##
Updated at UTC 2025-12-23T13:39:27.495361
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-37164 | 10.0 | 74.82% | 3 | 2 | template | 2025-12-23T12:30:17 | A remote code execution issue exists in HPE OneView. |
| CVE-2023-52163 | 8.8 | 0.15% | 5 | 0 | 2025-12-23T12:15:44.160000 | Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injectio | |
| CVE-2025-14733 | 9.8 | 31.40% | 8 | 2 | 2025-12-23T11:34:46.317000 | An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remot | |
| CVE-2025-14388 | 9.8 | 0.00% | 1 | 0 | 2025-12-23T10:15:43.673000 | The PhastPress plugin for WordPress is vulnerable to Unauthenticated Arbitrary F | |
| CVE-2025-65857 | 7.5 | 0.00% | 2 | 1 | 2025-12-23T00:30:39 | An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.00080 | |
| CVE-2023-53974 | 7.5 | 0.00% | 2 | 0 | 2025-12-23T00:30:38 | D-Link DSL-124 ME_1.00 contains a configuration file disclosure vulnerability th | |
| CVE-2025-65856 | 9.8 | 0.00% | 1 | 1 | 2025-12-22T22:16:08.360000 | Authentication bypass vulnerability in Xiongmai XM530 IP cameras on Firmware V5. | |
| CVE-2025-68475 | 7.5 | 0.00% | 2 | 0 | 2025-12-22T21:36:56 | Hi Fedify team! 👋 Thank you for your work on Fedify—it's a fantastic library fo | |
| CVE-2025-67289 | 9.6 | 0.00% | 1 | 0 | 2025-12-22T21:15:45.020000 | An arbitrary file upload vulnerability in the Attachments module of Frappe Frame | |
| CVE-2025-67418 | 9.8 | 0.00% | 1 | 0 | 2025-12-22T20:15:45.303000 | ClipBucket 5.5.2 is affected by an improper access control issue where the produ | |
| CVE-2025-67288 | 10.0 | 0.00% | 1 | 0 | 2025-12-22T19:15:49.710000 | An arbitrary file upload vulnerability in Umbraco CMS v16.3.3 allows attackers t | |
| CVE-2025-68613 | 10.0 | 0.22% | 1 | 6 | 2025-12-22T16:19:13 | ### Impact n8n contains a critical Remote Code Execution (RCE) vulnerability in | |
| CVE-2025-12049 | 0 | 0.07% | 1 | 0 | 2025-12-22T05:16:19.120000 | Missing Authentication for Critical Function vulnerability in Sharp Display Solu | |
| CVE-2025-14881 | None | 0.04% | 1 | 0 | 2025-12-20T17:39:03 | Multiple API endpoints allowed access to sensitive files from other users by kno | |
| CVE-2025-63389 | None | 0.25% | 1 | 0 | 2025-12-20T05:37:50 | A critical authentication bypass vulnerability exists in Ollama platform's API e | |
| CVE-2025-14761 | 5.3 | 0.02% | 1 | 0 | 2025-12-20T05:31:03 | ## Summary S3 Encryption Client for PHP is an open-source client-side encryptio | |
| CVE-2025-68398 | 9.1 | 0.11% | 1 | 0 | 2025-12-20T05:26:43 | ### Impact It was possible to overwrite Git configuration remotely and override | |
| CVE-2025-14299 | None | 0.06% | 1 | 0 | 2025-12-20T03:31:40 | The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length h | |
| CVE-2025-14300 | None | 0.04% | 1 | 0 | 2025-12-20T03:31:40 | The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper a | |
| CVE-2025-8065 | None | 0.02% | 1 | 0 | 2025-12-20T03:31:40 | A buffer overflow vulnerability exists in the ONVIF XML parser of Tapo C200 V3. | |
| CVE-2025-63390 | 5.3 | 0.05% | 1 | 0 | 2025-12-20T00:31:32 | An authentication bypass vulnerability exists in AnythingLLM v1.8.5 in via the / | |
| CVE-2025-68161 | None | 0.03% | 2 | 0 | 2025-12-19T22:08:03 | The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does | |
| CVE-2025-34437 | 8.8 | 0.10% | 1 | 0 | 2025-12-19T21:31:26 | AVideo versions prior to 20.0 permit any authenticated user to upload comment im | |
| CVE-2025-14964 | 9.8 | 0.08% | 1 | 0 | 2025-12-19T21:30:26 | A vulnerability has been found in TOTOLINK T10 4.1.8cu.5083_B20200521. This affe | |
| CVE-2025-34436 | 8.8 | 0.10% | 1 | 0 | 2025-12-19T21:30:17 | AVideo versions prior to 20.0 allow any authenticated user to upload files into | |
| CVE-2025-66908 | 5.3 | 0.04% | 1 | 0 | 2025-12-19T18:32:25 | Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an improper file t | |
| CVE-2025-65568 | 7.5 | 0.04% | 1 | 0 | 2025-12-19T18:32:20 | A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp | |
| CVE-2025-65565 | 7.5 | 0.05% | 1 | 0 | 2025-12-19T18:32:19 | A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp | |
| CVE-2025-65564 | 7.5 | 0.05% | 1 | 0 | 2025-12-19T18:32:19 | A denial-of-service vulnerability exists in the omec-upf (upf-epc-pfcpiface) in | |
| CVE-2025-52692 | 8.8 | 0.02% | 1 | 0 | 2025-12-19T18:31:18 | Successful exploitation of the vulnerability could allow an attacker with local | |
| CVE-2025-65567 | 7.5 | 0.04% | 1 | 0 | 2025-12-19T18:15:50.570000 | A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp | |
| CVE-2025-41697 | 6.8 | 0.02% | 1 | 0 | 2025-12-19T18:12:09.187000 | An attacker can use an undocumented UART port on the PCB as a side-channel to | |
| CVE-2025-14878 | 9.8 | 0.05% | 2 | 0 | 2025-12-19T18:00:54.283000 | A security flaw has been discovered in Tenda WH450 1.0.0.18. This impacts an unk | |
| CVE-2025-64469 | 7.8 | 0.01% | 1 | 0 | 2025-12-19T18:00:54.283000 | There is a stack-based buffer overflow vulnerability in NI LabVIEW in LVResFile: | |
| CVE-2025-64466 | 7.8 | 0.01% | 1 | 0 | 2025-12-19T18:00:54.283000 | There is an out of bounds read vulnerability in NI LabVIEW in lvre!ExecPostedPro | |
| CVE-2025-66909 | 7.5 | 0.08% | 1 | 0 | 2025-12-19T18:00:18.330000 | Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an image decompres | |
| CVE-2025-14882 | 0 | 0.04% | 1 | 0 | 2025-12-19T18:00:18.330000 | An API endpoint allowed access to sensitive files from other users by knowing th | |
| CVE-2025-1885 | 5.4 | 0.03% | 1 | 0 | 2025-12-19T18:00:18.330000 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Restajet In | |
| CVE-2025-11747 | 6.4 | 0.03% | 1 | 0 | 2025-12-19T18:00:18.330000 | The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site | |
| CVE-2025-66521 | 6.3 | 0.02% | 1 | 0 | 2025-12-19T18:00:18.330000 | A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com | |
| CVE-2025-67843 | 8.3 | 0.23% | 1 | 0 | 2025-12-19T18:00:18.330000 | A Server-Side Template Injection (SSTI) vulnerability in the MDX Rendering Engin | |
| CVE-2025-11774 | 8.2 | 0.03% | 2 | 0 | 2025-12-19T18:00:18.330000 | Improper Neutralization of Special Elements used in an OS Command ('OS Command I | |
| CVE-2025-14900 | 4.7 | 0.03% | 1 | 0 | 2025-12-19T18:00:18.330000 | A security vulnerability has been detected in CodeAstro Real Estate Management S | |
| CVE-2025-14908 | 6.3 | 0.06% | 1 | 0 | 2025-12-19T18:00:18.330000 | A security flaw has been discovered in JeecgBoot up to 3.9.0. The affected eleme | |
| CVE-2025-14899 | 4.7 | 0.03% | 1 | 0 | 2025-12-19T18:00:18.330000 | A weakness has been identified in CodeAstro Real Estate Management System 1.0. T | |
| CVE-2025-13427 | 0 | 0.12% | 1 | 0 | 2025-12-19T18:00:18.330000 | An authentication bypass vulnerability in Google Cloud Dialogflow CX Messenger a | |
| CVE-2025-64677 | 8.2 | 0.07% | 1 | 0 | 2025-12-19T18:00:18.330000 | Improper neutralization of input during web page generation ('cross-site scripti | |
| CVE-2025-64676 | 7.2 | 0.11% | 1 | 0 | 2025-12-19T18:00:18.330000 | '.../...//' in Microsoft Purview allows an authorized attacker to execute code o | |
| CVE-2025-64236 | 9.8 | 0.07% | 1 | 0 | 2025-12-19T18:00:18.330000 | Authentication Bypass Using an Alternate Path or Channel vulnerability in Amento | |
| CVE-2025-14896 | 7.5 | 0.03% | 1 | 0 | 2025-12-19T18:00:18.330000 | due to insufficient sanitazation in Vega’s `convert()` function when `safeMode` | |
| CVE-2025-14739 | 0 | 0.01% | 1 | 0 | 2025-12-19T18:00:18.330000 | Access of Uninitialized Pointer vulnerability in TP-Link WR940N and WR941ND allo | |
| CVE-2025-63391 | 7.5 | 0.08% | 1 | 0 | 2025-12-19T18:00:18.330000 | An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api | |
| CVE-2025-41749 | 7.1 | 0.09% | 1 | 0 | 2025-12-19T16:46:12.343000 | An XSS vulnerability in port_util.php can be used by an unauthenticated remote a | |
| CVE-2025-41747 | 7.1 | 0.09% | 1 | 0 | 2025-12-19T16:46:06.333000 | An XSS vulnerability in pxc_vlanIntfCfg.php can be used by an unauthenticated re | |
| CVE-2025-41751 | 7.1 | 0.09% | 1 | 0 | 2025-12-19T16:45:53.940000 | An XSS vulnerability in pxc_portCntr.php can be used by an unauthenticated remot | |
| CVE-2025-1928 | 9.1 | 0.05% | 1 | 0 | 2025-12-19T15:31:25 | Improper Restriction of Excessive Authentication Attempts vulnerability in Resta | |
| CVE-2025-1927 | 7.1 | 0.01% | 1 | 0 | 2025-12-19T12:31:33 | Cross-Site Request Forgery (CSRF) vulnerability in Restajet Information Technolo | |
| CVE-2025-66522 | 6.3 | 0.03% | 1 | 0 | 2025-12-19T09:30:40 | A stored cross-site scripting (XSS) vulnerability exists in the Digital IDs func | |
| CVE-2025-14151 | 6.1 | 0.09% | 1 | 0 | 2025-12-19T09:30:39 | The SlimStat Analytics plugin for WordPress is vulnerable to Stored Cross-Site S | |
| CVE-2025-66520 | 6.3 | 0.03% | 1 | 0 | 2025-12-19T09:30:39 | A stored cross-site scripting (XSS) vulnerability exists in the Portfolio featur | |
| CVE-2025-68490 | None | 0.00% | 1 | 0 | 2025-12-19T06:30:34 | Rejected reason: Not used | |
| CVE-2025-68488 | None | 0.00% | 1 | 0 | 2025-12-19T06:30:34 | Rejected reason: Not used | |
| CVE-2025-68487 | None | 0.00% | 1 | 0 | 2025-12-19T06:30:34 | Rejected reason: Not used | |
| CVE-2025-68491 | 0 | 0.00% | 1 | 0 | 2025-12-19T04:16:02.150000 | Rejected reason: Not used | |
| CVE-2025-68489 | 0 | 0.00% | 1 | 0 | 2025-12-19T04:16:02.017000 | Rejected reason: Not used | |
| CVE-2025-13941 | 8.8 | 0.01% | 1 | 0 | 2025-12-19T03:31:18 | A local privilege escalation vulnerability exists in the Foxit PDF Reader/Editor | |
| CVE-2025-64675 | 8.3 | 0.08% | 1 | 0 | 2025-12-19T00:31:52 | Improper neutralization of input during web page generation ('cross-site scripti | |
| CVE-2025-68382 | 6.5 | 0.04% | 1 | 0 | 2025-12-19T00:31:47 | Out-of-bounds read (CWE-125) allows an unauthenticated remote attacker to perfor | |
| CVE-2025-65037 | 10.0 | 0.10% | 1 | 0 | 2025-12-19T00:31:47 | Improper control of generation of code ('code injection') in Azure Container App | |
| CVE-2025-64663 | 10.0 | 0.08% | 1 | 0 | 2025-12-19T00:31:47 | Custom Question Answering Elevation of Privilege Vulnerability | |
| CVE-2025-34452 | None | 0.38% | 1 | 0 | 2025-12-19T00:31:47 | Streama versions 1.10.0 through 1.10.5 and prior to commit b7c8767 contain a com | |
| CVE-2025-65041 | 10.0 | 0.09% | 2 | 0 | 2025-12-19T00:31:46 | Improper authorization in Microsoft Partner Center allows an unauthorized attack | |
| CVE-2025-68381 | 6.5 | 0.04% | 1 | 0 | 2025-12-19T00:31:46 | Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated | |
| CVE-2025-53000 | None | 0.02% | 1 | 0 | 2025-12-18T22:03:09 | ### Summary On Windows, converting a notebook containing SVG output to a PDF re | |
| CVE-2025-64374 | 10.0 | 0.04% | 1 | 0 | 2025-12-18T21:32:49 | Unrestricted Upload of File with Dangerous Type vulnerability in StylemixThemes | |
| CVE-2025-66923 | 7.2 | 0.12% | 1 | 0 | 2025-12-18T19:52:33.017000 | A Cross-site scripting (XSS) vulnerability in Create/Update Customer(s) in Open | |
| CVE-2025-68434 | 8.8 | 0.08% | 1 | 1 | 2025-12-18T19:45:54.187000 | Open Source Point of Sale (opensourcepos) is a web based point of sale applicati | |
| CVE-2025-67074 | 6.5 | 0.04% | 1 | 0 | 2025-12-18T19:16:34.560000 | A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in | |
