## Updated at UTC 2025-12-28T03:11:05.139568

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2025-66738 8.8 0.04% 1 0 2025-12-27T16:15:52.240000 An issue in Yealink T21P_E2 Phone 52.84.0.15 allows a remote normal privileged a
CVE-2025-54322 10.0 0.00% 1 1 2025-12-27T14:15:49.547000 Xspeeder SXZOS through 2025-12-26 allows root remote code execution via base64-e
CVE-2025-68952 0 0.33% 1 0 2025-12-27T01:15:42.853000 Eigent is a multi-agent Workforce. In version 0.0.60, a 1-click Remote Code Exec
CVE-2025-68668 9.9 0.08% 2 0 2025-12-27T01:08:46 ### Impact A sandbox bypass vulnerability exists in the Python Code Node that us
CVE-2025-25341 7.5 0.02% 1 0 2025-12-26T19:47:35 A vulnerability exists in the libxmljs 1.0.11 when parsing a specially crafted X
CVE-2025-67015 7.5 0.03% 3 0 2025-12-26T18:30:32 Incorrect access control in Comtech EF Data CDM-625 / CDM-625A Advanced Satellit
CVE-2025-57403 7.5 0.36% 3 0 2025-12-26T18:30:27 Cola Dnslog v1.3.2 is vulnerable to Directory Traversal. When a DNS query for a
CVE-2025-67014 7.5 0.06% 1 0 2025-12-26T18:30:27 Incorrect access control in DEV Systemtechnik GmbH DEV 7113 RF over Fiber Distri
CVE-2025-13158 0 0.19% 3 0 2025-12-26T16:15:43.263000 Prototype pollution vulnerability in apidoc-core versions 0.2.0 and all subseque
CVE-2025-64645 7.7 0.01% 1 0 2025-12-26T15:30:28 IBM Concert 1.0.0 through 2.1.0 could allow a local user to escalate their privi
CVE-2025-12771 7.8 0.01% 3 0 2025-12-26T15:30:23 IBM Concert 1.0.0 through 2.1.0 is vulnerable to a stack-based buffer overflow,
CVE-2025-13915 9.8 0.31% 4 0 2025-12-26T14:15:58.193000 IBM API Connect 10.0.8.0 through 10.0.8.5, and 10.0.11.0 could allow a remote at
CVE-2025-67450 7.8 0.01% 2 0 2025-12-26T07:15:45.850000 Due to insecure library loading in the Eaton UPS Companion software executable, 
CVE-2025-59887 8.6 0.02% 2 0 2025-12-26T07:15:45.047000 Improper authentication of library files in the Eaton UPS Companion software ins
CVE-2025-62578 None 0.01% 1 0 2025-12-26T06:30:38 DVP-12SE - Modbus/TCP Cleartext Transmission of Sensitive Information
CVE-2025-68945 5.8 0.03% 2 0 2025-12-26T04:15:41.507000 In Gitea before 1.21.2, an anonymous user can visit a private user's project.
CVE-2025-68937 None 0.06% 2 0 2025-12-26T03:31:17 Forgejo before 13.0.2 allows attackers to write to unintended files, and possibl
CVE-2025-15092 8.8 0.04% 3 0 2025-12-26T03:30:21 A vulnerability was identified in UTT 进取 512W up to 1.7.7-171114. Impacted is th
CVE-2025-68939 8.2 0.04% 1 0 2025-12-26T03:15:50.653000 Gitea before 1.23.0 allows attackers to add attachments with forbidden file exte
CVE-2025-15090 8.8 0.04% 3 0 2025-12-26T00:30:18 A vulnerability was found in UTT 进取 512W up to 1.7.7-171114. This vulnerability
CVE-2025-15091 8.8 0.04% 3 0 2025-12-26T00:30:18 A vulnerability was determined in UTT 进取 512W up to 1.7.7-171114. This issue aff
CVE-2025-15089 8.8 0.04% 1 0 2025-12-26T00:30:18 A vulnerability has been found in UTT 进取 512W up to 1.7.7-171114. This affects t
CVE-2025-15082 5.3 0.03% 2 0 2025-12-25T18:30:21 A vulnerability was found in TOZED ZLT M30s up to 1.47. Impacted is an unknown f
CVE-2025-15081 6.3 0.84% 2 0 2025-12-25T15:30:20 A vulnerability has been found in JD Cloud BE6500 4.4.1.r4308. This issue affect
CVE-2025-66377 7.5 0.03% 1 0 2025-12-25T06:30:37 Pexip Infinity before 39.0 has Missing Authentication for a Critical Function in
CVE-2025-15076 7.3 0.06% 2 0 2025-12-25T04:15:43.287000 A weakness has been identified in Tenda CH22 1.0.0.1. Impacted is an unknown fun
CVE-2025-14879 9.8 0.15% 2 0 2025-12-24T15:19:01.640000 A weakness has been identified in Tenda WH450 1.0.0.18. Affected is an unknown f
CVE-2025-68664 9.3 0.05% 25 1 2025-12-24T15:16:02.507000 LangChain is a framework for building agents and LLM-powered applications. Prior
CVE-2025-64468 7.8 0.02% 1 0 2025-12-24T15:11:39.433000 There is a use-after-free vulnerability in sentry!sentry_span_set_data() when pa
CVE-2025-64465 7.8 0.02% 1 0 2025-12-24T15:11:06.627000 There is an out of bounds read vulnerability in NI LabVIEW in lvre!DataSizeTDR()
CVE-2025-14900 4.7 0.03% 1 0 2025-12-24T15:01:29.060000 A security vulnerability has been detected in CodeAstro Real Estate Management S
CVE-2025-15047 9.8 0.09% 1 0 2025-12-24T00:30:27 A vulnerability was found in Tenda WH450 1.0.0.18. This affects an unknown funct
CVE-2025-15048 7.3 1.93% 1 0 2025-12-23T23:15:44.167000 A vulnerability was determined in Tenda WH450 1.0.0.18. This impacts an unknown
CVE-2025-15046 9.8 0.09% 1 0 2025-12-23T22:15:51.677000 A vulnerability has been found in Tenda WH450 1.0.0.18. The impacted element is
CVE-2025-14922 7.8 0.21% 1 0 2025-12-23T21:30:41 Hugging Face Diffusers CogView4 Deserialization of Untrusted Data Remote Code Ex
CVE-2025-14926 7.8 0.07% 1 0 2025-12-23T21:30:41 Hugging Face Transformers SEW convert_config Code Injection Remote Code Executio
CVE-2025-14931 10.0 1.40% 1 0 2025-12-23T21:30:41 Hugging Face smolagents Remote Python Executor Deserialization of Untrusted Data
CVE-2025-14927 7.8 0.07% 1 0 2025-12-23T21:30:41 Hugging Face Transformers SEW-D convert_config Code Injection Remote Code Execut
CVE-2025-14930 7.8 0.21% 1 0 2025-12-23T21:30:41 Hugging Face Transformers GLM4 Deserialization of Untrusted Data Remote Code Exe
CVE-2025-15045 9.8 0.09% 1 0 2025-12-23T21:30:41 A flaw has been found in Tenda WH450 1.0.0.18. The affected element is an unknow
CVE-2025-15044 9.8 0.09% 1 0 2025-12-23T21:30:41 A vulnerability was detected in Tenda WH450 1.0.0.18. Impacted is an unknown fun
CVE-2025-14928 7.8 0.07% 1 0 2025-12-23T21:30:40 Hugging Face Transformers HuBERT convert_config Code Injection Remote Code Execu
CVE-2025-14925 7.8 0.21% 1 1 2025-12-23T21:30:40 Hugging Face Accelerate Deserialization of Untrusted Data Remote Code Execution
CVE-2025-14921 7.8 0.21% 1 0 2025-12-23T21:30:40 Hugging Face Transformers Transformer-XL Model Deserialization of Untrusted Data
CVE-2025-29228 9.8 0.27% 1 0 2025-12-23T21:30:28 Linksys E5600 V1.1.0.26 is vulnerable to command injection in the runtime.macClo
CVE-2025-14929 7.8 0.21% 1 0 2025-12-23T21:15:48.240000 Hugging Face Transformers X-CLIP Checkpoint Conversion Deserialization of Untrus
CVE-2025-14924 7.8 0.21% 1 0 2025-12-23T21:15:47.600000 Hugging Face Transformers megatron_gpt2 Deserialization of Untrusted Data Remote
CVE-2025-14920 7.8 0.21% 1 0 2025-12-23T21:15:47.183000 Hugging Face Transformers Perceiver Model Deserialization of Untrusted Data Remo
CVE-2025-33223 9.8 0.06% 1 0 2025-12-23T18:30:35 NVIDIA Isaac Launchable contains a vulnerability where an attacker could cause a
CVE-2025-33224 9.8 0.06% 1 0 2025-12-23T18:30:35 NVIDIA Isaac Launchable contains a vulnerability where an attacker could cause a
CVE-2025-33222 9.8 0.06% 1 0 2025-12-23T18:30:35 NVIDIA Isaac Launchable contains a vulnerability where an attacker could exploit
CVE-2025-45493 6.5 3.38% 1 0 2025-12-23T18:30:35 Netgear EX8000 V1.0.0.126 is vulnerable to Command Injection via the iface param
CVE-2025-68381 6.5 0.05% 1 0 2025-12-23T17:42:32.230000 Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated
CVE-2025-66522 6.3 0.03% 1 0 2025-12-23T17:33:47.433000 A stored cross-site scripting (XSS) vulnerability exists in the Digital IDs func
CVE-2025-50526 9.8 0.29% 1 0 2025-12-23T17:15:48.060000 Netgear EX8000 V1.0.0.126 was discovered to contain a command injection vulnerab
CVE-2025-68475 7.5 0.08% 1 0 2025-12-23T16:01:13 Hi Fedify team! 👋 Thank you for your work on Fedify—it's a fantastic library fo
CVE-2025-68615 9.8 0.02% 2 0 2025-12-23T14:51:52.650000 net-snmp is a SNMP application library, tools and daemon. Prior to versions 5.9.
CVE-2025-68613 9.9 3.55% 3 23 template 2025-12-23T14:51:52.650000 n8n is an open source workflow automation platform. Versions starting with 0.211
CVE-2023-53973 8.4 0.01% 1 0 2025-12-23T14:51:52.650000 Zillya Total Security 3.0.2367.0 contains a privilege escalation vulnerability t
CVE-2025-14300 0 0.05% 1 0 2025-12-23T14:51:52.650000 The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper a
CVE-2023-52163 5.9 17.01% 4 0 2025-12-23T12:31:24 Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injectio
CVE-2025-37164 10.0 77.21% 2 2 template 2025-12-23T12:15:45.053000 A remote code execution issue exists in HPE OneView.
CVE-2025-65857 7.5 0.03% 1 1 2025-12-23T00:30:39 An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.00080
CVE-2023-53974 7.5 0.05% 1 0 2025-12-23T00:30:38 D-Link DSL-124 ME_1.00 contains a configuration file disclosure vulnerability th
CVE-2025-14882 None 0.04% 1 0 2025-12-20T17:41:17 An API endpoint allowed access to sensitive files from other users by knowing th
CVE-2025-63389 None 0.30% 1 0 2025-12-20T05:37:50 A critical authentication bypass vulnerability exists in Ollama platform's API e
CVE-2025-14299 None 0.07% 1 0 2025-12-20T03:31:40 The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length h
CVE-2025-8065 None 0.03% 1 0 2025-12-20T03:31:40 A buffer overflow vulnerability exists in the ONVIF XML parser of Tapo C200 V3.
CVE-2025-63390 5.3 0.06% 1 0 2025-12-20T00:31:32 An authentication bypass vulnerability exists in AnythingLLM v1.8.5 in via the /
CVE-2025-68161 None 0.04% 2 0 2025-12-19T22:08:03 The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does
CVE-2025-14964 9.8 0.10% 1 0 2025-12-19T21:30:26 A vulnerability has been found in TOTOLINK T10 4.1.8cu.5083_B20200521. This affe
CVE-2025-14733 9.8 36.33% 8 3 2025-12-19T21:30:19 An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remot
CVE-2025-66908 5.3 0.05% 1 0 2025-12-19T18:32:25 Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an improper file t
CVE-2025-66909 7.5 0.10% 1 0 2025-12-19T18:32:24 Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an image decompres
CVE-2025-65565 7.5 0.06% 1 0 2025-12-19T18:32:19 A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp
CVE-2025-65564 7.5 0.06% 1 0 2025-12-19T18:32:19 A denial-of-service vulnerability exists in the omec-upf (upf-epc-pfcpiface) in
CVE-2025-52692 8.8 0.02% 1 0 2025-12-19T18:31:18 Successful exploitation of the vulnerability could allow an attacker with local
CVE-2025-65568 7.5 0.05% 1 0 2025-12-19T18:15:50.713000 A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp
CVE-2025-65567 7.5 0.05% 1 0 2025-12-19T18:15:50.570000 A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp
CVE-2025-14847 7.5 0.04% 22 8 2025-12-19T18:00:18.330000 Mismatched length fields in Zlib compressed protocol headers may allow a read of
CVE-2025-13008 0 0.05% 2 0 2025-12-19T18:00:18.330000 An information disclosure vulnerability in M-Files Server before versions 25.12.
CVE-2025-14881 0 0.04% 1 0 2025-12-19T18:00:18.330000 Multiple API endpoints allowed access to sensitive files from other users by kno
CVE-2025-1928 9.1 0.06% 1 0 2025-12-19T18:00:18.330000 Improper Restriction of Excessive Authentication Attempts vulnerability in Resta
CVE-2025-11747 6.4 0.03% 1 0 2025-12-19T18:00:18.330000 The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site
CVE-2025-65041 10.0 0.08% 2 0 2025-12-19T18:00:18.330000 Improper authorization in Microsoft Partner Center allows an unauthorized attack
CVE-2025-68398 9.1 0.15% 2 0 2025-12-19T18:00:18.330000 Weblate is a web based localization tool. In versions prior to 5.15.1, it was po
CVE-2025-34452 0 0.42% 1 0 2025-12-19T18:00:18.330000 Streama versions 1.10.0 through 1.10.5 and prior to commit b7c8767 contain a com
CVE-2025-64236 9.8 0.09% 1 0 2025-12-19T18:00:18.330000 Authentication Bypass Using an Alternate Path or Channel vulnerability in Amento
CVE-2025-14738 0 0.07% 1 0 2025-12-19T18:00:18.330000 Improper authentication vulnerability in TP-Link WA850RE (httpd modules) allows
CVE-2025-40602 6.6 2.09% 1 2 2025-12-19T13:57:43.150000 A local privilege escalation vulnerability due to insufficient authorization in
CVE-2025-1927 7.1 0.01% 1 0 2025-12-19T12:31:33 Cross-Site Request Forgery (CSRF) vulnerability in Restajet Information Technolo
CVE-2025-1885 5.4 0.03% 1 0 2025-12-19T12:31:32 URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Restajet In
CVE-2025-14151 6.1 0.10% 1 0 2025-12-19T09:30:39 The SlimStat Analytics plugin for WordPress is vulnerable to Stored Cross-Site S
CVE-2025-66521 6.3 0.02% 1 0 2025-12-19T09:30:39 A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com
CVE-2025-66520 6.3 0.03% 1 0 2025-12-19T09:30:39 A stored cross-site scripting (XSS) vulnerability exists in the Portfolio featur
CVE-2025-68490 None 0.00% 1 0 2025-12-19T06:30:34 Rejected reason: Not used
CVE-2025-68489 None 0.00% 1 0 2025-12-19T06:30:34 Rejected reason: Not used
CVE-2025-68491 0 0.00% 1 0 2025-12-19T04:16:02.150000 Rejected reason: Not used
CVE-2025-68488 0 0.00% 1 0 2025-12-19T04:16:01.953000 Rejected reason: Not used
CVE-2025-68487 0 0.00% 1 0 2025-12-19T04:16:01.883000 Rejected reason: Not used
CVE-2025-11774 8.3 0.04% 2 0 2025-12-19T03:31:23 Improper Neutralization of Special Elements used in an OS Command ('OS Command I
CVE-2025-14908 6.3 0.06% 1 0 2025-12-19T03:31:23 A security flaw has been discovered in JeecgBoot up to 3.9.0. The affected eleme
CVE-2025-14899 4.7 0.03% 1 0 2025-12-19T03:31:23 A weakness has been identified in CodeAstro Real Estate Management System 1.0. T
CVE-2025-67843 8.3 0.25% 1 0 2025-12-19T03:31:18 A Server-Side Template Injection (SSTI) vulnerability in the MDX Rendering Engin
CVE-2025-13941 8.8 0.01% 1 0 2025-12-19T03:31:18 A local privilege escalation vulnerability exists in the Foxit PDF Reader/Editor
CVE-2025-64675 8.3 0.06% 1 0 2025-12-19T00:31:52 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2025-68382 6.5 0.05% 1 0 2025-12-19T00:31:47 Out-of-bounds read (CWE-125) allows an unauthenticated remote attacker to perfor
CVE-2025-65037 10.0 0.10% 1 0 2025-12-19T00:31:47 Improper control of generation of code ('code injection') in Azure Container App
CVE-2025-64663 10.0 0.06% 1 0 2025-12-19T00:31:47 Custom Question Answering Elevation of Privilege Vulnerability
CVE-2025-13427 None 0.14% 1 0 2025-12-19T00:31:46 An authentication bypass vulnerability in Google Cloud Dialogflow CX Messenger a
CVE-2025-64677 8.2 0.07% 1 0 2025-12-19T00:31:46 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2025-64676 7.2 0.10% 1 0 2025-12-19T00:31:46 '.../...//' in Microsoft Purview allows an authorized attacker to execute code o
CVE-2025-14739 None 0.02% 1 0 2025-12-18T21:31:50 Access of Uninitialized Pointer vulnerability in TP-Link WR940N and WR941ND allo
CVE-2025-14884 7.2 0.27% 2 0 2025-12-18T18:30:38 A vulnerability was detected in D-Link DIR-605 202WWB03. Affected by this issue
CVE-2025-14896 7.5 0.04% 1 0 2025-12-18T18:30:37 due to insufficient sanitazation in Vega’s `convert()` function when `safeMode`
CVE-2025-14878 9.8 0.15% 2 0 2025-12-18T18:30:37 A security flaw has been discovered in Tenda WH450 1.0.0.18. This impacts an unk
CVE-2025-14737 None 0.73% 1 0 2025-12-18T18:30:37 Command Injection vulnerability in TP-Link WA850RE (httpd modules) allows authen
CVE-2025-63391 7.5 0.10% 1 0 2025-12-18T18:30:37 An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api
CVE-2025-59374 9.8 35.96% 3 0 2025-12-18T15:42:03.790000 "UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were
CVE-2025-20393 10.0 6.77% 7 4 2025-12-18T15:41:16.840000 Cisco is aware of a potential vulnerability.&nbsp; Cisco is currently investigat
CVE-2025-64466 7.8 0.02% 1 0 2025-12-18T15:30:52 There is an out of bounds read vulnerability in NI LabVIEW in lvre!ExecPostedPro
CVE-2025-64469 7.8 0.02% 1 0 2025-12-18T15:30:51 There is a stack-based buffer overflow vulnerability in NI LabVIEW in LVResFile:
CVE-2025-64467 7.8 0.02% 1 0 2025-12-18T15:30:45 There is an out of bounds read vulnerability in NI LabVIEW in LVResFile::FindRsr
CVE-2025-13110 4.3 0.03% 1 0 2025-12-18T15:07:18.427000 The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is
CVE-2025-68154 8.1 0.06% 1 0 2025-12-16T22:37:26 ## Summary The `fsSize()` function in `systeminformation` is vulnerable to **OS
CVE-2025-46295 9.8 0.33% 1 0 2025-12-16T21:32:02 Apache Commons Text versions prior to 1.10.0 included interpolation features tha
CVE-2025-59718 9.8 5.95% 2 3 2025-12-16T21:30:51 A improper verification of cryptographic signature vulnerability in Fortinet For
CVE-2025-68260 None 0.02% 2 0 2025-12-16T15:30:56 In the Linux kernel, the following vulnerability has been resolved: rust_binder
CVE-2025-9612 5.1 0.01% 1 0 2025-12-11T15:31:38 An issue was discovered in the PCI Express (PCIe) Integrity and Data Encryption
CVE-2025-59719 9.8 0.07% 1 1 2025-12-09T18:30:52 An improper verification of cryptographic signature vulnerability in Fortinet Fo
CVE-2025-55182 10.0 46.72% 2 100 template 2025-12-09T16:53:25 ### Impact There is an unauthenticated remote code execution vulnerability in R
CVE-2025-37899 7.8 0.01% 1 2 2025-12-06T22:15:50.277000 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix
CVE-2025-55753 7.5 0.08% 1 0 2025-12-05T21:31:27 An integer overflow in the case of failed ACME certificate renewal leads, after
CVE-2025-65945 7.5 0.01% 1 1 2025-12-04T22:50:04 ### Overview An improper signature verification vulnerability exists when using
CVE-2025-66416 0 0.10% 1 0 2025-12-04T17:15:25.860000 The MCP Python SDK, called `mcp` on PyPI, is a Python implementation of the Mode
CVE-2025-66478 0 0.00% 1 100 2025-12-03T18:15:47.200000 Rejected reason: This CVE is a duplicate of CVE-2025-55182.
CVE-2025-12480 9.1 78.02% 1 0 template 2025-11-14T02:00:02.350000 Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access
CVE-2025-63666 9.8 0.09% 1 1 2025-11-13T18:31:03 Tenda AC15 v15.03.05.18_multi) issues an authentication cookie that exposes the
CVE-2025-9242 9.8 73.45% 1 2 template 2025-11-13T15:31:32 An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remot
CVE-2025-11953 9.8 0.49% 1 3 2025-11-11T17:15:38.977000 The Metro Development Server, which is opened by the React Native Community CLI,
CVE-2025-59287 9.8 75.42% 1 22 template 2025-11-11T15:32:22 Deserialization of untrusted data in Windows Server Update Service allows an una
CVE-2025-31324 10.0 40.17% 1 19 template 2025-10-31T21:56:14.103000 SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper a
CVE-2025-8088 8.8 3.40% 1 28 2025-10-30T15:50:59.680000 A path traversal vulnerability affecting the Windows version of WinRAR allows th
CVE-2020-12812 9.8 45.02% 7 0 2025-10-24T12:53:49.213000 An improper authentication vulnerability in SSL VPN in FortiOS 6.4.0, 6.2.0 to 6
CVE-2025-23006 9.8 56.66% 1 0 2025-10-22T00:34:17 Pre-authentication deserialization of untrusted data vulnerability has been iden
CVE-2024-55591 9.8 94.14% 2 10 template 2025-10-22T00:34:16 An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-2
CVE-2024-53704 9.8 93.82% 1 1 template 2025-10-22T00:34:16 An Improper Authentication vulnerability in the SSLVPN authentication mechanism
CVE-2018-0802 7.8 94.07% 1 7 2025-10-22T00:31:30 Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Offic
CVE-2017-11882 7.8 94.38% 1 38 2025-10-22T00:16:02.450000 Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Micr
CVE-2025-4609 9.7 0.12% 1 0 2025-08-25T15:33:03 Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome
CVE-2025-50165 9.8 3.84% 1 1 2025-08-12T18:31:39 Untrusted pointer dereference in Microsoft Graphics Component allows an unauthor
CVE-2025-53786 8.0 0.16% 1 1 2025-08-06T20:23:37.600000 On April 18th 2025, Microsoft announced Exchange Server Security Changes for Hyb
CVE-2025-24294 5.3 0.06% 1 0 2025-07-15T22:56:20 A denial of service vulnerability has been discovered in the resolv gem bundled
CVE-2025-30023 9.1 1.92% 1 0 2025-07-11T06:30:36 The communication protocol used between client and server had a flaw that could
CVE-2025-30026 None 0.03% 1 0 2025-07-11T06:30:36 The AXIS Camera Station Server had a flaw that allowed to bypass authentication
CVE-2025-6514 9.6 0.73% 1 2 2025-07-10T13:17:30.017000 mcp-remote is exposed to OS command injection when connecting to untrusted MCP s
CVE-2025-3699 9.8 0.17% 1 0 2025-06-27T12:32:20 Missing Authentication for Critical Function vulnerability in Mitsubishi Electri
CVE-2025-5499 7.3 0.11% 1 0 2025-06-04T14:54:33.783000 A vulnerability classified as critical has been found in slackero phpwcms up to
CVE-2025-5378 4.3 0.03% 1 1 2025-05-31T15:30:34 A vulnerability classified as problematic has been found in Astun Technology iSh
CVE-2025-29970 7.8 0.07% 1 0 2025-05-13T18:31:00 Use after free in Microsoft Brokering File System allows an authorized attacker
CVE-2025-2039 4.7 0.10% 2 3 2025-03-06T21:31:33 A vulnerability classified as critical has been found in code-projects Blood Ban
CVE-2024-44067 8.4 0.04% 1 0 2024-08-20T20:35:34.497000 The T-Head XuanTie C910 CPU in the TH1520 SoC and the T-Head XuanTie C920 CPU in
CVE-2017-5123 8.8 1.71% 2 8 2023-01-30T05:03:17 Insufficient data validation in waitid allowed an user to escape sandboxes on Li
CVE-2025-9615 0 0.00% 2 0 N/A
CVE-2025-59946 0 0.04% 1 0 N/A
CVE-2025-66203 0 0.26% 2 0 N/A
CVE-2025-14558 0 0.00% 1 2 N/A
CVE-2025-3716 0 0.00% 1 2 N/A
CVE-2026-00001 0 0.00% 1 0 N/A
CVE-2025-66209 0 0.57% 1 1 N/A
CVE-2025-14269 0 0.00% 1 1 N/A
CVE-2025-14282 0 0.00% 1 0 N/A
CVE-2025-66387 0 0.00% 1 0 N/A
CVE-2025-67745 0 0.02% 1 0 N/A
CVE-2025-63821 0 0.00% 1 1 N/A
CVE-2025-63820 0 0.00% 1 1 N/A

