-11-26T18:15:50.243000 Zenitel TCIV-3+ is vulnerable to a reflected cross-site scripting vulnerability
CVE-2025-2486 0 0.01% 2 0 2025-11-26T18:15:48.357000 The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be
CVE-2025-63938 6.5 0.03% 1 0 2025-11-26T17:15:46.440000 Tinyproxy through 1.11.2 contains an integer overflow vulnerability in the strip
CVE-2025-66257 0 0.07% 2 0 2025-11-26T16:15:51.030000 Unauthenticated Arbitrary File Deletion (patch_contents.php) in DB Electronica T
CVE-2025-66026 6.1 0.04% 1 0 2025-11-26T16:15:50.917000 REDAXO is a PHP-based CMS. Prior to version 5.20.1, a reflected Cross-Site Scrip
CVE-2025-66021 0 0.05% 2 0 2025-11-26T16:15:50.413000 OWASP Java HTML Sanitizer is a configureable HTML Sanitizer written in Java, all
CVE-2025-9163 6.1 0.07% 1 0 2025-11-26T15:34:20 The Houzez theme for WordPress is vulnerable to Stored Cross-Site Scripting via
CVE-2025-13601 7.7 0.01% 1 0 2025-11-26T15:34:20 A heap-based buffer overflow problem was found in glib through an incorrect calc
CVE-2025-12061 8.6 0.03% 1 0 2025-11-26T15:15:51.087000 The TAX SERVICE Electronic HDM WordPress plugin before 1.2.1 does not authorizat
CVE-2025-9191 6.3 0.05% 1 0 2025-11-26T13:16:00.923000 The Houzez theme for WordPress is vulnerable to PHP Object Injection in all vers
CVE-2025-13674 5.5 0.01% 1 0 2025-11-26T12:30:16 BPv7 dissector crash in Wireshark 4.6.0 allows denial of service
CVE-2025-62728 None 0.02% 1 0 2025-11-26T09:31:30 SQL injection vulnerability in Hive Metastore Server (HMS) when processing delet
CVE-2025-13735 7.4 0.04% 1 0 2025-11-26T07:16:00.173000 Out-of-bounds Read vulnerability in ASR1903、ASR3901 in ASR Lapwing_Linux on Linu
CVE-2025-64983 8.0 0.03% 2 0 2025-11-26T06:31:34 Smart Video Doorbell firmware versions prior to 2.01.078 contain an active debug
CVE-2025-66233 None 0.00% 1 0 2025-11-26T06:31:34 Rejected reason: Not used
CVE-2025-66231 None 0.00% 1 0 2025-11-26T06:31:34 Rejected reason: Not used
CVE-2025-66229 None 0.00% 1 0 2025-11-26T06:31:34 Rejected reason: Not used
CVE-2025-55174 3.2 0.01% 1 0 2025-11-26T06:31:28 In KDE Skanpage before 25.08.0, an attempt at file overwrite can result in the c
CVE-2025-59820 6.7 0.02% 1 0 2025-11-26T06:31:28 In KDE Krita before 5.2.13, loading a manipulated TGA file could result in a hea
CVE-2025-66235 None 0.00% 1 0 2025-11-26T06:31:28 Rejected reason: Not used
CVE-2025-66232 None 0.00% 1 0 2025-11-26T06:31:28 Rejected reason: Not used
CVE-2025-9557 7.6 0.01% 1 0 2025-11-26T06:15:46.007000 ‭An out-of-bound write can lead to an arbitrary code execution. Even on devices
CVE-2025-66234 0 0.00% 1 0 2025-11-26T04:15:57.677000 Rejected reason: Not used
CVE-2025-66230 0 0.00% 1 0 2025-11-26T04:15:57.393000 Rejected reason: Not used
CVE-2025-66250 None 0.04% 1 0 2025-11-26T03:30:28 Unauthenticated Arbitrary File Upload (status_contents.php) in DB Electronica Te
CVE-2025-66253 None 0.93% 1 0 2025-11-26T03:30:28 Unauthenticated OS Command Injection (start_upgrade.php) in DB Electronica Telec
CVE-2025-66258 None 0.05% 1 0 2025-11-26T03:30:28 Stored Cross-Site Scripting via XML Injection in DB Electronica Telecomunicazion
CVE-2025-66261 None 0.93% 2 0 2025-11-26T03:30:28 Unauthenticated OS Command Injection (restore_settings.php) in DB Electronica Te
CVE-2025-66259 None 0.36% 2 0 2025-11-26T03:30:28 Authenticated Root Remote Code Execution via improrer user input filtering in DB
CVE-2025-66266 None 0.02% 2 0 2025-11-26T03:30:28 The RupsMon.exe service executable in UPSilon 2000 has insecure permissions, all
CVE-2025-66269 None 0.01% 1 0 2025-11-26T03:30:28 The RupsMon and USBMate services in UPSilon 2000 run with SYSTEM privileges and
CVE-2025-12848 None 0.07% 1 0 2025-11-26T03:30:28 Webform Multiple File Upload module for Drupal 7.x contains a cross-site scripti
CVE-2025-66265 None 0.01% 1 0 2025-11-26T03:30:28 CMService.exe creates the C:\\usr directory and subdirectories with insecure per
CVE-2025-66251 None 0.17% 1 0 2025-11-26T03:30:27 Unauthenticated Path Traversal with Arbitrary File Deletion in DB Electronica Te
CVE-2025-66252 None 0.04% 1 0 2025-11-26T03:30:27 Infinite Loop Denial of Service via Failed File Deletion in DB Electronica Telec
CVE-2025-64657 9.8 0.09% 1 0 2025-11-26T03:30:27 Stack-based buffer overflow in Azure Application Gateway allows an unauthorized
CVE-2025-66263 None 0.04% 2 0 2025-11-26T03:30:22 Unauthenticated Arbitrary File Read via Null Byte Injection in DB Electronica Te
CVE-2025-66262 None 0.07% 2 0 2025-11-26T03:30:22 Arbitrary File Overwrite via Tar Extraction Path Traversal in DB Electronica Tel
CVE-2025-66260 None 0.03% 1 0 2025-11-26T03:30:22 PostgreSQL SQL Injection (status_sql.php) in DB Electronica Telecomunicazioni S.
CVE-2025-66256 None 0.04% 1 0 2025-11-26T03:30:22 Unauthenticated Arbitrary File Upload (patch_contents.php) in DB Electronica Tel
CVE-2025-64656 9.4 0.09% 1 0 2025-11-26T03:30:21 Out-of-bounds read in Application Gateway allows an unauthorized attacker to ele
CVE-2025-66264 0 0.01% 1 0 2025-11-26T01:16:10.023000 The CMService.exe service runs with SYSTEM privileges and contains an unquoted s
CVE-2025-66255 0 0.10% 1 0 2025-11-26T01:16:08.710000 Unauthenticated Arbitrary File Upload (upgrade_contents.php) in DB Electronica T
CVE-2025-66254 0 0.07% 1 0 2025-11-26T01:16:08.570000 Unauthenticated Arbitrary File Deletion (upgrade_contents.php) in DB Electronica
CVE-2025-13597 9.8 0.19% 1 1 2025-11-26T00:30:31 The AI Feeds plugin for WordPress is vulnerable to arbitrary file uploads due to
CVE-2025-13595 9.8 0.19% 1 1 2025-11-26T00:30:31 The CIBELES AI plugin for WordPress is vulnerable to arbitrary file uploads due
CVE-2025-65952 0 0.04% 1 0 2025-11-25T23:15:48.097000 Console is a network used to control Gorilla Tag mods' users and other users on
CVE-2025-41115 10.0 0.02% 1 1 2025-11-25T22:16:42.557000 SCIM provisioning was introduced in Grafana Enterprise and Grafana Cloud in Apri
CVE-2025-59372 0 0.15% 2 0 2025-11-25T22:16:16.690000 A path traversal vulnerability has been identified in certain router models. A r
CVE-2025-59369 0 0.10% 2 0 2025-11-25T22:16:16.690000 A SQL injection vulnerability has been identified in bwdpi. A remote, authentica
CVE-2025-59371 0 0.15% 2 0 2025-11-25T22:16:16.690000 An authentication bypass vulnerability has been identified in the IFTTT integrat
CVE-2025-59365 0 0.04% 2 0 2025-11-25T22:16:16.690000 A stack buffer overflow vulnerability has been identified in certain router mode
CVE-2025-59368 0 0.04% 2 0 2025-11-25T22:16:16.690000 An integer underflow vulnerability has been identified in Aicloud. An authentica
CVE-2025-59366 0 0.10% 4 0 2025-11-25T22:16:16.690000 An authentication-bypass vulnerability exists in AiCloud. This vulnerability can
CVE-2025-59370 0 0.52% 2 0 2025-11-25T22:16:16.690000 A command injection vulnerability has been identified in bwdpi. A remote, authen
CVE-2025-12003 0 0.20% 2 0 2025-11-25T22:16:16.690000 A path traversal vulnerability has been identified in WebDAV, which may allow un
CVE-2025-58360 8.2 7.96% 3 2 template 2025-11-25T22:16:16.690000 GeoServer is an open source server that allows users to share and edit geospatia
CVE-2025-33203 7.6 0.03% 1 0 2025-11-25T22:16:16.690000 NVIDIA NeMo Agent Toolkit UI for Web contains a vulnerability in the chat API en
CVE-2025-12816 8.6 0.06% 1 0 2025-11-25T22:16:16.690000 An interpretation-conflict (CWE-436) vulnerability in node-forge versions 1.3.1
CVE-2025-64064 8.8 0.03% 1 0 2025-11-25T21:32:13 Primakon Pi Portal 1.0.18 /api/v2/pp_users endpoint fails to adequately check us
CVE-2025-33187 9.4 0.01% 3 0 2025-11-25T18:32:29 NVIDIA DGX Spark GB10 contains a vulnerability in SROOT, where an attacker could
CVE-2025-33205 7.3 0.01% 1 0 2025-11-25T18:32:29 NVIDIA NeMo framework contains a vulnerability in a predefined variable, where a
CVE-2025-33204 7.8 0.02% 1 0 2025-11-25T18:32:29 NVIDIA NeMo Framework for all platforms contains a vulnerability in the NLP and
CVE-2025-59373 None 0.01% 2 0 2025-11-25T03:30:20 A local privilege escalation vulnerability exists in the restore mechanism of
CVE-2025-9900 8.8 0.03% 1 0 2025-11-24T21:30:58 A flaw was found in Libtiff. This vulnerability is a "write-what-where" conditio
CVE-2025-7425 7.8 0.04% 1 0 2025-11-22T03:31:17 A flaw was found in libxslt where the attribute type, atype, flags are modified
CVE-2025-61757 9.8 60.96% 1 2 template 2025-11-21T21:30:16 Vulnerability in the Identity Manager product of Oracle Fusion Middleware (compo
CVE-2025-11001 7.0 0.38% 3 6 2025-11-20T00:31:21 7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability.
CVE-2025-37899 7.8 0.01% 1 2 2025-11-19T15:32:29 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix
CVE-2025-48593 8.0 0.03% 1 6 2025-11-18T12:31:19 In bta_hf_client_cb_init of bta_hf_client_main.cc, there is a possible remote co
CVE-2025-46817 7.0 26.29% 1 2 template 2025-11-12T11:34:13.390000 Redis is an open source, in-memory database that persists on disk. Versions 8.2.
CVE-2025-59287 9.8 64.04% 1 22 template 2025-11-11T15:32:22 Deserialization of untrusted data in Windows Server Update Service allows an una
CVE-2024-9680 9.8 24.62% 1 2 2025-11-04T00:31:33 An attacker was able to achieve code execution in the content process by exploit
CVE-2023-44487 5.3 94.50% 1 19 2025-10-22T19:24:09 ## HTTP/2 Rapid reset attack The HTTP/2 protocol allows clients to indicate to t
CVE-2023-29357 9.8 94.36% 1 7 template 2025-10-22T00:33:51 Microsoft SharePoint Server Elevation of Privilege Vulnerability
CVE-2025-59821 6.5 0.04% 1 0 2025-09-23T19:13:36 # Summary A reflected cross-site scripting (XSS) vulnerability exists under cert
CVE-2023-48733 6.7 0.01% 1 0 2025-05-08T18:31:34 An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK
CVE-2021-32682 9.8 93.47% 1 0 template 2023-01-29T05:02:39 ### Impact We recently fixed several vulnerabilities affect elFinder 2.1.58. Th
CVE-2022-31806 9.8 0.30% 1 0 2023-01-27T05:04:35 In CODESYS V2 PLCWinNT and Runtime Toolkit 32 in versions prior to V2.4.7.57 pas
CVE-2022-22515 8.1 0.08% 1 0 2023-01-27T05:01:23 A remote, unauthenticated attacker could utilize the control programmer of the C
CVE-2025-13086 0 0.00% 1 0 N/A
CVE-2025-64344 0 0.04% 1 0 N/A
CVE-2025-64332 0 0.04% 1 0 N/A
CVE-2025-64331 0 0.04% 1 0 N/A
CVE-2025-66270 0 0.00% 1 0 N/A
CVE-2025-64334 0 0.04% 1 0 N/A
CVE-2025-64333 0 0.04% 1 0 N/A
CVE-2025-13084 0 0.04% 1 0 N/A
CVE-2025-66022 0 0.18% 2 1 N/A
CVE-2025-9558 0 0.01% 1 0 N/A
CVE-2025-66025 0 0.03% 1 0 N/A
CVE-2025-65957 0 0.04% 1 0 N/A

CVE-2025-13683
(6.5 MEDIUM)

EPSS: 0.00%

updated 2025-11-28T21:32:24

1 posts

Exposure of credentials in unintended requests in Devolutions Server, Remote Desktop Manager on Windows.This issue affects Devolutions Server: through 2025.3.8.0; Remote Desktop Manager: through 2025.3.23.0.

jos1264@social.skynetcloud.site at 2025-11-28T21:15:01.000Z ##

CVE-2025-13683 - Devolutions Server and Remote Desktop Manager Credential Exposure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-40934
(9.3 CRITICAL)

EPSS: 0.01%

updated 2025-11-28T21:32:24

1 posts

XML-Sig versions 0.27 through 0.67 for Perl incorrectly validates XML files if signatures are omitted. An attacker can remove the signature from the XML document to make it pass the verification check. XML-Sig is a Perl module to validate signatures on XML files.  An unsigned XML file should return an error message.  The affected versions return true when attempting to validate an XML file that

jos1264@social.skynetcloud.site at 2025-11-27T00:20:03.000Z ##

CVE-2025-40934 - XML-Sig prior to 0.68 for Perl improperly validates XML without signatures cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-45311
(8.8 HIGH)

EPSS: 0.01%

updated 2025-11-28T21:31:18

1 posts

Insecure permissions in fail2ban-client v0.11.2 allows attackers with limited sudo privileges to perform arbitrary operations as root.

CVE-2025-65681
(3.3 LOW)

EPSS: 0.02%

updated 2025-11-28T21:15:48.280000

1 posts

An issue was discovered in Overhang.IO (tutor-open-edx) (overhangio/tutor) 20.0.2 allowing local unauthorized attackers to gain access to sensitive information due to the absence of proper cache-control HTTP headers and client-side session checks.

1 repos

https://github.com/Rivek619/CVE-2025-65681

jos1264@social.skynetcloud.site at 2025-11-26T22:10:02.000Z ##

CVE-2025-65681 - Overhang.IO (tutor-open-edx) Information Disclosure cvefeed.io/vuln/detail/CVE-202

##

CVE-2021-26829
(5.4 MEDIUM)

EPSS: 0.25%

updated 2025-11-28T19:15:44.900000

5 posts

OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows stored XSS via system_settings.shtm.

DarkWebInformer at 2025-11-28T20:34:11.741Z ##

🚨CVE-2021-26829: OpenPLC ScadaBR Cross-site Scripting Vulnerability

Vendor: OpenPLC
Product: ScadaBR
CWE: CWE-79
CVSS: 5.4

This vulnerability has been added to the CISA KEV Catalog.

darkwebinformer.com/cisa-kev-c

##

secdb at 2025-11-28T20:00:10.813Z ##

🚨 [CISA-2025:1128] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2021-26829 (secdb.nttzen.cloud/cve/detail/)
- Name: OpenPLC ScadaBR Cross-site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: OpenPLC
- Product: ScadaBR
- Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: github.com/SCADA-LTS/Scada-LTS ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2025-11-28T19:00:49.000Z ##

CVE ID: CVE-2021-26829
Vendor: OpenPLC
Product: ScadaBR
Date Added: 2025-11-28
Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: github.com/SCADA-LTS/Scada-LTS ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

DarkWebInformer@infosec.exchange at 2025-11-28T20:34:11.000Z ##

🚨CVE-2021-26829: OpenPLC ScadaBR Cross-site Scripting Vulnerability

Vendor: OpenPLC
Product: ScadaBR
CWE: CWE-79
CVSS: 5.4

This vulnerability has been added to the CISA KEV Catalog.

darkwebinformer.com/cisa-kev-c

##

cisakevtracker@mastodon.social at 2025-11-28T19:00:49.000Z ##

CVE ID: CVE-2021-26829
Vendor: OpenPLC
Product: ScadaBR
Date Added: 2025-11-28
Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: github.com/SCADA-LTS/Scada-LTS ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-51736
(6.3 MEDIUM)

EPSS: 0.00%

updated 2025-11-28T18:31:28

1 posts

File upload vulnerability in HCL Technologies Ltd. Unica 12.0.0.

jos1264@social.skynetcloud.site at 2025-11-28T18:00:03.000Z ##

CVE-2025-51736 - HCL Unica File Upload Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-51735
(7.5 HIGH)

EPSS: 0.00%

updated 2025-11-28T18:31:27

1 posts

CSV formula injection vulnerability in HCL Technologies Ltd. Unica 12.0.0.

jos1264@social.skynetcloud.site at 2025-11-28T18:00:03.000Z ##

CVE-2025-51735 - HCL Technologies Ltd. Unica CSV Formula Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-51734
(5.4 MEDIUM)

EPSS: 0.00%

updated 2025-11-28T18:31:27

1 posts

Cross-site scripting (XSS) vulnerability in HCL Technologies Ltd. Unica 12.0.0.

jos1264@social.skynetcloud.site at 2025-11-28T18:00:03.000Z ##

CVE-2025-51734 - HCL Unica Unauthenticated Cross-Site Scripting Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-51733
(5.5 MEDIUM)

EPSS: 0.00%

updated 2025-11-28T18:31:27

1 posts

Cross-Site Request Forgery (CSRF) vulnerability in HCL Technologies Ltd. Unica 12.0.0.

