##
Updated at UTC 2025-12-28T03:11:05.139568
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-66738 | 8.8 | 0.04% | 1 | 0 | 2025-12-27T16:15:52.240000 | An issue in Yealink T21P_E2 Phone 52.84.0.15 allows a remote normal privileged a | |
| CVE-2025-54322 | 10.0 | 0.00% | 1 | 1 | 2025-12-27T14:15:49.547000 | Xspeeder SXZOS through 2025-12-26 allows root remote code execution via base64-e | |
| CVE-2025-68952 | 0 | 0.33% | 1 | 0 | 2025-12-27T01:15:42.853000 | Eigent is a multi-agent Workforce. In version 0.0.60, a 1-click Remote Code Exec | |
| CVE-2025-68668 | 9.9 | 0.08% | 2 | 0 | 2025-12-27T01:08:46 | ### Impact A sandbox bypass vulnerability exists in the Python Code Node that us | |
| CVE-2025-25341 | 7.5 | 0.02% | 1 | 0 | 2025-12-26T19:47:35 | A vulnerability exists in the libxmljs 1.0.11 when parsing a specially crafted X | |
| CVE-2025-67015 | 7.5 | 0.03% | 3 | 0 | 2025-12-26T18:30:32 | Incorrect access control in Comtech EF Data CDM-625 / CDM-625A Advanced Satellit | |
| CVE-2025-57403 | 7.5 | 0.36% | 3 | 0 | 2025-12-26T18:30:27 | Cola Dnslog v1.3.2 is vulnerable to Directory Traversal. When a DNS query for a | |
| CVE-2025-67014 | 7.5 | 0.06% | 1 | 0 | 2025-12-26T18:30:27 | Incorrect access control in DEV Systemtechnik GmbH DEV 7113 RF over Fiber Distri | |
| CVE-2025-13158 | 0 | 0.19% | 3 | 0 | 2025-12-26T16:15:43.263000 | Prototype pollution vulnerability in apidoc-core versions 0.2.0 and all subseque | |
| CVE-2025-64645 | 7.7 | 0.01% | 1 | 0 | 2025-12-26T15:30:28 | IBM Concert 1.0.0 through 2.1.0 could allow a local user to escalate their privi | |
| CVE-2025-12771 | 7.8 | 0.01% | 3 | 0 | 2025-12-26T15:30:23 | IBM Concert 1.0.0 through 2.1.0 is vulnerable to a stack-based buffer overflow, | |
| CVE-2025-13915 | 9.8 | 0.31% | 4 | 0 | 2025-12-26T14:15:58.193000 | IBM API Connect 10.0.8.0 through 10.0.8.5, and 10.0.11.0 could allow a remote at | |
| CVE-2025-67450 | 7.8 | 0.01% | 2 | 0 | 2025-12-26T07:15:45.850000 | Due to insecure library loading in the Eaton UPS Companion software executable, | |
| CVE-2025-59887 | 8.6 | 0.02% | 2 | 0 | 2025-12-26T07:15:45.047000 | Improper authentication of library files in the Eaton UPS Companion software ins | |
| CVE-2025-62578 | None | 0.01% | 1 | 0 | 2025-12-26T06:30:38 | DVP-12SE - Modbus/TCP Cleartext Transmission of Sensitive Information | |
| CVE-2025-68945 | 5.8 | 0.03% | 2 | 0 | 2025-12-26T04:15:41.507000 | In Gitea before 1.21.2, an anonymous user can visit a private user's project. | |
| CVE-2025-68937 | None | 0.06% | 2 | 0 | 2025-12-26T03:31:17 | Forgejo before 13.0.2 allows attackers to write to unintended files, and possibl | |
| CVE-2025-15092 | 8.8 | 0.04% | 3 | 0 | 2025-12-26T03:30:21 | A vulnerability was identified in UTT 进取 512W up to 1.7.7-171114. Impacted is th | |
| CVE-2025-68939 | 8.2 | 0.04% | 1 | 0 | 2025-12-26T03:15:50.653000 | Gitea before 1.23.0 allows attackers to add attachments with forbidden file exte | |
| CVE-2025-15090 | 8.8 | 0.04% | 3 | 0 | 2025-12-26T00:30:18 | A vulnerability was found in UTT 进取 512W up to 1.7.7-171114. This vulnerability | |
| CVE-2025-15091 | 8.8 | 0.04% | 3 | 0 | 2025-12-26T00:30:18 | A vulnerability was determined in UTT 进取 512W up to 1.7.7-171114. This issue aff | |
| CVE-2025-15089 | 8.8 | 0.04% | 1 | 0 | 2025-12-26T00:30:18 | A vulnerability has been found in UTT 进取 512W up to 1.7.7-171114. This affects t | |
| CVE-2025-15082 | 5.3 | 0.03% | 2 | 0 | 2025-12-25T18:30:21 | A vulnerability was found in TOZED ZLT M30s up to 1.47. Impacted is an unknown f | |
| CVE-2025-15081 | 6.3 | 0.84% | 2 | 0 | 2025-12-25T15:30:20 | A vulnerability has been found in JD Cloud BE6500 4.4.1.r4308. This issue affect | |
| CVE-2025-66377 | 7.5 | 0.03% | 1 | 0 | 2025-12-25T06:30:37 | Pexip Infinity before 39.0 has Missing Authentication for a Critical Function in | |
| CVE-2025-15076 | 7.3 | 0.06% | 2 | 0 | 2025-12-25T04:15:43.287000 | A weakness has been identified in Tenda CH22 1.0.0.1. Impacted is an unknown fun | |
| CVE-2025-14879 | 9.8 | 0.15% | 2 | 0 | 2025-12-24T15:19:01.640000 | A weakness has been identified in Tenda WH450 1.0.0.18. Affected is an unknown f | |
| CVE-2025-68664 | 9.3 | 0.05% | 25 | 1 | 2025-12-24T15:16:02.507000 | LangChain is a framework for building agents and LLM-powered applications. Prior | |
| CVE-2025-64468 | 7.8 | 0.02% | 1 | 0 | 2025-12-24T15:11:39.433000 | There is a use-after-free vulnerability in sentry!sentry_span_set_data() when pa | |
| CVE-2025-64465 | 7.8 | 0.02% | 1 | 0 | 2025-12-24T15:11:06.627000 | There is an out of bounds read vulnerability in NI LabVIEW in lvre!DataSizeTDR() | |
| CVE-2025-14900 | 4.7 | 0.03% | 1 | 0 | 2025-12-24T15:01:29.060000 | A security vulnerability has been detected in CodeAstro Real Estate Management S | |
| CVE-2025-15047 | 9.8 | 0.09% | 1 | 0 | 2025-12-24T00:30:27 | A vulnerability was found in Tenda WH450 1.0.0.18. This affects an unknown funct | |
| CVE-2025-15048 | 7.3 | 1.93% | 1 | 0 | 2025-12-23T23:15:44.167000 | A vulnerability was determined in Tenda WH450 1.0.0.18. This impacts an unknown | |
| CVE-2025-15046 | 9.8 | 0.09% | 1 | 0 | 2025-12-23T22:15:51.677000 | A vulnerability has been found in Tenda WH450 1.0.0.18. The impacted element is | |
| CVE-2025-14922 | 7.8 | 0.21% | 1 | 0 | 2025-12-23T21:30:41 | Hugging Face Diffusers CogView4 Deserialization of Untrusted Data Remote Code Ex | |
| CVE-2025-14926 | 7.8 | 0.07% | 1 | 0 | 2025-12-23T21:30:41 | Hugging Face Transformers SEW convert_config Code Injection Remote Code Executio | |
| CVE-2025-14931 | 10.0 | 1.40% | 1 | 0 | 2025-12-23T21:30:41 | Hugging Face smolagents Remote Python Executor Deserialization of Untrusted Data | |
| CVE-2025-14927 | 7.8 | 0.07% | 1 | 0 | 2025-12-23T21:30:41 | Hugging Face Transformers SEW-D convert_config Code Injection Remote Code Execut | |
| CVE-2025-14930 | 7.8 | 0.21% | 1 | 0 | 2025-12-23T21:30:41 | Hugging Face Transformers GLM4 Deserialization of Untrusted Data Remote Code Exe | |
| CVE-2025-15045 | 9.8 | 0.09% | 1 | 0 | 2025-12-23T21:30:41 | A flaw has been found in Tenda WH450 1.0.0.18. The affected element is an unknow | |
| CVE-2025-15044 | 9.8 | 0.09% | 1 | 0 | 2025-12-23T21:30:41 | A vulnerability was detected in Tenda WH450 1.0.0.18. Impacted is an unknown fun | |
| CVE-2025-14928 | 7.8 | 0.07% | 1 | 0 | 2025-12-23T21:30:40 | Hugging Face Transformers HuBERT convert_config Code Injection Remote Code Execu | |
| CVE-2025-14925 | 7.8 | 0.21% | 1 | 1 | 2025-12-23T21:30:40 | Hugging Face Accelerate Deserialization of Untrusted Data Remote Code Execution | |
| CVE-2025-14921 | 7.8 | 0.21% | 1 | 0 | 2025-12-23T21:30:40 | Hugging Face Transformers Transformer-XL Model Deserialization of Untrusted Data | |
| CVE-2025-29228 | 9.8 | 0.27% | 1 | 0 | 2025-12-23T21:30:28 | Linksys E5600 V1.1.0.26 is vulnerable to command injection in the runtime.macClo | |
| CVE-2025-14929 | 7.8 | 0.21% | 1 | 0 | 2025-12-23T21:15:48.240000 | Hugging Face Transformers X-CLIP Checkpoint Conversion Deserialization of Untrus | |
| CVE-2025-14924 | 7.8 | 0.21% | 1 | 0 | 2025-12-23T21:15:47.600000 | Hugging Face Transformers megatron_gpt2 Deserialization of Untrusted Data Remote | |
| CVE-2025-14920 | 7.8 | 0.21% | 1 | 0 | 2025-12-23T21:15:47.183000 | Hugging Face Transformers Perceiver Model Deserialization of Untrusted Data Remo | |
| CVE-2025-33223 | 9.8 | 0.06% | 1 | 0 | 2025-12-23T18:30:35 | NVIDIA Isaac Launchable contains a vulnerability where an attacker could cause a | |
| CVE-2025-33224 | 9.8 | 0.06% | 1 | 0 | 2025-12-23T18:30:35 | NVIDIA Isaac Launchable contains a vulnerability where an attacker could cause a | |
| CVE-2025-33222 | 9.8 | 0.06% | 1 | 0 | 2025-12-23T18:30:35 | NVIDIA Isaac Launchable contains a vulnerability where an attacker could exploit | |
| CVE-2025-45493 | 6.5 | 3.38% | 1 | 0 | 2025-12-23T18:30:35 | Netgear EX8000 V1.0.0.126 is vulnerable to Command Injection via the iface param | |
| CVE-2025-68381 | 6.5 | 0.05% | 1 | 0 | 2025-12-23T17:42:32.230000 | Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated | |
| CVE-2025-66522 | 6.3 | 0.03% | 1 | 0 | 2025-12-23T17:33:47.433000 | A stored cross-site scripting (XSS) vulnerability exists in the Digital IDs func | |
| CVE-2025-50526 | 9.8 | 0.29% | 1 | 0 | 2025-12-23T17:15:48.060000 | Netgear EX8000 V1.0.0.126 was discovered to contain a command injection vulnerab | |
| CVE-2025-68475 | 7.5 | 0.08% | 1 | 0 | 2025-12-23T16:01:13 | Hi Fedify team! 👋 Thank you for your work on Fedify—it's a fantastic library fo | |
| CVE-2025-68615 | 9.8 | 0.02% | 2 | 0 | 2025-12-23T14:51:52.650000 | net-snmp is a SNMP application library, tools and daemon. Prior to versions 5.9. | |
| CVE-2025-68613 | 9.9 | 3.55% | 3 | 23 | template | 2025-12-23T14:51:52.650000 | n8n is an open source workflow automation platform. Versions starting with 0.211 |
| CVE-2023-53973 | 8.4 | 0.01% | 1 | 0 | 2025-12-23T14:51:52.650000 | Zillya Total Security 3.0.2367.0 contains a privilege escalation vulnerability t | |
| CVE-2025-14300 | 0 | 0.05% | 1 | 0 | 2025-12-23T14:51:52.650000 | The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper a | |
| CVE-2023-52163 | 5.9 | 17.01% | 4 | 0 | 2025-12-23T12:31:24 | Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injectio | |
| CVE-2025-37164 | 10.0 | 77.21% | 2 | 2 | template | 2025-12-23T12:15:45.053000 | A remote code execution issue exists in HPE OneView. |
| CVE-2025-65857 | 7.5 | 0.03% | 1 | 1 | 2025-12-23T00:30:39 | An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.00080 | |
| CVE-2023-53974 | 7.5 | 0.05% | 1 | 0 | 2025-12-23T00:30:38 | D-Link DSL-124 ME_1.00 contains a configuration file disclosure vulnerability th | |
| CVE-2025-14882 | None | 0.04% | 1 | 0 | 2025-12-20T17:41:17 | An API endpoint allowed access to sensitive files from other users by knowing th | |
| CVE-2025-63389 | None | 0.30% | 1 | 0 | 2025-12-20T05:37:50 | A critical authentication bypass vulnerability exists in Ollama platform's API e | |
| CVE-2025-14299 | None | 0.07% | 1 | 0 | 2025-12-20T03:31:40 | The HTTPS server on Tapo C200 V3 does not properly validate the Content-Length h | |
| CVE-2025-8065 | None | 0.03% | 1 | 0 | 2025-12-20T03:31:40 | A buffer overflow vulnerability exists in the ONVIF XML parser of Tapo C200 V3. | |
| CVE-2025-63390 | 5.3 | 0.06% | 1 | 0 | 2025-12-20T00:31:32 | An authentication bypass vulnerability exists in AnythingLLM v1.8.5 in via the / | |
| CVE-2025-68161 | None | 0.04% | 2 | 0 | 2025-12-19T22:08:03 | The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does | |
| CVE-2025-14964 | 9.8 | 0.10% | 1 | 0 | 2025-12-19T21:30:26 | A vulnerability has been found in TOTOLINK T10 4.1.8cu.5083_B20200521. This affe | |
| CVE-2025-14733 | 9.8 | 36.33% | 8 | 3 | 2025-12-19T21:30:19 | An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remot | |
| CVE-2025-66908 | 5.3 | 0.05% | 1 | 0 | 2025-12-19T18:32:25 | Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an improper file t | |
| CVE-2025-66909 | 7.5 | 0.10% | 1 | 0 | 2025-12-19T18:32:24 | Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an image decompres | |
| CVE-2025-65565 | 7.5 | 0.06% | 1 | 0 | 2025-12-19T18:32:19 | A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp | |
| CVE-2025-65564 | 7.5 | 0.06% | 1 | 0 | 2025-12-19T18:32:19 | A denial-of-service vulnerability exists in the omec-upf (upf-epc-pfcpiface) in | |
| CVE-2025-52692 | 8.8 | 0.02% | 1 | 0 | 2025-12-19T18:31:18 | Successful exploitation of the vulnerability could allow an attacker with local | |
| CVE-2025-65568 | 7.5 | 0.05% | 1 | 0 | 2025-12-19T18:15:50.713000 | A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp | |
| CVE-2025-65567 | 7.5 | 0.05% | 1 | 0 | 2025-12-19T18:15:50.570000 | A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface comp | |
| CVE-2025-14847 | 7.5 | 0.04% | 22 | 8 | 2025-12-19T18:00:18.330000 | Mismatched length fields in Zlib compressed protocol headers may allow a read of | |
| CVE-2025-13008 | 0 | 0.05% | 2 | 0 | 2025-12-19T18:00:18.330000 | An information disclosure vulnerability in M-Files Server before versions 25.12. | |
| CVE-2025-14881 | 0 | 0.04% | 1 | 0 | 2025-12-19T18:00:18.330000 | Multiple API endpoints allowed access to sensitive files from other users by kno | |
| CVE-2025-1928 | 9.1 | 0.06% | 1 | 0 | 2025-12-19T18:00:18.330000 | Improper Restriction of Excessive Authentication Attempts vulnerability in Resta | |
| CVE-2025-11747 | 6.4 | 0.03% | 1 | 0 | 2025-12-19T18:00:18.330000 | The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site | |
| CVE-2025-65041 | 10.0 | 0.08% | 2 | 0 | 2025-12-19T18:00:18.330000 | Improper authorization in Microsoft Partner Center allows an unauthorized attack | |
| CVE-2025-68398 | 9.1 | 0.15% | 2 | 0 | 2025-12-19T18:00:18.330000 | Weblate is a web based localization tool. In versions prior to 5.15.1, it was po | |
| CVE-2025-34452 | 0 | 0.42% | 1 | 0 | 2025-12-19T18:00:18.330000 | Streama versions 1.10.0 through 1.10.5 and prior to commit b7c8767 contain a com | |
| CVE-2025-64236 | 9.8 | 0.09% | 1 | 0 | 2025-12-19T18:00:18.330000 | Authentication Bypass Using an Alternate Path or Channel vulnerability in Amento | |
| CVE-2025-14738 | 0 | 0.07% | 1 | 0 | 2025-12-19T18:00:18.330000 | Improper authentication vulnerability in TP-Link WA850RE (httpd modules) allows | |
| CVE-2025-40602 | 6.6 | 2.09% | 1 | 2 | 2025-12-19T13:57:43.150000 | A local privilege escalation vulnerability due to insufficient authorization in | |
| CVE-2025-1927 | 7.1 | 0.01% | 1 | 0 | 2025-12-19T12:31:33 | Cross-Site Request Forgery (CSRF) vulnerability in Restajet Information Technolo | |
| CVE-2025-1885 | 5.4 | 0.03% | 1 | 0 | 2025-12-19T12:31:32 | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Restajet In | |
| CVE-2025-14151 | 6.1 | 0.10% | 1 | 0 | 2025-12-19T09:30:39 | The SlimStat Analytics plugin for WordPress is vulnerable to Stored Cross-Site S | |
| CVE-2025-66521 | 6.3 | 0.02% | 1 | 0 | 2025-12-19T09:30:39 | A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com | |
| CVE-2025-66520 | 6.3 | 0.03% | 1 | 0 | 2025-12-19T09:30:39 | A stored cross-site scripting (XSS) vulnerability exists in the Portfolio featur | |
| CVE-2025-68490 | None | 0.00% | 1 | 0 | 2025-12-19T06:30:34 | Rejected reason: Not used | |
| CVE-2025-68489 | None | 0.00% | 1 | 0 | 2025-12-19T06:30:34 | Rejected reason: Not used | |
| CVE-2025-68491 | 0 | 0.00% | 1 | 0 | 2025-12-19T04:16:02.150000 | Rejected reason: Not used | |
| CVE-2025-68488 | 0 | 0.00% | 1 | 0 | 2025-12-19T04:16:01.953000 | Rejected reason: Not used | |
| CVE-2025-68487 | 0 | 0.00% | 1 | 0 | 2025-12-19T04:16:01.883000 | Rejected reason: Not used | |
| CVE-2025-11774 | 8.3 | 0.04% | 2 | 0 | 2025-12-19T03:31:23 | Improper Neutralization of Special Elements used in an OS Command ('OS Command I | |
| CVE-2025-14908 | 6.3 | 0.06% | 1 | 0 | 2025-12-19T03:31:23 | A security flaw has been discovered in JeecgBoot up to 3.9.0. The affected eleme | |
| CVE-2025-14899 | 4.7 | 0.03% | 1 | 0 | 2025-12-19T03:31:23 | A weakness has been identified in CodeAstro Real Estate Management System 1.0. T | |
| CVE-2025-67843 | 8.3 | 0.25% | 1 | 0 | 2025-12-19T03:31:18 | A Server-Side Template Injection (SSTI) vulnerability in the MDX Rendering Engin | |
| CVE-2025-13941 | 8.8 | 0.01% | 1 | 0 | 2025-12-19T03:31:18 | A local privilege escalation vulnerability exists in the Foxit PDF Reader/Editor | |
| CVE-2025-64675 | 8.3 | 0.06% | 1 | 0 | 2025-12-19T00:31:52 | Improper neutralization of input during web page generation ('cross-site scripti | |
| CVE-2025-68382 | 6.5 | 0.05% | 1 | 0 | 2025-12-19T00:31:47 | Out-of-bounds read (CWE-125) allows an unauthenticated remote attacker to perfor | |