CVE-2025-66738
(8.8 HIGH)

EPSS: 0.04%

updated 2025-12-27T16:15:52.240000

1 posts

An issue in Yealink T21P_E2 Phone 52.84.0.15 allows a remote normal privileged attacker to execute arbitrary code via a crafted request the ping function of the diagnostic component.

thehackerwire@mastodon.social at 2025-12-27T17:02:35.000Z ##

🟠 CVE-2025-66738 - High (8.8)

An issue in Yealink T21P_E2 Phone 52.84.0.15 allows a remote normal privileged attacker to execute arbitrary code via a crafted request the ping function of the diagnostic component.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-54322
(10.0 CRITICAL)

EPSS: 0.00%

updated 2025-12-27T14:15:49.547000

1 posts

Xspeeder SXZOS through 2025-12-26 allows root remote code execution via base64-encoded Python code in the chkid parameter to vLogin.py. The title and oIP parameters are also used.

1 repos

https://github.com/Sachinart/CVE-2025-54322

thehackerwire@mastodon.social at 2025-12-27T15:00:12.000Z ##

🔴 CVE-2025-54322 - Critical (10)

Xspeeder SXZOS through 2025-12-26 allows root remote code execution via base64-encoded Python code in the chkid parameter to vLogin.py. The title and oIP parameters are also used.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-68952
(0 None)

EPSS: 0.33%

updated 2025-12-27T01:15:42.853000

1 posts

Eigent is a multi-agent Workforce. In version 0.0.60, a 1-click Remote Code Execution (RCE) vulnerability has been identified in Eigent. This vulnerability allows an attacker to execute arbitrary code on the victim's machine or server through a specific interaction (1-click). This issue has been patched in version 0.0.61.

offseq at 2025-12-27T04:34:20.933Z ##

CRITICAL: CVE-2025-68952 in eigent-ai Eigent v0.0.60 enables unauthenticated RCE over the network. Patch to 0.0.61 now! Impact: full system compromise, data loss. 🛡️ radar.offseq.com/threat/cve-20

##

CVE-2025-68668
(9.9 CRITICAL)

EPSS: 0.08%

updated 2025-12-27T01:08:46

2 posts

### Impact A sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. An authenticated user with permission to create or modify workflows can exploit this vulnerability to execute arbitrary commands on the host system running n8n, using the same privileges as the n8n process. ### Patches In n8n version 1.111.0, a task-runner-based native Python implementation was introduced

offseq at 2025-12-27T01:37:12.117Z ##

⚠️ CRITICAL: CVE-2025-68668 in n8n-io n8n (v1.0.0–<2.0.0) allows authenticated users to bypass the Python Code Node sandbox & run arbitrary commands. Patch to 2.0.0+ or disable the node for mitigation. Full details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2025-12-26T22:19:59.000Z ##

🔴 CVE-2025-68668 - Critical (9.9)

n8n is an open source workflow automation platform. From version 1.0.0 to before 2.0.0, a sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. An authenticated user with permission to create or modify workflows can exploi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-25341
(7.5 HIGH)

EPSS: 0.02%

updated 2025-12-26T19:47:35

1 posts

A vulnerability exists in the libxmljs 1.0.11 when parsing a specially crafted XML document. Accessing the internal _ref property on entity_ref and entity_decl nodes causes a segmentation fault, potentially leading to a denial-of-service (DoS).

thehackerwire@mastodon.social at 2025-12-26T18:06:02.000Z ##

🟠 CVE-2025-25341 - High (7.5)

A vulnerability exists in the libxmljs 1.0.11 when parsing a specially crafted XML document. Accessing the internal _ref property on entity_ref and entity_decl nodes causes a segmentation fault, potentially leading to a denial-of-service (DoS).

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-67015
(7.5 HIGH)

EPSS: 0.03%

updated 2025-12-26T18:30:32

3 posts

Incorrect access control in Comtech EF Data CDM-625 / CDM-625A Advanced Satellite Modem with firmware v2.5.1 allows attackers to change the Administrator password and escalate privileges via sending a crafted POST request to /Forms/admin_access_1.

thehackerwire@mastodon.social at 2025-12-26T17:44:13.000Z ##

🟠 CVE-2025-67015 - High (7.5)

Incorrect access control in Comtech EF Data CDM-625 / CDM-625A Advanced Satellite Modem with firmware v2.5.1 allows attackers to change the Administrator password and escalate privileges via sending a crafted POST request to /Forms/admin_access_1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

cR0w at 2025-12-26T15:32:39.900Z ##

I don't know about this specific device, but these types of devices tend to be used a lot in remote OT systems, often with the management interface exposed, and almost no monitoring. Other similar modems have been successfully exploited ITW for some interesting incidents.

cve.org/CVERecord?id=CVE-2025-

Incorrect access control in Comtech EF Data CDM-625 / CDM-625A Advanced Satellite Modem with firmware v2.5.1 allows attackers to change the Administrator password and escalate privileges via sending a crafted POST request to /Forms/admin_access_1.

##

cR0w@infosec.exchange at 2025-12-26T15:32:39.000Z ##

I don't know about this specific device, but these types of devices tend to be used a lot in remote OT systems, often with the management interface exposed, and almost no monitoring. Other similar modems have been successfully exploited ITW for some interesting incidents.

cve.org/CVERecord?id=CVE-2025-

Incorrect access control in Comtech EF Data CDM-625 / CDM-625A Advanced Satellite Modem with firmware v2.5.1 allows attackers to change the Administrator password and escalate privileges via sending a crafted POST request to /Forms/admin_access_1.

##

CVE-2025-57403
(7.5 HIGH)

EPSS: 0.36%

updated 2025-12-26T18:30:27

3 posts

Cola Dnslog v1.3.2 is vulnerable to Directory Traversal. When a DNS query for a TXT record is processed, the application concatenates the requested URL (or a portion of it) directly with a base path using os.path.join. This bypass allows directory traversal or absolute path injection, leading to the potential exposure of sensitive information.

thehackerwire@mastodon.social at 2025-12-26T17:44:22.000Z ##

🟠 CVE-2025-57403 - High (7.5)

Cola Dnslog v1.3.2 is vulnerable to Directory Traversal. When a DNS query for a TXT record is processed, the application concatenates the requested URL (or a portion of it) directly with a base path using os.path.join. This bypass allows directory...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

cR0w at 2025-12-26T16:15:46.878Z ##

../ and DNS?! It really is the season of magic.

cve.org/CVERecord?id=CVE-2025-

Cola Dnslog v1.3.2 is vulnerable to Directory Traversal. When a DNS query for a TXT record is processed, the application concatenates the requested URL (or a portion of it) directly with a base path using os.path.join. This bypass allows directory traversal or absolute path injection, leading to the potential exposure of sensitive information.

##

cR0w@infosec.exchange at 2025-12-26T16:15:46.000Z ##

../ and DNS?! It really is the season of magic.

cve.org/CVERecord?id=CVE-2025-

Cola Dnslog v1.3.2 is vulnerable to Directory Traversal. When a DNS query for a TXT record is processed, the application concatenates the requested URL (or a portion of it) directly with a base path using os.path.join. This bypass allows directory traversal or absolute path injection, leading to the potential exposure of sensitive information.

##

CVE-2025-67014
(7.5 HIGH)

EPSS: 0.06%

updated 2025-12-26T18:30:27

1 posts

Incorrect access control in DEV Systemtechnik GmbH DEV 7113 RF over Fiber Distribution System 32-0078 H.01 allows unauthenticated attackers to access an administrative endpoint.

thehackerwire@mastodon.social at 2025-12-26T17:44:04.000Z ##

🟠 CVE-2025-67014 - High (7.5)

Incorrect access control in DEV Systemtechnik GmbH DEV 7113 RF over Fiber Distribution System 32-0078 H.01 allows unauthenticated attackers to access an administrative endpoint.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-13158
(0 None)

EPSS: 0.19%

updated 2025-12-26T16:15:43.263000

3 posts

Prototype pollution vulnerability in apidoc-core versions 0.2.0 and all subsequent versions allows remote attackers to modify JavaScript object prototypes via malformed data structures, including the “define” property processed by the application, potentially leading to denial of service or unintended behavior in applications relying on the integrity of prototype chains. This affects the preProces

offseq at 2025-12-27T03:07:13.369Z ##

🔥 CRITICAL: CVE-2025-13158 in apidoc-core (0.2.0+) enables remote prototype pollution via malformed input. Risks: DoS & unpredictable JS app behavior. Audit, sanitize, and isolate now — no patch yet! radar.offseq.com/threat/cve-20

##

cR0w at 2025-12-26T16:14:14.027Z ##

sev:CRIT prototype pollution in apidoc-core. But worse is the word wrapping without hyphens in the summary.

sonatype.com/security-advisori

##

cR0w@infosec.exchange at 2025-12-26T16:14:14.000Z ##

sev:CRIT prototype pollution in apidoc-core. But worse is the word wrapping without hyphens in the summary.

sonatype.com/security-advisori

##

CVE-2025-64645
(7.7 HIGH)

EPSS: 0.01%

updated 2025-12-26T15:30:28

1 posts

IBM Concert 1.0.0 through 2.1.0 could allow a local user to escalate their privileges due to a race condition of a symbolic link.

thehackerwire@mastodon.social at 2025-12-26T15:43:49.000Z ##

🟠 CVE-2025-64645 - High (7.7)

IBM Concert 1.0.0 through 2.1.0 could allow a local user to escalate their privileges due to a race condition of a symbolic link.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-12771
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-26T15:30:23

3 posts

IBM Concert 1.0.0 through 2.1.0 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local user could overflow the buffer and execute arbitrary code on the system.

cR0w at 2025-12-26T14:44:28.045Z ##

Post-auth BoF in IBM Concert.

ibm.com/support/pages/node/725

cve.org/CVERecord?id=CVE-2025-

##

thehackerwire@mastodon.social at 2025-12-26T13:43:44.000Z ##

🟠 CVE-2025-12771 - High (7.8)

IBM Concert 1.0.0 through 2.1.0 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local user could overflow the buffer and execute arbitrary code on the system.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

cR0w@infosec.exchange at 2025-12-26T14:44:28.000Z ##

Post-auth BoF in IBM Concert.

ibm.com/support/pages/node/725

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-13915
(9.8 CRITICAL)

EPSS: 0.31%

updated 2025-12-26T14:15:58.193000

4 posts

IBM API Connect 10.0.8.0 through 10.0.8.5, and 10.0.11.0 could allow a remote attacker to bypass authentication mechanisms and gain unauthorized access to the application.

offseq at 2025-12-27T06:04:10.495Z ##

🚨 CRITICAL: CVE-2025-13915 in IBM API Connect (10.0.8.0–10.0.8.5, 10.0.11.0) enables remote auth bypass (CWE-305)! No patch yet. Restrict access, monitor logs, and prep for updates. More: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2025-12-26T14:44:17.000Z ##

🔴 CVE-2025-13915 - Critical (9.8)

IBM API Connect 10.0.8.0 through 10.0.8.5, and 10.0.11.0 could allow a remote attacker to bypass authentication mechanisms and gain unauthorized access to the application.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

cR0w at 2025-12-26T14:43:19.414Z ##

sev:CRIT auth bypass in IBM API Connect.

ibm.com/support/pages/node/725

cve.org/CVERecord?id=CVE-2025-

##

cR0w@infosec.exchange at 2025-12-26T14:43:19.000Z ##

sev:CRIT auth bypass in IBM API Connect.

ibm.com/support/pages/node/725

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-67450
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-26T07:15:45.850000

2 posts

Due to insecure library loading in the Eaton UPS Companion software executable, an attacker with access to the software package could perform arbitrary code execution . This security issue has been fixed in the latest version of EUC which is available on the Eaton download center.

offseq at 2025-12-26T08:04:16.882Z ##

⚠️ CVE-2025-67450 (HIGH): Eaton UPS Companion software vulnerable to insecure library loading (CWE-427), enabling local arbitrary code execution. Patch urgently via Eaton’s download center. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2025-12-26T07:44:31.000Z ##

🟠 CVE-2025-67450 - High (7.8)

Due to insecure library loading in the Eaton UPS Companion software executable, an attacker with access to the software package

could perform arbitrary code execution . This security issue has been fixed in the latest version of EUC which is a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-59887
(8.6 HIGH)

EPSS: 0.02%

updated 2025-12-26T07:15:45.047000

2 posts

Improper authentication of library files in the Eaton UPS Companion software installer could lead to arbitrary code execution of an attacker with the access to the software package. This security issue has been fixed in the latest version of EUC which is available on the Eaton download center.

offseq at 2025-12-26T09:05:31.912Z ##

🚨 HIGH severity (CVSS 8.6) in Eaton UPS Companion Software: CVE-2025-59887 allows local arbitrary code execution via insecure search path. Patch ASAP & restrict install rights. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2025-12-26T07:44:22.000Z ##

🟠 CVE-2025-59887 - High (8.6)

Improper authentication of library files in the Eaton UPS Companion software installer could lead to arbitrary code execution of an attacker with the access to the software package. This security issue has been fixed in the latest version of EUC ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-62578(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-12-26T06:30:38

1 posts

DVP-12SE - Modbus/TCP Cleartext Transmission of Sensitive Information

offseq at 2025-12-26T06:34:34.090Z ##

🔒 CVE-2025-62578 (HIGH): Delta Electronics DVP-12SE PLCs transmit Modbus/TCP data in cleartext—risking MITM & command manipulation. No patch yet. Segment networks, restrict Modbus traffic, and monitor closely! radar.offseq.com/threat/cve-20

##

CVE-2025-68945
(5.8 MEDIUM)

EPSS: 0.03%

updated 2025-12-26T04:15:41.507000

2 posts

In Gitea before 1.21.2, an anonymous user can visit a private user's project.

cR0w at 2025-12-26T14:46:04.827Z ##

That doesn't seem right.

cve.org/CVERecord?id=CVE-2025-

In Gitea before 1.21.2, an anonymous user can visit a private user's project.

##

cR0w@infosec.exchange at 2025-12-26T14:46:04.000Z ##

That doesn't seem right.

cve.org/CVERecord?id=CVE-2025-

In Gitea before 1.21.2, an anonymous user can visit a private user's project.

##

CVE-2025-68937(CVSS UNKNOWN)

EPSS: 0.06%

updated 2025-12-26T03:31:17

2 posts

Forgejo before 13.0.2 allows attackers to write to unintended files, and possibly obtain server shell access, because of mishandling of out-of-repository symlink destinations for template repositories. This is also fixed for 11 LTS in 11.0.7 and later.

cR0w at 2025-12-26T14:49:14.073Z ##

Forgejo whoopsie.

cve.org/CVERecord?id=CVE-2025-

Forgejo before 13.0.2 allows attackers to write to unintended files, and possibly obtain server shell access, because of mishandling of out-of-repository symlink destinations for template repositories. This is also fixed for 11 LTS in 11.0.7 and later.

##

cR0w@infosec.exchange at 2025-12-26T14:49:14.000Z ##

Forgejo whoopsie.

cve.org/CVERecord?id=CVE-2025-

Forgejo before 13.0.2 allows attackers to write to unintended files, and possibly obtain server shell access, because of mishandling of out-of-repository symlink destinations for template repositories. This is also fixed for 11 LTS in 11.0.7 and later.

##

CVE-2025-15092
(8.8 HIGH)

EPSS: 0.04%

updated 2025-12-26T03:30:21

3 posts

A vulnerability was identified in UTT 进取 512W up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/ConfigExceptMSN. Such manipulation of the argument remark leads to buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.

CVE-2025-68939
(8.2 HIGH)

EPSS: 0.04%

updated 2025-12-26T03:15:50.653000

1 posts

Gitea before 1.23.0 allows attackers to add attachments with forbidden file extensions by editing an attachment name via an attachment API.

thehackerwire@mastodon.social at 2025-12-26T03:43:50.000Z ##

🟠 CVE-2025-68939 - High (8.2)

Gitea before 1.23.0 allows attackers to add attachments with forbidden file extensions by editing an attachment name via an attachment API.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-15090
(8.8 HIGH)

EPSS: 0.04%

updated 2025-12-26T00:30:18

3 posts

A vulnerability was found in UTT 进取 512W up to 1.7.7-171114. This vulnerability affects the function strcpy of the file /goform/formConfigNoticeConfig. The manipulation of the argument timestart results in buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used.

CVE-2025-15091
(8.8 HIGH)

EPSS: 0.04%

updated 2025-12-26T00:30:18

3 posts

A vulnerability was determined in UTT 进取 512W up to 1.7.7-171114. This issue affects the function strcpy of the file /goform/formPictureUrl. This manipulation of the argument importpictureurl causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

CVE-2025-15089
(8.8 HIGH)

EPSS: 0.04%

updated 2025-12-26T00:30:18

1 posts

A vulnerability has been found in UTT 进取 512W up to 1.7.7-171114. This affects the function strcpy of the file /goform/APSecurity. The manipulation of the argument wepkey1 leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.

offseq at 2025-12-26T05:06:02.974Z ##

⚠️ CVE-2025-15089: HIGH severity buffer overflow in UTT 进取 512W (≤1.7.7-171114). Remote attackers can exploit wepkey1 in /goform/APSecurity for code execution. Public exploit code is out! Patch or segment devices immediately. radar.offseq.com/threat/cve-20

##

CVE-2025-15082
(5.3 MEDIUM)

EPSS: 0.03%

updated 2025-12-25T18:30:21

2 posts

A vulnerability was found in TOZED ZLT M30s up to 1.47. Impacted is an unknown function of the file /reqproc/proc_post of the component Web Management Interface. Performing manipulation of the argument goformId results in information disclosure. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure b

CVE-2025-15081
(6.3 MEDIUM)

EPSS: 0.84%

updated 2025-12-25T15:30:20

2 posts

A vulnerability has been found in JD Cloud BE6500 4.4.1.r4308. This issue affects the function sub_4780 of the file /jdcapi. Such manipulation of the argument ddns_name leads to command injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2025-66377
(7.5 HIGH)

EPSS: 0.03%

updated 2025-12-25T06:30:37

1 posts

Pexip Infinity before 39.0 has Missing Authentication for a Critical Function in a product-internal API, allowing an attacker (who already has access to execute code on one node within a Pexip Infinity installation) to impact the operation of other nodes within the installation.

thehackerwire@mastodon.social at 2025-12-25T23:49:44.000Z ##

🟠 CVE-2025-66377 - High (7.5)

Pexip Infinity before 39.0 has Missing Authentication for a Critical Function in a product-internal API, allowing an attacker (who already has access to execute code on one node within a Pexip Infinity installation) to impact the operation of othe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-15076
(7.3 HIGH)

EPSS: 0.06%

updated 2025-12-25T04:15:43.287000

2 posts

A weakness has been identified in Tenda CH22 1.0.0.1. Impacted is an unknown function of the file /public/. Executing manipulation can lead to path traversal. The attack can be launched remotely. The exploit has been made available to the public and could be exploited.

