## Updated at UTC 2025-06-19T02:44:46.853736

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2025-24288 9.8 0.00% 1 0 2025-06-19T00:15:22.323000 The Versa Director software exposes a number of services by default and allow at
CVE-2025-23121 9.9 0.00% 8 0 2025-06-19T00:15:21.260000 A vulnerability allowing remote code execution (RCE) on the Backup Server by an
CVE-2025-6192 8.8 0.00% 2 0 2025-06-18T20:15:19.890000 Use after free in Metrics in Google Chrome prior to 137.0.7151.119 allowed a rem
CVE-2025-20271 8.6 0.00% 2 0 2025-06-18T17:15:29.053000 A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco
CVE-2025-20234 5.3 0.00% 2 0 2025-06-18T17:15:28.833000 A vulnerability in Universal Disk Format (UDF) processing of ClamAV could allow
CVE-2025-4821 7.5 0.00% 4 0 2025-06-18T16:15:28.527000 Impact Cloudflare quiche was discovered to be vulnerable to incorrect congestio
CVE-2025-4820 5.3 0.00% 4 0 2025-06-18T16:15:28.403000 Impact Cloudflare quiche was discovered to be vulnerable to incorrect congestio
CVE-2025-45784 9.8 0.00% 2 0 2025-06-18T15:31:24 D-Link DPH-400S/SE VoIP Phone v1.01 contains hardcoded provisioning variables, i
CVE-2023-0386 7.8 55.44% 11 14 2025-06-18T15:00:59.680000 A flaw was found in the Linux kernel, where unauthorized access to the execution
CVE-2025-49825 9.8 0.20% 1 0 2025-06-18T14:15:12 ### Impact A full technical disclosure and open-source patch will be published
CVE-2025-49149 0 0.05% 1 0 2025-06-18T13:46:52.973000 Dify is an open-source LLM app development platform. In version 1.2.0, there is
CVE-2025-23252 4.5 0.03% 1 0 2025-06-18T13:46:52.973000 The NVIDIA NVDebug tool contains a vulnerability that may allow an actor to gain
CVE-2025-38046 None 0.00% 1 0 2025-06-18T12:30:37 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering
CVE-2025-38026 0 0.00% 1 0 2025-06-18T12:15:18.620000 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering
CVE-2025-26412 6.8 0.03% 1 0 2025-06-18T05:15:48.290000 The SIMCom SIM7600G modem supports an undocumented AT command, which allows an a
CVE-2025-49091 8.2 0.13% 1 0 2025-06-18T01:15:28.803000 KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. I
CVE-2025-48988 7.5 0.04% 1 0 2025-06-17T22:53:22 Allocation of Resources Without Limits or Throttling vulnerability in Apache Tom
CVE-2025-6111 8.8 0.08% 1 0 2025-06-17T21:33:12 A vulnerability classified as critical was found in Tenda FH1205 2.0.0.7(775). T
CVE-2025-49080 None 0.06% 1 0 2025-06-17T21:33:12 There is a memory management vulnerability in Absolute Secure Access server vers
CVE-2025-28386 9.8 0.29% 1 0 2025-06-17T21:33:12 A remote code execution (RCE) vulnerability in the Plugin Management component o
CVE-2025-34510 8.8 1.52% 1 0 2025-06-17T21:32:37 Sitecore Experience Manager (XM), Experience Platform (XP), and Experience Comme
CVE-2025-34509 8.2 0.04% 1 0 2025-06-17T21:32:37 Sitecore Experience Manager (XM) and Experience Platform (XP) versions 10.1 to 1
CVE-2025-34511 8.8 1.87% 1 0 2025-06-17T21:32:30 Sitecore PowerShell Extensions, an add-on to Sitecore Experience Manager (XM) an
CVE-2025-6110 8.8 0.08% 1 0 2025-06-17T21:32:09 A vulnerability classified as critical has been found in Tenda FH1201 1.2.0.14(4
CVE-2025-33122 7.5 0.04% 1 0 2025-06-17T20:50:23.507000 IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 could allow a user to gain elevated privileges
CVE-2025-6020 7.8 0.02% 1 0 2025-06-17T20:50:23.507000 A flaw was found in linux-pam. The module pam_namespace may use access user-cont