| CVE-2025-65037 | 10.0 | 0.10% | 1 | 0 | 2025-12-19T00:31:47 | Improper control of generation of code ('code injection') in Azure Container App | |
| CVE-2025-64663 | 10.0 | 0.06% | 1 | 0 | 2025-12-19T00:31:47 | Custom Question Answering Elevation of Privilege Vulnerability | |
| CVE-2025-13427 | None | 0.14% | 1 | 0 | 2025-12-19T00:31:46 | An authentication bypass vulnerability in Google Cloud Dialogflow CX Messenger a | |
| CVE-2025-64677 | 8.2 | 0.07% | 1 | 0 | 2025-12-19T00:31:46 | Improper neutralization of input during web page generation ('cross-site scripti | |
| CVE-2025-64676 | 7.2 | 0.10% | 1 | 0 | 2025-12-19T00:31:46 | '.../...//' in Microsoft Purview allows an authorized attacker to execute code o | |
| CVE-2025-14739 | None | 0.02% | 1 | 0 | 2025-12-18T21:31:50 | Access of Uninitialized Pointer vulnerability in TP-Link WR940N and WR941ND allo | |
| CVE-2025-14884 | 7.2 | 0.27% | 2 | 0 | 2025-12-18T18:30:38 | A vulnerability was detected in D-Link DIR-605 202WWB03. Affected by this issue | |
| CVE-2025-14896 | 7.5 | 0.04% | 1 | 0 | 2025-12-18T18:30:37 | due to insufficient sanitazation in Vega’s `convert()` function when `safeMode` | |
| CVE-2025-14878 | 9.8 | 0.15% | 2 | 0 | 2025-12-18T18:30:37 | A security flaw has been discovered in Tenda WH450 1.0.0.18. This impacts an unk | |
| CVE-2025-14737 | None | 0.73% | 1 | 0 | 2025-12-18T18:30:37 | Command Injection vulnerability in TP-Link WA850RE (httpd modules) allows authen | |
| CVE-2025-63391 | 7.5 | 0.10% | 1 | 0 | 2025-12-18T18:30:37 | An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api | |
| CVE-2025-59374 | 9.8 | 35.96% | 3 | 0 | 2025-12-18T15:42:03.790000 | "UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were | |
| CVE-2025-20393 | 10.0 | 6.77% | 7 | 4 | 2025-12-18T15:41:16.840000 | Cisco is aware of a potential vulnerability. Cisco is currently investigat | |
| CVE-2025-64466 | 7.8 | 0.02% | 1 | 0 | 2025-12-18T15:30:52 | There is an out of bounds read vulnerability in NI LabVIEW in lvre!ExecPostedPro | |
| CVE-2025-64469 | 7.8 | 0.02% | 1 | 0 | 2025-12-18T15:30:51 | There is a stack-based buffer overflow vulnerability in NI LabVIEW in LVResFile: | |
| CVE-2025-64467 | 7.8 | 0.02% | 1 | 0 | 2025-12-18T15:30:45 | There is an out of bounds read vulnerability in NI LabVIEW in LVResFile::FindRsr | |
| CVE-2025-13110 | 4.3 | 0.03% | 1 | 0 | 2025-12-18T15:07:18.427000 | The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is | |
| CVE-2025-68154 | 8.1 | 0.06% | 1 | 0 | 2025-12-16T22:37:26 | ## Summary The `fsSize()` function in `systeminformation` is vulnerable to **OS | |
| CVE-2025-46295 | 9.8 | 0.33% | 1 | 0 | 2025-12-16T21:32:02 | Apache Commons Text versions prior to 1.10.0 included interpolation features tha | |
| CVE-2025-59718 | 9.8 | 5.95% | 2 | 3 | 2025-12-16T21:30:51 | A improper verification of cryptographic signature vulnerability in Fortinet For | |
| CVE-2025-68260 | None | 0.02% | 2 | 0 | 2025-12-16T15:30:56 | In the Linux kernel, the following vulnerability has been resolved: rust_binder | |
| CVE-2025-9612 | 5.1 | 0.01% | 1 | 0 | 2025-12-11T15:31:38 | An issue was discovered in the PCI Express (PCIe) Integrity and Data Encryption | |
| CVE-2025-59719 | 9.8 | 0.07% | 1 | 1 | 2025-12-09T18:30:52 | An improper verification of cryptographic signature vulnerability in Fortinet Fo | |
| CVE-2025-55182 | 10.0 | 46.72% | 2 | 100 | template | 2025-12-09T16:53:25 | ### Impact There is an unauthenticated remote code execution vulnerability in R |
| CVE-2025-37899 | 7.8 | 0.01% | 1 | 2 | 2025-12-06T22:15:50.277000 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix | |
| CVE-2025-55753 | 7.5 | 0.08% | 1 | 0 | 2025-12-05T21:31:27 | An integer overflow in the case of failed ACME certificate renewal leads, after | |
| CVE-2025-65945 | 7.5 | 0.01% | 1 | 1 | 2025-12-04T22:50:04 | ### Overview An improper signature verification vulnerability exists when using | |
| CVE-2025-66416 | 0 | 0.10% | 1 | 0 | 2025-12-04T17:15:25.860000 | The MCP Python SDK, called `mcp` on PyPI, is a Python implementation of the Mode | |
| CVE-2025-66478 | 0 | 0.00% | 1 | 100 | 2025-12-03T18:15:47.200000 | Rejected reason: This CVE is a duplicate of CVE-2025-55182. | |
| CVE-2025-12480 | 9.1 | 78.02% | 1 | 0 | template | 2025-11-14T02:00:02.350000 | Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access |
| CVE-2025-63666 | 9.8 | 0.09% | 1 | 1 | 2025-11-13T18:31:03 | Tenda AC15 v15.03.05.18_multi) issues an authentication cookie that exposes the | |
| CVE-2025-9242 | 9.8 | 73.45% | 1 | 2 | template | 2025-11-13T15:31:32 | An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remot |
| CVE-2025-11953 | 9.8 | 0.49% | 1 | 3 | 2025-11-11T17:15:38.977000 | The Metro Development Server, which is opened by the React Native Community CLI, | |
| CVE-2025-59287 | 9.8 | 75.42% | 1 | 22 | template | 2025-11-11T15:32:22 | Deserialization of untrusted data in Windows Server Update Service allows an una |
| CVE-2025-31324 | 10.0 | 40.17% | 1 | 19 | template | 2025-10-31T21:56:14.103000 | SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper a |
| CVE-2025-8088 | 8.8 | 3.40% | 1 | 28 | 2025-10-30T15:50:59.680000 | A path traversal vulnerability affecting the Windows version of WinRAR allows th | |
| CVE-2020-12812 | 9.8 | 45.02% | 7 | 0 | 2025-10-24T12:53:49.213000 | An improper authentication vulnerability in SSL VPN in FortiOS 6.4.0, 6.2.0 to 6 | |
| CVE-2025-23006 | 9.8 | 56.66% | 1 | 0 | 2025-10-22T00:34:17 | Pre-authentication deserialization of untrusted data vulnerability has been iden | |
| CVE-2024-55591 | 9.8 | 94.14% | 2 | 10 | template | 2025-10-22T00:34:16 | An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-2 |
| CVE-2024-53704 | 9.8 | 93.82% | 1 | 1 | template | 2025-10-22T00:34:16 | An Improper Authentication vulnerability in the SSLVPN authentication mechanism |
| CVE-2018-0802 | 7.8 | 94.07% | 1 | 7 | 2025-10-22T00:31:30 | Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Offic | |
| CVE-2017-11882 | 7.8 | 94.38% | 1 | 38 | 2025-10-22T00:16:02.450000 | Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Micr | |
| CVE-2025-4609 | 9.7 | 0.12% | 1 | 0 | 2025-08-25T15:33:03 | Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome | |
| CVE-2025-50165 | 9.8 | 3.84% | 1 | 1 | 2025-08-12T18:31:39 | Untrusted pointer dereference in Microsoft Graphics Component allows an unauthor | |
| CVE-2025-53786 | 8.0 | 0.16% | 1 | 1 | 2025-08-06T20:23:37.600000 | On April 18th 2025, Microsoft announced Exchange Server Security Changes for Hyb | |
| CVE-2025-24294 | 5.3 | 0.06% | 1 | 0 | 2025-07-15T22:56:20 | A denial of service vulnerability has been discovered in the resolv gem bundled | |
| CVE-2025-30023 | 9.1 | 1.92% | 1 | 0 | 2025-07-11T06:30:36 | The communication protocol used between client and server had a flaw that could | |
| CVE-2025-30026 | None | 0.03% | 1 | 0 | 2025-07-11T06:30:36 | The AXIS Camera Station Server had a flaw that allowed to bypass authentication | |
| CVE-2025-6514 | 9.6 | 0.73% | 1 | 2 | 2025-07-10T13:17:30.017000 | mcp-remote is exposed to OS command injection when connecting to untrusted MCP s | |
| CVE-2025-3699 | 9.8 | 0.17% | 1 | 0 | 2025-06-27T12:32:20 | Missing Authentication for Critical Function vulnerability in Mitsubishi Electri | |
| CVE-2025-5499 | 7.3 | 0.11% | 1 | 0 | 2025-06-04T14:54:33.783000 | A vulnerability classified as critical has been found in slackero phpwcms up to | |
| CVE-2025-5378 | 4.3 | 0.03% | 1 | 1 | 2025-05-31T15:30:34 | A vulnerability classified as problematic has been found in Astun Technology iSh | |
| CVE-2025-29970 | 7.8 | 0.07% | 1 | 0 | 2025-05-13T18:31:00 | Use after free in Microsoft Brokering File System allows an authorized attacker | |
| CVE-2025-2039 | 4.7 | 0.10% | 2 | 3 | 2025-03-06T21:31:33 | A vulnerability classified as critical has been found in code-projects Blood Ban | |
| CVE-2024-44067 | 8.4 | 0.04% | 1 | 0 | 2024-08-20T20:35:34.497000 | The T-Head XuanTie C910 CPU in the TH1520 SoC and the T-Head XuanTie C920 CPU in | |
| CVE-2017-5123 | 8.8 | 1.71% | 2 | 8 | 2023-01-30T05:03:17 | Insufficient data validation in waitid allowed an user to escape sandboxes on Li | |
| CVE-2025-9615 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2025-59946 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2025-66203 | 0 | 0.26% | 2 | 0 | N/A | ||
| CVE-2025-14558 | 0 | 0.00% | 1 | 2 | N/A | ||
| CVE-2025-3716 | 0 | 0.00% | 1 | 2 | N/A | ||
| CVE-2026-00001 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-66209 | 0 | 0.57% | 1 | 1 | N/A | ||
| CVE-2025-14269 | 0 | 0.00% | 1 | 1 | N/A | ||
| CVE-2025-14282 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-66387 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-67745 | 0 | 0.02% | 1 | 0 | N/A | ||
| CVE-2025-63821 | 0 | 0.00% | 1 | 1 | N/A | ||
| CVE-2025-63820 | 0 | 0.00% | 1 | 1 | N/A |
updated 2025-12-27T16:15:52.240000
1 posts
🟠 CVE-2025-66738 - High (8.8)
An issue in Yealink T21P_E2 Phone 52.84.0.15 allows a remote normal privileged attacker to execute arbitrary code via a crafted request the ping function of the diagnostic component.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66738/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2025-12-27T14:15:49.547000
1 posts
1 repos
🔴 CVE-2025-54322 - Critical (10)
Xspeeder SXZOS through 2025-12-26 allows root remote code execution via base64-encoded Python code in the chkid parameter to vLogin.py. The title and oIP parameters are also used.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-54322/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2025-12-27T01:15:42.853000
1 posts
CRITICAL: CVE-2025-68952 in eigent-ai Eigent v0.0.60 enables unauthenticated RCE over the network. Patch to 0.0.61 now! Impact: full system compromise, data loss. 🛡️ https://radar.offseq.com/threat/cve-2025-68952-cwe-94-improper-control-of-generati-d00ad68e #OffSeq #CVE202568952 #infosec #vulnerability
##updated 2025-12-27T01:08:46
2 posts
⚠️ CRITICAL: CVE-2025-68668 in n8n-io n8n (v1.0.0–<2.0.0) allows authenticated users to bypass the Python Code Node sandbox & run arbitrary commands. Patch to 2.0.0+ or disable the node for mitigation. Full details: https://radar.offseq.com/threat/cve-2025-68668-cwe-693-protection-mechanism-failur-bcbb4231 #OffSeq #n8n #CVE202568668 #infosec
##🔴 CVE-2025-68668 - Critical (9.9)
n8n is an open source workflow automation platform. From version 1.0.0 to before 2.0.0, a sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. An authenticated user with permission to create or modify workflows can exploi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68668/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2025-12-26T19:47:35
1 posts
🟠 CVE-2025-25341 - High (7.5)
A vulnerability exists in the libxmljs 1.0.11 when parsing a specially crafted XML document. Accessing the internal _ref property on entity_ref and entity_decl nodes causes a segmentation fault, potentially leading to a denial-of-service (DoS).
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-25341/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2025-12-26T18:30:32
3 posts
🟠 CVE-2025-67015 - High (7.5)
Incorrect access control in Comtech EF Data CDM-625 / CDM-625A Advanced Satellite Modem with firmware v2.5.1 allows attackers to change the Administrator password and escalate privileges via sending a crafted POST request to /Forms/admin_access_1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-67015/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##I don't know about this specific device, but these types of devices tend to be used a lot in remote OT systems, often with the management interface exposed, and almost no monitoring. Other similar modems have been successfully exploited ITW for some interesting incidents.
https://www.cve.org/CVERecord?id=CVE-2025-67015
##Incorrect access control in Comtech EF Data CDM-625 / CDM-625A Advanced Satellite Modem with firmware v2.5.1 allows attackers to change the Administrator password and escalate privileges via sending a crafted POST request to
/Forms/admin_access_1.
I don't know about this specific device, but these types of devices tend to be used a lot in remote OT systems, often with the management interface exposed, and almost no monitoring. Other similar modems have been successfully exploited ITW for some interesting incidents.
https://www.cve.org/CVERecord?id=CVE-2025-67015
##Incorrect access control in Comtech EF Data CDM-625 / CDM-625A Advanced Satellite Modem with firmware v2.5.1 allows attackers to change the Administrator password and escalate privileges via sending a crafted POST request to
/Forms/admin_access_1.
updated 2025-12-26T18:30:27
3 posts
🟠 CVE-2025-57403 - High (7.5)
Cola Dnslog v1.3.2 is vulnerable to Directory Traversal. When a DNS query for a TXT record is processed, the application concatenates the requested URL (or a portion of it) directly with a base path using os.path.join. This bypass allows directory...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-57403/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##../ and DNS?! It really is the season of magic.
https://www.cve.org/CVERecord?id=CVE-2025-57403
##Cola Dnslog v1.3.2 is vulnerable to Directory Traversal. When a DNS query for a TXT record is processed, the application concatenates the requested URL (or a portion of it) directly with a base path using
os.path.join. This bypass allows directory traversal or absolute path injection, leading to the potential exposure of sensitive information.
../ and DNS?! It really is the season of magic.
https://www.cve.org/CVERecord?id=CVE-2025-57403
##Cola Dnslog v1.3.2 is vulnerable to Directory Traversal. When a DNS query for a TXT record is processed, the application concatenates the requested URL (or a portion of it) directly with a base path using
os.path.join. This bypass allows directory traversal or absolute path injection, leading to the potential exposure of sensitive information.
updated 2025-12-26T18:30:27
1 posts
🟠 CVE-2025-67014 - High (7.5)
Incorrect access control in DEV Systemtechnik GmbH DEV 7113 RF over Fiber Distribution System 32-0078 H.01 allows unauthenticated attackers to access an administrative endpoint.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-67014/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2025-12-26T16:15:43.263000
3 posts
🔥 CRITICAL: CVE-2025-13158 in apidoc-core (0.2.0+) enables remote prototype pollution via malformed input. Risks: DoS & unpredictable JS app behavior. Audit, sanitize, and isolate now — no patch yet! https://radar.offseq.com/threat/cve-2025-13158-cwe-1321-improperly-controlled-modi-61fce7bb #OffSeq #Vulnerability #JavaScript #SupplyChain
##sev:CRIT prototype pollution in apidoc-core. But worse is the word wrapping without hyphens in the summary.
sev:CRIT prototype pollution in apidoc-core. But worse is the word wrapping without hyphens in the summary.
updated 2025-12-26T15:30:28
1 posts
🟠 CVE-2025-64645 - High (7.7)
IBM Concert 1.0.0 through 2.1.0 could allow a local user to escalate their privileges due to a race condition of a symbolic link.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-64645/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2025-12-26T15:30:23
3 posts
Post-auth BoF in IBM Concert.
##🟠 CVE-2025-12771 - High (7.8)
IBM Concert 1.0.0 through 2.1.0 is vulnerable to a stack-based buffer overflow, caused by improper bounds checking. A local user could overflow the buffer and execute arbitrary code on the system.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-12771/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##Post-auth BoF in IBM Concert.