CVE-2025-13742(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-11-28T18:31:27

1 posts

Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name} is used in an email template, it will be replaced with the buyer's name for the final email. If the name of the attendee contained HTML or Markdown formatting, this was rendered as HTML in the resulting email. This way, a user could inject links or other formatted text through a maliciou

CVE-2025-12183(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-11-28T18:30:32

2 posts

Out-of-bounds memory operations in org.lz4:lz4-java 1.8.0 and earlier allow remote attackers to cause denial of service and read adjacent memory via untrusted compressed input.

jos1264@social.skynetcloud.site at 2025-11-28T18:00:04.000Z ##

CVE-2025-12183 - org.lz4:lz4-java - Out-of-Bounds Memory Access cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-28T17:40:02.000Z ##

CVE-2025-12183 - org.lz4:lz4-java - Out-of-Bounds Memory Access cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59790
(5.4 MEDIUM)

EPSS: 0.00%

updated 2025-11-28T18:30:24

1 posts

Improper Privilege Management vulnerability in Apache Kvrocks. This issue affects Apache Kvrocks: from v2.9.0 through v2.13.0. Users are recommended to upgrade to version 2.14.0, which fixes the issue.

jos1264@social.skynetcloud.site at 2025-11-28T18:00:03.000Z ##

CVE-2025-59790 - Apache Kvrocks: RESET command grants admin privileges cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59792
(5.3 MEDIUM)

EPSS: 0.00%

updated 2025-11-28T18:30:24

1 posts

Reveals plaintext credentials in the MONITOR command vulnerability in Apache Kvrocks. This issue affects Apache Kvrocks: from 1.0.0 through 2.13.0. Users are recommended to upgrade to version 2.14.0, which fixes the issue.

jos1264@social.skynetcloud.site at 2025-11-28T18:00:03.000Z ##

CVE-2025-59792 - Apache Kvrocks: MONITOR command reveals plaintext credentials to non-admins cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59454
(4.3 MEDIUM)

EPSS: 0.02%

updated 2025-11-28T18:30:23

1 posts

In Apache CloudStack, a gap in access control checks affected the APIs - createNetworkACL - listNetworkACLs - listResourceDetails - listVirtualMachinesUsageHistory - listVolumesUsageHistory While these APIs were accessible only to authorized users, insufficient permission validation meant that users could occasionally access information beyond their intended scope. Users are recommended to up

jos1264@social.skynetcloud.site at 2025-11-27T14:45:02.000Z ##

CVE-2025-59454 - Apache CloudStack: Lack of user permission validation leading to data leak for few APIs cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59302
(4.7 MEDIUM)

EPSS: 0.03%

updated 2025-11-28T15:31:38

1 posts

In Apache CloudStack improper control of generation of code ('Code Injection') vulnerability is found in the following APIs which are accessible only to admins. * quotaTariffCreate * quotaTariffUpdate * createSecondaryStorageSelector * updateSecondaryStorageSelector * updateHost * updateStorage This issue affects Apache CloudStack: from 4.18.0 before 4.20.2, from 4.21.0 befor

jos1264@social.skynetcloud.site at 2025-11-27T14:45:02.000Z ##

CVE-2025-59302 - Apache CloudStack: Potential remote code execution on Javascript engine defined rules cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12638
(8.0 HIGH)

EPSS: 0.00%

updated 2025-11-28T15:30:36

2 posts

Keras version 3.11.3 is affected by a path traversal vulnerability in the keras.utils.get_file() function when extracting tar archives. The vulnerability arises because the function uses Python's tarfile.extractall() method without the security-critical filter='data' parameter. Although Keras attempts to filter unsafe paths using filter_safe_paths(), this filtering occurs before extraction, and a

jos1264@social.skynetcloud.site at 2025-11-28T18:00:03.000Z ##

CVE-2025-12638 - Path Traversal Vulnerability in keras-team/keras via Tar Archive Extraction in keras.utils.get_file() cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-28T17:40:02.000Z ##

CVE-2025-12638 - Path Traversal Vulnerability in keras-team/keras via Tar Archive Extraction in keras.utils.get_file() cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11156(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-11-28T15:30:36

1 posts

Netskope was notified about a potential gap in its agent (NS Client) on Windows systems. If this gap is successfully exploited, a local, authenticated user with Administrator privileges can improperly load the driver as a generic kernel service. This triggers the flaw, causing a system crash (Blue-Screen-of-Death) and resulting in a Denial of Service (DoS) for the affected machine.

jos1264@social.skynetcloud.site at 2025-11-28T18:00:02.000Z ##

CVE-2025-11156 - Improper Service Loading Vulnerability in Netskope Endpoint DLP Driver cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65202
(8.0 HIGH)

EPSS: 0.16%

updated 2025-11-28T15:16:03.483000

1 posts

TRENDnet TEW-657BRM 1.00.1 has an authenticated remote OS command injection vulnerability in the setup.cgi binary, exploitable via the HTTP parameters "command", "todo", and "next_file," which allows an attacker to execute arbitrary commands with root privileges.

CVE-2025-12143
(6.1 MEDIUM)

EPSS: 0.00%

updated 2025-11-28T12:30:28

1 posts

Stack-based Buffer Overflow vulnerability in ABB Terra AC wallbox.This issue affects Terra AC wallbox: through 1.8.33.

CVE-2025-66385(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-11-28T09:30:22

3 posts

UsersController::edit in Cerebrate before 1.30 allows an authenticated non-privileged user to escalate their privileges (e.g., obtain a higher role such as admin) via the user-edit endpoint by supplying or modifying role_id or organisation_id fields in the edit request.

offseq at 2025-11-28T08:33:39.335Z ##

🚨 CRITICAL: CVE-2025-66385 in Cerebrate <1.30 lets auth'd users escalate privileges via user-edit endpoint (role_id/org_id). Upgrade ASAP, monitor logs, and apply stricter validation. radar.offseq.com/threat/cve-20

##

jos1264@social.skynetcloud.site at 2025-11-28T10:40:01.000Z ##

CVE-2025-66385 - Cerebrate Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-28T09:40:02.000Z ##

CVE-2025-66385 - Cerebrate Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13769
(6.5 MEDIUM)

EPSS: 0.03%

updated 2025-11-28T09:30:22

1 posts

WebITR developed by Uniong has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read database contents.

CVE-2025-13770
(6.5 MEDIUM)

EPSS: 0.03%

updated 2025-11-28T09:30:18

1 posts

WebITR developed by Uniong has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read database contents.

CVE-2025-13768
(7.5 HIGH)

EPSS: 0.15%

updated 2025-11-28T09:30:18

1 posts

WebITR developed by Uniong has an Authentication Bypass vulnerability, allowing authenticated remote attackers to log into the system as any user by modifying a specific parameter. Attackers must first obtain a user ID to exploit this vulnerability.

CVE-2025-13771
(6.5 MEDIUM)

EPSS: 0.04%

updated 2025-11-28T09:30:17

2 posts

WebITR developed by Uniong has an Arbitrary File Read vulnerability, allowing authenticated remote attackers to exploit Relative Path Traversal to download arbitrary system files.

offseq at 2025-11-28T10:02:59.227Z ##

CVE-2025-13771: HIGH severity path traversal in Uniong WebITR lets authenticated users read any file on the server. Review input validation, tighten access, and monitor logins. No patch yet—mitigate now! radar.offseq.com/threat/cve-20

##

jos1264@social.skynetcloud.site at 2025-11-28T09:40:03.000Z ##

CVE-2025-13771 - Uniong|WebITR - Arbitrary File Read cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66384
(8.2 HIGH)

EPSS: 0.03%

updated 2025-11-28T09:30:17

2 posts

app/Controller/EventsController.php in MISP before 2.5.24 has invalid logic in checking for uploaded file validity, related to tmp_name.

CVE-2025-66382
(2.9 LOW)

EPSS: 0.01%

updated 2025-11-28T09:30:17

1 posts

In libexpat through 2.7.3, a crafted file with an approximate size of 2 MiB can lead to dozens of seconds of processing time.

jos1264@social.skynetcloud.site at 2025-11-28T09:40:02.000Z ##

CVE-2025-66382 - Apache libexpat XML Entity Expansion Denial of Service cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66386
(4.1 MEDIUM)

EPSS: 0.03%

updated 2025-11-28T07:15:59.900000

1 posts

app/Model/EventReport.php in MISP before 2.5.27 allows path traversal in view picture for a site-admin.

CVE-2025-58308
(7.3 HIGH)

EPSS: 0.01%

updated 2025-11-28T06:32:10

1 posts

Vulnerability of improper criterion security check in the call module. Impact: Successful exploitation of this vulnerability may cause features to perform abnormally.

jos1264@social.skynetcloud.site at 2025-11-28T05:45:02.000Z ##

CVE-2025-58308 - Apache Call Module Authentication Bypass Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-58305
(6.2 MEDIUM)

EPSS: 0.01%

updated 2025-11-28T06:32:10

1 posts

Identity authentication bypass vulnerability in the Gallery app. Impact: Successful exploitation of this vulnerability may affect service confidentiality.

CVE-2025-58302
(8.4 HIGH)

EPSS: 0.01%

updated 2025-11-28T06:32:09

3 posts

Permission control vulnerability in the Settings module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.

offseq at 2025-11-28T07:02:46.790Z ##

🔒 CVE-2025-58302 (HIGH, CVSS 8.4) in Huawei HarmonyOS (2.0.0–4.3.1): Local attackers can bypass Settings module permission checks, risking data exposure. Restrict device access & monitor for unusual activity. radar.offseq.com/threat/cve-20

##

jos1264@social.skynetcloud.site at 2025-11-28T06:35:02.000Z ##

CVE-2025-58302 - "Acme Settings Module Unsecured Configuration" cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-28T05:45:02.000Z ##

CVE-2025-58302 - "Acme Settings Module Unsecured Configuration" cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64312
(4.9 MEDIUM)

EPSS: 0.01%

updated 2025-11-28T06:32:09

1 posts

Permission control vulnerability in the file management module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.

jos1264@social.skynetcloud.site at 2025-11-28T05:45:03.000Z ##

CVE-2025-64312 - Apache File Manager Unauthenticated File Access Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13737
(4.3 MEDIUM)

EPSS: 0.01%

updated 2025-11-28T06:32:09

1 posts

The Nextend Social Login and Register plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.21. This is due to missing or incorrect nonce validation on the 'unlinkUser' function. This makes it possible for unauthenticated attackers to unlink the user's social login via a forged request granted they can trick a site administrator into performing

jos1264@social.skynetcloud.site at 2025-11-28T05:45:01.000Z ##

CVE-2025-13737 - Nextend Social Login and Register <= 3.1.21 - Cross-Site Request Forgery to Unlink User Social Login cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66372
(2.8 LOW)

EPSS: 0.01%

updated 2025-11-28T06:32:07

1 posts

Mustang before 2.16.3 allows exfiltrating files via XXE attacks.

jos1264@social.skynetcloud.site at 2025-11-28T05:45:03.000Z ##

CVE-2025-66372 - Mustang XML External Entity (XXE) Exfiltration Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66370
(5.0 MEDIUM)

EPSS: 0.03%

updated 2025-11-28T06:32:07

1 posts

Kivitendo before 3.9.2 allows XXE injection. By uploading an electronic invoice in the ZUGFeRD format, it is possible to read and exfiltrate files from the server's filesystem.

CVE-2025-66371
(5.0 MEDIUM)

EPSS: 0.03%

updated 2025-11-28T04:16:01.293000

1 posts

Peppol-py before 1.1.1 allows XXE attacks because of the Saxon configuration. When validating XML-based invoices, the XML parser could read files from the filesystem and expose their content to a remote host.

jos1264@social.skynetcloud.site at 2025-11-28T05:45:03.000Z ##

CVE-2025-66371 - Peppol-py XXE File Disclosure Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-58311
(5.8 MEDIUM)

EPSS: 0.01%

updated 2025-11-28T04:16:00.807000

1 posts

UAF vulnerability in the USB driver module. Impact: Successful exploitation of this vulnerability will affect availability and confidentiality.

jos1264@social.skynetcloud.site at 2025-11-28T05:45:02.000Z ##

CVE-2025-58311 - "USB Driver Uninitialized Free Memory UAF Vulnerability" cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-58304
(4.9 MEDIUM)

EPSS: 0.01%

updated 2025-11-28T04:16:00.347000

1 posts

Permission control vulnerability in the file management module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.

jos1264@social.skynetcloud.site at 2025-11-28T05:45:02.000Z ##

CVE-2025-58304 - Apache File Manager Unauthorized Access Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-58303
(8.4 HIGH)

EPSS: 0.01%

updated 2025-11-28T03:30:34

1 posts

UAF vulnerability in the screen recording framework module. Impact: Successful exploitation of this vulnerability may affect availability.

jos1264@social.skynetcloud.site at 2025-11-28T06:35:02.000Z ##

CVE-2025-58303 - Adobe Screen Recorder Use-After-Free Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-58310
(8.0 HIGH)

EPSS: 0.01%

updated 2025-11-28T03:30:33

1 posts

Permission control vulnerability in the distributed component. Impact: Successful exploitation of this vulnerability may affect service confidentiality.

jos1264@social.skynetcloud.site at 2025-11-28T06:35:02.000Z ##

CVE-2025-58310 - Apache Distributed Component Permission Control Bypass cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64314
(9.3 CRITICAL)

EPSS: 0.01%

updated 2025-11-28T03:16:00.867000

2 posts

Permission control vulnerability in the memory management module. Impact: Successful exploitation of this vulnerability may affect confidentiality.

jos1264@social.skynetcloud.site at 2025-11-28T06:35:02.000Z ##

CVE-2025-64314 - Cisco Memory Management Permission Control Vulnerability cvefeed.io/vuln/detail/CVE-202

##

offseq@infosec.exchange at 2025-11-28T04:03:44.000Z ##

⚠️ CRITICAL: CVE-2025-64314 in Huawei HarmonyOS 5.1.0 enables type confusion attacks via faulty permission controls. Potential for sensitive data exposure—no patch yet. Restrict device access & monitor for updates. radar.offseq.com/threat/cve-20 #OffSeq #Huawei #CVE #Infosec #Vulnerability

##

CVE-2025-66360(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-11-28T00:30:28

1 posts

An issue was discovered in Logpoint before 7.7.0. An improperly configured access control policy exposes sensitive Logpoint internal service (Redis) information to li-admin users. This can lead to privilege escalation.

jos1264@social.skynetcloud.site at 2025-11-28T03:15:02.000Z ##

CVE-2025-66360 - Logpoint Access Control Policy Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66361(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-11-28T00:30:27

1 posts

An issue was discovered in Logpoint before 7.7.0. Sensitive information is exposed in System Processes for an extended period during high CPU load.

CVE-2025-66359
(8.5 HIGH)

EPSS: 0.05%

updated 2025-11-28T00:15:46.003000

2 posts

An issue was discovered in Logpoint before 7.7.0. Insufficient input validation and a lack of output escaping in multiple components leads to a cross-site scripting (XSS) vulnerability.

jos1264@social.skynetcloud.site at 2025-11-28T03:15:02.000Z ##

CVE-2025-66359 - Logpoint Cross-Site Scripting Vulnerability cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-28T02:30:01.000Z ##

CVE-2025-66359 - Logpoint Cross-Site Scripting Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13338
(0 None)

EPSS: 0.00%

updated 2025-11-27T23:15:50.550000

1 posts

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

CVE-2025-3261(CVSS UNKNOWN)

EPSS: 0.07%

updated 2025-11-27T18:30:34

1 posts

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any pa

jos1264@social.skynetcloud.site at 2025-11-27T20:20:02.000Z ##

CVE-2025-3261 - Stored Cross-Site Scripting (XSS) in ThingsBoard cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12559
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-27T18:30:26

1 posts

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

jos1264@social.skynetcloud.site at 2025-11-27T20:20:01.000Z ##

CVE-2025-12559 - Information Disclosure in Common Teams API cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12419
(10.0 CRITICAL)

EPSS: 0.07%

updated 2025-11-27T18:30:26

2 posts

Mattermost versions 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12, 11.0.x <= 11.0.3 fail to properly validate OAuth state tokens during OpenID Connect authentication which allows an authenticated attacker with team creation privileges to take over a user account via manipulation of authentication data during the OAuth completion flow. This requires email verification to be disabled (de

jos1264@social.skynetcloud.site at 2025-11-27T18:10:02.000Z ##

CVE-2025-12419 - Account takeover on OAuth/OpenID-enabled servers cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-27T17:00:02.000Z ##

CVE-2025-12419 - Account takeover on OAuth/OpenID-enabled servers cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13757(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-27T18:30:26

1 posts

SQL Injection vulnerability in last usage logs in Devolutions Server.This issue affects Devolutions Server: through 2025.2.20, through 2025.3.8.