CVE-2025-32797 0 0.01% 1 0 2025-06-17T20:50:23.507000 Conda-build contains commands and tools to build conda packages. Prior to versio
CVE-2025-49796 9.1 0.04% 1 0 2025-06-17T20:50:23.507000 A vulnerability was found in libxml2. Processing certain sch:name elements from
CVE-2025-49124 8.4 0.01% 1 0 2025-06-17T20:50:23.507000 Untrusted Search Path vulnerability in Apache Tomcat installer for Windows. Duri
CVE-2025-47176 7.8 0.06% 2 0 2025-06-17T20:36:20.047000 '.../...//' in Microsoft Office Outlook allows an authorized attacker to execute
CVE-2025-3248 None 92.39% 8 11 template 2025-06-17T20:14:27 Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v
CVE-2025-22241 5.6 0.04% 1 0 2025-06-17T20:00:42 File contents overwrite the VirtKey class is called when “on-demand pillar” data
CVE-2025-28382 7.5 0.42% 1 0 2025-06-17T19:59:29 An issue in the openc3-api/tables endpoint of OpenC3 COSMOS 6.0.0 allows attacke
CVE-2025-28388 9.8 0.04% 1 0 2025-06-17T19:41:40.320000 OpenC3 COSMOS v6.0.0 was discovered to contain hardcoded credentials for the Ser
CVE-2025-6113 8.8 0.08% 1 0 2025-06-17T19:38:13.637000 A vulnerability, which was classified as critical, was found in Tenda FH1203 2.0
CVE-2025-28384 9.1 0.42% 1 0 2025-06-17T19:31:52.810000 An issue in the /script-api/scripts/ endpoint of OpenC3 COSMOS 6.0.0 allows atta
CVE-2025-49220 9.8 0.67% 2 0 2025-06-17T18:31:43 An insecure deserialization operation in Trend Micro Apex Central below version
CVE-2025-49219 9.8 0.67% 1 0 2025-06-17T18:31:43 An insecure deserialization operation in Trend Micro Apex Central below versions
CVE-2025-5689 8.5 0.01% 3 0 2025-06-17T18:15:27.403000 A flaw was found in the temporary user record that authd uses in the pre-auth NS
CVE-2025-43200 4.8 0.58% 5 1 2025-06-17T15:52:31.157000 This issue was addressed with improved checks. This issue is fixed in watchOS 11
CVE-2025-5777 None 0.04% 2 0 2025-06-17T15:31:16 Insufficient input validation leading to memory overread on the NetScaler Manage
CVE-2025-5349 None 0.03% 2 0 2025-06-17T15:31:16 Improper access control on the NetScaler Management Interface in NetScaler ADC a
CVE-2025-34508 6.3 0.13% 3 0 2025-06-17T15:31:16 A path traversal vulnerability exists in the file dropoff functionality of Zend
CVE-2025-4404 9.1 0.06% 1 0 2025-06-17T15:31:16 A privilege escalation from host to domain vulnerability was found in the FreeIP
CVE-2025-3464 None 0.03% 3 0 2025-06-17T03:31:44 A race condition vulnerability exists in Armoury Crate. This vulnerability arise
CVE-2025-6087 None 0.07% 1 0 2025-06-16T21:46:53 A Server-Side Request Forgery (SSRF) vulnerability was identified in the @openne
CVE-2025-49125 None 0.02% 1 2 2025-06-16T21:46:38 Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache
CVE-2025-48976 None 0.04% 2 0 2025-06-16T21:45:58 Allocation of resources for multipart headers with insufficient limits enabled a
CVE-2023-33538 8.8 90.99% 6 0 2025-06-16T21:32:22 TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to
CVE-2025-5309 None 0.33% 4 0 2025-06-16T18:32:26 The chat feature within Remote Support (RS) and Privileged Remote Access (PRA) i
CVE-2025-49794 9.1 0.05% 2 0 2025-06-16T18:32:26 A use-after-free vulnerability was found in libxml2. This issue occurs when pars
CVE-2025-2327 None 0.02% 1 0 2025-06-16T18:32:26 A flaw exists in FlashArray whereby the Key Encryption Key (KEK) is logged durin
CVE-2025-6129 8.8 0.14% 1 0 2025-06-16T18:32:26 A vulnerability classified as critical was found in TOTOLINK EX1200T 4.1.2cu.523