##updated 2025-12-26T14:15:58.193000
4 posts
🚨 CRITICAL: CVE-2025-13915 in IBM API Connect (10.0.8.0–10.0.8.5, 10.0.11.0) enables remote auth bypass (CWE-305)! No patch yet. Restrict access, monitor logs, and prep for updates. More: https://radar.offseq.com/threat/cve-2025-13915-cwe-305-authentication-bypass-by-pr-11cca0f4 #OffSeq #IBM #Infosec #APIsecurity #CVE202513915
##🔴 CVE-2025-13915 - Critical (9.8)
IBM API Connect 10.0.8.0 through 10.0.8.5, and 10.0.11.0 could allow a remote attacker to bypass authentication mechanisms and gain unauthorized access to the application.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13915/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##sev:CRIT auth bypass in IBM API Connect.
sev:CRIT auth bypass in IBM API Connect.
updated 2025-12-26T07:15:45.850000
2 posts
⚠️ CVE-2025-67450 (HIGH): Eaton UPS Companion software vulnerable to insecure library loading (CWE-427), enabling local arbitrary code execution. Patch urgently via Eaton’s download center. https://radar.offseq.com/threat/cve-2025-67450-cwe-427-uncontrolled-search-path-el-730bb734 #OffSeq #Eaton #Vuln #SysAdmin
##🟠 CVE-2025-67450 - High (7.8)
Due to insecure library loading in the Eaton UPS Companion software executable, an attacker with access to the software package
could perform arbitrary code execution . This security issue has been fixed in the latest version of EUC which is a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-67450/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2025-12-26T07:15:45.047000
2 posts
🚨 HIGH severity (CVSS 8.6) in Eaton UPS Companion Software: CVE-2025-59887 allows local arbitrary code execution via insecure search path. Patch ASAP & restrict install rights. Details: https://radar.offseq.com/threat/cve-2025-59887-cwe-427-uncontrolled-search-path-el-b954d403 #OffSeq #Vuln #Eaton #Cybersecurity
##🟠 CVE-2025-59887 - High (8.6)
Improper authentication of library files in the Eaton UPS Companion software installer could lead to arbitrary code execution of an attacker with the access to the software package. This security issue has been fixed in the latest version of EUC ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59887/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2025-12-26T06:30:38
1 posts
🔒 CVE-2025-62578 (HIGH): Delta Electronics DVP-12SE PLCs transmit Modbus/TCP data in cleartext—risking MITM & command manipulation. No patch yet. Segment networks, restrict Modbus traffic, and monitor closely! https://radar.offseq.com/threat/cve-2025-62578-cwe-319-cleartext-transmission-of-s-5af203d7 #OffSeq #ICS #PLC #CyberSecurity
##updated 2025-12-26T04:15:41.507000
2 posts
That doesn't seem right.
https://www.cve.org/CVERecord?id=CVE-2025-68945
##In Gitea before 1.21.2, an anonymous user can visit a private user's project.
That doesn't seem right.
https://www.cve.org/CVERecord?id=CVE-2025-68945
##In Gitea before 1.21.2, an anonymous user can visit a private user's project.
updated 2025-12-26T03:31:17
2 posts
Forgejo whoopsie.
https://www.cve.org/CVERecord?id=CVE-2025-68937
##Forgejo before 13.0.2 allows attackers to write to unintended files, and possibly obtain server shell access, because of mishandling of out-of-repository symlink destinations for template repositories. This is also fixed for 11 LTS in 11.0.7 and later.
Forgejo whoopsie.
https://www.cve.org/CVERecord?id=CVE-2025-68937
##Forgejo before 13.0.2 allows attackers to write to unintended files, and possibly obtain server shell access, because of mishandling of out-of-repository symlink destinations for template repositories. This is also fixed for 11 LTS in 11.0.7 and later.
updated 2025-12-26T03:30:21
3 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-15076
UTT
https://www.cve.org/CVERecord?id=CVE-2025-15090
https://www.cve.org/CVERecord?id=CVE-2025-15091
https://www.cve.org/CVERecord?id=CVE-2025-15092
TOZED
https://www.cve.org/CVERecord?id=CVE-2025-15082
JD Cloud
https://www.cve.org/CVERecord?id=CVE-2025-15081
cc: @Dio9sys @da_667
##⚠️ HIGH risk: CVE-2025-15092 in UTT 进取 512W (≤1.7.7-171114) — buffer overflow in /goform/ConfigExceptMSN allows remote code execution. Public exploit exists. Isolate devices & monitor traffic! https://radar.offseq.com/threat/cve-2025-15092-buffer-overflow-in-utt-512w-4ff41af4 #OffSeq #Infosec #UTT #CVE202515092
##Tenda
https://www.cve.org/CVERecord?id=CVE-2025-15076
UTT
https://www.cve.org/CVERecord?id=CVE-2025-15090
https://www.cve.org/CVERecord?id=CVE-2025-15091
https://www.cve.org/CVERecord?id=CVE-2025-15092
TOZED
https://www.cve.org/CVERecord?id=CVE-2025-15082
JD Cloud
https://www.cve.org/CVERecord?id=CVE-2025-15081
cc: @Dio9sys @da_667
##updated 2025-12-26T03:15:50.653000
1 posts
🟠 CVE-2025-68939 - High (8.2)
Gitea before 1.23.0 allows attackers to add attachments with forbidden file extensions by editing an attachment name via an attachment API.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68939/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2025-12-26T00:30:18
3 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-15076
UTT
https://www.cve.org/CVERecord?id=CVE-2025-15090
https://www.cve.org/CVERecord?id=CVE-2025-15091
https://www.cve.org/CVERecord?id=CVE-2025-15092
TOZED
https://www.cve.org/CVERecord?id=CVE-2025-15082
JD Cloud
https://www.cve.org/CVERecord?id=CVE-2025-15081
cc: @Dio9sys @da_667
##🔎 CVE-2025-15090: HIGH-severity buffer overflow in UTT 进取 512W (v1.7.7-171114) enables remote code execution—no user interaction needed. PoC exploit code is available. Isolate, monitor, and patch! https://radar.offseq.com/threat/cve-2025-15090-buffer-overflow-in-utt-512w-48838686 #OffSeq #Vulnerability #CyberAlert
##Tenda
https://www.cve.org/CVERecord?id=CVE-2025-15076
UTT
https://www.cve.org/CVERecord?id=CVE-2025-15090
https://www.cve.org/CVERecord?id=CVE-2025-15091
https://www.cve.org/CVERecord?id=CVE-2025-15092
TOZED
https://www.cve.org/CVERecord?id=CVE-2025-15082
JD Cloud
https://www.cve.org/CVERecord?id=CVE-2025-15081
cc: @Dio9sys @da_667
##updated 2025-12-26T00:30:18
3 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-15076
UTT
https://www.cve.org/CVERecord?id=CVE-2025-15090
https://www.cve.org/CVERecord?id=CVE-2025-15091
https://www.cve.org/CVERecord?id=CVE-2025-15092
TOZED
https://www.cve.org/CVERecord?id=CVE-2025-15082
JD Cloud
https://www.cve.org/CVERecord?id=CVE-2025-15081
cc: @Dio9sys @da_667
##🛡️ CVE-2025-15091: HIGH severity buffer overflow in UTT 进取 512W (≤1.7.7-171114). Remote, unauthenticated RCE possible via /goform/formPictureUrl. Public exploit disclosed, no patch yet—segment, monitor, deploy IDS/IPS! https://radar.offseq.com/threat/cve-2025-15091-buffer-overflow-in-utt-512w-a4ed831e #OffSeq #Vuln #IoTSecurity
##Tenda
https://www.cve.org/CVERecord?id=CVE-2025-15076
UTT
https://www.cve.org/CVERecord?id=CVE-2025-15090
https://www.cve.org/CVERecord?id=CVE-2025-15091
https://www.cve.org/CVERecord?id=CVE-2025-15092
TOZED
https://www.cve.org/CVERecord?id=CVE-2025-15082
JD Cloud
https://www.cve.org/CVERecord?id=CVE-2025-15081
cc: @Dio9sys @da_667
##updated 2025-12-26T00:30:18
1 posts
⚠️ CVE-2025-15089: HIGH severity buffer overflow in UTT 进取 512W (≤1.7.7-171114). Remote attackers can exploit wepkey1 in /goform/APSecurity for code execution. Public exploit code is out! Patch or segment devices immediately. https://radar.offseq.com/threat/cve-2025-15089-buffer-overflow-in-utt-512w-d90fd5fc #OffSeq #Vuln #UTT #Security
##updated 2025-12-25T18:30:21
2 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-15076
UTT
https://www.cve.org/CVERecord?id=CVE-2025-15090
https://www.cve.org/CVERecord?id=CVE-2025-15091
https://www.cve.org/CVERecord?id=CVE-2025-15092
TOZED
https://www.cve.org/CVERecord?id=CVE-2025-15082
JD Cloud
https://www.cve.org/CVERecord?id=CVE-2025-15081
cc: @Dio9sys @da_667
##Tenda
https://www.cve.org/CVERecord?id=CVE-2025-15076
UTT
https://www.cve.org/CVERecord?id=CVE-2025-15090
https://www.cve.org/CVERecord?id=CVE-2025-15091
https://www.cve.org/CVERecord?id=CVE-2025-15092
TOZED
https://www.cve.org/CVERecord?id=CVE-2025-15082
JD Cloud
https://www.cve.org/CVERecord?id=CVE-2025-15081
cc: @Dio9sys @da_667
##updated 2025-12-25T15:30:20
2 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-15076
UTT
https://www.cve.org/CVERecord?id=CVE-2025-15090
https://www.cve.org/CVERecord?id=CVE-2025-15091
https://www.cve.org/CVERecord?id=CVE-2025-15092
TOZED
https://www.cve.org/CVERecord?id=CVE-2025-15082
JD Cloud
https://www.cve.org/CVERecord?id=CVE-2025-15081
cc: @Dio9sys @da_667
##Tenda
https://www.cve.org/CVERecord?id=CVE-2025-15076
UTT
https://www.cve.org/CVERecord?id=CVE-2025-15090
https://www.cve.org/CVERecord?id=CVE-2025-15091
https://www.cve.org/CVERecord?id=CVE-2025-15092
TOZED
https://www.cve.org/CVERecord?id=CVE-2025-15082
JD Cloud
https://www.cve.org/CVERecord?id=CVE-2025-15081
cc: @Dio9sys @da_667
##updated 2025-12-25T06:30:37
1 posts
🟠 CVE-2025-66377 - High (7.5)
Pexip Infinity before 39.0 has Missing Authentication for a Critical Function in a product-internal API, allowing an attacker (who already has access to execute code on one node within a Pexip Infinity installation) to impact the operation of othe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66377/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2025-12-25T04:15:43.287000
2 posts
Tenda
https://www.cve.org/CVERecord?id=CVE-2025-15076
UTT
https://www.cve.org/CVERecord?id=CVE-2025-15090
https://www.cve.org/CVERecord?id=CVE-2025-15091
https://www.cve.org/CVERecord?id=CVE-2025-15092
TOZED
https://www.cve.org/CVERecord?id=CVE-2025-15082
JD Cloud
https://www.cve.org/CVERecord?id=CVE-2025-15081
cc: @Dio9sys @da_667
##Tenda
https://www.cve.org/CVERecord?id=CVE-2025-15076
UTT
https://www.cve.org/CVERecord?id=CVE-2025-15090
https://www.cve.org/CVERecord?id=CVE-2025-15091
https://www.cve.org/CVERecord?id=CVE-2025-15092
TOZED
https://www.cve.org/CVERecord?id=CVE-2025-15082
JD Cloud
https://www.cve.org/CVERecord?id=CVE-2025-15081
cc: @Dio9sys @da_667
##updated 2025-12-24T15:19:01.640000
2 posts
CVE-2025-14879 - Tenda WH450 HTTP Request onSSIDChange stack-based overflow https://cvefeed.io/vuln/detail/CVE-2025-14879
##Tenda
https://www.cve.org/CVERecord?id=CVE-2025-14879
D-Link
##updated 2025-12-24T15:16:02.507000
25 posts
1 repos
Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection
https://thehackernews.com/2025/12/critical-langchain-core-vulnerability.html?m=1
> A critical LangChain Core vulnerability (CVE-2025-68664, CVSS 9.3) allows secret theft and prompt injection through unsafe serialization; updates fix
##📢 LangChain: vulnérabilité critique d'injection de sérialisation permet l’exfiltration de secrets (CVE-2025-68664)
📝 Selon un avis GitHub Security Advisory (dépôt LangChain) publié le...
📖 cyberveille : https://cyberveille.ch/posts/2025-12-26-langchain-vulnerabilite-critique-d-injection-de-serialisation-permet-lexfiltration-de-secrets-cve-2025-68664/
🌐 source : https://github.com/langchain-ai/langchain/security/advisories/GHSA-c67j-w6g6-q2cm
#CVE_2025_68664 #IOC #Cyberveille
LangGrinch: Kritische Lücke in LangChain-Core bedroht KI-Agenten
https://t3n.de/news/langgrinch-langchain-core-sicherheitsluecke-cve-2025-68664-1723178/?utm_source=flipboard&utm_medium=activitypub
Gepostet in Software & Entwicklung | t3n @software-entwicklung-t3n-t3n
##LangGrinch: A Bug in the Library, A Lesson for the Architecture https://amlalabs.com/blog/langgrinch-cve-2025-68664/
##All I Want for Christmas Is Your Secrets: LangGrinch hits LangChain Core https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
##Critical LangChain serialization flaw enables secret extraction and arbitrary code execution
LangChain has patched a critical deserialization vulnerability (CVE-2025-68664) in its core library that allowed attackers to extract environment variables and potentially execute arbitrary code through improper escaping of the 'lc' key structure in serialization functions.
**If you're using LangChain, immediately update langchain-core to version 1.2.5 or 0.3.81, check your invoked methods for the risky ones and treat all LLM outputs as untrusted data. Make sure your langchain-community dependencies are also updated.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-langchain-serialization-flaw-enables-secret-extraction-and-arbitrary-code-execution-d-2-d-d-q/gD2P6Ple2L
Critical vulnerability in LangChain – CVE-2025-68664
Link: https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
Discussion: https://news.ycombinator.com/item?id=46386009
All I Want for Christmas Is Your Secrets: LangGrinch hits LangChain Core
Link: https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
Discussion: https://news.ycombinator.com/item?id=46386009
All I Want for Christmas Is Your Secrets: LangGrinch hits LangChain Core
https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
#ycombinator
All I Want for Xmas Is Your Secrets: LangGrinch Hits LangChain (CVE-2025-68664) - https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
##🎄🤶 Oh, look! It's the #LangGrinch, stealing secrets like they're going out of style! Someone better tell Cyata that their "Control Plane for Agentic Identity" was just hijacked by the Christmas spirit of security negligence. 🎁🔓💥
https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/ #CyberSecurity #ChristmasSpirit #SecretHacks #AgenticIdentity #HackerNews #ngated
All I Want for Xmas Is Your Secrets: LangGrinch Hits LangChain (CVE-2025-68664)
https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
#HackerNews #LangGrinch #LangChain #CVE2025 #cybersecurity #secrets
##All I Want for Xmas Is Your Secrets: LangGrinch Hits LangChain (CVE-2025-68664)
https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
#ycombinator
Critical vulnerability in LangChain – CVE-2025-68664
https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
##LangGrinch: Kritische Lücke in LangChain-Core bedroht KI-Agenten
https://t3n.de/news/langgrinch-langchain-core-sicherheitsluecke-cve-2025-68664-1723178/?utm_source=flipboard&utm_medium=activitypub
Gepostet in Software & Entwicklung | t3n @software-entwicklung-t3n-t3n
##LangGrinch: A Bug in the Library, A Lesson for the Architecture https://amlalabs.com/blog/langgrinch-cve-2025-68664/
##All I Want for Christmas Is Your Secrets: LangGrinch hits LangChain Core https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
##Critical LangChain serialization flaw enables secret extraction and arbitrary code execution
LangChain has patched a critical deserialization vulnerability (CVE-2025-68664) in its core library that allowed attackers to extract environment variables and potentially execute arbitrary code through improper escaping of the 'lc' key structure in serialization functions.
