## Updated at UTC 2025-12-17T11:20:31.299915

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2025-14101 7.1 0.00% 1 0 2025-12-17T10:15:39.710000 Authorization Bypass Through User-Controlled Key vulnerability in GG Soft Softwa
CVE-2025-14399 4.3 0.00% 1 0 2025-12-17T09:30:32 The Download Plugins and Themes in ZIP from Dashboard plugin for WordPress is vu
CVE-2025-12496 4.9 0.00% 1 0 2025-12-17T09:30:32 The Zephyr Project Manager plugin for WordPress is vulnerable to Directory Trave
CVE-2025-14817 None 0.00% 2 0 2025-12-17T09:30:32 The component com.transsion.tranfacmode.entrance.main.MainActivity in com.transs
CVE-2025-14061 5.3 0.00% 1 0 2025-12-17T09:30:32 The Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker (
CVE-2025-13750 4.3 0.00% 1 0 2025-12-17T09:30:32 The Converter for Media – Optimize images | Convert WebP & AVIF plugin for WordP
CVE-2025-11924 7.5 0.00% 1 0 2025-12-17T07:15:57.750000 The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPr
CVE-2025-13880 6.5 0.00% 1 0 2025-12-17T06:32:10 The WP Social Ninja – Embed Social Feeds, Customer Reviews, Chat Widgets (Google
CVE-2025-13861 6.1 0.00% 1 0 2025-12-17T06:32:10 The HTML Forms – Simple WordPress Forms Plugin for WordPress is vulnerable to Un
CVE-2025-11775 None 0.00% 1 0 2025-12-17T06:32:10 An out-of-bounds read vulnerability has been identified in the asComSvc service.
CVE-2025-14385 6.4 0.00% 1 0 2025-12-17T06:32:09 The WP Recipe Maker plugin for WordPress is vulnerable to Stored Cross-Site Scri
CVE-2025-14305 7.8 0.00% 1 0 2025-12-17T06:32:08 ListCheck.exe developed by Acer has a Local Privilege Escalation vulnerability.
CVE-2025-59374 0 0.00% 3 0 2025-12-17T05:16:13.080000 "UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were
CVE-2025-53524 7.8 0.00% 2 0 2025-12-17T03:30:19 Fuji Electric Monitouch V-SFT-6 is vulnerable to an out-of-bounds write while p
CVE-2025-14701 7.1 0.00% 1 0 2025-12-17T03:30:19 An input neutralization vulnerability in the Server MOTD component of Crafty Con
CVE-2025-11009 5.1 0.00% 1 0 2025-12-17T03:30:19 Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric
CVE-2025-14700 9.9 0.00% 3 0 2025-12-17T01:15:59.620000 An input neutralization vulnerability in the Webhook Template component of Craft
CVE-2025-14766 None 0.00% 1 0 2025-12-17T00:31:24 Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allo
CVE-2025-64725 None 0.01% 1 0 2025-12-17T00:29:26 ### Impact It was possible to accept an invitation opened by a different Weblat
CVE-2025-54947 None 0.04% 1 0 2025-12-17T00:25:52 In Apache StreamPark versions 2.0.0 through 2.1.7, a security vulnerability invo
CVE-2025-68087 5.4 0.02% 1 0 2025-12-16T21:32:01 Missing Authorization vulnerability in merkulove Modalier for Elementor modalier
CVE-2025-14646 7.3 0.03% 1 0 2025-12-16T21:32:01 A security flaw has been discovered in code-projects Student File Management Sys
CVE-2025-14642 4.7 0.03% 1 0 2025-12-16T21:32:01 A vulnerability has been found in code-projects Computer Laboratory System 1.0.
CVE-2025-14653 7.3 0.03% 1 0 2025-12-16T21:32:00 A vulnerability was determined in itsourcecode Student Management System 1.0. Im
CVE-2025-14623 7.3 0.03% 1 0 2025-12-16T21:31:59 A weakness has been identified in code-projects Student File Management System 1
CVE-2025-37164 10.0 0.00% 1 0 2025-12-16T21:30:54 A remote code execution issue exists in HPE OneView.
CVE-2025-14649 7.3 0.03% 1 0 2025-12-16T21:30:52 A vulnerability was detected in itsourcecode Online Cake Ordering System 1.0. Af
CVE-2025-14640 7.3 0.03% 1 0 2025-12-16T21:30:52 A flaw has been found in code-projects Student File Management System 1.0. The a
CVE-2025-14589 6.3 0.03% 1 0 2025-12-16T21:30:51 A weakness has been identified in code-projects Prison Management System 2.0. Th
CVE-2025-65427 6.5 0.00% 1 1 2025-12-16T21:15:47.380000 An issue was discovered in Dbit N300 T1 Pro Easy Setup Wireless Wi-Fi Router on
CVE-2025-46295 9.8 0.00% 1 0 2025-12-16T20:15:48.177000 Apache Commons Text versions prior to 1.10.0 included interpolation features tha
CVE-2025-13888 9.1 0.05% 1 0 2025-12-16T20:11:05 A flaw was found in OpenShift GitOps. Namespace admins can create ArgoCD Custom
CVE-2025-14645 7.3 0.03% 1 0 2025-12-16T20:07:17.483000 A vulnerability was identified in code-projects Student File Management System 1
CVE-2025-14641 4.7 0.03% 1 0 2025-12-16T20:06:40.230000 A flaw has been found in code-projects Computer Laboratory System 1.0. This issu
CVE-2025-14590 7.3 0.03% 1 0 2025-12-16T19:53:27.180000 A security vulnerability has been detected in code-projects Prison Management Sy
CVE-2025-68130 None 0.00% 1 0 2025-12-16T19:37:58 > Note that this vulnerability is only present when using `experimental_caller`
CVE-2025-68270 9.9 0.00% 1 0 2025-12-16T19:16:00.720000 The Open edX Platform is a learning management platform. Prior to commit 05d0d09
CVE-2025-59718 9.8 0.05% 9 1 2025-12-16T19:15:57.863000 A improper verification of cryptographic signature vulnerability in Fortinet For
CVE-2025-65781 8.2 0.02% 1 0 2025-12-16T18:32:38 An issue was discovered in Wekan The Open Source kanban board system up to versi
CVE-2025-65778 8.1 0.02% 1 0 2025-12-16T18:32:38 An issue was discovered in Wekan The Open Source kanban board system up to versi
CVE-2025-33225 8.4 0.00% 2 0 2025-12-16T18:31:43 NVIDIA Resiliency Extension for Linux contains a vulnerability in log aggregatio
CVE-2025-33235 7.8 0.00% 1 0 2025-12-16T18:31:43 NVIDIA Resiliency Extension for Linux contains a vulnerability in the checkpoint
CVE-2025-33226 7.8 0.00% 1 0 2025-12-16T18:31:43 NVIDIA NeMo Framework for all platforms contains a vulnerability where malicious
CVE-2025-29231 6.1 0.00% 1 0 2025-12-16T18:31:43 A stored cross-site scripting (XSS) vulnerability in the page_save component of
CVE-2025-50401 None 0.00% 1 0 2025-12-16T18:31:42 Mercury D196G d196gv1-cn-up_2020-01-09_11.21.44 is vulnerable to Buffer Overflow
CVE-2025-50398 None 0.00% 1 0 2025-12-16T18:31:42 Mercury D196G d196gv1-cn-up_2020-01-09_11.21.44 is vulnerable to Buffer Overflow
CVE-2025-14432 None 0.00% 1 0 2025-12-16T18:31:33 In limited scenarios, sensitive data might be written to the log file if an admi
CVE-2025-33212 7.3 0.00% 1 0 2025-12-16T18:16:11.340000 NVIDIA NeMo Framework contains a vulnerability in model loading that could allow
CVE-2025-33210 9.0 0.00% 2 0 2025-12-16T18:16:11.163000 NVIDIA Isaac Lab contains a deserialization vulnerability. A successful exploit
CVE-2023-53900 8.8 0.00% 1 0 2025-12-16T18:16:07.063000 Spip 4.1.10 contains a file upload vulnerability that allows attackers to upload
CVE-2023-53896 7.5 0.00% 2 0 2025-12-16T18:16:06.537000 D-Link DAP-1325 firmware version 1.01 contains a broken access control vulnerabi
CVE-2025-66388 6.5 0.03% 1 0 2025-12-16T17:50:23 A vulnerability in Apache Airflow allowed authenticated UI users to view secret
CVE-2025-68088 5.4 0.02% 1 0 2025-12-16T16:16:05.610000 Missing Authorization vulnerability in merkulove Huger for Elementor huger-eleme
CVE-2025-37731 6.8 0.04% 1 0 2025-12-16T15:52:25 Improper Authentication in Elasticsearch PKI realm can lead to user impersonatio
CVE-2025-14691 4.3 0.09% 1 0 2025-12-16T15:43:35 A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is
CVE-2025-55895 9.1 0.02% 3 0 2025-12-16T15:31:39 TOTOLINK A3300R V17.0.0cu.557_B20221024 and N200RE V9.3.5u.6448_B20240521 and V9
CVE-2025-14611 9.8 17.48% 2 0 2025-12-16T15:31:34 Gladinet CentreStack and Triofox prior to version 16.12.10420.56791 used hardcod
CVE-2025-68265 None 0.00% 1 0 2025-12-16T15:30:56 In the Linux kernel, the following vulnerability has been resolved: nvme: fix a
CVE-2025-68264 None 0.00% 1 0 2025-12-16T15:30:56 In the Linux kernel, the following vulnerability has been resolved: ext4: refre
CVE-2025-68281 None 0.00% 1 0 2025-12-16T15:30:55 In the Linux kernel, the following vulnerability has been resolved: ASoC: SDCA:
CVE-2025-14443 8.5 0.00% 1 0 2025-12-16T15:30:47 A flaw was found in ose-openshift-apiserver. This vulnerability allows internal
CVE-2025-68086 5.4 0.02% 1 0 2025-12-16T15:30:42 Missing Authorization vulnerability in merkulove Reformer for Elementor reformer
CVE-2025-68266 0 0.00% 1 0 2025-12-16T15:15:56.140000 In the Linux kernel, the following vulnerability has been resolved: bfs: Recons
CVE-2025-68263 0 0.00% 1 0 2025-12-16T15:15:55.813000 In the Linux kernel, the following vulnerability has been resolved: ksmbd: ipc:
CVE-2025-65076 0 0.00% 1 0 2025-12-16T14:10:11.300000 WaveView client allows users to execute restricted set of predefined commands an
CVE-2025-65074 0 0.00% 1 0 2025-12-16T14:10:11.300000 WaveView client allows users to execute restricted set of predefined commands an
CVE-2025-9455 7.8 0.01% 1 0 2025-12-16T14:10:11.300000 A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk prod
CVE-2025-9453 7.8 0.01% 1 0 2025-12-16T14:10:11.300000 A maliciously crafted PRT file, when parsed through certain Autodesk products, c
CVE-2025-9460 7.8 0.01% 1 0 2025-12-16T14:10:11.300000 A maliciously crafted SLDPRT file, when parsed through certain Autodesk products
CVE-2025-10882 7.8 0.01% 1 0 2025-12-16T14:10:11.300000 AA maliciously crafted X_T file, when parsed through certain Autodesk products,
CVE-2025-10881 7.8 0.01% 1 0 2025-12-16T14:10:11.300000 A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk prod
CVE-2025-10883 7.8 0.01% 1 0 2025-12-16T14:10:11.300000 A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk prod
CVE-2025-10886 7.8 0.01% 1 0 2025-12-16T14:10:11.300000 A maliciously crafted MODEL file, when parsed through certain Autodesk products,
CVE-2025-10900 7.8 0.01% 1 0 2025-12-16T14:10:11.300000 AA maliciously crafted MODEL file, when parsed through certain Autodesk products
CVE-2025-61976 7.5 0.15% 2 0 2025-12-16T14:10:11.300000 CHOCO TEI WATCHER mini (IB-MCT001) contains an issue with improper check for unu
CVE-2025-13794 4.3 0.03% 1 0 2025-12-16T14:10:11.300000 The Auto Featured Image (Auto Post Thumbnail) plugin for WordPress is vulnerable
CVE-2025-59385 0 0.27% 1 0 2025-12-16T14:10:11.300000 An authentication bypass by spoofing vulnerability has been reported to affect s
CVE-2025-67744 9.6 0.15% 1 0 2025-12-16T14:10:11.300000 DeepChat is an open-source artificial intelligence agent platform that unifies m
CVE-2025-68115 0 0.04% 1 0 2025-12-16T14:10:11.300000 Parse Server is an open source backend that can be deployed to any infrastructur
CVE-2025-67748 0 0.02% 1 0 2025-12-16T14:10:11.300000 Fickling is a Python pickling decompiler and static analyzer. Versions prior to
CVE-2023-53889 0 0.34% 1 0 2025-12-16T14:10:11.300000 Perch CMS 3.2 contains a remote code execution vulnerability that allows authent
CVE-2023-53892 0 0.27% 1 0 2025-12-16T14:10:11.300000 Blackcat CMS 1.4 contains a remote code execution vulnerability that allows auth
CVE-2025-14722 2.4 0.03% 1 0 2025-12-16T14:10:11.300000 A vulnerability was determined in vion707 DMadmin up to 3403cafdb42537a648c30bf8
CVE-2025-14002 8.1 0.10% 1 0 2025-12-16T12:30:37 The WPCOM Member plugin for WordPress is vulnerable to authentication bypass via
CVE-2025-11393 8.7 0.01% 1 0 2025-12-16T10:15:42.090000 A flaw was found in runtimes-inventory-rhel8-operator. An internal proxy compone
CVE-2025-13439 5.9 0.03% 1 0 2025-12-16T09:31:16 The Fancy Product Designer plugin for WordPress is vulnerable to Information Dis
CVE-2025-11991 5.3 0.05% 1 0 2025-12-16T09:31:16 The JetFormBuilder — Dynamic Blocks Form Builder plugin for WordPress is vulnera
CVE-2025-66635 7.2 0.08% 1 0 2025-12-16T09:31:16 Stack-based buffer overflow vulnerability exists in SEIKO EPSON Web Config. Spec
CVE-2025-14252 7.8 0.01% 2 0 2025-12-16T06:30:30 An Improper Access Control vulnerability in Advantech SUSI driver (susi.sys) all
CVE-2025-12809 5.3 0.05% 1 0 2025-12-16T06:30:20 The Dokan Pro plugin for WordPress is vulnerable to unauthorized access of data
CVE-2025-66357 5.3 0.04% 1 0 2025-12-16T06:30:20 CHOCO TEI WATCHER mini (IB-MCT001) contains an issue with improper check for unu
CVE-2025-62848 None 0.15% 1 0 2025-12-16T03:31:22 A NULL pointer dereference vulnerability has been reported to affect several QNA
CVE-2025-14674 6.3 0.05% 1 0 2025-12-16T00:45:19 A vulnerability was found in aizuda snail-job up to 1.6.0. Affected by this vuln
CVE-2025-68113 6.5 0.04% 1 0 2025-12-16T00:43:54 ### Impact A cryptographic semantic binding flaw in ALTCHA libraries allows cha
CVE-2025-9452 7.8 0.01% 1 0 2025-12-16T00:30:37 A maliciously crafted SLDPRT file, when parsed through certain Autodesk products
CVE-2025-9454 7.8 0.01% 1 0 2025-12-16T00:30:36 A maliciously crafted PRT file, when parsed through certain Autodesk products, c
CVE-2025-14731 6.3 0.05% 1 0 2025-12-16T00:30:36 A weakness has been identified in CTCMS Content Management System up to 2.1.2. T
CVE-2025-14593 7.8 0.01% 1 0 2025-12-16T00:30:36 A maliciously crafted CATPART file, when parsed through certain Autodesk product
CVE-2025-9457 7.8 0.01% 1 0 2025-12-16T00:30:36 A maliciously crafted PRT file, when parsed through certain Autodesk products, c
CVE-2025-9459 7.8 0.01% 1 0 2025-12-16T00:30:36 A maliciously crafted SLDPRT file, when parsed through certain Autodesk products
CVE-2025-9456 7.8 0.01% 1 0 2025-12-16T00:30:36 A maliciously crafted SLDPRT file, when parsed through certain Autodesk products
CVE-2025-10888 7.8 0.01% 1 0 2025-12-16T00:30:36 AA maliciously crafted MODEL file, when parsed through certain Autodesk products
CVE-2025-10887 7.8 0.01% 1 0 2025-12-16T00:30:36 A maliciously crafted MODEL file, when parsed through certain Autodesk products,
CVE-2025-10884 7.8 0.01% 1 0 2025-12-16T00:30:36 AA maliciously crafted CATPART file, when parsed through certain Autodesk produc
CVE-2025-10898 7.8 0.01% 1 0 2025-12-16T00:30:36 AA maliciously crafted MODEL file, when parsed through certain Autodesk products
CVE-2025-10899 7.8 0.01% 1 0 2025-12-16T00:30:36 AA maliciously crafted MODEL file, when parsed through certain Autodesk products
CVE-2025-10889 7.8 0.01% 1 0 2025-12-16T00:30:36 A maliciously crafted CATPART file, when parsed through certain Autodesk product
CVE-2025-9121 8.8 0.05% 1 0 2025-12-16T00:30:30 Pentaho Data Integration and Analytics Community Dashboard Editor plugin version
CVE-2025-67735 6.5 0.04% 1 0 2025-12-15T23:28:50 ### Summary The `io.netty.handler.codec.http.HttpRequestEncoder` CRLF injection
CVE-2025-67899 2.9 0.01% 1 0 2025-12-15T23:15:57.293000 uriparser through 0.9.9 allows unbounded recursion and stack consumption, as dem
CVE-2023-53888 None 0.30% 1 0 2025-12-15T21:30:45 Zomplog 3.9 contains a remote code execution vulnerability that allows authentic
CVE-2023-53885 None 0.30% 1 0 2025-12-15T21:30:44 Webutler v3.2 contains a remote code execution vulnerability that allows authent
CVE-2023-53881 None 0.03% 1 0 2025-12-15T21:30:44 ReyeeOS 1.204.1614 contains an unencrypted CWMP communication vulnerability that
CVE-2023-53877 None 0.03% 1 0 2025-12-15T21:30:44 Bus Reservation System 1.1 contains a SQL injection vulnerability in the pickup_
CVE-2023-53893 None 0.04% 1 0 2025-12-15T21:30:44 Ateme TITAN File 3.9.12.4 contains an authenticated server-side request forgery
CVE-2025-67809 4.7 0.03% 1 0 2025-12-15T21:30:39 An issue was discovered in Zimbra Collaboration (ZCS) 10.0 and 10.1. A hardcoded
CVE-2025-14023 3.1 0.03% 1 0 2025-12-15T19:16:02.593000 LINE client for iOS prior to 15.19 allows UI spoofing due to inconsistencies bet
CVE-2025-60786 8.8 0.07% 1 0 2025-12-15T18:30:45 A Zip Slip vulnerability in the import a Project component of iceScrum v7.54 Pro
CVE-2024-44599 8.3 0.04% 1 0 2025-12-15T18:30:45 FNT Command 13.4.0 is vulnerable to Directory Traversal.
CVE-2025-13824 0 0.04% 1 0 2025-12-15T18:22:13.783000 A security issue exists due to improper handling of malformed CIP packets during
CVE-2025-65782 0 0.02% 1 0 2025-12-15T18:22:13.783000 An issue was discovered in Wekan The Open Source kanban board system up to versi
CVE-2025-65780 0 0.02% 1 0 2025-12-15T18:22:13.783000 An issue was discovered in Wekan The Open Source kanban board system up to versi
CVE-2025-37732 5.4 0.03% 1 0 2025-12-15T18:22:13.783000 Improper neutralization of input during web page generation ('Cross-site Scripti
CVE-2025-14708 9.8 0.04% 1 0 2025-12-15T18:22:13.783000 A weakness has been identified in Shiguangwu sgwbox N3 2.0.25. Affected by this
CVE-2025-14695 6.3 0.04% 1 0 2025-12-15T18:22:13.783000 A vulnerability was determined in SamuNatsu HaloBot up to 026b01d4a896d93eaaf9d5
CVE-2025-14692 4.3 0.10% 1 0 2025-12-15T18:22:13.783000 A flaw has been found in Mayan EDMS up to 4.10.1. The impacted element is an unk
CVE-2025-14672 7.3 0.04% 1 0 2025-12-15T18:22:13.783000 A flaw has been found in gmg137 snap7-rs up to 1.142.1. This impacts the functio
CVE-2025-14668 7.3 0.03% 1 0 2025-12-15T18:22:13.783000 A vulnerability was detected in campcodes Advanced Online Examination System 1.0
CVE-2025-14656 8.8 0.05% 2 0 2025-12-15T18:22:13.783000 A weakness has been identified in Tenda AC20 16.03.08.12. This affects the funct
CVE-2025-14659 8.8 0.18% 1 0 2025-12-15T18:22:13.783000 A vulnerability was detected in D-Link DIR-860LB1 and DIR-868LB1 203b01/203b03.
CVE-2025-14648 4.7 0.23% 1 0 2025-12-15T18:22:13.783000 A security vulnerability has been detected in DedeBIZ up to 6.5.9. Affected by t
CVE-2025-14647 7.3 0.03% 1 0 2025-12-15T18:22:13.783000 A weakness has been identified in code-projects Computer Book Store 1.0. Affecte
CVE-2025-14644 7.3 0.03% 1 0 2025-12-15T18:22:13.783000 A vulnerability was determined in itsourcecode Student Management System 1.0. Th
CVE-2025-14643 7.3 0.03% 1 0 2025-12-15T18:22:13.783000 A vulnerability was found in code-projects Simple Attendance Record System 2.0.
CVE-2025-14636 3.7 0.02% 1 0 2025-12-15T18:22:13.783000 A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the f
CVE-2025-14606 5.0 0.04% 1 0 2025-12-15T18:22:13.783000 A security vulnerability has been detected in tiny-rdm Tiny RDM up to 1.2.5. Aff
CVE-2025-14607 6.3 0.05% 1 0 2025-12-15T18:22:13.783000 A vulnerability was detected in OFFIS DCMTK up to 3.6.9. Affected by this issue
CVE-2025-8780 6.4 0.03% 1 0 2025-12-15T18:22:13.783000 The Livemesh SiteOrigin Widgets plugin for WordPress is vulnerable to Stored Cro
CVE-2025-36751 0 0.01% 1 0 2025-12-15T18:22:13.783000 Encryption is missing on the configuration interface for Growatt ShineLan-X and 
CVE-2025-7058 6.4 0.03% 1 0 2025-12-15T18:22:13.783000 The Kingcabs theme for WordPress is vulnerable to Stored Cross-Site Scripting vi
CVE-2025-65779 None 0.02% 1 0 2025-12-15T15:30:32 An issue was discovered in Wekan The Open Source kanban board system up to versi
CVE-2018-4063 8.8 1.71% 2 0 2025-12-15T15:18:49.987000 An exploitable remote code execution vulnerability exists in the upload.cgi func
CVE-2025-14174 8.8 1.08% 6 0 2025-12-15T15:16:08.650000 Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499
CVE-2025-14714 None 0.01% 1 0 2025-12-15T12:30:32 An Authentication Bypass vulnerability existed where the application bundled an
CVE-2025-11670 6.4 0.03% 1 0 2025-12-15T12:30:32 Zohocorp ManageEngine ADManager Plus versions before 8025 are vulnerable to NTLM
CVE-2025-14710 7.3 0.03% 1 0 2025-12-15T09:31:35 A vulnerability was detected in FantasticLBP Hotels Server up to 67b44df162fab26
CVE-2025-14709 9.8 0.04% 1 0 2025-12-15T09:31:35 A security vulnerability has been detected in Shiguangwu sgwbox N3 2.0.25. Affec
CVE-2025-14711 7.3 0.03% 1 0 2025-12-15T09:31:34 A flaw has been found in FantasticLBP Hotels Server up to 67b44df162fab26df209bd
CVE-2025-14705 9.8 0.15% 1 0 2025-12-15T06:31:25 A vulnerability was determined in Shiguangwu sgwbox N3 2.0.25. This affects an u
CVE-2025-14712 7.5 0.03% 1 0 2025-12-15T06:31:16 Student Learning Assessment and Support System developed by JHENG GAO has a Expo
CVE-2025-14696 5.3 0.03% 1 1 2025-12-15T03:30:22 A vulnerability was identified in Shenzhen Sixun Software Sixun Shanghui Group B
CVE-2025-67900 8.2 0.01% 2 0 2025-12-15T00:30:31 NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environmen
CVE-2025-67901 5.3 0.06% 1 0 2025-12-15T00:30:31 openrsync through 0.5.0, as used in OpenBSD through 7.8 and on other platforms,
CVE-2025-14667 7.3 0.03% 1 0 2025-12-14T18:31:34 A security vulnerability has been detected in itsourcecode COVID Tracking System
CVE-2025-14673 7.3 0.04% 1 0 2025-12-14T18:31:30 A vulnerability has been found in gmg137 snap7-rs up to 1.142.1. Affected is the
CVE-2025-14665 9.8 0.09% 1 0 2025-12-14T15:30:24 A security flaw has been discovered in Tenda WH450 1.0.0.18. Impacted is an unkn
CVE-2025-14655 8.8 0.05% 2 0 2025-12-14T12:32:35 A security flaw has been discovered in Tenda AC20 16.03.08.12. The impacted elem
CVE-2025-14654 8.8 0.05% 2 0 2025-12-14T12:32:35 A vulnerability was identified in Tenda AC20 16.03.08.12. The affected element i
CVE-2025-13832 None 0.00% 1 0 2025-12-14T00:30:28 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering
CVE-2025-14637 7.3 0.03% 1 0 2025-12-13T21:30:24 A weakness has been identified in itsourcecode Online Pet Shop Management System
CVE-2025-14622 7.3 0.03% 1 0 2025-12-13T18:30:31 A security flaw has been discovered in code-projects Student File Management Sys
CVE-2025-14621 7.3 0.03% 1 0 2025-12-13T18:30:31 A vulnerability was identified in code-projects Student File Management System 1
CVE-2025-67870 None 0.00% 1 0 2025-12-13T18:30:30 Rejected reason: Not used
CVE-2025-14588 7.3 0.03% 1 0 2025-12-13T18:30:30 A security flaw has been discovered in itsourcecode Student Management System 1.
CVE-2025-8687 6.4 0.03% 1 0 2025-12-13T18:30:30 The Enter Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripti
CVE-2025-36747 None 0.02% 1 0 2025-12-13T18:30:29 ShineLan-X contains a set of credentials for an FTP server was found within the
CVE-2025-12077 6.1 0.08% 1 0 2025-12-13T18:30:29 The WP to LinkedIn Auto Publish plugin for WordPress is vulnerable to Reflected
CVE-2025-10738 9.8 0.05% 1 0 2025-12-13T18:30:22 The URL Shortener Plugin For WordPress plugin for WordPress is vulnerable to SQL
CVE-2025-67871 0 0.00% 1 0 2025-12-13T16:16:55.233000 Rejected reason: Not used
CVE-2025-66430 9.1 0.03% 1 0 2025-12-12T21:32:45 Plesk 18.0 has Incorrect Access Control.
CVE-2025-13780 9.1 0.09% 1 4 2025-12-12T16:42:56 The PLAIN restore meta-command filter introduced in pgAdmin as part of the fix f
CVE-2025-66004 5.7 0.02% 1 0 2025-12-12T15:18:42.140000 A Path Traversal vulnerability in usbmuxd allows local users to escalate to the
CVE-2025-12105 7.5 0.05% 1 0 2025-12-12T00:30:20 A flaw was found in the asynchronous message queue handling of the libsoup libra
CVE-2025-58360 8.2 71.92% 1 4 template 2025-12-11T21:55:34 ## Description An XML External Entity (XXE) vulnerability was identified. The a
CVE-2025-64669 7.8 0.06% 1 0 2025-12-11T18:30:54 Improper access control in Windows Admin Center allows an authorized attacker to
CVE-2025-14321 9.8 0.06% 1 0 2025-12-11T18:30:41 Use-after-free in the WebRTC: Signaling component. This vulnerability affects Fi
CVE-2025-55182 10.0 76.01% 25 100 template 2025-12-10T02:00:02.557000 A pre-authentication remote code execution vulnerability exists in React Server
CVE-2025-59719 9.8 0.05% 4 0 2025-12-09T19:59:29.507000 An improper verification of cryptographic signature vulnerability in Fortinet Fo
CVE-2025-40800 7.4 0.02% 1 0 2025-12-09T18:30:43 A vulnerability has been identified in COMOS V10.6 (All versions), COMOS V10.6 (
CVE-2025-2296 None 0.16% 1 4 2025-12-09T18:30:42 EDK2 contains a vulnerability in BIOS where an attacker may cause “ Improper Inp
CVE-2025-66516 0 0.06% 2 3 2025-12-08T18:27:15.857000 Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1
CVE-2025-14104 6.1 0.01% 1 0 2025-12-05T18:31:18 A flaw was found in util-linux. This vulnerability allows a heap buffer overread
CVE-2025-34352 0 0.02% 3 0 2025-12-04T17:15:25.860000 JumpCloud Remote Assist for Windows versions prior to 0.317.0 include an uninsta
CVE-2025-13223 8.8 1.16% 4 0 2025-12-02T14:33:52.680000 Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed a remote a
CVE-2025-64446 9.8 88.85% 1 11 template 2025-11-19T15:32:36 A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1
CVE-2025-40300 None 0.06% 4 0 2025-11-17T18:30:25 In the Linux kernel, the following vulnerability has been resolved: x86/vmscape
CVE-2025-40780 8.6 0.03% 1 0 2025-11-04T22:16:11.920000 In specific circumstances, due to a weakness in the Pseudo Random Number Generat
CVE-2025-40018 None 0.03% 1 0 2025-10-29T15:31:53 In the Linux kernel, the following vulnerability has been resolved: ipvs: Defer
CVE-2025-24294 5.3 0.05% 1 0 2025-07-15T22:56:20 A denial of service vulnerability has been discovered in the resolv gem bundled
CVE-2023-52922 7.8 0.04% 1 0 2025-06-13T20:15:22.450000 In the Linux kernel, the following vulnerability has been resolved: can: bcm: F
CVE-2025-32210 6.5 0.04% 1 0 2025-04-11T15:39:52.920000 Missing Authorization vulnerability in CreativeMindsSolutions CM Registration an
CVE-2024-39432 8.3 1.07% 4 0 2024-09-30T18:12:04.437000 In UMTS RLC driver, there is a possible out of bounds read due to a missing boun
CVE-2025-14558 0 0.00% 1 0 N/A
CVE-2025-66478 0 0.00% 4 100 N/A
CVE-2025-14282 0 0.00% 1 0 N/A
CVE-2025-66039 0 0.09% 1 3 N/A
CVE-2025-67736 0 0.04% 1 0 N/A
CVE-2025-66449 0 0.06% 1 0 N/A
CVE-2025-67874 0 0.04% 1 0 N/A
CVE-2025-67751 0 0.02% 1 0 N/A
CVE-2025-59947 0 0.04% 2 0 N/A
CVE-2025-43529 0 0.00% 6 0 N/A