CVE-2025-14879
(9.8 CRITICAL)

EPSS: 0.15%

updated 2025-12-24T15:19:01.640000

2 posts

A weakness has been identified in Tenda WH450 1.0.0.18. Affected is an unknown function of the file /goform/onSSIDChange of the component HTTP Request Handler. This manipulation of the argument ssid_index causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

CVE-2025-68664
(9.3 CRITICAL)

EPSS: 0.05%

updated 2025-12-24T15:16:02.507000

25 posts

LangChain is a framework for building agents and LLM-powered applications. Prior to versions 0.3.81 and 1.2.5, a serialization injection vulnerability exists in LangChain's dumps() and dumpd() functions. The functions do not escape dictionaries with 'lc' keys when serializing free-form dictionaries. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data

1 repos

https://github.com/Ak-cybe/CVE-2025-68664-LangGrinch-PoC

inw@mastodon.social at 2025-12-27T12:27:32.000Z ##

Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

thehackernews.com/2025/12/crit

> A critical LangChain Core vulnerability (CVE-2025-68664, CVSS 9.3) allows secret theft and prompt injection through unsafe serialization; updates fix

#LangChain #unsafeDeserialization

##

cyberveille@mastobot.ping.moi at 2025-12-26T16:30:04.000Z ##

📢 LangChain: vulnérabilité critique d'injection de sérialisation permet l’exfiltration de secrets (CVE-2025-68664)
📝 Selon un avis GitHub Security Advisory (dépôt LangChain) publié le...
📖 cyberveille : cyberveille.ch/posts/2025-12-2
🌐 source : github.com/langchain-ai/langch
#CVE_2025_68664 #IOC #Cyberveille

##

t3n@flipboard.com at 2025-12-26T14:18:49.000Z ##

LangGrinch: Kritische Lücke in LangChain-Core bedroht KI-Agenten
t3n.de/news/langgrinch-langcha

Gepostet in Software & Entwicklung | t3n @software-entwicklung-t3n-t3n

##

_r_netsec at 2025-12-26T10:43:06.549Z ##

LangGrinch: A Bug in the Library, A Lesson for the Architecture amlalabs.com/blog/langgrinch-c

##

hackernewsrobot@mastodon.social at 2025-12-26T09:51:07.000Z ##

All I Want for Christmas Is Your Secrets: LangGrinch hits LangChain Core cyata.ai/blog/langgrinch-langc

##

beyondmachines1 at 2025-12-26T09:01:09.521Z ##

Critical LangChain serialization flaw enables secret extraction and arbitrary code execution

LangChain has patched a critical deserialization vulnerability (CVE-2025-68664) in its core library that allowed attackers to extract environment variables and potentially execute arbitrary code through improper escaping of the 'lc' key structure in serialization functions.

**If you're using LangChain, immediately update langchain-core to version 1.2.5 or 0.3.81, check your invoked methods for the risky ones and treat all LLM outputs as untrusted data. Make sure your langchain-community dependencies are also updated.**

beyondmachines.net/event_detai

##

hn100@social.lansky.name at 2025-12-26T08:40:08.000Z ##

Critical vulnerability in LangChain – CVE-2025-68664

Link: cyata.ai/blog/langgrinch-langc
Discussion: news.ycombinator.com/item?id=4

##

hn50@social.lansky.name at 2025-12-25T22:55:06.000Z ##

All I Want for Christmas Is Your Secrets: LangGrinch hits LangChain Core

Link: cyata.ai/blog/langgrinch-langc
Discussion: news.ycombinator.com/item?id=4

##

ycombinator@rss-mstdn.studiofreesia.com at 2025-12-25T21:39:57.000Z ##

All I Want for Christmas Is Your Secrets: LangGrinch hits LangChain Core
cyata.ai/blog/langgrinch-langc
#ycombinator

##

hnbot@chrispelli.fun at 2025-12-25T20:27:08.000Z ##

All I Want for Xmas Is Your Secrets: LangGrinch Hits LangChain (CVE-2025-68664) - cyata.ai/blog/langgrinch-langc

#hackernews

##

ngate@mastodon.social at 2025-12-25T20:26:17.000Z ##

🎄🤶 Oh, look! It's the #LangGrinch, stealing secrets like they're going out of style! Someone better tell Cyata that their "Control Plane for Agentic Identity" was just hijacked by the Christmas spirit of security negligence. 🎁🔓💥
cyata.ai/blog/langgrinch-langc #CyberSecurity #ChristmasSpirit #SecretHacks #AgenticIdentity #HackerNews #ngated

##

h4ckernews@mastodon.social at 2025-12-25T20:26:10.000Z ##

All I Want for Xmas Is Your Secrets: LangGrinch Hits LangChain (CVE-2025-68664)

cyata.ai/blog/langgrinch-langc

#HackerNews #LangGrinch #LangChain #CVE2025 #cybersecurity #secrets

##

ycombinator@rss-mstdn.studiofreesia.com at 2025-12-25T19:20:55.000Z ##

All I Want for Xmas Is Your Secrets: LangGrinch Hits LangChain (CVE-2025-68664)
cyata.ai/blog/langgrinch-langc
#ycombinator

##

CuratedHackerNews@mastodon.social at 2025-12-25T19:17:05.000Z ##

Critical vulnerability in LangChain – CVE-2025-68664

cyata.ai/blog/langgrinch-langc

#ai

##

t3n@flipboard.com at 2025-12-26T14:18:49.000Z ##

LangGrinch: Kritische Lücke in LangChain-Core bedroht KI-Agenten
t3n.de/news/langgrinch-langcha

Gepostet in Software & Entwicklung | t3n @software-entwicklung-t3n-t3n

##

_r_netsec@infosec.exchange at 2025-12-26T10:43:06.000Z ##

LangGrinch: A Bug in the Library, A Lesson for the Architecture amlalabs.com/blog/langgrinch-c

##

hackernewsrobot@mastodon.social at 2025-12-26T09:51:07.000Z ##

All I Want for Christmas Is Your Secrets: LangGrinch hits LangChain Core cyata.ai/blog/langgrinch-langc

##

beyondmachines1@infosec.exchange at 2025-12-26T09:01:09.000Z ##

Critical LangChain serialization flaw enables secret extraction and arbitrary code execution

LangChain has patched a critical deserialization vulnerability (CVE-2025-68664) in its core library that allowed attackers to extract environment variables and potentially execute arbitrary code through improper escaping of the 'lc' key structure in serialization functions.

**If you're using LangChain, immediately update langchain-core to version 1.2.5 or 0.3.81, check your invoked methods for the risky ones and treat all LLM outputs as untrusted data. Make sure your langchain-community dependencies are also updated.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

hn100@social.lansky.name at 2025-12-26T08:40:08.000Z ##

Critical vulnerability in LangChain – CVE-2025-68664

Link: cyata.ai/blog/langgrinch-langc
Discussion: news.ycombinator.com/item?id=4

##

LLMs@activitypub.awakari.com at 2025-12-26T02:48:17.000Z ## Critical Langchain Vulnerability Let attackers Exfiltrate Sensitive Secrets from AI systems A critical vulnerability in LangChain’s core library (CVE-2025-68664) allows attackers to exfiltrate se...

#Cyber #Security #News #Vulnerability #News #cyber #security #cyber #security #news

Origin | Interest | Match ##

hn50@social.lansky.name at 2025-12-25T22:55:06.000Z ##

All I Want for Christmas Is Your Secrets: LangGrinch hits LangChain Core

Link: cyata.ai/blog/langgrinch-langc
Discussion: news.ycombinator.com/item?id=4

##

ycombinator@rss-mstdn.studiofreesia.com at 2025-12-25T21:39:57.000Z ##

All I Want for Christmas Is Your Secrets: LangGrinch hits LangChain Core
cyata.ai/blog/langgrinch-langc
#ycombinator

##

h4ckernews@mastodon.social at 2025-12-25T20:26:10.000Z ##

All I Want for Xmas Is Your Secrets: LangGrinch Hits LangChain (CVE-2025-68664)

cyata.ai/blog/langgrinch-langc

#HackerNews #LangGrinch #LangChain #CVE2025 #cybersecurity #secrets

##

ycombinator@rss-mstdn.studiofreesia.com at 2025-12-25T19:20:55.000Z ##

All I Want for Xmas Is Your Secrets: LangGrinch Hits LangChain (CVE-2025-68664)
cyata.ai/blog/langgrinch-langc
#ycombinator

##

CuratedHackerNews@mastodon.social at 2025-12-25T19:17:05.000Z ##

Critical vulnerability in LangChain – CVE-2025-68664

cyata.ai/blog/langgrinch-langc

#ai

##

CVE-2025-64468
(7.8 HIGH)

EPSS: 0.02%

updated 2025-12-24T15:11:39.433000

1 posts

There is a use-after-free vulnerability in sentry!sentry_span_set_data() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64468 - Use-after-Free in sentry!sentry_span_set_data() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64465
(7.8 HIGH)

EPSS: 0.02%

updated 2025-12-24T15:11:06.627000

1 posts

There is an out of bounds read vulnerability in NI LabVIEW in lvre!DataSizeTDR() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64465 - Out-of-Bounds Read in lvre!DataSizeTDR() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14900
(4.7 MEDIUM)

EPSS: 0.03%

updated 2025-12-24T15:01:29.060000

1 posts

A security vulnerability has been detected in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /admin/userdelete.php of the component Administrator Endpoint. Such manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

jos1264@social.skynetcloud.site at 2025-12-19T02:15:01.000Z ##

CVE-2025-14900 - CodeAstro Real Estate Management System Administrator Endpoint userdelete.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-15047
(9.8 CRITICAL)

EPSS: 0.09%

updated 2025-12-24T00:30:27

1 posts

A vulnerability was found in Tenda WH450 1.0.0.18. This affects an unknown function of the file /goform/PPTPDClient of the component HTTP Request Handler. Performing manipulation of the argument Username results in stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made public and could be used.

CVE-2025-15048
(7.3 HIGH)

EPSS: 1.93%

updated 2025-12-23T23:15:44.167000

1 posts

A vulnerability was determined in Tenda WH450 1.0.0.18. This impacts an unknown function of the file /goform/CheckTools of the component HTTP Request Handler. Executing manipulation of the argument ipaddress can lead to command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

CVE-2025-15046
(9.8 CRITICAL)

EPSS: 0.09%

updated 2025-12-23T22:15:51.677000

1 posts

A vulnerability has been found in Tenda WH450 1.0.0.18. The impacted element is an unknown function of the file /goform/PPTPClient of the component HTTP Request Handler. Such manipulation of the argument netmsk leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-14922
(7.8 HIGH)

EPSS: 0.21%

updated 2025-12-23T21:30:41

1 posts

Hugging Face Diffusers CogView4 Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Diffusers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsin

CVE-2025-14926
(7.8 HIGH)

EPSS: 0.07%

updated 2025-12-23T21:30:41

1 posts

Hugging Face Transformers SEW convert_config Code Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must convert a malicious checkpoint. The specific flaw exists within the convert_config function. T

CVE-2025-14931
(10.0 CRITICAL)

EPSS: 1.40%

updated 2025-12-23T21:30:41

1 posts

Hugging Face smolagents Remote Python Executor Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face smolagents. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of pickle data. The issue results from the lack of p

CVE-2025-14927
(7.8 HIGH)

EPSS: 0.07%

updated 2025-12-23T21:30:41

1 posts

Hugging Face Transformers SEW-D convert_config Code Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must convert a malicious checkpoint. The specific flaw exists within the convert_config function.

CVE-2025-14930
(7.8 HIGH)

EPSS: 0.21%

updated 2025-12-23T21:30:41

1 posts

Hugging Face Transformers GLM4 Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the pars

CVE-2025-15045
(9.8 CRITICAL)

EPSS: 0.09%

updated 2025-12-23T21:30:41

1 posts

A flaw has been found in Tenda WH450 1.0.0.18. The affected element is an unknown function of the file /goform/Natlimit of the component HTTP Request Handler. This manipulation of the argument page causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used.

CVE-2025-15044
(9.8 CRITICAL)

EPSS: 0.09%

updated 2025-12-23T21:30:41

1 posts

A vulnerability was detected in Tenda WH450 1.0.0.18. Impacted is an unknown function of the file /goform/NatStaticSetting. The manipulation of the argument page results in stack-based buffer overflow. The attack may be performed from remote. The exploit is now public and may be used.

CVE-2025-14928
(7.8 HIGH)

EPSS: 0.07%

updated 2025-12-23T21:30:40

1 posts

Hugging Face Transformers HuBERT convert_config Code Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must convert a malicious checkpoint. The specific flaw exists within the convert_config function

CVE-2025-14925
(7.8 HIGH)

EPSS: 0.21%

updated 2025-12-23T21:30:40

1 posts

Hugging Face Accelerate Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Accelerate. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ch

1 repos

https://github.com/byteReaper77/CVE-2025-5964-

CVE-2025-14921
(7.8 HIGH)

EPSS: 0.21%

updated 2025-12-23T21:30:40

1 posts

Hugging Face Transformers Transformer-XL Model Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists

CVE-2025-29228
(9.8 CRITICAL)

EPSS: 0.27%

updated 2025-12-23T21:30:28

1 posts

Linksys E5600 V1.1.0.26 is vulnerable to command injection in the runtime.macClone function via the mc.ip parameter.

CVE-2025-14929
(7.8 HIGH)

EPSS: 0.21%

updated 2025-12-23T21:15:48.240000

1 posts

Hugging Face Transformers X-CLIP Checkpoint Conversion Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific fla

CVE-2025-14924
(7.8 HIGH)

EPSS: 0.21%

updated 2025-12-23T21:15:47.600000

1 posts

Hugging Face Transformers megatron_gpt2 Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within

CVE-2025-14920
(7.8 HIGH)

EPSS: 0.21%

updated 2025-12-23T21:15:47.183000

1 posts

Hugging Face Transformers Perceiver Model Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Hugging Face Transformers. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists with

CVE-2025-33223
(9.8 CRITICAL)

EPSS: 0.06%

updated 2025-12-23T18:30:35

1 posts

NVIDIA Isaac Launchable contains a vulnerability where an attacker could cause an execution with unnecessary privileges. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, denial of service, information disclosure and data tampering.

beyondmachines1@infosec.exchange at 2025-12-25T08:01:32.000Z ##

NVIDIA patches critical vulnerabilities in Isaac Launchable Platform

NVIDIA patched three critical vulnerabilities (CVE-2025-33222, CVE-2025-33223, CVE-2025-33224) in its Isaac Launchable robotics platform that allow unauthenticated attackers to execute code, escalate privileges, and tamper with data.

**If you use NVIDIA Isaac Launchable, plan a very quick update to version 1.11.1 or later from the official GitHub repository. There are three critical flaws that allow unauthenticated attackers to completely compromise your system.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-33224
(9.8 CRITICAL)

EPSS: 0.06%

updated 2025-12-23T18:30:35

1 posts

NVIDIA Isaac Launchable contains a vulnerability where an attacker could cause an execution with unnecessary privileges. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, denial of service, information disclosure and data tampering.

beyondmachines1@infosec.exchange at 2025-12-25T08:01:32.000Z ##

NVIDIA patches critical vulnerabilities in Isaac Launchable Platform

NVIDIA patched three critical vulnerabilities (CVE-2025-33222, CVE-2025-33223, CVE-2025-33224) in its Isaac Launchable robotics platform that allow unauthenticated attackers to execute code, escalate privileges, and tamper with data.

**If you use NVIDIA Isaac Launchable, plan a very quick update to version 1.11.1 or later from the official GitHub repository. There are three critical flaws that allow unauthenticated attackers to completely compromise your system.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-33222
(9.8 CRITICAL)

EPSS: 0.06%

updated 2025-12-23T18:30:35

1 posts

NVIDIA Isaac Launchable contains a vulnerability where an attacker could exploit a hard-coded credential issue. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, denial of service, and data tampering.

beyondmachines1@infosec.exchange at 2025-12-25T08:01:32.000Z ##

NVIDIA patches critical vulnerabilities in Isaac Launchable Platform

NVIDIA patched three critical vulnerabilities (CVE-2025-33222, CVE-2025-33223, CVE-2025-33224) in its Isaac Launchable robotics platform that allow unauthenticated attackers to execute code, escalate privileges, and tamper with data.

**If you use NVIDIA Isaac Launchable, plan a very quick update to version 1.11.1 or later from the official GitHub repository. There are three critical flaws that allow unauthenticated attackers to completely compromise your system.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-45493
(6.5 MEDIUM)

EPSS: 3.38%

updated 2025-12-23T18:30:35

1 posts

Netgear EX8000 V1.0.0.126 is vulnerable to Command Injection via the iface parameter in the action_bandwidth function.

CVE-2025-68381
(6.5 MEDIUM)

EPSS: 0.05%

updated 2025-12-23T17:42:32.230000

1 posts

Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated attacker to exploit a Buffer Overflow (CAPEC-100) and reliably crash the application or cause significant resource exhaustion via a single crafted UDP packet with an invalid fragment sequence number.

CVE-2025-66522
(6.3 MEDIUM)

EPSS: 0.03%

updated 2025-12-23T17:33:47.433000

1 posts

A stored cross-site scripting (XSS) vulnerability exists in the Digital IDs functionality of the Foxit PDF Editor Cloud (pdfonline.foxit.com). The application does not properly sanitize or encode the Common Name field of Digital IDs before inserting user-supplied content into the DOM. As a result, embedded HTML or JavaScript may execute whenever the Digital IDs dialog is accessed or when the affec

jos1264@social.skynetcloud.site at 2025-12-19T09:15:01.000Z ##

CVE-2025-66522 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Digital IDs Common Name Field cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-50526
(9.8 CRITICAL)

EPSS: 0.29%

updated 2025-12-23T17:15:48.060000

1 posts

Netgear EX8000 V1.0.0.126 was discovered to contain a command injection vulnerability via the switch_status function.

CVE-2025-68475
(7.5 HIGH)

EPSS: 0.08%

updated 2025-12-23T16:01:13

1 posts

Hi Fedify team! 👋 Thank you for your work on Fedify—it's a fantastic library for building federated applications. While reviewing the codebase, I discovered a Regular Expression Denial of Service (ReDoS) vulnerability that I'd like to report. I hope this helps improve the project's security. --- ## Summary A Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document

CVE-2025-68615
(9.8 CRITICAL)

EPSS: 0.02%

updated 2025-12-23T14:51:52.650000

2 posts

net-snmp is a SNMP application library, tools and daemon. Prior to versions 5.9.5 and 5.10.pre2, a specially crafted packet to an net-snmp snmptrapd daemon can cause a buffer overflow and the daemon to crash. This issue has been patched in versions 5.9.5 and 5.10.pre2.

beyondmachines1 at 2025-12-26T08:01:09.359Z ##

Critical buffer overflow flaw reported in Net-SNMP

A critical buffer overflow vulnerability (CVE-2025-68615) in Net-SNMP's snmptrapd daemon allows remote attackers to crash services or potentially execute arbitrary code by sending malformed SNMP trap packets. All Net-SNMP versions prior to 5.9.5 (Community/Enterprise editions) and 5.10.pre2 (development) are affected. Internet-accessible instances on UDP port 162 are most vulnerable.

**If you are running Net-SNMP, make sure the system is isolated from the internet and only accessible from trusted networks. Immediately update to version 5.9.5 or later.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2025-12-26T08:01:09.000Z ##

Critical buffer overflow flaw reported in Net-SNMP

A critical buffer overflow vulnerability (CVE-2025-68615) in Net-SNMP's snmptrapd daemon allows remote attackers to crash services or potentially execute arbitrary code by sending malformed SNMP trap packets. All Net-SNMP versions prior to 5.9.5 (Community/Enterprise editions) and 5.10.pre2 (development) are affected. Internet-accessible instances on UDP port 162 are most vulnerable.

**If you are running Net-SNMP, make sure the system is isolated from the internet and only accessible from trusted networks. Immediately update to version 5.9.5 or later.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-68613
(9.9 CRITICAL)

EPSS: 3.55%

updated 2025-12-23T14:51:52.650000

3 posts

n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently

Nuclei template

23 repos

https://github.com/LingerANR/n8n-CVE-2025-68613

https://github.com/TheStingR/CVE-2025-68613-POC

https://github.com/Ashwesker/Blackash-CVE-2025-68613

https://github.com/AbdulRKB/n8n-RCE

https://github.com/Dlanang/homelab-CVE-2025-68613

https://github.com/hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultimate

https://github.com/releaseown/analysis-and-poc-n8n-CVE-2025-68613

https://github.com/secjoker/CVE-2025-68613

https://github.com/manyaigdtuw/CVE-2025-68613_Scanner

https://github.com/JohannesLks/CVE-2025-68613-Python-Exploit

https://github.com/Khin-96/n8n-cve-2025-68613-thm

https://github.com/rxerium/CVE-2025-68613

https://github.com/intbjw/CVE-2025-68613-poc-via-copilot

https://github.com/GnuTLam/POC-CVE-2025-68613

https://github.com/intelligent-ears/CVE-2025-68613

https://github.com/ali-py3/Exploit-CVE-2025-68613

https://github.com/wioui/n8n-CVE-2025-68613-exploit

https://github.com/mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613

https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis

https://github.com/reem-012/poc_CVE-2025-68613

https://github.com/J4ck3LSyN-Gen2/n8n-CVE-2025-68613-TryHackMe

https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab

https://github.com/nehkark/CVE-2025-68613

decio@infosec.exchange at 2025-12-24T10:47:56.000Z ##

si vous utilisez n8n… ⚠️

Une vulnérabilité critique ( CVE-2025-68613 ) permet à un utilisateur connecté de détourner un workflow pour exécuter des commandes sur le serveur qui héberge n8n.