CVE-2025-13765(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-27T18:30:26

1 posts

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

jos1264@social.skynetcloud.site at 2025-11-27T18:10:02.000Z ##

CVE-2025-13765 - Devolutions Server Unsecured Email Credentials Exposure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12421
(9.9 CRITICAL)

EPSS: 0.07%

updated 2025-11-27T18:15:46.223000

2 posts

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-

jos1264@social.skynetcloud.site at 2025-11-27T20:20:02.000Z ##

CVE-2025-12421 - Account Takeover via Code Exchange Endpoint cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-27T20:20:01.000Z ##

CVE-2025-12421 - Account Takeover via Code Exchange Endpoint cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13758
(0 None)

EPSS: 0.02%

updated 2025-11-27T16:15:47.257000

1 posts

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

jos1264@social.skynetcloud.site at 2025-11-27T18:10:02.000Z ##

CVE-2025-13758 - Devolutions Server Exposed Credentials Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-54057(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-11-27T15:32:27

1 posts

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Apache SkyWalking. This issue affects Apache SkyWalking: <= 10.2.0. Users are recommended to upgrade to version 10.3.0, which fixes the issue.

jos1264@social.skynetcloud.site at 2025-11-27T14:45:02.000Z ##

CVE-2025-54057 - Apache SkyWalking: Stored XSS vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12140(CVSS UNKNOWN)

EPSS: 0.08%

updated 2025-11-27T15:31:32

2 posts

The application contains an insecure 'redirectToUrl' mechanism that incorrectly processes the value of the 'redirectUrlParameter' parameter. The application interprets the entered string of characters as a Java expression, allowing an unauthenticated attacer to perform arbitrary code execution. This issue was fixed in version wu#2016.1.5513#0#20251014_113353

CVE-2025-13692
(7.2 HIGH)

EPSS: 0.10%

updated 2025-11-27T15:31:32

1 posts

The Unlimited Elements For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. A form with a file uplo

jos1264@social.skynetcloud.site at 2025-11-27T14:45:03.000Z ##

CVE-2025-13692 - Unlimited Elements For Elementor and Unlimited Elements For Elementor (Premium) <= 2.0 - Unauthenticated Stored Cross-Site Scripting via SVG File Upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-8890
(0 None)

EPSS: 0.29%

updated 2025-11-27T14:15:52.183000

2 posts

Firmware in SDMC NE6037 routers prior to version 7.1.12.2.44 has a network diagnostics tool vulnerable to a shell command injection attacks. In order to exploit this vulnerability, an attacker has to log in to the router's administrative portal, which by default is reachable only via LAN ports.

CVE-2025-12971
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-27T13:15:58.547000

1 posts

The Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a misconfigured capability check on the 'wcp_change_post_folder' function in all versions up to, and including, 3.1.5. This makes it possible for authenticated attackers, with Contributor-level access and above, to move arbitrar

jos1264@social.skynetcloud.site at 2025-11-27T14:45:02.000Z ##

CVE-2025-12971 - Folders <= 3.1.5 - Incorrect Authorization to Authenticated (Contributor+) Folder Content Manipulation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-10476
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-27T12:30:34

1 posts

The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpfc_db_fix_callback() function in all versions up to, and including, 1.4.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to initiate several database fix actions. This only affects sites with premium activated.

jos1264@social.skynetcloud.site at 2025-11-27T14:45:01.000Z ##

CVE-2025-10476 - WP Fastest Cache <= 1.4.0 - Missing Authorization to Authenticated (Subscriber+) DB Cleanup Actions cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59025
(6.1 MEDIUM)

EPSS: 0.03%

updated 2025-11-27T12:30:34

1 posts

Malicious e-mail content can be used to execute script code. Unintended actions can be executed in the context of the users account, including exfiltration of sensitive information. Sanitization has been updated to avoid such bypasses. No publicly available exploits are known

jos1264@social.skynetcloud.site at 2025-11-27T12:30:02.000Z ##

CVE-2025-59025 - Apache Email Script Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-30186
(5.4 MEDIUM)

EPSS: 0.03%

updated 2025-11-27T12:30:34

1 posts

Malicious content uploaded as file can be used to execute script code when following attacker-controlled links. Unintended actions can be executed in the context of the users account, including exfiltration of sensitive information. Please deploy the provided updates and patch releases. No publicly available exploits are known

jos1264@social.skynetcloud.site at 2025-11-27T12:30:02.000Z ##

CVE-2025-30186 - Apache File Upload Cross-Site Scripting (XSS) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13378
(6.5 MEDIUM)

EPSS: 0.04%

updated 2025-11-27T12:30:34

1 posts

The AI ChatBot with ChatGPT and Content Generator by AYS plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.7.0 via the ays_chatgpt_pinecone_upsert function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from

jos1264@social.skynetcloud.site at 2025-11-27T12:30:02.000Z ##

CVE-2025-13378 - AI ChatBot with ChatGPT and Content Generator by AYS <= 2.7.0 - Unauthenticated Server-Side Request Forgery via 'pinecone_url' Parameter cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12584
(5.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-27T12:30:34

1 posts

The Quick View for WooCommerce plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.2.17 via the 'wqv_popup_content' AJAX endpoint due to insufficient restrictions on which products can be included. This makes it possible for unauthenticated attackers to extract data from private products that they should not have access to.

jos1264@social.skynetcloud.site at 2025-11-27T12:30:01.000Z ##

CVE-2025-12584 - Quick View for WooCommerce <= 2.2.17 - Unauthenticated Private Product Disclosure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-30190
(5.4 MEDIUM)

EPSS: 0.03%

updated 2025-11-27T12:30:29

1 posts

Malicious content at office documents can be used to inject script code when editing a document. Unintended actions can be executed in the context of the users account, including exfiltration of sensitive information. Please deploy the provided updates and patch releases. No publicly available exploits are known

jos1264@social.skynetcloud.site at 2025-11-27T12:30:02.000Z ##

CVE-2025-30190 - Microsoft Office Document Code Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59890
(7.3 HIGH)

EPSS: 0.01%

updated 2025-11-27T11:15:48.080000

1 posts

Improper input sanitization in the file archives upload functionality of Eaton Galileo software allows traversing paths which could lead into an attacker with local access to execute unauthorized code or commands. This security issue has been fixed in the latest version of Galileo which is available on the Eaton download center.

jos1264@social.skynetcloud.site at 2025-11-27T14:45:02.000Z ##

CVE-2025-59890 - Eaton Galileo Local File Inclusion Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59026
(5.4 MEDIUM)

EPSS: 0.03%

updated 2025-11-27T10:15:52.007000

1 posts

Malicious content uploaded as file can be used to execute script code when following attacker-controlled links. Unintended actions can be executed in the context of the users account, including exfiltration of sensitive information. Please deploy the provided updates and patch releases. No publicly available exploits are known

CVE-2025-13381
(5.3 MEDIUM)

EPSS: 0.04%

updated 2025-11-27T10:15:51.220000

1 posts

The AI ChatBot with ChatGPT and Content Generator by AYS plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'ays_chatgpt_save_wp_media' function in all versions up to, and including, 2.7.0. This makes it possible for unauthenticated attackers to upload media files.

jos1264@social.skynetcloud.site at 2025-11-27T12:30:02.000Z ##

CVE-2025-13381 - AI ChatBot with ChatGPT and Content Generator by AYS <= 2.7.0 - Missing Authorization to Unauthenticated Media File Uploads cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13536
(8.8 HIGH)

EPSS: 0.22%

updated 2025-11-27T09:30:26

2 posts

The Blubrry PowerPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in all versions up to, and including, 11.15.2. This is due to the plugin validating file extensions but not halting execution when validation fails in the 'powerpress_edit_post' function. This makes it possible for authenticated attackers, with Contributor-level access and a

jos1264@social.skynetcloud.site at 2025-11-27T12:30:01.000Z ##

CVE-2025-13536 - Blubrry PowerPress <= 11.15.2 - Authenticated (Contributor+) Arbitrary File Upload via 'powerpress_edit_post' cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-27T11:10:01.000Z ##

CVE-2025-13536 - Blubrry PowerPress <= 11.15.2 - Authenticated (Contributor+) Arbitrary File Upload via 'powerpress_edit_post' cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13157
(5.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-27T09:30:26

1 posts

The QODE Wishlist for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.2.7 via the 'qode_wishlist_for_woocommerce_wishlist_table_item_callback' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to update the public view of arbitrary wishlists.

jos1264@social.skynetcloud.site at 2025-11-27T09:20:02.000Z ##

CVE-2025-13157 - QODE Wishlist for WooCommerce <= 1.2.7 - Unauthenticated Insecure Direct Object Reference to Wishlist Update cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13441
(5.3 MEDIUM)

EPSS: 0.05%

updated 2025-11-27T09:30:25

1 posts

The Hide Category by User Role for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 2.3.1. This is due to a missing capability check on the admin_init hook that executes wp_cache_flush(). This makes it possible for unauthenticated attackers to flush the site's object cache via forged requests, potentially degrading site performance.

jos1264@social.skynetcloud.site at 2025-11-27T09:20:02.000Z ##

CVE-2025-13441 - Hide Category by User Role for WooCommerce <= 2.3.1 - Missing Authorization to Unauthenticated Cache Flushing cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66028(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-11-27T09:01:21

1 posts

### Summary During the login process, the server response included a parameter called isMasterAdmin. By intercepting and modifying this parameter value from false to true, a user is able to gain access to the admin dashboard interface. However, despite accessing the admin panel, the user does not have sufficient permissions to view or interact with actual data. ### PoC Intercept the login res

jos1264@social.skynetcloud.site at 2025-11-26T22:10:02.000Z ##

CVE-2025-66028 - OneUptime is Vulnerable to Privilege Escalation via Login Response Manipulation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-62703
(8.8 HIGH)

EPSS: 0.33%

updated 2025-11-27T09:00:41

1 posts

### Summary The Fugue framework implements an RPC server system for distributed computing operations. In the core functionality of the RPC server implementation, I found that the _decode() function in fugue/rpc/flask.py directly uses cloudpickle.loads() to deserialize data without any sanitization. This creates a remote code execution vulnerability when malicious pickle data is processed by the RP

jos1264@social.skynetcloud.site at 2025-11-26T01:05:02.000Z ##

CVE-2025-62703 - Fugue is Vulnerable to Remote Code Execution by Pickle Deserialization via FlaskRPCServer cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13540
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-11-27T06:31:33

2 posts

The Tiare Membership plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.2. This is due to the 'tiare_membership_init_rest_api_register' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site

jos1264@social.skynetcloud.site at 2025-11-27T08:40:02.000Z ##

CVE-2025-13540 - Tiare Membership <= 1.2 - Unauthenticated Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-27T05:45:02.000Z ##

CVE-2025-13540 - Tiare Membership <= 1.2 - Unauthenticated Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13675
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-11-27T06:31:33

2 posts

The Tiger theme for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 101.2.1. This is due to the 'paypal-submit.php' file not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site.

jos1264@social.skynetcloud.site at 2025-11-27T08:40:02.000Z ##

CVE-2025-13675 - Tiger <= 101.2.1 - Unauthenticated Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-27T05:45:02.000Z ##

CVE-2025-13675 - Tiger <= 101.2.1 - Unauthenticated Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12758
(7.5 HIGH)

EPSS: 0.04%

updated 2025-11-27T06:31:32

1 posts

Versions of the package validator before 13.15.22 are vulnerable to Incomplete Filtering of One or More Instances of Special Elements in the isLength() function that does not take into account Unicode variation selectors (\uFE0F, \uFE0E) appearing in a sequence which lead to improper string length calculation. This can lead to an application using isLength for input validation accepting strings si

jos1264@social.skynetcloud.site at 2025-11-27T09:20:01.000Z ##

CVE-2025-12758 - Validator Package Unicode Filtering Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12151
(6.4 MEDIUM)

EPSS: 0.03%

updated 2025-11-27T06:31:32

1 posts

The Simple Folio plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'portfolio_name' parameter in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an

jos1264@social.skynetcloud.site at 2025-11-27T05:45:02.000Z ##

CVE-2025-12151 - Simple Folio <= 1.1.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12185
(4.4 MEDIUM)

EPSS: 0.02%

updated 2025-11-27T06:31:26

1 posts

The StaffList plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.2.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected p

jos1264@social.skynetcloud.site at 2025-11-27T09:20:01.000Z ##

CVE-2025-12185 - StaffList <= 3.2.6 - Authenticated (Admin+) Stored Cross-Site Scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12123
(6.1 MEDIUM)

EPSS: 0.07%

updated 2025-11-27T06:31:26

1 posts

The Customer Reviews Collector for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'email-text' parameter in all versions up to, and including, 4.6.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into

jos1264@social.skynetcloud.site at 2025-11-27T09:20:01.000Z ##

CVE-2025-12123 - Customer Reviews Collector for WooCommerce <= 4.6.1 - Reflected Cross-Site Scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13539
(9.8 CRITICAL)

EPSS: 0.19%

updated 2025-11-27T06:31:26

2 posts

The FindAll Membership plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.4. This is due to the plugin not properly logging in a user with the data that was previously verified through the 'findall_membership_check_facebook_user' and the 'findall_membership_check_google_user' functions. This makes it possible for unauthenticated attackers to log i

jos1264@social.skynetcloud.site at 2025-11-27T08:40:01.000Z ##

CVE-2025-13539 - FindAll Membership <= 1.0.4 - Authentication Bypass via Social Login cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-27T05:45:02.000Z ##

CVE-2025-13539 - FindAll Membership <= 1.0.4 - Authentication Bypass via Social Login cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-7820
(7.5 HIGH)

EPSS: 0.09%

updated 2025-11-27T06:31:26

1 posts

The SKT PayPal for WooCommerce plugin for WordPress is vulnerable to Payment Bypass in all versions up to, and including, 1.4. This is due to the plugin only enforcing client side controls instead of server-side controls when processing payments. This makes it possible for unauthenticated attackers to make confirmed purchases without actually paying for them.

jos1264@social.skynetcloud.site at 2025-11-27T05:45:02.000Z ##

CVE-2025-7820 - SKT PayPal for WooCommerce <= 1.4 - Unauthenticated Payment Bypass cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13525
(6.1 MEDIUM)

EPSS: 0.09%

updated 2025-11-27T06:15:46.830000

1 posts

The WP Directory Kit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'order_by' parameter in all versions up to, and including, 1.4.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such a

jos1264@social.skynetcloud.site at 2025-11-27T09:20:02.000Z ##

CVE-2025-13525 - WP Directory Kit <= 1.4.5 - Reflected Cross-Site Scripting via 'order_by' Parameter cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13143
(4.3 MEDIUM)

EPSS: 0.01%

updated 2025-11-27T06:15:46.657000

1 posts

The Poll, Survey & Quiz Maker Plugin by Opinion Stage plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 19.12.0. This is due to missing or insufficient nonce validation on the disconnect_account_action function. This makes it possible for unauthenticated attackers to disconnect the site from the Opinion Stage platform integration via a forged re

jos1264@social.skynetcloud.site at 2025-11-27T09:20:02.000Z ##

CVE-2025-13143 - Poll, Survey & Quiz Maker Plugin by Opinion Stage <= 19.12.0 - Cross-Site Request Forgery to Account Disconnection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-3784
(5.5 MEDIUM)

EPSS: 0.01%

updated 2025-11-27T05:16:15.467000

1 posts

Cleartext Storage of Sensitive Information Vulnerability in GX Works2 all versions allows an attacker to disclose credential information stored in plaintext from project files. As a result, the attacker may be able to open project files protected by user authentication using disclosed credential information, and obtain or modify project information.

jos1264@social.skynetcloud.site at 2025-11-27T05:45:01.000Z ##

CVE-2025-3784 - Information Disclosure Vulnerability in GX Works2 cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13680
(8.8 HIGH)

EPSS: 0.04%

updated 2025-11-27T05:16:15.253000

2 posts

The Tiger theme for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 101.2.1. This is due to the plugin allowing a user to update the user role through the $user->set_role() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to elevate their privileges to that of an administrator.

jos1264@social.skynetcloud.site at 2025-11-27T08:40:02.000Z ##

CVE-2025-13680 - Tiger <= 101.2.1 - Authenticated (Subscriber+) Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-27T05:45:02.000Z ##

CVE-2025-13680 - Tiger <= 101.2.1 - Authenticated (Subscriber+) Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13538
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-11-27T05:16:12.453000

2 posts

The FindAll Listing plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.5. This is due to the 'findall_listing_user_registration_additional_params' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator acces

jos1264@social.skynetcloud.site at 2025-11-27T08:40:01.000Z ##

CVE-2025-13538 - FindAll Listing <= 1.0.5 - Unauthenticated Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-27T05:45:01.000Z ##

CVE-2025-13538 - FindAll Listing <= 1.0.5 - Unauthenticated Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66314
(7.5 HIGH)

EPSS: 0.03%

updated 2025-11-27T03:30:32

1 posts

Improper Privilege Management vulnerability in ZTE ElasticNet UME R32 on Linux allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects ElasticNet UME R32: ElasticNet_UME_R32_V16.23.20.04.

jos1264@social.skynetcloud.site at 2025-11-27T05:45:01.000Z ##

CVE-2025-66314 - ZTE ElasticNet UME R32 ACL Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-34351(CVSS UNKNOWN)

EPSS: 0.47%

updated 2025-11-27T03:30:32

2 posts

Anyscale Ray 2.52.0 contains an insecure default configuration in which token-based authentication for Ray management interfaces (including the dashboard and Jobs API) is disabled unless explicitly enabled by setting RAY_AUTH_MODE=token. In the default unauthenticated state, a remote attacker with network access to these interfaces can submit jobs and execute arbitrary code on the Ray cluster. NOT

jos1264@social.skynetcloud.site at 2025-11-27T05:45:01.000Z ##

CVE-2025-34351 - Anyscale Ray v2.52.0 Token Authentication Disabled by Default Insecure Configuration cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-27T04:40:02.000Z ##

CVE-2025-34351 - Anyscale Ray v2.52.0 Token Authentication Disabled by Default Insecure Configuration cvefeed.io/vuln/detail/CVE-202

##

CVE-2024-5539(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-11-27T03:30:32