CVE-2025-14101
(7.1 HIGH)

EPSS: 0.00%

updated 2025-12-17T10:15:39.710000

1 posts

Authorization Bypass Through User-Controlled Key vulnerability in GG Soft Software Services Inc. PaperWork allows Exploitation of Trusted Identifiers.This issue affects PaperWork: from 5.2.0.9427 before 6.0.

offseq at 2025-12-17T09:34:16.970Z ##

⚠️ HIGH severity: CVE-2025-14101 affects GG Soft PaperWork ≤5.2.0.9427. Authorization bypass via user-controlled key risks trusted identifiers. Update to 6.0+ recommended. radar.offseq.com/threat/cve-20

##

CVE-2025-14399
(4.3 MEDIUM)

EPSS: 0.00%

updated 2025-12-17T09:30:32

1 posts

The Download Plugins and Themes in ZIP from Dashboard plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.9.6. This is due to missing or incorrect nonce validation on the download_plugin_bulk and download_theme_bulk functions. This makes it possible for unauthenticated attackers to archive all the sites plugins and themes and place them in the `

jos1264@social.skynetcloud.site at 2025-12-17T09:45:01.000Z ##

CVE-2025-14399 - Download Plugins and Themes from Dashboard <= 1.9.6 - Cross-Site Request Forgery to Bulk Plugin/Theme Archival cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12496
(4.9 MEDIUM)

EPSS: 0.00%

updated 2025-12-17T09:30:32

1 posts

The Zephyr Project Manager plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.3.203 via the `file` parameter. This makes it possible for authenticated attackers, with Custom-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. On a servers that have `allow_url_fopen` enabled, this issu

jos1264@social.skynetcloud.site at 2025-12-17T09:45:01.000Z ##

CVE-2025-12496 - Zephyr Project Manager <= 3.3.203 - Authenticated (Custom+) Arbitrary File Read And Server-Side Request Forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14817(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-17T09:30:32

2 posts

The component com.transsion.tranfacmode.entrance.main.MainActivity in com.transsion.tranfacmode has no permission control and can be accessed by third-party apps which can construct intents to directly open adb debugging functionality without user interaction.

jos1264@social.skynetcloud.site at 2025-12-17T09:45:01.000Z ##

CVE-2025-14817 - Factory Mode App Exists Privilege Escalation Issue Allowing Third-Party Apps to Open ADB cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-17T08:30:01.000Z ##

CVE-2025-14817 - Factory Mode App Exists Privilege Escalation Issue Allowing Third-Party Apps to Open ADB cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14061
(5.3 MEDIUM)

EPSS: 0.00%

updated 2025-12-17T09:30:32

1 posts

The Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker (for GDPR, CCPA & ePrivacy) : WP Cookie Consent plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the gdpr_delete_policy_data function in all versions up to, and including, 4.0.7. This makes it possible for unauthenticated attackers to permanently delete arbitrary

jos1264@social.skynetcloud.site at 2025-12-17T09:45:01.000Z ##

CVE-2025-14061 - Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker (for GDPR, CCPA & ePrivacy) : WP Cookie Consent <= 4.0.7 - Missing Authorization to Unauthenticated Arbitrary Post Deletion cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13750
(4.3 MEDIUM)

EPSS: 0.00%

updated 2025-12-17T09:30:32

1 posts

The Converter for Media – Optimize images | Convert WebP & AVIF plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `/webp-converter/v1/regenerate-attachment` REST endpoint in all versions up to, and including, 6.3.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete optimized WebP/AVIF

jos1264@social.skynetcloud.site at 2025-12-17T09:45:01.000Z ##

CVE-2025-13750 - Converter for Media <= 6.3.2 - Missing Authorization to Authenticated (Subscriber+) Optimized Image Deletion via regenerate-attachment REST Endpoint cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11924
(7.5 HIGH)

EPSS: 0.00%

updated 2025-12-17T07:15:57.750000

1 posts

The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.13.2. This is due to the plugin not properly verifying that a user is authorized before the `ninja-forms-views` REST endpoints return form metadata and submission content. This makes it possible for unauthenticated attackers to re

offseq at 2025-12-17T08:04:48.533Z ##

⚠️ HIGH severity: CVE-2025-11924 impacts Ninja Forms (WordPress), letting unauthenticated attackers access form data via REST API. Patch 3.13.1 is ineffective. Restrict API, audit tokens, and monitor logs. More info: radar.offseq.com/threat/cve-20

##

CVE-2025-13880
(6.5 MEDIUM)

EPSS: 0.00%

updated 2025-12-17T06:32:10

1 posts

The WP Social Ninja – Embed Social Feeds, Customer Reviews, Chat Widgets (Google Reviews, YouTube Feed, Photo Feeds, and More) plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the getAdvanceSettings and saveAdvanceSettings functions in all versions up to, and including, 4.0.1. This makes it possible for unauthenticated attacker

jos1264@social.skynetcloud.site at 2025-12-17T06:15:01.000Z ##

CVE-2025-13880 - WP Social Ninja - Embed Social Feeds, Customer Reviews, Chat Widgets (Google Reviews, YouTube Feed, Photo Feeds, and More) <= 4.0.1 - Missing Authorization to Unauthenticated Plugin's Settings Disclosure And Modification cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13861
(6.1 MEDIUM)

EPSS: 0.00%

updated 2025-12-17T06:32:10

1 posts

The HTML Forms – Simple WordPress Forms Plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting in all versions up to and including 1.6.0 due to insufficient sanitization of fabricated file upload field metadata before displaying it in the WordPress admin dashboard. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute

jos1264@social.skynetcloud.site at 2025-12-17T06:15:01.000Z ##

CVE-2025-13861 - HTML Forms – Simple WordPress Forms Plugin <= 1.6.0 - Unauthenticated Stored Cross-Site Scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11775(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-17T06:32:10

1 posts

An out-of-bounds read vulnerability has been identified in the asComSvc service. This vulnerability can be triggered by sending specially crafted requests, which may lead to a service crash or partial loss of functionality. This vulnerability only affects ASUS motherboard series products. Refer to the 'Security Update for Armoury Crate App' section on the ASUS Security Advisory for more informatio

jos1264@social.skynetcloud.site at 2025-12-17T06:15:01.000Z ##

CVE-2025-11775 - ASUS asComSvc Out-of-Bounds Read Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14385
(6.4 MEDIUM)

EPSS: 0.00%

updated 2025-12-17T06:32:09

1 posts

The WP Recipe Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'name' parameter in all versions up to, and including, 10.2.3 due to insufficient input sanitization and output escaping on user-supplied attributes in the wprm-recipe-roundup-item shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary w

jos1264@social.skynetcloud.site at 2025-12-17T06:15:01.000Z ##

CVE-2025-14385 - WP Recipe Maker <= 10.2.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14305
(7.8 HIGH)

EPSS: 0.00%

updated 2025-12-17T06:32:08

1 posts

ListCheck.exe developed by Acer has a Local Privilege Escalation vulnerability. Authenticated local attackers can replace ListCheck.exe with a malicious executable of the same name, which will be executed by the system and result in privilege escalation.

jos1264@social.skynetcloud.site at 2025-12-17T05:45:01.000Z ##

CVE-2025-14305 - Acer|ListCheck.exe - Local Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59374
(0 None)

EPSS: 0.00%

updated 2025-12-17T05:16:13.080000

3 posts

"UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected. The Live Update client has

offseq at 2025-12-17T05:05:12.408Z ##

🚨 CVE-2025-59374: CRITICAL supply chain compromise in ASUS Live Update (<3.6.6, EOS). Legacy devices face remote code execution risk. Inventory, isolate, and monitor now. No patches available. Info: radar.offseq.com/threat/cve-20

##

jos1264@social.skynetcloud.site at 2025-12-17T08:30:01.000Z ##

CVE-2025-59374 - "Asus Live Update Client Supply Chain Compromise" cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-17T06:15:01.000Z ##

CVE-2025-59374 - "Asus Live Update Client Supply Chain Compromise" cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-53524
(7.8 HIGH)

EPSS: 0.00%

updated 2025-12-17T03:30:19

2 posts

Fuji Electric Monitouch V-SFT-6 is vulnerable to an out-of-bounds write while processing a specially crafted project file, which may allow an attacker to execute arbitrary code.

jos1264@social.skynetcloud.site at 2025-12-17T03:30:01.000Z ##

CVE-2025-53524 - Fuji Electric Monitouch V-SFT-6 Out-of-bounds Write cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-17T03:15:01.000Z ##

CVE-2025-53524 - Fuji Electric Monitouch V-SFT-6 Out-of-bounds Write cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14701
(7.1 HIGH)

EPSS: 0.00%

updated 2025-12-17T03:30:19

1 posts

An input neutralization vulnerability in the Server MOTD component of Crafty Controller allows a remote, unauthenticated attacker to perform stored XSS via server MOTD modification.

jos1264@social.skynetcloud.site at 2025-12-17T03:15:01.000Z ##

CVE-2025-14701 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Crafty Controller cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11009
(5.1 MEDIUM)

EPSS: 0.00%

updated 2025-12-17T03:30:19

1 posts

Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GT Designer3 Version1 (GOT2000) all versions and Mitsubishi Electric GT Designer3 Version1 (GOT1000) all versions allows a local unauthenticated attacker to obtain plaintext credentials from the project file for GT Designer3. This could allow the attacker to operate illegally GOT2000 series or GOT1000 series by using t

jos1264@social.skynetcloud.site at 2025-12-17T03:15:01.000Z ##

CVE-2025-11009 - Information Disclosure Vulnerability in GT Designer3 cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14700
(9.9 CRITICAL)

EPSS: 0.00%

updated 2025-12-17T01:15:59.620000

3 posts

An input neutralization vulnerability in the Webhook Template component of Crafty Controller allows a remote, authenticated attacker to perform remote code execution via Server Side Template Injection.

offseq at 2025-12-17T01:34:20.492Z ##

🚨 CVE-2025-14700 (CRITICAL, CVSS 9.9) in Crafty Controller 4.6.1 enables authenticated RCE via SSTI in Webhook Template. Restrict access, monitor for suspicious activity, and prep for patches. Full details: radar.offseq.com/threat/cve-20

##

jos1264@social.skynetcloud.site at 2025-12-17T03:30:01.000Z ##

CVE-2025-14700 - Improper Neutralization of Special Elements Used in a Template Engine in Crafty Controller cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-17T03:15:01.000Z ##

CVE-2025-14700 - Improper Neutralization of Special Elements Used in a Template Engine in Crafty Controller cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14766(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-17T00:31:24

1 posts

Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

CVE-2025-64725(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-12-17T00:29:26

1 posts

### Impact It was possible to accept an invitation opened by a different Weblate user. ### Patches * https://github.com/WeblateOrg/weblate/pull/16913 ### Workarounds Users should avoid leaving Weblate sessions with an unattended opened invitation. ### References Thanks to Nahid0x for responsibly disclosing this vulnerability to Weblate.

jos1264@social.skynetcloud.site at 2025-12-15T22:30:02.000Z ##

CVE-2025-64725 - Weblate has improper validation upon invitation acceptance cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-54947(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-12-17T00:25:52

1 posts

In Apache StreamPark versions 2.0.0 through 2.1.7, a security vulnerability involving a hard-coded encryption key exists. This vulnerability occurs because the system uses a fixed, immutable key for encryption instead of dynamically generating or securely configuring the key. Attackers may obtain this key through reverse engineering or code analysis, potentially decrypting sensitive data or forgin

beyondmachines1@infosec.exchange at 2025-12-16T08:01:31.000Z ##

Apache StreamPark hard-coded encryption key exposes sensitive data to decryption attacks

Apache StreamPark versions 2.0.0 through 2.1.6 contain a critical vulnerability (CVE-2025-54947) caused by a hard-coded encryption key that attackers can extract through reverse engineering to decrypt sensitive data and forge encrypted content.