| CVE-2025-14837 | 4.7 | 0.04% | 1 | 0 | 2025-12-18T19:16:22.103000 | A vulnerability has been found in ZZCMS 2025. Affected by this issue is the func | |
| CVE-2025-66397 | 8.3 | 0.04% | 1 | 0 | 2025-12-18T19:07:25.637000 | ChurchCRM is an open-source church management system. Prior to version 6.5.3, th | |
| CVE-2025-14764 | 5.3 | 0.01% | 1 | 0 | 2025-12-18T18:50:44 | ## Summary S3 Encryption Client for Go is an open-source client-side encryption | |
| CVE-2025-59374 | 9.8 | 30.46% | 9 | 0 | 2025-12-18T18:31:33 | "UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were | |
| CVE-2025-14884 | 7.2 | 0.19% | 2 | 0 | 2025-12-18T18:30:38 | A vulnerability was detected in D-Link DIR-605 202WWB03. Affected by this issue | |
| CVE-2025-14879 | 9.8 | 0.05% | 2 | 0 | 2025-12-18T18:30:37 | A weakness has been identified in Tenda WH450 1.0.0.18. Affected is an unknown f | |
| CVE-2025-14738 | None | 0.06% | 1 | 0 | 2025-12-18T18:30:37 | Improper authentication vulnerability in TP-Link WA850RE (httpd modules) allows | |
| CVE-2025-14737 | None | 0.42% | 1 | 0 | 2025-12-18T18:30:37 | Command Injection vulnerability in TP-Link WA850RE (httpd modules) allows authen | |
| CVE-2025-68400 | 8.8 | 0.03% | 1 | 0 | 2025-12-18T16:46:12.477000 | ChurchCRM is an open-source church management system. A SQL Injection vulnerabil | |
| CVE-2025-68401 | 4.8 | 0.03% | 1 | 0 | 2025-12-18T16:44:00.020000 | ChurchCRM is an open-source church management system. Prior to version 6.0.0, th | |
| CVE-2025-14763 | 5.3 | 0.01% | 1 | 0 | 2025-12-18T15:47:08 | ## Summary S3 Encryption Client for Java is an open-source client-side encrypti | |
| CVE-2025-64468 | 7.8 | 0.01% | 1 | 0 | 2025-12-18T15:30:51 | There is a use-after-free vulnerability in sentry!sentry_span_set_data() when pa | |
| CVE-2025-13110 | 4.3 | 0.03% | 1 | 0 | 2025-12-18T15:30:51 | The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is | |
| CVE-2025-14437 | 7.5 | 0.06% | 1 | 0 | 2025-12-18T15:30:51 | The Hummingbird Performance plugin for WordPress is vulnerable to Sensitive Info | |
| CVE-2025-65007 | None | 0.04% | 1 | 0 | 2025-12-18T15:30:51 | In WODESYS WD-R608U router (also known as WDR122B V2.0 and WDR28) due to lack of | |
| CVE-2025-64467 | 7.8 | 0.01% | 1 | 0 | 2025-12-18T15:30:45 | There is an out of bounds read vulnerability in NI LabVIEW in LVResFile::FindRsr | |
| CVE-2025-64465 | 7.8 | 0.01% | 1 | 0 | 2025-12-18T15:30:45 | There is an out of bounds read vulnerability in NI LabVIEW in lvre!DataSizeTDR() | |
| CVE-2025-14277 | 4.3 | 0.03% | 1 | 0 | 2025-12-18T15:30:43 | The Prime Slider – Addons for Elementor plugin for WordPress is vulnerable to Se | |
| CVE-2025-46295 | 9.8 | 0.33% | 1 | 0 | 2025-12-18T15:08:06.237000 | Apache Commons Text versions prior to 1.10.0 included interpolation features tha | |
| CVE-2025-68463 | 4.9 | 0.03% | 1 | 0 | 2025-12-18T15:07:42.550000 | Bio.Entrez in Biopython through 186 allows doctype XXE. | |
| CVE-2025-47382 | 7.8 | 0.01% | 1 | 0 | 2025-12-18T15:07:42.550000 | Memory corruption while loading an invalid firmware in boot loader. | |
| CVE-2025-14856 | 6.3 | 0.04% | 1 | 0 | 2025-12-18T15:07:42.550000 | A security vulnerability has been detected in y_project RuoYi up to 4.8.1. The a | |
| CVE-2025-68129 | 6.8 | 0.06% | 1 | 0 | 2025-12-18T15:07:42.550000 | Auth0-PHP is a PHP SDK for Auth0 Authentication and Management APIs. In applicat | |
| CVE-2025-14759 | 5.3 | 0.01% | 1 | 0 | 2025-12-18T15:07:42.550000 | Missing cryptographic key commitment in the Amazon S3 Encryption Client for .NET | |
| CVE-2025-14762 | 5.3 | 0.02% | 1 | 0 | 2025-12-18T15:07:42.550000 | Missing cryptographic key commitment in the AWS SDK for Ruby may allow a user wi | |
| CVE-2022-23851 | 9.8 | 0.05% | 1 | 0 | 2025-12-18T15:07:42.550000 | Netaxis API Orchestrator (APIO) before 0.19.3 allows server side template inject | |
| CVE-2025-14618 | 4.3 | 0.03% | 1 | 0 | 2025-12-18T15:07:18.427000 | The Sweet Energy Efficiency plugin for WordPress is vulnerable to unauthorized a | |
| CVE-2025-40602 | 6.6 | 1.42% | 5 | 2 | 2025-12-18T12:30:33 | A local privilege escalation vulnerability due to insufficient authorization in | |
| CVE-2025-10910 | None | 0.14% | 2 | 0 | 2025-12-18T12:30:33 | A flaw in the binding process of Govee’s cloud platform and devices allows a rem | |
| CVE-2025-68459 | 7.2 | 0.17% | 2 | 0 | 2025-12-18T06:30:19 | RG - AP180, Indoor Wall Plate Wireless AP AP180 series provided by Ruijie Networ | |
| CVE-2025-47372 | 9.0 | 0.02% | 1 | 0 | 2025-12-18T06:30:19 | Memory Corruption when a corrupted ELF image with an oversized file size is read | |
| CVE-2025-68462 | 3.2 | 0.01% | 1 | 0 | 2025-12-18T06:30:19 | Freedombox before 25.17.1 does not set proper permissions for the backups-data d | |
| CVE-2025-47387 | 7.8 | 0.01% | 1 | 0 | 2025-12-18T06:30:19 | Memory Corruption when processing IOCTLs for JPEG data without verification. | |
| CVE-2025-12885 | 6.4 | 0.03% | 1 | 0 | 2025-12-18T03:30:18 | The Embed Any Document – Embed PDF, Word, PowerPoint and Excel Files plugin for | |
| CVE-2025-14841 | 3.3 | 0.01% | 1 | 0 | 2025-12-18T03:30:18 | A flaw has been found in OFFIS DCMTK up to 3.6.9. The impacted element is the fu | |
| CVE-2025-14202 | None | 0.05% | 2 | 0 | 2025-12-18T00:34:16 | A vulnerability in the file upload at bookmark + asset rendering pipeline allows | |
| CVE-2023-53933 | 8.8 | 0.24% | 1 | 0 | 2025-12-18T00:34:16 | Serendipity 2.4.0 contains a remote code execution vulnerability that allows aut | |
| CVE-2025-67172 | 7.2 | 0.27% | 1 | 0 | 2025-12-17T21:31:53 | RiteCMS v3.1.0 was discovered to contain an authenticated remote code execution | |
| CVE-2025-66924 | 6.1 | 0.04% | 1 | 0 | 2025-12-17T21:31:53 | A Cross-site scripting (XSS) vulnerability in Create/Update Item Kit(s) in Open | |
| CVE-2025-65203 | 7.1 | 0.01% | 1 | 0 | 2025-12-17T21:31:53 | KeePassXC-Browser thru 1.9.9.2 autofills or prompts to fill stored credentials i | |
| CVE-2025-67073 | 9.8 | 0.15% | 2 | 0 | 2025-12-17T21:30:56 | A Buffer overflow vulnerability in function fromAdvSetMacMtuWan of bin httpd in | |
| CVE-2025-13326 | 3.9 | 0.01% | 1 | 0 | 2025-12-17T21:30:56 | Mattermost Desktop App versions <6.0.0 fail to enable the Hardened Runtime on th | |
| CVE-2025-20393 | 10.0 | 4.56% | 15 | 5 | 2025-12-17T21:30:47 | Cisco is aware of a potential vulnerability. Cisco is currently investigat | |
| CVE-2025-59718 | 9.8 | 5.95% | 3 | 2 | 2025-12-17T13:54:45.390000 | A improper verification of cryptographic signature vulnerability in Fortinet For | |
| CVE-2025-68154 | 8.1 | 0.07% | 1 | 0 | 2025-12-16T22:37:26 | ## Summary The `fsSize()` function in `systeminformation` is vulnerable to **OS | |
| CVE-2025-68260 | None | 0.02% | 3 | 0 | 2025-12-16T15:30:56 | In the Linux kernel, the following vulnerability has been resolved: rust_binder | |
| CVE-2025-66471 | 7.5 | 0.02% | 1 | 0 | 2025-12-10T16:10:33.500000 | urllib3 is a user-friendly HTTP client library for Python. Starting in version 1 | |
| CVE-2025-59719 | 9.8 | 0.07% | 2 | 0 | 2025-12-09T18:30:52 | An improper verification of cryptographic signature vulnerability in Fortinet Fo | |
| CVE-2025-41746 | 7.1 | 0.09% | 1 | 0 | 2025-12-09T18:30:45 | An XSS vulnerability in pxc_portSecCfg.php can be used by an unauthenticated rem | |
| CVE-2025-41748 | 7.1 | 0.09% | 1 | 0 | 2025-12-09T18:30:44 | An XSS vulnerability in pxc_Dot1xCfg.php can be used by an unauthenticated remot | |
| CVE-2025-41745 | 7.1 | 0.09% | 1 | 0 | 2025-12-09T18:30:44 | An XSS vulnerability in pxc_portCntr2.php can be used by an unauthenticated remo | |
| CVE-2025-41695 | 7.1 | 0.09% | 1 | 0 | 2025-12-09T18:30:44 | An XSS vulnerability in dyn_conn.php can be used by an unauthenticated remote at | |
| CVE-2025-41750 | 7.1 | 0.09% | 1 | 0 | 2025-12-09T18:30:44 | An XSS vulnerability in pxc_PortCfg.php can be used by an unauthenticated remote | |
| CVE-2025-41696 | 4.6 | 0.02% | 1 | 0 | 2025-12-09T18:30:44 | An attacker can use an undocumented UART port on the PCB as a side-channel with | |
| CVE-2025-41752 | 7.1 | 0.09% | 1 | 0 | 2025-12-09T18:30:44 | An XSS vulnerability in pxc_portSfp.php can be used by an unauthenticated remote | |
| CVE-2025-41693 | 4.3 | 0.23% | 1 | 0 | 2025-12-09T18:30:43 | A low privileged remote attacker can use the ssh feature to execute commands dir | |
| CVE-2025-41694 | 6.5 | 0.11% | 1 | 0 | 2025-12-09T18:30:43 | A low privileged remote attacker can run the webshell with an empty command cont | |
| CVE-2025-41692 | 6.8 | 0.02% | 1 | 0 | 2025-12-09T18:30:43 | A high privileged remote attacker with admin privileges for the webUI can brute- | |
| CVE-2025-55182 | 10.0 | 43.43% | 3 | 100 | template | 2025-12-09T16:53:25 | ### Impact There is an unauthenticated remote code execution vulnerability in R |
| CVE-2025-37899 | 7.8 | 0.01% | 2 | 2 | 2025-12-06T22:15:50.277000 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix | |
| CVE-2025-65945 | 7.5 | 0.01% | 1 | 1 | 2025-12-04T22:50:04 | ### Overview An improper signature verification vulnerability exists when using | |
| CVE-2025-66478 | 0 | 0.00% | 1 | 100 | 2025-12-03T18:15:47.200000 | Rejected reason: This CVE is a duplicate of CVE-2025-55182. | |
| CVE-2025-59230 | 7.8 | 8.49% | 1 | 0 | 2025-12-03T13:47:09.720000 | Improper access control in Windows Remote Access Connection Manager allows an au | |
| CVE-2025-34352 | None | 0.02% | 1 | 0 | 2025-12-02T21:31:37 | JumpCloud Remote Assist for Windows versions prior to 0.317.0 include an uninsta | |
| CVE-2025-40300 | None | 0.06% | 1 | 0 | 2025-11-17T18:30:25 | In the Linux kernel, the following vulnerability has been resolved: x86/vmscape | |
| CVE-2025-11953 | 9.8 | 0.49% | 1 | 3 | 2025-11-13T16:25:27 | The Metro Development Server, which is opened by the React Native CLI, binds to | |
| CVE-2025-9242 | 9.8 | 73.45% | 1 | 2 | template | 2025-11-13T15:31:32 | An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remot |
| CVE-2025-12480 | 9.1 | 78.02% | 1 | 0 | template | 2025-11-12T15:32:32 | Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access |
| CVE-2025-59287 | 9.8 | 77.27% | 1 | 21 | template | 2025-11-11T15:32:22 | Deserialization of untrusted data in Windows Server Update Service allows an una |
| CVE-2025-7962 | 7.5 | 0.01% | 1 | 0 | 2025-11-05T20:31:47 | In Jakarta Mail 2.2 it is possible to preform a SMTP Injection by utilizing the | |
| CVE-2025-53057 | 5.9 | 0.09% | 1 | 0 | 2025-11-03T18:32:51 | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Ente | |
| CVE-2025-53066 | 7.5 | 0.09% | 1 | 0 | 2025-11-03T18:31:47 | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Ente | |
| CVE-2025-31324 | 10.0 | 40.17% | 1 | 19 | template | 2025-10-22T00:34:21 | SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper a |
| CVE-2025-23006 | 9.8 | 56.66% | 1 | 0 | 2025-10-22T00:34:17 | Pre-authentication deserialization of untrusted data vulnerability has been iden | |
| CVE-2024-53704 | 9.8 | 93.82% | 1 | 1 | template | 2025-10-22T00:34:16 | An Improper Authentication vulnerability in the SSLVPN authentication mechanism |
| CVE-2023-22518 | 9.1 | 94.38% | 1 | 9 | template | 2025-10-22T00:32:54 | All versions of Confluence Data Center and Server are affected by this unexploit |
| CVE-2025-50165 | 9.8 | 3.84% | 1 | 1 | 2025-08-12T18:31:39 | Untrusted pointer dereference in Microsoft Graphics Component allows an unauthor | |