**If you're using LangChain, immediately update langchain-core to version 1.2.5 or 0.3.81, check your invoked methods for the risky ones and treat all LLM outputs as untrusted data. Make sure your langchain-community dependencies are also updated.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-langchain-serialization-flaw-enables-secret-extraction-and-arbitrary-code-execution-d-2-d-d-q/gD2P6Ple2L
Critical vulnerability in LangChain – CVE-2025-68664
Link: https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
Discussion: https://news.ycombinator.com/item?id=46386009
All I Want for Christmas Is Your Secrets: LangGrinch hits LangChain Core
Link: https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
Discussion: https://news.ycombinator.com/item?id=46386009
All I Want for Christmas Is Your Secrets: LangGrinch hits LangChain Core
https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
#ycombinator
All I Want for Xmas Is Your Secrets: LangGrinch Hits LangChain (CVE-2025-68664)
https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
#HackerNews #LangGrinch #LangChain #CVE2025 #cybersecurity #secrets
##All I Want for Xmas Is Your Secrets: LangGrinch Hits LangChain (CVE-2025-68664)
https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
#ycombinator
Critical vulnerability in LangChain – CVE-2025-68664
https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
##updated 2025-12-24T15:11:39.433000
1 posts
CVE-2025-64468 - Use-after-Free in sentry!sentry_span_set_data() in NI LabVIEW https://cvefeed.io/vuln/detail/CVE-2025-64468
##updated 2025-12-24T15:11:06.627000
1 posts
CVE-2025-64465 - Out-of-Bounds Read in lvre!DataSizeTDR() in NI LabVIEW https://cvefeed.io/vuln/detail/CVE-2025-64465
##updated 2025-12-24T15:01:29.060000
1 posts
CVE-2025-14900 - CodeAstro Real Estate Management System Administrator Endpoint userdelete.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14900
##updated 2025-12-24T00:30:27
1 posts
updated 2025-12-23T23:15:44.167000
1 posts
updated 2025-12-23T22:15:51.677000
1 posts
updated 2025-12-23T21:30:41
1 posts
Go hack more AI shit. 🥳
https://www.cve.org/CVERecord?id=CVE-2025-14920
https://www.cve.org/CVERecord?id=CVE-2025-14921
https://www.cve.org/CVERecord?id=CVE-2025-14922
https://www.cve.org/CVERecord?id=CVE-2025-14924
https://www.cve.org/CVERecord?id=CVE-2025-14925
https://www.cve.org/CVERecord?id=CVE-2025-14926
https://www.cve.org/CVERecord?id=CVE-2025-14927
https://www.cve.org/CVERecord?id=CVE-2025-14928
https://www.cve.org/CVERecord?id=CVE-2025-14929
##updated 2025-12-23T21:30:41
1 posts
Go hack more AI shit. 🥳
https://www.cve.org/CVERecord?id=CVE-2025-14920
https://www.cve.org/CVERecord?id=CVE-2025-14921
https://www.cve.org/CVERecord?id=CVE-2025-14922
https://www.cve.org/CVERecord?id=CVE-2025-14924
https://www.cve.org/CVERecord?id=CVE-2025-14925
https://www.cve.org/CVERecord?id=CVE-2025-14926
https://www.cve.org/CVERecord?id=CVE-2025-14927
https://www.cve.org/CVERecord?id=CVE-2025-14928
https://www.cve.org/CVERecord?id=CVE-2025-14929
##updated 2025-12-23T21:30:41
1 posts
Go hack more AI shit. 🥳
https://www.cve.org/CVERecord?id=CVE-2025-14920
https://www.cve.org/CVERecord?id=CVE-2025-14921
https://www.cve.org/CVERecord?id=CVE-2025-14922
https://www.cve.org/CVERecord?id=CVE-2025-14924
https://www.cve.org/CVERecord?id=CVE-2025-14925
https://www.cve.org/CVERecord?id=CVE-2025-14926
https://www.cve.org/CVERecord?id=CVE-2025-14927
https://www.cve.org/CVERecord?id=CVE-2025-14928
https://www.cve.org/CVERecord?id=CVE-2025-14929
##updated 2025-12-23T21:30:41
1 posts
Go hack more AI shit. 🥳
https://www.cve.org/CVERecord?id=CVE-2025-14920
https://www.cve.org/CVERecord?id=CVE-2025-14921
https://www.cve.org/CVERecord?id=CVE-2025-14922
https://www.cve.org/CVERecord?id=CVE-2025-14924
https://www.cve.org/CVERecord?id=CVE-2025-14925
https://www.cve.org/CVERecord?id=CVE-2025-14926
https://www.cve.org/CVERecord?id=CVE-2025-14927
https://www.cve.org/CVERecord?id=CVE-2025-14928
https://www.cve.org/CVERecord?id=CVE-2025-14929
##updated 2025-12-23T21:30:41
1 posts
Go hack more AI shit. 🥳
https://www.cve.org/CVERecord?id=CVE-2025-14920
https://www.cve.org/CVERecord?id=CVE-2025-14921
https://www.cve.org/CVERecord?id=CVE-2025-14922
https://www.cve.org/CVERecord?id=CVE-2025-14924
https://www.cve.org/CVERecord?id=CVE-2025-14925
https://www.cve.org/CVERecord?id=CVE-2025-14926
https://www.cve.org/CVERecord?id=CVE-2025-14927
https://www.cve.org/CVERecord?id=CVE-2025-14928
https://www.cve.org/CVERecord?id=CVE-2025-14929
##updated 2025-12-23T21:30:41
1 posts
updated 2025-12-23T21:30:41
1 posts
updated 2025-12-23T21:30:40
1 posts
Go hack more AI shit. 🥳
https://www.cve.org/CVERecord?id=CVE-2025-14920
https://www.cve.org/CVERecord?id=CVE-2025-14921
https://www.cve.org/CVERecord?id=CVE-2025-14922
https://www.cve.org/CVERecord?id=CVE-2025-14924
https://www.cve.org/CVERecord?id=CVE-2025-14925
https://www.cve.org/CVERecord?id=CVE-2025-14926
https://www.cve.org/CVERecord?id=CVE-2025-14927
https://www.cve.org/CVERecord?id=CVE-2025-14928
https://www.cve.org/CVERecord?id=CVE-2025-14929
##updated 2025-12-23T21:30:40
1 posts
1 repos
Go hack more AI shit. 🥳
https://www.cve.org/CVERecord?id=CVE-2025-14920
https://www.cve.org/CVERecord?id=CVE-2025-14921
https://www.cve.org/CVERecord?id=CVE-2025-14922
https://www.cve.org/CVERecord?id=CVE-2025-14924
https://www.cve.org/CVERecord?id=CVE-2025-14925
https://www.cve.org/CVERecord?id=CVE-2025-14926
https://www.cve.org/CVERecord?id=CVE-2025-14927
https://www.cve.org/CVERecord?id=CVE-2025-14928
https://www.cve.org/CVERecord?id=CVE-2025-14929
##updated 2025-12-23T21:30:40
1 posts
Go hack more AI shit. 🥳
https://www.cve.org/CVERecord?id=CVE-2025-14920
https://www.cve.org/CVERecord?id=CVE-2025-14921
https://www.cve.org/CVERecord?id=CVE-2025-14922
https://www.cve.org/CVERecord?id=CVE-2025-14924
https://www.cve.org/CVERecord?id=CVE-2025-14925
https://www.cve.org/CVERecord?id=CVE-2025-14926
https://www.cve.org/CVERecord?id=CVE-2025-14927
https://www.cve.org/CVERecord?id=CVE-2025-14928
https://www.cve.org/CVERecord?id=CVE-2025-14929
##updated 2025-12-23T21:30:28
1 posts
updated 2025-12-23T21:15:48.240000
1 posts
Go hack more AI shit. 🥳
https://www.cve.org/CVERecord?id=CVE-2025-14920
https://www.cve.org/CVERecord?id=CVE-2025-14921
https://www.cve.org/CVERecord?id=CVE-2025-14922
https://www.cve.org/CVERecord?id=CVE-2025-14924
https://www.cve.org/CVERecord?id=CVE-2025-14925
https://www.cve.org/CVERecord?id=CVE-2025-14926
https://www.cve.org/CVERecord?id=CVE-2025-14927
https://www.cve.org/CVERecord?id=CVE-2025-14928
https://www.cve.org/CVERecord?id=CVE-2025-14929
##updated 2025-12-23T21:15:47.600000
1 posts
Go hack more AI shit. 🥳
https://www.cve.org/CVERecord?id=CVE-2025-14920
https://www.cve.org/CVERecord?id=CVE-2025-14921
https://www.cve.org/CVERecord?id=CVE-2025-14922
https://www.cve.org/CVERecord?id=CVE-2025-14924
https://www.cve.org/CVERecord?id=CVE-2025-14925
https://www.cve.org/CVERecord?id=CVE-2025-14926
https://www.cve.org/CVERecord?id=CVE-2025-14927
https://www.cve.org/CVERecord?id=CVE-2025-14928
https://www.cve.org/CVERecord?id=CVE-2025-14929
##updated 2025-12-23T21:15:47.183000
1 posts
Go hack more AI shit. 🥳
https://www.cve.org/CVERecord?id=CVE-2025-14920
https://www.cve.org/CVERecord?id=CVE-2025-14921
https://www.cve.org/CVERecord?id=CVE-2025-14922
https://www.cve.org/CVERecord?id=CVE-2025-14924
https://www.cve.org/CVERecord?id=CVE-2025-14925
https://www.cve.org/CVERecord?id=CVE-2025-14926
https://www.cve.org/CVERecord?id=CVE-2025-14927
https://www.cve.org/CVERecord?id=CVE-2025-14928
https://www.cve.org/CVERecord?id=CVE-2025-14929
##updated 2025-12-23T18:30:35
1 posts
NVIDIA patches critical vulnerabilities in Isaac Launchable Platform
NVIDIA patched three critical vulnerabilities (CVE-2025-33222, CVE-2025-33223, CVE-2025-33224) in its Isaac Launchable robotics platform that allow unauthenticated attackers to execute code, escalate privileges, and tamper with data.
**If you use NVIDIA Isaac Launchable, plan a very quick update to version 1.11.1 or later from the official GitHub repository. There are three critical flaws that allow unauthenticated attackers to completely compromise your system.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/nvidia-patches-critical-vulnerabilities-in-isaac-launchable-platform-o-e-9-j-9/gD2P6Ple2L
updated 2025-12-23T18:30:35
1 posts
NVIDIA patches critical vulnerabilities in Isaac Launchable Platform
NVIDIA patched three critical vulnerabilities (CVE-2025-33222, CVE-2025-33223, CVE-2025-33224) in its Isaac Launchable robotics platform that allow unauthenticated attackers to execute code, escalate privileges, and tamper with data.
**If you use NVIDIA Isaac Launchable, plan a very quick update to version 1.11.1 or later from the official GitHub repository. There are three critical flaws that allow unauthenticated attackers to completely compromise your system.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/nvidia-patches-critical-vulnerabilities-in-isaac-launchable-platform-o-e-9-j-9/gD2P6Ple2L
updated 2025-12-23T18:30:35
1 posts
NVIDIA patches critical vulnerabilities in Isaac Launchable Platform
NVIDIA patched three critical vulnerabilities (CVE-2025-33222, CVE-2025-33223, CVE-2025-33224) in its Isaac Launchable robotics platform that allow unauthenticated attackers to execute code, escalate privileges, and tamper with data.
**If you use NVIDIA Isaac Launchable, plan a very quick update to version 1.11.1 or later from the official GitHub repository. There are three critical flaws that allow unauthenticated attackers to completely compromise your system.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/nvidia-patches-critical-vulnerabilities-in-isaac-launchable-platform-o-e-9-j-9/gD2P6Ple2L
updated 2025-12-23T18:30:35
1 posts
updated 2025-12-23T17:42:32.230000
1 posts
CVE-2025-68381 - Packetbeat Improper Bounds Check https://cvefeed.io/vuln/detail/CVE-2025-68381
##updated 2025-12-23T17:33:47.433000
1 posts
CVE-2025-66522 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Digital IDs Common Name Field https://cvefeed.io/vuln/detail/CVE-2025-66522
##updated 2025-12-23T17:15:48.060000
1 posts
updated 2025-12-23T16:01:13
1 posts
updated 2025-12-23T14:51:52.650000
2 posts
Critical buffer overflow flaw reported in Net-SNMP
A critical buffer overflow vulnerability (CVE-2025-68615) in Net-SNMP's snmptrapd daemon allows remote attackers to crash services or potentially execute arbitrary code by sending malformed SNMP trap packets. All Net-SNMP versions prior to 5.9.5 (Community/Enterprise editions) and 5.10.pre2 (development) are affected. Internet-accessible instances on UDP port 162 are most vulnerable.
**If you are running Net-SNMP, make sure the system is isolated from the internet and only accessible from trusted networks. Immediately update to version 5.9.5 or later.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-buffer-overflow-flaw-reported-in-net-snmp-z-k-j-d-7/gD2P6Ple2L
Critical buffer overflow flaw reported in Net-SNMP
A critical buffer overflow vulnerability (CVE-2025-68615) in Net-SNMP's snmptrapd daemon allows remote attackers to crash services or potentially execute arbitrary code by sending malformed SNMP trap packets. All Net-SNMP versions prior to 5.9.5 (Community/Enterprise editions) and 5.10.pre2 (development) are affected. Internet-accessible instances on UDP port 162 are most vulnerable.
**If you are running Net-SNMP, make sure the system is isolated from the internet and only accessible from trusted networks. Immediately update to version 5.9.5 or later.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-buffer-overflow-flaw-reported-in-net-snmp-z-k-j-d-7/gD2P6Ple2L
updated 2025-12-23T14:51:52.650000
3 posts
23 repos
https://github.com/LingerANR/n8n-CVE-2025-68613
https://github.com/TheStingR/CVE-2025-68613-POC
https://github.com/Ashwesker/Blackash-CVE-2025-68613
https://github.com/AbdulRKB/n8n-RCE
https://github.com/Dlanang/homelab-CVE-2025-68613
https://github.com/hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultimate
https://github.com/releaseown/analysis-and-poc-n8n-CVE-2025-68613
https://github.com/secjoker/CVE-2025-68613
https://github.com/manyaigdtuw/CVE-2025-68613_Scanner
https://github.com/JohannesLks/CVE-2025-68613-Python-Exploit
https://github.com/Khin-96/n8n-cve-2025-68613-thm
https://github.com/rxerium/CVE-2025-68613
https://github.com/intbjw/CVE-2025-68613-poc-via-copilot
https://github.com/GnuTLam/POC-CVE-2025-68613
https://github.com/intelligent-ears/CVE-2025-68613
https://github.com/ali-py3/Exploit-CVE-2025-68613
https://github.com/wioui/n8n-CVE-2025-68613-exploit
https://github.com/mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613
https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis
https://github.com/reem-012/poc_CVE-2025-68613
https://github.com/J4ck3LSyN-Gen2/n8n-CVE-2025-68613-TryHackMe
si vous utilisez n8n… ⚠️
Une vulnérabilité critique ( CVE-2025-68613 ) permet à un utilisateur connecté de détourner un workflow pour exécuter des commandes sur le serveur qui héberge n8n.
Concrètement, une automatisation mal conçue (ou malveillante) peut sortir du cadre prévu et donner accès au système :
données manipulées par les workflows
modification ou suppression des automatisations
et potentiellement contrôle complet du serveur
La faille touche de nombreuses versions (depuis 0.211.0) et est très sévère, surtout si n8n est exposé à Internet ou utilisé par plusieurs personnes.
✅ Solution : mettre à jour rapidement vers les versions corrigées (≥ 1.120.4 / 1.121.1 / 1.122.0).
En attendant, restreignez au maximum les droits de création/édition des workflows
👉 Si n8n est critique dans votre infra, c’est une priorité de sécurité.
"Remote Code Execution via Expression Injection "
👇
https://github.com/n8n-io/n8n/security/advisories/GHSA-v98v-ff95-f3cp
🔍
⬇️
https://github.com/rxerium/CVE-2025-68613
🔍
⬇️
"n8n CVE-2025-68613 RCE Exploitation: A Detailed Guide"
👇
https://blog.securelayer7.net/cve-2025-68613-n8n-rce-exploitation/
@cR0w well there WAS this... https://nvd.nist.gov/vuln/detail/CVE-2025-68613
##Critical remote code execution flaw reported in n8n workflow automation platform
n8n's workflow automation platform reports a critical vulnerability (CVE-2025-68613, CVSS 10.0) allowing authenticated attackers to execute arbitrary code with full system privileges, potentially exposing sensitive workflows, API credentials, and corporate networks.
**If you're running self-hosted n8n, plan a quick upgrade to version 1.120.4, 1.121.1, or 1.122.0 to patch CVE-2025-68613. Until you upgrade, restrict workflow editing permissions to fully trusted users only.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-remote-code-execution-flaw-reported-in-n8n-workflow-automation-platform-m-b-x-5-d/gD2P6Ple2L
updated 2025-12-23T14:51:52.650000
1 posts
🟠 CVE-2023-53973 - High (8.4)
Zillya Total Security 3.0.2367.0 contains a privilege escalation vulnerability that allows low-privileged users to copy files to unauthorized system locations using the quarantine module. Attackers can leverage symbolic link techniques to restore ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2023-53973/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2025-12-23T14:51:52.650000
1 posts
updated 2025-12-23T12:31:24
4 posts
CISA reports actively exploted flaw in Digiever Network Video Recorder
CISA warns of active exploitation of CVE-2023-52163, a missing authorization vulnerability in Digiever DS-2105 Pro network video recorders that allows authenticated attackers to execute arbitrary commands and is being weaponized by Mirai-style botnets targeting IoT devices.
**If you have Digiever DS-2105 Pro network video recorders, make sure they are isolated from the internet and ensure they're only accessible from trusted internal networks. Since this device is end-of-life, there are no security patches for this flaw and is being actively exploited, plan to replace it as soon as possible. Until it's replaced keep it completely isolated behind strict network segmentation.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/cisa-reports-actively-exploted-flaw-in-digiever-network-video-recorder-p-u-l-4-1/gD2P6Ple2L
🚨 CISA has added on vulnerability to the KEV Catalog
CVE-2023-52163: Digiever DS-2105 Pro Missing Authorization Vulnerability
CVSS: 5.9
https://darkwebinformer.com/cisa-kev-catalog/
Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
##CVE ID: CVE-2023-52163
Vendor: Digiever
Product: DS-2105 Pro
Date Added: 2025-12-22
Notes: https://www.digiever.com/tw/support/faq-content.php?FAQ=217 ; https://nvd.nist.gov/vuln/detail/CVE-2023-52163
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2023-52163
CISA has added one vulnerability to the KEV catalogue.
CVE-2023-52163: Digiever DS-2105 Pro Missing Authorization Vulnerability https://www.cve.org/CVERecord?id=CVE-2023-52163 #CISA #vulnerability #infosec
##updated 2025-12-23T12:15:45.053000
2 posts
2 repos
⚪ Critical RCE Bug Patched in HPE OneView
🗨️ Hewlett Packard Enterprise (HPE) developers have released patches for a critical remote code execution vulnerability discovered in the OneView IT infrastructure management software. The issue is tracked as CVE-2025-37164 (a maximum score of 10.0 on the CVSS scale) and can be exploited without authen…
##HPE OneView CVE-2025-37164 worth paying attention to
- Widely used enterprise management software
- HPE added a REST command, executeCommand, which requires no authentication to execute commands. Obviously, this is dumb and now patched out
- Being on OneView allows attacker to access VMware, 3PAR storage etc by design
- Expect exploitation in the wild as it's so simple
- The vulnerability (executeCommand) was introduced around 2020, feels like a vulndoor
Shodan dork: product:"HPE OneView"
##updated 2025-12-23T00:30:39
1 posts
1 repos
updated 2025-12-23T00:30:38
1 posts
updated 2025-12-20T17:41:17
1 posts
CVE-2025-14882 - Insecure direct object reference https://cvefeed.io/vuln/detail/CVE-2025-14882
##updated 2025-12-20T05:37:50
1 posts
Go hack more AI shit.
https://www.cve.org/CVERecord?id=CVE-2025-63389
##A critical authentication bypass vulnerability exists in Ollama platform's API endpoints in versions prior to and including v0.12.3. The platform exposes multiple API endpoints without requiring authentication, enabling remote attackers to perform unauthorized model management operations.
updated 2025-12-20T03:31:40
1 posts
updated 2025-12-20T03:31:40
1 posts
updated 2025-12-20T00:31:32
1 posts
updated 2025-12-19T22:08:03
2 posts
1000 yard stare
##For my fellow Log4j victims celebrating 4 years #log4shell PTSD: CVE-2025-68161
"The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the verifyHostName configuration attribute or the log4j2.sslVerifyHostName system property is set to true."
https://logging.apache.org/security.html#CVE-2025-68161
(It's not that terrible. Seeing the string "log4j" just makes me twitch. :-)
##updated 2025-12-19T21:30:26
1 posts
updated 2025-12-19T21:30:19
8 posts
3 repos
https://github.com/b1gchoi/CVE-2025-14733
📢 Alerte: vulnérabilité critique RCE dans WatchGuard Fireware OS (CVE-2025-14733) exploitée
📝 Le Centre canadien pour la cybersécurité (Alerte AL25-020,...