**If you're running Apache StreamPark, ensure these systems are isolated from the internet and accessible only from trusted networks, then plan an upgrade to version 2.1.7.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-68087
(5.4 MEDIUM)

EPSS: 0.02%

updated 2025-12-16T21:32:01

1 posts

Missing Authorization vulnerability in merkulove Modalier for Elementor modalier-elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Modalier for Elementor: from n/a through <= 1.0.6.

jos1264@social.skynetcloud.site at 2025-12-16T10:30:00.000Z ##

CVE-2025-68087 - WordPress Modalier for Elementor plugin <= 1.0.6 - Broken Access Control vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14646
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-16T21:32:01

1 posts

A security flaw has been discovered in code-projects Student File Management System 1.0. This impacts an unknown function of the file /admin/delete_student.php. The manipulation of the argument stud_id results in sql injection. The attack may be performed from remote. The exploit has been released to the public and may be exploited.

jos1264@social.skynetcloud.site at 2025-12-14T08:30:00.000Z ##

CVE-2025-14646 - code-projects Student File Management System delete_student.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14642
(4.7 MEDIUM)

EPSS: 0.03%

updated 2025-12-16T21:32:01

1 posts

A vulnerability has been found in code-projects Computer Laboratory System 1.0. Impacted is an unknown function of the file technical_staff_pic.php. Such manipulation of the argument image leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

jos1264@social.skynetcloud.site at 2025-12-14T04:45:01.000Z ##

CVE-2025-14642 - code-projects Computer Laboratory System technical_staff_pic.php unrestricted upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14653
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-16T21:32:00

1 posts

A vulnerability was determined in itsourcecode Student Management System 1.0. Impacted is an unknown function of the file /addrecord.php. This manipulation of the argument ID causes sql injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.

jos1264@social.skynetcloud.site at 2025-12-14T12:30:00.000Z ##

CVE-2025-14653 - itsourcecode Student Management System addrecord.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14623
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-16T21:31:59

1 posts

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

jos1264@social.skynetcloud.site at 2025-12-13T19:15:01.000Z ##

CVE-2025-14623 - code-projects Student File Management System update_student.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-37164
(10.0 CRITICAL)

EPSS: 0.00%

updated 2025-12-16T21:30:54

1 posts

A remote code execution issue exists in HPE OneView.

cR0w@infosec.exchange at 2025-12-16T16:55:54.000Z ##

Perfect 10 in HPE OneView with no description and the advisory behind a login? Must be good. Go hack that shit please. 🥳

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-14649
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-16T21:30:52

1 posts

A vulnerability was detected in itsourcecode Online Cake Ordering System 1.0. Affected by this issue is some unknown functionality of the file /cakeshop/supplier.php. Performing manipulation of the argument supplier results in sql injection. The attack can be initiated remotely. The exploit is now public and may be used.

jos1264@social.skynetcloud.site at 2025-12-14T08:30:01.000Z ##

CVE-2025-14649 - itsourcecode Online Cake Ordering System supplier.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14640
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-16T21:30:52

1 posts

A flaw has been found in code-projects Student File Management System 1.0. The affected element is an unknown function of the file /admin/save_student.php. Executing manipulation of the argument stud_no can lead to sql injection. The attack may be launched remotely. The exploit has been published and may be used.

jos1264@social.skynetcloud.site at 2025-12-14T04:45:00.000Z ##

CVE-2025-14640 - code-projects Student File Management System save_student.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14589
(6.3 MEDIUM)

EPSS: 0.03%

updated 2025-12-16T21:30:51

1 posts

A weakness has been identified in code-projects Prison Management System 2.0. This issue affects some unknown processing of the file /admin/search.php. Executing manipulation of the argument keyname can lead to sql injection. The attack may be performed from remote. The exploit has been made available to the public and could be exploited.

jos1264@social.skynetcloud.site at 2025-12-13T17:00:01.000Z ##

CVE-2025-14589 - "Code-Projects Prison Management System SQL Injection Vulnerability" cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65427
(6.5 MEDIUM)

EPSS: 0.00%

updated 2025-12-16T21:15:47.380000

1 posts

An issue was discovered in Dbit N300 T1 Pro Easy Setup Wireless Wi-Fi Router on firmware version V1.0.0 does not implement rate limiting to /api/login allowing attackers to brute force password enumerations.

1 repos

https://github.com/kirubel-cve/CVE-2025-65427

CVE-2025-46295
(9.8 CRITICAL)

EPSS: 0.00%

updated 2025-12-16T20:15:48.177000

1 posts

Apache Commons Text versions prior to 1.10.0 included interpolation features that could be abused when applications passed untrusted input into the text-substitution API. Because some interpolators could trigger actions like executing commands or accessing external resources, an attacker could potentially achieve remote code execution. This vulnerability has been fully addressed in FileMaker Serve

offseq at 2025-12-17T02:35:39.182Z ##

⚠️ CRITICAL: CVE-2025-46295 affects Claris FileMaker Server via Apache Commons Text <1.10.0, enabling RCE with untrusted input. Upgrade to 22.0.4+ ASAP and restrict access. Details: radar.offseq.com/threat/cve-20

##

CVE-2025-13888
(9.1 CRITICAL)

EPSS: 0.05%

updated 2025-12-16T20:11:05

1 posts

A flaw was found in OpenShift GitOps. Namespace admins can create ArgoCD Custom Resources (CRs) that trick the system into granting them elevated permissions in other namespaces, including privileged namespaces. An authenticated attacker can then use these elevated permissions to create privileged workloads that run on master nodes, effectively giving them root access to the entire cluster.

jos1264@social.skynetcloud.site at 2025-12-15T19:00:01.000Z ##

CVE-2025-13888 - Openshift-gitops-operator: openshift gitops: namespace admin cluster takeover via privileged jobs cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14645
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-16T20:07:17.483000

1 posts

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown function of the file /admin/delete_user.php. The manipulation of the argument user_id leads to sql injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

jos1264@social.skynetcloud.site at 2025-12-14T08:30:00.000Z ##

CVE-2025-14645 - code-projects Student File Management System delete_user.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14641
(4.7 MEDIUM)

EPSS: 0.03%

updated 2025-12-16T20:06:40.230000

1 posts

A flaw has been found in code-projects Computer Laboratory System 1.0. This issue affects some unknown processing of the file admin/admin_pic.php. This manipulation of the argument image causes unrestricted upload. The attack may be initiated remotely. The exploit has been published and may be used.

jos1264@social.skynetcloud.site at 2025-12-14T04:45:01.000Z ##

CVE-2025-14641 - code-projects Computer Laboratory System admin_pic.php unrestricted upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14590
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-16T19:53:27.180000

1 posts

A security vulnerability has been detected in code-projects Prison Management System 2.0. Impacted is an unknown function of the file /admin/search1.php. The manipulation of the argument keyname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.

jos1264@social.skynetcloud.site at 2025-12-13T17:00:01.000Z ##

CVE-2025-14590 - Code-projects Prison Management System SQL Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68130(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-16T19:37:58

1 posts

> Note that this vulnerability is only present when using `experimental_caller` / `experimental_nextAppDirCaller`. ## Summary A Prototype Pollution vulnerability exists in `@trpc/server`'s `formDataToObject` function, which is used by the Next.js App Router adapter. An attacker can pollute `Object.prototype` by submitting specially crafted FormData field names, potentially leading to authorizati

jos1264@social.skynetcloud.site at 2025-12-16T19:45:00.000Z ##

CVE-2025-68130 - tRPC has possible prototype pollution in `experimental_nextAppDirCaller` cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68270
(9.9 CRITICAL)

EPSS: 0.00%

updated 2025-12-16T19:16:00.720000

1 posts

The Open edX Platform is a learning management platform. Prior to commit 05d0d0936daf82c476617257aa6c35f0cd4ca060, CourseLimitedStaffRole users are able to access and edit courses in studio if they are granted the role on an org rather than on a course, and CourseLimitedStaffRole users are able to list courses they have the role on in studio even though they are not meant to have any access on the

offseq at 2025-12-17T00:04:02.452Z ##

🚨CRITICAL: CVE-2025-68270 hits Open edX edx-platform <05d0d09—org-level CourseLimitedStaffRole can access/edit courses in studio. Patch now or restrict access & audit roles. CVSS 9.9. Details: radar.offseq.com/threat/cve-20

##

CVE-2025-59718
(9.8 CRITICAL)

EPSS: 0.05%

updated 2025-12-16T19:15:57.863000

9 posts

A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7

1 repos

https://github.com/Ashwesker/Blackash-CVE-2025-59718

beyondmachines1 at 2025-12-17T10:01:31.960Z ##

CISA reports active exploitation of critical Fortinet authentication bypass flaw

CISA reports active exploitation of two critical Fortinet vulnerabilities (CVE-2025-59718 and CVE-2025-59719, CVSS 9.8) that allow unauthenticated attackers to bypass FortiCloud SSO authentication through flawed SAML signature verification. Exploitation began just three days after patches were released on December 12, 2025.

**Now it's urgent, because once again, your Fortinet products are being hacked. If you have Fortinet products, first make sure the management interface is isolated from the internet and accessible only from trusted networks. Then disable FortiCloud SSO login (in System -> Settings or use CLI command config system global set admin-forticloud-sso-login disable end) to prevent authentication bypass attacks. Finally, upgrade to the latest secure versions as soon as possible.**

beyondmachines.net/event_detai

##

DarkWebInformer at 2025-12-17T02:24:45.241Z ##

🚨 CISA has added 1 vulnerability to the KEV Catalog

CVE-2025-59718: Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability

CVSS: 9.8

darkwebinformer.com/cisa-kev-c

##

secdb at 2025-12-16T22:00:12.501Z ##

🚨 [CISA-2025:1216] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-59718 (secdb.nttzen.cloud/cve/detail/)
- Name: Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: Multiple Products
- Notes: fortiguard.fortinet.com/psirt/ ; docs.fortinet.com/upgrade-tool ; nvd.nist.gov/vuln/detail/CVE-2

##

beyondmachines1@infosec.exchange at 2025-12-17T10:01:31.000Z ##

CISA reports active exploitation of critical Fortinet authentication bypass flaw

CISA reports active exploitation of two critical Fortinet vulnerabilities (CVE-2025-59718 and CVE-2025-59719, CVSS 9.8) that allow unauthenticated attackers to bypass FortiCloud SSO authentication through flawed SAML signature verification. Exploitation began just three days after patches were released on December 12, 2025.

**Now it's urgent, because once again, your Fortinet products are being hacked. If you have Fortinet products, first make sure the management interface is isolated from the internet and accessible only from trusted networks. Then disable FortiCloud SSO login (in System -> Settings or use CLI command config system global set admin-forticloud-sso-login disable end) to prevent authentication bypass attacks. Finally, upgrade to the latest secure versions as soon as possible.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

DarkWebInformer@infosec.exchange at 2025-12-17T02:24:45.000Z ##

🚨 CISA has added 1 vulnerability to the KEV Catalog

CVE-2025-59718: Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability

CVSS: 9.8

darkwebinformer.com/cisa-kev-c

##

Andy_Thompson@infosec.exchange at 2025-12-16T19:49:52.000Z ##

Pornhub / Mixpanel
- bleepingcomputer.com/news/secu
- mixpanel.com/blog/sms-security
- techspot.com/news/107779-pornh
- securityaffairs.com/177881/dat

PDVSA Hacked
- bleepingcomputer.com/news/secu
- reuters.com/world/americas/cyb
- bloomberg.com/news/articles/20
- maritime-executive.com/article

Fortinet FortiCloud SSO auth bypass
- bleepingcomputer.com/news/secu
- arcticwolf.com/resources/blog/
- cyber.gov.au/about-us/view-all
- cyber.gc.ca/en/alerts-advisori
- thehackernews.com/2025/12/fort

##

AAKL@infosec.exchange at 2025-12-16T19:04:29.000Z ##

CISA has updated the KEV catalogue.

CVE-2025-59718: Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability cve.org/CVERecord?id=CVE-2025-

CISA Releases Seven Industrial Control Systems Advisories cisa.gov/news-events/alerts/20 #CISA #infosec #Fortinet

##

cisakevtracker@mastodon.social at 2025-12-16T19:00:56.000Z ##

CVE ID: CVE-2025-59718
Vendor: Fortinet
Product: Multiple Products
Date Added: 2025-12-16
Notes: fortiguard.fortinet.com/psirt/ ; docs.fortinet.com/upgrade-tool ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

cR0w@infosec.exchange at 2025-12-16T16:00:32.000Z ##

RE: infosec.exchange/@BleepingComp

Apparently CVE-2025-59718 and CVE-2025-59719 are now EITW.

##

CVE-2025-65781
(8.2 HIGH)

EPSS: 0.02%

updated 2025-12-16T18:32:38

1 posts

An issue was discovered in Wekan The Open Source kanban board system up to version 18.15, fixed in 18.16. Attachment upload API treats the Authorization bearer value as a userId and enters a non-terminating body-handling branch for any non-empty bearer token, enabling trivial application-layer DoS and latent identity-spoofing.

jos1264@social.skynetcloud.site at 2025-12-15T16:30:01.000Z ##

CVE-2025-65781 - Wekan Open Source Kanban Board System Bearer Token Abuse cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65778
(8.1 HIGH)

EPSS: 0.02%

updated 2025-12-16T18:32:38

1 posts

An issue was discovered in Wekan The Open Source kanban board system up to version 18.15, fixed in 18.16. Uploaded attachments can be served with attacker-controlled Content-Type (text/html), allowing execution of attacker-supplied HTML/JS in the application's origin and enabling session/token theft and CSRF actions.

CVE-2025-33225
(8.4 HIGH)

EPSS: 0.00%

updated 2025-12-16T18:31:43

2 posts

NVIDIA Resiliency Extension for Linux contains a vulnerability in log aggregation, where an attacker could cause predictable log-file names. A successful exploit of this vulnerability may lead to escalation of privileges, code execution, denial of service, information disclosure, and data tampering.

jos1264@social.skynetcloud.site at 2025-12-16T19:45:01.000Z ##

CVE-2025-33225 - NVIDIA Resiliency Extension for Linux Log File Name Prediction Vulnerability cvefeed.io/vuln/detail/CVE-202

##

AAKL@infosec.exchange at 2025-12-16T17:07:31.000Z ##

Nvidia has three security advisories today.

NVIDIA NeMo Framework: CVE-2025-33212 and CVE-2025-33226 nvidia.custhelp.com/app/answer

NVIDIA Isaac Lab: CVE-2025-32210 nvidia.custhelp.com/app/answer

NVIDIA Resiliency Extension: CVE-2025-33225 and CVE-2025-33235 nvidia.custhelp.com/app/answer #Nvidia #vulnerability #infosec

##

CVE-2025-33235
(7.8 HIGH)

EPSS: 0.00%

updated 2025-12-16T18:31:43

1 posts

NVIDIA Resiliency Extension for Linux contains a vulnerability in the checkpointing core, where an attacker may cause a race condition. A successful exploit of this vulnerability might lead to information disclosure, data tampering, denial of service, or escalation of privileges.

AAKL@infosec.exchange at 2025-12-16T17:07:31.000Z ##

Nvidia has three security advisories today.

NVIDIA NeMo Framework: CVE-2025-33212 and CVE-2025-33226 nvidia.custhelp.com/app/answer

NVIDIA Isaac Lab: CVE-2025-32210 nvidia.custhelp.com/app/answer

NVIDIA Resiliency Extension: CVE-2025-33225 and CVE-2025-33235 nvidia.custhelp.com/app/answer #Nvidia #vulnerability #infosec

##

CVE-2025-33226
(7.8 HIGH)

EPSS: 0.00%

updated 2025-12-16T18:31:43

1 posts

NVIDIA NeMo Framework for all platforms contains a vulnerability where malicious data created by an attacker may cause a code injection. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.

AAKL@infosec.exchange at 2025-12-16T17:07:31.000Z ##

Nvidia has three security advisories today.

NVIDIA NeMo Framework: CVE-2025-33212 and CVE-2025-33226 nvidia.custhelp.com/app/answer

NVIDIA Isaac Lab: CVE-2025-32210 nvidia.custhelp.com/app/answer

NVIDIA Resiliency Extension: CVE-2025-33225 and CVE-2025-33235 nvidia.custhelp.com/app/answer #Nvidia #vulnerability #infosec

##

CVE-2025-29231
(6.1 MEDIUM)

EPSS: 0.00%

updated 2025-12-16T18:31:43

1 posts

A stored cross-site scripting (XSS) vulnerability in the page_save component of Linksys E5600 V1.1.0.26 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the hostname and domainName parameters.

CVE-2025-50401(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-16T18:31:42

1 posts

Mercury D196G d196gv1-cn-up_2020-01-09_11.21.44 is vulnerable to Buffer Overflow in the function sub_404CAEDC via the parameter password.

CVE-2025-50398(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-16T18:31:42

1 posts

Mercury D196G d196gv1-cn-up_2020-01-09_11.21.44 is vulnerable to Buffer Overflow in the function sub_404CAEDC via the parameter fac_password.

CVE-2025-14432(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-16T18:31:33

1 posts

In limited scenarios, sensitive data might be written to the log file if an admin uses Microsoft Teams Admin Center (TAC) to make device configuration changes. The affected log file is visible only to users with admin credentials. This is limited to Microsoft TAC and does not affect configuration changes made using the provisioning server or the device WebUI.

jos1264@social.skynetcloud.site at 2025-12-16T17:15:01.000Z ##

CVE-2025-14432 - Poly Video - Sensitive Data Might Be Written to Log File cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-33212
(7.3 HIGH)

EPSS: 0.00%

updated 2025-12-16T18:16:11.340000

1 posts

NVIDIA NeMo Framework contains a vulnerability in model loading that could allow an attacker to exploit improper control mechanisms if a user loads a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, denial of service, and data tampering.

AAKL@infosec.exchange at 2025-12-16T17:07:31.000Z ##

Nvidia has three security advisories today.

NVIDIA NeMo Framework: CVE-2025-33212 and CVE-2025-33226 nvidia.custhelp.com/app/answer

NVIDIA Isaac Lab: CVE-2025-32210 nvidia.custhelp.com/app/answer

NVIDIA Resiliency Extension: CVE-2025-33225 and CVE-2025-33235 nvidia.custhelp.com/app/answer #Nvidia #vulnerability #infosec

##

CVE-2025-33210
(9.0 CRITICAL)

EPSS: 0.00%

updated 2025-12-16T18:16:11.163000

2 posts

NVIDIA Isaac Lab contains a deserialization vulnerability. A successful exploit of this vulnerability might lead to code execution.

offseq at 2025-12-17T04:03:37.704Z ##

🚨 CVE-2025-33210: CRITICAL deserialization flaw in NVIDIA Isaac Lab (<2.3.0). Remote code execution risk for robotics & AI. Patch when released, restrict network, validate inputs! radar.offseq.com/threat/cve-20

##

jos1264@social.skynetcloud.site at 2025-12-16T19:45:01.000Z ##

CVE-2025-33210 - NVIDIA Isaac Lab Deserialization Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2023-53900
(8.8 HIGH)

EPSS: 0.00%

updated 2025-12-16T18:16:07.063000

1 posts

Spip 4.1.10 contains a file upload vulnerability that allows attackers to upload malicious SVG files with embedded external links. Attackers can trick administrators into clicking a crafted SVG logo that redirects to a potentially dangerous URL through improper file upload filtering.

jos1264@social.skynetcloud.site at 2025-12-16T19:45:01.000Z ##

CVE-2023-53900 - Spip 4.1.10 Admin Account Spoofing via Malicious SVG Upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2023-53896
(7.5 HIGH)

EPSS: 0.00%

updated 2025-12-16T18:16:06.537000

2 posts

D-Link DAP-1325 firmware version 1.01 contains a broken access control vulnerability that allows unauthenticated attackers to download device configuration settings without authentication. Attackers can exploit the /cgi-bin/ExportSettings.sh endpoint to retrieve sensitive configuration information by directly accessing the export settings script.