2 posts

The Access Control Bypass vulnerability found in ALC WebCTRL and Carrier i-Vu in versions up to and including 8.5 allows a malicious actor to bypass intended access restrictions and expose sensitive information via the web based building automation server.

jos1264@social.skynetcloud.site at 2025-11-27T04:40:02.000Z ##

CVE-2024-5539 - ALC WebCTRL Carrier i-Vu Access Control Bypass cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-27T03:10:02.000Z ##

CVE-2024-5539 - ALC WebCTRL Carrier i-Vu Access Control Bypass cvefeed.io/vuln/detail/CVE-202

##

CVE-2024-5540(CVSS UNKNOWN)

EPSS: 0.05%

updated 2025-11-27T03:30:32

1 posts

The reflective cross-site scripting vulnerability found in ALC WebCTRL and Carrier i-Vu in versions older than 8.0 affects login panels allowing a malicious actor to compromise the client browser .

jos1264@social.skynetcloud.site at 2025-11-27T03:10:02.000Z ##

CVE-2024-5540 - ALC WebCTRL Carrier i-Vu Reflected Cross-Site Scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-0657(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-11-27T03:30:26

2 posts

A weakness in Automated Logic and Carrier i-Vu Gen5 router on driver version drv_gen5_106-01-2380, allows malformed packets to be sent through BACnet MS/TP network causing the devices to enter a fault state. This fault state requires a manual power cycle to return the device to network visibility.

jos1264@social.skynetcloud.site at 2025-11-27T04:40:02.000Z ##

CVE-2025-0657 - ALC WebCTRL Carrier i-Vu and Gen5 Controllers Array Index out-of-range cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-27T03:10:03.000Z ##

CVE-2025-0657 - ALC WebCTRL Carrier i-Vu and Gen5 Controllers Array Index out-of-range cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-0658
(0 None)

EPSS: 0.08%

updated 2025-11-27T01:15:46.583000

2 posts

A vulnerability in Automated Logic and Carrier's Zone Controller via BACnet protocol causes the device to crash. The device enters a fault state; after a reset, a second packet can leave it permanently unresponsive until a manual power cycle is performed.

jos1264@social.skynetcloud.site at 2025-11-27T04:40:02.000Z ##

CVE-2025-0658 - Automated Logic and Carrier Zone Controllers malformed packets denial of service cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-27T03:10:03.000Z ##

CVE-2025-0658 - Automated Logic and Carrier Zone Controllers malformed packets denial of service cvefeed.io/vuln/detail/CVE-202

##

CVE-2020-36871(CVSS UNKNOWN)

EPSS: 0.34%

updated 2025-11-27T00:30:38

2 posts

ESCAM QD-900 WIFI HD cameras contain an unauthenticated configuration disclosure vulnerability in the /web/cgi-bin/hi3510/backup.cgi endpoint. The endpoint allows remote download of a compressed configuration backup without requiring authentication or authorization. The exposed backup can include administrative credentials and other sensitive device settings, enabling an unauthenticated remote att

jos1264@social.skynetcloud.site at 2025-11-27T00:50:01.000Z ##

CVE-2020-36871 - ESCAM QD-900 Unauthenticated Configuration Disclosure cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-27T00:20:02.000Z ##

CVE-2020-36871 - ESCAM QD-900 Unauthenticated Configuration Disclosure cvefeed.io/vuln/detail/CVE-202

##

CVE-2020-36874(CVSS UNKNOWN)

EPSS: 0.36%

updated 2025-11-27T00:30:27

1 posts

ACE SECURITY WIP-90113 HD cameras contain an unauthenticated configuration disclosure vulnerability in the /web/cgi-bin/hi3510/backup.cgi endpoint. The endpoint permits remote download of a compressed configuration backup without requiring authentication or authorization. The exposed backup may include administrative credentials and other sensitive device settings, enabling an unauthenticated remo

jos1264@social.skynetcloud.site at 2025-11-27T00:50:02.000Z ##

CVE-2020-36874 - ACE SECURITY WIP-90113 Unauthenticated Configuration Disclosure cvefeed.io/vuln/detail/CVE-202

##

CVE-2020-36872(CVSS UNKNOWN)

EPSS: 0.16%

updated 2025-11-27T00:30:27

1 posts

BACnet Test Server versions up to and including 1.01 contains a remote denial of service vulnerability in its BACnet/IP BVLC packet handling. The server fails to properly validate the BVLC Length field in incoming UDP BVLC frames on the default BACnet port (47808/udp). A remote unauthenticated attacker can send a malformed BVLC Length value to trigger an access violation and crash the application,

jos1264@social.skynetcloud.site at 2025-11-27T00:50:02.000Z ##

CVE-2020-36872 - BACnet Test Server 1.01 Malformed BVLC Length DoS cvefeed.io/vuln/detail/CVE-202

##

CVE-2019-25226(CVSS UNKNOWN)

EPSS: 0.22%

updated 2025-11-27T00:30:27

1 posts

Dongyoung Media DM-AP240T/W wireless access points contain an unauthenticated configuration disclosure vulnerability in the /cgi-bin/sys_system_config management endpoint. The endpoint allows remote retrieval of a compressed configuration archive without requiring authentication or authorization. The exposed configuration may include administrative credentials and other sensitive settings, enablin

jos1264@social.skynetcloud.site at 2025-11-27T00:50:01.000Z ##

CVE-2019-25226 - Dongyoung Media DM-AP240T/W Unauthenticated Configuration Disclosure cvefeed.io/vuln/detail/CVE-201

##

CVE-2025-66040
(3.6 LOW)

EPSS: 0.03%

updated 2025-11-27T00:15:55.343000

1 posts

Spotipy is a Python library for the Spotify Web API. Prior to version 2.25.2, there is a cross-site scripting (XSS) vulnerability in the OAuth callback server that allows for JavaScript injection through the unsanitized error parameter. Attackers can execute arbitrary JavaScript in the user's browser during OAuth authentication. This issue has been patched in version 2.25.2.

jos1264@social.skynetcloud.site at 2025-11-27T03:10:02.000Z ##

CVE-2025-66040 - Spotipy has a XSS vulnerability in OAuth callback server cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59390
(9.8 CRITICAL)

EPSS: 0.09%

updated 2025-11-26T23:19:19

1 posts

Apache Druid’s Kerberos authenticator uses a weak fallback secret when the `druid.auth.authenticator.kerberos.cookieSignatureSecret` configuration is not explicitly set. In this case, the secret is generated using `ThreadLocalRandom`, which is not a crypto-graphically secure random number generator. This may allow an attacker to predict or brute force the secret used to sign authentication cookie

1 repos

https://github.com/Daeda1usUK/CVE-2025-59390-

jos1264@social.skynetcloud.site at 2025-11-26T10:20:03.000Z ##

CVE-2025-59390 - Apache Druid: Kerberos authenticaton chooses a cryptographically unsecure secret if not configured explicitly. cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66035(CVSS UNKNOWN)

EPSS: 0.05%

updated 2025-11-26T23:18:51

1 posts

The vulnerability is a **Credential Leak by App Logic** that leads to the **unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token** to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (`http://` or `https://`) to determine if it is cross-origin. If the URL starts with protoc

jos1264@social.skynetcloud.site at 2025-11-27T00:20:02.000Z ##

CVE-2025-66035 - Angular HTTP Client Has XSRF Token Leakage via Protocol-Relative URLs cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66030
(0 None)

EPSS: 0.03%

updated 2025-11-26T23:15:49.237000

1 posts

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream

CVE-2025-64335
(7.5 HIGH)

EPSS: 0.05%

updated 2025-11-26T23:15:48.913000

1 posts

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_da

jos1264@social.skynetcloud.site at 2025-11-27T00:20:03.000Z ##

CVE-2025-64335 - Suricata is vulnerable to a null deref when used with base64_data cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64330
(7.5 HIGH)

EPSS: 0.04%

updated 2025-11-26T23:15:48.093000

1 posts

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, a single byte read heap overflow when logging the verdict in eve.alert and eve.drop records can lead to crashes. This requires the per packet alert queue to be filled with alerts and then followed by a pass rule. This issue has b

jos1264@social.skynetcloud.site at 2025-11-27T03:10:01.000Z ##

CVE-2025-64330 - Suricata is vulnerable to a heap buffer overflow on verdict cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-62593
(0 None)

EPSS: 0.02%

updated 2025-11-26T23:15:47.927000

2 posts

Ray is an AI compute engine. Prior to version 2.52.0, developers working with Ray as a development tool can be exploited via a critical RCE vulnerability exploitable via Firefox and Safari. This vulnerability is due to an insufficient guard against browser-based attacks, as the current defense uses the User-Agent header starting with the string "Mozilla" as a defense mechanism. This defense is ins

1 repos

https://github.com/Ashwesker/Blackash-CVE-2025-62593

jos1264@social.skynetcloud.site at 2025-11-27T00:50:02.000Z ##

CVE-2025-62593 - Ray is vulnerable to RCE via Safari & Firefox Browsers through DNS Rebinding Attack cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-27T00:20:02.000Z ##

CVE-2025-62593 - Ray is vulnerable to RCE via Safari & Firefox Browsers through DNS Rebinding Attack cvefeed.io/vuln/detail/CVE-202

##

CVE-2020-36873
(0 None)

EPSS: 0.17%

updated 2025-11-26T23:15:47.397000

1 posts

Astak CM-818T3 2.4GHz wireless security surveillance cameras contain an unauthenticated configuration disclosure vulnerability in the /web/cgi-bin/hi3510/backup.cgi endpoint. The endpoint permits remote download of a compressed configuration backup without requiring authentication or authorization. The exposed backup may include administrative credentials and other sensitive device settings, enabl

jos1264@social.skynetcloud.site at 2025-11-27T00:50:02.000Z ##

CVE-2020-36873 - Astak CM-818T3 Unauthenticated Configuration Disclosure cvefeed.io/vuln/detail/CVE-202

##

CVE-2019-25227
(0 None)

EPSS: 0.21%

updated 2025-11-26T23:15:46.880000

2 posts

Tellion HN-2204AP routers contain an unauthenticated configuration disclosure vulnerability in the /cgi-bin/system_config_file management endpoint. The endpoint allows remote retrieval of a compressed configuration archive without requiring authentication or authorization. The exposed configuration may include administrative credentials, wireless keys, and other sensitive settings, enabling an una

jos1264@social.skynetcloud.site at 2025-11-27T00:50:01.000Z ##

CVE-2019-25227 - Tellion HN-2204AP Unauthenticated Configuration Disclosure cvefeed.io/vuln/detail/CVE-201

##

jos1264@social.skynetcloud.site at 2025-11-27T00:20:02.000Z ##

CVE-2019-25227 - Tellion HN-2204AP Unauthenticated Configuration Disclosure cvefeed.io/vuln/detail/CVE-201

##

CVE-2025-66031(CVSS UNKNOWN)

EPSS: 0.09%

updated 2025-11-26T22:08:40

2 posts

### Summary An Uncontrolled Recursion (CWE-674) vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. ### Details An ASN.1 Denial of Service (Dos) vulnerability exists in the node-forge `

CVE-2025-6195
(4.3 MEDIUM)

EPSS: 0.01%

updated 2025-11-26T21:31:37

1 posts

GitLab has remediated an issue in GitLab EE affecting all versions from 13.7 before 18.4.5, 18.5 before 18.5.3, and 18.6 before 18.6.1 that could have allowed an authenticated user to view information from security reports under certain configuration conditions.

jos1264@social.skynetcloud.site at 2025-11-26T22:10:03.000Z ##

CVE-2025-6195 - Direct Request ('Forced Browsing') in GitLab cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-7449
(6.5 MEDIUM)

EPSS: 0.03%

updated 2025-11-26T21:31:37

1 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 8.3 before 18.4.5, 18.5 before 18.5.3, and 18.6 before 18.6.1 that could have allowed an authenticated user with specific permissions to cause a denial of service condition through HTTP response processing.

jos1264@social.skynetcloud.site at 2025-11-26T22:10:03.000Z ##

CVE-2025-7449 - Allocation of Resources Without Limits or Throttling in GitLab cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13611
(2.0 LOW)

EPSS: 0.01%

updated 2025-11-26T21:31:37

1 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.2 before 18.4.5, 18.5 before 18.5.3, and 18.6 before 18.6.1 that could have allowed an authenticated user with access to certain logs to obtain sensitive tokens under specific conditions.

jos1264@social.skynetcloud.site at 2025-11-26T22:10:02.000Z ##

CVE-2025-13611 - Insertion of Sensitive Information into Log File in GitLab cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65676(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-26T21:31:37

1 posts

Stored Cross site scripting (XSS) vulnerability in Classroomio LMS 0.1.13 allows authenticated attackers to execute arbitrary code via crafted SVG cover images.

1 repos

https://github.com/Rivek619/CVE-2025-65676

jos1264@social.skynetcloud.site at 2025-11-26T22:10:01.000Z ##

CVE-2025-65676 - Classroomio LMS Stored Cross-Site Scripting (XSS) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65675(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-26T21:31:26

1 posts

Stored Cross site scripting (XSS) vulnerability in Classroomio LMS 0.1.13 allows authenticated attackers to execute arbitrary code via crafted SVG profile pictures.

1 repos

https://github.com/Rivek619/CVE-2025-65675

CVE-2025-12653
(6.5 MEDIUM)

EPSS: 0.03%

updated 2025-11-26T20:15:49.023000

1 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.3 before 18.4.5, 18.5 before 18.5.3, and 18.6 before 18.6.1 that under specific conditions could have allowed an unauthenticated user to join arbitrary organizations by changing headers on some requests.

jos1264@social.skynetcloud.site at 2025-11-26T22:10:02.000Z ##

CVE-2025-12653 - Authentication Bypass by Spoofing in GitLab cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12571
(7.5 HIGH)

EPSS: 0.04%

updated 2025-11-26T20:15:47.943000

1 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.4.5, 18.5 before 18.5.3, and 18.6 before 18.6.1 that could have allowed an unauthenticated user to cause a Denial of Service condition by sending specifically crafted requests containing malicious JSON payloads.

jos1264@social.skynetcloud.site at 2025-11-26T22:10:02.000Z ##

CVE-2025-12571 - Allocation of Resources Without Limits or Throttling in GitLab cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66020
(7.5 HIGH)

EPSS: 0.04%

updated 2025-11-26T19:33:36

1 posts

### Summary The `EMOJI_REGEX` used in the `emoji` action is vulnerable to a Regular Expression Denial of Service (ReDoS) attack. A short, maliciously crafted string (e.g., <100 characters) can cause the regex engine to consume excessive CPU time (minutes), leading to a Denial of Service (DoS) for the application. ### Details The ReDoS vulnerability stems from "catastrophic backtracking" in the

jos1264@social.skynetcloud.site at 2025-11-26T04:50:02.000Z ##

CVE-2025-66020 - Valibot has a ReDoS vulnerability in `EMOJI_REGEX` cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65966(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-11-26T19:33:10

2 posts

### Summary A low-permission user can create new accounts through a direct API request instead of being restricted to the intended interface. ### PoC A low-permission user sends a crafted API request to the user-creation endpoint and the system creates the account successfully. ![WhatsApp Image 2025-11-23 at 14 27 32_0e0f5889](https://github.com/user-attachments/assets/5a539310-c9a2-4466-8926-b49

jos1264@social.skynetcloud.site at 2025-11-26T22:10:02.000Z ##

CVE-2025-65966 - OneUptime Unauthorized User Creation via API cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-26T21:40:02.000Z ##

CVE-2025-65966 - OneUptime Unauthorized User Creation via API cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64128
(10.0 CRITICAL)

EPSS: 3.18%

updated 2025-11-26T18:31:15

1 posts

An OS command injection vulnerability exists due to incomplete validation of user-supplied input. Validation fails to enforce sufficient formatting rules, which could permit attackers to append arbitrary data. This could allow an unauthenticated attacker to inject arbitrary commands.

CVE-2025-64127
(10.0 CRITICAL)

EPSS: 3.18%

updated 2025-11-26T18:31:15

1 posts

An OS command injection vulnerability exists due to insufficient sanitization of user-supplied input. The application accepts parameters that are later incorporated into OS commands without adequate validation. This could allow an unauthenticated attacker to execute arbitrary commands remotely.

CVE-2025-64126
(10.0 CRITICAL)

EPSS: 3.18%

updated 2025-11-26T18:31:15

1 posts

An OS command injection vulnerability exists due to improper input validation. The application accepts a parameter directly from user input without verifying it is a valid IP address or filtering potentially malicious characters. This could allow an unauthenticated attacker to inject arbitrary commands.

CVE-2025-65239
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-26T18:31:15

1 posts

Incorrect access control in the /aux1/ocussd/trace endpoint of OpenCode Systems USSD Gateway OC Release:5, version 6.13.11 allows attackers with low-level privileges to read server logs.

jos1264@social.skynetcloud.site at 2025-11-26T18:05:01.000Z ##

CVE-2025-65239 - OpenCode Systems USSD Gateway Access Control Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65238(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-26T18:31:15

1 posts

Incorrect access control in the getSubUsersByProvider function of OpenCode Systems USSD Gateway OC Release: 5 Version 6.13.11 allows attackers with low-level privileges to dump user records and access sensitive information.

jos1264@social.skynetcloud.site at 2025-11-26T18:05:01.000Z ##

CVE-2025-65238 - OpenCode Systems USSD Gateway Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64130
(9.8 CRITICAL)

EPSS: 0.11%

updated 2025-11-26T18:15:50.243000

1 posts

Zenitel TCIV-3+ is vulnerable to a reflected cross-site scripting vulnerability, which could allow a remote attacker to execute arbitrary JavaScript on the victim's browser.