📖 cyberveille : https://cyberveille.ch/posts/2025-12-26-alerte-vulnerabilite-critique-rce-dans-watchguard-fireware-os-cve-2025-14733-exploitee/
🌐 source : https://www.cyber.gc.ca/fr/alertes-avis/al25-020-vulnerabilite-visant-systeme-dexploitation-watchguard-fireware-os-cve-2025-14733
#CVE_2025_14733 #IKEv2_VPN #Cyberveille
🚨 CISA has added 1 vulnerability to the KEV Catalog
CVE-2025-14733: WatchGuard Firebox Out of Bounds Write Vulnerability
CVSS: 9.3
##CVE ID: CVE-2025-14733
Vendor: WatchGuard
Product: Firebox
Date Added: 2025-12-19
Notes: Check for signs of potential compromise on all internet accessible instances after applying mitigations. For more information please see: https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00027 ; https://nvd.nist.gov/vuln/detail/CVE-2025-14733
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-14733
Critical actively exploited flaw in WatchGuard Fireware OS enables remote code execution through VPN service
WatchGuard patched a critical vulnerability (CVE-2025-14733) in Fireware OS that allows remote unauthenticated attackers to execute arbitrary code on devices with IKEv2 VPN configurations. The flaw is actively being exploited in the wild.
**If you have WatchGuard Firebox firewalls, you are under attack. Make a very quick update to the latest security updates from WatchGuard. After patching, change all passwords and security keys stored on the device, especially if you've ever used IKEv2 VPN configurations (even if now deleted). Old settings can still leave your firewall vulnerable.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/critical-flaw-in-watchguard-fireware-os-enables-remote-code-execution-through-vpn-service-n-s-w-d-7/gD2P6Ple2L
Analysis of CVE-2025-14733, a critical WatchGuard Firebox security vulnerability. Learn why unauthenticated RCE persists even after deleting vulnerable VPN configurations.
#SecurityLand #CyberWatch #ZeroDay #Watchguard #SecurityVulnerability #Firewall #CVE
Read More: https://www.security.land/watchguard-cve-2025-14733-critical-vulnerability-analysis/
##Hackers can now take over WatchGuard Firebox firewalls with zero passwords needed, putting entire networks at risk. Is your organization’s gateway already compromised?
##CVE-2025-14733 - WatchGuard Firebox iked Out of Bounds Write Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14733
##CVE-2025-14733 - WatchGuard Firebox iked Out of Bounds Write Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14733
##updated 2025-12-19T18:32:25
1 posts
updated 2025-12-19T18:32:24
1 posts
updated 2025-12-19T18:32:19
1 posts
CVE-2025-65565 - "OmeC-Project UPF pfcpiface Denial-of-Service Vulnerability" https://cvefeed.io/vuln/detail/CVE-2025-65565
##updated 2025-12-19T18:32:19
1 posts
CVE-2025-65564 - OmeC UPF Denial-of-Service Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65564
##updated 2025-12-19T18:31:18
1 posts
CVE-2025-52692 - Bypass Authentication https://cvefeed.io/vuln/detail/CVE-2025-52692
##updated 2025-12-19T18:15:50.713000
1 posts
CVE-2025-65568 - OmeC-Project UPF pfcpiface Denial-of-Service Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65568
##updated 2025-12-19T18:15:50.570000
1 posts
CVE-2025-65567 - OmeC-Project UPF Denial-of-Service Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65567
##updated 2025-12-19T18:00:18.330000
22 posts
8 repos
https://github.com/Ashwesker/Blackash-CVE-2025-14847
https://github.com/KingHacker353/CVE-2025-14847_Expolit
https://github.com/nma-io/mongobleed
https://github.com/cybertechajju/CVE-2025-14847_Expolit
https://github.com/Black1hp/mongobleed-scanner
https://github.com/ProbiusOfficial/CVE-2025-14847
SANS Stormcast Sunday, December 28th, 2025: MongoDB Unauthenticated Memory Leak CVE-2025-14847
https://isc.sans.edu/podcastdetail/9750
🚨 CVE-2025-14847 - Mongobleed
Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Server v4.4 versions prior to 4.4.30, MongoDB Server v4.2 versions greater than or equal to 4.2.0, MongoDB Server v4.0 versions greater than or equal to 4.0.0, and MongoDB Server v3.6 versions greater than or equal to 3.6.0.
##Mongobleed - CVE-2025-14847 https://doublepulsar.com/merry-christmas-day-have-a-mongodb-security-incident-9537f54289eb
##[VULN] ⚠️ MongoDB alerte sur une faille à haute gravité et urge de patcher
L'éditeur met en garde contre une vulnérabilité de lecture de mémoire de gravité élevée, qui pourrait être exploitée à distance par des attaquants non authentifiés.
⬇️
🔗 Source originale : https://www.bleepingcomputer.com/news/security/mongodb-warns-admins-to-patch-severe-rce-flaw-immediately/
PoC disponible (vecteur simple, peu de prérequis techniques,
surface d’attaque large, exploitation reproductible) 👀 : mongobleed
⬇️
• Impact observé: fuite de fragments de mémoire pouvant contenir des éléments sensibles tels que des journaux internes MongoDB, l’état du serveur, des paramètres WiredTiger, des données de /proc (ex. meminfo, statistiques réseau), des chemins Docker, des UUID de connexion et des IP clients. Le PoC montre des exemples de fuites (p. ex. MemAvailable, compteurs réseau) et indique la quantité totale de données exfiltrées ainsi que le nombre de fragments uniques. ⚠️
( https://cyberveille.ch/posts/2025-12-26-cve-2025-14847-mongobleed-fuite-de-memoire-non-authentifiee-dans-mongodb-correctifs-disponibles/ )
[Advisory officiel]
👇
https://jira.mongodb.org/browse/SERVER-115508
typiquement, si vous avez un contrôleur #UniFi exposé veut mieux verifier les règles firewall pour bloquer...
👇
https://community.ui.com/questions/MongoDB-warns-admins-to-patch-severe-RCE-flaw-immediately/6d64c7a3-0f22-496a-9bd2-023c02fcd126#answer/20ec3b97-d0c6-4f63-b2f5-d4953be27ad3
💬
⬇️
https://infosec.pub/post/39604416
#CyberVeille #mongoDB #CVE_2025_14847
*edit 27.12 enlevé attribution incorrecte de RCE"
##🔍 HIGH severity: MongoDB flaw (CVE-2025-14847) lets unauthenticated users read uninitialized memory via zlib. Affects v3.6–8.2.3. Patch now or disable zlib compression for mitigation. Full details: https://radar.offseq.com/threat/new-mongodb-flaw-lets-unauthenticated-attackers-re-701f4a01 #OffSeq #MongoDB #Infosec #Vulnerability
##There’s a great blog on detecting MongoBleed exploitation via Velociraptor https://blog.ecapuano.com/p/hunting-mongobleed-cve-2025-14847
##MongoDB Unauthenticated Attacker Sensitive Memory Leak
#CVE_2025_14847
https://www.ox.security/blog/attackers-could-exploit-zlib-to-exfiltrate-data-cve-2025-14847/
📢 CVE-2025-14847 « mongobleed »: fuite de mémoire non authentifiée dans MongoDB (correctifs disponibles)
📝 Selon la publication du PoC « mongobleed » (auteur : Joe Desimone), une vulnérabilité référencée CVE-2025-14847 affecte la dé...
📖 cyberveille : https://cyberveille.ch/posts/2025-12-26-cve-2025-14847-mongobleed-fuite-de-memoire-non-authentifiee-dans-mongodb-correctifs-disponibles/
🌐 source : https://github.com/joe-desimone/mongobleed
#CVE_2025_14847 #MongoDB #Cyberveille
Merry Christmas to everybody, except that dude who works for Elastic, who decided to drop an unauthenticated exploit for MongoDB on Christmas Day, that leaks memory and automates harvesting secrets (e.g. database passwords)
CVE-2025-14847 aka MongoBleed
Exp: https://github.com/joe-desimone/mongobleed/blob/main/mongobleed.py
This one is incredibly widely internet facing and will very likely see mass exploitation and impactful incidents
Impacts every MongoDB version going back a decade.
Shodan dork: product:"MongoDB"
##Oh. yay.
"mongobleed" — https://github.com/joe-desimone/mongobleed/blob/main/mongobleed.py
CVE-2025-14847
"Exploits zlib decompression bug to leak server memory via BSON field names.”
"Technique: Craft BSON with inflated doc_len, server reads field names from leaked memory until null byte.”
##🟠 CVE-2025-14847 - High (7.5)
Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14847/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##MongoDB high severity flaw allows unauthenticated memory access via Zlib compression flaw
MongoDB reports a high severity flaw CVE-2025-14847 that allows unauthenticated remote attackers to read uninitialized heap memory, potentially exposing credentials, encryption keys, and other sensitive data by exploiting improper validation of Zlib compressed protocol headers through a simple TCP connection. The flaw affects MongoDB versions 3.6 through 8.2.2.
**If you're running MongoDB servers, first check if they are exposed to the internet. If yes this is urgent. Upgrade to the patched versions (8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, or 4.4.30). Alternatively, isolate from the intenet, disable zlib compression and plan a patch cycle.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/mongodb-high-severity-flaw-allows-unauthenticated-memory-access-via-zlib-compression-flaw-7-p-x-6-z/gD2P6Ple2L
SANS Stormcast Sunday, December 28th, 2025: MongoDB Unauthenticated Memory Leak CVE-2025-14847
https://isc.sans.edu/podcastdetail/9750
Mongobleed - CVE-2025-14847 https://doublepulsar.com/merry-christmas-day-have-a-mongodb-security-incident-9537f54289eb
##[VULN] ⚠️ MongoDB alerte sur une faille à haute gravité et urge de patcher
L'éditeur met en garde contre une vulnérabilité de lecture de mémoire de gravité élevée, qui pourrait être exploitée à distance par des attaquants non authentifiés.
⬇️
🔗 Source originale : https://www.bleepingcomputer.com/news/security/mongodb-warns-admins-to-patch-severe-rce-flaw-immediately/
PoC disponible (vecteur simple, peu de prérequis techniques,
surface d’attaque large, exploitation reproductible) 👀 : mongobleed
⬇️
• Impact observé: fuite de fragments de mémoire pouvant contenir des éléments sensibles tels que des journaux internes MongoDB, l’état du serveur, des paramètres WiredTiger, des données de /proc (ex. meminfo, statistiques réseau), des chemins Docker, des UUID de connexion et des IP clients. Le PoC montre des exemples de fuites (p. ex. MemAvailable, compteurs réseau) et indique la quantité totale de données exfiltrées ainsi que le nombre de fragments uniques. ⚠️
( https://cyberveille.ch/posts/2025-12-26-cve-2025-14847-mongobleed-fuite-de-memoire-non-authentifiee-dans-mongodb-correctifs-disponibles/ )
[Advisory officiel]
👇
https://jira.mongodb.org/browse/SERVER-115508
typiquement, si vous avez un contrôleur #UniFi exposé veut mieux verifier les règles firewall pour bloquer...
👇
https://community.ui.com/questions/MongoDB-warns-admins-to-patch-severe-RCE-flaw-immediately/6d64c7a3-0f22-496a-9bd2-023c02fcd126#answer/20ec3b97-d0c6-4f63-b2f5-d4953be27ad3
💬
⬇️
https://infosec.pub/post/39604416
#CyberVeille #mongoDB #CVE_2025_14847
*edit 27.12 enlevé attribution incorrecte de RCE"
##There’s a great blog on detecting MongoBleed exploitation via Velociraptor https://blog.ecapuano.com/p/hunting-mongobleed-cve-2025-14847
##Merry Christmas to everybody, except that dude who works for Elastic, who decided to drop an unauthenticated exploit for MongoDB on Christmas Day, that leaks memory and automates harvesting secrets (e.g. database passwords)
CVE-2025-14847 aka MongoBleed
Exp: https://github.com/joe-desimone/mongobleed/blob/main/mongobleed.py
This one is incredibly widely internet facing and will very likely see mass exploitation and impactful incidents
Impacts every MongoDB version going back a decade.
Shodan dork: product:"MongoDB"
##Oh. yay.
"mongobleed" — https://github.com/joe-desimone/mongobleed/blob/main/mongobleed.py
CVE-2025-14847
"Exploits zlib decompression bug to leak server memory via BSON field names.”
"Technique: Craft BSON with inflated doc_len, server reads field names from leaked memory until null byte.”
##MongoDB high severity flaw allows unauthenticated memory access via Zlib compression flaw
MongoDB reports a high severity flaw CVE-2025-14847 that allows unauthenticated remote attackers to read uninitialized heap memory, potentially exposing credentials, encryption keys, and other sensitive data by exploiting improper validation of Zlib compressed protocol headers through a simple TCP connection. The flaw affects MongoDB versions 3.6 through 8.2.2.
**If you're running MongoDB servers, first check if they are exposed to the internet. If yes this is urgent. Upgrade to the patched versions (8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, or 4.4.30). Alternatively, isolate from the intenet, disable zlib compression and plan a patch cycle.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/mongodb-high-severity-flaw-allows-unauthenticated-memory-access-via-zlib-compression-flaw-7-p-x-6-z/gD2P6Ple2L
🚨 CVE-2025-14847: Critical Unauthenticated MongoDB RCE Heap Memory Leak Exposes Sensitive Data
CVSS: 8.7
Vulnerable versions include:
▪️MongoDB 3.6.x
▪️MongoDB 4.0.x
▪️MongoDB 4.2.x
▪️MongoDB 4.4.x ≤ 4.4.29
▪️MongoDB 5.0.x ≤ 5.0.31
▪️MongoDB 6.0.x ≤ 6.0.26
▪️MongoDB 7.0.x ≤ 7.0.26
▪️MongoDB 8.0.x ≤ 8.0.16
▪️MongoDB 8.2.x ≤ 8.2.2
Fixed versions:
▪️4.4.30
▪️5.0.32
▪️6.0.27
▪️7.0.28
▪️8.0.17
▪️8.2.3
https://www.upwind.io/feed/cve-2025-14847-mongodb-zlib-memory-disclosure
##updated 2025-12-19T18:00:18.330000
2 posts
M-Files has released patches for CVE-2025-13008, an information disclosure vulnerability involving session token exposure between authenticated users.
The issue affects several release branches and could allow impersonation within M-Files Web under specific conditions.
No exploitation has been observed publicly, but the potential impact on document confidentiality is notable.
This reinforces the need for:
• Strong session controls
• Log review for unusual user behavior
• Prompt patch deployment
Follow @technadu for unbiased, technically grounded security updates.
Source : https://cybersecuritynews.com/m-files-vulnerability/
#InfoSec #VulnerabilityResearch #SessionManagement #EnterpriseSecurity #TechNadu
##M-Files has released patches for CVE-2025-13008, an information disclosure vulnerability involving session token exposure between authenticated users.
The issue affects several release branches and could allow impersonation within M-Files Web under specific conditions.
No exploitation has been observed publicly, but the potential impact on document confidentiality is notable.
This reinforces the need for:
• Strong session controls
• Log review for unusual user behavior
• Prompt patch deployment
Follow @technadu for unbiased, technically grounded security updates.
Source : https://cybersecuritynews.com/m-files-vulnerability/
#InfoSec #VulnerabilityResearch #SessionManagement #EnterpriseSecurity #TechNadu
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-14881 - Insecure direct object reference https://cvefeed.io/vuln/detail/CVE-2025-14881
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-1928 - Improper Authentication in Restajet's Online Food Delivery System https://cvefeed.io/vuln/detail/CVE-2025-1928
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-11747 - Colibri Page Builder <= 1.0.345 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode https://cvefeed.io/vuln/detail/CVE-2025-11747
##updated 2025-12-19T18:00:18.330000
2 posts
🚨 CRITICAL vuln: CVE-2025-65041 in Microsoft Partner Center enables unauthenticated remote privilege escalation (CVSS 10). No patch yet—segment networks, enforce MFA, and monitor for abuse. Stay updated! https://radar.offseq.com/threat/cve-2025-65041-cwe-285-improper-authorization-in-m-738f9e8a #OffSeq #Microsoft #CloudSecurity #CVE2025_65041
##CVE-2025-65041 - Microsoft Partner Center Elevation of Privilege Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65041
##updated 2025-12-19T18:00:18.330000
2 posts
CVE-2025-68398 - Weblate has git config file overwrite vulnerability that leads to remote code execution https://cvefeed.io/vuln/detail/CVE-2025-68398
##🚨 CVE-2025-68398: CRITICAL vuln in Weblate (<5.15.1). Privileged users can overwrite Git configs, risking full system compromise. Patch to 5.15.1+ & audit Git settings now! https://radar.offseq.com/threat/cve-2025-68398-cwe-20-improper-input-validation-in-186802ce #OffSeq #Weblate #Infosec #CVE2025
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-34452 - Streama Subtitle Download Path Traversal and SSRF Leading to Arbitrary File Write https://cvefeed.io/vuln/detail/CVE-2025-34452
##updated 2025-12-19T18:00:18.330000
1 posts
CVE-2025-64236 - WordPress Tuturn plugin < 3.6 - Broken Authentication vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64236
##updated 2025-12-19T18:00:18.330000
1 posts
updated 2025-12-19T13:57:43.150000
1 posts
2 repos
SonicWall patches actively exploited flaw vulnerability chain in SMA 1000 appliances
SonicWall SMA 1000 appliances are being actively exploited through a vulnerability chain combining CVE-2025-40602 (a local privilege escalation flaw) with CVE-2025-23006 (a previously patched deserialization vulnerability), enabling unauthenticated remote code execution with root privileges.