CVE-2025-66388
(6.5 MEDIUM)

EPSS: 0.03%

updated 2025-12-16T17:50:23

1 posts

A vulnerability in Apache Airflow allowed authenticated UI users to view secret values in rendered templates due to secrets not being properly redacted, potentially exposing secrets to users without the appropriate authorization. Users are recommended to upgrade to version 3.1.4, which fixes this issue.

jos1264@social.skynetcloud.site at 2025-12-15T12:30:01.000Z ##

CVE-2025-66388 - Apache Airflow: Secrets in rendered templates not redacted properly and exposed in the UI cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68088
(5.4 MEDIUM)

EPSS: 0.02%

updated 2025-12-16T16:16:05.610000

1 posts

Missing Authorization vulnerability in merkulove Huger for Elementor huger-elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Huger for Elementor: from n/a through <= 1.1.5.

jos1264@social.skynetcloud.site at 2025-12-16T10:30:01.000Z ##

CVE-2025-68088 - WordPress Huger for Elementor plugin <= 1.1.5 - Broken Access Control vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-37731
(6.8 MEDIUM)

EPSS: 0.04%

updated 2025-12-16T15:52:25

1 posts

Improper Authentication in Elasticsearch PKI realm can lead to user impersonation via specially crafted client certificates. A malicious actor would need to have such a crafted client certificate signed by a legitimate, trusted Certificate Authority.

CVE-2025-14691
(4.3 MEDIUM)

EPSS: 0.09%

updated 2025-12-16T15:43:35

1 posts

A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. Users should upgrade the affected component. The vendor confirms that this

jos1264@social.skynetcloud.site at 2025-12-15T00:30:00.000Z ##

CVE-2025-14691 - Mayan EDMS authentication cross site scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-55895
(9.1 CRITICAL)

EPSS: 0.02%

updated 2025-12-16T15:31:39

3 posts

TOTOLINK A3300R V17.0.0cu.557_B20221024 and N200RE V9.3.5u.6448_B20240521 and V9.3.5u.6437_B20230519 are vulnerable to Incorrect Access Control. Attackers can send payloads to the interface without logging in (remote).

CVE-2025-14611
(9.8 CRITICAL)

EPSS: 17.48%

updated 2025-12-16T15:31:34

2 posts

Gladinet CentreStack and Triofox prior to version 16.12.10420.56791 used hardcoded values for their implementation of the AES cryptoscheme. This degrades security for public exposed endpoints that may make use of it and may offer arbitrary local file inclusion when provided a specially crafted request without authentication. This opens the door for future exploitation and can be leveraged with pre

DarkWebInformer@infosec.exchange at 2025-12-15T21:51:59.000Z ##

CISA KEV Catalog has added 2 more vulnerabilities

CVE-2025-14611: Gladinet CentreStack and Triofox Hard Coded Cryptographic Vulnerability

CVSS: 7.1

CVE-2025-43529: Apple Multiple Products Use-After-Free WebKit Vulnerability

darkwebinformer.com/cisa-kev-c

##

cisakevtracker@mastodon.social at 2025-12-15T19:01:03.000Z ##

CVE ID: CVE-2025-14611
Vendor: Gladinet
Product: CentreStack and Triofox
Date Added: 2025-12-15
Notes: centrestack.com/p/gce_latest_r ; access.triofox.com/releases_hi; support.centrestack.com/hc/en- ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-68265(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-16T15:30:56

1 posts

In the Linux kernel, the following vulnerability has been resolved: nvme: fix admin request_queue lifetime The namespaces can access the controller's admin request_queue, and stale references on the namespaces may exist after tearing down the controller. Ensure the admin request_queue is active by moving the controller's 'put' to after all controller references have been released to ensure no on

CVE-2025-68264(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-16T15:30:56

1 posts

In the Linux kernel, the following vulnerability has been resolved: ext4: refresh inline data size before write operations The cached ei->i_inline_size can become stale between the initial size check and when ext4_update_inline_data()/ext4_create_inline_data() use it. Although ext4_get_max_inline_size() reads the correct value at the time of the check, concurrent xattr operations can modify i_in

jos1264@social.skynetcloud.site at 2025-12-16T15:45:00.000Z ##

CVE-2025-68264 - ext4: refresh inline data size before write operations cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68281(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-16T15:30:55

1 posts

In the Linux kernel, the following vulnerability has been resolved: ASoC: SDCA: bug fix while parsing mipi-sdca-control-cn-list "struct sdca_control" declares "values" field as integer array. But the memory allocated to it is of char array. This causes crash for sdca_parse_function API. This patch addresses the issue by allocating correct data size.

jos1264@social.skynetcloud.site at 2025-12-16T15:45:01.000Z ##

CVE-2025-68281 - ASoC: SDCA: bug fix while parsing mipi-sdca-control-cn-list cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14443
(8.5 HIGH)

EPSS: 0.00%

updated 2025-12-16T15:30:47

1 posts

A flaw was found in ose-openshift-apiserver. This vulnerability allows internal network enumeration, service discovery, limited information disclosure, and potential denial-of-service (DoS) through Server-Side Request Forgery (SSRF) due to missing IP address and network-range validation when processing user-supplied image references.

jos1264@social.skynetcloud.site at 2025-12-16T14:30:00.000Z ##

CVE-2025-14443 - Ose-openshift-apiserver: openshift api server: server-side request forgery (ssrf) vulnerability in imagestreamimport mechanism cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68086
(5.4 MEDIUM)

EPSS: 0.02%

updated 2025-12-16T15:30:42

1 posts

Missing Authorization vulnerability in merkulove Reformer for Elementor reformer-elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Reformer for Elementor: from n/a through <= 1.0.6.

jos1264@social.skynetcloud.site at 2025-12-16T10:30:00.000Z ##

CVE-2025-68086 - WordPress Reformer for Elementor plugin <= 1.0.6 - Broken Access Control vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68266
(0 None)

EPSS: 0.00%

updated 2025-12-16T15:15:56.140000

1 posts

In the Linux kernel, the following vulnerability has been resolved: bfs: Reconstruct file type when loading from disk syzbot is reporting that S_IFMT bits of inode->i_mode can become bogus when the S_IFMT bits of the 32bits "mode" field loaded from disk are corrupted or when the 32bits "attributes" field loaded from disk are corrupted. A documentation says that BFS uses only lower 9 bits of the

jos1264@social.skynetcloud.site at 2025-12-16T15:45:01.000Z ##

CVE-2025-68266 - bfs: Reconstruct file type when loading from disk cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68263
(0 None)

EPSS: 0.00%

updated 2025-12-16T15:15:55.813000

1 posts

In the Linux kernel, the following vulnerability has been resolved: ksmbd: ipc: fix use-after-free in ipc_msg_send_request ipc_msg_send_request() waits for a generic netlink reply using an ipc_msg_table_entry on the stack. The generic netlink handler (handle_generic_event()/handle_response()) fills entry->response under ipc_msg_table_lock, but ipc_msg_send_request() used to validate and free ent

jos1264@social.skynetcloud.site at 2025-12-16T15:45:00.000Z ##

CVE-2025-68263 - ksmbd: ipc: fix use-after-free in ipc_msg_send_request cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65076
(0 None)

EPSS: 0.00%

updated 2025-12-16T14:10:11.300000

1 posts

WaveView client allows users to execute restricted set of predefined commands and scripts on the connected WaveStore Server. A malicious attacker with high-privileges is able to read or delete any file on the server using path traversal in the ilog script. This script is being run with root privileges. This issue was fixed in version 6.44.44

jos1264@social.skynetcloud.site at 2025-12-16T14:30:01.000Z ##

CVE-2025-65076 - Arbitrary File Read and Delete via Path Traversal in WaveStore Server cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65074
(0 None)

EPSS: 0.00%

updated 2025-12-16T14:10:11.300000

1 posts

WaveView client allows users to execute restricted set of predefined commands and scripts on the connected WaveStore Server. A malicious attacker with high-privileges is able to execute arbitrary OS commands on the server using path traversal in the showerr script. This issue was fixed in version 6.44.44

jos1264@social.skynetcloud.site at 2025-12-16T14:30:01.000Z ##

CVE-2025-65074 - OS Command Injection via Path Traversal in WaveStore Server cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-9455
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T14:10:11.300000

1 posts

A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

CVE-2025-9453
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T14:10:11.300000

1 posts

A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

CVE-2025-9460
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T14:10:11.300000

1 posts

A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

CVE-2025-10882
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T14:10:11.300000

1 posts

AA maliciously crafted X_T file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

CVE-2025-10881
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T14:10:11.300000

1 posts

A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk products, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

CVE-2025-10883
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T14:10:11.300000

1 posts

A maliciously crafted CATPRODUCT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

CVE-2025-10886
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T14:10:11.300000

1 posts

A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

CVE-2025-10900
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T14:10:11.300000

1 posts

AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

CVE-2025-61976
(7.5 HIGH)

EPSS: 0.15%

updated 2025-12-16T14:10:11.300000

2 posts

CHOCO TEI WATCHER mini (IB-MCT001) contains an issue with improper check for unusual or exceptional conditions. If a remote attacker sends a specially crafted request to the Video Download interface, the system may become unresponsive.

jos1264@social.skynetcloud.site at 2025-12-16T09:15:00.000Z ##

CVE-2025-61976 - CHOCO TEI WATCHER mini Denial of Service (DoS) cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-16T06:30:00.000Z ##

CVE-2025-61976 - CHOCO TEI WATCHER mini Denial of Service (DoS) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13794
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-12-16T14:10:11.300000

1 posts

The Auto Featured Image (Auto Post Thumbnail) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the bulk_action_generate_handler function in all versions up to, and including, 4.2.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete or generate featured images on posts they do not own.

jos1264@social.skynetcloud.site at 2025-12-16T06:30:01.000Z ##

CVE-2025-13794 - Auto Featured Image <= 4.2.1 - Missing Authorization to Authenticated (Contributor+) Post Thumbnail Modification cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59385
(0 None)

EPSS: 0.27%

updated 2025-12-16T14:10:11.300000

1 posts

An authentication bypass by spoofing vulnerability has been reported to affect several QNAP operating system versions. The remote attackers can then exploit the vulnerability to access resources which are not otherwise accessible without proper authentication. We have already fixed the vulnerability in the following versions: QTS 5.2.7.3297 build 20251024 and later QuTS hero h5.2.7.3297 build 202

CVE-2025-67744
(9.6 CRITICAL)

EPSS: 0.15%

updated 2025-12-16T14:10:11.300000

1 posts

DeepChat is an open-source artificial intelligence agent platform that unifies models, tools, and agents. Prior to version 0.5.3, a security vulnerability exists in the Mermaid diagram rendering component that allows arbitrary JavaScript execution. Due to the exposure of the Electron IPC renderer to the DOM, this Cross-Site Scripting (XSS) flaw escalates to full Remote Code Execution (RCE), allowi

jos1264@social.skynetcloud.site at 2025-12-16T05:00:01.000Z ##

CVE-2025-67744 - Mermaid XSS vulnerability leads to Remote Code Execution cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68115
(0 None)

EPSS: 0.04%

updated 2025-12-16T14:10:11.300000

1 posts

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In versions prior to 8.6.1 and 9.1.0-alpha.3, a Reflected Cross-Site Scripting (XSS) vulnerability exists in Parse Server's password reset and email verification HTML pages. The patch, available in versions 8.6.1 and 9.1.0-alpha.3, escapes user controlled values that are inserted into the HTML p

jos1264@social.skynetcloud.site at 2025-12-16T02:30:01.000Z ##

CVE-2025-68115 - Parse Server vulnerable to Cross-Site Scripting (XSS) via Unescaped Mustache Template Variables cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67748
(0 None)

EPSS: 0.02%

updated 2025-12-16T14:10:11.300000

1 posts

Fickling is a Python pickling decompiler and static analyzer. Versions prior to 0.1.6 had a bypass caused by `pty` missing from the block list of unsafe module imports. This led to unsafe pickles based on `pty.spawn()` being incorrectly flagged as `LIKELY_SAFE`, and was fixed in version 0.1.6. This impacted any user or system that used Fickling to vet pickle files for security issues.

jos1264@social.skynetcloud.site at 2025-12-16T02:30:00.000Z ##

CVE-2025-67748 - Fickling has Code Injection vulnerability via pty.spawn() cvefeed.io/vuln/detail/CVE-202

##

CVE-2023-53889
(0 None)

EPSS: 0.34%

updated 2025-12-16T14:10:11.300000

1 posts

Perch CMS 3.2 contains a remote code execution vulnerability that allows authenticated administrators to upload arbitrary PHP files through the assets management interface. Attackers can upload a malicious .phar file with embedded system command execution capabilities to execute arbitrary commands on the server.

jos1264@social.skynetcloud.site at 2025-12-16T01:00:01.000Z ##

CVE-2023-53889 - Perch CMS 3.2 Remote Code Execution via Unrestricted File Upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2023-53892
(0 None)

EPSS: 0.27%

updated 2025-12-16T14:10:11.300000

1 posts

Blackcat CMS 1.4 contains a remote code execution vulnerability that allows authenticated administrators to upload malicious PHP files through the jquery plugin manager. Attackers can upload a zip file with a PHP shell script and execute arbitrary system commands by accessing the uploaded plugin's PHP file with a 'code' parameter.

jos1264@social.skynetcloud.site at 2025-12-15T22:45:01.000Z ##

CVE-2023-53892 - Blackcat CMS 1.4 Remote Code Execution via Jquery Plugin Manager cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14722
(2.4 LOW)

EPSS: 0.03%

updated 2025-12-16T14:10:11.300000

1 posts

A vulnerability was determined in vion707 DMadmin up to 3403cafdb42537a648c30bf8cbc8148ec60437d1. This impacts the function Add of the file Admin/Controller/AddonsController.class.php of the component Backend. Executing manipulation can lead to cross site scripting. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. This product implements a rolling r

jos1264@social.skynetcloud.site at 2025-12-15T22:30:01.000Z ##

CVE-2025-14722 - vion707 DMadmin Backend AddonsController.class.php add cross site scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14002
(8.1 HIGH)

EPSS: 0.10%

updated 2025-12-16T12:30:37

1 posts

The WPCOM Member plugin for WordPress is vulnerable to authentication bypass via brute force in all versions up to, and including, 1.7.16. This is due to weak OTP (One-Time Password) generation using only 6 numeric digits combined with a 10-minute validity window and no rate limiting on verification attempts. This makes it possible for unauthenticated attackers to brute-force the verification code

jos1264@social.skynetcloud.site at 2025-12-16T14:30:00.000Z ##

CVE-2025-14002 - WPCOM Member <= 1.7.16 - Authentication Bypass via Weak OTP cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11393
(8.7 HIGH)

EPSS: 0.01%

updated 2025-12-16T10:15:42.090000

1 posts

A flaw was found in runtimes-inventory-rhel8-operator. An internal proxy component is incorrectly configured. Because of this flaw, the proxy attaches the cluster's main administrative credentials to any command it receives, instead of only the specific reports it is supposed to handle. This allows a standard user within the cluster to send unauthorized commands to the management platform, effect

jos1264@social.skynetcloud.site at 2025-12-15T19:00:02.000Z ##

CVE-2025-11393 - Insights-runtimes-tech-preview/runtimes-inventory-rhel8-operator: improper proxy configuration allows unauthorized administrative commands cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13439
(5.9 MEDIUM)

EPSS: 0.03%

updated 2025-12-16T09:31:16

1 posts

The Fancy Product Designer plugin for WordPress is vulnerable to Information Disclosure in all versions up to, and including, 6.4.8. This is due to insufficient validation of user-supplied input in the 'url' parameter of the fpd_custom_uplod_file AJAX action, which flows directly into the getimagesize() function without sanitization. While direct exploitation via PHP filter chains is blocked on PH

jos1264@social.skynetcloud.site at 2025-12-16T10:30:01.000Z ##

CVE-2025-13439 - Fancy Product Designer | WooCommerce WordPress <= 6.4.8 - Unauthenticated Information Disclosure via 'url' Parameter cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11991
(5.3 MEDIUM)

EPSS: 0.05%

updated 2025-12-16T09:31:16

1 posts

The JetFormBuilder — Dynamic Blocks Form Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the run_callback function in all versions up to, and including, 3.5.3. This makes it possible for unauthenticated attackers to generate forms using AI, consuming site's AI usage limits.

jos1264@social.skynetcloud.site at 2025-12-16T10:30:01.000Z ##

CVE-2025-11991 - JetFormBuilder <= 3.5.3 - Missing Authorization to Unauthenticated Form Generation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66635
(7.2 HIGH)

EPSS: 0.08%

updated 2025-12-16T09:31:16

1 posts

Stack-based buffer overflow vulnerability exists in SEIKO EPSON Web Config. Specially crafted data input by a logged-in user may execute arbitrary code. As for the details of the affected products and versions, see the information provided by the vendor under [References].

jos1264@social.skynetcloud.site at 2025-12-16T09:15:00.000Z ##

CVE-2025-66635 - Seiko Epson Web Config Stack-based Buffer Overflow Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14252
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T06:30:30

2 posts

An Improper Access Control vulnerability in Advantech SUSI driver (susi.sys) allows attackers to read/write arbitrary memory, I/O ports, and MSRs, resulting in privilege escalation, arbitrary code execution, and information disclosure. This issue affects Advantech SUSI: 5.0.24335 and prior.

jos1264@social.skynetcloud.site at 2025-12-16T17:15:01.000Z ##

CVE-2025-14252 - Advantech SUSI Improper Access Control Vulnerability cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-16T06:30:01.000Z ##

CVE-2025-14252 - Advantech SUSI Improper Access Control Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12809
(5.3 MEDIUM)

EPSS: 0.05%

updated 2025-12-16T06:30:20

1 posts

The Dokan Pro plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the `/dokan/v1/wholesale/register` REST API endpoint in all versions up to, and including, 4.1.3. This makes it possible for unauthenticated attackers to enumerate users and retrieve their email addresses via the REST API by providing a user ID, along with other information such as

jos1264@social.skynetcloud.site at 2025-12-16T06:30:01.000Z ##

CVE-2025-12809 - dokan pro <= 4.1.3 - Missing Authorization to Unauthenticated Sensitive Information Exposure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66357
(5.3 MEDIUM)

EPSS: 0.04%

updated 2025-12-16T06:30:20

1 posts

CHOCO TEI WATCHER mini (IB-MCT001) contains an issue with improper check for unusual or exceptional conditions. When the Video Download feature is in a specific communication state, the product's resources may be consumed abnormally.

CVE-2025-62848(CVSS UNKNOWN)

EPSS: 0.15%

updated 2025-12-16T03:31:22

1 posts

A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. The remote attackers can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.7.3297 build 20251024 and later QuTS hero h5.2.7.3297 build 20251024 and later QuTS hero h5.3.1.3292 build 20251024

CVE-2025-14674
(6.3 MEDIUM)

EPSS: 0.05%

updated 2025-12-16T00:45:19

1 posts

A vulnerability was found in aizuda snail-job up to 1.6.0. Affected by this vulnerability is the function QLExpressEngine.doEval of the file snail-job-common/snail-job-common-core/src/main/java/com/aizuda/snailjob/common/core/expression/strategy/QLExpressEngine.java. The manipulation results in injection. The attack can be launched remotely. Upgrading to version 1.7.0-beta1 addresses this issue. T

jos1264@social.skynetcloud.site at 2025-12-14T20:30:01.000Z ##

CVE-2025-14674 - aizuda snail-job QLExpressEngine.java QLExpressEngine.doEval injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-68113
(6.5 MEDIUM)

EPSS: 0.04%

updated 2025-12-16T00:43:54

1 posts

### Impact A cryptographic semantic binding flaw in ALTCHA libraries allows challenge payload splicing, which may enable replay attacks. The HMAC signature does not unambiguously bind challenge parameters to the nonce, allowing an attacker to reinterpret a valid proof-of-work submission with a modified expiration value. This may allow previously solved challenges to be reused beyond their intende

jos1264@social.skynetcloud.site at 2025-12-16T02:30:01.000Z ##

CVE-2025-68113 - ALTCHA Proof-of-Work Vulnerable to Challenge Splicing and Replay cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-9452
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T00:30:37

1 posts

A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

CVE-2025-9454
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T00:30:36

1 posts

A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

CVE-2025-14731
(6.3 MEDIUM)

EPSS: 0.05%

updated 2025-12-16T00:30:36

1 posts

A weakness has been identified in CTCMS Content Management System up to 2.1.2. This affects an unknown function in the library /ctcms/apps/libraries/CT_Parser.php of the component Frontend/Template Management Module. This manipulation causes improper neutralization of special elements used in a template engine. The attack is possible to be carried out remotely. The exploit has been made available

CVE-2025-14593
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T00:30:36

1 posts

A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

CVE-2025-9457
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T00:30:36

1 posts

A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

CVE-2025-9459
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T00:30:36

1 posts

A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.