CVE-2025-2486
(0 None)

EPSS: 0.01%

updated 2025-11-26T18:15:48.357000

2 posts

The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure

jos1264@social.skynetcloud.site at 2025-11-26T18:05:01.000Z ##

CVE-2025-2486 - UEFI Shell accessible in AAVMF with Secure Boot enabled on Ubuntu cvefeed.io/vuln/detail/CVE-202

##

cR0w@infosec.exchange at 2025-11-26T17:48:42.000Z ##

Not the most confidence-inspiring CVE description.

cve.org/CVERecord?id=CVE-2025-

The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure Boot restrictions. This is an additional repair on top of the incomplete fix for CVE-2023-48733.

##

CVE-2025-63938
(6.5 MEDIUM)

EPSS: 0.03%

updated 2025-11-26T17:15:46.440000

1 posts

Tinyproxy through 1.11.2 contains an integer overflow vulnerability in the strip_return_port() function within src/reqs.c.

cR0w@infosec.exchange at 2025-11-26T16:21:36.000Z ##

Hey @Viss :

github.com/rayinaw/my-hub/blob

Tinyproxy up to 1.11.2 contains an integer overflow vulnerability in the strip_return_port() function within src/reqs.c.

##

CVE-2025-66257
(0 None)

EPSS: 0.07%

updated 2025-11-26T16:15:51.030000

2 posts

Unauthenticated Arbitrary File Deletion (patch_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform The deletepatch parameter allows unauthenticated deletion of arbitrary files. The `deletepatch` parameter in `patch_contents.php` allows unauthenticated deletion of arbitrary fi

cR0w@infosec.exchange at 2025-11-26T15:28:41.000Z ##

Go hack more radio shit.

abdulmhsblog.com/posts/webfmvu

  • CVE-2025-66259: Authenticated Root RCE (main_ok.php)
  • CVE-2025-66253: Unauthenticated OS Command Injection (Upgrade)
  • CVE-2025-66261: Unauthenticated OS Command Injection (Restore)
  • CVE-2025-66262: Arbitrary File Overwrite (Tar Path Traversal)
  • CVE-2025-66250: Unrestricted File Upload (Status)
  • CVE-2025-66255: Unsigned Firmware Upload
  • CVE-2025-66256: Unrestricted Patch Upload
  • CVE-2025-66251: Path Traversal File Deletion
  • CVE-2025-66254: Arbitrary File Deletion (Upgrade)
  • CVE-2025-66263: Arbitrary File Read (Null Byte Injection)
  • CVE-2025-66260: SQL Injection
  • CVE-2025-66258: Stored XSS via XML Injection
  • CVE-2025-66257: Arbitrary Patch Deletion
  • CVE-2025-66252: Infinite Loop Denial of Service
##

jos1264@social.skynetcloud.site at 2025-11-26T05:05:02.000Z ##

CVE-2025-66257 - Unauthenticated Arbitrary File Deletion (patch_contents.php) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66026
(6.1 MEDIUM)

EPSS: 0.04%

updated 2025-11-26T16:15:50.917000

1 posts

REDAXO is a PHP-based CMS. Prior to version 5.20.1, a reflected Cross-Site Scripting (XSS) vulnerability exists in the Mediapool view where the request parameter args[types] is rendered into an info banner without HTML-escaping. This allows arbitrary JavaScript execution in the backend context when an authenticated user visits a crafted link while logged in. This issue has been patched in version

jos1264@social.skynetcloud.site at 2025-11-26T04:50:02.000Z ##

CVE-2025-66026 - REDAXO is Vulnerable to Reflected XSS in Mediapool Info Banner via args[types] cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66021
(0 None)

EPSS: 0.05%

updated 2025-11-26T16:15:50.413000

2 posts

OWASP Java HTML Sanitizer is a configureable HTML Sanitizer written in Java, allowing inclusion of HTML authored by third-parties in web applications while protecting against XSS. In version 20240325.1, OWASP java html sanitizer is vulnerable to XSS if HtmlPolicyBuilder allows noscript and style tags with allowTextIn inside the style tag. This could lead to XSS if the payload is crafted in such a

jos1264@social.skynetcloud.site at 2025-11-26T05:05:02.000Z ##

CVE-2025-66021 - OWASP Java HTML Sanitizer is vulnerable to XSS via noscript tag and improper style tag sanitization cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-26T04:50:03.000Z ##

CVE-2025-66021 - OWASP Java HTML Sanitizer is vulnerable to XSS via noscript tag and improper style tag sanitization cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-9163
(6.1 MEDIUM)

EPSS: 0.07%

updated 2025-11-26T15:34:20

1 posts

The Houzez theme for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 4.1.6 due to insufficient input sanitization and output escaping in the houzez_property_img_upload() and houzez_property_attachment_upload() functions. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute w

jos1264@social.skynetcloud.site at 2025-11-26T15:25:02.000Z ##

CVE-2025-9163 - Houzez <= 4.1.6 - Unauthenticated Stored Cross-Site Scripting via SVG File Upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13601
(7.7 HIGH)

EPSS: 0.01%

updated 2025-11-26T15:34:20

1 posts

A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.

cR0w@infosec.exchange at 2025-11-26T15:22:57.000Z ##

That's an avenue that I admit I hadn't thought to check before. Seems so simple though.

access.redhat.com/security/cve

A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.

##

CVE-2025-12061
(8.6 HIGH)

EPSS: 0.03%

updated 2025-11-26T15:15:51.087000

1 posts

The TAX SERVICE Electronic HDM WordPress plugin before 1.2.1 does not authorization and CSRF checks in an AJAX action, allowing unauthenticated users to import and execute arbitrary SQL statements

jos1264@social.skynetcloud.site at 2025-11-26T10:20:02.000Z ##

CVE-2025-12061 - Tax Service Electronic HDM < 1.2.1 - Unauthenticated Arbitrary SQL Execution cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-9191
(6.3 MEDIUM)

EPSS: 0.05%

updated 2025-11-26T13:16:00.923000

1 posts

The Houzez theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.1.6 via deserialization of untrusted input in saved-search-item.php. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unl

jos1264@social.skynetcloud.site at 2025-11-26T15:25:02.000Z ##

CVE-2025-9191 - Houzez <= 4.1.6 - Authenticated (Subscriber+) PHP Object Injection via Saved Search cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13674
(5.5 MEDIUM)

EPSS: 0.01%

updated 2025-11-26T12:30:16

1 posts

BPv7 dissector crash in Wireshark 4.6.0 allows denial of service

jos1264@social.skynetcloud.site at 2025-11-26T15:25:01.000Z ##

CVE-2025-13674 - Access of Uninitialized Pointer in Wireshark cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-62728(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-26T09:31:30

1 posts

SQL injection vulnerability in Hive Metastore Server (HMS) when processing delete column statistics requests via the Thrift APIs. The vulnerability is only exploitable by trusted/authorized users/applications that are allowed to call directly the Thrift APIs. In most real-world deployments, HMS is accessible to only a handful of applications (e.g., Hiveserver2) thus the vulnerability is not exploi

jos1264@social.skynetcloud.site at 2025-11-26T10:20:02.000Z ##

CVE-2025-62728 - Apache Hive: SQL injection vulnerability when processing delete column statistics requests via the HMS Thrift APIs cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13735
(7.4 HIGH)

EPSS: 0.04%

updated 2025-11-26T07:16:00.173000

1 posts

Out-of-bounds Read vulnerability in ASR1903、ASR3901 in ASR Lapwing_Linux on Linux (nr_fw modules). This vulnerability is associated with program files Code/nr_fw/DLP/src/NrCgi.C. This issue affects Lapwing_Linux: before 2025/11/26.

CVE-2025-64983
(8.0 HIGH)

EPSS: 0.03%

updated 2025-11-26T06:31:34

2 posts

Smart Video Doorbell firmware versions prior to 2.01.078 contain an active debug code vulnerability that allows an attacker to connect via Telnet and gain access to the device.

jos1264@social.skynetcloud.site at 2025-11-26T07:10:01.000Z ##

CVE-2025-64983 - Ring Video Doorbell Debug Code Remote Code Execution cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-26T07:00:03.000Z ##

CVE-2025-64983 - Ring Video Doorbell Debug Code Remote Code Execution cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66233(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-11-26T06:31:34

1 posts

Rejected reason: Not used

CVE-2025-66231(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-11-26T06:31:34

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-11-26T07:00:02.000Z ##

CVE-2025-66231 - Apache HTTP Server Cross-Site Request Forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66229(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-11-26T06:31:34

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-11-26T07:00:02.000Z ##

CVE-2025-66229 - Apache HTTP Server Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-55174
(3.2 LOW)

EPSS: 0.01%

updated 2025-11-26T06:31:28

1 posts

In KDE Skanpage before 25.08.0, an attempt at file overwrite can result in the contents of the new file at the beginning followed by the partial contents of the old file at the end, because of use of QIODevice::ReadWrite instead of QODevice::WriteOnly.

jos1264@social.skynetcloud.site at 2025-11-26T10:20:02.000Z ##

CVE-2025-55174 - KDE Skanpage Uncontrolled File Truncation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59820
(6.7 MEDIUM)

EPSS: 0.02%

updated 2025-11-26T06:31:28

1 posts

In KDE Krita before 5.2.13, loading a manipulated TGA file could result in a heap-based buffer overflow in plugins/impex/tga/kis_tga_import.cpp (aka KisTgaImport). Control flow proceeds even when a number of pixels becomes negative.

jos1264@social.skynetcloud.site at 2025-11-26T10:20:02.000Z ##

CVE-2025-59820 - KDE Krita TGA File Heap-Based Buffer Overflow Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66235(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-11-26T06:31:28

1 posts

Rejected reason: Not used

CVE-2025-66232(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-11-26T06:31:28

1 posts

Rejected reason: Not used

CVE-2025-9557
(7.6 HIGH)

EPSS: 0.01%

updated 2025-11-26T06:15:46.007000

1 posts

‭An out-of-bound write can lead to an arbitrary code execution. Even on devices with some form of memory protection, this can still lead to‬ ‭a crash and a resultant denial of service.‬

jos1264@social.skynetcloud.site at 2025-11-26T07:00:03.000Z ##

CVE-2025-9557 - Bluetooth: Mesh: Out-of-Bound Write in gen_prov_cont cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66234
(0 None)

EPSS: 0.00%

updated 2025-11-26T04:15:57.677000

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-11-26T07:00:02.000Z ##

CVE-2025-66234 - Apache HTTP Server Unauthenticated Remote Code Execution cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66230
(0 None)

EPSS: 0.00%

updated 2025-11-26T04:15:57.393000

1 posts

Rejected reason: Not used

CVE-2025-66250(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-11-26T03:30:28

1 posts

Unauthenticated Arbitrary File Upload (status_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform Allows unauthenticated arbitrary file upload via /var/tdf/status_contents.php.

cR0w@infosec.exchange at 2025-11-26T15:28:41.000Z ##

Go hack more radio shit.

abdulmhsblog.com/posts/webfmvu

  • CVE-2025-66259: Authenticated Root RCE (main_ok.php)
  • CVE-2025-66253: Unauthenticated OS Command Injection (Upgrade)
  • CVE-2025-66261: Unauthenticated OS Command Injection (Restore)
  • CVE-2025-66262: Arbitrary File Overwrite (Tar Path Traversal)
  • CVE-2025-66250: Unrestricted File Upload (Status)
  • CVE-2025-66255: Unsigned Firmware Upload
  • CVE-2025-66256: Unrestricted Patch Upload
  • CVE-2025-66251: Path Traversal File Deletion
  • CVE-2025-66254: Arbitrary File Deletion (Upgrade)
  • CVE-2025-66263: Arbitrary File Read (Null Byte Injection)
  • CVE-2025-66260: SQL Injection
  • CVE-2025-66258: Stored XSS via XML Injection
  • CVE-2025-66257: Arbitrary Patch Deletion
  • CVE-2025-66252: Infinite Loop Denial of Service
##

CVE-2025-66253(CVSS UNKNOWN)

EPSS: 0.93%

updated 2025-11-26T03:30:28

1 posts

Unauthenticated OS Command Injection (start_upgrade.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform User input passed directly to exec() allows remote code execution via start_upgrade.php. The `/var/tdf/start_upgrade.php` endpoint passes user-controlled `$_GET["filename"]` directl

cR0w@infosec.exchange at 2025-11-26T15:28:41.000Z ##

Go hack more radio shit.

abdulmhsblog.com/posts/webfmvu

  • CVE-2025-66259: Authenticated Root RCE (main_ok.php)
  • CVE-2025-66253: Unauthenticated OS Command Injection (Upgrade)
  • CVE-2025-66261: Unauthenticated OS Command Injection (Restore)
  • CVE-2025-66262: Arbitrary File Overwrite (Tar Path Traversal)
  • CVE-2025-66250: Unrestricted File Upload (Status)
  • CVE-2025-66255: Unsigned Firmware Upload
  • CVE-2025-66256: Unrestricted Patch Upload
  • CVE-2025-66251: Path Traversal File Deletion
  • CVE-2025-66254: Arbitrary File Deletion (Upgrade)
  • CVE-2025-66263: Arbitrary File Read (Null Byte Injection)
  • CVE-2025-66260: SQL Injection
  • CVE-2025-66258: Stored XSS via XML Injection
  • CVE-2025-66257: Arbitrary Patch Deletion
  • CVE-2025-66252: Infinite Loop Denial of Service
##

CVE-2025-66258(CVSS UNKNOWN)

EPSS: 0.05%

updated 2025-11-26T03:30:28

1 posts

Stored Cross-Site Scripting via XML Injection in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform Stored XSS via crafted filenames injected into patchlist.xml. User-controlled filenames are directly concatenated into `patchlist.xml` without encoding, allowing injection of malicious JavaScr

cR0w@infosec.exchange at 2025-11-26T15:28:41.000Z ##

Go hack more radio shit.

abdulmhsblog.com/posts/webfmvu

  • CVE-2025-66259: Authenticated Root RCE (main_ok.php)
  • CVE-2025-66253: Unauthenticated OS Command Injection (Upgrade)
  • CVE-2025-66261: Unauthenticated OS Command Injection (Restore)
  • CVE-2025-66262: Arbitrary File Overwrite (Tar Path Traversal)
  • CVE-2025-66250: Unrestricted File Upload (Status)
  • CVE-2025-66255: Unsigned Firmware Upload
  • CVE-2025-66256: Unrestricted Patch Upload
  • CVE-2025-66251: Path Traversal File Deletion
  • CVE-2025-66254: Arbitrary File Deletion (Upgrade)
  • CVE-2025-66263: Arbitrary File Read (Null Byte Injection)
  • CVE-2025-66260: SQL Injection
  • CVE-2025-66258: Stored XSS via XML Injection
  • CVE-2025-66257: Arbitrary Patch Deletion
  • CVE-2025-66252: Infinite Loop Denial of Service
##

CVE-2025-66261(CVSS UNKNOWN)

EPSS: 0.93%

updated 2025-11-26T03:30:28

2 posts

Unauthenticated OS Command Injection (restore_settings.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform URL-decoded name parameter passed to exec() allows remote code execution. The `/var/tdf/restore_settings.php` endpoint passes user-controlled `$_GET["name"]` parameter through `u

cR0w@infosec.exchange at 2025-11-26T15:28:41.000Z ##

Go hack more radio shit.

abdulmhsblog.com/posts/webfmvu

  • CVE-2025-66259: Authenticated Root RCE (main_ok.php)
  • CVE-2025-66253: Unauthenticated OS Command Injection (Upgrade)
  • CVE-2025-66261: Unauthenticated OS Command Injection (Restore)
  • CVE-2025-66262: Arbitrary File Overwrite (Tar Path Traversal)
  • CVE-2025-66250: Unrestricted File Upload (Status)
  • CVE-2025-66255: Unsigned Firmware Upload
  • CVE-2025-66256: Unrestricted Patch Upload
  • CVE-2025-66251: Path Traversal File Deletion
  • CVE-2025-66254: Arbitrary File Deletion (Upgrade)
  • CVE-2025-66263: Arbitrary File Read (Null Byte Injection)
  • CVE-2025-66260: SQL Injection
  • CVE-2025-66258: Stored XSS via XML Injection
  • CVE-2025-66257: Arbitrary Patch Deletion
  • CVE-2025-66252: Infinite Loop Denial of Service
##

jos1264@social.skynetcloud.site at 2025-11-26T05:05:02.000Z ##

CVE-2025-66261 - Unauthenticated OS Command Injection (restore_settings.php) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66259(CVSS UNKNOWN)

EPSS: 0.36%

updated 2025-11-26T03:30:28

2 posts

Authenticated Root Remote Code Execution via improrer user input filtering in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform in main_ok.php user supplied data/hour/time is passed directly into date shell command

cR0w@infosec.exchange at 2025-11-26T15:28:41.000Z ##

Go hack more radio shit.

abdulmhsblog.com/posts/webfmvu

  • CVE-2025-66259: Authenticated Root RCE (main_ok.php)
  • CVE-2025-66253: Unauthenticated OS Command Injection (Upgrade)
  • CVE-2025-66261: Unauthenticated OS Command Injection (Restore)
  • CVE-2025-66262: Arbitrary File Overwrite (Tar Path Traversal)
  • CVE-2025-66250: Unrestricted File Upload (Status)
  • CVE-2025-66255: Unsigned Firmware Upload
  • CVE-2025-66256: Unrestricted Patch Upload
  • CVE-2025-66251: Path Traversal File Deletion
  • CVE-2025-66254: Arbitrary File Deletion (Upgrade)
  • CVE-2025-66263: Arbitrary File Read (Null Byte Injection)
  • CVE-2025-66260: SQL Injection
  • CVE-2025-66258: Stored XSS via XML Injection
  • CVE-2025-66257: Arbitrary Patch Deletion
  • CVE-2025-66252: Infinite Loop Denial of Service
##

jos1264@social.skynetcloud.site at 2025-11-26T05:05:02.000Z ##

CVE-2025-66259 - Authenticated Root Remote Code Execution through improper filtering of HTTP post request parameters cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66266(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-26T03:30:28