Concrètement, une automatisation mal conçue (ou malveillante) peut sortir du cadre prévu et donner accès au système :

données manipulées par les workflows

modification ou suppression des automatisations

et potentiellement contrôle complet du serveur

La faille touche de nombreuses versions (depuis 0.211.0) et est très sévère, surtout si n8n est exposé à Internet ou utilisé par plusieurs personnes.

✅ Solution : mettre à jour rapidement vers les versions corrigées (≥ 1.120.4 / 1.121.1 / 1.122.0).

En attendant, restreignez au maximum les droits de création/édition des workflows

👉 Si n8n est critique dans votre infra, c’est une priorité de sécurité.

"Remote Code Execution via Expression Injection "
👇
github.com/n8n-io/n8n/security

🔍
⬇️
github.com/rxerium/CVE-2025-68

🔍
⬇️
"n8n CVE-2025-68613 RCE Exploitation: A Detailed Guide"
👇
blog.securelayer7.net/cve-2025

#CyberrVeille #n8n #CVE_2025_68613

##

nyanbinary@infosec.exchange at 2025-12-23T22:03:07.000Z ##

@cR0w well there WAS this... nvd.nist.gov/vuln/detail/CVE-2

##

beyondmachines1@infosec.exchange at 2025-12-22T09:01:31.000Z ##

Critical remote code execution flaw reported in n8n workflow automation platform

n8n's workflow automation platform reports a critical vulnerability (CVE-2025-68613, CVSS 10.0) allowing authenticated attackers to execute arbitrary code with full system privileges, potentially exposing sensitive workflows, API credentials, and corporate networks.

**If you're running self-hosted n8n, plan a quick upgrade to version 1.120.4, 1.121.1, or 1.122.0 to patch CVE-2025-68613. Until you upgrade, restrict workflow editing permissions to fully trusted users only.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2023-53973
(8.4 HIGH)

EPSS: 0.01%

updated 2025-12-23T14:51:52.650000

1 posts

Zillya Total Security 3.0.2367.0 contains a privilege escalation vulnerability that allows low-privileged users to copy files to unauthorized system locations using the quarantine module. Attackers can leverage symbolic link techniques to restore quarantined files to restricted directories, potentially enabling system-level access through techniques like DLL hijacking.

thehackerwire@mastodon.social at 2025-12-23T13:39:31.000Z ##

🟠 CVE-2023-53973 - High (8.4)

Zillya Total Security 3.0.2367.0 contains a privilege escalation vulnerability that allows low-privileged users to copy files to unauthorized system locations using the quarantine module. Attackers can leverage symbolic link techniques to restore ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-14300
(0 None)

EPSS: 0.05%

updated 2025-12-23T14:51:52.650000

1 posts

The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper authentication. An unauthenticated attacker on the same local network segment can exploit this to modify the device’s Wi-Fi configuration, resulting in loss of connectivity and denial-of-service (DoS).

CVE-2023-52163
(5.9 MEDIUM)

EPSS: 17.01%

updated 2025-12-23T12:31:24

4 posts

Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

beyondmachines1@infosec.exchange at 2025-12-24T10:01:31.000Z ##

CISA reports actively exploted flaw in Digiever Network Video Recorder

CISA warns of active exploitation of CVE-2023-52163, a missing authorization vulnerability in Digiever DS-2105 Pro network video recorders that allows authenticated attackers to execute arbitrary commands and is being weaponized by Mirai-style botnets targeting IoT devices.

**If you have Digiever DS-2105 Pro network video recorders, make sure they are isolated from the internet and ensure they're only accessible from trusted internal networks. Since this device is end-of-life, there are no security patches for this flaw and is being actively exploited, plan to replace it as soon as possible. Until it's replaced keep it completely isolated behind strict network segmentation.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

DarkWebInformer@infosec.exchange at 2025-12-23T00:54:18.000Z ##

🚨 CISA has added on vulnerability to the KEV Catalog

CVE-2023-52163: Digiever DS-2105 Pro Missing Authorization Vulnerability

CVSS: 5.9

darkwebinformer.com/cisa-kev-c

Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

##

cisakevtracker@mastodon.social at 2025-12-22T19:00:55.000Z ##

CVE ID: CVE-2023-52163
Vendor: Digiever
Product: DS-2105 Pro
Date Added: 2025-12-22
Notes: digiever.com/tw/support/faq-co ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2025-12-22T18:00:39.000Z ##

CISA has added one vulnerability to the KEV catalogue.

CVE-2023-52163: Digiever DS-2105 Pro Missing Authorization Vulnerability cve.org/CVERecord?id=CVE-2023- #CISA #vulnerability #infosec

##

CVE-2025-37164
(10.0 CRITICAL)

EPSS: 77.21%

updated 2025-12-23T12:15:45.053000

2 posts

A remote code execution issue exists in HPE OneView.

Nuclei template

2 repos

https://github.com/g0vguy/CVE-2025-37164-PoC

https://github.com/rxerium/CVE-2025-37164

hackmag@infosec.exchange at 2025-12-24T20:00:12.000Z ##

⚪ Critical RCE Bug Patched in HPE OneView

🗨️ Hewlett Packard Enterprise (HPE) developers have released patches for a critical remote code execution vulnerability discovered in the OneView IT infrastructure management software. The issue is tracked as CVE-2025-37164 (a maximum score of 10.0 on the CVSS scale) and can be exploited without authen…

🔗 hackmag.com/news/cve-2025-3716

#news

##

GossiTheDog@cyberplace.social at 2025-12-19T10:14:00.000Z ##

HPE OneView CVE-2025-37164 worth paying attention to

- Widely used enterprise management software

- HPE added a REST command, executeCommand, which requires no authentication to execute commands. Obviously, this is dumb and now patched out

- Being on OneView allows attacker to access VMware, 3PAR storage etc by design

- Expect exploitation in the wild as it's so simple

- The vulnerability (executeCommand) was introduced around 2020, feels like a vulndoor

Shodan dork: product:"HPE OneView"

##

CVE-2025-65857
(7.5 HIGH)

EPSS: 0.03%

updated 2025-12-23T00:30:39

1 posts

An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06. The GetStreamUri exposes RTSP URIs containing hardcoded credentials enabling direct unauthorized video stream access.

1 repos

https://github.com/LuisMirandaAcebedo/CVE-2025-65857

CVE-2023-53974
(7.5 HIGH)

EPSS: 0.05%

updated 2025-12-23T00:30:38

1 posts

D-Link DSL-124 ME_1.00 contains a configuration file disclosure vulnerability that allows unauthenticated attackers to retrieve router settings through a POST request. Attackers can send a specific POST request to the router's configuration endpoint to download a complete backup file containing sensitive network credentials and system configurations.

CVE-2025-14882(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-12-20T17:41:17

1 posts

An API endpoint allowed access to sensitive files from other users by knowing the UUID of the file that were not intended to be accessible by UUID only.

CVE-2025-63389(CVSS UNKNOWN)

EPSS: 0.30%

updated 2025-12-20T05:37:50

1 posts

A critical authentication bypass vulnerability exists in Ollama platform's API endpoints in versions prior to and including v0.12.3. The platform exposes multiple API endpoints without requiring authentication, enabling remote attackers to perform unauthorized model management operations.

cR0w@infosec.exchange at 2025-12-18T15:29:52.000Z ##

Go hack more AI shit.

cve.org/CVERecord?id=CVE-2025-

A critical authentication bypass vulnerability exists in Ollama platform's API endpoints in versions prior to and including v0.12.3. The platform exposes multiple API endpoints without requiring authentication, enabling remote attackers to perform unauthorized model management operations.

##

CVE-2025-14299(CVSS UNKNOWN)

EPSS: 0.07%

updated 2025-12-20T03:31:40

1 posts

The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length header, which can lead to an integer overflow. An unauthenticated attacker on the same local network segment can send crafted HTTPS requests to trigger excessive memory allocation, causing the device to crash and resulting in denial-of-service (DoS).

CVE-2025-8065(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-12-20T03:31:40

1 posts

A buffer overflow vulnerability exists in the ONVIF XML parser of Tapo C200 V3. An unauthenticated attacker on the same local network segment can send specially crafted SOAP XML requests, causing memory overflow and device crash, resulting in denial-of-service (DoS).

CVE-2025-63390
(5.3 MEDIUM)

EPSS: 0.06%

updated 2025-12-20T00:31:32

1 posts

An authentication bypass vulnerability exists in AnythingLLM v1.8.5 in via the /api/workspaces endpoint. The endpoint fails to implement proper authentication checks, allowing unauthenticated remote attackers to enumerate and retrieve detailed information about all configured workspaces. Exposed data includes: workspace identifiers (id, name, slug), AI model configurations (chatProvider, chatModel

CVE-2025-68161(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-12-19T22:08:03

2 posts

The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the [verifyHostName](https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName) configuration attribute or the [log4j2.sslVerifyHostName](https://logging.apache.org/log4j/2.x/manual/systemproperties

cR0w@infosec.exchange at 2025-12-18T21:10:12.000Z ##

1000 yard stare

logging.apache.org/security.ht

##

jschauma@mstdn.social at 2025-12-18T19:27:47.000Z ##

For my fellow Log4j victims celebrating 4 years #log4shell PTSD: CVE-2025-68161

"The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the verifyHostName configuration attribute or the log4j2.sslVerifyHostName system property is set to true."

logging.apache.org/security.ht

(It's not that terrible. Seeing the string "log4j" just makes me twitch. :-)

##

CVE-2025-14964
(9.8 CRITICAL)

EPSS: 0.10%

updated 2025-12-19T21:30:26

1 posts

A vulnerability has been found in TOTOLINK T10 4.1.8cu.5083_B20200521. This affects the function sprintf of the file /cgi-bin/cstecgi.cgi. Such manipulation of the argument loginAuthUrl leads to stack-based buffer overflow. The attack may be performed from remote.

CVE-2025-14733
(9.8 CRITICAL)

EPSS: 36.33%

updated 2025-12-19T21:30:19

8 posts

An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.5 and

3 repos

https://github.com/b1gchoi/CVE-2025-14733

https://github.com/machevalia/CVE-2025-14733

https://github.com/Ashwesker/Blackash-CVE-2025-14733

cyberveille@mastobot.ping.moi at 2025-12-26T21:30:04.000Z ##

📢 Alerte: vulnérabilité critique RCE dans WatchGuard Fireware OS (CVE-2025-14733) exploitée
📝 Le Centre canadien pour la cybersécurité (Alerte AL25-020,...
📖 cyberveille : cyberveille.ch/posts/2025-12-2
🌐 source : cyber.gc.ca/fr/alertes-avis/al
#CVE_2025_14733 #IKEv2_VPN #Cyberveille

##

DarkWebInformer@infosec.exchange at 2025-12-19T21:00:51.000Z ##

🚨 CISA has added 1 vulnerability to the KEV Catalog

CVE-2025-14733: WatchGuard Firebox Out of Bounds Write Vulnerability

CVSS: 9.3

darkwebinformer.com/cisa-kev-c

##

cisakevtracker@mastodon.social at 2025-12-19T19:00:57.000Z ##

CVE ID: CVE-2025-14733
Vendor: WatchGuard
Product: Firebox
Date Added: 2025-12-19
Notes: Check for signs of potential compromise on all internet accessible instances after applying mitigations. For more information please see: watchguard.com/wgrd-psirt/advi ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

beyondmachines1@infosec.exchange at 2025-12-19T18:01:59.000Z ##

Critical actively exploited flaw in WatchGuard Fireware OS enables remote code execution through VPN service

WatchGuard patched a critical vulnerability (CVE-2025-14733) in Fireware OS that allows remote unauthenticated attackers to execute arbitrary code on devices with IKEv2 VPN configurations. The flaw is actively being exploited in the wild.

**If you have WatchGuard Firebox firewalls, you are under attack. Make a very quick update to the latest security updates from WatchGuard. After patching, change all passwords and security keys stored on the device, especially if you've ever used IKEv2 VPN configurations (even if now deleted). Old settings can still leave your firewall vulnerable.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

securityland@mastodon.social at 2025-12-19T13:24:20.000Z ##

Analysis of CVE-2025-14733, a critical WatchGuard Firebox security vulnerability. Learn why unauthenticated RCE persists even after deleting vulnerable VPN configurations.

#SecurityLand #CyberWatch #ZeroDay #Watchguard #SecurityVulnerability #Firewall #CVE

Read More: security.land/watchguard-cve-2

##

defendopsdiaries@infosec.exchange at 2025-12-19T10:37:04.000Z ##

Hackers can now take over WatchGuard Firebox firewalls with zero passwords needed, putting entire networks at risk. Is your organization’s gateway already compromised?

thedefendopsdiaries.com/exploi

##

jos1264@social.skynetcloud.site at 2025-12-19T02:30:01.000Z ##

CVE-2025-14733 - WatchGuard Firebox iked Out of Bounds Write Vulnerability cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-19T02:15:01.000Z ##

CVE-2025-14733 - WatchGuard Firebox iked Out of Bounds Write Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66908
(5.3 MEDIUM)

EPSS: 0.05%

updated 2025-12-19T18:32:25

1 posts

Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an improper file type validation vulnerability in the OCR image upload functionality. The OcrController in turms-ai-serving/src/main/java/im/turms/ai/domain/ocr/controller/OcrController.java uses the @FormData(contentType = MediaTypeConst.IMAGE) annotation to restrict uploads to image files, but this constraint is not properly enforced.

CVE-2025-66909
(7.5 HIGH)

EPSS: 0.10%

updated 2025-12-19T18:32:24

1 posts

Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an image decompression bomb denial of service vulnerability. The ExtendedOpenCVImage class in ai/djl/opencv/ExtendedOpenCVImage.java loads images using OpenCV's imread() function without validating dimensions or pixel count before decompression. An attacker can upload a specially crafted compressed image file (e.g., PNG) that is small w

CVE-2025-65565
(7.5 HIGH)

EPSS: 0.06%

updated 2025-12-19T18:32:19

1 posts

A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2.1.3-dev. After PFCP association is established, a PFCP Session Establishment Request that is missing the mandatory F-SEID (CPF-SEID) Information Element is not properly validated. The session establishment handler calls IE.FSEID() on a nil pointer, which triggers a panic and termin

jos1264@social.skynetcloud.site at 2025-12-18T20:30:00.000Z ##

CVE-2025-65565 - "OmeC-Project UPF pfcpiface Denial-of-Service Vulnerability" cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65564
(7.5 HIGH)

EPSS: 0.06%

updated 2025-12-19T18:32:19

1 posts

A denial-of-service vulnerability exists in the omec-upf (upf-epc-pfcpiface) in version upf-epc-pfcpiface:2.1.3-dev. When the UPF receives a PFCP Association Setup Request that is missing the mandatory Recovery Time Stamp Information Element, the association setup handler dereferences a nil pointer via IE.RecoveryTimeStamp() instead of validating the message. This results in a panic and terminates

CVE-2025-52692
(8.8 HIGH)

EPSS: 0.02%

updated 2025-12-19T18:31:18

1 posts

Successful exploitation of the vulnerability could allow an attacker with local network access to send a specially crafted URL to access certain administration functions without login credentials.

CVE-2025-65568
(7.5 HIGH)

EPSS: 0.05%

updated 2025-12-19T18:15:50.713000

1 posts

A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2.1.3-dev. After PFCP association, a PFCP Session Establishment Request that includes a CreateFAR with an empty or truncated IPv4 address field is not properly validated. During parsing, parseFAR() calls ip2int(), which performs an out-of-bounds read on the IPv4 address buffer and tr

jos1264@social.skynetcloud.site at 2025-12-18T20:30:01.000Z ##

CVE-2025-65568 - OmeC-Project UPF pfcpiface Denial-of-Service Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65567
(7.5 HIGH)

EPSS: 0.05%

updated 2025-12-19T18:15:50.570000

1 posts

A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2.1.3-dev. After PFCP association, a specially crafted PFCP Session Establishment Request with a CreatePDR that contains a malformed Flow-Description is not robustly validated. The Flow-Description parser (parseFlowDesc) can read beyond the bounds of the provided buffer, causing a pa

jos1264@social.skynetcloud.site at 2025-12-18T20:30:01.000Z ##

CVE-2025-65567 - OmeC-Project UPF Denial-of-Service Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14847
(7.5 HIGH)

EPSS: 0.04%

updated 2025-12-19T18:00:18.330000

22 posts

Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Ser

8 repos

https://github.com/Ashwesker/Blackash-CVE-2025-14847

https://github.com/KingHacker353/CVE-2025-14847_Expolit

https://github.com/nma-io/mongobleed

https://github.com/cybertechajju/CVE-2025-14847_Expolit

https://github.com/Black1hp/mongobleed-scanner

https://github.com/ProbiusOfficial/CVE-2025-14847

https://github.com/onewinner/CVE-2025-14847

https://github.com/saereya/CVE-2025-14847---MongoBleed

sans_isc at 2025-12-28T02:00:54.641Z ##

SANS Stormcast Sunday, December 28th, 2025: MongoDB Unauthenticated Memory Leak CVE-2025-14847
isc.sans.edu/podcastdetail/9750

##

secdb at 2025-12-27T20:10:01.013Z ##

🚨 CVE-2025-14847 - Mongobleed

Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Server v4.4 versions prior to 4.4.30, MongoDB Server v4.2 versions greater than or equal to 4.2.0, MongoDB Server v4.0 versions greater than or equal to 4.0.0, and MongoDB Server v3.6 versions greater than or equal to 3.6.0.

secdb.nttzen.cloud/cve/detail/

##

_r_netsec at 2025-12-27T13:28:06.580Z ##

Mongobleed - CVE-2025-14847 doublepulsar.com/merry-christm

##

decio at 2025-12-27T10:46:21.281Z ##

[VULN] ⚠️ MongoDB alerte sur une faille à haute gravité et urge de patcher

L'éditeur met en garde contre une vulnérabilité de lecture de mémoire de gravité élevée, qui pourrait être exploitée à distance par des attaquants non authentifiés.
⬇️
🔗 Source originale : bleepingcomputer.com/news/secu

PoC disponible (vecteur simple, peu de prérequis techniques,
surface d’attaque large, exploitation reproductible) 👀 : mongobleed
⬇️
• Impact observé: fuite de fragments de mémoire pouvant contenir des éléments sensibles tels que des journaux internes MongoDB, l’état du serveur, des paramètres WiredTiger, des données de /proc (ex. meminfo, statistiques réseau), des chemins Docker, des UUID de connexion et des IP clients. Le PoC montre des exemples de fuites (p. ex. MemAvailable, compteurs réseau) et indique la quantité totale de données exfiltrées ainsi que le nombre de fragments uniques. ⚠️
( cyberveille.ch/posts/2025-12-2 )

[Advisory officiel]
👇
jira.mongodb.org/browse/SERVER

CVE-2025-14847

typiquement, si vous avez un contrôleur exposé veut mieux verifier les règles firewall pour bloquer...
👇
community.ui.com/questions/Mon

💬
⬇️
infosec.pub/post/39604416

*edit 27.12 enlevé attribution incorrecte de RCE"

##

offseq at 2025-12-27T10:03:57.933Z ##

🔍 HIGH severity: MongoDB flaw (CVE-2025-14847) lets unauthenticated users read uninitialized memory via zlib. Affects v3.6–8.2.3. Patch now or disable zlib compression for mitigation. Full details: radar.offseq.com/threat/new-mo

##

GossiTheDog@cyberplace.social at 2025-12-27T05:34:44.000Z ##

There’s a great blog on detecting MongoBleed exploitation via Velociraptor blog.ecapuano.com/p/hunting-mo

##

threatcodex at 2025-12-27T01:38:55.192Z ##

MongoDB Unauthenticated Attacker Sensitive Memory Leak

ox.security/blog/attackers-cou

##

cyberveille@mastobot.ping.moi at 2025-12-26T19:30:04.000Z ##

📢 CVE-2025-14847 « mongobleed »: fuite de mémoire non authentifiée dans MongoDB (correctifs disponibles)
📝 Selon la publication du PoC « mongobleed » (auteur : Joe Desimone), une vulnérabilité référencée CVE-2025-14847 affecte la dé...
📖 cyberveille : cyberveille.ch/posts/2025-12-2
🌐 source : github.com/joe-desimone/mongob
#CVE_2025_14847 #MongoDB #Cyberveille

##

GossiTheDog@cyberplace.social at 2025-12-26T16:30:28.000Z ##

Merry Christmas to everybody, except that dude who works for Elastic, who decided to drop an unauthenticated exploit for MongoDB on Christmas Day, that leaks memory and automates harvesting secrets (e.g. database passwords)

CVE-2025-14847 aka MongoBleed

Exp: github.com/joe-desimone/mongob

This one is incredibly widely internet facing and will very likely see mass exploitation and impactful incidents

Impacts every MongoDB version going back a decade.

Shodan dork: product:"MongoDB"

##

hrbrmstr@mastodon.social at 2025-12-26T14:52:24.000Z ##

Oh. yay.