| CVE-2025-25231 | 7.5 | 10.75% | 1 | 1 | template | 2025-08-11T19:15:27.343000 | Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerabil |
| CVE-2025-24294 | 5.3 | 0.06% | 1 | 0 | 2025-07-15T22:56:20 | A denial of service vulnerability has been discovered in the resolv gem bundled | |
| CVE-2025-30023 | 9.1 | 1.92% | 1 | 0 | 2025-07-11T06:30:36 | The communication protocol used between client and server had a flaw that could | |
| CVE-2025-30026 | None | 0.03% | 1 | 0 | 2025-07-11T06:30:36 | The AXIS Camera Station Server had a flaw that allowed to bypass authentication | |
| CVE-2025-6514 | 9.7 | 0.73% | 1 | 2 | 2025-07-09T18:08:46 | mcp-remote is exposed to OS command injection when connecting to untrusted MCP s | |
| CVE-2025-49146 | 8.2 | 0.01% | 1 | 0 | 2025-06-11T16:17:03 | ### Impact When the PostgreSQL JDBC driver is configured with channel binding se | |
| CVE-2025-5516 | 2.4 | 0.05% | 1 | 0 | 2025-06-06T17:42:29.520000 | A vulnerability, which was classified as problematic, was found in TOTOLINK X200 | |
| CVE-2025-5499 | 7.3 | 0.11% | 1 | 0 | 2025-06-03T15:31:27 | A vulnerability classified as critical has been found in slackero phpwcms up to | |
| CVE-2025-29970 | 7.8 | 0.07% | 2 | 0 | 2025-05-19T14:20:49.300000 | Use after free in Microsoft Brokering File System allows an authorized attacker | |
| CVE-2025-2039 | 4.7 | 0.10% | 1 | 4 | 2025-05-13T20:57:18.117000 | A vulnerability classified as critical has been found in code-projects Blood Ban | |
| CVE-2025-32210 | 6.5 | 0.04% | 1 | 0 | 2025-04-11T15:39:52.920000 | Missing Authorization vulnerability in CreativeMindsSolutions CM Registration an | |
| CVE-2024-44067 | 8.4 | 0.04% | 1 | 0 | 2024-08-20T20:35:34.497000 | The T-Head XuanTie C910 CPU in the TH1520 SoC and the T-Head XuanTie C920 CPU in | |
| CVE-2025-14282 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-66387 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-67745 | 0 | 0.02% | 1 | 0 | N/A | ||
| CVE-2025-63821 | 0 | 0.00% | 1 | 1 | N/A | ||
| CVE-2025-63820 | 0 | 0.00% | 1 | 1 | N/A | ||
| CVE-2025-66029 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2025-68435 | 0 | 0.07% | 2 | 0 | N/A | ||
| CVE-2025-68147 | 0 | 0.03% | 1 | 1 | N/A | ||
| CVE-2025-68399 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2025-68275 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2025-14760 | 0 | 0.02% | 1 | 0 | N/A |
updated 2025-12-23T12:30:17
3 posts
2 repos
@christopherkunz yeah... Rapid7 have a write up, I'd love to know how HPE ended up adding this feature https://www.rapid7.com/blog/post/etr-cve-2025-37164-critical-unauthenticated-rce-affecting-hewlett-packard-enterprise-oneview/
##HPE OneView CVE-2025-37164 worth paying attention to
- Widely used enterprise management software
- HPE added a REST command, executeCommand, which requires no authentication to execute commands. Obviously, this is dumb and now patched out
- Being on OneView allows attacker to access VMware, 3PAR storage etc by design
- Expect exploitation in the wild as it's so simple
- The vulnerability (executeCommand) was introduced around 2020, feels like a vulndoor
Shodan dork: product:"HPE OneView"
##Critical remote code execution flaw reported in HPE OneView
HPE OneView has a critical unauthenticated remote code execution vulnerability (CVE-2025-37164) with a maximum CVSS score of 10.0, affecting all versions prior to 11.00. HPE has released version 11.00 as a patch and provides hotfixes for older versions to address this severe security flaw.
**Make sure all HPE OneView systems are isolated from the internet and accessible only from trusted networks. Reach out to HPE for details and plan a quick upgrade to version 11.00 or apply the appropriate hotfix for your current version (5.20-10.20).**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-remote-code-execution-flaw-reported-in-hpe-oneview-b-i-c-y-p/gD2P6Ple2L
updated 2025-12-23T12:15:44.160000
5 posts
🚨 CISA has added on vulnerability to the KEV Catalog
CVE-2023-52163: Digiever DS-2105 Pro Missing Authorization Vulnerability
CVSS: 5.9
https://darkwebinformer.com/cisa-kev-catalog/
Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
##🚨 [CISA-2025:1222] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2025:1222)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2023-52163 (https://secdb.nttzen.cloud/cve/detail/CVE-2023-52163)
- Name: Digiever DS-2105 Pro Missing Authorization Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Digiever
- Product: DS-2105 Pro
- Notes: https://www.digiever.com/tw/support/faq-content.php?FAQ=217 ; https://nvd.nist.gov/vuln/detail/CVE-2023-52163
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20251222 #cisa20251222 #cve_2023_52163 #cve202352163
##🚨 CISA has added on vulnerability to the KEV Catalog
CVE-2023-52163: Digiever DS-2105 Pro Missing Authorization Vulnerability
CVSS: 5.9
https://darkwebinformer.com/cisa-kev-catalog/
Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
##CVE ID: CVE-2023-52163
Vendor: Digiever
Product: DS-2105 Pro
Date Added: 2025-12-22
Notes: https://www.digiever.com/tw/support/faq-content.php?FAQ=217 ; https://nvd.nist.gov/vuln/detail/CVE-2023-52163
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2023-52163
CISA has added one vulnerability to the KEV catalogue.
CVE-2023-52163: Digiever DS-2105 Pro Missing Authorization Vulnerability https://www.cve.org/CVERecord?id=CVE-2023-52163 #CISA #vulnerability #infosec
##updated 2025-12-23T11:34:46.317000
8 posts
2 repos
WatchGuard Firebox Zero-Day Under Attack: Critical Firewall Vulnerability Exploited + Video
Introduction A critical zero-day vulnerability in WatchGuard Firebox firewalls has entered the crosshairs of cybercriminals, highlighting an escalating trend of attacks on edge devices. This flaw, identified as CVE-2025-14733, allows remote code execution and exposes both enterprise and branch office networks to potential compromise. As organizations increasingly rely on edge…
##🚨 CISA has added 1 vulnerability to the KEV Catalog
CVE-2025-14733: WatchGuard Firebox Out of Bounds Write Vulnerability
CVSS: 9.3
##CVE ID: CVE-2025-14733
Vendor: WatchGuard
Product: Firebox
Date Added: 2025-12-19
Notes: Check for signs of potential compromise on all internet accessible instances after applying mitigations. For more information please see: https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00027 ; https://nvd.nist.gov/vuln/detail/CVE-2025-14733
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-14733
Critical actively exploited flaw in WatchGuard Fireware OS enables remote code execution through VPN service
WatchGuard patched a critical vulnerability (CVE-2025-14733) in Fireware OS that allows remote unauthenticated attackers to execute arbitrary code on devices with IKEv2 VPN configurations. The flaw is actively being exploited in the wild.
**If you have WatchGuard Firebox firewalls, you are under attack. Make a very quick update to the latest security updates from WatchGuard. After patching, change all passwords and security keys stored on the device, especially if you've ever used IKEv2 VPN configurations (even if now deleted). Old settings can still leave your firewall vulnerable.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/critical-flaw-in-watchguard-fireware-os-enables-remote-code-execution-through-vpn-service-n-s-w-d-7/gD2P6Ple2L
Analysis of CVE-2025-14733, a critical WatchGuard Firebox security vulnerability. Learn why unauthenticated RCE persists even after deleting vulnerable VPN configurations.
#SecurityLand #CyberWatch #ZeroDay #Watchguard #SecurityVulnerability #Firewall #CVE
Read More: https://www.security.land/watchguard-cve-2025-14733-critical-vulnerability-analysis/
##Hackers can now take over WatchGuard Firebox firewalls with zero passwords needed, putting entire networks at risk. Is your organization’s gateway already compromised?
##CVE-2025-14733 - WatchGuard Firebox iked Out of Bounds Write Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14733
##CVE-2025-14733 - WatchGuard Firebox iked Out of Bounds Write Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14733
##updated 2025-12-23T10:15:43.673000
1 posts
🚨 CVE-2025-14388: CRITICAL vuln in PhastPress (≤3.7) lets unauth attackers read files like wp-config.php using double-encoded null bytes. Patch unavailable—disable plugin, block %2500 in URLs, monitor logs! https://radar.offseq.com/threat/cve-2025-14388-cwe-158-improper-neutralization-of--469918d2 #OffSeq #WordPress #Vulnerability #CVE2025
##updated 2025-12-23T00:30:39
2 posts
1 repos
D-Link
https://www.cve.org/CVERecord?id=CVE-2023-53974
Xiongmai
https://www.cve.org/CVERecord?id=CVE-2025-65857
cc: @Dio9sys @da_667
##D-Link
https://www.cve.org/CVERecord?id=CVE-2023-53974
Xiongmai
https://www.cve.org/CVERecord?id=CVE-2025-65857
cc: @Dio9sys @da_667
##updated 2025-12-23T00:30:38
2 posts
D-Link
https://www.cve.org/CVERecord?id=CVE-2023-53974
Xiongmai
https://www.cve.org/CVERecord?id=CVE-2025-65857
cc: @Dio9sys @da_667
##D-Link
https://www.cve.org/CVERecord?id=CVE-2023-53974
Xiongmai
https://www.cve.org/CVERecord?id=CVE-2025-65857
cc: @Dio9sys @da_667
##updated 2025-12-22T22:16:08.360000
1 posts
1 repos
⚠️ CVE-2025-65856 (CRITICAL): Auth bypass in Xiongmai XM530 IP cameras (Firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06) exposes live streams to unauth attackers. Disable ONVIF, restrict access, monitor for fixes. https://radar.offseq.com/threat/cve-2025-65856-na-11fd2d6e #OffSeq #IoTSecurity #Vuln
##updated 2025-12-22T21:36:56
2 posts
ReDoS in Fedify.
##ReDoS in Fedify.
##updated 2025-12-22T21:15:45.020000
1 posts
🚨 CVE-2025-67289 (CRITICAL): Frappe Framework v15.89.0 affected by arbitrary file upload flaw—unauthenticated attackers can gain code execution via malicious XML files. Restrict uploads & monitor activity ASAP. https://radar.offseq.com/threat/cve-2025-67289-na-46d41f94 #OffSeq #Frappe #Vuln #Cybersecurity
##updated 2025-12-22T20:15:45.303000
1 posts
🚨 CVE-2025-67418 (CRITICAL): ClipBucket 5.5.2 uses hardcoded default admin creds. Remote attackers can gain full admin access if creds aren't changed. Update creds ASAP, restrict access, and monitor logs. More: https://radar.offseq.com/threat/cve-2025-67418-na-722b7814 #OffSeq #ClipBucket #Vuln #CyberSec
##updated 2025-12-22T19:15:49.710000
1 posts
🚨 CRITICAL: CVE-2025-67288 in Umbraco CMS 16.3.3 lets attackers upload malicious PDFs & run code remotely. No patch yet—enforce strict file validation, monitor uploads, & restrict access! https://radar.offseq.com/threat/cve-2025-67288-na-ea93a173 #OffSeq #Umbraco #Vulnerability #CyberAlert
##updated 2025-12-22T16:19:13
1 posts
6 repos
https://github.com/rxerium/CVE-2025-68613
https://github.com/wioui/n8n-CVE-2025-68613-exploit
https://github.com/ali-py3/Exploit-CVE-2025-68613
https://github.com/Ashwesker/Blackash-CVE-2025-68613
Critical remote code execution flaw reported in n8n workflow automation platform
n8n's workflow automation platform reports a critical vulnerability (CVE-2025-68613, CVSS 10.0) allowing authenticated attackers to execute arbitrary code with full system privileges, potentially exposing sensitive workflows, API credentials, and corporate networks.