2 posts

The RupsMon.exe service executable in UPSilon 2000 has insecure permissions, allowing the 'Everyone' group Full Control. A local attacker can replace the executable with a malicious binary to execute code with SYSTEM privileges or simply change the config path of the service to a command; starting and stopping the service to immediately achieve code execution and privilege escalation

jos1264@social.skynetcloud.site at 2025-11-26T05:05:03.000Z ##

CVE-2025-66266 - Insecure SYSTEM Service Permissions in UPSilon2000V6.0 (RupsMon.exe) leading to trivial Local Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-26T04:50:03.000Z ##

CVE-2025-66266 - Insecure SYSTEM Service Permissions in UPSilon2000V6.0 (RupsMon.exe) leading to trivial Local Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66269(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-11-26T03:30:28

1 posts

The RupsMon and USBMate services in UPSilon 2000 run with SYSTEM privileges and contain unquoted service paths. This allows a local attacker to perform path interception and escalate privileges if they have write permissions to the directories proceeding that of which the real service executables live in

jos1264@social.skynetcloud.site at 2025-11-26T04:50:03.000Z ##

CVE-2025-66269 - Unquoted Service Path in UPSilon2000V6.0(RupsMon and USBMate) running as SYSTEM cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12848(CVSS UNKNOWN)

EPSS: 0.07%

updated 2025-11-26T03:30:28

1 posts

Webform Multiple File Upload module for Drupal 7.x contains a cross-site scripting (XSS) vulnerability in the file name renderer. An unauthenticated attacker can exploit this vulnerability by uploading a file with a malicious filename containing JavaScript code (e.g., "<img src=1 onerror=alert(document.domain)>") to a Webform node with a Multifile field where file type validation is disabled. This

jos1264@social.skynetcloud.site at 2025-11-26T04:50:02.000Z ##

CVE-2025-12848 - XSS vulnerability when rendering filename in Webform Multiform cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66265(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-11-26T03:30:28

1 posts

CMService.exe creates the C:\\usr directory and subdirectories with insecure permissions, granting write access to all authenticated users. This allows attackers to replace configuration files (such as snmp.conf) or hijack DLLs to escalate privileges.

jos1264@social.skynetcloud.site at 2025-11-26T04:50:02.000Z ##

CVE-2025-66265 - Insecure permissions in configuration directory (C:\\usr) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66251(CVSS UNKNOWN)

EPSS: 0.17%

updated 2025-11-26T03:30:27

1 posts

Unauthenticated Path Traversal with Arbitrary File Deletion in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform The deletehidden parameter allows path traversal deletion of arbitrary .tgz files.

cR0w@infosec.exchange at 2025-11-26T15:28:41.000Z ##

Go hack more radio shit.

abdulmhsblog.com/posts/webfmvu

  • CVE-2025-66259: Authenticated Root RCE (main_ok.php)
  • CVE-2025-66253: Unauthenticated OS Command Injection (Upgrade)
  • CVE-2025-66261: Unauthenticated OS Command Injection (Restore)
  • CVE-2025-66262: Arbitrary File Overwrite (Tar Path Traversal)
  • CVE-2025-66250: Unrestricted File Upload (Status)
  • CVE-2025-66255: Unsigned Firmware Upload
  • CVE-2025-66256: Unrestricted Patch Upload
  • CVE-2025-66251: Path Traversal File Deletion
  • CVE-2025-66254: Arbitrary File Deletion (Upgrade)
  • CVE-2025-66263: Arbitrary File Read (Null Byte Injection)
  • CVE-2025-66260: SQL Injection
  • CVE-2025-66258: Stored XSS via XML Injection
  • CVE-2025-66257: Arbitrary Patch Deletion
  • CVE-2025-66252: Infinite Loop Denial of Service
##

CVE-2025-66252(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-11-26T03:30:27

1 posts

Infinite Loop Denial of Service via Failed File Deletion in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform Infinite loop when unlink() fails in status_contents.php causing DoS. Due to the fact that the unlink operation is done in a while loop; if an immutable file is specified or otherwi

cR0w@infosec.exchange at 2025-11-26T15:28:41.000Z ##

Go hack more radio shit.

abdulmhsblog.com/posts/webfmvu

  • CVE-2025-66259: Authenticated Root RCE (main_ok.php)
  • CVE-2025-66253: Unauthenticated OS Command Injection (Upgrade)
  • CVE-2025-66261: Unauthenticated OS Command Injection (Restore)
  • CVE-2025-66262: Arbitrary File Overwrite (Tar Path Traversal)
  • CVE-2025-66250: Unrestricted File Upload (Status)
  • CVE-2025-66255: Unsigned Firmware Upload
  • CVE-2025-66256: Unrestricted Patch Upload
  • CVE-2025-66251: Path Traversal File Deletion
  • CVE-2025-66254: Arbitrary File Deletion (Upgrade)
  • CVE-2025-66263: Arbitrary File Read (Null Byte Injection)
  • CVE-2025-66260: SQL Injection
  • CVE-2025-66258: Stored XSS via XML Injection
  • CVE-2025-66257: Arbitrary Patch Deletion
  • CVE-2025-66252: Infinite Loop Denial of Service
##

CVE-2025-64657
(9.8 CRITICAL)

EPSS: 0.09%

updated 2025-11-26T03:30:27

1 posts

Stack-based buffer overflow in Azure Application Gateway allows an unauthorized attacker to elevate privileges over a network.

jos1264@social.skynetcloud.site at 2025-11-26T01:05:03.000Z ##

CVE-2025-64657 - Azure Application Gateway Elevation of Privilege Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66263(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-11-26T03:30:22

2 posts

Unauthenticated Arbitrary File Read via Null Byte Injection in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform Null byte injection in download_setting.php allows reading arbitrary files. The `/var/tdf/download_setting.php` endpoint constructs file paths by concatenating user-controlled `$

cR0w@infosec.exchange at 2025-11-26T15:28:41.000Z ##

Go hack more radio shit.

abdulmhsblog.com/posts/webfmvu

  • CVE-2025-66259: Authenticated Root RCE (main_ok.php)
  • CVE-2025-66253: Unauthenticated OS Command Injection (Upgrade)
  • CVE-2025-66261: Unauthenticated OS Command Injection (Restore)
  • CVE-2025-66262: Arbitrary File Overwrite (Tar Path Traversal)
  • CVE-2025-66250: Unrestricted File Upload (Status)
  • CVE-2025-66255: Unsigned Firmware Upload
  • CVE-2025-66256: Unrestricted Patch Upload
  • CVE-2025-66251: Path Traversal File Deletion
  • CVE-2025-66254: Arbitrary File Deletion (Upgrade)
  • CVE-2025-66263: Arbitrary File Read (Null Byte Injection)
  • CVE-2025-66260: SQL Injection
  • CVE-2025-66258: Stored XSS via XML Injection
  • CVE-2025-66257: Arbitrary Patch Deletion
  • CVE-2025-66252: Infinite Loop Denial of Service
##

jos1264@social.skynetcloud.site at 2025-11-26T05:05:02.000Z ##

CVE-2025-66263 - Unauthenticated Arbitrary File Read via Null Byte Injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66262(CVSS UNKNOWN)

EPSS: 0.07%

updated 2025-11-26T03:30:22

2 posts

Arbitrary File Overwrite via Tar Extraction Path Traversal in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform Tar extraction with -C / allow arbitrary file overwrite via crafted archive. The `restore_mozzi_memories.sh` script extracts user-controlled tar archives with `-C /` flag, deposit

cR0w@infosec.exchange at 2025-11-26T15:28:41.000Z ##

Go hack more radio shit.

abdulmhsblog.com/posts/webfmvu

  • CVE-2025-66259: Authenticated Root RCE (main_ok.php)
  • CVE-2025-66253: Unauthenticated OS Command Injection (Upgrade)
  • CVE-2025-66261: Unauthenticated OS Command Injection (Restore)
  • CVE-2025-66262: Arbitrary File Overwrite (Tar Path Traversal)
  • CVE-2025-66250: Unrestricted File Upload (Status)
  • CVE-2025-66255: Unsigned Firmware Upload
  • CVE-2025-66256: Unrestricted Patch Upload
  • CVE-2025-66251: Path Traversal File Deletion
  • CVE-2025-66254: Arbitrary File Deletion (Upgrade)
  • CVE-2025-66263: Arbitrary File Read (Null Byte Injection)
  • CVE-2025-66260: SQL Injection
  • CVE-2025-66258: Stored XSS via XML Injection
  • CVE-2025-66257: Arbitrary Patch Deletion
  • CVE-2025-66252: Infinite Loop Denial of Service
##

jos1264@social.skynetcloud.site at 2025-11-26T05:05:02.000Z ##

CVE-2025-66262 - Arbitrary File Overwrite via Tar Extraction Path Traversal cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66260(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-11-26T03:30:22

1 posts

PostgreSQL SQL Injection (status_sql.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform SQL injection via sw1 and sw2 parameters in status_sql.php. The `status_sql.php` endpoint constructs SQL UPDATE queries by directly concatenating user-controlled `sw1` and `sw2` parameters without

cR0w@infosec.exchange at 2025-11-26T15:28:41.000Z ##

Go hack more radio shit.

abdulmhsblog.com/posts/webfmvu

  • CVE-2025-66259: Authenticated Root RCE (main_ok.php)
  • CVE-2025-66253: Unauthenticated OS Command Injection (Upgrade)
  • CVE-2025-66261: Unauthenticated OS Command Injection (Restore)
  • CVE-2025-66262: Arbitrary File Overwrite (Tar Path Traversal)
  • CVE-2025-66250: Unrestricted File Upload (Status)
  • CVE-2025-66255: Unsigned Firmware Upload
  • CVE-2025-66256: Unrestricted Patch Upload
  • CVE-2025-66251: Path Traversal File Deletion
  • CVE-2025-66254: Arbitrary File Deletion (Upgrade)
  • CVE-2025-66263: Arbitrary File Read (Null Byte Injection)
  • CVE-2025-66260: SQL Injection
  • CVE-2025-66258: Stored XSS via XML Injection
  • CVE-2025-66257: Arbitrary Patch Deletion
  • CVE-2025-66252: Infinite Loop Denial of Service
##

CVE-2025-66256(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-11-26T03:30:22

1 posts

Unauthenticated Arbitrary File Upload (patch_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform Unrestricted file upload in patch_contents.php allows uploading malicious files. The `/var/tdf/patch_contents.php` endpoint allows unauthenticated arbitrary file uploads without

cR0w@infosec.exchange at 2025-11-26T15:28:41.000Z ##

Go hack more radio shit.

abdulmhsblog.com/posts/webfmvu

  • CVE-2025-66259: Authenticated Root RCE (main_ok.php)
  • CVE-2025-66253: Unauthenticated OS Command Injection (Upgrade)
  • CVE-2025-66261: Unauthenticated OS Command Injection (Restore)
  • CVE-2025-66262: Arbitrary File Overwrite (Tar Path Traversal)
  • CVE-2025-66250: Unrestricted File Upload (Status)
  • CVE-2025-66255: Unsigned Firmware Upload
  • CVE-2025-66256: Unrestricted Patch Upload
  • CVE-2025-66251: Path Traversal File Deletion
  • CVE-2025-66254: Arbitrary File Deletion (Upgrade)
  • CVE-2025-66263: Arbitrary File Read (Null Byte Injection)
  • CVE-2025-66260: SQL Injection
  • CVE-2025-66258: Stored XSS via XML Injection
  • CVE-2025-66257: Arbitrary Patch Deletion
  • CVE-2025-66252: Infinite Loop Denial of Service
##

CVE-2025-64656
(9.4 CRITICAL)

EPSS: 0.09%

updated 2025-11-26T03:30:21

1 posts

Out-of-bounds read in Application Gateway allows an unauthorized attacker to elevate privileges over a network.

jos1264@social.skynetcloud.site at 2025-11-26T01:05:03.000Z ##

CVE-2025-64656 - Azure Application Gateway Elevation of Privilege Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66264
(0 None)

EPSS: 0.01%

updated 2025-11-26T01:16:10.023000

1 posts

The CMService.exe service runs with SYSTEM privileges and contains an unquoted service path. This allows a local attacker with write privileges to the filesystem to insert a malicious executable in the path, leading to privilege escalation.

jos1264@social.skynetcloud.site at 2025-11-26T04:50:01.000Z ##

CVE-2025-66264 - Unquoted Service path in UPSilon2000V6.0 SYSTEM privilege service cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66255
(0 None)

EPSS: 0.10%

updated 2025-11-26T01:16:08.710000

1 posts

Unauthenticated Arbitrary File Upload (upgrade_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform Missing signature validation allows uploading malicious firmware packages.  The firmware upgrade endpoint in `upgrade_contents.php` accepts arbitrary file uploads without valida

cR0w@infosec.exchange at 2025-11-26T15:28:41.000Z ##

Go hack more radio shit.

abdulmhsblog.com/posts/webfmvu

  • CVE-2025-66259: Authenticated Root RCE (main_ok.php)
  • CVE-2025-66253: Unauthenticated OS Command Injection (Upgrade)
  • CVE-2025-66261: Unauthenticated OS Command Injection (Restore)
  • CVE-2025-66262: Arbitrary File Overwrite (Tar Path Traversal)
  • CVE-2025-66250: Unrestricted File Upload (Status)
  • CVE-2025-66255: Unsigned Firmware Upload
  • CVE-2025-66256: Unrestricted Patch Upload
  • CVE-2025-66251: Path Traversal File Deletion
  • CVE-2025-66254: Arbitrary File Deletion (Upgrade)
  • CVE-2025-66263: Arbitrary File Read (Null Byte Injection)
  • CVE-2025-66260: SQL Injection
  • CVE-2025-66258: Stored XSS via XML Injection
  • CVE-2025-66257: Arbitrary Patch Deletion
  • CVE-2025-66252: Infinite Loop Denial of Service
##

CVE-2025-66254
(0 None)

EPSS: 0.07%

updated 2025-11-26T01:16:08.570000

1 posts

Unauthenticated Arbitrary File Deletion (upgrade_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform The deleteupgrade parameter allows unauthenticated deletion of arbitrary files.  The `deleteupgrade` parameter in `/var/www/upgrade_contents.php` allows unauthenticated delet

cR0w@infosec.exchange at 2025-11-26T15:28:41.000Z ##

Go hack more radio shit.

abdulmhsblog.com/posts/webfmvu

  • CVE-2025-66259: Authenticated Root RCE (main_ok.php)
  • CVE-2025-66253: Unauthenticated OS Command Injection (Upgrade)
  • CVE-2025-66261: Unauthenticated OS Command Injection (Restore)
  • CVE-2025-66262: Arbitrary File Overwrite (Tar Path Traversal)
  • CVE-2025-66250: Unrestricted File Upload (Status)
  • CVE-2025-66255: Unsigned Firmware Upload
  • CVE-2025-66256: Unrestricted Patch Upload
  • CVE-2025-66251: Path Traversal File Deletion
  • CVE-2025-66254: Arbitrary File Deletion (Upgrade)
  • CVE-2025-66263: Arbitrary File Read (Null Byte Injection)
  • CVE-2025-66260: SQL Injection
  • CVE-2025-66258: Stored XSS via XML Injection
  • CVE-2025-66257: Arbitrary Patch Deletion
  • CVE-2025-66252: Infinite Loop Denial of Service
##

CVE-2025-13597
(9.8 CRITICAL)

EPSS: 0.19%

updated 2025-11-26T00:30:31

1 posts

The AI Feeds plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php' file in all versions up to, and including, 1.0.11. This makes it possible for unauthenticated attackers to download arbitrary GitHub repositories and overwrite plugin files on the affected site's server which may make remote code execution possible.

1 repos

https://github.com/d0n601/CVE-2025-13597

jos1264@social.skynetcloud.site at 2025-11-26T01:05:02.000Z ##

CVE-2025-13597 - AI Feeds <= 1.0.11 - Unauthenticated Arbitrary File Upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13595
(9.8 CRITICAL)

EPSS: 0.19%

updated 2025-11-26T00:30:31

1 posts

The CIBELES AI plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php' file in all versions up to, and including, 1.10.8. This makes it possible for unauthenticated attackers to download arbitrary GitHub repositories and overwrite plugin files on the affected site's server which may make remote code execution possible.

1 repos

https://github.com/d0n601/CVE-2025-13595

jos1264@social.skynetcloud.site at 2025-11-26T01:05:02.000Z ##

CVE-2025-13595 - CIBELES AI <= 1.10.8 - Unauthenticated Arbitrary File Upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65952
(0 None)

EPSS: 0.04%

updated 2025-11-25T23:15:48.097000

1 posts

Console is a network used to control Gorilla Tag mods' users and other users on the network. Prior to version 2.8.0, a path traversal vulnerability exists where complicated combinations of backslashes and periods can be used to escape the Gorilla Tag path and write to unwanted directories. This issue has been patched in version 2.8.0.

jos1264@social.skynetcloud.site at 2025-11-26T01:05:02.000Z ##

CVE-2025-65952 - Console is vulnerable to path traversal regarding custom assets cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-41115
(10.0 CRITICAL)

EPSS: 0.02%

updated 2025-11-25T22:16:42.557000

1 posts

SCIM provisioning was introduced in Grafana Enterprise and Grafana Cloud in April to improve how organizations manage users and teams in Grafana by introducing automated user lifecycle management. In Grafana versions 12.x where SCIM provisioning is enabled and configured, a vulnerability in user identity handling allows a malicious or compromised SCIM client to provision a user with a numeric ext

1 repos

https://github.com/Ashwesker/Blackash-CVE-2025-41115

hackmag@infosec.exchange at 2025-11-26T08:00:06.000Z ##

⚪ Grafana fixes critical vulnerability allowing admin impersonation

🗨️ Grafana Labs developers have warned about a critical vulnerability, CVE-2025-41115 (10 out of 10 on the CVSS scale), in Grafana Enterprise. The flaw makes it possible to masquerade a new user as an administrator or another internal account.