"mongobleed" — github.com/joe-desimone/mongob

CVE-2025-14847

"Exploits zlib decompression bug to leak server memory via BSON field names.”

"Technique: Craft BSON with inflated doc_len, server reads field names from leaked memory until null byte.”

##

thehackerwire@mastodon.social at 2025-12-26T12:22:24.000Z ##

🟠 CVE-2025-14847 - High (7.5)

Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

beyondmachines1 at 2025-12-25T20:01:09.516Z ##

MongoDB high severity flaw allows unauthenticated memory access via Zlib compression flaw

MongoDB reports a high severity flaw CVE-2025-14847 that allows unauthenticated remote attackers to read uninitialized heap memory, potentially exposing credentials, encryption keys, and other sensitive data by exploiting improper validation of Zlib compressed protocol headers through a simple TCP connection. The flaw affects MongoDB versions 3.6 through 8.2.2.

**If you're running MongoDB servers, first check if they are exposed to the internet. If yes this is urgent. Upgrade to the patched versions (8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, or 4.4.30). Alternatively, isolate from the intenet, disable zlib compression and plan a patch cycle.**

beyondmachines.net/event_detai

##

sans_isc@infosec.exchange at 2025-12-28T02:00:54.000Z ##

SANS Stormcast Sunday, December 28th, 2025: MongoDB Unauthenticated Memory Leak CVE-2025-14847
isc.sans.edu/podcastdetail/9750

##

MongoDB@activitypub.awakari.com at 2025-12-27T23:08:59.000Z ## MongoBleed (CVE‑2025‑14847): A Pre‑Auth MongoDB Memory Leak You Can Hunt at Scale https://medium.com/@Black1hp/mongobleed-cve-2025-14847-a-pre-auth-mongodb-memory-leak-you-can-hunt-at-scale-c...


Origin | Interest | Match ##

_r_netsec@infosec.exchange at 2025-12-27T13:28:06.000Z ##

Mongobleed - CVE-2025-14847 doublepulsar.com/merry-christm

##

MongoDB@activitypub.awakari.com at 2025-12-27T12:00:42.000Z ## Mongobleed PoC Exploit Tool Released for MongoDB Flaw that Exposes Sensitive Data A proof-of-concept (PoC) exploit dubbed “mongobleed” for CVE-2025-14847, a critical unauthenticated memory leak...

#Cyber #Security #News #Vulnerability #News #cyber #security #cyber #security #news

Origin | Interest | Match ##

decio@infosec.exchange at 2025-12-27T10:46:21.000Z ##

[VULN] ⚠️ MongoDB alerte sur une faille à haute gravité et urge de patcher

L'éditeur met en garde contre une vulnérabilité de lecture de mémoire de gravité élevée, qui pourrait être exploitée à distance par des attaquants non authentifiés.
⬇️
🔗 Source originale : bleepingcomputer.com/news/secu

PoC disponible (vecteur simple, peu de prérequis techniques,
surface d’attaque large, exploitation reproductible) 👀 : mongobleed
⬇️
• Impact observé: fuite de fragments de mémoire pouvant contenir des éléments sensibles tels que des journaux internes MongoDB, l’état du serveur, des paramètres WiredTiger, des données de /proc (ex. meminfo, statistiques réseau), des chemins Docker, des UUID de connexion et des IP clients. Le PoC montre des exemples de fuites (p. ex. MemAvailable, compteurs réseau) et indique la quantité totale de données exfiltrées ainsi que le nombre de fragments uniques. ⚠️
( cyberveille.ch/posts/2025-12-2 )

[Advisory officiel]
👇
jira.mongodb.org/browse/SERVER

CVE-2025-14847

typiquement, si vous avez un contrôleur #UniFi exposé veut mieux verifier les règles firewall pour bloquer...
👇
community.ui.com/questions/Mon

💬
⬇️
infosec.pub/post/39604416

#CyberVeille #mongoDB #CVE_2025_14847

*edit 27.12 enlevé attribution incorrecte de RCE"

##

GossiTheDog@cyberplace.social at 2025-12-27T05:34:44.000Z ##

There’s a great blog on detecting MongoBleed exploitation via Velociraptor blog.ecapuano.com/p/hunting-mo

##

GossiTheDog@cyberplace.social at 2025-12-26T16:30:28.000Z ##

Merry Christmas to everybody, except that dude who works for Elastic, who decided to drop an unauthenticated exploit for MongoDB on Christmas Day, that leaks memory and automates harvesting secrets (e.g. database passwords)

CVE-2025-14847 aka MongoBleed

Exp: github.com/joe-desimone/mongob

This one is incredibly widely internet facing and will very likely see mass exploitation and impactful incidents

Impacts every MongoDB version going back a decade.

Shodan dork: product:"MongoDB"

##

hrbrmstr@mastodon.social at 2025-12-26T14:52:24.000Z ##

Oh. yay.

"mongobleed" — github.com/joe-desimone/mongob

CVE-2025-14847

"Exploits zlib decompression bug to leak server memory via BSON field names.”

"Technique: Craft BSON with inflated doc_len, server reads field names from leaked memory until null byte.”

##

beyondmachines1@infosec.exchange at 2025-12-25T20:01:09.000Z ##

MongoDB high severity flaw allows unauthenticated memory access via Zlib compression flaw

MongoDB reports a high severity flaw CVE-2025-14847 that allows unauthenticated remote attackers to read uninitialized heap memory, potentially exposing credentials, encryption keys, and other sensitive data by exploiting improper validation of Zlib compressed protocol headers through a simple TCP connection. The flaw affects MongoDB versions 3.6 through 8.2.2.

**If you're running MongoDB servers, first check if they are exposed to the internet. If yes this is urgent. Upgrade to the patched versions (8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, or 4.4.30). Alternatively, isolate from the intenet, disable zlib compression and plan a patch cycle.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

DarkWebInformer@infosec.exchange at 2025-12-24T15:59:56.000Z ##

🚨 CVE-2025-14847: Critical Unauthenticated MongoDB RCE Heap Memory Leak Exposes Sensitive Data

CVSS: 8.7

Vulnerable versions include:

▪️MongoDB 3.6.x
▪️MongoDB 4.0.x
▪️MongoDB 4.2.x
▪️MongoDB 4.4.x ≤ 4.4.29
▪️MongoDB 5.0.x ≤ 5.0.31
▪️MongoDB 6.0.x ≤ 6.0.26
▪️MongoDB 7.0.x ≤ 7.0.26
▪️MongoDB 8.0.x ≤ 8.0.16
▪️MongoDB 8.2.x ≤ 8.2.2

Fixed versions:

▪️4.4.30
▪️5.0.32
▪️6.0.27
▪️7.0.28
▪️8.0.17
▪️8.2.3

upwind.io/feed/cve-2025-14847-

##

CVE-2025-13008
(0 None)

EPSS: 0.05%

updated 2025-12-19T18:00:18.330000

2 posts

An information disclosure vulnerability in M-Files Server before versions 25.12.15491.7, 25.8 LTS SR3, 25.2 LTS SR3 and 24.8 LTS SR5 allows an authenticated attacker using M-Files Web to capture session tokens of other active users.

technadu at 2025-12-27T15:59:11.867Z ##

M-Files has released patches for CVE-2025-13008, an information disclosure vulnerability involving session token exposure between authenticated users.

The issue affects several release branches and could allow impersonation within M-Files Web under specific conditions.

No exploitation has been observed publicly, but the potential impact on document confidentiality is notable.

This reinforces the need for:

• Strong session controls
• Log review for unusual user behavior
• Prompt patch deployment

Follow @technadu for unbiased, technically grounded security updates.

Source : cybersecuritynews.com/m-files-

##

technadu@infosec.exchange at 2025-12-27T15:59:11.000Z ##

M-Files has released patches for CVE-2025-13008, an information disclosure vulnerability involving session token exposure between authenticated users.

The issue affects several release branches and could allow impersonation within M-Files Web under specific conditions.

No exploitation has been observed publicly, but the potential impact on document confidentiality is notable.

This reinforces the need for:

• Strong session controls
• Log review for unusual user behavior
• Prompt patch deployment

Follow @technadu for unbiased, technically grounded security updates.

Source : cybersecuritynews.com/m-files-

#InfoSec #VulnerabilityResearch #SessionManagement #EnterpriseSecurity #TechNadu

##

CVE-2025-14881
(0 None)

EPSS: 0.04%

updated 2025-12-19T18:00:18.330000

1 posts

Multiple API endpoints allowed access to sensitive files from other users by knowing the UUID of the file that were not intended to be accessible by UUID only.

CVE-2025-1928
(9.1 CRITICAL)

EPSS: 0.06%

updated 2025-12-19T18:00:18.330000

1 posts

Improper Restriction of Excessive Authentication Attempts vulnerability in Restajet Information Technologies Inc. Online Food Delivery System allows Password Recovery Exploitation.This issue affects Online Food Delivery System: through 19122025.

jos1264@social.skynetcloud.site at 2025-12-19T13:30:01.000Z ##

CVE-2025-1928 - Improper Authentication in Restajet's Online Food Delivery System cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11747
(6.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-19T18:00:18.330000

1 posts

The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the colibri_blog_posts shortcode in all versions up to, and including, 1.0.345 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that

jos1264@social.skynetcloud.site at 2025-12-19T09:15:01.000Z ##

CVE-2025-11747 - Colibri Page Builder <= 1.0.345 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65041
(10.0 CRITICAL)

EPSS: 0.08%

updated 2025-12-19T18:00:18.330000

2 posts

Improper authorization in Microsoft Partner Center allows an unauthorized attacker to elevate privileges over a network.

offseq@infosec.exchange at 2025-12-19T04:05:06.000Z ##

🚨 CRITICAL vuln: CVE-2025-65041 in Microsoft Partner Center enables unauthenticated remote privilege escalation (CVSS 10). No patch yet—segment networks, enforce MFA, and monitor for abuse. Stay updated! radar.offseq.com/threat/cve-20 #OffSeq #Microsoft #CloudSecurity #CVE2025_65041

##

jos1264@social.skynetcloud.site at 2025-12-18T22:30:01.000Z ##

CVE-2025-65041 - Microsoft Partner Center Elevation of Privilege Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68398
(9.1 CRITICAL)

EPSS: 0.15%

updated 2025-12-19T18:00:18.330000

2 posts

Weblate is a web based localization tool. In versions prior to 5.15.1, it was possible to overwrite Git configuration remotely and override some of its behavior. Version 5.15.1 fixes the issue.

jos1264@social.skynetcloud.site at 2025-12-19T02:30:01.000Z ##

CVE-2025-68398 - Weblate has git config file overwrite vulnerability that leads to remote code execution cvefeed.io/vuln/detail/CVE-202

##

offseq@infosec.exchange at 2025-12-19T00:04:31.000Z ##

🚨 CVE-2025-68398: CRITICAL vuln in Weblate (<5.15.1). Privileged users can overwrite Git configs, risking full system compromise. Patch to 5.15.1+ & audit Git settings now! radar.offseq.com/threat/cve-20 #OffSeq #Weblate #Infosec #CVE2025

##

CVE-2025-34452
(0 None)

EPSS: 0.42%

updated 2025-12-19T18:00:18.330000

1 posts

Streama versions 1.10.0 through 1.10.5 and prior to commit b7c8767 contain a combination of path traversal and server-side request forgery (SSRF) vulnerabilities in that allow an authenticated attacker to write arbitrary files to the server filesystem. The issue exists in the subtitle download functionality, where user-controlled parameters are used to fetch remote content and construct file paths

jos1264@social.skynetcloud.site at 2025-12-18T22:30:00.000Z ##

CVE-2025-34452 - Streama Subtitle Download Path Traversal and SSRF Leading to Arbitrary File Write cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64236
(9.8 CRITICAL)

EPSS: 0.09%

updated 2025-12-19T18:00:18.330000

1 posts

Authentication Bypass Using an Alternate Path or Channel vulnerability in AmentoTech Tuturn allows Authentication Abuse.This issue affects Tuturn: from n/a before 3.6.

jos1264@social.skynetcloud.site at 2025-12-18T19:15:01.000Z ##

CVE-2025-64236 - WordPress Tuturn plugin < 3.6 - Broken Authentication vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14738
(0 None)

EPSS: 0.07%

updated 2025-12-19T18:00:18.330000

1 posts

Improper authentication vulnerability in TP-Link WA850RE (httpd modules) allows unauthenticated attackers to download the configuration file.This issue affects: ≤ WA850RE V2_160527, ≤ WA850RE V3_160922.

CVE-2025-40602
(6.6 MEDIUM)

EPSS: 2.09%

updated 2025-12-19T13:57:43.150000

1 posts

A local privilege escalation vulnerability due to insufficient authorization in the SonicWall SMA1000 appliance management console (AMC).

2 repos

https://github.com/cyberleelawat/CVE-2025-40602

https://github.com/rxerium/CVE-2025-40602

beyondmachines1@infosec.exchange at 2025-12-19T09:01:31.000Z ##

SonicWall patches actively exploited flaw vulnerability chain in SMA 1000 appliances

SonicWall SMA 1000 appliances are being actively exploited through a vulnerability chain combining CVE-2025-40602 (a local privilege escalation flaw) with CVE-2025-23006 (a previously patched deserialization vulnerability), enabling unauthenticated remote code execution with root privileges.

**If you have SonicWall SMA 1000 appliances, make sure their SSH and management access is isolated from the public internet and only accessible from trusted networks. Review latest version, and if not up-to date patched, plan a very quick upgrade to platform-hotfix 12.4.3-03245 or 12.5.0-02283 (or higher). Your devices are being hacked, and you can't really hide them from the internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-1927
(7.1 HIGH)

EPSS: 0.01%

updated 2025-12-19T12:31:33

1 posts

Cross-Site Request Forgery (CSRF) vulnerability in Restajet Information Technologies Inc. Online Food Delivery System allows Cross Site Request Forgery.This issue affects Online Food Delivery System: through 19122025.

jos1264@social.skynetcloud.site at 2025-12-19T13:30:01.000Z ##

CVE-2025-1927 - CSRF in Restajet's Online Food Delivery System cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-1885
(5.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-19T12:31:32

1 posts

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Restajet Information Technologies Inc. Online Food Delivery System allows Phishing, Forceful Browsing.This issue affects Online Food Delivery System: through 19122025.

jos1264@social.skynetcloud.site at 2025-12-19T13:30:01.000Z ##

CVE-2025-1885 - Open Redirect in Restajet's Online Food Delivery System cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14151
(6.1 MEDIUM)

EPSS: 0.10%

updated 2025-12-19T09:30:39

1 posts

The SlimStat Analytics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'outbound_resource' parameter in the slimtrack AJAX action in all versions up to, and including, 5.3.2. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will

jos1264@social.skynetcloud.site at 2025-12-19T09:15:01.000Z ##

CVE-2025-14151 - SlimStat Analytics <= 5.3.2 - Unauthenticated Stored Cross-Site Scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66521
(6.3 MEDIUM)

EPSS: 0.02%

updated 2025-12-19T09:30:39

1 posts

A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com within the Trusted Certificates feature. A crafted payload can be injected as the certificate name, which is later rendered into the DOM without proper sanitization. As a result, the injected script executes each time the Trusted Certificates view is loaded.

jos1264@social.skynetcloud.site at 2025-12-19T09:15:01.000Z ##

CVE-2025-66521 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Trusted Certificates Feature cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66520
(6.3 MEDIUM)

EPSS: 0.03%

updated 2025-12-19T09:30:39

1 posts

A stored cross-site scripting (XSS) vulnerability exists in the Portfolio feature of the Foxit PDF Editor cloud (pdfonline.foxit.com). User-supplied SVG files are not properly sanitized or validated before being inserted into the HTML structure. As a result, embedded HTML or JavaScript within a crafted SVG may execute whenever the Portfolio file list is rendered.

jos1264@social.skynetcloud.site at 2025-12-19T09:15:00.000Z ##

CVE-2025-66520 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Portfolio SVG Handling cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68490(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-19T06:30:34

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-12-19T05:45:01.000Z ##

CVE-2025-68490 - Apache HTTP Server Cross-Site Request Forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68489(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-19T06:30:34

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-12-19T05:45:01.000Z ##

CVE-2025-68489 - Apache HTTP Server Cross-Site Request Forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68491
(0 None)

EPSS: 0.00%

updated 2025-12-19T04:16:02.150000

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-12-19T05:45:01.000Z ##

CVE-2025-68491 - Apache HTTP Server Buffer Overflow Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68488
(0 None)

EPSS: 0.00%

updated 2025-12-19T04:16:01.953000

1 posts

Rejected reason: Not used

CVE-2025-68487
(0 None)

EPSS: 0.00%

updated 2025-12-19T04:16:01.883000

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-12-19T05:45:00.000Z ##

CVE-2025-68487 - Apache HTTP Server Cross-Site Request Forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11774
(8.3 HIGH)

EPSS: 0.04%

updated 2025-12-19T03:31:23

2 posts

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the software keyboard function (hereinafter referred to as "keypad function") of Mitsubishi Electric GENESIS64 versions 10.97.2 CFR3 and prior, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.2 CFR3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.2 CFR3 and

jos1264@social.skynetcloud.site at 2025-12-19T02:30:01.000Z ##

CVE-2025-11774 - Malicious Code Execution Vulnerability in the Software Keyboard Function of GENESIS64, ICONICS Suite, Mobile HMI, and MC Works64 cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-19T02:15:00.000Z ##

CVE-2025-11774 - Malicious Code Execution Vulnerability in the Software Keyboard Function of GENESIS64, ICONICS Suite, Mobile HMI, and MC Works64 cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14908
(6.3 MEDIUM)

EPSS: 0.06%

updated 2025-12-19T03:31:23

1 posts

A security flaw has been discovered in JeecgBoot up to 3.9.0. The affected element is an unknown function of the file jeecg-boot/jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/system/controller/SysTenantController.java of the component Multi-Tenant Management Module. Performing manipulation of the argument ID results in improper authentication. The attack can be initiated rem

jos1264@social.skynetcloud.site at 2025-12-19T02:15:01.000Z ##

CVE-2025-14908 - JeecgBoot Multi-Tenant Management SysTenantController.java improper authentication cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14899
(4.7 MEDIUM)

EPSS: 0.03%

updated 2025-12-19T03:31:23

1 posts

A weakness has been identified in CodeAstro Real Estate Management System 1.0. This impacts an unknown function of the file /admin/stateadd.php of the component Administrator Endpoint. This manipulation causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.

jos1264@social.skynetcloud.site at 2025-12-19T02:15:01.000Z ##

CVE-2025-14899 - CodeAstro Real Estate Management System Administrator Endpoint stateadd.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67843
(8.3 HIGH)

EPSS: 0.25%

updated 2025-12-19T03:31:18

1 posts

A Server-Side Template Injection (SSTI) vulnerability in the MDX Rendering Engine in Mintlify Platform before 2025-11-15 allows remote attackers to execute arbitrary code via inline JSX expressions in an MDX file.

CVE-2025-13941
(8.8 HIGH)

EPSS: 0.01%

updated 2025-12-19T03:31:18

1 posts

A local privilege escalation vulnerability exists in the Foxit PDF Reader/Editor Update Service. During plugin installation, incorrect file system permissions are assigned to resources used by the update service. A local attacker with low privileges could modify or replace these resources, which are later executed by the service, resulting in execution of arbitrary code with SYSTEM privileges.

jos1264@social.skynetcloud.site at 2025-12-19T05:15:00.000Z ##

CVE-2025-13941 - Foxit PDF Reader Update Service Incorrect Permission Assignment Local Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64675
(8.3 HIGH)

EPSS: 0.06%

updated 2025-12-19T00:31:52

1 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Azure Cosmos DB allows an unauthorized attacker to perform spoofing over a network.

CVE-2025-68382
(6.5 MEDIUM)

EPSS: 0.05%

updated 2025-12-19T00:31:47

1 posts

Out-of-bounds read (CWE-125) allows an unauthenticated remote attacker to perform a buffer overflow (CAPEC-100) via the NFS protocol dissector, leading to a denial-of-service (DoS) through a reliable process crash when handling truncated XDR-encoded RPC messages.

CVE-2025-65037
(10.0 CRITICAL)

EPSS: 0.10%

updated 2025-12-19T00:31:47

1 posts

Improper control of generation of code ('code injection') in Azure Container Apps allows an unauthorized attacker to execute code over a network.

jos1264@social.skynetcloud.site at 2025-12-18T22:30:01.000Z ##

CVE-2025-65037 - Azure Container Apps Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64663
(10.0 CRITICAL)

EPSS: 0.06%

updated 2025-12-19T00:31:47

1 posts

Custom Question Answering Elevation of Privilege Vulnerability

jos1264@social.skynetcloud.site at 2025-12-18T22:30:00.000Z ##

CVE-2025-64663 - Custom Question Answering Elevation of Privilege Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13427(CVSS UNKNOWN)

EPSS: 0.14%

updated 2025-12-19T00:31:46

1 posts

An authentication bypass vulnerability in Google Cloud Dialogflow CX Messenger allowed unauthenticated users to interact with restricted chat agents, gaining access to the agents' knowledge and the ability to trigger their intents, by manipulating initialization parameters or crafting specific API requests. All versions after August 20th, 2025 have been updated to protect from this vulnerability

jos1264@social.skynetcloud.site at 2025-12-19T00:15:01.000Z ##

CVE-2025-13427 - Authentication Bypass in Dialogflow CX Messenger cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64677
(8.2 HIGH)

EPSS: 0.07%

updated 2025-12-19T00:31:46

1 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Office Out-of-Box Experience allows an unauthorized attacker to perform spoofing over a network.

jos1264@social.skynetcloud.site at 2025-12-18T22:30:01.000Z ##

CVE-2025-64677 - Office Out-of-Box Experience Spoofing Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64676
(7.2 HIGH)

EPSS: 0.10%

updated 2025-12-19T00:31:46

1 posts

'.../...//' in Microsoft Purview allows an authorized attacker to execute code over a network.

cR0w@infosec.exchange at 2025-12-18T22:12:44.000Z ##

Microsoft patched several sev:CRIT cloud vulns, including this ../ in Purview. LMAO.

msrc.microsoft.com/update-guid

##

CVE-2025-14739(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-18T21:31:50

1 posts

Access of Uninitialized Pointer vulnerability in TP-Link WR940N and WR941ND allows local unauthenticated attackers the ability to execute DoS attack and potentially arbitrary code execution under the context of the ‘root’ user.This issue affects WR940N and WR941ND: ≤ WR940N v5 3.20.1 Build 200316, ≤ WR941ND v6 3.16.9 Build 151203.