CVE-2025-9456
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T00:30:36

1 posts

A maliciously crafted SLDPRT file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

CVE-2025-10888
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T00:30:36

1 posts

AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

CVE-2025-10887
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T00:30:36

1 posts

A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

CVE-2025-10884
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T00:30:36

1 posts

AA maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

CVE-2025-10898
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T00:30:36

1 posts

AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

CVE-2025-10899
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T00:30:36

1 posts

AA maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.

CVE-2025-10889
(7.8 HIGH)

EPSS: 0.01%

updated 2025-12-16T00:30:36

1 posts

A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force a Memory corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.

CVE-2025-9121
(8.8 HIGH)

EPSS: 0.05%

updated 2025-12-16T00:30:30

1 posts

Pentaho Data Integration and Analytics Community Dashboard Editor plugin versions before 10.2.0.4, including 9.3.0.x and 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods.

jos1264@social.skynetcloud.site at 2025-12-16T01:00:02.000Z ##

CVE-2025-9121 - Hitachi Vantara Pentaho Business Analytics Server - Deserialization of Untrusted Data cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67735
(6.5 MEDIUM)

EPSS: 0.04%

updated 2025-12-15T23:28:50

1 posts

### Summary The `io.netty.handler.codec.http.HttpRequestEncoder` CRLF injection with the request uri when constructing a request. This leads to request smuggling when `HttpRequestEncoder` is used without proper sanitization of the uri. ### Details The `HttpRequestEncoder` simply UTF8 encodes the `uri` without sanitization (`buf.writeByte(SP).writeCharSequence(uriCharSequence, CharsetUtil.UTF_8)

chrisvest@mastodon.social at 2025-12-15T17:54:57.000Z ##

We've released Netty 4.2.9 and 4.1.130.

They fix CVE-2025-67735 (github.com/netty/netty/securit), which is a line break injection vulnerability when encoding HTTP request objects.

The fix introduced a regression we had to fix as well, so versions 4.2.8 and 4.1.129 are skipped.

netty.io/news/2025/12/15/4-2-9
netty.io/news/2025/12/15/4-2-8
netty.io/news/2025/12/15/4-1-1
netty.io/news/2025/12/15/4-1-1

#netty #java

##

CVE-2025-67899
(2.9 LOW)

EPSS: 0.01%

updated 2025-12-15T23:15:57.293000

1 posts

uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.

jos1264@social.skynetcloud.site at 2025-12-15T00:30:01.000Z ##

CVE-2025-67899 - Uriparser Unbounded Recursion Stack Consumption Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2023-53888(CVSS UNKNOWN)

EPSS: 0.30%

updated 2025-12-15T21:30:45

1 posts

Zomplog 3.9 contains a remote code execution vulnerability that allows authenticated attackers to inject and execute arbitrary PHP code through file manipulation endpoints. Attackers can upload malicious JavaScript files, rename them to PHP, and execute system commands by exploiting the saveE and rename actions in the application.

jos1264@social.skynetcloud.site at 2025-12-16T01:00:01.000Z ##

CVE-2023-53888 - Zomplog 3.9 Remote Code Execution via Authenticated File Manipulation cvefeed.io/vuln/detail/CVE-202

##

CVE-2023-53885(CVSS UNKNOWN)

EPSS: 0.30%

updated 2025-12-15T21:30:44

1 posts

Webutler v3.2 contains a remote code execution vulnerability that allows authenticated administrators to upload PHP files with system command execution. Attackers can upload a PHAR file with embedded system commands to the media browser and execute arbitrary commands by accessing the uploaded file.

jos1264@social.skynetcloud.site at 2025-12-16T01:00:01.000Z ##

CVE-2023-53885 - Webutler v3.2 Remote Code Execution via Arbitrary File Upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2023-53881(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-12-15T21:30:44

1 posts

ReyeeOS 1.204.1614 contains an unencrypted CWMP communication vulnerability that allows attackers to intercept and manipulate device communication through a man-in-the-middle attack. Attackers can create a fake CWMP server to inject and execute arbitrary commands on Ruijie Reyee Cloud devices by exploiting the unprotected HTTP polling requests.

jos1264@social.skynetcloud.site at 2025-12-15T22:45:01.000Z ##

CVE-2023-53881 - ReyeeOS 1.204.1614 Man-in-the-Middle Remote Code Execution via CWMP cvefeed.io/vuln/detail/CVE-202

##

CVE-2023-53877(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-12-15T21:30:44

1 posts

Bus Reservation System 1.1 contains a SQL injection vulnerability in the pickup_id parameter that allows attackers to manipulate database queries. Attackers can exploit boolean-based, error-based, and time-based blind SQL injection techniques to steal information from the database.

jos1264@social.skynetcloud.site at 2025-12-15T22:45:01.000Z ##

CVE-2023-53877 - Bus Reservation System 1.1 Multiple SQL Injection via pickup_id Parameter cvefeed.io/vuln/detail/CVE-202

##

CVE-2023-53893(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-12-15T21:30:44

1 posts

Ateme TITAN File 3.9.12.4 contains an authenticated server-side request forgery vulnerability in the job callback URL parameter that allows attackers to bypass network restrictions. Attackers can exploit the unvalidated parameter to initiate file, service, and network enumeration by forcing the application to make HTTP, DNS, or file requests to arbitrary destinations.

jos1264@social.skynetcloud.site at 2025-12-15T22:30:01.000Z ##

CVE-2023-53893 - Ateme TITAN File 3.9 Authenticated Server-Side Request Forgery Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67809
(4.7 MEDIUM)

EPSS: 0.03%

updated 2025-12-15T21:30:39

1 posts

An issue was discovered in Zimbra Collaboration (ZCS) 10.0 and 10.1. A hardcoded Flickr API key and secret are present in the publicly accessible Flickr Zimlet used by Zimbra Collaboration. Because these credentials are embedded directly in the Zimlet, any unauthorized party could retrieve them and misuse the Flickr integration. An attacker with access to the exposed credentials could impersonate

cR0w@infosec.exchange at 2025-12-15T19:56:21.000Z ##

Oh that could be fun.

cve.org/CVERecord?id=CVE-2025-

An issue was discovered in Zimbra Collaboration (ZCS) 10.0 and 10.1. A hardcoded Flickr API key and secret are present in the publicly accessible Flickr Zimlet used by Zimbra Collaboration. Because these credentials are embedded directly in the Zimlet, any unauthorized party could retrieve them and misuse the Flickr integration. An attacker with access to the exposed credentials could impersonate the legitimate application and initiate valid Flickr OAuth flows. If a user is tricked into approving such a request, the attacker could gain access to the user s Flickr data. The hardcoded credentials have since been removed from the Zimlet code, and the associated key has been revoked.

##

CVE-2025-14023
(3.1 LOW)

EPSS: 0.03%

updated 2025-12-15T19:16:02.593000

1 posts

LINE client for iOS prior to 15.19 allows UI spoofing due to inconsistencies between the navigation state and the in-app browser's user interface, which could create confusion about the trust context of displayed pages or interactive elements under specific conditions.

CVE-2025-60786
(8.8 HIGH)

EPSS: 0.07%

updated 2025-12-15T18:30:45

1 posts

A Zip Slip vulnerability in the import a Project component of iceScrum v7.54 Pro On-prem allows attackers to execute arbitrary code via uploading a crafted Zip file.

jos1264@social.skynetcloud.site at 2025-12-15T19:00:01.000Z ##

CVE-2025-60786 - IceScrum Zip Slip Arbitrary Code Execution cvefeed.io/vuln/detail/CVE-202

##

CVE-2024-44599
(8.3 HIGH)

EPSS: 0.04%

updated 2025-12-15T18:30:45

1 posts

FNT Command 13.4.0 is vulnerable to Directory Traversal.

jos1264@social.skynetcloud.site at 2025-12-15T19:00:01.000Z ##

CVE-2024-44599 - FNT Command Directory Traversal Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13824
(0 None)

EPSS: 0.04%

updated 2025-12-15T18:22:13.783000

1 posts

A security issue exists due to improper handling of malformed CIP packets during fuzzing. The controller enters a hard fault with solid red Fault LED and becomes unresponsive. Upon power cycle, the controller will enter recoverable fault where the MS LED and Fault LED become flashing red and reports fault code 0xF019. To recover, clear the fault.

jos1264@social.skynetcloud.site at 2025-12-15T19:00:01.000Z ##

CVE-2025-13824 - Micro820®, Micro850®, Micro870® – Specialized Fuzzing Vulnerabilities cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65782
(0 None)

EPSS: 0.02%

updated 2025-12-15T18:22:13.783000

1 posts

An issue was discovered in Wekan The Open Source kanban board system up to version 18.15, fixed in 18.16. Authorization flaw in card update handling allows board members (and potentially other authenticated users) to add/remove arbitrary user IDs in vote.positive / vote.negative arrays, enabling vote forgery and unauthorized voting.

jos1264@social.skynetcloud.site at 2025-12-15T16:30:02.000Z ##

CVE-2025-65782 - Wekan Authorization Bypass Vote Forgery Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65780
(0 None)

EPSS: 0.02%

updated 2025-12-15T18:22:13.783000

1 posts

An issue was discovered in Wekan The Open Source kanban board system up to version 18.15, fixed in 18.16. Authenticated users can update their entire user document (beyond profile fields), including orgs/teams and loginDisabled, due to missing server-side authorization checks; this enables privilege escalation and unauthorized access to other teams/orgs.

jos1264@social.skynetcloud.site at 2025-12-15T16:30:01.000Z ##

CVE-2025-65780 - Wekan Privilege Escalation Unauthorized Access Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-37732
(5.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-15T18:22:13.783000

1 posts

Improper neutralization of input during web page generation ('Cross-site Scripting') (CWE-79) allows an authenticated user to render HTML tags within a user’s browser via the integration package upload functionality. This issue is related to ESA-2025-17 (CVE-2025-25018) bypassing that fix to achieve HTML injection.

jos1264@social.skynetcloud.site at 2025-12-15T12:30:01.000Z ##

CVE-2025-37732 - Kibana Cross-site Scripting via the Integration Package Upload Functionality cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14708
(9.8 CRITICAL)

EPSS: 0.04%

updated 2025-12-15T18:22:13.783000

1 posts

A weakness has been identified in Shiguangwu sgwbox N3 2.0.25. Affected by this vulnerability is an unknown functionality of the file /usr/sbin/http_eshell_server of the component WIREDCFGGET Interface. Executing manipulation of the argument params can lead to buffer overflow. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. The vendor

jos1264@social.skynetcloud.site at 2025-12-15T09:00:01.000Z ##

CVE-2025-14708 - Shiguangwu sgwbox N3 WIREDCFGGET http_eshell_server buffer overflow cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14695
(6.3 MEDIUM)

EPSS: 0.04%

updated 2025-12-15T18:22:13.783000

1 posts

A vulnerability was determined in SamuNatsu HaloBot up to 026b01d4a896d93eaaf9d5163a287dc9f267515b. Affected is the function html_renderer of the file plugins/html_renderer/index.js of the component Inter-plugin API. Executing manipulation of the argument action can lead to dynamically-managed code resources. The attack can be launched remotely. The exploit has been publicly disclosed and may be u

jos1264@social.skynetcloud.site at 2025-12-15T04:15:01.000Z ##

CVE-2025-14695 - SamuNatsu HaloBot Inter-plugin API index.js html_renderer dynamically-managed code resources cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14692
(4.3 MEDIUM)

EPSS: 0.10%

updated 2025-12-15T18:22:13.783000

1 posts

A flaw has been found in Mayan EDMS up to 4.10.1. The impacted element is an unknown function of the file /authentication/. This manipulation causes open redirect. It is possible to initiate the attack remotely. The exploit has been published and may be used. Upgrading to version 4.10.2 is sufficient to resolve this issue. The affected component should be upgraded. The vendor confirms that this is

CVE-2025-14672
(7.3 HIGH)

EPSS: 0.04%

updated 2025-12-15T18:22:13.783000

1 posts

A flaw has been found in gmg137 snap7-rs up to 1.142.1. This impacts the function TSnap7MicroClient::opWriteArea of the file s7_micro_client.cpp. Executing manipulation can lead to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.

jos1264@social.skynetcloud.site at 2025-12-14T20:30:01.000Z ##

CVE-2025-14672 - gmg137 snap7-rs s7_micro_client.cpp opWriteArea heap-based overflow cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14668
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-15T18:22:13.783000

1 posts

A vulnerability was detected in campcodes Advanced Online Examination System 1.0. This affects an unknown function of the file /query/loginExe.php. Performing manipulation of the argument Username results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.

jos1264@social.skynetcloud.site at 2025-12-14T20:30:01.000Z ##

CVE-2025-14668 - campcodes Advanced Online Examination System loginExe.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14656
(8.8 HIGH)

EPSS: 0.05%

updated 2025-12-15T18:22:13.783000

2 posts

A weakness has been identified in Tenda AC20 16.03.08.12. This affects the function httpd of the file /goform/openSchedWifi. Executing manipulation of the argument schedStartTime/schedEndTime can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be exploited.

jos1264@social.skynetcloud.site at 2025-12-14T14:00:01.000Z ##

CVE-2025-14656 - Tenda AC20 openSchedWifi httpd buffer overflow cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-14T12:30:01.000Z ##

CVE-2025-14656 - Tenda AC20 openSchedWifi httpd buffer overflow cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14659
(8.8 HIGH)

EPSS: 0.18%

updated 2025-12-15T18:22:13.783000

1 posts

A vulnerability was detected in D-Link DIR-860LB1 and DIR-868LB1 203b01/203b03. Affected is an unknown function of the component DHCP Daemon. The manipulation of the argument Hostname results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used.

jos1264@social.skynetcloud.site at 2025-12-14T12:30:01.000Z ##

CVE-2025-14659 - D-Link DIR-860LB1/DIR-868LB1 DHCP command injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14648
(4.7 MEDIUM)

EPSS: 0.23%

updated 2025-12-15T18:22:13.783000

1 posts

A security vulnerability has been detected in DedeBIZ up to 6.5.9. Affected by this vulnerability is an unknown functionality of the file /src/admin/catalog_add.php. Such manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

jos1264@social.skynetcloud.site at 2025-12-14T08:30:01.000Z ##

CVE-2025-14648 - DedeBIZ catalog_add.php command injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14647
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-15T18:22:13.783000

1 posts

A weakness has been identified in code-projects Computer Book Store 1.0. Affected is an unknown function of the file /admin_delete.php. This manipulation of the argument bookisbn causes sql injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

jos1264@social.skynetcloud.site at 2025-12-14T08:30:01.000Z ##

CVE-2025-14647 - code-projects Computer Book Store admin_delete.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14644
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-15T18:22:13.783000

1 posts

A vulnerability was determined in itsourcecode Student Management System 1.0. The impacted element is an unknown function of the file /update_subject.php. Executing manipulation of the argument ID can lead to sql injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

jos1264@social.skynetcloud.site at 2025-12-14T04:45:01.000Z ##

CVE-2025-14644 - itsourcecode Student Management System update_subject.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14643
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-15T18:22:13.783000

1 posts

A vulnerability was found in code-projects Simple Attendance Record System 2.0. The affected element is an unknown function of the file /check.php. Performing manipulation of the argument student results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

jos1264@social.skynetcloud.site at 2025-12-14T04:45:00.000Z ##

CVE-2025-14643 - code-projects Simple Attendance Record System check.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14636
(3.7 LOW)

EPSS: 0.02%

updated 2025-12-15T18:22:13.783000

1 posts

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

CVE-2025-14606
(5.0 MEDIUM)

EPSS: 0.04%

updated 2025-12-15T18:22:13.783000

1 posts

A security vulnerability has been detected in tiny-rdm Tiny RDM up to 1.2.5. Affected by this vulnerability is the function pickle.loads of the file pickle_convert.go of the component Pickle Decoding. The manipulation leads to deserialization. The attack can be initiated remotely. A high degree of complexity is needed for the attack. The exploitation appears to be difficult. The exploit has been d

jos1264@social.skynetcloud.site at 2025-12-13T17:00:01.000Z ##

CVE-2025-14606 - "Tiny RDM Pickle Decoding Remote Deserialization Vulnerability" cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14607
(6.3 MEDIUM)

EPSS: 0.05%

updated 2025-12-15T18:22:13.783000

1 posts

A vulnerability was detected in OFFIS DCMTK up to 3.6.9. Affected by this issue is the function DcmByteString::makeDicomByteString of the file dcmdata/libsrc/dcbytstr.cc of the component dcmdata. The manipulation results in memory corruption. The attack can be launched remotely. Upgrading to version 3.7.0 can resolve this issue. The patch is identified as 4c0e5c10079392c594d6a7abd95dd78ac0aa556a.

jos1264@social.skynetcloud.site at 2025-12-13T17:00:01.000Z ##

CVE-2025-14607 - OFFIS DCMTK Remote Memory Corruption Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-8780
(6.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-15T18:22:13.783000

1 posts

The Livemesh SiteOrigin Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Hero Header and Pricing Table widgets in all versions up to, and including, 3.9.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary we

jos1264@social.skynetcloud.site at 2025-12-13T13:00:01.000Z ##

CVE-2025-8780 - Livemesh SiteOrigin Widgets WordPress Stored Cross-Site Scripting Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-36751
(0 None)

EPSS: 0.01%

updated 2025-12-15T18:22:13.783000

1 posts

Encryption is missing on the configuration interface for Growatt ShineLan-X and MIC 3300TL-X. This allows an attacker with access to the network to intercept and potentially manipulate communication requests between the inverter and its cloud endpoint.

jos1264@social.skynetcloud.site at 2025-12-13T13:00:00.000Z ##

CVE-2025-36751 - Growatt ShineLan-X and MIC 3300TL-X Unencrypted Configuration Interface Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-7058
(6.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-15T18:22:13.783000

1 posts

The Kingcabs theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘progressbarLayout’ parameter in all versions up to, and including, 1.1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an

jos1264@social.skynetcloud.site at 2025-12-13T10:30:01.000Z ##

CVE-2025-7058 - Kingcabs WordPress Stored Cross-Site Scripting Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-65779(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-15T15:30:32

1 posts

An issue was discovered in Wekan The Open Source kanban board system up to version 18.15, fixed in 18.16. Unauthenticated attackers can update a board's "sort" value (Boards.allow returns true without verifying userId), allowing arbitrary reordering of boards.

jos1264@social.skynetcloud.site at 2025-12-15T16:30:01.000Z ##

CVE-2025-65779 - Wekan Unauthenticated Board Reordering Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2018-4063
(8.8 HIGH)

EPSS: 1.71%

updated 2025-12-15T15:18:49.987000

2 posts

An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability.

beyondmachines1@infosec.exchange at 2025-12-15T16:01:31.000Z ##

CISA reports active expploit of Sierra Wireless Router vulnerability

CISA reports active exploitation of CVE-2018-4063, a critical unrestricted file upload vulnerability in end-of-life Sierra Wireless AirLink ALEOS routers that enables remote code execution with root privileges. The flaw is being exploited by multiple malware campaigns.

**If you have Sierra Wireless AirLink ES450 routers or related products, make sure they are isolated from the internet and only accessible from trusted networks with VPN or dedicated VLANs. Since these devices are End-of-Life, there are no security patches available. Plan to replace them entirely as soon as possible.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2025-12-13T16:00:36.000Z ##

If you missed this, Apple issued a bunch of security advisories yesterday support.apple.com/en-us/100100

The Hacker News: Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild thehackernews.com/2025/12/appl @thehackernews #Apple

Also:

CISA listed CVE-2025-14174, a Google Chromium Out of Bounds Memory Access Vulnerability cve.org/CVERecord?id=CVE-2025-

And CVE-2018-4063, Sierra Wireless AirLink ALEOS Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2018- #infosec #CISA #vulnerability #Google #Chromium

##

CVE-2025-14174
(8.8 HIGH)

EPSS: 1.08%

updated 2025-12-15T15:16:08.650000

6 posts

Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

jos1264@social.skynetcloud.site at 2025-12-15T12:00:01.000Z ##

Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529) helpnetsecurity.com/2025/12/15 #securityupdate #Don'tmiss #Hotstuff #0-day #Apple #macOS #News #iOS

##

ljrk@todon.eu at 2025-12-14T22:59:59.000Z ##

Huh, I somehow missed this CVE:
mastodon.social/@verbrecher/11
Thx to for the pointer @verbrecher

CVE-2025-14174 is related to this commit in the ANGLE repo:
github.com/google/angle/commit

For CVE-2025-43529 there's much less info.