**If you have SonicWall SMA 1000 appliances, make sure their SSH and management access is isolated from the public internet and only accessible from trusted networks. Review latest version, and if not up-to date patched, plan a very quick upgrade to platform-hotfix 12.4.3-03245 or 12.5.0-02283 (or higher). Your devices are being hacked, and you can't really hide them from the internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/sonicwall-patches-actively-exploited-flaw-vulnerability-chain-in-sma-1000-appliances-x-l-b-q-7/gD2P6Ple2L
updated 2025-12-19T12:31:33
1 posts
CVE-2025-1927 - CSRF in Restajet's Online Food Delivery System https://cvefeed.io/vuln/detail/CVE-2025-1927
##updated 2025-12-19T12:31:32
1 posts
CVE-2025-1885 - Open Redirect in Restajet's Online Food Delivery System https://cvefeed.io/vuln/detail/CVE-2025-1885
##updated 2025-12-19T09:30:39
1 posts
CVE-2025-14151 - SlimStat Analytics <= 5.3.2 - Unauthenticated Stored Cross-Site Scripting https://cvefeed.io/vuln/detail/CVE-2025-14151
##updated 2025-12-19T09:30:39
1 posts
CVE-2025-66521 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Trusted Certificates Feature https://cvefeed.io/vuln/detail/CVE-2025-66521
##updated 2025-12-19T09:30:39
1 posts
CVE-2025-66520 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Portfolio SVG Handling https://cvefeed.io/vuln/detail/CVE-2025-66520
##updated 2025-12-19T06:30:34
1 posts
CVE-2025-68490 - Apache HTTP Server Cross-Site Request Forgery https://cvefeed.io/vuln/detail/CVE-2025-68490
##updated 2025-12-19T06:30:34
1 posts
CVE-2025-68489 - Apache HTTP Server Cross-Site Request Forgery https://cvefeed.io/vuln/detail/CVE-2025-68489
##updated 2025-12-19T04:16:02.150000
1 posts
CVE-2025-68491 - Apache HTTP Server Buffer Overflow Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-68491
##updated 2025-12-19T04:16:01.953000
1 posts
CVE-2025-68488 - Apache HTTP Server Authentication Bypass https://cvefeed.io/vuln/detail/CVE-2025-68488
##updated 2025-12-19T04:16:01.883000
1 posts
CVE-2025-68487 - Apache HTTP Server Cross-Site Request Forgery https://cvefeed.io/vuln/detail/CVE-2025-68487
##updated 2025-12-19T03:31:23
2 posts
CVE-2025-11774 - Malicious Code Execution Vulnerability in the Software Keyboard Function of GENESIS64, ICONICS Suite, Mobile HMI, and MC Works64 https://cvefeed.io/vuln/detail/CVE-2025-11774
##CVE-2025-11774 - Malicious Code Execution Vulnerability in the Software Keyboard Function of GENESIS64, ICONICS Suite, Mobile HMI, and MC Works64 https://cvefeed.io/vuln/detail/CVE-2025-11774
##updated 2025-12-19T03:31:23
1 posts
CVE-2025-14908 - JeecgBoot Multi-Tenant Management SysTenantController.java improper authentication https://cvefeed.io/vuln/detail/CVE-2025-14908
##updated 2025-12-19T03:31:23
1 posts
CVE-2025-14899 - CodeAstro Real Estate Management System Administrator Endpoint stateadd.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-14899
##updated 2025-12-19T03:31:18
1 posts
CVE-2025-67843 - Mintlify Platform SSTI Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-67843
##updated 2025-12-19T03:31:18
1 posts
CVE-2025-13941 - Foxit PDF Reader Update Service Incorrect Permission Assignment Local Privilege Escalation Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-13941
##updated 2025-12-19T00:31:52
1 posts
CVE-2025-64675 - Azure Cosmos DB Spoofing Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64675
##updated 2025-12-19T00:31:47
1 posts
CVE-2025-68382 - Packetbeat Out-of-bounds Read https://cvefeed.io/vuln/detail/CVE-2025-68382
##updated 2025-12-19T00:31:47
1 posts
CVE-2025-65037 - Azure Container Apps Remote Code Execution Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-65037
##updated 2025-12-19T00:31:47
1 posts
CVE-2025-64663 - Custom Question Answering Elevation of Privilege Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64663
##updated 2025-12-19T00:31:46
1 posts
CVE-2025-13427 - Authentication Bypass in Dialogflow CX Messenger https://cvefeed.io/vuln/detail/CVE-2025-13427
##updated 2025-12-19T00:31:46
1 posts
CVE-2025-64677 - Office Out-of-Box Experience Spoofing Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64677
##updated 2025-12-19T00:31:46
1 posts
Microsoft patched several sev:CRIT cloud vulns, including this ../ in Purview. LMAO.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64676
##updated 2025-12-18T21:31:50
1 posts
updated 2025-12-18T18:30:38
2 posts
CVE-2025-14884 - D-Link DIR-605 Firmware Update Service command injection https://cvefeed.io/vuln/detail/CVE-2025-14884
##Tenda
https://www.cve.org/CVERecord?id=CVE-2025-14879
D-Link
##updated 2025-12-18T18:30:37
1 posts
CVE-2025-14896 - Vega Remote File Inclusion Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-14896
##updated 2025-12-18T18:30:37
2 posts
CVE-2025-14878 - Tenda WH450 HTTP Request wirelessRestart stack-based overflow https://cvefeed.io/vuln/detail/CVE-2025-14878
##Tenda
##updated 2025-12-18T18:30:37
1 posts
updated 2025-12-18T18:30:37
1 posts
Auth bypass in Open-WebUI.
https://www.cve.org/CVERecord?id=CVE-2025-63391
##An authentication bypass vulnerability exists in Open-WebUI <=0.6.32 in the /api/config endpoint. The endpoint lacks proper authentication and authorization controls, exposing sensitive system configuration data to unauthenticated remote attackers.
updated 2025-12-18T15:42:03.790000
3 posts
CISA flags ASUS Live Update CVE, but the attack is years old
An ASUS Live Update vulnerability tracked as CVE-2025-59374 has been making the rounds in infosec feeds, with some headlines implying recent or...
🔗️ [Bleepingcomputer] https://link.is.it/NcIC9d
##Not all CISA-linked alerts are urgent: ASUS Live Update CVE-2025-59374
An ASUS Live Update vulnerability tracked as CVE-2025-59374 has been making the rounds in infosec feeds, with some headlines implying recent or...
🔗️ [Bleepingcomputer] https://link.is.it/Yiue33
##CISA reports active exploitation of ASUS Live Update supply chain vulnerability
CISA is reporting active exploitation of CVE-2025-59374, a supply chain backdoor embedded in ASUS Live Update utility during the 2018 Operation ShadowHammer attack by Chinese state-sponsored hackers. The backdoor surgically targeted specific devices using hardcoded MAC addresses. Federal agencies must discontinue use of the now-discontinued utility by January 7, 2026. ASUS urges remaining users to update to version 3.6.8 or higher.
**If you have ASUS Live Update utility installed, immediately update to version 3.6.8 or higher, or better yet, uninstall it completely since it's now discontinued. Given the previous supply chain compromise and end-of-support status, remove the utility and download updates directly from ASUS's official website.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-reports-active-exploitation-of-asus-live-update-supply-chain-vulnerability-d-5-n-4-d/gD2P6Ple2L
updated 2025-12-18T15:41:16.840000
7 posts
4 repos
https://github.com/StasonJatham/cisco-sa-sma-attack-N9bf4
https://github.com/Ashwesker/Blackash-CVE-2025-20393
Thanks to CVE-2025-20393 my Cisco alert already has been triggered.
In consequence, I received the following alert email.
##Thanks to CVE-2025-20393 my Cisco alert already has been triggered.
In consequence, I received the following alert email.
##⚪ Cisco warns of an unpatched zero‑day vulnerability in AsyncOS
🗨️ Cisco has warned its customers about an unpatched zero-day vulnerability in Cisco AsyncOS that is already being actively exploited to attack Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) devices.
##🚨 CVE-2025-20393: Script to detect for Cisco Secure Email Gateway And Cisco Secure Email and Web Manager
CVSS: 10
Currently no patch and zero-day
GitHub: https://github.com/StasonJatham/cisco-sa-sma-attack-N9bf4
##🔥 Cisco AsyncOS Zero-Day (CVE-2025-20393)
• BleepingComputer
https://www.bleepingcomputer.com/news/security/cisco-warns-of-unpatched-asyncos-zero-day-exploited-in-attacks/
• The Hacker News
https://thehackernews.com/2025/12/cisco-warns-of-active-attacks.html
• SecurityWeek
https://www.securityweek.com/china-linked-hackers-exploiting-zero-day-in-cisco-security-gear/
• The Register
https://www.theregister.com/2025/12/17/attacks_pummeling_cisco_0day/
• Dark Reading (CISA KEV addition)
https://www.darkreading.com/attacks-breaches/cisa-adds-cisco-asyncos-zero-day-to-kev-catalog
• SOCRadar analysis
https://socradar.io/blog/cve-2025-20393-cisco-asyncos-zero-day-email/
updated 2025-12-18T15:30:52
1 posts
CVE-2025-64466 - Out-of-Bounds Read in lvre!ExecPostedProcRecPost() in NI LabVIEW https://cvefeed.io/vuln/detail/CVE-2025-64466
##updated 2025-12-18T15:30:51
1 posts
CVE-2025-64469 - Stack-based Buffer Overflow in LVResource::DetachResource() in NI LabVIEW https://cvefeed.io/vuln/detail/CVE-2025-64469
##updated 2025-12-18T15:30:45
1 posts
CVE-2025-64467 - Out-of-Bounds Read in LVResFile::FindRsrcListEntry() in NI LabVIEW https://cvefeed.io/vuln/detail/CVE-2025-64467
##updated 2025-12-18T15:07:18.427000
1 posts
CVE-2025-13110 - HUSKY – Products Filter Professional for WooCommerce <= 1.3.7.3 - Authenticated (Subscriber+) Insecure Direct Object Reference via 'woof_add_subscr' https://cvefeed.io/vuln/detail/CVE-2025-13110
##updated 2025-12-16T22:37:26
1 posts
Command injection flaw reported in Node.js systeminformation package
A command injection vulnerability (CVE-2025-68154) in the systeminformation Node.js library's fsSize() function allows attackers to execute arbitrary PowerShell commands on Windows systems through unsanitized user input in the drive parameter. The vulnerability has been patched in version 5.27.14.
**If you're using the systeminformation Node.js library on Windows, plan an upgrade to version 5.27.14 or newer to patch this command injection flaw. Review all applications using this library, especially web APIs or tools that accept user input for disk queries, to ensure they're running the patched version.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/command-injection-flaw-reported-in-node-js-systeminformation-package-5-5-0-6-6/gD2P6Ple2L
updated 2025-12-16T21:32:02
1 posts
Critical remote code execution flaw reported in Apache Commons Text library
Apache Commons Text versions prior to 1.10.0 contain a critical remote code execution vulnerability (CVE-2025-46295,) that allows attackers to inject malicious code through the text-substitution API when processing untrusted input. The flaw was patched in late 2022 but is not updated in many deployed applications.
**If you use Apache Commons Text in your Java applications, check your version immediately and upgrade to at least version 1.10.0 (or preferably 1.15.0). Thi flaw allows remote code execution, so treat this update as very important. Exploits will start soon.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-remote-code-execution-flaw-reported-in-apache-commons-text-library-d-k-v-h-p/gD2P6Ple2L
updated 2025-12-16T21:30:51
2 posts
3 repos
https://github.com/Ashwesker/Blackash-CVE-2025-59718
📰 ** Information Briefing: **
✨ FortiCloud SSO Login Bypass: Exploited in the Wild
- Critical vulnerabilities: CVE-2025-59718 and CVE-2025-59719
- Unauthenticated adversaries bypass FortiCloud SSO login
- Exploitation observed in the wild
- Affected products: FortiOS, FortiProxy, FortiSwitchManager, FortiWeb
🔗 https://www.adalta.info/pdf/index.html?title=prstn_exploit_115742000142229693&lang=en
(Available in 🇩🇪 🇺🇸 🇫🇷)
We wrote a little bit on FortiCloud SSO login bypass CVE-2025-59718 (and 59719). Both the known PoCs for the former are fake / invalid. There does appear to be real exploitation evidence, but detections based on fake PoCs ain't it (and it seems like that's where a lot of chatter is coming from)
##updated 2025-12-16T15:30:56
2 posts
3. Rust joined the Linux kernel mainline last week and immediately checked off a rite of passage: its first CVE.
https://lore.kernel.org/linux-cve-announce/2025121614-CVE-2025-68260-558d@gregkh/T/#u
updated 2025-12-11T15:31:38
1 posts
📢 PCIe: trois vulnérabilités IDE/TDISP (CVE-2025-9612/9613/9614) brisent l’intégrité et l’isolation
📝 Selon PCI-SIG (avis PCISIGVRT0001, publié le 9 décembre 2025) et un bulletin associé du CERT/CC, des vulnérabilités affe...
📖 cyberveille : https://cyberveille.ch/posts/2025-12-26-pcie-trois-vulnerabilites-ide-tdisp-cve-2025-9612-9613-9614-brisent-lintegrite-et-lisolation/
🌐 source : https://pcisig.com/PCIeIDEStandardVulnerabilities
#CVE_2025_9612_9614 #IDE_TDISP #Cyberveille
updated 2025-12-09T18:30:52
1 posts
1 repos
📰 ** Information Briefing: **
✨ FortiCloud SSO Login Bypass: Exploited in the Wild
- Critical vulnerabilities: CVE-2025-59718 and CVE-2025-59719
- Unauthenticated adversaries bypass FortiCloud SSO login
- Exploitation observed in the wild
- Affected products: FortiOS, FortiProxy, FortiSwitchManager, FortiWeb
🔗 https://www.adalta.info/pdf/index.html?title=prstn_exploit_115742000142229693&lang=en
(Available in 🇩🇪 🇺🇸 🇫🇷)
updated 2025-12-09T16:53:25
2 posts
100 repos
https://github.com/msanft/CVE-2025-55182
https://github.com/MoLeft/React2Shell-Toolbox
https://github.com/fullhunt/react2shell-test-server
https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS
https://github.com/ThemeHackers/CVE-2025-55182
https://github.com/mrknow001/RSC_Detector
https://github.com/C00LN3T/React2Shell
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/xiaopeng-ye/react2shell-detector
https://github.com/zr0n/react2shell
https://github.com/SainiONHacks/CVE-2025-55182-Scanner
https://github.com/Pizz33/CVE-2025-55182-burpscanner
https://github.com/Ashwesker/Blackash-CVE-2025-55182
https://github.com/ynsmroztas/NextRce
https://github.com/xcanwin/CVE-2025-55182-React-RCE
https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell
https://github.com/hoosin/CVE-2025-55182
https://github.com/techgaun/cve-2025-55182-scanner
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-
https://github.com/zack0x01/vuln-app-CVE-2025-55182
https://github.com/yz9yt/React2Shell-CTF
https://github.com/freeqaz/react2shell
https://github.com/xalgord/React2Shell
https://github.com/alsaut1/react2shell-lab
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/Spritualkb/CVE-2025-55182-exp
https://github.com/ejpir/CVE-2025-55182-bypass
https://github.com/im-ezboy/CVE-2025-55182-zoomeye
https://github.com/dwisiswant0/CVE-2025-55182
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/whiteov3rflow/CVE-2025-55182-poc
https://github.com/hidden-investigations/react2shell-scanner
https://github.com/alfazhossain/CVE-2025-55182-Exploiter
https://github.com/fatguru/CVE-2025-55182-scanner
https://github.com/kavienanj/CVE-2025-55182
https://github.com/VeilVulp/RscScan-cve-2025-55182
https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool
https://github.com/EynaExp/CVE-2025-55182-POC
https://github.com/hualy13/CVE-2025-55182
https://github.com/shamo0/react2shell-PoC
https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182
https://github.com/Rsatan/Next.js-Exploit-Tool
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/TrixSec/CVE-2025-55182-Scanner
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/sho-luv/React2Shell
https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script
https://github.com/shyambhanushali/React2Shell
https://github.com/ejpir/CVE-2025-55182-research
https://github.com/sumanrox/rschunter
https://github.com/StealthMoud/CVE-2025-55182-Scanner
https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE
https://github.com/c0rydoras/CVE-2025-55182
https://github.com/XiaomingX/CVE-2025-55182-poc
https://github.com/emredavut/CVE-2025-55182
https://github.com/timsonner/React2Shell-CVE-2025-55182
https://github.com/santihabib/CVE-2025-55182-analysis
https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive
https://github.com/sudo-Yangziran/CVE-2025-55182POC
https://github.com/logesh-GIT001/CVE-2025-55182
https://github.com/RuoJi6/CVE-2025-55182-RCE-shell
https://github.com/acheong08/CVE-2025-55182-poc
https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182
https://github.com/GelukCrab/React-Server-Components-RCE
https://github.com/f0xyx/CVE-2025-55182-Scanner
https://github.com/SoICT-BKSEC/CVE-2025-55182-docker-lab
https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc
https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI
https://github.com/LemonTeatw1/CVE-2025-55182-exploit
https://github.com/zzhorc/CVE-2025-55182
https://github.com/yanoshercohen/React2Shell_CVE-2025-55182
https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
https://github.com/sickwell/CVE-2025-55182
https://github.com/theori-io/reactguard
https://github.com/xkillbit/cve-2025-55182-scanner
https://github.com/kOaDT/poc-cve-2025-55182
https://github.com/websecuritylabs/React2Shell-Library
https://github.com/AliHzSec/CVE-2025-55182
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/AggressiveUser/React2Hell
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/Chocapikk/CVE-2025-55182
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
https://github.com/gensecaihq/react2shell-scanner
https://github.com/keklick1337/CVE-2025-55182-golang-PoC
https://github.com/Saturate/CVE-2025-55182-Scanner
https://github.com/jf0x3a/CVE-2025-55182-exploit
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/raivenLockdown/RCE_React2Shell_ButCooler-SomeUselessUsefulThingsLMAO-
https://github.com/assetnote/react2shell-scanner
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/rix4uni/CVE-2025-55182
https://github.com/subhdotsol/CVE-2025-55182
This is legit a Christmas miracle b/c I rly did not want to spend the break tending to #React2Shell
##updated 2025-12-06T22:15:50.277000
1 posts
2 repos
Very good question! I hope you’ll forgive me for a long response, it is something I have a lot of thoughts on.
I used to think newer is better, but after plenty of distro-hopping (I had a real good time on Arch), I realized that Debian’s version of "stability" is actually its greatest feature. Here is how I’ve come to see it, using your Fedora experience as a comparison:
Fist, with Debian, stable means unchanging. Fedora is a fast-moving target. It was an early adopter for Wayland and Pipewire. That is exciting, but it can feel like a version of whiplash. Debian is the opposite. Once a version is released, the APIs, file locations, and package behaviors are locked in. Its predictability means my system feels the same on Day 1 as it does on Day 300.
Debian prioritizes reliability over cutting-edge performance. While Fedora pushes the new thing, Debian’s conservative defaults ensure maximum compatibility. It is the "just works" philosophy. It is not just that it doesn't crash, it is that it doesn't surprise you.
I also find APT to be incredibly satisfying compared to DNF. The sheer size of the repositories is massive, but APT Pinning is THE feature for me. Being able to set numeric priorities in /etc/apt/preferences allows me to do things like pull a specific package from Backports while keeping the rest of the system on the Stable branch. It gives you control over dependency resolution that is hard to match.