CVE-2025-14884
(7.2 HIGH)

EPSS: 0.27%

updated 2025-12-18T18:30:38

2 posts

A vulnerability was detected in D-Link DIR-605 202WWB03. Affected by this issue is some unknown functionality of the component Firmware Update Service. Performing manipulation results in command injection. The attack can be initiated remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVE-2025-14896
(7.5 HIGH)

EPSS: 0.04%

updated 2025-12-18T18:30:37

1 posts

due to insufficient sanitazation in Vega’s `convert()` function when `safeMode` is enabled and the spec variable is an array. An attacker can craft a malicious Vega diagram specification that will allow them to send requests to any URL, including local file system paths, leading to exposure of sensitive information.

CVE-2025-14878
(9.8 CRITICAL)

EPSS: 0.15%

updated 2025-12-18T18:30:37

2 posts

A security flaw has been discovered in Tenda WH450 1.0.0.18. This impacts an unknown function of the file /goform/wirelessRestart of the component HTTP Request Handler. The manipulation of the argument GO results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be exploited.

CVE-2025-14737(CVSS UNKNOWN)

EPSS: 0.73%

updated 2025-12-18T18:30:37

1 posts

Command Injection vulnerability in TP-Link WA850RE (httpd modules) allows authenticated adjacent attacker to inject arbitrary commands.This issue affects: ≤ WA850RE V2_160527, ≤ WA850RE V3_160922.

CVE-2025-63391
(7.5 HIGH)

EPSS: 0.10%

updated 2025-12-18T18:30:37

1 posts

An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api/config endpoint. The endpoint lacks proper authentication and authorization controls, exposing sensitive system configuration data to unauthenticated remote attackers.

cR0w@infosec.exchange at 2025-12-18T15:31:10.000Z ##

Auth bypass in Open-WebUI.

cve.org/CVERecord?id=CVE-2025-

An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api/config endpoint. The endpoint lacks proper authentication and authorization controls, exposing sensitive system configuration data to unauthenticated remote attackers.

##

CVE-2025-59374
(9.8 CRITICAL)

EPSS: 35.96%

updated 2025-12-18T15:42:03.790000

3 posts

"UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected. The Live Update client has

oversecurity@mastodon.social at 2025-12-22T19:10:06.000Z ##

CISA flags ASUS Live Update CVE, but the attack is years old

An ASUS Live Update vulnerability tracked as CVE-2025-59374 has been making the rounds in infosec feeds, with some headlines implying recent or...

🔗️ [Bleepingcomputer] link.is.it/NcIC9d

##

oversecurity@mastodon.social at 2025-12-22T11:20:14.000Z ##

Not all CISA-linked alerts are urgent: ASUS Live Update CVE-2025-59374

An ASUS Live Update vulnerability tracked as CVE-2025-59374 has been making the rounds in infosec feeds, with some headlines implying recent or...

🔗️ [Bleepingcomputer] link.is.it/Yiue33

##

beyondmachines1@infosec.exchange at 2025-12-19T10:01:31.000Z ##

CISA reports active exploitation of ASUS Live Update supply chain vulnerability

CISA is reporting active exploitation of CVE-2025-59374, a supply chain backdoor embedded in ASUS Live Update utility during the 2018 Operation ShadowHammer attack by Chinese state-sponsored hackers. The backdoor surgically targeted specific devices using hardcoded MAC addresses. Federal agencies must discontinue use of the now-discontinued utility by January 7, 2026. ASUS urges remaining users to update to version 3.6.8 or higher.

**If you have ASUS Live Update utility installed, immediately update to version 3.6.8 or higher, or better yet, uninstall it completely since it's now discontinued. Given the previous supply chain compromise and end-of-support status, remove the utility and download updates directly from ASUS's official website.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2025-20393
(10.0 CRITICAL)

EPSS: 6.77%

updated 2025-12-18T15:41:16.840000

7 posts

Cisco is aware of a potential vulnerability.&nbsp; Cisco is currently investigating and&nbsp;will update these details as appropriate&nbsp;as more information becomes available.

4 repos

https://github.com/StasonJatham/cisco-sa-sma-attack-N9bf4

https://github.com/Ashwesker/Blackash-CVE-2025-20393

https://github.com/cyberleelawat/CVE-2025-20393

https://github.com/KingHacker353/CVE-2025-20393

kpwn at 2025-12-27T13:30:03.339Z ##

Thanks to CVE-2025-20393 my Cisco alert already has been triggered.

In consequence, I received the following alert email.

##

kpwn@infosec.exchange at 2025-12-27T13:30:03.000Z ##

Thanks to CVE-2025-20393 my Cisco alert already has been triggered.

In consequence, I received the following alert email.

#NoBot

##

hackmag@infosec.exchange at 2025-12-24T08:00:32.000Z ##

⚪ Cisco warns of an unpatched zero‑day vulnerability in AsyncOS

🗨️ Cisco has warned its customers about an unpatched zero-day vulnerability in Cisco AsyncOS that is already being actively exploited to attack Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) devices.

🔗 hackmag.com/news/cve-2025-2039

#news

##

LLMs@activitypub.awakari.com at 2025-12-21T03:04:49.000Z ## CVE-2025-20393: explotación activa en Cisco AsyncOS permite ejecutar comandos con privilegios root Entre el 17 y el 18 de diciembre de 2025, Cisco Talos y varios CERTs han alertado sobre una campa...

#Seguridad

Origin | Interest | Match ##

DarkWebInformer@infosec.exchange at 2025-12-18T20:07:52.000Z ##

🚨 CVE-2025-20393: Script to detect for Cisco Secure Email Gateway And Cisco Secure Email and Web Manager

CVSS: 10

Currently no patch and zero-day

GitHub: github.com/StasonJatham/cisco-

##

Andy_Thompson@infosec.exchange at 2025-12-18T18:07:33.000Z ##

🔥 Cisco AsyncOS Zero-Day (CVE-2025-20393)
• BleepingComputer
bleepingcomputer.com/news/secu
• The Hacker News
thehackernews.com/2025/12/cisc
• SecurityWeek
securityweek.com/china-linked-
• The Register
theregister.com/2025/12/17/att
• Dark Reading (CISA KEV addition)
darkreading.com/attacks-breach
• SOCRadar analysis
socradar.io/blog/cve-2025-2039

##

golang@activitypub.awakari.com at 2025-12-18T16:45:45.000Z ## 🚩 Chinese-Nexus APT UAT-9686 Actively Compromises Cisco Secure Email Appliances and Drops AquaShell Persistence Chinese APT UAT-9686 exploits Cisco Email Gateway zero-day CVE-2025-20393 (CVSS 10...

#TIGR #cybercriminal #nation #state #vulnerability

Origin | Interest | Match ##

CVE-2025-64466
(7.8 HIGH)

EPSS: 0.02%

updated 2025-12-18T15:30:52

1 posts

There is an out of bounds read vulnerability in NI LabVIEW in lvre!ExecPostedProcRecPost() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64466 - Out-of-Bounds Read in lvre!ExecPostedProcRecPost() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64469
(7.8 HIGH)

EPSS: 0.02%

updated 2025-12-18T15:30:51

1 posts

There is a stack-based buffer overflow vulnerability in NI LabVIEW in LVResFile::FindRsrcListEntry() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64469 - Stack-based Buffer Overflow in LVResource::DetachResource() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64467
(7.8 HIGH)

EPSS: 0.02%

updated 2025-12-18T15:30:45

1 posts

There is an out of bounds read vulnerability in NI LabVIEW in LVResFile::FindRsrcListEntry() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

jos1264@social.skynetcloud.site at 2025-12-18T17:00:01.000Z ##

CVE-2025-64467 - Out-of-Bounds Read in LVResFile::FindRsrcListEntry() in NI LabVIEW cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13110
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-12-18T15:07:18.427000

1 posts

The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.3.7.3 via the "woof_add_subscr" function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with subscriber level access and above, to create product messenger subscriptions on be

jos1264@social.skynetcloud.site at 2025-12-18T15:15:01.000Z ##

CVE-2025-13110 - HUSKY – Products Filter Professional for WooCommerce <= 1.3.7.3 - Authenticated (Subscriber+) Insecure Direct Object Reference via 'woof_add_subscr' cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68154
(8.1 HIGH)

EPSS: 0.06%

updated 2025-12-16T22:37:26

1 posts

## Summary The `fsSize()` function in `systeminformation` is vulnerable to **OS Command Injection (CWE-78)** on Windows systems. The optional `drive` parameter is directly concatenated into a PowerShell command without sanitization, allowing arbitrary command execution when user-controlled input reaches this function. **Affected Platforms:** Windows only **CVSS Breakdown:** - **Attack Vector

beyondmachines1@infosec.exchange at 2025-12-18T17:01:32.000Z ##

Command injection flaw reported in Node.js systeminformation package

A command injection vulnerability (CVE-2025-68154) in the systeminformation Node.js library's fsSize() function allows attackers to execute arbitrary PowerShell commands on Windows systems through unsanitized user input in the drive parameter. The vulnerability has been patched in version 5.27.14.

**If you're using the systeminformation Node.js library on Windows, plan an upgrade to version 5.27.14 or newer to patch this command injection flaw. Review all applications using this library, especially web APIs or tools that accept user input for disk queries, to ensure they're running the patched version.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-46295
(9.8 CRITICAL)

EPSS: 0.33%

updated 2025-12-16T21:32:02

1 posts

Apache Commons Text versions prior to 1.10.0 included interpolation features that could be abused when applications passed untrusted input into the text-substitution API. Because some interpolators could trigger actions like executing commands or accessing external resources, an attacker could potentially achieve remote code execution. This vulnerability has been fully addressed in FileMaker Serve

beyondmachines1@infosec.exchange at 2025-12-19T08:01:31.000Z ##

Critical remote code execution flaw reported in Apache Commons Text library

Apache Commons Text versions prior to 1.10.0 contain a critical remote code execution vulnerability (CVE-2025-46295,) that allows attackers to inject malicious code through the text-substitution API when processing untrusted input. The flaw was patched in late 2022 but is not updated in many deployed applications.

**If you use Apache Commons Text in your Java applications, check your version immediately and upgrade to at least version 1.10.0 (or preferably 1.15.0). Thi flaw allows remote code execution, so treat this update as very important. Exploits will start soon.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-59718
(9.8 CRITICAL)

EPSS: 5.95%

updated 2025-12-16T21:30:51

2 posts

A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7

3 repos

https://github.com/Ashwesker/Blackash-CVE-2025-59718

https://github.com/moften/CVE-2025-59718-Fortinet-Poc

https://github.com/exfil0/CVE-2025-59718-PoC

hbrpgm@adalta.social at 2025-12-18T18:33:36.000Z ##

📰 ** Information Briefing: **

✨ FortiCloud SSO Login Bypass: Exploited in the Wild
- Critical vulnerabilities: CVE-2025-59718 and CVE-2025-59719
- Unauthenticated adversaries bypass FortiCloud SSO login
- Exploitation observed in the wild
- Affected products: FortiOS, FortiProxy, FortiSwitchManager, FortiWeb

🔗 adalta.info/pdf/index.html?tit
(Available in 🇩🇪 🇺🇸 🇫🇷)

#AISummary #Bot

##

catc0n@infosec.exchange at 2025-12-18T15:28:05.000Z ##

We wrote a little bit on FortiCloud SSO login bypass CVE-2025-59718 (and 59719). Both the known PoCs for the former are fake / invalid. There does appear to be real exploitation evidence, but detections based on fake PoCs ain't it (and it seems like that's where a lot of chatter is coming from)

vulncheck.com/blog/forticloud-

##

CVE-2025-68260(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-16T15:30:56

2 posts

In the Linux kernel, the following vulnerability has been resolved: rust_binder: fix race condition on death_list Rust Binder contains the following unsafe operation: // SAFETY: A `NodeDeath` is never inserted into the death list // of any node other than its owner, so it is either in this // death list or in no death list. unsafe { node_inner.death_list.remove(self) }; This operation is u

rustaceans@mastodon.social at 2025-12-22T08:42:35.000Z ##

3. Rust joined the Linux kernel mainline last week and immediately checked off a rite of passage: its first CVE.
lore.kernel.org/linux-cve-anno

##

Linux-Maintainers@activitypub.awakari.com at 2025-12-18T16:10:07.000Z ## Linux Kernel’s First Rust CVE: Race Condition in Binder Driver The Linux kernel has assigned its first CVE to Rust code: CVE-2025-68260, a race condition in the Rust-rewritten Android Binder driv...

#CybersecurityUpdate #DevNews #Android #Binder #driver #CVE-2025-68260 #Linux #kernel #Rust #CVE #Rust

Origin | Interest | Match ##

CVE-2025-9612
(5.1 MEDIUM)

EPSS: 0.01%

updated 2025-12-11T15:31:38

1 posts

An issue was discovered in the PCI Express (PCIe) Integrity and Data Encryption (IDE) specification, where insufficient guidance on Transaction Layer Packet (TLP) ordering and tag uniqueness may allow encrypted packets to be replayed or reordered without detection. This can enable local or physical attackers on the PCIe bus to violate data integrity protections.

cyberveille@mastobot.ping.moi at 2025-12-26T14:00:04.000Z ##

📢 PCIe: trois vulnérabilités IDE/TDISP (CVE-2025-9612/9613/9614) brisent l’intégrité et l’isolation
📝 Selon PCI-SIG (avis PCISIGVRT0001, publié le 9 décembre 2025) et un bulletin associé du CERT/CC, des vulnérabilités affe...
📖 cyberveille : cyberveille.ch/posts/2025-12-2
🌐 source : pcisig.com/PCIeIDEStandardVuln
#CVE_2025_9612_9614 #IDE_TDISP #Cyberveille

##

CVE-2025-59719
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-12-09T18:30:52

1 posts

An improper verification of cryptographic signature vulnerability in Fortinet FortiWeb 8.0.0, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9 may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.

1 repos

https://github.com/moften/CVE-2025-59718-Fortinet-Poc

hbrpgm@adalta.social at 2025-12-18T18:33:36.000Z ##

📰 ** Information Briefing: **

✨ FortiCloud SSO Login Bypass: Exploited in the Wild
- Critical vulnerabilities: CVE-2025-59718 and CVE-2025-59719
- Unauthenticated adversaries bypass FortiCloud SSO login
- Exploitation observed in the wild
- Affected products: FortiOS, FortiProxy, FortiSwitchManager, FortiWeb

🔗 adalta.info/pdf/index.html?tit
(Available in 🇩🇪 🇺🇸 🇫🇷)

#AISummary #Bot

##

CVE-2025-55182
(10.0 CRITICAL)

EPSS: 46.72%

updated 2025-12-09T16:53:25

2 posts

### Impact There is an unauthenticated remote code execution vulnerability in React Server Components. We recommend upgrading immediately. The vulnerability is present in versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 of: * [react-server-dom-webpack](https://www.npmjs.com/package/react-server-dom-webpack) * [react-server-dom-parcel](https://www.npmjs.com/package/react-server-dom-parcel) * [react-s

Nuclei template

100 repos

https://github.com/msanft/CVE-2025-55182

https://github.com/MoLeft/React2Shell-Toolbox

https://github.com/fullhunt/react2shell-test-server

https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS

https://github.com/ThemeHackers/CVE-2025-55182

https://github.com/mrknow001/RSC_Detector

https://github.com/C00LN3T/React2Shell

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/xiaopeng-ye/react2shell-detector

https://github.com/zr0n/react2shell

https://github.com/SainiONHacks/CVE-2025-55182-Scanner

https://github.com/Pizz33/CVE-2025-55182-burpscanner

https://github.com/Ashwesker/Blackash-CVE-2025-55182

https://github.com/ynsmroztas/NextRce

https://github.com/xcanwin/CVE-2025-55182-React-RCE

https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell

https://github.com/hoosin/CVE-2025-55182

https://github.com/techgaun/cve-2025-55182-scanner

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-

https://github.com/zack0x01/vuln-app-CVE-2025-55182

https://github.com/yz9yt/React2Shell-CTF

https://github.com/freeqaz/react2shell

https://github.com/xalgord/React2Shell

https://github.com/alsaut1/react2shell-lab

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/Spritualkb/CVE-2025-55182-exp

https://github.com/ejpir/CVE-2025-55182-bypass

https://github.com/im-ezboy/CVE-2025-55182-zoomeye

https://github.com/dwisiswant0/CVE-2025-55182

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/whiteov3rflow/CVE-2025-55182-poc

https://github.com/hidden-investigations/react2shell-scanner

https://github.com/alfazhossain/CVE-2025-55182-Exploiter

https://github.com/fatguru/CVE-2025-55182-scanner

https://github.com/kavienanj/CVE-2025-55182

https://github.com/VeilVulp/RscScan-cve-2025-55182

https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool

https://github.com/EynaExp/CVE-2025-55182-POC

https://github.com/hualy13/CVE-2025-55182

https://github.com/shamo0/react2shell-PoC

https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182

https://github.com/Rsatan/Next.js-Exploit-Tool

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/TrixSec/CVE-2025-55182-Scanner

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/sho-luv/React2Shell

https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script

https://github.com/shyambhanushali/React2Shell

https://github.com/ejpir/CVE-2025-55182-research

https://github.com/sumanrox/rschunter

https://github.com/StealthMoud/CVE-2025-55182-Scanner

https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE

https://github.com/c0rydoras/CVE-2025-55182

https://github.com/XiaomingX/CVE-2025-55182-poc

https://github.com/emredavut/CVE-2025-55182

https://github.com/timsonner/React2Shell-CVE-2025-55182

https://github.com/santihabib/CVE-2025-55182-analysis

https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive

https://github.com/sudo-Yangziran/CVE-2025-55182POC

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/logesh-GIT001/CVE-2025-55182

https://github.com/RuoJi6/CVE-2025-55182-RCE-shell

https://github.com/acheong08/CVE-2025-55182-poc

https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182

https://github.com/GelukCrab/React-Server-Components-RCE

https://github.com/f0xyx/CVE-2025-55182-Scanner

https://github.com/SoICT-BKSEC/CVE-2025-55182-docker-lab

https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc

https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI

https://github.com/LemonTeatw1/CVE-2025-55182-exploit

https://github.com/zzhorc/CVE-2025-55182

https://github.com/yanoshercohen/React2Shell_CVE-2025-55182

https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-

https://github.com/sickwell/CVE-2025-55182

https://github.com/theori-io/reactguard

https://github.com/xkillbit/cve-2025-55182-scanner

https://github.com/kOaDT/poc-cve-2025-55182

https://github.com/websecuritylabs/React2Shell-Library

https://github.com/AliHzSec/CVE-2025-55182

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/AggressiveUser/React2Hell

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/Chocapikk/CVE-2025-55182

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell

https://github.com/gensecaihq/react2shell-scanner

https://github.com/keklick1337/CVE-2025-55182-golang-PoC

https://github.com/Saturate/CVE-2025-55182-Scanner

https://github.com/jf0x3a/CVE-2025-55182-exploit

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/raivenLockdown/RCE_React2Shell_ButCooler-SomeUselessUsefulThingsLMAO-

https://github.com/assetnote/react2shell-scanner

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/rix4uni/CVE-2025-55182

https://github.com/subhdotsol/CVE-2025-55182

https://github.com/nehkark/CVE-2025-55182

https://github.com/surajhacx/react2shellpoc

hrbrmstr@mastodon.social at 2025-12-22T02:17:58.000Z ##

This is legit a Christmas miracle b/c I rly did not want to spend the break tending to #React2Shell

viz.greynoise.io/tags/react-se

##

Kubernetes@activitypub.awakari.com at 2025-12-15T19:35:00.000Z ## Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components CVE-2025-55182 (also referred to as React2Shell and includes CVE-2025-66478, which was merged into it) is...


Origin | Interest | Match ##

CVE-2025-37899
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-06T22:15:50.277000

1 posts

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in session logoff The sess->user object can currently be in use by another thread, for example if another connection has sent a session setup request to bind to the session being free'd. The handler for that connection could be in the smb2_sess_setup function which makes use of sess->user.

2 repos

https://github.com/vett3x/SMB-LINUX-CVE-2025-37899

https://github.com/SeanHeelan/o3_finds_cve-2025-37899

resplendent606@climatejustice.social at 2025-12-23T04:26:38.000Z ##

Very good question! I hope you’ll forgive me for a long response, it is something I have a lot of thoughts on.

I used to think newer is better, but after plenty of distro-hopping (I had a real good time on Arch), I realized that Debian’s version of "stability" is actually its greatest feature. Here is how I’ve come to see it, using your Fedora experience as a comparison:

Fist, with Debian, stable means unchanging. Fedora is a fast-moving target. It was an early adopter for Wayland and Pipewire. That is exciting, but it can feel like a version of whiplash. Debian is the opposite. Once a version is released, the APIs, file locations, and package behaviors are locked in. Its predictability means my system feels the same on Day 1 as it does on Day 300.

Debian prioritizes reliability over cutting-edge performance. While Fedora pushes the new thing, Debian’s conservative defaults ensure maximum compatibility. It is the "just works" philosophy. It is not just that it doesn't crash, it is that it doesn't surprise you.

I also find APT to be incredibly satisfying compared to DNF. The sheer size of the repositories is massive, but APT Pinning is THE feature for me. Being able to set numeric priorities in /etc/apt/preferences allows me to do things like pull a specific package from Backports while keeping the rest of the system on the Stable branch. It gives you control over dependency resolution that is hard to match.