##

SearchEngine@activitypub.awakari.com at 2025-12-14T13:20:05.000Z ## Apple Patches Two Actively Exploited Zero-Day WebKit Vulnerabilities Apple issued emergency updates for two actively exploited zero-day vulnerabilities in its WebKit engine (CVE-2025-14174 and CVE-...

#CybersecurityUpdate #Apple #security #updates #Cybersecurity #threats #iOS #emergency #patch #WebKit #engine

Origin | Interest | Match ##

beyondmachines1@infosec.exchange at 2025-12-14T08:01:31.000Z ##

Apple patches two actively exploited WebKit flaws

Apple released security updates across all major operating systems patching over 50 vulnerabilities, including two actively exploited WebKit zero-days (CVE-2025-43529 and CVE-2025-14174) used in targeted spyware attacks against individuals. The updates also address flaws enabling privilege escalation, Gatekeeper bypass, sandbox escape, and unauthorized access to sensitive user data.

**This one is important and urgent. The update fixes two actively exploited flaws and Google and Apple don't share any technical details. So it's very smart to update your Apple ecosystem (all iPhones, iPads, and Mac computers). You may not think you are important enough for a targeted attack, but the flaws will become common knowledge soon. And then everyone becomes a target.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2025-12-13T16:00:36.000Z ##

If you missed this, Apple issued a bunch of security advisories yesterday support.apple.com/en-us/100100

The Hacker News: Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild thehackernews.com/2025/12/appl @thehackernews #Apple

Also:

CISA listed CVE-2025-14174, a Google Chromium Out of Bounds Memory Access Vulnerability cve.org/CVERecord?id=CVE-2025-

And CVE-2018-4063, Sierra Wireless AirLink ALEOS Unrestricted Upload of File with Dangerous Type Vulnerability cve.org/CVERecord?id=CVE-2018- #infosec #CISA #vulnerability #Google #Chromium

##

decio@infosec.exchange at 2025-12-13T11:53:15.000Z ##

[VULN] "Sécurité : Apple comble deux failles « zero-day » avec iOS 26.2 et macOS 26.2"

"La première (CVE-2025-43529) concerne WebKit, le moteur de rendu de Safari. Il s'agit d'une faille de type use-after-free qui permet l'exécution de code arbitraire simplement en traitant un contenu web malveillant. La seconde (CVE-2025-14174) est une corruption de mémoire identifiée non seulement par les équipes d'Apple, mais aussi par le Threat Analysis Group de Google.

Fait intéressant, Google a également dû corriger Chrome en urgence mercredi dernier pour une faille similaire..."
👇
macg.co/ios/2025/12/securite-a
⬇️
cve.circl.lu/vuln/CVE-2025-141

💬
⬇️
infosec.pub/post/38999452

#Cyberveille #vuln #webkit #apple

##

CVE-2025-14714(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-12-15T12:30:32

1 posts

An Authentication Bypass vulnerability existed where the application bundled an interpreter (Python) that inherits the Transparency, Consent, and Control (TCC) permissions granted by the user to the main application bundle By executing the bundled interpreter directly the attacker's scripts run with the application's TCC privileges In fixed versions parent-constraints are used to allow onl

jos1264@social.skynetcloud.site at 2025-12-15T12:30:01.000Z ##

CVE-2025-14714 - TCC Bypass via Inherited Permissions in Bundled Interpreter cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11670
(6.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-15T12:30:32

1 posts

Zohocorp ManageEngine ADManager Plus versions before 8025 are vulnerable to NTLM Hash Exposure.  This vulnerability is exploitable only by technicians who have the “Impersonate as Admin” option enabled.

CVE-2025-14710
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-15T09:31:35

1 posts

A vulnerability was detected in FantasticLBP Hotels Server up to 67b44df162fab26df209bd5d5d542875fcbec1d0. This affects an unknown part of the file /controller/api/OrderList.php. The manipulation of the argument telephone results in sql injection. The attack can be executed remotely. The exploit is now public and may be used. This product implements a rolling release for ongoing delivery, which me

jos1264@social.skynetcloud.site at 2025-12-15T09:00:01.000Z ##

CVE-2025-14710 - FantasticLBP Hotels Server OrderList.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14709
(9.8 CRITICAL)

EPSS: 0.04%

updated 2025-12-15T09:31:35

1 posts

A security vulnerability has been detected in Shiguangwu sgwbox N3 2.0.25. Affected by this issue is some unknown functionality of the file /usr/sbin/http_eshell_server of the component WIRELESSCFGGET Interface. The manipulation of the argument params leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was con

jos1264@social.skynetcloud.site at 2025-12-15T09:00:01.000Z ##

CVE-2025-14709 - Shiguangwu sgwbox N3 WIRELESSCFGGET http_eshell_server buffer overflow cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14711
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-15T09:31:34

1 posts

A flaw has been found in FantasticLBP Hotels Server up to 67b44df162fab26df209bd5d5d542875fcbec1d0. This vulnerability affects unknown code of the file /controller/api/hotelList.php. This manipulation of the argument pickedHotelName/type causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used. This product adopts a rolling release str

jos1264@social.skynetcloud.site at 2025-12-15T09:00:01.000Z ##

CVE-2025-14711 - FantasticLBP Hotels Server hotelList.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14705
(9.8 CRITICAL)

EPSS: 0.15%

updated 2025-12-15T06:31:25

1 posts

A vulnerability was determined in Shiguangwu sgwbox N3 2.0.25. This affects an unknown function of the component SHARESERVER Feature. This manipulation of the argument params causes command injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

jos1264@social.skynetcloud.site at 2025-12-15T08:30:01.000Z ##

CVE-2025-14705 - Shiguangwu sgwbox N3 SHARESERVER Feature command injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14712
(7.5 HIGH)

EPSS: 0.03%

updated 2025-12-15T06:31:16

1 posts

Student Learning Assessment and Support System developed by JHENG GAO has a Exposure of Sensitive Information vulnerability, allowing unauthenticated remote attackers to view a specific page and obtain test accounts and password.

jos1264@social.skynetcloud.site at 2025-12-15T08:30:01.000Z ##

CVE-2025-14712 - JHENG GAO|Student Learning Assessment and Support System - Exposure of Sensitive Information cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14696
(5.3 MEDIUM)

EPSS: 0.03%

updated 2025-12-15T03:30:22

1 posts

A vulnerability was identified in Shenzhen Sixun Software Sixun Shanghui Group Business Management System 4.10.24.3. Affected by this vulnerability is an unknown functionality of the file /api/GylOperator/UpdatePasswordBatch. The manipulation leads to weak password recovery. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early ab

1 repos

https://github.com/b1gchoi/CVE-2025-14696

jos1264@social.skynetcloud.site at 2025-12-15T04:15:01.000Z ##

CVE-2025-14696 - Shenzhen Sixun Software Sixun Shanghui Group Business Management System UpdatePasswordBatch password recovery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67900
(8.2 HIGH)

EPSS: 0.01%

updated 2025-12-15T00:30:31

2 posts

NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.

jos1264@social.skynetcloud.site at 2025-12-15T01:15:00.000Z ##

CVE-2025-67900 - NXLog Agent OpenSSL Configuration File Load Vulnerability cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-15T00:30:01.000Z ##

CVE-2025-67900 - NXLog Agent OpenSSL Configuration File Load Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67901
(5.3 MEDIUM)

EPSS: 0.06%

updated 2025-12-15T00:30:31

1 posts

openrsync through 0.5.0, as used in OpenBSD through 7.8 and on other platforms, allows a client to cause a server SIGSEGV by specifying a length of zero for block data, because the relationship between p->rem and p->len is not checked.

CVE-2025-14667
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-14T18:31:34

1 posts

A security vulnerability has been detected in itsourcecode COVID Tracking System 1.0. The impacted element is an unknown function of the file /admin/?page=system_info. Such manipulation of the argument meta_value leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.

jos1264@social.skynetcloud.site at 2025-12-14T20:30:00.000Z ##

CVE-2025-14667 - itsourcecode COVID Tracking System page sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14673
(7.3 HIGH)

EPSS: 0.04%

updated 2025-12-14T18:31:30

1 posts

A vulnerability has been found in gmg137 snap7-rs up to 1.142.1. Affected is the function snap7_rs::client::S7Client::as_ct_write of the file /tests/snap7-rs/src/client.rs. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

jos1264@social.skynetcloud.site at 2025-12-14T20:30:01.000Z ##

CVE-2025-14673 - gmg137 snap7-rs client.rs as_ct_write heap-based overflow cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14665
(9.8 CRITICAL)

EPSS: 0.09%

updated 2025-12-14T15:30:24

1 posts

A security flaw has been discovered in Tenda WH450 1.0.0.18. Impacted is an unknown function of the file /goform/DhcpListClient of the component HTTP Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

jos1264@social.skynetcloud.site at 2025-12-14T18:30:00.000Z ##

CVE-2025-14665 - Tenda WH450 HTTP Request DhcpListClient stack-based overflow cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14655
(8.8 HIGH)

EPSS: 0.05%

updated 2025-12-14T12:32:35

2 posts

A security flaw has been discovered in Tenda AC20 16.03.08.12. The impacted element is the function formSetRebootTimer of the file /goform/SetSysAutoRebbotCfg of the component httpd. Performing manipulation of the argument rebootTime results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.

jos1264@social.skynetcloud.site at 2025-12-14T14:00:01.000Z ##

CVE-2025-14655 - Tenda AC20 httpd SetSysAutoRebbotCfg formSetRebootTimer stack-based overflow cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-14T12:30:01.000Z ##

CVE-2025-14655 - Tenda AC20 httpd SetSysAutoRebbotCfg formSetRebootTimer stack-based overflow cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14654
(8.8 HIGH)

EPSS: 0.05%

updated 2025-12-14T12:32:35

2 posts

A vulnerability was identified in Tenda AC20 16.03.08.12. The affected element is the function formSetPPTPUserList of the file /goform/setPptpUserList of the component httpd. Such manipulation of the argument list leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used.

jos1264@social.skynetcloud.site at 2025-12-14T14:00:00.000Z ##

CVE-2025-14654 - Tenda AC20 httpd setPptpUserList formSetPPTPUserList stack-based overflow cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-12-14T12:30:00.000Z ##

CVE-2025-14654 - Tenda AC20 httpd setPptpUserList formSetPPTPUserList stack-based overflow cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13832(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-14T00:30:28

1 posts

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

jos1264@social.skynetcloud.site at 2025-12-14T01:15:00.000Z ##

CVE-2025-13832 - Apache HTTP Server Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14637
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-13T21:30:24

1 posts

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

jos1264@social.skynetcloud.site at 2025-12-13T23:00:00.000Z ##

CVE-2025-14637 - itsourcecode Online Pet Shop Management System addcnp.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14622
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-13T18:30:31

1 posts

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

jos1264@social.skynetcloud.site at 2025-12-13T19:15:01.000Z ##

CVE-2025-14622 - code-projects Student File Management System save_user.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14621
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-13T18:30:31

1 posts

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

jos1264@social.skynetcloud.site at 2025-12-13T19:15:00.000Z ##

CVE-2025-14621 - code-projects Student File Management System update_user.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67870(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-12-13T18:30:30

1 posts

Rejected reason: Not used

jos1264@social.skynetcloud.site at 2025-12-13T19:15:00.000Z ##

CVE-2025-67870 - Apache HTTP Server Cross-Site Request Forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-14588
(7.3 HIGH)

EPSS: 0.03%

updated 2025-12-13T18:30:30

1 posts

A security flaw has been discovered in itsourcecode Student Management System 1.0. This vulnerability affects unknown code of the file /update_program.php. Performing manipulation of the argument ID results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.

jos1264@social.skynetcloud.site at 2025-12-13T13:00:01.000Z ##

CVE-2025-14588 - iSourcecode Student Management System SQL Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-8687
(6.4 MEDIUM)

EPSS: 0.03%

updated 2025-12-13T18:30:30

1 posts

The Enter Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Countdown and Image Comparison widgets in all versions up to, and including, 2.2.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in p

jos1264@social.skynetcloud.site at 2025-12-13T13:00:01.000Z ##

CVE-2025-8687 - WordPress Enter Addons Stored Cross-Site Scripting Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-36747(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-12-13T18:30:29

1 posts

ShineLan-X contains a set of credentials for an FTP server was found within the firmware, allowing testers to establish an insecure FTP connection with the server. This may allow an attacker to replace legitimate files being deployed to devices with their own malicious versions, since the firmware signature verification is not enforced.

jos1264@social.skynetcloud.site at 2025-12-13T13:00:01.000Z ##

CVE-2025-36747 - ShineLan-X FTP Server Credentials Disclosure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12077
(6.1 MEDIUM)

EPSS: 0.08%

updated 2025-12-13T18:30:29

1 posts

The WP to LinkedIn Auto Publish plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via PostMessage in all versions up to, and including, 1.9.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as

jos1264@social.skynetcloud.site at 2025-12-13T10:30:02.000Z ##

CVE-2025-12077 - WordPress WP to LinkedIn Auto Publish Plugin Reflected Cross-Site Scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-10738
(9.8 CRITICAL)

EPSS: 0.05%

updated 2025-12-13T18:30:22

1 posts

The URL Shortener Plugin For WordPress plugin for WordPress is vulnerable to SQL Injection via the ‘analytic_id’ parameter in all versions up to, and including, 3.0.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing qu

jos1264@social.skynetcloud.site at 2025-12-13T12:15:00.000Z ##

CVE-2025-10738 - WordPress URL Shortener Plugin SQL Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67871
(0 None)

EPSS: 0.00%

updated 2025-12-13T16:16:55.233000

1 posts

Rejected reason: Not used

CVE-2025-66430
(9.1 CRITICAL)

EPSS: 0.03%

updated 2025-12-12T21:32:45

1 posts

Plesk 18.0 has Incorrect Access Control.

beyondmachines1@infosec.exchange at 2025-12-15T15:01:32.000Z ##

Critical Plesk vulnerability enables privilege escalation, server compromise

Plesk for Linux has a critical vulnerability (CVE-2025-66430) in its Password-Protected Directories feature that allows authenticated users to escalate privileges to root access. Security patches are available through micro-updates to versions 18.0.73.5 or 18.0.74.2.

**If you're running Plesk for Linux, plan a very quick update to version 18.0.73.5 or 18.0.74.2. Your authenticated users (or their hacked accounts) can gain complete root control of your server. After patching, audit your systems for any signs of unauthorized access or compromise.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-13780
(9.1 CRITICAL)

EPSS: 0.09%

updated 2025-12-12T16:42:56

1 posts

The PLAIN restore meta-command filter introduced in pgAdmin as part of the fix for CVE-2025-12762 does not detect meta-commands when a SQL file begins with a UTF-8 Byte Order Mark (EF BB BF) or other special byte sequences. The implemented filter uses the function `has_meta_commands()`, which scans raw bytes using a regular expression. The regex does not treat the bytes as ignorable, so meta-comma

4 repos

https://github.com/meenakshisl/PoC-CVE-2025-13780

https://github.com/ThemeHackers/CVE-2025-13780

https://github.com/Ashwesker/Blackash-CVE-2025-13780

https://github.com/zeropwn/pgadmin4-9.10-CVE-2025-13780

beyondmachines1@infosec.exchange at 2025-12-15T20:01:31.000Z ##

Critical flaw in pgAdmin 4 allows remote code execution

A critical vulnerability (CVE-2025-13780) in pgAdmin 4 versions up to 9.10 allows authenticated attackers to execute arbitrary shell commands by bypassing regex-based filters using UTF-8 BOM and non-standard whitespace characters in malicious SQL dump files. The flaw has been patched in version 9.11, which implements psql's `\restrict` directive to disable dangerous meta-commands during database restoration operations.

**If you're running pgAdmin 4 in server mode, plan a quick update to version and upgrade to 9.11 or later. All previous versions allow attackers to execute shell commands on your server through malicious database restore files. It's not critical because users still need privileges on pgAdmin, but those can be breached. So don't ignore this one.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-66004
(5.7 MEDIUM)

EPSS: 0.02%

updated 2025-12-12T15:18:42.140000

1 posts

A Path Traversal vulnerability in usbmuxd allows local users to escalate to the service user.This issue affects usbmuxd: before 3ded00c9985a5108cfc7591a309f9a23d57a8cba.

Ubuntu@activitypub.awakari.com at 2025-12-15T14:00:15.000Z ## Ubuntu 25.10 usbmuxd Important File Overwrite CVE-2025-66004 usbmuxd could be made to overwrite files.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-12105
(7.5 HIGH)

EPSS: 0.05%

updated 2025-12-12T00:30:20

1 posts

A flaw was found in the asynchronous message queue handling of the libsoup library, widely used by GNOME and WebKit-based applications to manage HTTP/2 communications. When network operations are aborted at specific timing intervals, an internal message queue item may be freed twice due to missing state synchronization. This leads to a use-after-free memory access, potentially crashing the affecte

Ubuntu@activitypub.awakari.com at 2025-12-15T15:33:38.000Z ## Ubuntu 25.10: libsoup Important DoS Issue USN-7932-1 CVE-2025-12105 libsoup could be made to crash if it received specially crafted network traffic.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-58360
(8.2 HIGH)

EPSS: 71.92%

updated 2025-12-11T21:55:34

1 posts

## Description An XML External Entity (XXE) vulnerability was identified. The application accepts XML input through a specific endpoint ``/geoserver/wms`` operation ``GetMap``. However, this input is not sufficiently sanitized or restricted, allowing an attacker to define external entities within the XML request. An XML External Entity attack is a type of attack that occurs when XML input contai

Nuclei template

4 repos

https://github.com/Joker-Wiggin/CVE-2025-58360-GeoServer-XXE

https://github.com/Ashwesker/Blackash-CVE-2025-58360

https://github.com/quyenheu/CVE-2025-58360

https://github.com/rxerium/CVE-2025-58360

beyondmachines1@infosec.exchange at 2025-12-13T13:01:31.000Z ##

CISA reports active exploitation of GeoServer XXE flaw

CISA reports active exploitation of CVE-2025-58360, a critical XML External Entity (XXE) vulnerability in OSGeo GeoServer that allows unauthenticated attackers to access sensitive files, conduct SSRF attacks, and launch denial-of-service attacks.

**If you run OSGeo GeoServer, this is urgent. Your server is under attack. If possible, isolate from the internet. Definitely upgrade to the latest patched version (2.25.6, 2.26.2, 2.27.0, 2.28.0, or 2.28.1).**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2025-64669
(7.8 HIGH)

EPSS: 0.06%

updated 2025-12-11T18:30:54

1 posts

Improper access control in Windows Admin Center allows an authorized attacker to elevate privileges locally.