**If you're running self-hosted n8n, plan a quick upgrade to version 1.120.4, 1.121.1, or 1.122.0 to patch CVE-2025-68613. Until you upgrade, restrict workflow editing permissions to fully trusted users only.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-remote-code-execution-flaw-reported-in-n8n-workflow-automation-platform-m-b-x-5-d/gD2P6Ple2L
updated 2025-12-22T05:16:19.120000
1 posts
🛑 CRITICAL: CVE-2025-12049 in Sharp Media Player MP-01 (all versions)—missing authentication lets unauth'd attackers control device settings & inject content. Isolate devices, restrict access, monitor for abuse. No patch yet. https://radar.offseq.com/threat/cve-2025-12049-cwe-306-missing-authentication-for--3a29601c #OffSeq #CVE202512049 #IoTSecurity
##updated 2025-12-20T17:39:03
1 posts
CVE-2025-14881 - Insecure direct object reference https://cvefeed.io/vuln/detail/CVE-2025-14881
##updated 2025-12-20T05:37:50
1 posts
Go hack more AI shit.
https://www.cve.org/CVERecord?id=CVE-2025-63389
##A critical authentication bypass vulnerability exists in Ollama platform's API endpoints in versions prior to and including v0.12.3. The platform exposes multiple API endpoints without requiring authentication, enabling remote attackers to perform unauthorized model management operations.
updated 2025-12-20T05:31:03
1 posts
Six basically identical CVEs from Amazon in different SDKs.
https://www.cve.org/CVERecord?id=CVE-2025-14759
https://www.cve.org/CVERecord?id=CVE-2025-14760
https://www.cve.org/CVERecord?id=CVE-2025-14761
https://www.cve.org/CVERecord?id=CVE-2025-14762
##updated 2025-12-20T05:26:43
1 posts
CVE-2025-68398 - Weblate has git config file overwrite vulnerability that leads to remote code execution https://cvefeed.io/vuln/detail/CVE-2025-68398
##updated 2025-12-20T03:31:40
1 posts
updated 2025-12-20T03:31:40
1 posts
updated 2025-12-20T03:31:40
1 posts
updated 2025-12-20T00:31:32
1 posts
updated 2025-12-19T22:08:03
2 posts
1000 yard stare
##For my fellow Log4j victims celebrating 4 years #log4shell PTSD: CVE-2025-68161
"The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the verifyHostName configuration attribute or the log4j2.sslVerifyHostName system property is set to true."
https://logging.apache.org/security.html#CVE-2025-68161
(It's not that terrible. Seeing the string "log4j" just makes me twitch. :-)
##updated 2025-12-19T21:31:26
1 posts
CVE-2025-34437 - AVideo < 20.0 IDOR Arbitrary Comment Image Upload https://cvefeed.io/vuln/detail/CVE-2025-34437
##updated 2025-12-19T21:30:26
1 posts
updated 2025-12-19T21:30:17
1 posts
CVE-2025-34436 - AVideo < 20.0 IDOR Arbitrary File Upload https://cvefeed.io/vuln/detail/CVE-2025-34436
##updated 2025-12-19T18:32:25
1 posts
updated 2025-12-19T18:32:20
1 posts
CVE-2025-65568 - OmeC-Project UPF pfcpiface Denial-of-Service Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65568
##updated 2025-12-19T18:32:19
1 posts
CVE-2025-65565 - "OmeC-Project UPF pfcpiface Denial-of-Service Vulnerability" https://cvefeed.io/vuln/detail/CVE-2025-65565
##updated 2025-12-19T18:32:19
1 posts
CVE-2025-65564 - OmeC UPF Denial-of-Service Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65564
##updated 2025-12-19T18:31:18
1 posts
CVE-2025-52692 - Bypass Authentication https://cvefeed.io/vuln/detail/CVE-2025-52692
##updated 2025-12-19T18:15:50.570000
1 posts
CVE-2025-65567 - OmeC-Project UPF Denial-of-Service Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65567
##updated 2025-12-19T18:12:09.187000
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-19T18:00:54.283000
2 posts
CVE-2025-14878 - Tenda WH450 HTTP Request wirelessRestart stack-based overflow https://cvefeed.io/vuln/detail/CVE-2025-14878
##Tenda
##updated 2025-12-19T18:00:54.283000
1 posts
CVE-2025-64469 - Stack-based Buffer Overflow in LVResource::DetachResource() in NI LabVIEW https://cvefeed.io/vuln/detail/CVE-2025-64469
##updated 2025-12-19T18:00:54.283000
1 posts
CVE-2025-64466 - Out-of-Bounds Read in lvre!ExecPostedProcRecPost() in NI LabVIEW https://cvefeed.io/vuln/detail/CVE-2025-64466
##updated 2025-12-19T18:00:18.330000
1 posts
updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-14882 - Insecure direct object reference https://cvefeed.io/vuln/detail/CVE-2025-14882
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-1885 - Open Redirect in Restajet's Online Food Delivery System https://cvefeed.io/vuln/detail/CVE-2025-1885
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-11747 - Colibri Page Builder <= 1.0.345 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode https://cvefeed.io/vuln/detail/CVE-2025-11747
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-66521 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Trusted Certificates Feature https://cvefeed.io/vuln/detail/CVE-2025-66521
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-67843 - Mintlify Platform SSTI Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-67843
##updated 2025-12-19T18:00:18.330000
2 posts
CVE-2025-11774 - Malicious Code Execution Vulnerability in the Software Keyboard Function of GENESIS64, ICONICS Suite, Mobile HMI, and MC Works64 https://cvefeed.io/vuln/detail/CVE-2025-11774
##CVE-2025-11774 - Malicious Code Execution Vulnerability in the Software Keyboard Function of GENESIS64, ICONICS Suite, Mobile HMI, and MC Works64 https://cvefeed.io/vuln/detail/CVE-2025-11774
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-14900 - CodeAstro Real Estate Management System Administrator Endpoint userdelete.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14900
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-14908 - JeecgBoot Multi-Tenant Management SysTenantController.java improper authentication https://cvefeed.io/vuln/detail/CVE-2025-14908
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-14899 - CodeAstro Real Estate Management System Administrator Endpoint stateadd.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14899
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-13427 - Authentication Bypass in Dialogflow CX Messenger https://cvefeed.io/vuln/detail/CVE-2025-13427
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-64677 - Office Out-of-Box Experience Spoofing Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64677
##updated 2025-12-19T18:00:18.330000
1 posts
Microsoft patched several sev:CRIT cloud vulns, including this ../ in Purview. LMAO.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64676
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-64236 - WordPress Tuturn plugin < 3.6 - Broken Authentication vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64236
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-14896 - Vega Remote File Inclusion Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14896
##updated 2025-12-19T18:00:18.330000
1 posts
updated 2025-12-19T18:00:18.330000
1 posts
Auth bypass in Open-WebUI.
https://www.cve.org/CVERecord?id=CVE-2025-63391
##An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api/config endpoint. The endpoint lacks proper authentication and authorization controls, exposing sensitive system configuration data to unauthenticated remote attackers.
updated 2025-12-19T16:46:12.343000
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-19T16:46:06.333000
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-19T16:45:53.940000
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-19T15:31:25
1 posts
CVE-2025-1928 - Improper Authentication in Restajet's Online Food Delivery System https://cvefeed.io/vuln/detail/CVE-2025-1928
##updated 2025-12-19T12:31:33
1 posts
CVE-2025-1927 - CSRF in Restajet's Online Food Delivery System https://cvefeed.io/vuln/detail/CVE-2025-1927
##updated 2025-12-19T09:30:40
1 posts
CVE-2025-66522 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Digital IDs Common Name Field https://cvefeed.io/vuln/detail/CVE-2025-66522
##updated 2025-12-19T09:30:39
1 posts
CVE-2025-14151 - SlimStat Analytics <= 5.3.2 - Unauthenticated Stored Cross-Site Scripting https://cvefeed.io/vuln/detail/CVE-2025-14151
##updated 2025-12-19T09:30:39
1 posts
CVE-2025-66520 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Portfolio SVG Handling https://cvefeed.io/vuln/detail/CVE-2025-66520
##updated 2025-12-19T06:30:34
1 posts
CVE-2025-68490 - Apache HTTP Server Cross-Site Request Forgery https://cvefeed.io/vuln/detail/CVE-2025-68490
##updated 2025-12-19T06:30:34
1 posts
CVE-2025-68488 - Apache HTTP Server Authentication Bypass https://cvefeed.io/vuln/detail/CVE-2025-68488
##updated 2025-12-19T06:30:34
1 posts
CVE-2025-68487 - Apache HTTP Server Cross-Site Request Forgery https://cvefeed.io/vuln/detail/CVE-2025-68487
##updated 2025-12-19T04:16:02.150000
1 posts
CVE-2025-68491 - Apache HTTP Server Buffer Overflow Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-68491
##updated 2025-12-19T04:16:02.017000
1 posts
CVE-2025-68489 - Apache HTTP Server Cross-Site Request Forgery https://cvefeed.io/vuln/detail/CVE-2025-68489
##updated 2025-12-19T03:31:18
1 posts
CVE-2025-13941 - Foxit PDF Reader Update Service Incorrect Permission Assignment Local Privilege Escalation Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-13941
##updated 2025-12-19T00:31:52
1 posts
CVE-2025-64675 - Azure Cosmos DB Spoofing Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64675
##updated 2025-12-19T00:31:47
1 posts
CVE-2025-68382 - Packetbeat Out-of-bounds Read https://cvefeed.io/vuln/detail/CVE-2025-68382
##updated 2025-12-19T00:31:47
1 posts
CVE-2025-65037 - Azure Container Apps Remote Code Execution Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65037
##updated 2025-12-19T00:31:47
1 posts
CVE-2025-64663 - Custom Question Answering Elevation of Privilege Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64663
##updated 2025-12-19T00:31:47
1 posts
CVE-2025-34452 - Streama Subtitle Download Path Traversal and SSRF Leading to Arbitrary File Write https://cvefeed.io/vuln/detail/CVE-2025-34452
##updated 2025-12-19T00:31:46
2 posts
🚨 CRITICAL vuln: CVE-2025-65041 in Microsoft Partner Center enables unauthenticated remote privilege escalation (CVSS 10). No patch yet—segment networks, enforce MFA, and monitor for abuse. Stay updated! https://radar.offseq.com/threat/cve-2025-65041-cwe-285-improper-authorization-in-m-738f9e8a #OffSeq #Microsoft #CloudSecurity #CVE2025_65041
##CVE-2025-65041 - Microsoft Partner Center Elevation of Privilege Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65041
##updated 2025-12-19T00:31:46
1 posts
CVE-2025-68381 - Packetbeat Improper Bounds Check https://cvefeed.io/vuln/detail/CVE-2025-68381
##updated 2025-12-18T22:03:09
1 posts
CVE-2025-53000 - nbconvert has an uncontrolled search path that leads to unauthorized code execution on Windows https://cvefeed.io/vuln/detail/CVE-2025-53000
##updated 2025-12-18T21:32:49
1 posts
Critical arbitrary file upload flaw reported in WordPress Motors theme
A critical vulnerability (CVE-2025-64374) in the Motors WordPress theme versions 5.6.81 and below allows any authenticated user with Subscriber-level access to upload and activate malicious plugins, potentially leading to complete website takeover due to missing permission checks.
**If you're using the Motors WordPress theme (version 5.6.81 or below), this is important and probably urgent. Plan a quick upgrade to version 5.6.82 or later. Review all user accounts with Subscriber-level or higher privileges and check for any unauthorized plugins that may have been installed.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-arbitrary-file-upload-flaw-reported-in-wordpress-motors-theme-5-2-b-q-8/gD2P6Ple2L
updated 2025-12-18T19:52:33.017000
1 posts
CVE-2025-66923 - Open Source Point of Sale XSS Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-66923
##updated 2025-12-18T19:45:54.187000
1 posts
1 repos
CVE-2025-68434 - opensourcepos has Cross-Site Request Forgery vulnerability that leads to Unauthorized Administrator Creation https://cvefeed.io/vuln/detail/CVE-2025-68434
##updated 2025-12-18T19:16:34.560000
1 posts
updated 2025-12-18T19:16:22.103000
1 posts
CVE-2025-14837 - ZZCMS Backend Website Settings siteconfig.php stripfxg code injection https://cvefeed.io/vuln/detail/CVE-2025-14837
##updated 2025-12-18T19:07:25.637000
1 posts
CVE-2025-66397 - ChurchCRM's Kiosk Manager Functions are vulnerable to Broken Access Control https://cvefeed.io/vuln/detail/CVE-2025-66397
##updated 2025-12-18T18:50:44
1 posts
Six basically identical CVEs from Amazon in different SDKs.
https://www.cve.org/CVERecord?id=CVE-2025-14759
https://www.cve.org/CVERecord?id=CVE-2025-14760
https://www.cve.org/CVERecord?id=CVE-2025-14761
https://www.cve.org/CVERecord?id=CVE-2025-14762
##updated 2025-12-18T18:31:33
9 posts
ASUS Live Update Vulnerability CVE-2025-59374: Understanding the Real Threat
In the world of cybersecurity, older vulnerabilities often resurface when added to prominent databases like the CISA Known Exploited Vulnerabilities (KEV) catalog. The recent inclusion of ASUS Live Update's CVE-2025-59374 has sparked alarm across various infosec platforms, with some reports suggesting the vulnerability is part of a newly emerging threat. However, a closer look reveals a more…
##CISA flags ASUS Live Update CVE, but the attack is years old
An ASUS Live Update vulnerability tracked as CVE-2025-59374 has been making the rounds in infosec feeds, with some headlines implying recent or...
🔗️ [Bleepingcomputer] https://link.is.it/NcIC9d
##CISA flags ASUS Live Update CVE, but the attack is years old
An ASUS Live Update vulnerability tracked as CVE-2025-59374 has been making the rounds in infosec feeds, with some headlines implying recent or...
🔗️ [Bleepingcomputer] https://link.is.it/NcIC9d
##Not all CISA-linked alerts are urgent: ASUS Live Update CVE-2025-59374
An ASUS Live Update vulnerability tracked as CVE-2025-59374 has been making the rounds in infosec feeds, with some headlines implying recent or...