Regarding your question on security, Debian is unique because it is a 100% community-led project. Unlike Fedora (Red Hat) or Ubuntu (Canonical), there is no corporate entity at the top. This is one of the most important traits to me. If Red Hat wanted to, Fedora could start showing ads in the application menu with the next update. I don’t think that will happen with Fedora, but who knows, Canonical is now showing ads in the cli. Enough is enough.

I also appreciate Debian’s focus on inclusion. It is one of the most inclusive projects in tech. As a member of the queer community, it is important to me to use tools that are created and supported by those who do not hate me for being different. To quote their Diversity Statement: “No matter how you identify yourself or how others perceive you: we welcome you. We welcome contributions from everyone as long as they interact constructively with our community.” They forbid discrimination against any person or group. Because it is a global meritocracy, you have contributors from every corner of the world. This diversity is actually a security feature because with so many different eyes on the code, it is much harder for a backdoor or a bias to slip through unnoticed.

For your "backdoor-proof" concern, Debian’s Social Contract and strict adherence to free software guidelines mean every line of code is scrutinized by volunteers around the world. It is transparent by design. While no distro/OS is unhackable, Debian’s slow and steady release cycle means security patches are thoroughly vetted before they hit your machine, reducing the risk of zero day regressions. Fedora has been vulnerable to zero day attacks in the past and will probably continue to be in the future. For instance, because Fedora is always on the latest versions, Fedora Users are often vulnerable to new attack. Earlier in 2025, the latest kernel which Fedora had pushed to users had a zero day vulnerability. Debian stable users did not have that vulnerability because they would not see that update for quite some time.

Sources:

Ubuntu Showing Ads in Terminal - linuxiac.com/ubuntu-once-again

Debian Social Contract - debian.org/social_contract

Debian Diversity Statement - debian.org/intro/diversity

Zero day vulnerability mentioned -cve.org/CVERecord?id=CVE-2025-

#Debian

##

CVE-2025-55753
(7.5 HIGH)

EPSS: 0.08%

updated 2025-12-05T21:31:27

1 posts

An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds. This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue

linux@activitypub.awakari.com at 2025-12-26T03:04:19.000Z ## Oracle Linux 8: ELSA-2025-23732 Important httpd Update for CVE-2025-55753 The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-65945
(7.5 HIGH)

EPSS: 0.01%

updated 2025-12-04T22:50:04

1 posts

### Overview An improper signature verification vulnerability exists when using auth0/node-jws with the HS256 algorithm under specific conditions. ### Am I Affected? You are affected by this vulnerability if you meet all of the following preconditions: 1. Application uses the auth0/node-jws implementation of JSON Web Signatures, versions <=3.2.2 || 4.0.0 2. Application uses the jws.createVerify(

1 repos

https://github.com/jedisct1/CVE-2025-65945-poc

raptor@infosec.exchange at 2025-12-19T07:36:13.000Z ##

#PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws)

github.com/jedisct1/CVE-2025-6

##

CVE-2025-66416
(0 None)

EPSS: 0.10%

updated 2025-12-04T17:15:25.860000

1 posts

The MCP Python SDK, called `mcp` on PyPI, is a Python implementation of the Model Context Protocol (MCP). Prior to version 1.23.0, tThe Model Context Protocol (MCP) Python SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without authentication using FastMCP with streamable HTTP or SSE transport, and has not configured

EUVD_Bot@mastodon.social at 2025-12-27T04:21:09.000Z ##

🚨 EUVD-2025-205459

📊 Score: n/a
📅 Updated: 2025-12-26

📝 FastMCP updated to MCP 1.23+ due to CVE-2025-66416

🔗 euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

CVE-2025-66478
(0 None)

EPSS: 0.00%

updated 2025-12-03T18:15:47.200000

1 posts

Rejected reason: This CVE is a duplicate of CVE-2025-55182.

100 repos

https://github.com/Rhyru9/CVE-2025-66478

https://github.com/C00LN3T/React2Shell

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-catalog

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/wangxso/CVE-2025-66478-POC

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/xiaopeng-ye/react2shell-detector

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-no-lockfile

https://github.com/DavionGowie/-vercel-application-is-vulnerable-to-CVE-2025-66478.

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-bun

https://github.com/Geekujin/React2-PowerShell-CVE-Checker

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-lockfile-mismatch

https://github.com/lincemorado97/CVE-2025-55182_CVE-2025-66478

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-v-prefix

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/KingHacker353/R2C-CVE-2025-55182-66478

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-git-dep

https://github.com/Mustafa1p/Next.js-RCE-Scanner---CVE-2025-55182-CVE-2025-66478

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-build-metadata

https://github.com/mounta11n/CHECK-CVE-2025-55182-AND-CVE-2025-66478

https://github.com/freeqaz/react2shell

https://github.com/mattcbarrett/check-cve-2025-66478

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-berry

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tag-latest

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-zero-installs

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-yarn-workspaces

https://github.com/jctommasi/react2shellVulnApp

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-hoisting

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/Letalandroid/cve-2025-66478_rce_vulnerable

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-dub-pnpm-monorepo

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-14x

https://github.com/ExpTechTW/CVE-2025-66478

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-overrides

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-patch-package

https://github.com/hidden-investigations/react2shell-scanner

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-caret

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-pnp

https://github.com/thedarckpassenger/Next.js-RSC-RCE-Scanner-CVE-2025-66478

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-range

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-peer-conflict

https://github.com/namest504/CVE-2025-66478-Exploit-Poc

https://github.com/Code42Cate/nexts-cve-2025-66478-exploit

https://github.com/shamo0/react2shell-PoC

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-packagemanager-field

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-devdeps

https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script

https://github.com/abdozkaya/rsc-security-auditor

https://github.com/shyambhanushali/React2Shell

https://github.com/FurkanKAYAPINAR/ReactNext2Shell

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-nested-versions

https://github.com/arashiyans/CVE-2025-55182-CVE-2025-66478

https://github.com/sumanrox/rschunter

https://github.com/emredavut/CVE-2025-55182

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm-symlinks

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-16x

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-15x

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-supabase-pnpm-monorepo

https://github.com/enesbuyuk/react2shell-security-tool

https://github.com/aseemyash/krle

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-transitive

https://github.com/strainxx/react2shell-honeypot

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-optional-deps

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-shrinkwrap

https://github.com/changgun-lee/Next.js-RSC-RCE-Scanner-CVE-2025-66478

https://github.com/Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478

https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-calcom-yarn-monorepo

https://github.com/vercel-labs/fix-react2shell-next

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-rsc-webpack

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-alias

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tilde

https://github.com/gagaltotal/tot-react-rce-CVE-2025-55182

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-resolutions

https://github.com/abtonc/next-cve-2025-66478

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/abhirajranjan/cve-2025-66478

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/zhixiangyao/CVE-2025-66478-Exploit-PoC

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/ancs21/react2shell-scanner-rust

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/grp-ops/react2shell

https://github.com/assetnote/react2shell-scanner

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-overrides

https://github.com/Jibaru/CVE-2025-66478-github-patcher

https://github.com/rix4uni/CVE-2025-55182

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-turborepo

https://github.com/aiexz/CVE-2025-66478-kinda-waf

https://github.com/nehkark/CVE-2025-55182

https://github.com/cypholab/evilact

Kubernetes@activitypub.awakari.com at 2025-12-15T19:35:00.000Z ## Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components CVE-2025-55182 (also referred to as React2Shell and includes CVE-2025-66478, which was merged into it) is...


Origin | Interest | Match ##

CVE-2025-12480
(9.1 CRITICAL)

EPSS: 78.02%

updated 2025-11-14T02:00:02.350000

1 posts

Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.

Nuclei template

catc0n@infosec.exchange at 2025-12-19T01:52:20.000Z ##

Yooo @yeslikethefood wrote a neat bunch of words about developing an exploit for Gladinet Triofox CVE-2025-12480 that closely followed the real-world attack pattern Mandiant wrote about last month and attributed to UNC6485.

20+ requests, an AV config trigger, and an embedded PostgreSQL server later:

vulncheck.com/blog/triofox-exp

##

CVE-2025-63666
(9.8 CRITICAL)

EPSS: 0.09%

updated 2025-11-13T18:31:03

1 posts

Tenda AC15 v15.03.05.18_multi) issues an authentication cookie that exposes the account password hash to the client and uses a short, low-entropy suffix as the session identifier. An attacker with network access or the ability to run JS in a victim browser can steal the cookie and replay it to access protected resources.

1 repos

https://github.com/Remenis/CVE-2025-63666

cR0w@infosec.exchange at 2025-12-23T21:22:29.000Z ##

IDK if I shared this dumb Tenda one already or not:

github.com/Remenis/CVE-2025-63

I know this sort of thing used to be fairly common but it's weird seeing it in a 2025 CVE.

##

CVE-2025-9242
(9.8 CRITICAL)

EPSS: 73.45%

updated 2025-11-13T15:31:32

1 posts

An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.3 and

Nuclei template

2 repos

https://github.com/watchtowrlabs/watchTowr-vs-WatchGuard-CVE-2025-9242

https://github.com/Ashwesker/Blackash-CVE-2025-9242

RedTeamNews@infosec.exchange at 2025-12-19T10:35:38.000Z ##

Urgent: A critical WatchGuard Firebox RCE flaw (CVE-2025-9242) is being actively exploited. CISA has mandated patching. Over 54k devices are still vulnerable. Patch immediately and rotate all credentials. redteamnews.com/red-team/cve/c

##

CVE-2025-11953
(9.8 CRITICAL)

EPSS: 0.49%

updated 2025-11-11T17:15:38.977000

1 posts

The Metro Development Server, which is opened by the React Native Community CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server and run arbitrary executables. On Windows, the attackers can also execute arbitrary shell commands with fully controlled

3 repos

https://github.com/N3k0t-dev/PoC-CVE-collection

https://github.com/Ashwesker/Blackash-CVE-2025-11953

https://github.com/SaidBenaissa/cve-2025-11953-vulnerability-demo

pentesttools@infosec.exchange at 2025-12-22T16:22:12.000Z ##

🚨 Active exploitation confirmed: CVE-2025-11953

VulnCheck is reporting active exploitation attempts in the wild against the React Native Metro server.

The issue? It binds to 0.0.0.0 by default, exposing a "local" dev tool to the internet.

⚠️ Crucial Detail: While the exposure is general, the current RCE exploit specifically targets Windows environments.

We’ve updated Pentest-Tools.com to help you validate this:

Network Scanner: Detects exposed Metro servers.

Sniper Auto-Exploiter: Safely executes a PoC (on Windows) to confirm RCE.

Fix: Update @react-native-community/cli-server-api to v20.0.0+ or bind to 127.0.0.1.

Validate your risk.

🔗 pentest-tools.com/vulnerabilit

#InfoSec #AppSec #RedTeam #VulnerabilityManagement #ReactNative #CVE202511953

##

beyondmachines1@infosec.exchange at 2025-12-19T11:01:32.000Z ##

Critical WSUS flaw reported in Schneider Electric Foxboro DCS systems

Schneider Electric issued a critical security advisory for a vulnerability (CVE-2025-59287) in its EcoStruxure Foxboro DCS Advisor services caused by a flaw in Microsoft WSUS that allows unauthenticated attackers to execute arbitrary code with SYSTEM privileges via ports 8530/8531. Active exploitation is observed in the wild.

**This one is important and kind of urgent, there is active exploitation. If you have Schneider Electric EcoStruxure Foxboro DCS Advisor systems, make sure to block WSUS ports 8530/8531 from the internet, or even better, make sure they are isolated from the internet and only accessible from trusted networks. Then apply Microsoft patches KB5070882 and KB5070884 and verify patch with Schneider Electric Global Customer Support.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

hackmag@infosec.exchange at 2025-12-19T16:27:43.000Z ##

⚪ Vulnerability in SAP NetWeaver Exploited to Deploy Auto-Color Linux Malware

🗨️ Experts at Darktrace warned that hackers exploited a critical vulnerability in SAP NetWeaver (CVE-2025-31324) to deploy Linux malware Auto-Color into the network of an unnamed American chemical company.

🔗 hackmag.com/news/auto-color-at

#news

##

CVE-2025-8088
(8.8 HIGH)

EPSS: 3.40%

updated 2025-10-30T15:50:59.680000

1 posts

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

28 repos

https://github.com/nhattanhh/CVE-2025-8088

https://github.com/techcorp/CVE-2025-8088-Exploit

https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-

https://github.com/xi0onamdev/WinRAR-CVE-2025-8088-Exploitation-Toolkit

https://github.com/AdityaBhatt3010/CVE-2025-8088-WinRAR-Zero-Day-Path-Traversal

https://github.com/Ashwesker/Blackash-CVE-2025-8088

https://github.com/travisbgreen/cve-2025-8088

https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-Edition

https://github.com/Markusino488/cve-2025-8088

https://github.com/papcaii2004/CVE-2025-8088-WinRAR-builder

https://github.com/pescada-dev/-CVE-2025-8088

https://github.com/0xAbolfazl/CVE-2025-8088-WinRAR-PathTraversal-PoC

https://github.com/jordan922/CVE-2025-8088

https://github.com/DeepBlue-dot/CVE-2025-8088-WinRAR-Startup-PoC

https://github.com/nuky-alt/CVE-2025-8088

https://github.com/hbesljx/CVE-2025-8088-EXP

https://github.com/ghostn4444/CVE-2025-8088

https://github.com/walidpyh/CVE-2025-8088

https://github.com/4daysday/cve-2025-8088

https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC

https://github.com/hexsecteam/CVE-2025-8088-Winrar-Tool

https://github.com/pentestfunctions/CVE-2025-8088-Multi-Document

https://github.com/Shinkirou789/Cve-2025-8088-WinRar-vulnerability

https://github.com/onlytoxi/CVE-2025-8088-Winrar-Tool

https://github.com/Syrins/CVE-2025-8088-Winrar-Tool-Gui

https://github.com/lucyna77/winrar-exploit

https://github.com/knight0x07/WinRAR-CVE-2025-8088-PoC-RAR

https://github.com/pentestfunctions/best-CVE-2025-8088

hackmag@infosec.exchange at 2025-12-25T08:48:14.000Z ##

⚪ 0-day WinRAR vulnerability used in phishing attacks

🗨️ ESET specialists reported that a recently patched vulnerability in WinRAR (CVE-2025-8088) was used as a 0-day in phishing attacks and was leveraged to install RomCom malware.

🔗 hackmag.com/news/winrar-romcom

#news

##

CVE-2020-12812
(9.8 CRITICAL)

EPSS: 45.02%

updated 2025-10-24T12:53:49.213000

7 posts

An improper authentication vulnerability in SSL VPN in FortiOS 6.4.0, 6.2.0 to 6.2.3, 6.0.9 and below may result in a user being able to log in successfully without being prompted for the second factor of authentication (FortiToken) if they changed the case of their username.

technadu at 2025-12-27T07:20:50.739Z ##

Fortinet confirms active exploitation of CVE-2020-12812.
A long-standing FortiOS SSL VPN flaw can bypass 2FA due to username case-sensitivity mismatches - especially in legacy deployments.

technadu.com/fortinet-warns-ju

Thoughts on mitigating MFA bypass risks?

##

cyberveille@mastobot.ping.moi at 2025-12-26T18:00:03.000Z ##

📢 Fortinet signale l’exploitation active de CVE‑2020‑12812 (FG‑IR‑19‑283) permettant de contourner le 2FA via LDAP
📝 Source: Fortinet (PSIRT Blog)...
📖 cyberveille : cyberveille.ch/posts/2025-12-2
🌐 source : fortinet.com/blog/psirt-blogs/
#2FA_bypass #CVE_2020_12812 #Cyberveille

##

undercodenews@mastodon.social at 2025-12-25T20:37:07.000Z ##

Fortinet FortiOS SSL VPN Authentication Bypass via CVE-2020-12812 Resurfaces in Active Attacks + Video

Introduction: A Forgotten Flaw Returns to the Threat Landscape Security vulnerabilities rarely disappear, they wait. CVE-2020-12812, an authentication bypass flaw disclosed more than five years ago in Fortinet FortiOS SSL VPN, has reemerged as an active threat. Recent observations by Fortinet researchers confirm that attackers are once again exploiting this weakness…

undercodenews.com/fortinet-for

##

beyondmachines1 at 2025-12-25T19:01:09.639Z ##

Fortinet warns of active exploitation of 2FA Bypass flaw in FortiGate devices

Fortinet is warning of active exploitation of CVE-2020-12812, a critical 5-year-old authentication bypass vulnerability (CVSS 9.8) affecting FortiGate devices with LDAP authentication. The flaw allows attackers to bypass two-factor authentication by exploiting case sensitivity mismatches between FortiGate and LDAP username handling.

**If you are using FortiGate devices, check whether you are using LDAP authentication and whether the devices are patched. If you are using LDAP authentication and have not patched since 2020, immediately configure `username-sensitivity disable`. Then check your logs for suspicious logins with username case variations (like 'JSmith' vs 'jsmith'). Finally, patch your devices.**

beyondmachines.net/event_detai

##

undercodenews@mastodon.social at 2025-12-25T17:08:01.000Z ##

Fortinet Confirms Active Exploitation of CVE-2020-12812, Exposing SSL VPNs to Silent 2FA Bypass

A Silent Flaw Resurfaces in Enterprise Perimeters Fortinet has confirmed active exploitation of CVE-2020-12812, a long-standing vulnerability affecting FortiOS SSL VPN that allows attackers to bypass two-factor authentication through a case-insensitive user authentication flaw. The issue, originally disclosed and patched in 2020, has resurfaced as attackers actively target…

undercodenews.com/fortinet-con

##

technadu@infosec.exchange at 2025-12-27T07:20:50.000Z ##

Fortinet confirms active exploitation of CVE-2020-12812.
A long-standing FortiOS SSL VPN flaw can bypass 2FA due to username case-sensitivity mismatches - especially in legacy deployments.

technadu.com/fortinet-warns-ju

Thoughts on mitigating MFA bypass risks?

#InfoSec #Fortinet #SSLVPN #MFA

##

beyondmachines1@infosec.exchange at 2025-12-25T19:01:09.000Z ##

Fortinet warns of active exploitation of 2FA Bypass flaw in FortiGate devices

Fortinet is warning of active exploitation of CVE-2020-12812, a critical 5-year-old authentication bypass vulnerability (CVSS 9.8) affecting FortiGate devices with LDAP authentication. The flaw allows attackers to bypass two-factor authentication by exploiting case sensitivity mismatches between FortiGate and LDAP username handling.

**If you are using FortiGate devices, check whether you are using LDAP authentication and whether the devices are patched. If you are using LDAP authentication and have not patched since 2020, immediately configure `username-sensitivity disable`. Then check your logs for suspicious logins with username case variations (like 'JSmith' vs 'jsmith'). Finally, patch your devices.**
#cybersecurity #infosec #attack #activeattack
beyondmachines.net/event_detai

##

CVE-2025-23006
(9.8 CRITICAL)

EPSS: 56.66%

updated 2025-10-22T00:34:17

1 posts

Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands.

beyondmachines1@infosec.exchange at 2025-12-19T09:01:31.000Z ##

SonicWall patches actively exploited flaw vulnerability chain in SMA 1000 appliances

SonicWall SMA 1000 appliances are being actively exploited through a vulnerability chain combining CVE-2025-40602 (a local privilege escalation flaw) with CVE-2025-23006 (a previously patched deserialization vulnerability), enabling unauthenticated remote code execution with root privileges.

**If you have SonicWall SMA 1000 appliances, make sure their SSH and management access is isolated from the public internet and only accessible from trusted networks. Review latest version, and if not up-to date patched, plan a very quick upgrade to platform-hotfix 12.4.3-03245 or 12.5.0-02283 (or higher). Your devices are being hacked, and you can't really hide them from the internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2024-55591
(9.8 CRITICAL)

EPSS: 94.14%

updated 2025-10-22T00:34:16

2 posts

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.

Nuclei template

10 repos

https://github.com/watchtowrlabs/fortios-auth-bypass-poc-CVE-2024-55591

https://github.com/sysirq/fortios-auth-bypass-exploit-CVE-2024-55591

https://github.com/UMChacker/CVE-2024-55591-POC

https://github.com/sysirq/fortios-auth-bypass-poc-CVE-2024-55591

https://github.com/watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591

https://github.com/virus-or-not/CVE-2024-55591

https://github.com/binarywarm/exp-cmd-add-admin-vpn-CVE-2024-55591

https://github.com/0x7556/CVE-2024-55591

https://github.com/exfil0/CVE-2024-55591-POC

https://github.com/rawtips/CVE-2024-55591

hackmag at 2025-12-25T20:48:37.316Z ##

⚪ Fortress assault: Bypassing authentication in FortiOS and FortiProxy

🗨️ This article narrates my searches for the CVE-2024-55591 vulnerability in FortiOS and FortiProxy disclosed by Fortinet. This security hole makes it possible to bypass authentication using an alternate path or channel (CWE-288) and enables a remote attacker to gain…

🔗 hackmag.com/security/fortios-b

##

hackmag@infosec.exchange at 2025-12-25T20:48:37.000Z ##

⚪ Fortress assault: Bypassing authentication in FortiOS and FortiProxy

🗨️ This article narrates my searches for the CVE-2024-55591 vulnerability in FortiOS and FortiProxy disclosed by Fortinet. This security hole makes it possible to bypass authentication using an alternate path or channel (CWE-288) and enables a remote attacker to gain…

🔗 hackmag.com/security/fortios-b

#security

##

CVE-2024-53704
(9.8 CRITICAL)

EPSS: 93.82%

updated 2025-10-22T00:34:16

1 posts

An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication.