_r_netsec@infosec.exchange at 2025-12-15T17:28:06.000Z ##

CVE-2025-64669: Uncovering Local Privilege Escalation Vulnerability in Windows Admin Center cymulate.com/blog/cve-2025-646

##

CVE-2025-14321
(9.8 CRITICAL)

EPSS: 0.06%

updated 2025-12-11T18:30:41

1 posts

Use-after-free in the WebRTC: Signaling component. This vulnerability affects Firefox < 146 and Firefox ESR < 140.6.

linux@activitypub.awakari.com at 2025-12-14T11:11:44.000Z ## Debian: Thunderbird Critical Arbitrary Code Exec DSA-6081-1 CVE-2025-14321 Multiple security issues were discovered in Thunderbird, which could result in the execution of arbitrary code. For the ol...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-55182
(10.0 CRITICAL)

EPSS: 76.01%

updated 2025-12-10T02:00:02.557000

25 posts

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Nuclei template

100 repos

https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool

https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182

https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-

https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/yanoshercohen/React2Shell_CVE-2025-55182

https://github.com/sho-luv/React2Shell

https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/Pizz33/CVE-2025-55182-burpscanner

https://github.com/VeilVulp/RscScan-cve-2025-55182

https://github.com/ayoub-intigriti/react2shell-cve

https://github.com/theori-io/reactguard

https://github.com/emredavut/CVE-2025-55182

https://github.com/7amzahard/React2shell

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/Saturate/CVE-2025-55182-Scanner

https://github.com/LemonTeatw1/CVE-2025-55182-exploit

https://github.com/shamo0/react2shell-PoC

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/GelukCrab/React-Server-Components-RCE

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/keklick1337/CVE-2025-55182-golang-PoC

https://github.com/subhdotsol/CVE-2025-55182

https://github.com/xcanwin/CVE-2025-55182-React-RCE

https://github.com/Chocapikk/CVE-2025-55182

https://github.com/AggressiveUser/React2Hell

https://github.com/AliHzSec/CVE-2025-55182

https://github.com/xiaopeng-ye/react2shell-detector

https://github.com/acheong08/CVE-2025-55182-poc

https://github.com/santihabib/CVE-2025-55182-analysis

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/xalgord/React2Shell

https://github.com/gensecaihq/react2shell-scanner

https://github.com/im-ezboy/CVE-2025-55182-zoomeye

https://github.com/EynaExp/CVE-2025-55182-POC

https://github.com/raivenLockdown/RCE_React2Shell_ButCooler-SomeUselessUsefulThingsLMAO-

https://github.com/andrei2308/react2shell

https://github.com/hoosin/CVE-2025-55182

https://github.com/zack0x01/vuln-app-CVE-2025-55182

https://github.com/msanft/CVE-2025-55182

https://github.com/c0rydoras/CVE-2025-55182

https://github.com/fatguru/CVE-2025-55182-scanner

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/nehkark/CVE-2025-55182

https://github.com/logesh-GIT001/CVE-2025-55182

https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/EQSTLab/CVE-2025-55182

https://github.com/freeqaz/react2shell

https://github.com/whiteov3rflow/CVE-2025-55182-poc

https://github.com/MoLeft/React2Shell-Toolbox

https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive

https://github.com/dwisiswant0/CVE-2025-55182

https://github.com/Rsatan/Next.js-Exploit-Tool

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/XiaomingX/CVE-2025-55182-poc

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/shyambhanushali/React2Shell

https://github.com/kavienanj/CVE-2025-55182

https://github.com/ejpir/CVE-2025-55182-research

https://github.com/C00LN3T/React2Shell

https://github.com/sudo-Yangziran/CVE-2025-55182POC

https://github.com/SainiONHacks/CVE-2025-55182-Scanner

https://github.com/zzhorc/CVE-2025-55182

https://github.com/ThemeHackers/CVE-2025-55182

https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc

https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell

https://github.com/StealthMoud/CVE-2025-55182-Scanner

https://github.com/alfazhossain/CVE-2025-55182-Exploiter

https://github.com/Spritualkb/CVE-2025-55182-exp

https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell

https://github.com/techgaun/cve-2025-55182-scanner

https://github.com/Ashwesker/Blackash-CVE-2025-55182

https://github.com/ejpir/CVE-2025-55182-bypass

https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS

https://github.com/m3m0ryc0rrupt/CVE-2025-55182-PoC

https://github.com/alsaut1/react2shell-lab

https://github.com/xkillbit/cve-2025-55182-scanner

https://github.com/kk12-30/CVE-2025-55182

https://github.com/mrknow001/RSC_Detector

https://github.com/timsonner/React2Shell-CVE-2025-55182

https://github.com/yz9yt/React2Shell-CTF

https://github.com/ynsmroztas/NextRce

https://github.com/f0xyx/CVE-2025-55182-Scanner

https://github.com/kOaDT/poc-cve-2025-55182

https://github.com/SoICT-BKSEC/CVE-2025-55182-docker-lab

https://github.com/hualy13/CVE-2025-55182

https://github.com/RuoJi6/CVE-2025-55182-RCE-shell

https://github.com/sickwell/CVE-2025-55182

https://github.com/jf0x3a/CVE-2025-55182-exploit

https://github.com/sumanrox/rschunter

https://github.com/assetnote/react2shell-scanner

https://github.com/surajhacx/react2shellpoc

https://github.com/zr0n/react2shell

https://github.com/Call123X/-cve-2025-55182

cyberveille@mastobot.ping.moi at 2025-12-17T04:30:04.000Z ##

📢 Exploitation massive de la faille React2Shell (CVE-2025-55182) dans React/Next.js
📝 Source : Google Cloud Blog (Google Threat Intelligence Group), 12 décembre 2025.
📖 cyberveille : cyberveille.ch/posts/2025-12-1
🌐 source : cloud.google.com/blog/topics/t
#Analyse_de_menace #CVE_2025_55182 #Cyberveille

##

patrickcmiller at 2025-12-17T02:42:00.683Z ##

GitHub Scanner for React2Shell (CVE-2025-55182) Turns Out to Be Malware hackread.com/github-scanner-re

##

cyberveille@mastobot.ping.moi at 2025-12-16T22:00:04.000Z ##

📢 React2Shell (CVE-2025-55182) exploité pour déployer le ransomware Weaxor
📝 Source: S-RM — Dans un rapport d’incident, S-RM décrit l’exploitation de la vulné...
📖 cyberveille : cyberveille.ch/posts/2025-12-1
🌐 source : s-rminform.com/latest-thinking
#CVE_2025_55182 #Next_js_React_Server_Components #Cyberveille

##

catc0n at 2025-12-16T21:58:41.392Z ##

React2Shell beyond Next.js: Our team tested exploitability and analyzed exploit patterns for *other* frameworks vulnerable to CVE-2025-55182. Notes on the four other frameworks we exploited successfully are in this blog, but it's important to note that none of these is anywhere close to the viable attack surface area that Next.js apps presented.

In other words, in an alternate universe where Next.js apps weren't vulnerable by default, this probably would've been a nothing-burger after all. Unfortunately (gestures at everything).

vulncheck.com/blog/react2shell

##

patrickcmiller@infosec.exchange at 2025-12-17T02:42:00.000Z ##

GitHub Scanner for React2Shell (CVE-2025-55182) Turns Out to Be Malware hackread.com/github-scanner-re

##

catc0n@infosec.exchange at 2025-12-16T21:58:41.000Z ##

React2Shell beyond Next.js: Our team tested exploitability and analyzed exploit patterns for *other* frameworks vulnerable to CVE-2025-55182. Notes on the four other frameworks we exploited successfully are in this blog, but it's important to note that none of these is anywhere close to the viable attack surface area that Next.js apps presented.

In other words, in an alternate universe where Next.js apps weren't vulnerable by default, this probably would've been a nothing-burger after all. Unfortunately (gestures at everything).

vulncheck.com/blog/react2shell

##

Kubernetes@activitypub.awakari.com at 2025-12-16T18:47:42.000Z ## 🚩 Microsoft Reports Active React2Shell (CVE-2025-55182) Exploitation Driving Coin Miners, RATs, and Cloud Credential Theft Microsoft Reports Active React2Shell (CVE-2025-55182) Exploitation Driv...

#TIGR #vulnerability

Origin | Interest | Match ##

linux@activitypub.awakari.com at 2025-12-15T19:35:00.000Z ## Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components CVE-2025-55182 (also referred to as React2Shell and includes CVE-2025-66478, which was merged into it) is...


Origin | Interest | Match ##

AAKL@infosec.exchange at 2025-12-16T17:47:04.000Z ##

Microsoft posted this yesterday.

Microsoft: Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components microsoft.com/en-us/security/b #Microsoft #threatresearch #infosec #React2shell #vulnerability

##

linkeaz@mastodon.social at 2025-12-16T10:12:06.000Z ##

React2Shell: L'ampleur des dégâts se révèle. Cloudflare rapporte 14,5M tentatives d'exploitation/heure. Microsoft observe des compromissions massives. Cette faille critique (CVE-2025-55182) exige une action immédiate. Patchez et protégez vos systèmes.
⚡️linkeaz.net/fr/posts/react2she

#React2Shell #Sécurité #CyberSécurité #Technews #Vulnerabilités #React #NextJS

##

teezeh@ieji.de at 2025-12-16T10:07:59.000Z ##

“Five new China-linked groups join rapid React2Shell exploitation, raising urgency to patch now.”

scworld.com/news/more-china-li

##

linux@activitypub.awakari.com at 2025-12-15T19:35:00.000Z ## Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components CVE-2025-55182 (also referred to as React2Shell and includes CVE-2025-66478, which was merged into it) is...

#Microsoft #Security

Origin | Interest | Match ##

Kubernetes@activitypub.awakari.com at 2025-12-15T19:35:00.000Z ## Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components CVE-2025-55182 (also referred to as React2Shell and includes CVE-2025-66478, which was merged into it) is...


Origin | Interest | Match ##

jos1264@social.skynetcloud.site at 2025-12-15T17:15:01.000Z ##

GitHub Scanner for React2Shell (CVE-2025-55182) Turns Out to Be Malware hackread.com/github-scanner-re #ScamsandFraud #Cybersecurity #Vulnerability #React2Shell #Security #security #Malware #GitHub #Fraud #Scam

##

Hackread@mstdn.social at 2025-12-15T16:42:46.000Z ##

A fake #React2Shell (CVE-2025-55182) scanner on GitHub was caught delivering malware targeting security researchers, using a #Windows tool to pull a remote payload.

Read: hackread.com/github-scanner-re

#CyberSecurity #InfoSec #Malware #GitHub #Vulnerability

##

AAKL@infosec.exchange at 2025-12-15T15:38:19.000Z ##

It's an incredibly slow Monday, which probably explains why some cybersecurity posts were published on Friday, December 12. This is one of them:

Google Threat Intelligence: Multiple Threat Actors Exploit React2Shell (CVE-2025-55182) cloud.google.com/blog/topics/t #Google #infosec #threatintel #threatintelligence #React2shell

##

sans_isc@infosec.exchange at 2025-12-15T13:21:25.000Z ##

More React2Shell Exploits CVE-2025-55182 isc.sans.edu/diary/32572

##

tierrasapiens@mastodon.social at 2025-12-15T12:57:12.000Z ##

🖲️ #Cybersecurity #Ciberseguridad #Ciberseguranca #Security #Seguridad #Seguranca #News #Noticia #Noticias #Tecnologia #Technology
⚫ React2Shell Exploits Flood the Internet as Attacks Continue
🔗 darkreading.com/threat-intelli

As exploitation activity against CVE-2025-55182 ramps up, researchers are finding some proof-of-concept exploits contain bypasses for web application firewall (WAF) rules.

##

VirusBulletin@infosec.exchange at 2025-12-15T11:16:32.000Z ##

NTT's Kazuya Nomura analyses ZnDoor, a malware executed by exploiting React2Shell (CVE-2025-55182) in attacks against companies in Japan. jp.security.ntt/insights_resou

##

jos1264@social.skynetcloud.site at 2025-12-15T10:45:01.000Z ##

Critical React2Shell Vulnerability (CVE-2025-55182) Analysis: Surge in Attacks Targeting RSC-Enabled Services Worldwide hackread.com/react2shell-vulne #Cybersecurity #Vulnerability #PressRelease #CyberAttack #React2Shell #CriminalIP #News #CISA #RCE

##

bkastl@mastodon.social at 2025-12-14T13:23:42.000Z ##

Wer bei #React2Shell mit den Softwareupdates zu langsam war, kann jetzt langsam eher mal auf die folgenden Indicators of Compromise achten… cloud.google.com/blog/topics/t

##

campuscodi@mastodon.social at 2025-12-14T01:56:16.000Z ##

Google is now tracking at least five Chinese cyber-espionage groups that are exploiting the React2Shell vulnerability for initial access.

The groups are UNC6600, UNC6586, UNC6588, UNC6595, and UNC6603. This is up from two at the beginning.

cloud.google.com/blog/topics/t

##

ponapalt@ukadon.shillest.net at 2025-12-14T00:08:54.000Z ##

React2shell CVE-2025-55182のせいで勝手にサーバでマイニングされてた(むしろその程度で済んでよかったねクラスのあかんやつ)という話をたくさん聞いてるのでお気をつけくださいまし…

DifyをセルフホストしたやつをパブリックなIPに少しでも晒したら即死とか聞いとるでな。

##

technadu@infosec.exchange at 2025-12-13T15:46:12.000Z ##

An actively exploited GeoServer XXE vulnerability is prompting renewed discussion around breach readiness in public-sector and enterprise environments.

Experts note that unauthenticated flaws in widely deployed open-source platforms significantly increase exposure, especially where asset discovery and patch coordination are constrained.

Venky Raju, Field CTO at ColorTokens:
“The massive adoption of open-source software has significantly increased the attack surface of many enterprises, often without their knowledge. Unauthenticated vulnerabilities are particularly concerning because they bypass identity and application-level controls. The GeoServer vulnerability comes on the heels of a larger one called React2Shell (CVE-2025-55182), which scored a perfect 10 on the CVSS metric.

However, enterprises may not be able to patch servers quickly due to internal challenges, such as discovering affected assets, identifying affected applications, scheduling patch updates, etc. As an emergency measure, organizations should consider microsegmentation controls to isolate affected assets or zones with just enough policies to maintain business continuity while preventing lateral movement using commonly used techniques. The MITRE framework is an excellent guide for identifying the tactics hackers use to move laterally from the initially compromised system.”

How are teams handling containment when patching isn’t immediate?

Engage and follow @technadu for grounded infosec coverage.

#InfoSec #ZeroTrust #Microsegmentation #GeoServer #OpenSourceRisk #ThreatDetection #TechNadu

##

neurovagrant@masto.deoan.org at 2025-12-13T12:19:40.000Z ##

Missed this yesterday - Google TIG published what they've been seeing on React2Shell.

Dovetails with @hrbrmstr 's tireless work lately.

#threatintel

cloud.google.com/blog/topics/t

##

CVE-2025-59719
(9.8 CRITICAL)

EPSS: 0.05%

updated 2025-12-09T19:59:29.507000

4 posts

An improper verification of cryptographic signature vulnerability in Fortinet FortiWeb 8.0.0, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9 may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.

beyondmachines1 at 2025-12-17T10:01:31.960Z ##

CISA reports active exploitation of critical Fortinet authentication bypass flaw

CISA reports active exploitation of two critical Fortinet vulnerabilities (CVE-2025-59718 and CVE-2025-59719, CVSS 9.8) that allow unauthenticated attackers to bypass FortiCloud SSO authentication through flawed SAML signature verification. Exploitation began just three days after patches were released on December 12, 2025.

**Now it's urgent, because once again, your Fortinet products are being hacked. If you have Fortinet products, first make sure the management interface is isolated from the internet and accessible only from trusted networks. Then disable FortiCloud SSO login (in System -> Settings or use CLI command config system global set admin-forticloud-sso-login disable end) to prevent authentication bypass attacks. Finally, upgrade to the latest secure versions as soon as possible.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2025-12-17T10:01:31.000Z ##

CISA reports active exploitation of critical Fortinet authentication bypass flaw

CISA reports active exploitation of two critical Fortinet vulnerabilities (CVE-2025-59718 and CVE-2025-59719, CVSS 9.8) that allow unauthenticated attackers to bypass FortiCloud SSO authentication through flawed SAML signature verification. Exploitation began just three days after patches were released on December 12, 2025.

**Now it's urgent, because once again, your Fortinet products are being hacked. If you have Fortinet products, first make sure the management interface is isolated from the internet and accessible only from trusted networks. Then disable FortiCloud SSO login (in System -> Settings or use CLI command config system global set admin-forticloud-sso-login disable end) to prevent authentication bypass attacks. Finally, upgrade to the latest secure versions as soon as possible.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

Andy_Thompson@infosec.exchange at 2025-12-16T19:49:52.000Z ##

Pornhub / Mixpanel
- bleepingcomputer.com/news/secu
- mixpanel.com/blog/sms-security
- techspot.com/news/107779-pornh
- securityaffairs.com/177881/dat

PDVSA Hacked
- bleepingcomputer.com/news/secu
- reuters.com/world/americas/cyb
- bloomberg.com/news/articles/20
- maritime-executive.com/article

Fortinet FortiCloud SSO auth bypass
- bleepingcomputer.com/news/secu
- arcticwolf.com/resources/blog/
- cyber.gov.au/about-us/view-all
- cyber.gc.ca/en/alerts-advisori
- thehackernews.com/2025/12/fort

##

cR0w@infosec.exchange at 2025-12-16T16:00:32.000Z ##

RE: infosec.exchange/@BleepingComp

Apparently CVE-2025-59718 and CVE-2025-59719 are now EITW.

##

CVE-2025-40800
(7.4 HIGH)

EPSS: 0.02%

updated 2025-12-09T18:30:43

1 posts

A vulnerability has been identified in COMOS V10.6 (All versions), COMOS V10.6 (All versions), NX V2412 (All versions < V2412.8700), NX V2506 (All versions < V2506.6000), Simcenter 3D (All versions < V2506.6000), Simcenter Femap (All versions < V2506.0002), Solid Edge SE2025 (All versions < V225.0 Update 10), Solid Edge SE2026 (All versions < V226.0 Update 1). The IAM client in affected products i

beyondmachines1@infosec.exchange at 2025-12-13T16:01:31.000Z ##

Siemens reports critical flaw in IAM Client on multiple industrial products

Siemens is reporting a critical vulnerability (CVE-2025-40800) in its IAM client component affecting multiple industrial software products, which allows unauthenticated attackers to conduct man-in-the-middle attacks due to improper certificate validation. Patches are available for most affected products.

**Make sure all your industrial systems are isolated from the internet and accessible from trusted networks only. If you are using COMOS, NX, Simcenter 3D, Simcenter Femap, Solid Edge plan a quick update for them. Not an urgent thing, but don't ignore this one. Someone will find a way to hack them.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-2296(CVSS UNKNOWN)

EPSS: 0.16%

updated 2025-12-09T18:30:42

1 posts

EDK2 contains a vulnerability in BIOS where an attacker may cause “ Improper Input Validation” by local access. Successful exploitation of this vulnerability could alter control flow in unexpected ways, potentially allowing arbitrary command execution and impacting Confidentiality, Integrity, and Availability.

4 repos

https://github.com/CRUNZEX/CVE-2025-22968

https://github.com/padayali-JD/CVE-2025-22964

https://github.com/samplev45/CVE-2025-22963

https://github.com/gmh5225/CVE-2025-22963

kernellogger@hachyderm.io at 2025-12-14T08:07:58.000Z ##

Analyzing CVE-2025-2296 [Un-verified #kernel bypass #SecureBoot mechanism in direct boot mode]

kraxel.org/blog/2025/12/analyz

Gerd Hoffmann aka kraxel writes: ""[…] So, if secure boot is enabled attempts to boot via 'EFI stub' will fail, the firmware rejects the binary due to the signature check failing. OVMF will fallback to the legacy 'EFI handover protocol' loader. The legacy loader does not do secure boot verification, which is the core of CVE-2025-2296. And this was essentially unfixable (in the firmware alone) because there simply is no valid secure boot signature due to the patching qemu is doing. Nevertheless there are some use cases which expect direct kernel boot with secure boot enabled to work. Catch 22. […]

Secure boot bypass sounds scary, but is it really? […] So, the actual impact is quite limited. […]""

#Linux #UEFI #QEMU

##

CVE-2025-66516
(0 None)

EPSS: 0.06%

updated 2025-12-08T18:27:15.857000

2 posts

Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. This CVE covers the same vulnerability as in CVE-2025-54988. However, this CVE expands the scope of affected packages in two ways. First, while the entrypoi

3 repos

https://github.com/Ashwesker/Blackash-CVE-2025-66516

https://github.com/chasingimpact/CVE-2025-66516-Writeup-POC

https://github.com/sid6224/CVE-2025-66516-POC

patrickcmiller@infosec.exchange at 2025-12-16T13:42:00.000Z ##

Atlassian fixed maximum severity flaw CVE-2025-66516 in Apache Tika securityaffairs.com/185710/sec

##

beyondmachines1@infosec.exchange at 2025-12-16T10:01:32.000Z ##

Atlassian patches 46 vulnerabilities in December 2025 security bulletin, nine critical Third-Party flaws

Atlassian's December 2025 Security Bulletin addresses 46 vulnerabilities across its enterprise software suite, including a critical CVE-2025-66516 XXE vulnerability (CVSS 10.0) in the Tika dependency affecting Bamboo, Confluence, Crowd, Jira, and Fisheye/Crucible products.

**If you use Atlassian products (Jira, Confluence, Bamboo, Bitbucket, Crowd, or Fisheye/Crucible), plan a general update. The December 2025 patch brings a bunch of fixes, including some critical flaws in dependency components.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-14104
(6.1 MEDIUM)

EPSS: 0.01%

updated 2025-12-05T18:31:18

1 posts

A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.

linux@activitypub.awakari.com at 2025-12-13T01:02:19.000Z ## CVE-2025-14104 Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames Information published.