🔗️ [Bleepingcomputer] https://link.is.it/Yiue33
##CISA reports active exploitation of ASUS Live Update supply chain vulnerability
CISA is reporting active exploitation of CVE-2025-59374, a supply chain backdoor embedded in ASUS Live Update utility during the 2018 Operation ShadowHammer attack by Chinese state-sponsored hackers. The backdoor surgically targeted specific devices using hardcoded MAC addresses. Federal agencies must discontinue use of the now-discontinued utility by January 7, 2026. ASUS urges remaining users to update to version 3.6.8 or higher.
**If you have ASUS Live Update utility installed, immediately update to version 3.6.8 or higher, or better yet, uninstall it completely since it's now discontinued. Given the previous supply chain compromise and end-of-support status, remove the utility and download updates directly from ASUS's official website.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-reports-active-exploitation-of-asus-live-update-supply-chain-vulnerability-d-5-n-4-d/gD2P6Ple2L
New.
CISA Releases Nine Industrial Control Systems Advisories https://www.cisa.gov/news-events/alerts/2025/12/18/cisa-releases-nine-industrial-control-systems-advisories
KEV updates, from yesterday:
CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-20393
CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-40602
CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-59374 #CISA #infosec #ASUS #Cisco #SonicWall
##🚨 CISA has added 3 vulnerabilities to the KEV Catalog
CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability
CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability
CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability
##CVE ID: CVE-2025-59374
Vendor: ASUS
Product: Live Update
Date Added: 2025-12-17
Notes: https://www.asus.com/support/faq/1018727/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-59374
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-59374
EoL Asus Live Update was added to the KEV Catalog.
##updated 2025-12-18T18:30:38
2 posts
CVE-2025-14884 - D-Link DIR-605 Firmware Update Service command injection https://cvefeed.io/vuln/detail/CVE-2025-14884
##Tenda
https://www.cve.org/CVERecord?id=CVE-2025-14879
D-Link
##updated 2025-12-18T18:30:37
2 posts
CVE-2025-14879 - Tenda WH450 HTTP Request onSSIDChange stack-based overflow https://cvefeed.io/vuln/detail/CVE-2025-14879
##Tenda
https://www.cve.org/CVERecord?id=CVE-2025-14879
D-Link
##updated 2025-12-18T18:30:37
1 posts
updated 2025-12-18T18:30:37
1 posts
updated 2025-12-18T16:46:12.477000
1 posts
CVE-2025-68400 - ChurchCRM vulnerable to time-based blind SQL Injection in ConfirmReportEmail.php https://cvefeed.io/vuln/detail/CVE-2025-68400
##updated 2025-12-18T16:44:00.020000
1 posts
CVE-2025-68401 - ChurchCRM has Stored Cross-Site Scripting (XSS) vulnerability that leads to session theft and account takeover https://cvefeed.io/vuln/detail/CVE-2025-68401
##updated 2025-12-18T15:47:08
1 posts
Six basically identical CVEs from Amazon in different SDKs.
https://www.cve.org/CVERecord?id=CVE-2025-14759
https://www.cve.org/CVERecord?id=CVE-2025-14760
https://www.cve.org/CVERecord?id=CVE-2025-14761
https://www.cve.org/CVERecord?id=CVE-2025-14762
##updated 2025-12-18T15:30:51
1 posts
CVE-2025-64468 - Use-after-Free in sentry!sentry_span_set_data() in NI LabVIEW https://cvefeed.io/vuln/detail/CVE-2025-64468
##updated 2025-12-18T15:30:51
1 posts
CVE-2025-13110 - HUSKY – Products Filter Professional for WooCommerce <= 1.3.7.3 - Authenticated (Subscriber+) Insecure Direct Object Reference via 'woof_add_subscr' https://cvefeed.io/vuln/detail/CVE-2025-13110
##updated 2025-12-18T15:30:51
1 posts
CVE-2025-14437 - Hummingbird <= 3.18.0 - Unauthenticated Sensitive Information Exposure via Log File https://cvefeed.io/vuln/detail/CVE-2025-14437
##updated 2025-12-18T15:30:51
1 posts
Five yet-to-be-published CVEs in WODESYS WD-R608U router.
##updated 2025-12-18T15:30:45
1 posts
CVE-2025-64467 - Out-of-Bounds Read in LVResFile::FindRsrcListEntry() in NI LabVIEW https://cvefeed.io/vuln/detail/CVE-2025-64467
##updated 2025-12-18T15:30:45
1 posts
CVE-2025-64465 - Out-of-Bounds Read in lvre!DataSizeTDR() in NI LabVIEW https://cvefeed.io/vuln/detail/CVE-2025-64465
##updated 2025-12-18T15:30:43
1 posts
CVE-2025-14277 - Prime Slider – Addons for Elementor <= 4.0.9 - Authenticated (Subscriber+) Server-Side Request Forgery https://cvefeed.io/vuln/detail/CVE-2025-14277
##updated 2025-12-18T15:08:06.237000
1 posts
Critical remote code execution flaw reported in Apache Commons Text library
Apache Commons Text versions prior to 1.10.0 contain a critical remote code execution vulnerability (CVE-2025-46295,) that allows attackers to inject malicious code through the text-substitution API when processing untrusted input. The flaw was patched in late 2022 but is not updated in many deployed applications.
**If you use Apache Commons Text in your Java applications, check your version immediately and upgrade to at least version 1.10.0 (or preferably 1.15.0). Thi flaw allows remote code execution, so treat this update as very important. Exploits will start soon.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-remote-code-execution-flaw-reported-in-apache-commons-text-library-d-k-v-h-p/gD2P6Ple2L
updated 2025-12-18T15:07:42.550000
1 posts
CVE-2025-68463 - Biopython Bio.Entrez XXE Injection https://cvefeed.io/vuln/detail/CVE-2025-68463
##updated 2025-12-18T15:07:42.550000
1 posts
CVE-2025-47382 - Incorrect Authorization in Boot https://cvefeed.io/vuln/detail/CVE-2025-47382
##updated 2025-12-18T15:07:42.550000
1 posts
CVE-2025-14856 - y_project RuoYi getnames code injection https://cvefeed.io/vuln/detail/CVE-2025-14856
##updated 2025-12-18T15:07:42.550000
1 posts
CVE-2025-68129 - Auth0-PHP SDK has Improper Audience Validation https://cvefeed.io/vuln/detail/CVE-2025-68129
##updated 2025-12-18T15:07:42.550000
1 posts
Six basically identical CVEs from Amazon in different SDKs.
https://www.cve.org/CVERecord?id=CVE-2025-14759
https://www.cve.org/CVERecord?id=CVE-2025-14760
https://www.cve.org/CVERecord?id=CVE-2025-14761
https://www.cve.org/CVERecord?id=CVE-2025-14762
##updated 2025-12-18T15:07:42.550000
1 posts
Six basically identical CVEs from Amazon in different SDKs.
https://www.cve.org/CVERecord?id=CVE-2025-14759
https://www.cve.org/CVERecord?id=CVE-2025-14760
https://www.cve.org/CVERecord?id=CVE-2025-14761
https://www.cve.org/CVERecord?id=CVE-2025-14762
##updated 2025-12-18T15:07:42.550000
1 posts
CVE-2022-23851 - Netaxis API Orchestrator SSTI Vulnerability https://cvefeed.io/vuln/detail/CVE-2022-23851
##updated 2025-12-18T15:07:18.427000
1 posts
CVE-2025-14618 - Sweet Energy Efficiency <= 1.0.6 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Graph Deletion https://cvefeed.io/vuln/detail/CVE-2025-14618
##updated 2025-12-18T12:30:33
5 posts
2 repos
SonicWall patches actively exploited flaw vulnerability chain in SMA 1000 appliances
SonicWall SMA 1000 appliances are being actively exploited through a vulnerability chain combining CVE-2025-40602 (a local privilege escalation flaw) with CVE-2025-23006 (a previously patched deserialization vulnerability), enabling unauthenticated remote code execution with root privileges.
**If you have SonicWall SMA 1000 appliances, make sure their SSH and management access is isolated from the public internet and only accessible from trusted networks. Review latest version, and if not up-to date patched, plan a very quick upgrade to platform-hotfix 12.4.3-03245 or 12.5.0-02283 (or higher). Your devices are being hacked, and you can't really hide them from the internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/sonicwall-patches-actively-exploited-flaw-vulnerability-chain-in-sma-1000-appliances-x-l-b-q-7/gD2P6Ple2L
New.
CISA Releases Nine Industrial Control Systems Advisories https://www.cisa.gov/news-events/alerts/2025/12/18/cisa-releases-nine-industrial-control-systems-advisories
KEV updates, from yesterday:
CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-20393
CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-40602
CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-59374 #CISA #infosec #ASUS #Cisco #SonicWall
##🚨 CISA has added 3 vulnerabilities to the KEV Catalog
CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability
CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability
CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability
##CVE ID: CVE-2025-40602
Vendor: SonicWall
Product: SMA1000 appliance
Date Added: 2025-12-17
Notes: Check for signs of potential compromise on all internet accessible SonicWall SMA1000 instances after applying mitigations. For more information please see: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0019 ; https://nvd.nist.gov/vuln/detail/CVE-2025-40602
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-40602
SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances https://thehackernews.com/2025/12/sonicwall-fixes-actively-exploited-cve.html
##updated 2025-12-18T12:30:33
2 posts
CVE-2025-10910 - Gaining remote control over Govee devices https://cvefeed.io/vuln/detail/CVE-2025-10910
##https://cert.pl/en/posts/2025/12/CVE-2025-10910/
##A flaw in the binding process of Govee’s cloud platform and devices allows a remote attacker to bind an existing, online Govee device to the attacker’s account, resulting in full control of the device and removal of the device from its legitimate owner’s account.
updated 2025-12-18T06:30:19
2 posts
CVE-2025-68459 - Ruijie Networks Co., Ltd. AP180 Command Injection Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-68459
##CVE-2025-68459 - Ruijie Networks Co., Ltd. AP180 Command Injection Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-68459
##updated 2025-12-18T06:30:19
1 posts
CVE-2025-47372 - Buffer Copy Without Checking Size of Input in Boot https://cvefeed.io/vuln/detail/CVE-2025-47372
##updated 2025-12-18T06:30:19
1 posts
CVE-2025-68462 - Freedombox Unauthenticated Database Backup File Disclosure https://cvefeed.io/vuln/detail/CVE-2025-68462
##updated 2025-12-18T06:30:19
1 posts
CVE-2025-47387 - Untrusted Pointer Dereference in Camera https://cvefeed.io/vuln/detail/CVE-2025-47387
##updated 2025-12-18T03:30:18
1 posts
CVE-2025-12885 - Embed Any Document <= 2.7.10 - Authenticated (Contributor+) Stored Cross-Site Scripting https://cvefeed.io/vuln/detail/CVE-2025-12885
##updated 2025-12-18T03:30:18
1 posts
CVE-2025-14841 - OFFIS DCMTK dcmqrscp dcmqrdbi.cc startMoveRequest null pointer dereference https://cvefeed.io/vuln/detail/CVE-2025-14841
##updated 2025-12-18T00:34:16
2 posts
CVE-2025-14202 - Cross-Site Request Forgery (CSRF) Leading to Account Takeover via SVG File Upload https://cvefeed.io/vuln/detail/CVE-2025-14202
##CVE-2025-14202 - Cross-Site Request Forgery (CSRF) Leading to Account Takeover via SVG File Upload https://cvefeed.io/vuln/detail/CVE-2025-14202
##updated 2025-12-18T00:34:16
1 posts
CVE-2023-53933 - Serendipity 2.4.0 Authenticated Remote Code Execution via File Upload https://cvefeed.io/vuln/detail/CVE-2023-53933
##updated 2025-12-17T21:31:53
1 posts
CVE-2025-67172 - RiteCMS Remote Code Execution Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-67172
##updated 2025-12-17T21:31:53
1 posts
CVE-2025-66924 - Open Source Point of Sale XSS Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-66924
##updated 2025-12-17T21:31:53
1 posts
CVE-2025-65203 - KeePassXC-Browser thru 1.9.9.2 autofills or prompt https://cvefeed.io/vuln/detail/CVE-2025-65203
##updated 2025-12-17T21:30:56
2 posts
CVE-2025-67073 - Tenda HTTPd Buffer Overflow Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-67073
##Tenda Mentioned
##updated 2025-12-17T21:30:56
1 posts
CVE-2025-13326 - Mattermost Desktop App fails to enable Hardened Runtime when packaged for Mac App Store https://cvefeed.io/vuln/detail/CVE-2025-13326
##updated 2025-12-17T21:30:47
15 posts
5 repos
https://github.com/Ashwesker/Blackash-CVE-2025-20393
https://github.com/StasonJatham/cisco-sa-sma-attack-N9bf4
https://github.com/cyberleelawat/CVE-2025-20393
🚨 CVE-2025-20393: Script to detect for Cisco Secure Email Gateway And Cisco Secure Email and Web Manager
CVSS: 10
Currently no patch and zero-day
GitHub: https://github.com/StasonJatham/cisco-sa-sma-attack-N9bf4
##🔥 Cisco AsyncOS Zero-Day (CVE-2025-20393)
• BleepingComputer
https://www.bleepingcomputer.com/news/security/cisco-warns-of-unpatched-asyncos-zero-day-exploited-in-attacks/
• The Hacker News
https://thehackernews.com/2025/12/cisco-warns-of-active-attacks.html
• SecurityWeek
https://www.securityweek.com/china-linked-hackers-exploiting-zero-day-in-cisco-security-gear/
• The Register
https://www.theregister.com/2025/12/17/attacks_pummeling_cisco_0day/
• Dark Reading (CISA KEV addition)
https://www.darkreading.com/attacks-breaches/cisa-adds-cisco-asyncos-zero-day-to-kev-catalog
• SOCRadar analysis
https://socradar.io/blog/cve-2025-20393-cisco-asyncos-zero-day-email/
New.