Regarding your question on security, Debian is unique because it is a 100% community-led project. Unlike Fedora (Red Hat) or Ubuntu (Canonical), there is no corporate entity at the top. This is one of the most important traits to me. If Red Hat wanted to, Fedora could start showing ads in the application menu with the next update. I don’t think that will happen with Fedora, but who knows, Canonical is now showing ads in the cli. Enough is enough.
I also appreciate Debian’s focus on inclusion. It is one of the most inclusive projects in tech. As a member of the queer community, it is important to me to use tools that are created and supported by those who do not hate me for being different. To quote their Diversity Statement: “No matter how you identify yourself or how others perceive you: we welcome you. We welcome contributions from everyone as long as they interact constructively with our community.” They forbid discrimination against any person or group. Because it is a global meritocracy, you have contributors from every corner of the world. This diversity is actually a security feature because with so many different eyes on the code, it is much harder for a backdoor or a bias to slip through unnoticed.
For your "backdoor-proof" concern, Debian’s Social Contract and strict adherence to free software guidelines mean every line of code is scrutinized by volunteers around the world. It is transparent by design. While no distro/OS is unhackable, Debian’s slow and steady release cycle means security patches are thoroughly vetted before they hit your machine, reducing the risk of zero day regressions. Fedora has been vulnerable to zero day attacks in the past and will probably continue to be in the future. For instance, because Fedora is always on the latest versions, Fedora Users are often vulnerable to new attack. Earlier in 2025, the latest kernel which Fedora had pushed to users had a zero day vulnerability. Debian stable users did not have that vulnerability because they would not see that update for quite some time.
Sources:
Ubuntu Showing Ads in Terminal - https://linuxiac.com/ubuntu-once-again-angered-users-by-placing-ads/
Debian Social Contract - https://www.debian.org/social_contract
Debian Diversity Statement - https://www.debian.org/intro/diversity
Zero day vulnerability mentioned -https://www.cve.org/CVERecord?id=CVE-2025-37899
##updated 2025-12-05T21:31:27
1 posts
updated 2025-12-04T22:50:04
1 posts
1 repos
#PoC for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws)
##updated 2025-12-04T17:15:25.860000
1 posts
🚨 EUVD-2025-205459
📊 Score: n/a
📅 Updated: 2025-12-26
📝 FastMCP updated to MCP 1.23+ due to CVE-2025-66416
🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-205459
##updated 2025-12-03T18:15:47.200000
1 posts
100 repos
https://github.com/Rhyru9/CVE-2025-66478
https://github.com/C00LN3T/React2Shell
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-catalog
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-workspaces
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/wangxso/CVE-2025-66478-POC
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/xiaopeng-ye/react2shell-detector
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-no-lockfile
https://github.com/DavionGowie/-vercel-application-is-vulnerable-to-CVE-2025-66478.
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-bun
https://github.com/Geekujin/React2-PowerShell-CVE-Checker
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-lockfile-mismatch
https://github.com/lincemorado97/CVE-2025-55182_CVE-2025-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-v-prefix
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/KingHacker353/R2C-CVE-2025-55182-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-git-dep
https://github.com/Mustafa1p/Next.js-RCE-Scanner---CVE-2025-55182-CVE-2025-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-build-metadata
https://github.com/mounta11n/CHECK-CVE-2025-55182-AND-CVE-2025-66478
https://github.com/freeqaz/react2shell
https://github.com/mattcbarrett/check-cve-2025-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-berry
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tag-latest
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-zero-installs
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-yarn-workspaces
https://github.com/jctommasi/react2shellVulnApp
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-hoisting
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/Letalandroid/cve-2025-66478_rce_vulnerable
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-dub-pnpm-monorepo
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-14x
https://github.com/ExpTechTW/CVE-2025-66478
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-overrides
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-patch-package
https://github.com/hidden-investigations/react2shell-scanner
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-caret
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-pnp
https://github.com/thedarckpassenger/Next.js-RSC-RCE-Scanner-CVE-2025-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-range
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-peer-conflict
https://github.com/namest504/CVE-2025-66478-Exploit-Poc
https://github.com/Code42Cate/nexts-cve-2025-66478-exploit
https://github.com/shamo0/react2shell-PoC
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-packagemanager-field
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-devdeps
https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script
https://github.com/abdozkaya/rsc-security-auditor
https://github.com/shyambhanushali/React2Shell
https://github.com/FurkanKAYAPINAR/ReactNext2Shell
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-npm-nested-versions
https://github.com/arashiyans/CVE-2025-55182-CVE-2025-66478
https://github.com/sumanrox/rschunter
https://github.com/emredavut/CVE-2025-55182
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-pnpm-symlinks
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-16x
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-canary-15x
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-supabase-pnpm-monorepo
https://github.com/enesbuyuk/react2shell-security-tool
https://github.com/aseemyash/krle
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-transitive
https://github.com/strainxx/react2shell-honeypot
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-optional-deps
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-shrinkwrap
https://github.com/changgun-lee/Next.js-RSC-RCE-Scanner-CVE-2025-66478
https://github.com/Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478
https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-realworld-calcom-yarn-monorepo
https://github.com/vercel-labs/fix-react2shell-next
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-rsc-webpack
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-alias
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-npm-tilde
https://github.com/gagaltotal/tot-react-rce-CVE-2025-55182
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-yarn-resolutions
https://github.com/abtonc/next-cve-2025-66478
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/abhirajranjan/cve-2025-66478
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/zhixiangyao/CVE-2025-66478-Exploit-PoC
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/ancs21/react2shell-scanner-rust
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/grp-ops/react2shell
https://github.com/assetnote/react2shell-scanner
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-single-nextjs-pnpm-overrides
https://github.com/Jibaru/CVE-2025-66478-github-patcher
https://github.com/rix4uni/CVE-2025-55182
https://github.com/react2shell-repo-menagerie/CVE-2025-66478-monorepo-nextjs-turborepo
https://github.com/aiexz/CVE-2025-66478-kinda-waf
updated 2025-11-14T02:00:02.350000
1 posts
Yooo @yeslikethefood wrote a neat bunch of words about developing an exploit for Gladinet Triofox CVE-2025-12480 that closely followed the real-world attack pattern Mandiant wrote about last month and attributed to UNC6485.
20+ requests, an AV config trigger, and an embedded PostgreSQL server later:
https://www.vulncheck.com/blog/triofox-exploit-cve-2025-12480
##updated 2025-11-13T18:31:03
1 posts
1 repos
IDK if I shared this dumb Tenda one already or not:
https://github.com/Remenis/CVE-2025-63666
I know this sort of thing used to be fairly common but it's weird seeing it in a 2025 CVE.
##updated 2025-11-13T15:31:32
1 posts
2 repos
https://github.com/watchtowrlabs/watchTowr-vs-WatchGuard-CVE-2025-9242
Urgent: A critical WatchGuard Firebox RCE flaw (CVE-2025-9242) is being actively exploited. CISA has mandated patching. Over 54k devices are still vulnerable. Patch immediately and rotate all credentials. https://redteamnews.com/red-team/cve/critical-watchguard-firebox-rce-flaw-exploited-cisa-issues-directive/
##updated 2025-11-11T17:15:38.977000
1 posts
3 repos
https://github.com/N3k0t-dev/PoC-CVE-collection
https://github.com/Ashwesker/Blackash-CVE-2025-11953
https://github.com/SaidBenaissa/cve-2025-11953-vulnerability-demo
🚨 Active exploitation confirmed: CVE-2025-11953
VulnCheck is reporting active exploitation attempts in the wild against the React Native Metro server.
The issue? It binds to 0.0.0.0 by default, exposing a "local" dev tool to the internet.
⚠️ Crucial Detail: While the exposure is general, the current RCE exploit specifically targets Windows environments.
We’ve updated Pentest-Tools.com to help you validate this:
Network Scanner: Detects exposed Metro servers.
Sniper Auto-Exploiter: Safely executes a PoC (on Windows) to confirm RCE.
Fix: Update @react-native-community/cli-server-api to v20.0.0+ or bind to 127.0.0.1.
Validate your risk.
#InfoSec #AppSec #RedTeam #VulnerabilityManagement #ReactNative #CVE202511953
##updated 2025-11-11T15:32:22
1 posts
22 repos
https://github.com/AdityaBhatt3010/CVE-2025-59287-When-your-patch-server-becomes-the-attack-vector
https://github.com/N3k0t-dev/PoC-CVE-collection
https://github.com/RadzaRr/WSUSResponder
https://github.com/Twodimensionalitylevelcrossing817/CVE-2025-59287
https://github.com/0xBruno/WSUSploit.NET
https://github.com/Lupovis/Honeypot-for-CVE-2025-59287-WSUS
https://github.com/gud425/gud425.github.io
https://github.com/tecxx/CVE-2025-59287-WSUS
https://github.com/0x7556/CVE-2025-59287
https://github.com/FurkanKAYAPINAR/CVE-2025-59287
https://github.com/mrk336/Breaking-the-Update-Chain-Inside-CVE-2025-59287-and-the-WSUS-RCE-Threat
https://github.com/mubix/Find-WSUS
https://github.com/fsanzmoya/wsus_CVE-2025-59287
https://github.com/dexterm300/cve-2025-59287-exploit-poc
https://github.com/M507/CVE-2025-59287-PoC
https://github.com/QurtiDev/WSUS-CVE-2025-59287-RCE
https://github.com/garvitv14/CVE-2025-59287
https://github.com/Adel-kaka-dz/cve-2025-59287
https://github.com/esteban11121/WSUS-RCE-Mitigation-59287
Critical WSUS flaw reported in Schneider Electric Foxboro DCS systems
Schneider Electric issued a critical security advisory for a vulnerability (CVE-2025-59287) in its EcoStruxure Foxboro DCS Advisor services caused by a flaw in Microsoft WSUS that allows unauthenticated attackers to execute arbitrary code with SYSTEM privileges via ports 8530/8531. Active exploitation is observed in the wild.
**This one is important and kind of urgent, there is active exploitation. If you have Schneider Electric EcoStruxure Foxboro DCS Advisor systems, make sure to block WSUS ports 8530/8531 from the internet, or even better, make sure they are isolated from the internet and only accessible from trusted networks. Then apply Microsoft patches KB5070882 and KB5070884 and verify patch with Schneider Electric Global Customer Support.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-wsus-flaw-reported-in-schneider-electric-foxboro-dcs-systems-8-0-8-z-c/gD2P6Ple2L
updated 2025-10-31T21:56:14.103000
1 posts
19 repos
https://github.com/ODST-Forge/CVE-2025-31324_PoC
https://github.com/nairuzabulhul/nuclei-template-cve-2025-31324-check
https://github.com/harshitvarma05/CVE-2025-31324-Exploits
https://github.com/JonathanStross/CVE-2025-31324
https://github.com/Onapsis/Onapsis_CVE-2025-31324_Scanner_Tools
https://github.com/antichainalysis/sap-netweaver-0day-CVE-2025-31324
https://github.com/abrewer251/CVE-2025-31324_PoC_SAP
https://github.com/rxerium/CVE-2025-31324
https://github.com/NULLTRACE0X/CVE-2025-31324
https://github.com/Onapsis/Onapsis-Mandiant-CVE-2025-31324-Vuln-Compromise-Assessment
https://github.com/moften/CVE-2025-31324
https://github.com/redrays-io/CVE-2025-31324
https://github.com/nullcult/CVE-2025-31324-File-Upload
https://github.com/BlueOWL-overlord/Burp_CVE-2025-31324
https://github.com/respondiq/jsp-webshell-scanner
https://github.com/sug4r-wr41th/CVE-2025-31324
https://github.com/moften/CVE-2025-31324-NUCLEI
⚪ Vulnerability in SAP NetWeaver Exploited to Deploy Auto-Color Linux Malware
🗨️ Experts at Darktrace warned that hackers exploited a critical vulnerability in SAP NetWeaver (CVE-2025-31324) to deploy Linux malware Auto-Color into the network of an unnamed American chemical company.
##updated 2025-10-30T15:50:59.680000
1 posts
28 repos
https://github.com/nhattanhh/CVE-2025-8088
https://github.com/techcorp/CVE-2025-8088-Exploit
https://github.com/sxyrxyy/CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-
https://github.com/xi0onamdev/WinRAR-CVE-2025-8088-Exploitation-Toolkit
https://github.com/AdityaBhatt3010/CVE-2025-8088-WinRAR-Zero-Day-Path-Traversal
https://github.com/Ashwesker/Blackash-CVE-2025-8088
https://github.com/travisbgreen/cve-2025-8088
https://github.com/kitsuneshade/WinRAR-Exploit-Tool---Rust-Edition
https://github.com/Markusino488/cve-2025-8088
https://github.com/papcaii2004/CVE-2025-8088-WinRAR-builder
https://github.com/pescada-dev/-CVE-2025-8088
https://github.com/0xAbolfazl/CVE-2025-8088-WinRAR-PathTraversal-PoC
https://github.com/jordan922/CVE-2025-8088
https://github.com/DeepBlue-dot/CVE-2025-8088-WinRAR-Startup-PoC
https://github.com/nuky-alt/CVE-2025-8088
https://github.com/hbesljx/CVE-2025-8088-EXP
https://github.com/ghostn4444/CVE-2025-8088
https://github.com/walidpyh/CVE-2025-8088
https://github.com/4daysday/cve-2025-8088
https://github.com/pexlexity/WinRAR-CVE-2025-8088-Path-Traversal-PoC
https://github.com/hexsecteam/CVE-2025-8088-Winrar-Tool
https://github.com/pentestfunctions/CVE-2025-8088-Multi-Document
https://github.com/Shinkirou789/Cve-2025-8088-WinRar-vulnerability
https://github.com/onlytoxi/CVE-2025-8088-Winrar-Tool
https://github.com/Syrins/CVE-2025-8088-Winrar-Tool-Gui
https://github.com/lucyna77/winrar-exploit
⚪ 0-day WinRAR vulnerability used in phishing attacks
🗨️ ESET specialists reported that a recently patched vulnerability in WinRAR (CVE-2025-8088) was used as a 0-day in phishing attacks and was leveraged to install RomCom malware.
##updated 2025-10-24T12:53:49.213000
7 posts
Fortinet confirms active exploitation of CVE-2020-12812.
A long-standing FortiOS SSL VPN flaw can bypass 2FA due to username case-sensitivity mismatches - especially in legacy deployments.
https://www.technadu.com/fortinet-warns-july-disclosed-ssl-vpn-flaw-is-being-used-to-bypass/616801/
Thoughts on mitigating MFA bypass risks?
##📢 Fortinet signale l’exploitation active de CVE‑2020‑12812 (FG‑IR‑19‑283) permettant de contourner le 2FA via LDAP
📝 Source: Fortinet (PSIRT Blog)...
📖 cyberveille : https://cyberveille.ch/posts/2025-12-26-fortinet-signale-lexploitation-active-de-cve-2020-12812-fg-ir-19-283-permettant-de-contourner-le-2fa-via-ldap/
🌐 source : https://www.fortinet.com/blog/psirt-blogs/product-security-advisory-and-analysis-observed-abuse-of-fg-ir-19-283
#2FA_bypass #CVE_2020_12812 #Cyberveille
Fortinet FortiOS SSL VPN Authentication Bypass via CVE-2020-12812 Resurfaces in Active Attacks + Video
Introduction: A Forgotten Flaw Returns to the Threat Landscape Security vulnerabilities rarely disappear, they wait. CVE-2020-12812, an authentication bypass flaw disclosed more than five years ago in Fortinet FortiOS SSL VPN, has reemerged as an active threat. Recent observations by Fortinet researchers confirm that attackers are once again exploiting this weakness…
##Fortinet warns of active exploitation of 2FA Bypass flaw in FortiGate devices
Fortinet is warning of active exploitation of CVE-2020-12812, a critical 5-year-old authentication bypass vulnerability (CVSS 9.8) affecting FortiGate devices with LDAP authentication. The flaw allows attackers to bypass two-factor authentication by exploiting case sensitivity mismatches between FortiGate and LDAP username handling.
**If you are using FortiGate devices, check whether you are using LDAP authentication and whether the devices are patched. If you are using LDAP authentication and have not patched since 2020, immediately configure `username-sensitivity disable`. Then check your logs for suspicious logins with username case variations (like 'JSmith' vs 'jsmith'). Finally, patch your devices.**
#cybersecurity #infosec #attack #activeattack
https://beyondmachines.net/event_details/fortinet-warns-of-active-exploitation-of-2fa-bypass-flaw-in-fortigate-devices-5-l-e-z-a/gD2P6Ple2L
Fortinet Confirms Active Exploitation of CVE-2020-12812, Exposing SSL VPNs to Silent 2FA Bypass
A Silent Flaw Resurfaces in Enterprise Perimeters Fortinet has confirmed active exploitation of CVE-2020-12812, a long-standing vulnerability affecting FortiOS SSL VPN that allows attackers to bypass two-factor authentication through a case-insensitive user authentication flaw. The issue, originally disclosed and patched in 2020, has resurfaced as attackers actively target…
##Fortinet confirms active exploitation of CVE-2020-12812.
A long-standing FortiOS SSL VPN flaw can bypass 2FA due to username case-sensitivity mismatches - especially in legacy deployments.
https://www.technadu.com/fortinet-warns-july-disclosed-ssl-vpn-flaw-is-being-used-to-bypass/616801/
Thoughts on mitigating MFA bypass risks?
##Fortinet warns of active exploitation of 2FA Bypass flaw in FortiGate devices
Fortinet is warning of active exploitation of CVE-2020-12812, a critical 5-year-old authentication bypass vulnerability (CVSS 9.8) affecting FortiGate devices with LDAP authentication. The flaw allows attackers to bypass two-factor authentication by exploiting case sensitivity mismatches between FortiGate and LDAP username handling.
**If you are using FortiGate devices, check whether you are using LDAP authentication and whether the devices are patched. If you are using LDAP authentication and have not patched since 2020, immediately configure `username-sensitivity disable`. Then check your logs for suspicious logins with username case variations (like 'JSmith' vs 'jsmith'). Finally, patch your devices.**
#cybersecurity #infosec #attack #activeattack
https://beyondmachines.net/event_details/fortinet-warns-of-active-exploitation-of-2fa-bypass-flaw-in-fortigate-devices-5-l-e-z-a/gD2P6Ple2L
updated 2025-10-22T00:34:17
1 posts
SonicWall patches actively exploited flaw vulnerability chain in SMA 1000 appliances
SonicWall SMA 1000 appliances are being actively exploited through a vulnerability chain combining CVE-2025-40602 (a local privilege escalation flaw) with CVE-2025-23006 (a previously patched deserialization vulnerability), enabling unauthenticated remote code execution with root privileges.