#CVE

Origin | Interest | Match ##

CVE-2025-34352
(0 None)

EPSS: 0.02%

updated 2025-12-04T17:15:25.860000

3 posts

JumpCloud Remote Assist for Windows versions prior to 0.317.0 include an uninstaller that is invoked by the JumpCloud Windows Agent as NT AUTHORITY\SYSTEM during agent uninstall or update operations. The Remote Assist uninstaller performs privileged create, write, execute, and delete actions on predictable files inside a user-writable %TEMP% subdirectory without validating that the directory is tr

beyondmachines1 at 2025-12-16T20:01:31.790Z ##

Privilege escalation flaw reported in JumpCloud Remote Assist for Windows

A critical vulnerability (CVE-2025-34352) in JumpCloud Remote Assist for Windows allows low-privileged local attackers to escalate privileges to SYSTEM level or cause denial-of-service attacks by exploiting insecure file operations during the uninstallation process.

**This one is potentially very dangerous, but complex to exploit and does require several prerequisites like having local access and triggering specific sequences of events on the computer including JumpCloud uninstall. It's important to update all agents, but not a panic mode patch. Just keep up the patches of your fleet.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2025-12-16T20:01:31.000Z ##

Privilege escalation flaw reported in JumpCloud Remote Assist for Windows

A critical vulnerability (CVE-2025-34352) in JumpCloud Remote Assist for Windows allows low-privileged local attackers to escalate privileges to SYSTEM level or cause denial-of-service attacks by exploiting insecure file operations during the uninstallation process.

**This one is potentially very dangerous, but complex to exploit and does require several prerequisites like having local access and triggering specific sequences of events on the computer including JumpCloud uninstall. It's important to update all agents, but not a panic mode patch. Just keep up the patches of your fleet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

Hackread@mstdn.social at 2025-12-16T13:48:55.000Z ##

🚨 JumpCloud Remote Assist flaw (CVE-2025-34352) lets local users hijack full control of company devices. Affects 180,000+ orgs. Update now to patch.

Read: hackread.com/jumpcloud-remote-

#JumpCloud #CyberSecurity #Vulnerability #InfoSec #Windows

##

CVE-2025-13223
(8.8 HIGH)

EPSS: 1.16%

updated 2025-12-02T14:33:52.680000

4 posts

Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

furry_walls@mastodon.social at 2025-12-16T21:09:13.000Z ##

Только вчера была удалена запись о критической уязвимости #Chrome (CVE-2025-13223), и вот, не прошло и месяца (спустя 24 дня), как нашлась новая, у которой даже нет #CVE-идентификатора.

Какие ещё нужны аргументы, чтобы слезть с этого...

и начать пользоваться #Firefox?

##

furry_walls@mastodon.social at 2025-12-16T21:09:13.000Z ##

Только вчера была удалена запись о критической уязвимости #Chrome (CVE-2025-13223), и вот, не прошло и месяца (спустя 24 дня), как нашлась новая, у которой даже нет #CVE-идентификатора.

Какие ещё нужны аргументы, чтобы слезть с этого...

и начать пользоваться #Firefox?

##

Mozilla@activitypub.awakari.com at 2025-12-11T11:58:47.000Z ## [Updated] Another Chrome zero-day under attack: update now If we’re lucky, this update will close out 2025’s run of Chrome zero-days. This one is a V8 type-confusion issue already being exploit...

#Bugs #News #144.0.7444.175 #144.0.7444.176 #CVE-2025-13223

Origin | Interest | Match ##

Mozilla@activitypub.awakari.com at 2025-12-11T11:58:47.000Z ## [updated]Another Chrome zero-day under attack: update now If we’re lucky, this update will close out 2025’s run of Chrome zero-days. This one is a V8 type-confusion issue already being exploite...

#Bugs #News #144.0.7444.175 #144.0.7444.176 #CVE-2025-13223

Origin | Interest | Match ##

CVE-2025-40300(CVSS UNKNOWN)

EPSS: 0.06%

updated 2025-11-17T18:30:25

4 posts

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors af

Ubuntu@activitypub.awakari.com at 2025-12-16T21:01:50.000Z ## Ubuntu 20.04 LTS: Linux-azure-fips Critical VMSCAPE Exposure CVE-2025-40300 Several security issues were fixed in the Linux kernel.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

linux@activitypub.awakari.com at 2025-12-16T18:04:53.000Z ## Ubuntu 20.04 LTS: Important Security Update USN-7939-1 for CVE-2025-40300 Several security issues were fixed in the Linux kernel.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

Ubuntu@activitypub.awakari.com at 2025-12-16T11:55:30.000Z ## Ubuntu 20.04: Linux Kernel Critical Info Disclosure CVE-2025-40300 Several security issues were fixed in the Linux kernel.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

Ubuntu@activitypub.awakari.com at 2025-12-15T14:16:04.000Z ## Ubuntu 22.04: linux-kvm Critical Insufficient Isolation CVE-2025-40300 Several security issues were fixed in the Linux kernel.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-40780
(8.6 HIGH)

EPSS: 0.03%

updated 2025-11-04T22:16:11.920000

1 posts

In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1

cR0w@infosec.exchange at 2025-12-16T13:50:59.000Z ##

F5 updated their advisory for CVE-2025-40780. I don't know what they updated since they still don't do a change log but they still say it sucks to suck. No fix in BIG-IP DNS.

my.f5.com/manage/s/article/K00

##

CVE-2025-40018(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-10-29T15:31:53

1 posts

In the Linux kernel, the following vulnerability has been resolved: ipvs: Defer ip_vs_ftp unregister during netns cleanup On the netns cleanup path, __ip_vs_ftp_exit() may unregister ip_vs_ftp before connections with valid cp->app pointers are flushed, leading to a use-after-free. Fix this by introducing a global `exiting_module` flag, set to true in ip_vs_ftp_exit() before unregistering the pe

Raspberry-Pi@activitypub.awakari.com at 2025-12-15T20:38:39.000Z ## Ubuntu 25.10: Linux Kernel Critical Update CVE-2025-40018 for Raspberry Pi Several security issues were fixed in the Linux kernel.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-24294
(5.3 MEDIUM)

EPSS: 0.05%

updated 2025-07-15T22:56:20

1 posts

A denial of service vulnerability has been discovered in the resolv gem bundled with Ruby. ## Details The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet. An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a l

linux@activitypub.awakari.com at 2025-12-15T10:48:03.000Z ## Oracle Linux 9: Ruby Security Advisory ELSA-2025-23063 for CVE-2025-24294 The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2023-52922
(7.8 HIGH)

EPSS: 0.04%

updated 2025-06-13T20:15:22.450000

1 posts

In the Linux kernel, the following vulnerability has been resolved: can: bcm: Fix UAF in bcm_proc_show() BUG: KASAN: slab-use-after-free in bcm_proc_show+0x969/0xa80 Read of size 8 at addr ffff888155846230 by task cat/7862 CPU: 1 PID: 7862 Comm: cat Not tainted 6.5.0-rc1-00153-gc8746099c197 #230 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 Call Trace: <TASK>

alleleintel@infosec.exchange at 2025-12-16T12:45:44.000Z ##

With H2HC on hiatus this year, the security community stepped up to create the 307 Temporary Security Conference—and we were proud to be part of it!

We presented our research on vulnerabilities in the CAN BCM protocol in the Linux kernel.

Thank you to everyone who watched!

The slides and exploit demos are now available.

Slides
allelesecurity.com/wp-content/

Demo 1: Exploit for UAF read (CAN BCM) to dump shadow file & MySQL root hash.
youtube.com/watch?v=znTLHc2mXIs

Demo 2: Exploit for UAF read in CAN BCM (CVE-2023-52922) that leaks encoded freelist pointer and slab object addresses
youtube.com/watch?v=XQ3QlXqn6pI

##

CVE-2025-32210
(6.5 MEDIUM)

EPSS: 0.04%

updated 2025-04-11T15:39:52.920000

1 posts

Missing Authorization vulnerability in CreativeMindsSolutions CM Registration and Invitation Codes allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects CM Registration and Invitation Codes: from n/a through 2.5.2.

AAKL@infosec.exchange at 2025-12-16T17:07:31.000Z ##

Nvidia has three security advisories today.

NVIDIA NeMo Framework: CVE-2025-33212 and CVE-2025-33226 nvidia.custhelp.com/app/answer

NVIDIA Isaac Lab: CVE-2025-32210 nvidia.custhelp.com/app/answer

NVIDIA Resiliency Extension: CVE-2025-33225 and CVE-2025-33235 nvidia.custhelp.com/app/answer #Nvidia #vulnerability #infosec

##

CVE-2024-39432
(8.3 HIGH)

EPSS: 1.07%

updated 2024-09-30T18:12:04.437000

4 posts

In UMTS RLC driver, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with System execution privileges needed.

technadu at 2025-12-17T09:42:09.744Z ##

Researchers disclosed a critical buffer overflow (CVE-2024-39432) in connected car modems that enables remote code execution and lateral movement across the vehicle SoC.

The findings challenge long-held assumptions about cellular protocol isolation in automotive systems.

Full analysis:
technadu.com/critical-vulnerab

##

cyberveille@mastobot.ping.moi at 2025-12-16T22:30:04.000Z ##

📢 RCE baseband sur le modem Unisoc UIS7862A des head units automobiles (CVE-2024-39432/39431)
📝 Source: Kaspersky ICS CERT — Contexte: publication de recherche (16 déc.
📖 cyberveille : cyberveille.ch/posts/2025-12-1
🌐 source : securelist.com/attacking-car-m
#CVE_2024_39431 #CVE_2024_39432 #Cyberveille

##

technadu@infosec.exchange at 2025-12-17T09:42:09.000Z ##

Researchers disclosed a critical buffer overflow (CVE-2024-39432) in connected car modems that enables remote code execution and lateral movement across the vehicle SoC.

The findings challenge long-held assumptions about cellular protocol isolation in automotive systems.

Full analysis:
technadu.com/critical-vulnerab

#AutomotiveSecurity #ConnectedCars #RCE #IoTSecurity

##

AAKL@infosec.exchange at 2025-12-16T17:43:36.000Z ##

New.

"During our research, we identified several critical vulnerabilities at various levels of the Unisoc UIS7862A modem’s cellular protocol stack. This article discusses a stack-based buffer overflow vulnerability in the 3G RLC protocol implementation (CVE-2024-39432). The vulnerability can be exploited to achieve remote code execution at the early stages of connection, before any protection mechanisms are activated."

Kaspersky: God Mode On: how we attacked a vehicle’s head unit modem securelist.com/attacking-car-m @Kaspersky #infosec #IoT #threatresearch

##

CVE-2025-14558
(0 None)

EPSS: 0.00%

1 posts

N/A

FreeBSD@activitypub.awakari.com at 2025-12-15T20:50:08.000Z ## rtsold: Validate entries in domain search lists Reported by: Kevin Day <kevin@your.org> Approved by: so Security: FreeBSD-SA-25:12.rtsold Security: CVE-2025-14558


Origin | Interest | Match ##

CVE-2025-66478
(0 None)

EPSS: 0.00%

4 posts

N/A

100 repos

https://github.com/jctommasi/react2shellVulnApp

https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-supabase-pnpm-monorepo

https://github.com/cypholab/evilact

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-alias

https://github.com/arashiyans/CVE-2025-55182-CVE-2025-66478

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/grp-ops/react2shell

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/ayoub-intigriti/react2shell-cve

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-pnp

https://github.com/lincemorado97/CVE-2025-55182_CVE-2025-66478

https://github.com/emredavut/CVE-2025-55182

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-hoisting

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-15x

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tag-latest

https://github.com/zhixiangyao/CVE-2025-66478-Exploit-PoC

https://github.com/Saad-Ayady/react2shellNSE

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-devdeps

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/abhirajranjan/cve-2025-66478

https://github.com/wangxso/CVE-2025-66478-POC

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/DavionGowie/-vercel-application-is-vulnerable-to-CVE-2025-66478.

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-turborepo

https://github.com/MoisesTapia/http-react2shell

https://github.com/shamo0/react2shell-PoC

https://github.com/changgun-lee/Next.js-RSC-RCE-Scanner-CVE-2025-66478

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/Code42Cate/nexts-cve-2025-66478-exploit

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-overrides

https://github.com/namest504/CVE-2025-66478-Exploit-Poc

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-shrinkwrap

https://github.com/xiaopeng-ye/react2shell-detector

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-build-metadata

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-packagemanager-field

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/mattcbarrett/check-cve-2025-66478

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-caret

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-git-dep

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-zero-installs

https://github.com/aiexz/CVE-2025-66478-kinda-waf

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-rsc-webpack

https://github.com/Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-no-lockfile

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-berry

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-patch-package

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-bun

https://github.com/vercel-labs/fix-react2shell-next

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces

https://github.com/mounta11n/CHECK-CVE-2025-55182-AND-CVE-2025-66478

https://github.com/ExpTechTW/CVE-2025-66478

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-transitive

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/nehkark/CVE-2025-55182

https://github.com/Jibaru/CVE-2025-66478-github-patcher

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/freeqaz/react2shell

https://github.com/DavionGowie/-vercel-prod.yml-application-is-vulnerable-to-CVE-2025-66478.

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-calcom-yarn-monorepo

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-yarn-workspaces

https://github.com/hidden-investigations/react2shell-scanner

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-14x

https://github.com/shyambhanushali/React2Shell

https://github.com/C00LN3T/React2Shell

https://github.com/FurkanKAYAPINAR/ReactNext2Shell

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-16x

https://github.com/enesbuyuk/react2shell-security-tool

https://github.com/Mustafa1p/Next.js-RCE-Scanner---CVE-2025-55182-CVE-2025-66478

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm

https://github.com/ToritoIO/Torito-R2S

https://github.com/abtonc/next-cve-2025-66478

https://github.com/gagaltotal/tot-react-rce-CVE-2025-55182

https://github.com/Rhyru9/CVE-2025-66478

https://github.com/strainxx/react2shell-honeypot

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-lockfile-mismatch

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-peer-conflict

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-catalog

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-resolutions

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-range

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-nested-versions

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-dub-pnpm-monorepo

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-overrides

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-optional-deps

https://github.com/alessiodos/react2shell-scanner

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tilde

https://github.com/Letalandroid/cve-2025-66478_rce_vulnerable

https://github.com/abdozkaya/rsc-security-auditor

https://github.com/ancs21/react2shell-scanner-rust

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm-symlinks

https://github.com/sumanrox/rschunter

https://github.com/assetnote/react2shell-scanner

https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-v-prefix

linux@activitypub.awakari.com at 2025-12-15T19:35:00.000Z ## Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components CVE-2025-55182 (also referred to as React2Shell and includes CVE-2025-66478, which was merged into it) is...


Origin | Interest | Match ##

linux@activitypub.awakari.com at 2025-12-15T19:35:00.000Z ## Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components CVE-2025-55182 (also referred to as React2Shell and includes CVE-2025-66478, which was merged into it) is...

#Microsoft #Security

Origin | Interest | Match ##

Kubernetes@activitypub.awakari.com at 2025-12-15T19:35:00.000Z ## Defending against the CVE-2025-55182 (React2Shell) vulnerability in React Server Components CVE-2025-55182 (also referred to as React2Shell and includes CVE-2025-66478, which was merged into it) is...


Origin | Interest | Match ##

beyondmachines1@infosec.exchange at 2025-12-14T11:01:31.000Z ##

0G Foundation reports $520,000 security breach through exploitation of critical Next.js flaw

The 0G Foundation suffered a $520,000 cryptocurrency theft after attackers exploited a critical Next.js vulnerability (CVE-2025-66478) involving insecure deserialization, which enabled arbitrary code execution and access to a locally-stored private key on an AliCloud server. The attackers then conducted lateral movement across the infrastructure, compromised the rewards distribution contract using the stolen key, and laundered the funds through Tornado Cash.

**When unpatched flaws have real monetary vulnerabilities**
#cybersecurity #infosec #incident #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-14282
(0 None)

EPSS: 0.00%

1 posts

N/A

harrysintonen@infosec.exchange at 2025-12-16T15:59:33.000Z ##

A privilege escalation in Dropbear (CVE-2025-14282) allows any authenticated user to run arbitrary commands as root. The vulnerability affects versions 2024.84 to 2025.88. Dropbear release 2025.89 fixes the vulnerability.

A mitigation is to run dropbear without unix socket forwarding by adding the -j option.

openwall.com/lists/oss-securit

#CVE_2025_14282 #infosec #cybersecurity

##

beyondmachines1@infosec.exchange at 2025-12-16T09:01:32.000Z ##

Critical authentication bypass and multiple flaws discovered in FreePBX VoIP platform

Security researchers discovered three critical vulnerabilities in FreePBX affecting authentication, database security, and file uploads, with the most severe (CVE-2025-66039,) allowing authentication bypass that can be chained with SQL injection and file upload flaws to achieve complete system compromise. Patches have been released as of December 2025.

**Make sure all FreePBX management and login interfaces are are isolated from the internet and only accessible from trusted networks. Plan a quick update to the latest patched versions (16.0.92/17.0.6 or newer), verify your authentication type is set to 'usermanager' instead of 'webserver', then reboot the system to clear any potentially compromised sessions. Finally, investigate for possible indicators of compromise.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-67736
(0 None)

EPSS: 0.04%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-16T05:00:00.000Z ##

CVE-2025-67736 - Authenticated SQL Injection in FreePBX tts (Text To Speech) module cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-66449
(0 None)

EPSS: 0.06%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-16T05:00:00.000Z ##

CVE-2025-66449 - ConvertX has Path Traversal that leads to Arbitrary File Write and Arbitrary Code Execution cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67874
(0 None)

EPSS: 0.04%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-16T02:30:00.000Z ##

CVE-2025-67874 - ChurchCRM has plaintext password return in response cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-67751
(0 None)

EPSS: 0.02%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-12-16T02:30:00.000Z ##

CVE-2025-67751 - ChurchCRM has SQL Injection in Event Editor via `EN_tyid` Parameter caused by an Incomplete Fix cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59947
(0 None)

EPSS: 0.04%

2 posts

N/A

CVE-2025-43529
(0 None)

EPSS: 0.00%

6 posts

N/A

DarkWebInformer@infosec.exchange at 2025-12-15T21:51:59.000Z ##

CISA KEV Catalog has added 2 more vulnerabilities

CVE-2025-14611: Gladinet CentreStack and Triofox Hard Coded Cryptographic Vulnerability

CVSS: 7.1

CVE-2025-43529: Apple Multiple Products Use-After-Free WebKit Vulnerability

darkwebinformer.com/cisa-kev-c

##

cisakevtracker@mastodon.social at 2025-12-15T19:01:18.000Z ##

CVE ID: CVE-2025-43529
Vendor: Apple
Product: Multiple Products
Date Added: 2025-12-15
Notes: support.apple.com/en-us/125884 ; support.apple.com/en-us/125892 ; support.apple.com/en-us/125885 ; support.apple.com/en-us/125886 ; support.apple.com/en-us/125889 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

jos1264@social.skynetcloud.site at 2025-12-15T12:00:01.000Z ##

Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529) helpnetsecurity.com/2025/12/15 #securityupdate #Don'tmiss #Hotstuff #0-day #Apple #macOS #News #iOS

##

ljrk@todon.eu at 2025-12-14T22:59:59.000Z ##

Huh, I somehow missed this CVE:
mastodon.social/@verbrecher/11
Thx to for the pointer @verbrecher

CVE-2025-14174 is related to this commit in the ANGLE repo:
github.com/google/angle/commit

For CVE-2025-43529 there's much less info.

##

beyondmachines1@infosec.exchange at 2025-12-14T08:01:31.000Z ##

Apple patches two actively exploited WebKit flaws

Apple released security updates across all major operating systems patching over 50 vulnerabilities, including two actively exploited WebKit zero-days (CVE-2025-43529 and CVE-2025-14174) used in targeted spyware attacks against individuals. The updates also address flaws enabling privilege escalation, Gatekeeper bypass, sandbox escape, and unauthorized access to sensitive user data.

**This one is important and urgent. The update fixes two actively exploited flaws and Google and Apple don't share any technical details. So it's very smart to update your Apple ecosystem (all iPhones, iPads, and Mac computers). You may not think you are important enough for a targeted attack, but the flaws will become common knowledge soon. And then everyone becomes a target.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

decio@infosec.exchange at 2025-12-13T11:53:15.000Z ##

[VULN] "Sécurité : Apple comble deux failles « zero-day » avec iOS 26.2 et macOS 26.2"

"La première (CVE-2025-43529) concerne WebKit, le moteur de rendu de Safari. Il s'agit d'une faille de type use-after-free qui permet l'exécution de code arbitraire simplement en traitant un contenu web malveillant. La seconde (CVE-2025-14174) est une corruption de mémoire identifiée non seulement par les équipes d'Apple, mais aussi par le Threat Analysis Group de Google.

Fait intéressant, Google a également dû corriger Chrome en urgence mercredi dernier pour une faille similaire..."
👇
macg.co/ios/2025/12/securite-a
⬇️
cve.circl.lu/vuln/CVE-2025-141

💬
⬇️
infosec.pub/post/38999452

#Cyberveille #vuln #webkit #apple

##

Visit counter For Websites