CISA Releases Nine Industrial Control Systems Advisories https://www.cisa.gov/news-events/alerts/2025/12/18/cisa-releases-nine-industrial-control-systems-advisories
KEV updates, from yesterday:
CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-20393
CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-40602
CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-59374 #CISA #infosec #ASUS #Cisco #SonicWall
##Security Week: China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear https://www.securityweek.com/china-linked-hackers-exploiting-zero-day-in-cisco-security-gear/ @SecurityWeek
Cisco:
- Critical: CVE-2025-20393: Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4
- Critical: CVE-2025-55182: Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-react-flight-TYw32Ddb @TalosSecurity #infosec #Cisco #vulnerability #zeroday
##Cisco Email Security appliances actively exploited
Cisco is warning of an active cyberattack campaign exploiting a critical zero-day vulnerability (CVE-2025-20393) in Cisco Secure Email Gateway and Email and Web Manager appliances, allowing attackers to execute arbitrary commands with root privileges. The flaw affects appliances with the Spam Quarantine feature enabled and exposed to the internet. Atacks date back to late November 2025.
**If you have Cisco Secure Email Gateway or Cisco Email and Web Manager appliances, this is urgent: Immediately check if the Spam Quarantine feature is enabled and exposed to the public ports - if it is, disable it on all public ports until a patch is available for CVE-2025-20393. If your appliance may have been compromised, contact Cisco support and prepare to rebuild the system from scratch. This is currently the only way to fully remove the threat from a compromised system.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisco-says-chinese-hackers-are-exploiting-its-customers-with-a-new-zero-day-techcrunch-g-m-7-i-x/gD2P6Ple2L
[VULN] ⚠️ Zero‑day sur les appliances e‑mail Cisco : compromission, backdoors et logs effacés
👇
https://cyberveille.ch/posts/2025-12-18-zero-day-sur-les-appliances-e-mail-cisco-compromission-backdoors-et-logs-effaces/
🔗 Source originale : https://www.helpnetsecurity.com/2025/12/17/cisco-secure-email-cve-2025-20393/
Advisory officiel:
Analyse de Cisco Talos:
UAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web Manager
Résumé FR ➡️ Campagne UAT-9686: un APT à nexus chinois cible Cisco Secure Email via le backdoor AquaShell
##🚨 CISA has added 3 vulnerabilities to the KEV Catalog
CVE-2025-59374: ASUS Live Update Embedded Malicious Code Vulnerability
CVE-2025-40602: SonicWall SMA1000 Missing Authorization Vulnerability
CVE-2025-20393: Cisco Multiple Products Improper Input Validation Vulnerability
##A suspected Chinese APT is exploiting a new Cisco zero-day
-impacts Cisco Secure Email Gateway And Cisco Secure Email and Web Manager
-CVE-2025-20393
-CVSS score: 10
-APT is UAT-9686
Severity: 10.0
CVE ID: CVE-2025-20393
Vendor: Cisco
Product: Multiple Products
Date Added: 2025-12-17
CVE ID: CVE-2025-20393
Vendor: Cisco
Product: Multiple Products
Date Added: 2025-12-17
Notes: Please adhere to Cisco's guidelines to assess exposure and mitigate risks. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4 ; https://nvd.nist.gov/vuln/detail/CVE-2025-20393
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-20393
@ljrk OK, two more Fleißsternchen for SonicWall: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0019
And for Cisco: https://www.cve.org/CVERecord?id=CVE-2025-20393
Kudos to both for making CISA KEV on 0day (it seems).
Cisco email security appliances rooted and backdoored via still unpatched zero-day https://www.helpnetsecurity.com/2025/12/17/cisco-secure-email-cve-2025-20393/ #cyberespionage #emailsecurity #enterprise #Don'tmiss #Hotstuff #backdoor #China #Cisco #News #APT
##🚨 CVE-2025-20393: Cisco Secure Email Gateway and Cisco Secure Email and Web Manager Remote Command Execution Vulnerability
Status: Unpatched Zero-Day
CVSS: 10
Vendor: Cisco
CWE-20: Improper Input Validation
updated 2025-12-17T13:54:45.390000
3 posts
2 repos
📰 ** Information Briefing: **
✨ FortiCloud SSO Login Bypass: Exploited in the Wild
- Critical vulnerabilities: CVE-2025-59718 and CVE-2025-59719
- Unauthenticated adversaries bypass FortiCloud SSO login
- Exploitation observed in the wild
- Affected products: FortiOS, FortiProxy, FortiSwitchManager, FortiWeb
🔗 https://www.adalta.info/pdf/index.html?title=prstn_exploit_115742000142229693&lang=en
(Available in 🇩🇪 🇺🇸 🇫🇷)
New. This relates to two vulnerabilities disclosed by Fortinet last week: CVE-2025-59718 and CVE-2025-59719.
VulnCheck: FortiCloud SSO Login Bypass Vulnerabilities Exploited in the Wild https://www.vulncheck.com/blog/forticloud-sso-login-bypass @vulncheck #infosec #Fortinet #threatresearch
##We wrote a little bit on FortiCloud SSO login bypass CVE-2025-59718 (and 59719). Both the known PoCs for the former are fake / invalid. There does appear to be real exploitation evidence, but detections based on fake PoCs ain't it (and it seems like that's where a lot of chatter is coming from)
##updated 2025-12-16T22:37:26
1 posts
Command injection flaw reported in Node.js systeminformation package
A command injection vulnerability (CVE-2025-68154) in the systeminformation Node.js library's fsSize() function allows attackers to execute arbitrary PowerShell commands on Windows systems through unsanitized user input in the drive parameter. The vulnerability has been patched in version 5.27.14.
**If you're using the systeminformation Node.js library on Windows, plan an upgrade to version 5.27.14 or newer to patch this command injection flaw. Review all applications using this library, especially web APIs or tools that accept user input for disk queries, to ensure they're running the patched version.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/command-injection-flaw-reported-in-node-js-systeminformation-package-5-5-0-6-6/gD2P6Ple2L
updated 2025-12-16T15:30:56
3 posts
3. Rust joined the Linux kernel mainline last week and immediately checked off a rite of passage: its first CVE.
https://lore.kernel.org/linux-cve-announce/2025121614-CVE-2025-68260-558d@gregkh/T/#u
Linux Kernel Rust Code Sees Its First CVE Vulnerability
https://lore.kernel.org/linux-cve-announce/2025121614-CVE-2025-68260-558d@gregkh/T/#u
##updated 2025-12-10T16:10:33.500000
1 posts
Malcolm v25.12.1 contains a few critical bug fixes and component version updates.
https://github.com/idaholab/Malcolm/compare/v25.12.0...v25.12.1
zeek.intel.file_mime_type to file.mime_type so filters created from it can work on other dashboards/var partition (#835)Malcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻♀️.
Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.
Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.
As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.
#Malcolm #HedgehogLinux #Zeek #Arkime #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #INL
##updated 2025-12-09T18:30:52
2 posts
📰 ** Information Briefing: **
✨ FortiCloud SSO Login Bypass: Exploited in the Wild
- Critical vulnerabilities: CVE-2025-59718 and CVE-2025-59719
- Unauthenticated adversaries bypass FortiCloud SSO login
- Exploitation observed in the wild
- Affected products: FortiOS, FortiProxy, FortiSwitchManager, FortiWeb
🔗 https://www.adalta.info/pdf/index.html?title=prstn_exploit_115742000142229693&lang=en
(Available in 🇩🇪 🇺🇸 🇫🇷)
New. This relates to two vulnerabilities disclosed by Fortinet last week: CVE-2025-59718 and CVE-2025-59719.
VulnCheck: FortiCloud SSO Login Bypass Vulnerabilities Exploited in the Wild https://www.vulncheck.com/blog/forticloud-sso-login-bypass @vulncheck #infosec #Fortinet #threatresearch
##updated 2025-12-09T18:30:45
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-09T18:30:44
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-09T18:30:44
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-09T18:30:44
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-09T18:30:44
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-09T18:30:44
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-09T18:30:44
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-09T18:30:43
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-09T18:30:43
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-09T18:30:43
1 posts
Phoenix Contact
CVE-2025-41692, CVE-2025-41693, CVE-2025-41694, CVE-2025-41695, CVE-2025-41696, CVE-2025-41697, CVE-2025-41745, CVE-2025-41746, CVE-2025-41747, CVE-2025-41748, CVE-2025-41749, CVE-2025-41750, CVE-2025-41751, CVE-2025-41752
##updated 2025-12-09T16:53:25
3 posts
100 repos
https://github.com/VeilVulp/RscScan-cve-2025-55182
https://github.com/xkillbit/cve-2025-55182-scanner
https://github.com/zr0n/react2shell
https://github.com/f0xyx/CVE-2025-55182-Scanner
https://github.com/hidden-investigations/react2shell-scanner
https://github.com/ejpir/CVE-2025-55182-bypass
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/subhdotsol/CVE-2025-55182
https://github.com/freeqaz/react2shell
https://github.com/Rsatan/Next.js-Exploit-Tool
https://github.com/raivenLockdown/RCE_React2Shell_ButCooler-SomeUselessUsefulThingsLMAO-
https://github.com/shyambhanushali/React2Shell
https://github.com/kOaDT/poc-cve-2025-55182
https://github.com/nehkark/CVE-2025-55182
https://github.com/MoLeft/React2Shell-Toolbox
https://github.com/hoosin/CVE-2025-55182
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/shamo0/react2shell-PoC
https://github.com/techgaun/cve-2025-55182-scanner
https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE
https://github.com/mrknow001/RSC_Detector
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool
https://github.com/sickwell/CVE-2025-55182
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/Pizz33/CVE-2025-55182-burpscanner
https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
https://github.com/LemonTeatw1/CVE-2025-55182-exploit
https://github.com/zzhorc/CVE-2025-55182
https://github.com/sumanrox/rschunter
https://github.com/santihabib/CVE-2025-55182-analysis
https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS
https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182
https://github.com/gensecaihq/react2shell-scanner
https://github.com/alsaut1/react2shell-lab
https://github.com/timsonner/React2Shell-CVE-2025-55182
https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/AliHzSec/CVE-2025-55182
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/Spritualkb/CVE-2025-55182-exp
https://github.com/ejpir/CVE-2025-55182-research
https://github.com/RuoJi6/CVE-2025-55182-RCE-shell
https://github.com/EynaExp/CVE-2025-55182-POC
https://github.com/SainiONHacks/CVE-2025-55182-Scanner
https://github.com/logesh-GIT001/CVE-2025-55182
https://github.com/alfazhossain/CVE-2025-55182-Exploiter
https://github.com/surajhacx/react2shellpoc
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/andrei2308/react2shell
https://github.com/Ashwesker/Blackash-CVE-2025-55182
https://github.com/xcanwin/CVE-2025-55182-React-RCE
https://github.com/xiaopeng-ye/react2shell-detector
https://github.com/sho-luv/React2Shell
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/GelukCrab/React-Server-Components-RCE
https://github.com/ynsmroztas/NextRce
https://github.com/dwisiswant0/CVE-2025-55182
https://github.com/acheong08/CVE-2025-55182-poc
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/Call123X/-cve-2025-55182
https://github.com/hualy13/CVE-2025-55182
https://github.com/zack0x01/vuln-app-CVE-2025-55182
https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-
https://github.com/c0rydoras/CVE-2025-55182
https://github.com/C00LN3T/React2Shell
https://github.com/yanoshercohen/React2Shell_CVE-2025-55182
https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive
https://github.com/theori-io/reactguard
https://github.com/StealthMoud/CVE-2025-55182-Scanner
https://github.com/XiaomingX/CVE-2025-55182-poc
https://github.com/AggressiveUser/React2Hell
https://github.com/websecuritylabs/React2Shell-Library
https://github.com/SoICT-BKSEC/CVE-2025-55182-docker-lab
https://github.com/fullhunt/react2shell-test-server
https://github.com/xalgord/React2Shell
https://github.com/emredavut/CVE-2025-55182
https://github.com/fatguru/CVE-2025-55182-scanner
https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
https://github.com/Chocapikk/CVE-2025-55182
https://github.com/whiteov3rflow/CVE-2025-55182-poc
https://github.com/im-ezboy/CVE-2025-55182-zoomeye
https://github.com/keklick1337/CVE-2025-55182-golang-PoC
https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell
https://github.com/msanft/CVE-2025-55182
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/Saturate/CVE-2025-55182-Scanner
https://github.com/sudo-Yangziran/CVE-2025-55182POC
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/assetnote/react2shell-scanner
https://github.com/TrixSec/CVE-2025-55182-Scanner
https://github.com/kavienanj/CVE-2025-55182
https://github.com/yz9yt/React2Shell-CTF
https://github.com/jf0x3a/CVE-2025-55182-exploit
https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI
This is legit a Christmas miracle b/c I rly did not want to spend the break tending to #React2Shell
##Security Week: China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear https://www.securityweek.com/china-linked-hackers-exploiting-zero-day-in-cisco-security-gear/ @SecurityWeek
Cisco:
- Critical: CVE-2025-20393: Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4
- Critical: CVE-2025-55182: Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-react-flight-TYw32Ddb @TalosSecurity #infosec #Cisco #vulnerability #zeroday
##updated 2025-12-06T22:15:50.277000
2 posts
2 repos
Very good question! I hope you’ll forgive me for a long response, it is something I have a lot of thoughts on.