🔗 hackmag.com/news/grafana-flaw

#news

##

CVE-2025-59372
(0 None)

EPSS: 0.15%

updated 2025-11-25T22:16:16.690000

2 posts

A path traversal vulnerability has been identified in certain router models. A remote, authenticated attacker could exploit this vulnerability to write files outside the intended directory, potentially affecting device integrity. Refer to the 'Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information.

hackmag at 2025-11-28T15:00:16.424Z ##

⚪ Asus Warns of New Critical Vulnerability in Routers with AiCloud

🗨️ Asus has released firmware updates to fix nine vulnerabilities (CVE-2025-59365, CVE-2025-59366, CVE-2025-59368, CVE-2025-59369, CVE-2025-59370, CVE-2025-59371, CVE-2025-59372, and CVE-2025-12003), including a critical authentication bypass issue in routers with the AiCloud feature enabled.

🔗 hackmag.com/news/cve-2025-59366

##

hackmag@infosec.exchange at 2025-11-28T15:00:16.000Z ##

⚪ Asus Warns of New Critical Vulnerability in Routers with AiCloud

🗨️ Asus has released firmware updates to fix nine vulnerabilities (CVE-2025-59365, CVE-2025-59366, CVE-2025-59368, CVE-2025-59369, CVE-2025-59370, CVE-2025-59371, CVE-2025-59372, and CVE-2025-12003), including a critical authentication bypass issue in routers with the AiCloud feature enabled.

🔗 hackmag.com/news/cve-2025-59366

#news

##

CVE-2025-59369
(0 None)

EPSS: 0.10%

updated 2025-11-25T22:16:16.690000

2 posts

A SQL injection vulnerability has been identified in bwdpi. A remote, authenticated attacker could leverage this vulnerability to potentially execute arbitrary SQL queries, leading to unauthorized data access. Refer to the 'Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information.

hackmag at 2025-11-28T15:00:16.424Z ##

⚪ Asus Warns of New Critical Vulnerability in Routers with AiCloud

🗨️ Asus has released firmware updates to fix nine vulnerabilities (CVE-2025-59365, CVE-2025-59366, CVE-2025-59368, CVE-2025-59369, CVE-2025-59370, CVE-2025-59371, CVE-2025-59372, and CVE-2025-12003), including a critical authentication bypass issue in routers with the AiCloud feature enabled.

🔗 hackmag.com/news/cve-2025-59366

##

hackmag@infosec.exchange at 2025-11-28T15:00:16.000Z ##

⚪ Asus Warns of New Critical Vulnerability in Routers with AiCloud

🗨️ Asus has released firmware updates to fix nine vulnerabilities (CVE-2025-59365, CVE-2025-59366, CVE-2025-59368, CVE-2025-59369, CVE-2025-59370, CVE-2025-59371, CVE-2025-59372, and CVE-2025-12003), including a critical authentication bypass issue in routers with the AiCloud feature enabled.

🔗 hackmag.com/news/cve-2025-59366

#news

##

CVE-2025-59371
(0 None)

EPSS: 0.15%

updated 2025-11-25T22:16:16.690000

2 posts

An authentication bypass vulnerability has been identified in the IFTTT integration feature. A remote, authenticated attacker could leverage this vulnerability to potentially gain unauthorized access to the device. This vulnerability does not affect Wi-Fi 7 series models. Refer to the 'Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information.

hackmag at 2025-11-28T15:00:16.424Z ##

⚪ Asus Warns of New Critical Vulnerability in Routers with AiCloud

🗨️ Asus has released firmware updates to fix nine vulnerabilities (CVE-2025-59365, CVE-2025-59366, CVE-2025-59368, CVE-2025-59369, CVE-2025-59370, CVE-2025-59371, CVE-2025-59372, and CVE-2025-12003), including a critical authentication bypass issue in routers with the AiCloud feature enabled.

🔗 hackmag.com/news/cve-2025-59366

##

hackmag@infosec.exchange at 2025-11-28T15:00:16.000Z ##

⚪ Asus Warns of New Critical Vulnerability in Routers with AiCloud

🗨️ Asus has released firmware updates to fix nine vulnerabilities (CVE-2025-59365, CVE-2025-59366, CVE-2025-59368, CVE-2025-59369, CVE-2025-59370, CVE-2025-59371, CVE-2025-59372, and CVE-2025-12003), including a critical authentication bypass issue in routers with the AiCloud feature enabled.

🔗 hackmag.com/news/cve-2025-59366

#news

##

CVE-2025-59365
(0 None)

EPSS: 0.04%

updated 2025-11-25T22:16:16.690000

2 posts

A stack buffer overflow vulnerability has been identified in certain router models. An authenticated attacker may trigger this vulnerability by sending a crafted request, potentially impacting the availability of the device. Refer to the ' Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information.

hackmag at 2025-11-28T15:00:16.424Z ##

⚪ Asus Warns of New Critical Vulnerability in Routers with AiCloud

🗨️ Asus has released firmware updates to fix nine vulnerabilities (CVE-2025-59365, CVE-2025-59366, CVE-2025-59368, CVE-2025-59369, CVE-2025-59370, CVE-2025-59371, CVE-2025-59372, and CVE-2025-12003), including a critical authentication bypass issue in routers with the AiCloud feature enabled.

🔗 hackmag.com/news/cve-2025-59366

##

hackmag@infosec.exchange at 2025-11-28T15:00:16.000Z ##

⚪ Asus Warns of New Critical Vulnerability in Routers with AiCloud

🗨️ Asus has released firmware updates to fix nine vulnerabilities (CVE-2025-59365, CVE-2025-59366, CVE-2025-59368, CVE-2025-59369, CVE-2025-59370, CVE-2025-59371, CVE-2025-59372, and CVE-2025-12003), including a critical authentication bypass issue in routers with the AiCloud feature enabled.

🔗 hackmag.com/news/cve-2025-59366

#news

##

CVE-2025-59368
(0 None)

EPSS: 0.04%

updated 2025-11-25T22:16:16.690000

2 posts

An integer underflow vulnerability has been identified in Aicloud. An authenticated attacker may trigger this vulnerability by sending a crafted request, potentially impacting the availability of the device. Refer to the ' Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information.

hackmag at 2025-11-28T15:00:16.424Z ##

⚪ Asus Warns of New Critical Vulnerability in Routers with AiCloud

🗨️ Asus has released firmware updates to fix nine vulnerabilities (CVE-2025-59365, CVE-2025-59366, CVE-2025-59368, CVE-2025-59369, CVE-2025-59370, CVE-2025-59371, CVE-2025-59372, and CVE-2025-12003), including a critical authentication bypass issue in routers with the AiCloud feature enabled.

🔗 hackmag.com/news/cve-2025-59366

##

hackmag@infosec.exchange at 2025-11-28T15:00:16.000Z ##

⚪ Asus Warns of New Critical Vulnerability in Routers with AiCloud

🗨️ Asus has released firmware updates to fix nine vulnerabilities (CVE-2025-59365, CVE-2025-59366, CVE-2025-59368, CVE-2025-59369, CVE-2025-59370, CVE-2025-59371, CVE-2025-59372, and CVE-2025-12003), including a critical authentication bypass issue in routers with the AiCloud feature enabled.

🔗 hackmag.com/news/cve-2025-59366

#news

##

CVE-2025-59366
(0 None)

EPSS: 0.10%

updated 2025-11-25T22:16:16.690000

4 posts

An authentication-bypass vulnerability exists in AiCloud. This vulnerability can be triggered by an unintended side effect of the Samba functionality, potentially leading to allow execution of specific functions without proper authorization. Refer to the Security Update for ASUS Router Firmware section on the ASUS Security Advisory for more information.

hackmag at 2025-11-28T15:00:16.424Z ##

⚪ Asus Warns of New Critical Vulnerability in Routers with AiCloud

🗨️ Asus has released firmware updates to fix nine vulnerabilities (CVE-2025-59365, CVE-2025-59366, CVE-2025-59368, CVE-2025-59369, CVE-2025-59370, CVE-2025-59371, CVE-2025-59372, and CVE-2025-12003), including a critical authentication bypass issue in routers with the AiCloud feature enabled.

🔗 hackmag.com/news/cve-2025-59366

##

hackmag@infosec.exchange at 2025-11-28T15:00:16.000Z ##

⚪ Asus Warns of New Critical Vulnerability in Routers with AiCloud

🗨️ Asus has released firmware updates to fix nine vulnerabilities (CVE-2025-59365, CVE-2025-59366, CVE-2025-59368, CVE-2025-59369, CVE-2025-59370, CVE-2025-59371, CVE-2025-59372, and CVE-2025-12003), including a critical authentication bypass issue in routers with the AiCloud feature enabled.

🔗 hackmag.com/news/cve-2025-59366

#news

##

beyondmachines1@infosec.exchange at 2025-11-27T08:01:31.000Z ##

ASUS reports vulnerabilities in MyASUS application and router firmware

ASUS released security patches addressing multiple vulnerabilities in their MyASUS application and router firmware, including a critical remote code execution flaw (CVE-2025-59366) in routers and a local privilege escalation issue (CVE-2025-59373) in the System Control Interface Service.

**For ASUS routers, update firmware and for end-of-life models that can't be updated, disable all internet-accessible services (AiCloud, remote WAN access, port forwarding, DDNS, VPN server, DMZ, FTP) and use strong unique passwords. For MyASUS software, update to the latest patched version (3.1.48.0 for x64 or 4.2.48.0 for ARM) through Windows Update or download directly from the ASUS support site.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

jbhall56@infosec.exchange at 2025-11-26T13:43:54.000Z ##

The CVE-2025-59366 vulnerability "can be triggered by an unintended side effect of the Samba functionality, potentially leading to allow execution of specific functions without proper authorization." bleepingcomputer.com/news/secu

##

CVE-2025-59370
(0 None)

EPSS: 0.52%

updated 2025-11-25T22:16:16.690000

2 posts

A command injection vulnerability has been identified in bwdpi. A remote, authenticated attacker could leverage this vulnerability to potentially execute arbitrary commands, leading to the device executing unintended instructions. Refer to the 'Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information.

hackmag at 2025-11-28T15:00:16.424Z ##

⚪ Asus Warns of New Critical Vulnerability in Routers with AiCloud

🗨️ Asus has released firmware updates to fix nine vulnerabilities (CVE-2025-59365, CVE-2025-59366, CVE-2025-59368, CVE-2025-59369, CVE-2025-59370, CVE-2025-59371, CVE-2025-59372, and CVE-2025-12003), including a critical authentication bypass issue in routers with the AiCloud feature enabled.

🔗 hackmag.com/news/cve-2025-59366

##

hackmag@infosec.exchange at 2025-11-28T15:00:16.000Z ##

⚪ Asus Warns of New Critical Vulnerability in Routers with AiCloud

🗨️ Asus has released firmware updates to fix nine vulnerabilities (CVE-2025-59365, CVE-2025-59366, CVE-2025-59368, CVE-2025-59369, CVE-2025-59370, CVE-2025-59371, CVE-2025-59372, and CVE-2025-12003), including a critical authentication bypass issue in routers with the AiCloud feature enabled.

🔗 hackmag.com/news/cve-2025-59366

#news

##

CVE-2025-12003
(0 None)

EPSS: 0.20%

updated 2025-11-25T22:16:16.690000

2 posts

A path traversal vulnerability has been identified in WebDAV, which may allow unauthenticated remote attackers to impact the integrity of the device. Refer to the ' Security Update for ASUS Router Firmware' section on the ASUS Security Advisory for more information.

hackmag at 2025-11-28T15:00:16.424Z ##

⚪ Asus Warns of New Critical Vulnerability in Routers with AiCloud

🗨️ Asus has released firmware updates to fix nine vulnerabilities (CVE-2025-59365, CVE-2025-59366, CVE-2025-59368, CVE-2025-59369, CVE-2025-59370, CVE-2025-59371, CVE-2025-59372, and CVE-2025-12003), including a critical authentication bypass issue in routers with the AiCloud feature enabled.

🔗 hackmag.com/news/cve-2025-59366

##

hackmag@infosec.exchange at 2025-11-28T15:00:16.000Z ##

⚪ Asus Warns of New Critical Vulnerability in Routers with AiCloud

🗨️ Asus has released firmware updates to fix nine vulnerabilities (CVE-2025-59365, CVE-2025-59366, CVE-2025-59368, CVE-2025-59369, CVE-2025-59370, CVE-2025-59371, CVE-2025-59372, and CVE-2025-12003), including a critical authentication bypass issue in routers with the AiCloud feature enabled.

🔗 hackmag.com/news/cve-2025-59366

#news

##

CVE-2025-58360
(8.2 HIGH)

EPSS: 7.96%

updated 2025-11-25T22:16:16.690000

3 posts

GeoServer is an open source server that allows users to share and edit geospatial data. From version 2.26.0 to before 2.26.2 and before 2.25.6, an XML External Entity (XXE) vulnerability was identified. The application accepts XML input through a specific endpoint /geoserver/wms operation GetMap. However, this input is not sufficiently sanitized or restricted, allowing an attacker to define extern

Nuclei template

2 repos

https://github.com/quyenheu/CVE-2025-58360

https://github.com/Ashwesker/Blackash-CVE-2025-58360

_r_netsec at 2025-11-28T14:58:06.309Z ##

CVE-2025-58360: GeoServer XXE Vulnerability Analysis helixguard.ai/blog/CVE-2025-58

##

_r_netsec@infosec.exchange at 2025-11-28T14:58:06.000Z ##

CVE-2025-58360: GeoServer XXE Vulnerability Analysis helixguard.ai/blog/CVE-2025-58

##

jos1264@social.skynetcloud.site at 2025-11-26T01:05:02.000Z ##

CVE-2025-58360 - GeoServer is vulnerable to an Unauthenticated XML External Entities (XXE) attack via WMS GetMap feature cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-33203
(7.6 HIGH)

EPSS: 0.03%

updated 2025-11-25T22:16:16.690000

1 posts

NVIDIA NeMo Agent Toolkit UI for Web contains a vulnerability in the chat API endpoint where an attacker may cause a Server-Side Request Forgery. A successful exploit of this vulnerability may lead to information disclosure and denial of service.

AAKL@infosec.exchange at 2025-11-26T16:25:03.000Z ##

Nvidia posted three advisories yesterday, if you missed them:

- CVE-2025-33203: NVIDIA NeMo Agent Toolkit nvidia.custhelp.com/app/answer

- CVE-2025-33204 and CVE-2025-33205: NVIDIA NeMo Framework nvidia.custhelp.com/app/answer

- Several vulnerabilities affected here: NVIDIA DGX Spark nvidia.custhelp.com/app/answer #Nvidia #infosec #vulnerability

##

CVE-2025-12816
(8.6 HIGH)

EPSS: 0.06%

updated 2025-11-25T22:16:16.690000

1 posts

An interpretation-conflict (CWE-436) vulnerability in node-forge versions 1.3.1 and earlier enables unauthenticated attackers to craft ASN.1 structures to desynchronize schema validations, yielding a semantic divergence that may bypass downstream cryptographic verifications and security decisions.

CVE-2025-64064
(8.8 HIGH)

EPSS: 0.03%

updated 2025-11-25T21:32:13

1 posts

Primakon Pi Portal 1.0.18 /api/v2/pp_users endpoint fails to adequately check user permissions before processing a PATCH request to modify the PP_SECURITY_PROFILE_ID. Because of weak access controls any low level user can use this API and change their permission to Administrator by using PP_SECURITY_PROFILE_ID=2 inside body of request and escalate privileges.

jos1264@social.skynetcloud.site at 2025-11-26T01:05:01.000Z ##

CVE-2025-64064 - Primakon Pi Portal Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-33187
(9.4 CRITICAL)

EPSS: 0.01%

updated 2025-11-25T18:32:29

3 posts

NVIDIA DGX Spark GB10 contains a vulnerability in SROOT, where an attacker could use privileged access to gain access to SoC protected areas. A successful exploit of this vulnerability might lead to code execution, information disclosure, data tampering, denial of service, or escalation of privileges.

technadu at 2025-11-28T08:45:38.459Z ##

NVIDIA has released a critical DGX Spark firmware update addressing 14 vulnerabilities - including CVE-2025-33187 (CVSS 9.3), which enables malicious code execution and access to protected SoC regions.

Firmware flaws in AI workstations can impact model integrity, training data, and system stability.

Organizations using DGX Spark should patch immediately.

Source: cybersecuritynews.com/nvidia-d

What’s your view on firmware security in AI-focused hardware?
Follow us for more analysis.

##

technadu@infosec.exchange at 2025-11-28T08:45:38.000Z ##

NVIDIA has released a critical DGX Spark firmware update addressing 14 vulnerabilities - including CVE-2025-33187 (CVSS 9.3), which enables malicious code execution and access to protected SoC regions.

Firmware flaws in AI workstations can impact model integrity, training data, and system stability.

Organizations using DGX Spark should patch immediately.

Source: cybersecuritynews.com/nvidia-d

What’s your view on firmware security in AI-focused hardware?
Follow us for more analysis.

#infosec #NVIDIA #DGXSpark #CVE #AIsecurity #firmwaresecurity #patchnow #securityupdate

##

beyondmachines1@infosec.exchange at 2025-11-27T09:01:31.000Z ##

NVIDIA releases security update for DGX Spark AI computing platform, patches at least one critical flaw

NVIDIA released a security update (OTA0) for its DGX Spark GB10 AI platform to patch 14 vulnerabilities in SROOT firmware, including a critical flaw (CVE-2025-33187) that could allow privileged attackers to access protected SoC areas and execute code. The vulnerabilities enable code execution, privilege escalation, information disclosure, and denial of service attacks on systems running DGX OS versions prior to OTA0.