**If you have SonicWall SMA 1000 appliances, make sure their SSH and management access is isolated from the public internet and only accessible from trusted networks. Review latest version, and if not up-to date patched, plan a very quick upgrade to platform-hotfix 12.4.3-03245 or 12.5.0-02283 (or higher). Your devices are being hacked, and you can't really hide them from the internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/sonicwall-patches-actively-exploited-flaw-vulnerability-chain-in-sma-1000-appliances-x-l-b-q-7/gD2P6Ple2L
updated 2025-10-22T00:34:16
2 posts
10 repos
https://github.com/watchtowrlabs/fortios-auth-bypass-poc-CVE-2024-55591
https://github.com/sysirq/fortios-auth-bypass-exploit-CVE-2024-55591
https://github.com/UMChacker/CVE-2024-55591-POC
https://github.com/sysirq/fortios-auth-bypass-poc-CVE-2024-55591
https://github.com/watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591
https://github.com/virus-or-not/CVE-2024-55591
https://github.com/binarywarm/exp-cmd-add-admin-vpn-CVE-2024-55591
https://github.com/0x7556/CVE-2024-55591
⚪ Fortress assault: Bypassing authentication in FortiOS and FortiProxy
🗨️ This article narrates my searches for the CVE-2024-55591 vulnerability in FortiOS and FortiProxy disclosed by Fortinet. This security hole makes it possible to bypass authentication using an alternate path or channel (CWE-288) and enables a remote attacker to gain…
##⚪ Fortress assault: Bypassing authentication in FortiOS and FortiProxy
🗨️ This article narrates my searches for the CVE-2024-55591 vulnerability in FortiOS and FortiProxy disclosed by Fortinet. This security hole makes it possible to bypass authentication using an alternate path or channel (CWE-288) and enables a remote attacker to gain…
##updated 2025-10-22T00:34:16
1 posts
1 repos
CVE-2024-53704 in SonicWall SSLVPN has been added to the KEV Catalog.
##updated 2025-10-22T00:31:30
1 posts
7 repos
https://github.com/Palvinder-Singh/PS_CVE2018-0802
https://github.com/roninAPT/CVE-2018-0802
https://github.com/rxwx/CVE-2018-0802
https://github.com/likekabin/CVE-2018-0802_CVE-2017-11882
https://github.com/zldww2011/CVE-2018-0802_POC
📢 Cloud Atlas (APT) en 2025 : chaîne d’infection mise à jour via CVE‑2018‑0802, VBShower/VBCloud/PowerShower et détournement de DLL VLC
📝 Kaspersky publie un rapport (19 déc.
📖 cyberveille : https://cyberveille.ch/posts/2025-12-26-cloud-atlas-apt-en-2025-chaine-dinfection-mise-a-jour-via-cve-2018-0802-vbshower-vbcloud-powershower-et-detournement-de-dll-vlc/
🌐 source : https://securelist.com/cloud-atlas-h1-2025-campaign/118517/
#APT #CVE_2018_0802 #Cyberveille
updated 2025-10-22T00:16:02.450000
1 posts
38 repos
https://github.com/zhouat/cve-2017-11882
https://github.com/rxwx/CVE-2018-0802
https://github.com/davidforis/exp-2024-1213
https://github.com/0x09AL/CVE-2017-11882-metasploit
https://github.com/BlackMathIT/2017-11882_Generator
https://github.com/xdrake1010/CVE-2017-11882-Preventer
https://github.com/HZachev/ABC
https://github.com/Sunqiz/CVE-2017-11882-reproduction
https://github.com/herbiezimmerman/CVE-2017-11882-Possible-Remcos-Malspam
https://github.com/chanbin/CVE-2017-11882
https://github.com/Shadowshusky/CVE-2017-11882-
https://github.com/tzwlhack/CVE-2017-11882
https://github.com/j0lama/CVE-2017-11882
https://github.com/ActorExpose/CVE-2017-11882
https://github.com/Ridter/RTF_11882_0802
https://github.com/imkidz0/CVE-2017-11882
https://github.com/futureFfff/CVE-2017
https://github.com/jadeapar/Dragonfish-s-Malware-Cyber-Analysis
https://github.com/CSC-pentest/cve-2017-11882
https://github.com/likekabin/CVE-2018-0802_CVE-2017-11882
https://github.com/yaseenibnakhtar/001-Malware-Analysis-CVE-2017-11882
https://github.com/likekabin/CVE-2017-11882
https://github.com/embedi/CVE-2017-11882
https://github.com/ChaitanyaHaritash/CVE-2017-11882
https://github.com/Grey-Li/CVE-2017-11882
https://github.com/qy1202/https-github.com-Ridter-CVE-2017-11882-
https://github.com/Ridter/CVE-2017-11882
https://github.com/HaoJame/CVE-2017-11882
https://github.com/Abdibimantara/Maldoc-Analysis
https://github.com/nhuynhuy/cve-2017-11882
https://github.com/letiencong96/CVE_2017_11882
https://github.com/legendsec/CVE-2017-11882-for-Kali
https://github.com/Retr0-code/SignHere
https://github.com/ekgg/Overflow-Demo-CVE-2017-11882
https://github.com/starnightcyber/CVE-2017-11882
https://github.com/lisinan988/CVE-2017-11882-exp
📢 Malspam en Europe: chaîne d’infection multi‑étapes livrant l’infostealer PureLogs via CVE‑2017‑11882
📝 ...
📖 cyberveille : https://cyberveille.ch/posts/2025-12-26-malspam-en-europe-chaine-dinfection-multi-etapes-livrant-linfostealer-purelogs-via-cve-2017-11882/
🌐 source : https://dimanec.unipegaso.it/losservatorio-sulla-cybersecurity-del-centro-di-ricerca-aisi-pubblica-il-report-dissecting-a-new-malspam-chain-delivering-purelogs-infostealer-november-25-2025/
#CVE_2017_11882 #IOC #Cyberveille
updated 2025-08-25T15:33:03
1 posts
⚪ Security researcher awarded $250,000 for Chrome sandbox escape vulnerability
🗨️ A security researcher going by the handle Micky received a record payout from Google. The specialist discovered a bug in Chrome that allows bypassing the browser’s sandbox and earned $250,000…
##updated 2025-08-12T18:31:39
1 posts
1 repos
New.
ESET: Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component https://www.welivesecurity.com/en/eset-research/revisiting-cve-2025-50165-critical-flaw-windows-imaging-component/ @ESETresearch #threatresearch #infosec #Windows #Microsoft
##updated 2025-08-06T20:23:37.600000
1 posts
1 repos
⚪ More than 29,000 Exchange servers are vulnerable to a serious bug
🗨️ 29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to full domain compromise.
##updated 2025-07-15T22:56:20
1 posts
updated 2025-07-11T06:30:36
1 posts
Critical vulnerabilities reported in Axis Communications Camera management systems
Axis Communications patched four security vulnerabilities (CVE-2025-30023 through CVE-2025-30026) in its camera management software, including a critical remote code execution flaw and authentication bypass issues affecting surveillance systems in government facilities and critical infrastructure.
**If you have Axis Communications camera management systems (AXIS Camera Station Pro, AXIS Camera Station, or AXIS Device Manager), make sure they are isolated from the internet and only accessible from trusted internal networks. Then plan an update to the latest patched versions (Camera Station Pro 6.9+, Camera Station 5.58+, Device Manager 5.32+).**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-vulnerabilities-reported-in-axis-communications-camera-management-systems-a-w-f-7-b/gD2P6Ple2L
updated 2025-07-11T06:30:36
1 posts
Critical vulnerabilities reported in Axis Communications Camera management systems
Axis Communications patched four security vulnerabilities (CVE-2025-30023 through CVE-2025-30026) in its camera management software, including a critical remote code execution flaw and authentication bypass issues affecting surveillance systems in government facilities and critical infrastructure.
**If you have Axis Communications camera management systems (AXIS Camera Station Pro, AXIS Camera Station, or AXIS Device Manager), make sure they are isolated from the internet and only accessible from trusted internal networks. Then plan an update to the latest patched versions (Camera Station Pro 6.9+, Camera Station 5.58+, Device Manager 5.32+).**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-vulnerabilities-reported-in-axis-communications-camera-management-systems-a-w-f-7-b/gD2P6Ple2L
updated 2025-07-10T13:17:30.017000
1 posts
2 repos
When OAuth Becomes a Weapon: Lessons from CVE-2025-6514 https://amlalabs.com/blog/oauth-cve-2025-6514/
##updated 2025-06-27T12:32:20
1 posts
Critical authentication bypass flaw reported in Mitsubishi Electric air conditioning systems
Mitsubishi Electric disclosed a critical authentication bypass vulnerability (CVE-2025-3699) affecting multiple commercial air conditioning system models, allowing remote attackers to gain unauthorized control, manipulate operations, and potentially disrupt critical facilities like data centers and hospitals.
**If you have Mitsubishi Electric air conditioning systems review this advisory in detail to check if your system is affected. Make sure that the isolate the HVAC from the internet and ensure they're only accessible from trusted internal networks or through VPN. Since most models won't receive security fixes, network isolation is your primary protection.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-authentication-bypass-flaw-reported-in-mitsubishi-electric-air-conditioning-systems-g-j-c-h-u/gD2P6Ple2L
updated 2025-06-04T14:54:33.783000
1 posts
updated 2025-05-31T15:30:34
1 posts
1 repos
⚪ More than 29,000 Exchange servers are vulnerable to a serious bug
🗨️ 29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to full domain compromise.
##updated 2025-05-13T18:31:00
1 posts
Microsoft Brokering File System Elevation of Privilege Vulnerability (CVE--2025-29970) https://www.pixiepointsecurity.com/blog/nday-cve-2025-29970/
##updated 2025-03-06T21:31:33
2 posts
3 repos
https://github.com/Ashwesker/Blackash-CVE-2025-20393
⚪ Cisco warns of an unpatched zero‑day vulnerability in AsyncOS
🗨️ Cisco has warned its customers about an unpatched zero-day vulnerability in Cisco AsyncOS that is already being actively exploited to attack Secure Email Gateway (SEG) and Secure Email and Web Manager (SEWM) devices.
##🔥 Cisco AsyncOS Zero-Day (CVE-2025-20393)
• BleepingComputer
https://www.bleepingcomputer.com/news/security/cisco-warns-of-unpatched-asyncos-zero-day-exploited-in-attacks/
• The Hacker News
https://thehackernews.com/2025/12/cisco-warns-of-active-attacks.html
• SecurityWeek
https://www.securityweek.com/china-linked-hackers-exploiting-zero-day-in-cisco-security-gear/
• The Register
https://www.theregister.com/2025/12/17/attacks_pummeling_cisco_0day/
• Dark Reading (CISA KEV addition)
https://www.darkreading.com/attacks-breaches/cisa-adds-cisco-asyncos-zero-day-to-kev-catalog
• SOCRadar analysis
https://socradar.io/blog/cve-2025-20393-cisco-asyncos-zero-day-email/
updated 2024-08-20T20:35:34.497000
1 posts
somehow nfs feels faster too. Kinda sad about CVE-2024-44067 on this board but i don't really care because i just want more architectures
##updated 2023-01-30T05:03:17
2 posts
8 repos
https://github.com/NabilBoudra/cve-2017-5123
https://github.com/h1bAna/CVE-2017-5123
https://github.com/FloatingGuy/CVE-2017-5123
https://github.com/Synacktiv-contrib/exploiting-cve-2017-5123
https://github.com/teawater/CVE-2017-5123
https://github.com/0x5068656e6f6c/CVE-2017-5123
#Christmas hardening for #sydbox which features a SMAP implementation using seccomp(2). Syd loads a per-arch filter at startup to terminate processes passing kernel pointers to syscalls and the overhead is ~%0.02. This is enabled by default with the option trace/allow_unsafe_kptr:1 to disable. See CVE-2017-5123 for one example of SMAP bypass: https://man.exherbo.org/syd.7.html#Hardening_against_kernel_pointer_misuse #exherbo #linux #security
###Christmas hardening for #sydbox which features a SMAP implementation using seccomp(2). Syd loads a per-arch filter at startup to terminate processes passing kernel pointers to syscalls and the overhead is ~%0.02. This is enabled by default with the option trace/allow_unsafe_kptr:1 to disable. See CVE-2017-5123 for one example of SMAP bypass: https://man.exherbo.org/syd.7.html#Hardening_against_kernel_pointer_misuse #exherbo #linux #security
##Unstable stream updates: 27th December 2025
Declarative moss system-model export and import tech preview features
Moss now has the ability to use a declarative `/etc/moss/system-model.kdl` to define installed packages and repositories.
In addition, for users who prefer the classic "imperative" moss experience, it is now possible to `moss state --export` a `system-model.kdl` file of the current system to share with others.
In turn, it is also possible to one-shot `moss sync --import` an existing `system-model.kdl` file.
These features are delivered as a tech preview.
Boulder package recipe version string requirements
The Boulder packaging tool now checks for a valid recipe version string (= anything starting with an integer) and errors out if the version string is not valid.
This is necessary because our `ent` package update checking tool compares version strings to determine whether packages need an update, and will give false positives if we have a version string that looks like e.g. `v0.1.2` (note the `v`).
Highlights
- KDE Frameworks 6.21.0
- KMSCon 9.2.1 (currently not enabled by default)
- NVIDIA graphics driver 590.48.01
- discord 0.0.119
- gamescope 3.16.18
- gstreamer 1.26.10
- linux 6.17.13
- mesa 25.3.2
- sudo-rs 0.2.11
- uutils-coreutils 0.5.0
- vlc 3.22
- vscode-bin 1.107.0
- vscodium 1.107.18627
- wine 11.0-rc3
- zed 0.217.3
Other updates
Other updates include, but are not limited to:
- fastfetch
- inetutils
- inputplumber
- libdrm
- libva
- ryzenadj
- solaar
- tzdata
- wireplumber
Fixes
- Disabled LTO for the build of our recipe version checking tool `ent`, which makes `ent check updates` actually work.
- Fixed a sudo issue where using Super+T to open a cosmic-terminal in a Cosmic sesion would make sudo unable to find any commands
- Made cosmic-greeter fall back to branded background
Security Fixes:
- Patches to networkmanager and networkmanager-openvpn for CVE-2025-9615
New packages
- font-awesome-ttf 6.7.2
- lsd 1.2.0 (next gen ls command)
- swayidle 1.9.0
- yazi 25.5.31 (terminal file manager)
- yubikey-manager 5.8.0
Unstable stream updates: 27th December 2025
Declarative moss system-model export and import tech preview features
Moss now has the ability to use a declarative `/etc/moss/system-model.kdl` to define installed packages and repositories.
In addition, for users who prefer the classic "imperative" moss experience, it is now possible to `moss state --export` a `system-model.kdl` file of the current system to share with others.
In turn, it is also possible to one-shot `moss sync --import` an existing `system-model.kdl` file.
These features are delivered as a tech preview.
Boulder package recipe version string requirements
The Boulder packaging tool now checks for a valid recipe version string (= anything starting with an integer) and errors out if the version string is not valid.
This is necessary because our `ent` package update checking tool compares version strings to determine whether packages need an update, and will give false positives if we have a version string that looks like e.g. `v0.1.2` (note the `v`).
Highlights
- KDE Frameworks 6.21.0
- KMSCon 9.2.1 (currently not enabled by default)
- NVIDIA graphics driver 590.48.01
- discord 0.0.119
- gamescope 3.16.18
- gstreamer 1.26.10
- linux 6.17.13
- mesa 25.3.2
- sudo-rs 0.2.11
- uutils-coreutils 0.5.0
- vlc 3.22
- vscode-bin 1.107.0
- vscodium 1.107.18627
- wine 11.0-rc3
- zed 0.217.3
Other updates
Other updates include, but are not limited to:
- fastfetch
- inetutils
- inputplumber
- libdrm
- libva
- ryzenadj
- solaar
- tzdata
- wireplumber
Fixes
- Disabled LTO for the build of our recipe version checking tool `ent`, which makes `ent check updates` actually work.
- Fixed a sudo issue where using Super+T to open a cosmic-terminal in a Cosmic sesion would make sudo unable to find any commands
- Made cosmic-greeter fall back to branded background
Security Fixes:
- Patches to networkmanager and networkmanager-openvpn for CVE-2025-9615
New packages
- font-awesome-ttf 6.7.2
- lsd 1.2.0 (next gen ls command)
- swayidle 1.9.0
- yazi 25.5.31 (terminal file manager)
- yubikey-manager 5.8.0
🟠 CVE-2025-59946 - High (7.5)
NanoMQ MQTT Broker (NanoMQ) is an Edge Messaging Platform. Prior to version 0.24.2, there is a classical data racing issue about sub info list which could result in heap use after free crash. This issue has been patched in version 0.24.2.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59946/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##🔴 CVE-2025-66203 - Critical (9.9)
StreamVault is a video download integration solution. Prior to version 251126, a Remote Code Execution (RCE) vulnerability exists in the stream-vault application (SpiritApplication). The application allows administrators to configure yt-dlp argume...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66203/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##🚨 CRITICAL: CVE-2025-66203 in lemon8866 StreamVault (<251126). RCE possible via OS command injection in /admin/api/saveConfig. Patch to 251126 ASAP! Details: https://radar.offseq.com/threat/cve-2025-66203-cwe-78-improper-neutralization-of-s-bc8f18e3 #OffSeq #CVE202566203 #infosec #vulnerability
##1 posts
2 repos
🚨 New Exploit: FreeBSD rtsold 15.x - Remote Code Execution via DNSSL
📋 CVE: CVE-2025-14558
👤 Author: Lukas Johannes Möller
🔗 https://www.exploit-db.com/exploits/52463
#ExploitDB #InfoSec #CyberSecurity #CVE-2025-14558
##⚪ Critical RCE Bug Patched in HPE OneView
🗨️ Hewlett Packard Enterprise (HPE) developers have released patches for a critical remote code execution vulnerability discovered in the OneView IT infrastructure management software. The issue is tracked as CVE-2025-37164 (a maximum score of 10.0 on the CVSS scale) and can be exploited without authen…
##@gayint cve-2026-00001 - you use windows
##Hey @pft here's another one for your rule:
https://github.com/0xrakan/coolify-cve-2025-66209-66213
Per the write-up, it's five perfect 10s in Coolify. 🥳
##[Security Advisory] CVE-2025-14269: Credential caching in Headlamp with Helm enabled #devopsish https://groups.google.com/a/kubernetes.io/g/dev/c/5XH9BGiefH0/m/bGd9hkofCgAJ?utm_medium=email&utm_source=footer
##CVE-2025-67745 - Myhoard logs backup encryption key in plain text https://cvefeed.io/vuln/detail/CVE-2025-67745
##