I used to think newer is better, but after plenty of distro-hopping (I had a real good time on Arch), I realized that Debian’s version of "stability" is actually its greatest feature. Here is how I’ve come to see it, using your Fedora experience as a comparison:
Fist, with Debian, stable means unchanging. Fedora is a fast-moving target. It was an early adopter for Wayland and Pipewire. That is exciting, but it can feel like a version of whiplash. Debian is the opposite. Once a version is released, the APIs, file locations, and package behaviors are locked in. Its predictability means my system feels the same on Day 1 as it does on Day 300.
Debian prioritizes reliability over cutting-edge performance. While Fedora pushes the new thing, Debian’s conservative defaults ensure maximum compatibility. It is the "just works" philosophy. It is not just that it doesn't crash, it is that it doesn't surprise you.
I also find APT to be incredibly satisfying compared to DNF. The sheer size of the repositories is massive, but APT Pinning is THE feature for me. Being able to set numeric priorities in /etc/apt/preferences allows me to do things like pull a specific package from Backports while keeping the rest of the system on the Stable branch. It gives you control over dependency resolution that is hard to match.
Regarding your question on security, Debian is unique because it is a 100% community-led project. Unlike Fedora (Red Hat) or Ubuntu (Canonical), there is no corporate entity at the top. This is one of the most important traits to me. If Red Hat wanted to, Fedora could start showing ads in the application menu with the next update. I don’t think that will happen with Fedora, but who knows, Canonical is now showing ads in the cli. Enough is enough.
I also appreciate Debian’s focus on inclusion. It is one of the most inclusive projects in tech. As a member of the queer community, it is important to me to use tools that are created and supported by those who do not hate me for being different. To quote their Diversity Statement: “No matter how you identify yourself or how others perceive you: we welcome you. We welcome contributions from everyone as long as they interact constructively with our community.” They forbid discrimination against any person or group. Because it is a global meritocracy, you have contributors from every corner of the world. This diversity is actually a security feature because with so many different eyes on the code, it is much harder for a backdoor or a bias to slip through unnoticed.
For your "backdoor-proof" concern, Debian’s Social Contract and strict adherence to free software guidelines mean every line of code is scrutinized by volunteers around the world. It is transparent by design. While no distro/OS is unhackable, Debian’s slow and steady release cycle means security patches are thoroughly vetted before they hit your machine, reducing the risk of zero day regressions. Fedora has been vulnerable to zero day attacks in the past and will probably continue to be in the future. For instance, because Fedora is always on the latest versions, Fedora Users are often vulnerable to new attack. Earlier in 2025, the latest kernel which Fedora had pushed to users had a zero day vulnerability. Debian stable users did not have that vulnerability because they would not see that update for quite some time.
Sources:
Ubuntu Showing Ads in Terminal - https://linuxiac.com/ubuntu-once-again-angered-users-by-placing-ads/
Debian Social Contract - https://www.debian.org/social_contract
Debian Diversity Statement - https://www.debian.org/intro/diversity
Zero day vulnerability mentioned -https://www.cve.org/CVERecord?id=CVE-2025-37899
##Very good question! I hope you’ll forgive me for a long response, it is something I have a lot of thoughts on.
I used to think newer is better, but after plenty of distro-hopping (I had a real good time on Arch), I realized that Debian’s version of "stability" is actually its greatest feature. Here is how I’ve come to see it, using your Fedora experience as a comparison:
Fist, with Debian, stable means unchanging. Fedora is a fast-moving target. It was an early adopter for Wayland and Pipewire. That is exciting, but it can feel like a version of whiplash. Debian is the opposite. Once a version is released, the APIs, file locations, and package behaviors are locked in. Its predictability means my system feels the same on Day 1 as it does on Day 300.
Debian prioritizes reliability over cutting-edge performance. While Fedora pushes the new thing, Debian’s conservative defaults ensure maximum compatibility. It is the "just works" philosophy. It is not just that it doesn't crash, it is that it doesn't surprise you.
I also find APT to be incredibly satisfying compared to DNF. The sheer size of the repositories is massive, but APT Pinning is THE feature for me. Being able to set numeric priorities in /etc/apt/preferences allows me to do things like pull a specific package from Backports while keeping the rest of the system on the Stable branch. It gives you control over dependency resolution that is hard to match.
Regarding your question on security, Debian is unique because it is a 100% community-led project. Unlike Fedora (Red Hat) or Ubuntu (Canonical), there is no corporate entity at the top. This is one of the most important traits to me. If Red Hat wanted to, Fedora could start showing ads in the application menu with the next update. I don’t think that will happen with Fedora, but who knows, Canonical is now showing ads in the cli. Enough is enough.
I also appreciate Debian’s focus on inclusion. It is one of the most inclusive projects in tech. As a member of the queer community, it is important to me to use tools that are created and supported by those who do not hate me for being different. To quote their Diversity Statement: “No matter how you identify yourself or how others perceive you: we welcome you. We welcome contributions from everyone as long as they interact constructively with our community.” They forbid discrimination against any person or group. Because it is a global meritocracy, you have contributors from every corner of the world. This diversity is actually a security feature because with so many different eyes on the code, it is much harder for a backdoor or a bias to slip through unnoticed.
For your "backdoor-proof" concern, Debian’s Social Contract and strict adherence to free software guidelines mean every line of code is scrutinized by volunteers around the world. It is transparent by design. While no distro/OS is unhackable, Debian’s slow and steady release cycle means security patches are thoroughly vetted before they hit your machine, reducing the risk of zero day regressions. Fedora has been vulnerable to zero day attacks in the past and will probably continue to be in the future. For instance, because Fedora is always on the latest versions, Fedora Users are often vulnerable to new attack. Earlier in 2025, the latest kernel which Fedora had pushed to users had a zero day vulnerability. Debian stable users did not have that vulnerability because they would not see that update for quite some time.
Sources:
Ubuntu Showing Ads in Terminal - https://linuxiac.com/ubuntu-once-again-angered-users-by-placing-ads/
Debian Social Contract - https://www.debian.org/social_contract
Debian Diversity Statement - https://www.debian.org/intro/diversity
Zero day vulnerability mentioned -https://www.cve.org/CVERecord?id=CVE-2025-37899
##updated 2025-12-04T22:50:04
1 posts
1 repos
#PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws)
##updated 2025-12-03T18:15:47.200000
1 posts
100 repos
https://github.com/Letalandroid/cve-2025-66478_rce_vulnerable
https://github.com/mounta11n/CHECK-CVE-2025-55182-AND-CVE-2025-66478
https://github.com/hidden-investigations/react2shell-scanner
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-hoisting
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/freeqaz/react2shell
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm-symlinks
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-overrides
https://github.com/shyambhanushali/React2Shell
https://github.com/nehkark/CVE-2025-55182
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/wangxso/CVE-2025-66478-POC
https://github.com/shamo0/react2shell-PoC
https://github.com/FurkanKAYAPINAR/ReactNext2Shell
https://github.com/namest504/CVE-2025-66478-Exploit-Poc
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-devdeps
https://github.com/vercel-labs/fix-react2shell-next
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-shrinkwrap
https://github.com/Rhyru9/CVE-2025-66478
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/zhixiangyao/CVE-2025-66478-Exploit-PoC
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-alias
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-pnp
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/cypholab/evilact
https://github.com/sumanrox/rschunter
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-14x
https://github.com/alessiodos/react2shell-scanner
https://github.com/strainxx/react2shell-honeypot
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn
https://github.com/aiexz/CVE-2025-66478-kinda-waf
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-berry
https://github.com/Jibaru/CVE-2025-66478-github-patcher
https://github.com/lincemorado97/CVE-2025-55182_CVE-2025-66478
https://github.com/Mustafa1p/Next.js-RCE-Scanner---CVE-2025-55182-CVE-2025-66478
https://github.com/Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/mattcbarrett/check-cve-2025-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-zero-installs
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tag-latest
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-resolutions
https://github.com/DavionGowie/-vercel-application-is-vulnerable-to-CVE-2025-66478.
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-calcom-yarn-monorepo
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-yarn-workspaces
https://github.com/abtonc/next-cve-2025-66478
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tilde
https://github.com/abdozkaya/rsc-security-auditor
https://github.com/xiaopeng-ye/react2shell-detector
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-patch-package
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-catalog
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-nested-versions
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-optional-deps
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-transitive
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-16x
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/arashiyans/CVE-2025-55182-CVE-2025-66478
https://github.com/ancs21/react2shell-scanner-rust
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/gagaltotal/tot-react-rce-CVE-2025-55182
https://github.com/aseemyash/krle
https://github.com/grp-ops/react2shell
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-git-dep
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-peer-conflict
https://github.com/dr4xp/react2shell
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-rsc-webpack
https://github.com/enesbuyuk/react2shell-security-tool
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-supabase-pnpm-monorepo
https://github.com/C00LN3T/React2Shell
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-lockfile-mismatch
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-caret
https://github.com/ExpTechTW/CVE-2025-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-dub-pnpm-monorepo
https://github.com/emredavut/CVE-2025-55182
https://github.com/changgun-lee/Next.js-RSC-RCE-Scanner-CVE-2025-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-packagemanager-field
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-bun
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-v-prefix
https://github.com/Geekujin/React2-PowerShell-CVE-Checker
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-overrides
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm
https://github.com/jctommasi/react2shellVulnApp
https://github.com/abhirajranjan/cve-2025-66478
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-turborepo
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/assetnote/react2shell-scanner
https://github.com/Code42Cate/nexts-cve-2025-66478-exploit
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-range
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-build-metadata
https://github.com/Saad-Ayady/react2shellNSE
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-15x
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-no-lockfile
https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI
updated 2025-12-03T13:47:09.720000
1 posts
Windows RasMan DoS-Lücke: 0patch bietet kostenlosen Schutz vor aktuellem 0-Day
Sicherheitslücke in Windows Remote Access Connection Manager entdeckt
Bei der Analyse der im Oktober 2025 von Microsoft geschlossenen Schwachstelle CVE-2025-59230 im Windows Remote Access Connection Manager stieß das Team von 0patch auf eine bislang ungepatchte Sicherheitslücke.
##updated 2025-12-02T21:31:37
1 posts
Local Privilege Escalation (CVE-2025-34352) in JumpCloud Agent https://xmcyber.com/blog/jumpshot-xm-cyber-uncovers-critical-local-privilege-escalation-cve-2025-34352-in-jumpcloud-agent/
##updated 2025-11-17T18:30:25
1 posts
updated 2025-11-13T16:25:27
1 posts
3 repos
https://github.com/SaidBenaissa/cve-2025-11953-vulnerability-demo
🚨 Active exploitation confirmed: CVE-2025-11953
VulnCheck is reporting active exploitation attempts in the wild against the React Native Metro server.
The issue? It binds to 0.0.0.0 by default, exposing a "local" dev tool to the internet.
⚠️ Crucial Detail: While the exposure is general, the current RCE exploit specifically targets Windows environments.
We’ve updated Pentest-Tools.com to help you validate this:
Network Scanner: Detects exposed Metro servers.
Sniper Auto-Exploiter: Safely executes a PoC (on Windows) to confirm RCE.
Fix: Update @react-native-community/cli-server-api to v20.0.0+ or bind to 127.0.0.1.
Validate your risk.
#InfoSec #AppSec #RedTeam #VulnerabilityManagement #ReactNative #CVE202511953
##updated 2025-11-13T15:31:32
1 posts
2 repos
https://github.com/watchtowrlabs/watchTowr-vs-WatchGuard-CVE-2025-9242
Urgent: A critical WatchGuard Firebox RCE flaw (CVE-2025-9242) is being actively exploited. CISA has mandated patching. Over 54k devices are still vulnerable. Patch immediately and rotate all credentials. https://redteamnews.com/red-team/cve/critical-watchguard-firebox-rce-flaw-exploited-cisa-issues-directive/
##updated 2025-11-12T15:32:32
1 posts
Yooo @yeslikethefood wrote a neat bunch of words about developing an exploit for Gladinet Triofox CVE-2025-12480 that closely followed the real-world attack pattern Mandiant wrote about last month and attributed to UNC6485.
20+ requests, an AV config trigger, and an embedded PostgreSQL server later:
https://www.vulncheck.com/blog/triofox-exploit-cve-2025-12480
##updated 2025-11-11T15:32:22
1 posts
21 repos
https://github.com/esteban11121/WSUS-RCE-Mitigation-59287
https://github.com/QurtiDev/WSUS-CVE-2025-59287-RCE
https://github.com/FurkanKAYAPINAR/CVE-2025-59287
https://github.com/keeganparr1/CVE-2025-59287-hawktrace
https://github.com/mrk336/Breaking-the-Update-Chain-Inside-CVE-2025-59287-and-the-WSUS-RCE-Threat
https://github.com/0xBruno/WSUSploit.NET
https://github.com/dexterm300/cve-2025-59287-exploit-poc
https://github.com/AdityaBhatt3010/CVE-2025-59287-When-your-patch-server-becomes-the-attack-vector
https://github.com/Twodimensionalitylevelcrossing817/CVE-2025-59287
https://github.com/M507/CVE-2025-59287-PoC
https://github.com/Adel-kaka-dz/cve-2025-59287
https://github.com/Lupovis/Honeypot-for-CVE-2025-59287-WSUS
https://github.com/0x7556/CVE-2025-59287
https://github.com/mubix/Find-WSUS
https://github.com/N3k0t-dev/PoC-CVE-collection
https://github.com/RadzaRr/WSUSResponder
https://github.com/fsanzmoya/wsus_CVE-2025-59287
https://github.com/garvitv14/CVE-2025-59287
Critical WSUS flaw reported in Schneider Electric Foxboro DCS systems
Schneider Electric issued a critical security advisory for a vulnerability (CVE-2025-59287) in its EcoStruxure Foxboro DCS Advisor services caused by a flaw in Microsoft WSUS that allows unauthenticated attackers to execute arbitrary code with SYSTEM privileges via ports 8530/8531. Active exploitation is observed in the wild.