**If you have NVIDIA DGX Spark GB10 devices, ensure they are isolated from the internet and accessible only from trusted networks. Then immediately download and install the OTA0 update from the NVIDIA DGX site.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-33205
(7.3 HIGH)

EPSS: 0.01%

updated 2025-11-25T18:32:29

1 posts

NVIDIA NeMo framework contains a vulnerability in a predefined variable, where an attacker could cause inclusion of functionality from an untrusted control sphere by use of a predefined variable. A successful exploit of this vulnerability may lead to code execution.

AAKL@infosec.exchange at 2025-11-26T16:25:03.000Z ##

Nvidia posted three advisories yesterday, if you missed them:

- CVE-2025-33203: NVIDIA NeMo Agent Toolkit nvidia.custhelp.com/app/answer

- CVE-2025-33204 and CVE-2025-33205: NVIDIA NeMo Framework nvidia.custhelp.com/app/answer

- Several vulnerabilities affected here: NVIDIA DGX Spark nvidia.custhelp.com/app/answer #Nvidia #infosec #vulnerability

##

CVE-2025-33204
(7.8 HIGH)

EPSS: 0.02%

updated 2025-11-25T18:32:29

1 posts

NVIDIA NeMo Framework for all platforms contains a vulnerability in the NLP and LLM components, where malicious data created by an attacker could cause code injection. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.

AAKL@infosec.exchange at 2025-11-26T16:25:03.000Z ##

Nvidia posted three advisories yesterday, if you missed them:

- CVE-2025-33203: NVIDIA NeMo Agent Toolkit nvidia.custhelp.com/app/answer

- CVE-2025-33204 and CVE-2025-33205: NVIDIA NeMo Framework nvidia.custhelp.com/app/answer

- Several vulnerabilities affected here: NVIDIA DGX Spark nvidia.custhelp.com/app/answer #Nvidia #infosec #vulnerability

##

CVE-2025-59373(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-11-25T03:30:20

2 posts

A local privilege escalation vulnerability exists in the restore mechanism of ASUS System Control Interface. It can be triggered when an unprivileged actor copies files without proper validation into protected system paths, potentially leading to arbitrary files being executed as SYSTEM. For more information, please refer to section Security Update for MyAsus in the ASUS Security Advisory.

beyondmachines1@infosec.exchange at 2025-11-27T08:01:31.000Z ##

ASUS reports vulnerabilities in MyASUS application and router firmware

ASUS released security patches addressing multiple vulnerabilities in their MyASUS application and router firmware, including a critical remote code execution flaw (CVE-2025-59366) in routers and a local privilege escalation issue (CVE-2025-59373) in the System Control Interface Service.

**For ASUS routers, update firmware and for end-of-life models that can't be updated, disable all internet-accessible services (AiCloud, remote WAN access, port forwarding, DDNS, VPN server, DMZ, FTP) and use strong unique passwords. For MyASUS software, update to the latest patched version (3.1.48.0 for x64 or 4.2.48.0 for ARM) through Windows Update or download directly from the ASUS support site.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

technadu@infosec.exchange at 2025-11-26T11:47:12.000Z ##

ASUS has patched a high-severity local privilege escalation flaw (CVE-2025-59373) in MyASUS that allowed elevation to NT AUTHORITY/SYSTEM via the System Control Interface Service. Patch now shipped through Windows Update with updated versions for x64 and ARM.

Full details:
technadu.com/asus-fixes-high-s

#infosec #vulnerability #ASUS #WindowsSecurity #patchmanagement #CVE2025

##

CVE-2025-9900
(8.8 HIGH)

EPSS: 0.03%

updated 2025-11-24T21:30:58

1 posts

A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a deni

bytex64@awesome.garden at 2025-11-26T06:41:22.000Z ##

To be a little more specific about the problem I'm interested in solving, this is a potential building block for an image processing pipeline for ActivityPub software. Mastodon uses ImageMagick, which is an old and well tested image manipulation tool, but it's only as sandboxed as the Mastodon server itself. Any vulnerability in ImageMagick leaves an attacker in a position to do anything the Mastodon server can do. That's an uncomfortable place to be because image library compromise isn't an outlandish possibility. It has happened a lot (check out this recent libtiff CVE: nvd.nist.gov/vuln/detail/CVE-2). And I don't mean to say their developers are bad at what they do. Images are complex and this is a really hard problem!

##

CVE-2025-7425
(7.8 HIGH)

EPSS: 0.04%

updated 2025-11-22T03:31:17

1 posts

A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.

linux@activitypub.awakari.com at 2025-11-27T15:31:23.000Z ## Ubuntu 20.04 LTS: libxml2 Denial of Service Fix USN-7852-2 CVE-2025-7425 libxml2 could be made to crash or run programs if it opened a specially crafted file.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-61757
(9.8 CRITICAL)

EPSS: 60.96%

updated 2025-11-21T21:30:16

1 posts

Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: REST WebServices). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Identity Manager. Successful attacks of this vulnerability can result in takeover of Identity Manager. CVSS 3.1 Base

Nuclei template

2 repos

https://github.com/Jinxia62/Oracle-Identity-Manager-CVE-2025-61757

https://github.com/Ashwesker/Blackash-CVE-2025-61757

CVE-2025-11001
(7.0 None)

EPSS: 0.38%

updated 2025-11-20T00:31:21

3 posts

7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this product is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of symbolic links in ZIP files. Craf

6 repos

https://github.com/mbanyamer/CVE-2025-11001---7-Zip

https://github.com/shalevo13/Se7enSlip

https://github.com/pacbypass/CVE-2025-11001

https://github.com/ranasen-rat/CVE-2025-11001

https://github.com/lastvocher/7zip-CVE-2025-11001

https://github.com/Ashwesker/Blackash-CVE-2025-11001

Lautaro_Ferrero@mastodon.social at 2025-11-26T19:37:11.000Z ##

Exploit PoC para una vulnerabilidad en 7-Zip (CVE-2025-11001)
blog.elhacker.net/2025/11/expl

##

3ncr1pt4d0@mast.lat at 2025-11-26T00:27:39.000Z ##

🧩 3️⃣ Vulnerabilidad crítica en 7-Zip: hackers la están explotando ahora.

Una falla grave en el popular programa de compresión 7-Zip (CVE-2025-11001) permite a atacantes ejecutar código de forma remota cuando un usuario descomprime un archivo ZIP malicioso.

El problema radica en cómo 7-Zip maneja enlaces simbólicos (symlinks): un ZIP confeccionado puede hacer que el programa acceda a carpetas no deseadas y ejecute código con permisos elevados.

La vulnerabilidad afecta a todas las versiones anteriores a la 25.00 (es decir, versiones usadas desde 21.02 hasta 24.09).

Ya existe un exploit de prueba de concepto (PoC) público, lo que facilita que delincuentes lo usen en ataques reales.

Aunque 7-Zip lanzó el parche en julio de 2025, muchos sistemas siguen sin actualizarlo: la recomendación urgente es que actualices a la versión 25.00 o superior lo antes posible.

🔒 ¿Herramienta de compresión útil o puerta de entrada para malware?

#Privacidad #Ciberseguridad #7Zip #Vulnerabilidad #Actualiza

thehackernews.com/2025/11/hack

##

jos1264@social.skynetcloud.site at 2025-11-25T22:15:02.000Z ##

Exploit PoC para una vulnerabilidad en 7-Zip (CVE-2025-11001) blog.elhacker.net/2025/11/expl #vulnerabilidad #7-zip #cve #poc

##

CVE-2025-37899
(7.8 HIGH)

EPSS: 0.01%

updated 2025-11-19T15:32:29

1 posts

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in session logoff The sess->user object can currently be in use by another thread, for example if another connection has sent a session setup request to bind to the session being free'd. The handler for that connection could be in the smb2_sess_setup function which makes use of sess->user.

2 repos

https://github.com/SeanHeelan/o3_finds_cve-2025-37899

https://github.com/vett3x/SMB-LINUX-CVE-2025-37899

lascapi@lascapi.fr at 2025-11-26T08:12:00.000Z ##

Accessibilité et design

#NotesHebdo

#accessibilité #design #LLM #NotesHebdo #opensource #security

lascapi.fr/blog/2025/11/26/acc

##

CVE-2025-48593
(8.0 HIGH)

EPSS: 0.03%

updated 2025-11-18T12:31:19

1 posts

In bta_hf_client_cb_init of bta_hf_client_main.cc, there is a possible remote code execution due to a use after free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

6 repos

https://github.com/zhuowei/blueshrimp

https://github.com/Ashwesker/Blackash-CVE-2025-48593

https://github.com/skolepc/CVE-2025-48593

https://github.com/ranasen-rat/CVE-2025-48593

https://github.com/logesh-GIT001/CVE-2025-48593

https://github.com/letchupkt/CVE-2025-48593

Android@activitypub.awakari.com at 2025-11-17T07:45:39.000Z ## Android Vulnerability CVE-2025–48593 (No-Click Attack) CVE-2025–48593 Google has released the monthly Android Security Bulletin for November . Any device updated to security patch level 2025–...

#tech #cybersecurity #cyber-security-awareness #data-privacy #technews

Origin | Interest | Match ##

CVE-2025-46817
(7.0 HIGH)

EPSS: 26.29%

updated 2025-11-12T11:34:13.390000

1 posts

Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2.

Nuclei template

2 repos

https://github.com/dwisiswant0/CVE-2025-46817

https://github.com/slayerkkkk/CVE-2025-46817-PoC

linux@activitypub.awakari.com at 2025-11-26T14:26:23.000Z ## Ubuntu 25.10: Valkey Critical Memory Issue USN-7893-1 CVE-2025-46817 Several security issues were fixed in Valkey.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

LLMs@activitypub.awakari.com at 2025-11-28T15:04:38.000Z ## ShadowPad explota vulnerabilidad crítica en WSUS Una vulnerabilidad crítica recientemente parcheada en Windows Server Update Services (WSUS), identificada como CVE-2025-59287, está siendo explot...

#Seguridad

Origin | Interest | Match ##

CVE-2024-9680
(9.8 CRITICAL)

EPSS: 24.62%

updated 2025-11-04T00:31:33

1 posts

An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, and Firefox ESR < 115.16.1.

2 repos

https://github.com/PraiseImafidon/Version_Vulnerability_Scanner

https://github.com/tdonaworth/Firefox-CVE-2024-9680

Mozilla@activitypub.awakari.com at 2025-11-26T13:40:07.000Z ## The Twenty-Five Hour Gap: Inside Mozilla’s High-Stakes Race to Patch a Critical Zero-Day Threatening 180 Million Users A critical zero-day vulnerability in Firefox's animation timeline expose...

#CybersecurityUpdate #browser #security #CISA #KEV #CVE-2024-9680 #Firefox #zero-day #Mozilla #security #patch

Origin | Interest | Match ##

Ubuntu@activitypub.awakari.com at 2025-11-26T15:01:52.000Z ## Ubuntu 22.04 LTS: USN-7892-1 H2O Critical Denial of Service CVE-2023-44487 H2O could be made to crash if it received specially crafted network traffic.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

devto_vn_bot@mastodon.maobui.com at 2025-11-28T08:13:34.000Z ##

Cảnh báo lỗ hổng zero-day nghiêm trọng (CVSS 9.8) trong Microsoft SharePoint Server, mã CVE-2023-29357.

Lỗ hổng này cho phép kẻ tấn công giả mạo người dùng và chiếm quyền quản trị mà không cần xác thực. Hiện tại, nó đang bị khai thác tích cực.

Quản trị viên sử dụng SharePoint Server 2016, 2019, và Subscription Edition cần cập nhật bản vá ngay lập tức để bảo vệ hệ thống.

#bảomật #antoànthôngtin #lỗhổng #Microsoft #SharePoint
#security #cybersecurity #vulnerability #zeroday #CVE202329357

https

##

CVE-2025-59821
(6.5 MEDIUM)

EPSS: 0.04%

updated 2025-09-23T19:13:36

1 posts

# Summary A reflected cross-site scripting (XSS) vulnerability exists under certain conditions, using a specially crafter url to view a user profile # Description DNN’s URL/path handling and template rendering can allow specially crafted input to be reflected into a user profile that are returned to the browser. In these cases, the application does not sufficiently neutralize or encode characters

Ubuntu@activitypub.awakari.com at 2025-11-27T20:47:45.000Z ## Ubuntu: GIMP Vulnerability Patch DSA-6065-2 CVE-2025-59821 It was discovered that a buffer overflow in the TGA parser of Krita, a creative application for raster images, could potentially result in...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2023-48733
(6.7 MEDIUM)

EPSS: 0.01%

updated 2025-05-08T18:31:34

1 posts

An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. This allows an OS-resident attacker to bypass Secure Boot.

cR0w@infosec.exchange at 2025-11-26T17:48:42.000Z ##

Not the most confidence-inspiring CVE description.

cve.org/CVERecord?id=CVE-2025-

The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure Boot restrictions. This is an additional repair on top of the incomplete fix for CVE-2023-48733.

##

CVE-2021-32682
(9.8 CRITICAL)

EPSS: 93.47%

updated 2023-01-29T05:02:39

1 posts

### Impact We recently fixed several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with the minimal configuration. ### Patches The issues were addressed in our last release, 2.1.59. ### Workarounds If you can't update to 2.1.59, make sure your connector is not

Nuclei template

hrbrmstr@mastodon.social at 2025-11-27T16:27:26.000Z ##

This is, um, *alot* of coordinated, calculated, automation to see where "elFinder" is.

New CVE/0-Day coming?

Starting the 6-week countdown.

viz.greynoise.io/tags/elfinder

##

CVE-2022-31806
(9.8 CRITICAL)

EPSS: 0.30%

updated 2023-01-27T05:04:35

1 posts

In CODESYS V2 PLCWinNT and Runtime Toolkit 32 in versions prior to V2.4.7.57 password protection is not enabled by default and there is no information or prompt to enable password protection at login in case no password is set at the controller.

beyondmachines1@infosec.exchange at 2025-11-26T10:01:33.000Z ##

Multiple culnerabilities reported in Festo Industrial Control Systems

CISA has issued warnings about two critical vulnerabilities (CVE-2022-31806 and CVE-2022-22515) affecting multiple Festo industrial control systems that ship with password protection disabled by default and allow unauthorized access and configuration file modification.

**This is urgent and important, and the fix is trivial. Ensure all Festo industrial control devices are isolated from the internet and accessible only from trusted networks. Immediately enable password protection on all controllers (disabled by default) and manually configure backups to include password settings.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2022-22515
(8.1 HIGH)

EPSS: 0.08%

updated 2023-01-27T05:01:23

1 posts

A remote, unauthenticated attacker could utilize the control programmer of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.

beyondmachines1@infosec.exchange at 2025-11-26T10:01:33.000Z ##

Multiple culnerabilities reported in Festo Industrial Control Systems

CISA has issued warnings about two critical vulnerabilities (CVE-2022-31806 and CVE-2022-22515) affecting multiple Festo industrial control systems that ship with password protection disabled by default and allow unauthorized access and configuration file modification.

**This is urgent and important, and the fix is trivial. Ensure all Festo industrial control devices are isolated from the internet and accessible only from trusted networks. Immediately enable password protection on all controllers (disabled by default) and manually configure backups to include password settings.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-13086
(0 None)

EPSS: 0.00%

1 posts

N/A

linux@activitypub.awakari.com at 2025-11-27T17:30:26.000Z ## Ubuntu 25.10: OpenVPN Important Access Risk USN-7898-1 CVE-2025-13086 OpenVPN could allow unintended access to network services.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-64344
(0 None)

EPSS: 0.04%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-27T03:10:02.000Z ##

CVE-2025-64344 - Suricata is vulnerable to a stack overflow from unbounded stack allocation in LuaPushStringBuffer cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64332
(0 None)

EPSS: 0.04%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-27T03:10:02.000Z ##

CVE-2025-64332 - Suricata is vulnerable to a stack overflow on larger compressed data cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64331
(0 None)

EPSS: 0.04%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-27T03:10:02.000Z ##

CVE-2025-64331 - Suricata is vulnerable to a stack overflow on large file transfers with http-body-printable cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66270
(0 None)

EPSS: 0.00%

1 posts

N/A

linux@activitypub.awakari.com at 2025-11-26T22:25:29.000Z ## Debian: kdeconnect Critical Impersonation Threat DSA-6063-1 CVE-2025-66270 It was discovered that missing validation of the device ID during handshakes in KDE Connect, a tool to integrate smart pho...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-64334
(0 None)

EPSS: 0.04%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-27T00:20:03.000Z ##

CVE-2025-64334 - Suricata is vulnerable to unbounded memory growth for decompression cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64333
(0 None)

EPSS: 0.04%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-27T00:20:03.000Z ##

CVE-2025-64333 - Suricata is vulnerable to a stack overflow from big content-type cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13084
(0 None)

EPSS: 0.04%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-26T18:05:02.000Z ##

CVE-2025-13084 - Opto 22 groov View Exposure of Sensitive Information Through Metadata cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66022
(0 None)

EPSS: 0.18%

2 posts

N/A

1 repos

https://github.com/wasfyelbaz/CVE-2025-66022

jos1264@social.skynetcloud.site at 2025-11-26T07:10:01.000Z ##

CVE-2025-66022 - FACTION Unauthenticated Custom Extension Upload leads to RCE cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-26T04:50:02.000Z ##

CVE-2025-66022 - FACTION Unauthenticated Custom Extension Upload leads to RCE cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-9558
(0 None)

EPSS: 0.01%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-26T07:00:03.000Z ##

CVE-2025-9558 - Bluetooth: Mesh: Out-of-Bound Write in gen_prov_start cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66025
(0 None)

EPSS: 0.03%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-26T04:50:02.000Z ##

CVE-2025-66025 - Caido Improperly Handles External Links in Markdown cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65957
(0 None)

EPSS: 0.04%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-26T01:05:02.000Z ##

CVE-2025-65957 - Core Bot is Leaking Sensitive Credentials in Logs, Errors, and Messages cvefeed.io/vuln/detail/CVE-202

##

Visit counter For Websites