Nuclei template

1 repos

https://github.com/istagmbh/CVE-2024-53704

cR0w@infosec.exchange at 2025-12-19T18:20:10.000Z ##

CVE-2024-53704 in SonicWall SSLVPN has been added to the KEV Catalog.

cve.org/CVERecord?id=CVE-2024-

##

CVE-2018-0802
(7.8 HIGH)

EPSS: 94.07%

updated 2025-10-22T00:31:30

1 posts

Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0797 and CVE-2018-0812.

7 repos

https://github.com/Palvinder-Singh/PS_CVE2018-0802

https://github.com/roninAPT/CVE-2018-0802

https://github.com/rxwx/CVE-2018-0802

https://github.com/likekabin/CVE-2018-0802_CVE-2017-11882

https://github.com/zldww2011/CVE-2018-0802_POC

https://github.com/Ridter/RTF_11882_0802

https://github.com/Abdibimantara/Maldoc-Analysis

cyberveille@mastobot.ping.moi at 2025-12-26T20:00:05.000Z ##

📢 Cloud Atlas (APT) en 2025 : chaîne d’infection mise à jour via CVE‑2018‑0802, VBShower/VBCloud/PowerShower et détournement de DLL VLC
📝 Kaspersky publie un rapport (19 déc.
📖 cyberveille : cyberveille.ch/posts/2025-12-2
🌐 source : securelist.com/cloud-atlas-h1-
#APT #CVE_2018_0802 #Cyberveille

##

CVE-2017-11882
(7.8 HIGH)

EPSS: 94.38%

updated 2025-10-22T00:16:02.450000

1 posts

Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884.

38 repos

https://github.com/zhouat/cve-2017-11882

https://github.com/rxwx/CVE-2018-0802

https://github.com/davidforis/exp-2024-1213

https://github.com/0x09AL/CVE-2017-11882-metasploit

https://github.com/BlackMathIT/2017-11882_Generator

https://github.com/xdrake1010/CVE-2017-11882-Preventer

https://github.com/HZachev/ABC

https://github.com/Sunqiz/CVE-2017-11882-reproduction

https://github.com/herbiezimmerman/CVE-2017-11882-Possible-Remcos-Malspam

https://github.com/chanbin/CVE-2017-11882

https://github.com/Shadowshusky/CVE-2017-11882-

https://github.com/tzwlhack/CVE-2017-11882

https://github.com/j0lama/CVE-2017-11882

https://github.com/ActorExpose/CVE-2017-11882

https://github.com/Ridter/RTF_11882_0802

https://github.com/imkidz0/CVE-2017-11882

https://github.com/futureFfff/CVE-2017

https://github.com/jadeapar/Dragonfish-s-Malware-Cyber-Analysis

https://github.com/CSC-pentest/cve-2017-11882

https://github.com/likekabin/CVE-2018-0802_CVE-2017-11882

https://github.com/yaseenibnakhtar/001-Malware-Analysis-CVE-2017-11882

https://github.com/likekabin/CVE-2017-11882

https://github.com/embedi/CVE-2017-11882

https://github.com/ChaitanyaHaritash/CVE-2017-11882

https://github.com/Grey-Li/CVE-2017-11882

https://github.com/qy1202/https-github.com-Ridter-CVE-2017-11882-

https://github.com/Ridter/CVE-2017-11882

https://github.com/HaoJame/CVE-2017-11882

https://github.com/Abdibimantara/Maldoc-Analysis

https://github.com/nhuynhuy/cve-2017-11882

https://github.com/letiencong96/CVE_2017_11882

https://github.com/legendsec/CVE-2017-11882-for-Kali

https://github.com/Retr0-code/SignHere

https://github.com/ekgg/Overflow-Demo-CVE-2017-11882

https://github.com/starnightcyber/CVE-2017-11882

https://github.com/lisinan988/CVE-2017-11882-exp

https://github.com/rip1s/CVE-2017-11882

https://github.com/littlebin404/CVE-2017-11882

CVE-2025-4609
(9.7 CRITICAL)

EPSS: 0.12%

updated 2025-08-25T15:33:03

1 posts

Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 136.0.7103.113 allowed a remote attacker to potentially perform a sandbox escape via a malicious file. (Chromium security severity: High)

hackmag@infosec.exchange at 2025-12-25T10:48:17.000Z ##

⚪ Security researcher awarded $250,000 for Chrome sandbox escape vulnerability

🗨️ A security researcher going by the handle Micky received a record payout from Google. The specialist discovered a bug in Chrome that allows bypassing the browser’s sandbox and earned $250,000…

🔗 hackmag.com/news/cve-2025-4609

#news

##

CVE-2025-50165
(9.8 CRITICAL)

EPSS: 3.84%

updated 2025-08-12T18:31:39

1 posts

Untrusted pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.

1 repos

https://github.com/encrypter15/CVE-2025-50165-x64-Exploit

CVE-2025-53786
(8.0 HIGH)

EPSS: 0.16%

updated 2025-08-06T20:23:37.600000

1 posts

On April 18th 2025, Microsoft announced Exchange Server Security Changes for Hybrid Deployments and accompanying non-security Hot Fix. Microsoft made these changes in the general interest of improving the security of hybrid Exchange deployments. Following further investigation, Microsoft identified specific security implications tied to the guidance and configuration steps outlined in the April an

1 repos

https://github.com/vincentdthe/CVE-2025-53786

hackmag@infosec.exchange at 2025-12-25T11:48:19.000Z ##

⚪ More than 29,000 Exchange servers are vulnerable to a serious bug

🗨️ 29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to full domain compromise.

🔗 hackmag.com/news/cve-2025-5378

#news

##

CVE-2025-24294
(5.3 MEDIUM)

EPSS: 0.06%

updated 2025-07-15T22:56:20

1 posts

A denial of service vulnerability has been discovered in the resolv gem bundled with Ruby. ## Details The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a l

linux@activitypub.awakari.com at 2025-12-21T15:51:20.000Z ## Debian: Rails Severe Command Manipulation DSA-6090-2 CVE-2025-24294 Multiple security issues were discovered in the Rails web framework which could result in command injection or logging of unescap...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-30023
(9.1 CRITICAL)

EPSS: 1.92%

updated 2025-07-11T06:30:36

1 posts

The communication protocol used between client and server had a flaw that could lead to an authenticated user performing a remote code execution attack.

beyondmachines1@infosec.exchange at 2025-12-20T12:01:31.000Z ##

Critical vulnerabilities reported in Axis Communications Camera management systems

Axis Communications patched four security vulnerabilities (CVE-2025-30023 through CVE-2025-30026) in its camera management software, including a critical remote code execution flaw and authentication bypass issues affecting surveillance systems in government facilities and critical infrastructure.

**If you have Axis Communications camera management systems (AXIS Camera Station Pro, AXIS Camera Station, or AXIS Device Manager), make sure they are isolated from the internet and only accessible from trusted internal networks. Then plan an update to the latest patched versions (Camera Station Pro 6.9+, Camera Station 5.58+, Device Manager 5.32+).**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-30026(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-07-11T06:30:36

1 posts

The AXIS Camera Station Server had a flaw that allowed to bypass authentication that is normally required.

beyondmachines1@infosec.exchange at 2025-12-20T12:01:31.000Z ##

Critical vulnerabilities reported in Axis Communications Camera management systems

Axis Communications patched four security vulnerabilities (CVE-2025-30023 through CVE-2025-30026) in its camera management software, including a critical remote code execution flaw and authentication bypass issues affecting surveillance systems in government facilities and critical infrastructure.

**If you have Axis Communications camera management systems (AXIS Camera Station Pro, AXIS Camera Station, or AXIS Device Manager), make sure they are isolated from the internet and only accessible from trusted internal networks. Then plan an update to the latest patched versions (Camera Station Pro 6.9+, Camera Station 5.58+, Device Manager 5.32+).**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-6514
(9.6 CRITICAL)

EPSS: 0.73%

updated 2025-07-10T13:17:30.017000

1 posts

mcp-remote is exposed to OS command injection when connecting to untrusted MCP servers due to crafted input from the authorization_endpoint response URL

2 repos

https://github.com/ChaseHCS/CVE-2025-6514

https://github.com/Cyberency/CVE-2025-6514

_r_netsec@infosec.exchange at 2025-12-22T04:13:06.000Z ##

When OAuth Becomes a Weapon: Lessons from CVE-2025-6514 amlalabs.com/blog/oauth-cve-20

##

CVE-2025-3699
(9.8 CRITICAL)

EPSS: 0.17%

updated 2025-06-27T12:32:20

1 posts

Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation G-50 Version 3.37 and prior, G-50-W Version 3.37 and prior, G-50A Version 3.37 and prior, GB-50 Version 3.37 and prior, GB-50A Version 3.37 and prior, GB-24A Version 9.12 and prior, G-150AD Version 3.21 and prior, AG-150A-A Version 3.21 and prior, AG-150A-J Version 3.21 and prior, GB-50AD Version 3.21 and

beyondmachines1@infosec.exchange at 2025-12-24T11:01:31.000Z ##

Critical authentication bypass flaw reported in Mitsubishi Electric air conditioning systems

Mitsubishi Electric disclosed a critical authentication bypass vulnerability (CVE-2025-3699) affecting multiple commercial air conditioning system models, allowing remote attackers to gain unauthorized control, manipulate operations, and potentially disrupt critical facilities like data centers and hospitals.

**If you have Mitsubishi Electric air conditioning systems review this advisory in detail to check if your system is affected. Make sure that the isolate the HVAC from the internet and ensure they're only accessible from trusted internal networks or through VPN. Since most models won't receive security fixes, network isolation is your primary protection.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-5499
(7.3 HIGH)

EPSS: 0.11%

updated 2025-06-04T14:54:33.783000

1 posts

A vulnerability classified as critical has been found in slackero phpwcms up to 1.9.45/1.10.8. Affected is the function is_file/getimagesize of the file image_resized.php. The manipulation of the argument imgfile leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9.46 and 1.10.9 is able to add

CVE-2025-5378
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-05-31T15:30:34

1 posts

A vulnerability classified as problematic has been found in Astun Technology iShare Maps 5.4.0. This affects an unknown part of the file mycouncil2.aspx. The manipulation of the argument atTxtStreet leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did

1 repos

https://github.com/vincentdthe/CVE-2025-53786

hackmag@infosec.exchange at 2025-12-25T11:48:19.000Z ##

⚪ More than 29,000 Exchange servers are vulnerable to a serious bug

🗨️ 29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to full domain compromise.

🔗 hackmag.com/news/cve-2025-5378

#news

##

CVE-2025-29970
(7.8 HIGH)

EPSS: 0.07%

updated 2025-05-13T18:31:00

1 posts

Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.

_r_netsec@infosec.exchange at 2025-12-22T10:13:06.000Z ##

Microsoft Brokering File System Elevation of Privilege Vulnerability (CVE--2025-29970) pixiepointsecurity.com/blog/nd

##

CVE-2025-2039
(4.7 MEDIUM)

EPSS: 0.10%

updated 2025-03-06T21:31:33

2 posts

A vulnerability classified as critical has been found in code-projects Blood Bank Management System 1.0. Affected is an unknown function of the file /admin/delete_members.php. The manipulation of the argument member_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

3 repos

https://github.com/Ashwesker/Blackash-CVE-2025-20393

https://github.com/cyberleelawat/CVE-2025-20393

https://github.com/KingHacker353/CVE-2025-20393

hackmag@infosec.exchange at 2025-12-24T08:00:32.000Z ##

⚪ Cisco warns of an unpatched zero‑day vulnerability in AsyncOS

🗨️ Cisco has warned its customers about an unpatched zero-day vulnerability in Cisco AsyncOS that is already being actively exploited to attack Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) devices.

🔗 hackmag.com/news/cve-2025-2039

#news

##

Andy_Thompson@infosec.exchange at 2025-12-18T18:07:33.000Z ##

🔥 Cisco AsyncOS Zero-Day (CVE-2025-20393)
• BleepingComputer
bleepingcomputer.com/news/secu
• The Hacker News
thehackernews.com/2025/12/cisc
• SecurityWeek
securityweek.com/china-linked-
• The Register
theregister.com/2025/12/17/att
• Dark Reading (CISA KEV addition)
darkreading.com/attacks-breach
• SOCRadar analysis
socradar.io/blog/cve-2025-2039

##

CVE-2024-44067
(8.4 HIGH)

EPSS: 0.04%

updated 2024-08-20T20:35:34.497000

1 posts

The T-Head XuanTie C910 CPU in the TH1520 SoC and the T-Head XuanTie C920 CPU in the SOPHON SG2042 have instructions that allow unprivileged attackers to write to arbitrary physical memory locations, aka GhostWrite.

erai@furry.engineer at 2025-12-19T20:20:49.000Z ##

somehow nfs feels faster too. Kinda sad about CVE-2024-44067 on this board but i don't really care because i just want more architectures

##

alip@mastodon.online at 2025-12-26T11:49:28.000Z ##

#Christmas hardening for #sydbox which features a SMAP implementation using seccomp(2). Syd loads a per-arch filter at startup to terminate processes passing kernel pointers to syscalls and the overhead is ~%0.02. This is enabled by default with the option trace/allow_unsafe_kptr:1 to disable. See CVE-2017-5123 for one example of SMAP bypass: man.exherbo.org/syd.7.html#Har #exherbo #linux #security

##

alip@mastodon.online at 2025-12-26T11:49:28.000Z ##

#Christmas hardening for #sydbox which features a SMAP implementation using seccomp(2). Syd loads a per-arch filter at startup to terminate processes passing kernel pointers to syscalls and the overhead is ~%0.02. This is enabled by default with the option trace/allow_unsafe_kptr:1 to disable. See CVE-2017-5123 for one example of SMAP bypass: man.exherbo.org/syd.7.html#Har #exherbo #linux #security

##

CVE-2025-9615
(0 None)

EPSS: 0.00%

2 posts

N/A

AerynOS@hachyderm.io at 2025-12-27T23:12:30.000Z ##

Unstable stream updates: 27th December 2025

Declarative moss system-model export and import tech preview features

Moss now has the ability to use a declarative `/etc/moss/system-model.kdl` to define installed packages and repositories.

In addition, for users who prefer the classic "imperative" moss experience, it is now possible to `moss state --export` a `system-model.kdl` file of the current system to share with others.

In turn, it is also possible to one-shot `moss sync --import` an existing `system-model.kdl` file.

These features are delivered as a tech preview.

Boulder package recipe version string requirements

The Boulder packaging tool now checks for a valid recipe version string (= anything starting with an integer) and errors out if the version string is not valid.

This is necessary because our `ent` package update checking tool compares version strings to determine whether packages need an update, and will give false positives if we have a version string that looks like e.g. `v0.1.2` (note the `v`).

Highlights

- KDE Frameworks 6.21.0
- KMSCon 9.2.1 (currently not enabled by default)
- NVIDIA graphics driver 590.48.01
- discord 0.0.119
- gamescope 3.16.18
- gstreamer 1.26.10
- linux 6.17.13
- mesa 25.3.2
- sudo-rs 0.2.11
- uutils-coreutils 0.5.0
- vlc 3.22
- vscode-bin 1.107.0
- vscodium 1.107.18627
- wine 11.0-rc3
- zed 0.217.3

Other updates

Other updates include, but are not limited to:

- fastfetch
- inetutils
- inputplumber
- libdrm
- libva
- ryzenadj
- solaar
- tzdata
- wireplumber

Fixes

- Disabled LTO for the build of our recipe version checking tool `ent`, which makes `ent check updates` actually work.
- Fixed a sudo issue where using Super+T to open a cosmic-terminal in a Cosmic sesion would make sudo unable to find any commands
- Made cosmic-greeter fall back to branded background

Security Fixes:

- Patches to networkmanager and networkmanager-openvpn for CVE-2025-9615

New packages

- font-awesome-ttf 6.7.2
- lsd 1.2.0 (next gen ls command)
- swayidle 1.9.0
- yazi 25.5.31 (terminal file manager)
- yubikey-manager 5.8.0

github.com/orgs/AerynOS/discus

#AerynOS #Linux #Rust

##

AerynOS@hachyderm.io at 2025-12-27T23:12:30.000Z ##

Unstable stream updates: 27th December 2025

Declarative moss system-model export and import tech preview features

Moss now has the ability to use a declarative `/etc/moss/system-model.kdl` to define installed packages and repositories.

In addition, for users who prefer the classic "imperative" moss experience, it is now possible to `moss state --export` a `system-model.kdl` file of the current system to share with others.

In turn, it is also possible to one-shot `moss sync --import` an existing `system-model.kdl` file.

These features are delivered as a tech preview.

Boulder package recipe version string requirements

The Boulder packaging tool now checks for a valid recipe version string (= anything starting with an integer) and errors out if the version string is not valid.

This is necessary because our `ent` package update checking tool compares version strings to determine whether packages need an update, and will give false positives if we have a version string that looks like e.g. `v0.1.2` (note the `v`).

Highlights

- KDE Frameworks 6.21.0
- KMSCon 9.2.1 (currently not enabled by default)
- NVIDIA graphics driver 590.48.01
- discord 0.0.119
- gamescope 3.16.18
- gstreamer 1.26.10
- linux 6.17.13
- mesa 25.3.2
- sudo-rs 0.2.11
- uutils-coreutils 0.5.0
- vlc 3.22
- vscode-bin 1.107.0
- vscodium 1.107.18627
- wine 11.0-rc3
- zed 0.217.3

Other updates

Other updates include, but are not limited to:

- fastfetch
- inetutils
- inputplumber
- libdrm
- libva
- ryzenadj
- solaar
- tzdata
- wireplumber

Fixes

- Disabled LTO for the build of our recipe version checking tool `ent`, which makes `ent check updates` actually work.
- Fixed a sudo issue where using Super+T to open a cosmic-terminal in a Cosmic sesion would make sudo unable to find any commands
- Made cosmic-greeter fall back to branded background

Security Fixes:

- Patches to networkmanager and networkmanager-openvpn for CVE-2025-9615

New packages

- font-awesome-ttf 6.7.2
- lsd 1.2.0 (next gen ls command)
- swayidle 1.9.0
- yazi 25.5.31 (terminal file manager)
- yubikey-manager 5.8.0

github.com/orgs/AerynOS/discus

#AerynOS #Linux #Rust

##

CVE-2025-59946
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2025-12-27T01:43:47.000Z ##

🟠 CVE-2025-59946 - High (7.5)

NanoMQ MQTT Broker (NanoMQ) is an Edge Messaging Platform. Prior to version 0.24.2, there is a classical data racing issue about sub info list which could result in heap use after free crash. This issue has been patched in version 0.24.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

CVE-2025-66203
(0 None)

EPSS: 0.26%

2 posts

N/A

thehackerwire@mastodon.social at 2025-12-27T00:44:03.000Z ##

🔴 CVE-2025-66203 - Critical (9.9)

StreamVault is a video download integration solution. Prior to version 251126, a Remote Code Execution (RCE) vulnerability exists in the stream-vault application (SpiritApplication). The application allows administrators to configure yt-dlp argume...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

##

offseq at 2025-12-27T00:05:25.272Z ##

🚨 CRITICAL: CVE-2025-66203 in lemon8866 StreamVault (<251126). RCE possible via OS command injection in /admin/api/saveConfig. Patch to 251126 ASAP! Details: radar.offseq.com/threat/cve-20

##

exploitdb_bot@mastodon.social at 2025-12-25T18:15:07.000Z ##

🚨 New Exploit: FreeBSD rtsold 15.x - Remote Code Execution via DNSSL
📋 CVE: CVE-2025-14558
👤 Author: Lukas Johannes Möller

🔗 exploit-db.com/exploits/52463

#ExploitDB #InfoSec #CyberSecurity #CVE-2025-14558

##

hackmag@infosec.exchange at 2025-12-24T20:00:12.000Z ##

⚪ Critical RCE Bug Patched in HPE OneView

🗨️ Hewlett Packard Enterprise (HPE) developers have released patches for a critical remote code execution vulnerability discovered in the OneView IT infrastructure management software. The issue is tracked as CVE-2025-37164 (a maximum score of 10.0 on the CVSS scale) and can be exploited without authen…

🔗 hackmag.com/news/cve-2025-3716

#news

##

CVE-2026-00001
(0 None)

EPSS: 0.00%

1 posts

N/A

nyanbinary@infosec.exchange at 2025-12-24T08:33:45.000Z ##

@gayint cve-2026-00001 - you use windows

##

cR0w@infosec.exchange at 2025-12-23T21:56:31.000Z ##

Hey @pft here's another one for your rule:

github.com/0xrakan/coolify-cve

Per the write-up, it's five perfect 10s in Coolify. 🥳

##

CVE-2025-14269
(0 None)

EPSS: 0.00%

1 posts

N/A

1 repos

https://github.com/r0binak/CVE-2025-14269

CVE-2025-14282
(0 None)

EPSS: 0.00%

1 posts

N/A

linux@activitypub.awakari.com at 2025-12-19T19:30:37.000Z ## Debian: Urgent Vulnerability in Dropbear DSA-6086-1 CVE-2025-14282 "Turistu" discovered that incorrect permission handling in the Dropbear SSH server could result in privilege escalation. T...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-66387
(0 None)

EPSS: 0.00%

1 posts

N/A

PostgreSQL@activitypub.awakari.com at 2025-12-18T15:46:25.000Z ## LevelBlue SpiderLabs: SQL Injection in Orkes Conductor: CVE-2025-66387 LevelBlue SpiderLabs has discovered a vulnerability in the Orkes Conductor platform (version 5.2.4 | v1.19.12) that allows aut...

#Database #Protection #Security #Research #Data #Breach

Origin | Interest | Match ##

CVE-2025-67745
(0 None)

EPSS: 0.02%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-18T20:30:01.000Z ##

CVE-2025-67745 - Myhoard logs backup encryption key in plain text cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-63821
(0 None)

EPSS: 0.00%

1 posts

N/A

1 repos

https://github.com/Xernary/CVE-2025-63821

CVE-2025-63820
(0 None)

EPSS: 0.00%

1 posts

N/A

1 repos

https://github.com/Xernary/CVE-2025-63820

Visit counter For Websites