**This one is important and kind of urgent, there is active exploitation. If you have Schneider Electric EcoStruxure Foxboro DCS Advisor systems, make sure to block WSUS ports 8530/8531 from the internet, or even better, make sure they are isolated from the internet and only accessible from trusted networks. Then apply Microsoft patches KB5070882 and KB5070884 and verify patch with Schneider Electric Global Customer Support.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-wsus-flaw-reported-in-schneider-electric-foxboro-dcs-systems-8-0-8-z-c/gD2P6Ple2L
updated 2025-11-05T20:31:47
1 posts
This critical advisory was posted yesterday. It relates to CVE-2025-7962, CVE-2025-49146, and CVE-2025-5516.
HPESBNW04986 rev.1 - HPE Telco Service Activator, Multiple Vulnerabilities https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04986en_us&docLocale=en_US
More:
The Hacker News: HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution https://thehackernews.com/2025/12/hpe-oneview-flaw-rated-cvss-100-allows.html @thehackernews #infosec #HPE #vulnerability
##updated 2025-11-03T18:32:51
1 posts
New. This addresses high-risk CVE-2025-53057 and CVE-2025-53066.
Security Update for Dell APEX Cloud Platform for Microsoft Azure and Dell APEX Cloud Platform Foundation Software Multiple Third-Party Component Vulnerabilities https://www.dell.com/support/kbdoc/en-us/000405196/dsa-2025-449-security-update-for-dell-apex-cloud-platform-for-microsoft-azure-and-dell-apex-cloud-platform-foundation-software-multiple-third-party-component-vulnerabilities #Dell #Microsoft #infosec #Azure #vulnerability
##updated 2025-11-03T18:31:47
1 posts
New. This addresses high-risk CVE-2025-53057 and CVE-2025-53066.
Security Update for Dell APEX Cloud Platform for Microsoft Azure and Dell APEX Cloud Platform Foundation Software Multiple Third-Party Component Vulnerabilities https://www.dell.com/support/kbdoc/en-us/000405196/dsa-2025-449-security-update-for-dell-apex-cloud-platform-for-microsoft-azure-and-dell-apex-cloud-platform-foundation-software-multiple-third-party-component-vulnerabilities #Dell #Microsoft #infosec #Azure #vulnerability
##updated 2025-10-22T00:34:21
1 posts
19 repos
https://github.com/nairuzabulhul/nuclei-template-cve-2025-31324-check
https://github.com/harshitvarma05/CVE-2025-31324-Exploits
https://github.com/abrewer251/CVE-2025-31324_PoC_SAP
https://github.com/JonathanStross/CVE-2025-31324
https://github.com/respondiq/jsp-webshell-scanner
https://github.com/ODST-Forge/CVE-2025-31324_PoC
https://github.com/Alizngnc/SAP-CVE-2025-31324
https://github.com/Onapsis/Onapsis-Mandiant-CVE-2025-31324-Vuln-Compromise-Assessment
https://github.com/redrays-io/CVE-2025-31324
https://github.com/BlueOWL-overlord/Burp_CVE-2025-31324
https://github.com/antichainalysis/sap-netweaver-0day-CVE-2025-31324
https://github.com/moften/CVE-2025-31324
https://github.com/nullcult/CVE-2025-31324-File-Upload
https://github.com/rxerium/CVE-2025-31324
https://github.com/Onapsis/Onapsis_CVE-2025-31324_Scanner_Tools
https://github.com/sug4r-wr41th/CVE-2025-31324
https://github.com/NULLTRACE0X/CVE-2025-31324
⚪ Vulnerability in SAP NetWeaver Exploited to Deploy Auto-Color Linux Malware
🗨️ Experts at Darktrace warned that hackers exploited a critical vulnerability in SAP NetWeaver (CVE-2025-31324) to deploy Linux malware Auto-Color into the network of an unnamed American chemical company.
##updated 2025-10-22T00:34:17
1 posts
SonicWall patches actively exploited flaw vulnerability chain in SMA 1000 appliances
SonicWall SMA 1000 appliances are being actively exploited through a vulnerability chain combining CVE-2025-40602 (a local privilege escalation flaw) with CVE-2025-23006 (a previously patched deserialization vulnerability), enabling unauthenticated remote code execution with root privileges.
**If you have SonicWall SMA 1000 appliances, make sure their SSH and management access is isolated from the public internet and only accessible from trusted networks. Review latest version, and if not up-to date patched, plan a very quick upgrade to platform-hotfix 12.4.3-03245 or 12.5.0-02283 (or higher). Your devices are being hacked, and you can't really hide them from the internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/sonicwall-patches-actively-exploited-flaw-vulnerability-chain-in-sma-1000-appliances-x-l-b-q-7/gD2P6Ple2L
updated 2025-10-22T00:34:16
1 posts
1 repos
CVE-2024-53704 in SonicWall SSLVPN has been added to the KEV Catalog.
##updated 2025-10-22T00:32:54
1 posts
9 repos
https://github.com/bibo318/CVE-2023-22518
https://github.com/ForceFledgling/CVE-2023-22518
https://github.com/0x0d3ad/CVE-2023-22518
https://github.com/0x00sector/CVE_2023_22518_Checker
https://github.com/ductink98lhp/analyze-Exploit-CVE-2023-22518-Confluence
https://github.com/davidfortytwo/CVE-2023-22518
https://github.com/RevoltSecurities/CVE-2023-22518
Cảnh báo: Lỗ hổng CVE-2023-22518 ảnh hưởng nghiêm trọng đến Atlassian Confluence Data Center và Server.
Lỗi phân quyền này cho phép kẻ tấn công không cần xác thực có thể gây mất dữ liệu hệ thống trên quy mô lớn. Dù không có nguy cơ rò rỉ thông tin (tính bảo mật), nhưng rủi ro mất mát dữ liệu là cực kỳ cao.
Người dùng cần thực hiện cập nhật bản vá hoặc các biện pháp giảm thiểu theo hướng dẫn của Atlassian ngay lập tức.
#AnNinhMang #CyberSecurity #CVE202322518 #Atlassian #Confluence #BaoMat #Vu
##updated 2025-08-12T18:31:39
1 posts
1 repos
New.
ESET: Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component https://www.welivesecurity.com/en/eset-research/revisiting-cve-2025-50165-critical-flaw-windows-imaging-component/ @ESETresearch #threatresearch #infosec #Windows #Microsoft
##updated 2025-08-11T19:15:27.343000
1 posts
1 repos
New.
Picus: Omnissa Workspace One CVE-2025-25231 Path Traversal Exploit https://www.picussecurity.com/resource/blog/omnissa-workspace-one-cve-2025-25231-path-traversal-exploit #infosec #threatresearch
##updated 2025-07-15T22:56:20
1 posts
updated 2025-07-11T06:30:36
1 posts
Critical vulnerabilities reported in Axis Communications Camera management systems
Axis Communications patched four security vulnerabilities (CVE-2025-30023 through CVE-2025-30026) in its camera management software, including a critical remote code execution flaw and authentication bypass issues affecting surveillance systems in government facilities and critical infrastructure.
**If you have Axis Communications camera management systems (AXIS Camera Station Pro, AXIS Camera Station, or AXIS Device Manager), make sure they are isolated from the internet and only accessible from trusted internal networks. Then plan an update to the latest patched versions (Camera Station Pro 6.9+, Camera Station 5.58+, Device Manager 5.32+).**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-vulnerabilities-reported-in-axis-communications-camera-management-systems-a-w-f-7-b/gD2P6Ple2L
updated 2025-07-11T06:30:36
1 posts
Critical vulnerabilities reported in Axis Communications Camera management systems
Axis Communications patched four security vulnerabilities (CVE-2025-30023 through CVE-2025-30026) in its camera management software, including a critical remote code execution flaw and authentication bypass issues affecting surveillance systems in government facilities and critical infrastructure.
**If you have Axis Communications camera management systems (AXIS Camera Station Pro, AXIS Camera Station, or AXIS Device Manager), make sure they are isolated from the internet and only accessible from trusted internal networks. Then plan an update to the latest patched versions (Camera Station Pro 6.9+, Camera Station 5.58+, Device Manager 5.32+).**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-vulnerabilities-reported-in-axis-communications-camera-management-systems-a-w-f-7-b/gD2P6Ple2L
updated 2025-07-09T18:08:46
1 posts
2 repos
When OAuth Becomes a Weapon: Lessons from CVE-2025-6514 https://amlalabs.com/blog/oauth-cve-2025-6514/
##updated 2025-06-11T16:17:03
1 posts
This critical advisory was posted yesterday. It relates to CVE-2025-7962, CVE-2025-49146, and CVE-2025-5516.
HPESBNW04986 rev.1 - HPE Telco Service Activator, Multiple Vulnerabilities https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04986en_us&docLocale=en_US
More:
The Hacker News: HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution https://thehackernews.com/2025/12/hpe-oneview-flaw-rated-cvss-100-allows.html @thehackernews #infosec #HPE #vulnerability
##updated 2025-06-06T17:42:29.520000
1 posts
This critical advisory was posted yesterday. It relates to CVE-2025-7962, CVE-2025-49146, and CVE-2025-5516.
HPESBNW04986 rev.1 - HPE Telco Service Activator, Multiple Vulnerabilities https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04986en_us&docLocale=en_US
More:
The Hacker News: HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution https://thehackernews.com/2025/12/hpe-oneview-flaw-rated-cvss-100-allows.html @thehackernews #infosec #HPE #vulnerability
##updated 2025-06-03T15:31:27
1 posts
updated 2025-05-19T14:20:49.300000
2 posts
📢 CVE-2025-29970 : use-after-free dans bfs.sys (Windows) permettant une élévation de privilèges
📝 Selon PixiePoint Security (22 décembre 2025), CVE-2025-29970 affecte le driver Windows Brokering File System (bfs.sys) utilisé...
📖 cyberveille : https://cyberveille.ch/posts/2025-12-22-cve-2025-29970-use-after-free-dans-bfs-sys-windows-permettant-une-elevation-de-privileges/
🌐 source : https://www.pixiepointsecurity.com/blog/nday-cve-2025-29970/
#CVE_2025_29970 #IOC #Cyberveille
Microsoft Brokering File System Elevation of Privilege Vulnerability (CVE--2025-29970) https://www.pixiepointsecurity.com/blog/nday-cve-2025-29970/
##updated 2025-05-13T20:57:18.117000
1 posts
4 repos
https://github.com/Ashwesker/Blackash-CVE-2025-20393
https://github.com/cyberleelawat/CVE-2025-20393
🔥 Cisco AsyncOS Zero-Day (CVE-2025-20393)
• BleepingComputer
https://www.bleepingcomputer.com/news/security/cisco-warns-of-unpatched-asyncos-zero-day-exploited-in-attacks/
• The Hacker News
https://thehackernews.com/2025/12/cisco-warns-of-active-attacks.html
• SecurityWeek
https://www.securityweek.com/china-linked-hackers-exploiting-zero-day-in-cisco-security-gear/
• The Register
https://www.theregister.com/2025/12/17/attacks_pummeling_cisco_0day/
• Dark Reading (CISA KEV addition)
https://www.darkreading.com/attacks-breaches/cisa-adds-cisco-asyncos-zero-day-to-kev-catalog
• SOCRadar analysis
https://socradar.io/blog/cve-2025-20393-cisco-asyncos-zero-day-email/
updated 2025-04-11T15:39:52.920000
1 posts
Flaw in NVIDIA Isaac Lab enables remote code execution
NVIDIA patched a critical deserialization vulnerability (CVE-2025-32210) in Isaac Lab that allows authenticated low-privilege users to execute arbitrary code, affecting all versions prior to v2.3.0.
**Make sure all devices running NVIDIA Isaac Lab are isolated from the internet and accessible from trusted networks only. Then plan a quick upgrade to Isaac Lab v2.3.0.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/flaw-in-nvidia-isaac-lab-enables-remote-code-execution-u-o-u-f-q/gD2P6Ple2L
updated 2024-08-20T20:35:34.497000
1 posts
somehow nfs feels faster too. Kinda sad about CVE-2024-44067 on this board but i don't really care because i just want more architectures
##CVE-2025-67745 - Myhoard logs backup encryption key in plain text https://cvefeed.io/vuln/detail/CVE-2025-67745
##🚨 CVE-2025-66029 (HIGH): OSC ondemand ≤4.0.8 exposes sensitive creds via Apache proxy headers—attackers can harvest tokens if users hit malicious servers. Patch in v4.1; config workarounds available now. Details: https://radar.offseq.com/threat/cve-2025-66029-cwe-522-insufficiently-protected-cr-b9fc3983 #OffSeq #HPC #Vuln #Security
##CVE-2025-68435 - Zerobyte has Authentication Bypass by Primary Weakness https://cvefeed.io/vuln/detail/CVE-2025-68435
##CVE-2025-68435 - Zerobyte has Authentication Bypass by Primary Weakness https://cvefeed.io/vuln/detail/CVE-2025-68435
##CVE-2025-68147 - opensourcepos has a Cross-site Scripting vulnerability https://cvefeed.io/vuln/detail/CVE-2025-68147
##CVE-2025-68399 - ChurchCRM has Stored Cross-Site Scripting (XSS) In GroupEditor.php https://cvefeed.io/vuln/detail/CVE-2025-68399
##CVE-2025-68275 - ChurchCRM vulnerable to Stored XSS - Group name > Person Listing https://cvefeed.io/vuln/detail/CVE-2025-68275
##Six basically identical CVEs from Amazon in different SDKs.
https://www.cve.org/CVERecord?id=CVE-2025-14759
https://www.cve.org/CVERecord?id=CVE-2025-14760
https://www.cve.org/CVERecord?id=CVE-2025-14761
https://www.cve.org/CVERecord?id=CVE-2025-14762
##