CVE-2025-6128 8.8 0.14% 1 0 2025-06-16T18:32:26 A vulnerability classified as critical has been found in TOTOLINK EX1200T 4.1.2c
CVE-2025-49795 7.5 0.04% 1 0 2025-06-16T18:32:26 A NULL pointer dereference vulnerability was found in libxml2 when processing XP
CVE-2025-4565 None 0.04% 1 0 2025-06-16T16:03:02 ### Summary Any project that uses Protobuf pure-Python backend to parse untruste
CVE-2025-36632 7.8 0.01% 1 0 2025-06-16T15:32:27 In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a
CVE-2025-6029 0 0.02% 4 0 2025-06-16T12:32:18.840000 Use of fixed learning codes, one code to lock the car and the other code to unlo
CVE-2025-6112 8.8 0.05% 1 0 2025-06-16T12:32:18.840000 A vulnerability, which was classified as critical, has been found in Tenda FH120
CVE-2025-6104 8.8 0.15% 1 0 2025-06-16T12:32:18.840000 A vulnerability, which was classified as critical, was found in Wifi-soft UniBox
CVE-2025-6121 9.8 0.06% 1 0 2025-06-16T12:30:32 A vulnerability, which was classified as critical, has been found in D-Link DIR-
CVE-2025-6115 8.8 0.07% 1 0 2025-06-16T09:30:44 A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical.
CVE-2025-6114 8.8 0.07% 1 0 2025-06-16T09:30:44 A vulnerability has been found in D-Link DIR-619L 2.06B01 and classified as crit
CVE-2025-6098 9.8 0.04% 1 0 2025-06-16T03:30:33 A vulnerability was found in UTT 进取 750W up to 5.0. It has been classified as cr
CVE-2025-6102 8.8 0.21% 1 0 2025-06-16T03:30:27 A vulnerability classified as critical was found in Wifi-soft UniBox Controller
CVE-2025-6103 8.8 0.15% 1 0 2025-06-16T03:30:26 A vulnerability, which was classified as critical, has been found in Wifi-soft U
CVE-2025-5964 None 0.05% 1 1 2025-06-15T21:30:33 A path traversal issue in the API endpoint in M-Files Server before version 25.6
CVE-2025-28380 6.1 0.03% 1 0 2025-06-15T18:32:03 A cross-site scripting (XSS) vulnerability in OpenC3 COSMOS v6.0.0 allows attack
CVE-2025-6092 4.3 0.03% 1 0 2025-06-15T18:31:03 A vulnerability was found in comfyanonymous comfyui up to 0.3.39. It has been de
CVE-2025-33108 8.6 0.04% 1 0 2025-06-14T03:30:34 IBM Backup, Recovery and Media Services for i 7.4 and 7.5 could allow a user wit
CVE-2025-6083 None 0.04% 1 1 2025-06-14T00:31:23 In ExtremeCloud Universal ZTNA, a syntax error in the 'searchKeyword' condition
CVE-2025-41234 6.5 0.11% 1 0 2025-06-13T22:12:58 ### Description In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x
CVE-2023-52922 7.8 0.02% 1 0 2025-06-13T21:32:14 In the Linux kernel, the following vulnerability has been resolved: can: bcm: F
CVE-2025-22237 6.7 0.02% 1 0 2025-06-13T21:19:47 An attacker with access to a minion key can exploit the 'on demand' pillar funct
CVE-2025-49113 10.0 73.08% 1 11 template 2025-06-13T20:45:45 Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execu
CVE-2025-28389 9.8 0.07% 1 0 2025-06-13T18:31:41 Weak password requirements in OpenC3 COSMOS v6.0.0 allow attackers to bypass aut
CVE-2025-28381 7.5 0.03% 1 0 2025-06-13T18:31:41 A credential leak in OpenC3 COSMOS v6.0.0 allows attackers to access service cre
CVE-2022-4976 9.8 0.06% 1 0 2025-06-13T18:30:34 Archive::Unzip::Burst from 0.01 through 0.09 for Perl contains a bundled InfoZip
CVE-2025-4232 None 0.02% 3 0 2025-06-13T00:33:24 An improper neutralization of wildcards vulnerability in the log collection feat
CVE-2025-33073 8.8 0.32% 9 2 2025-06-12T16:06:39.330000 Improper access control in Windows SMB allows an authorized attacker to elevate
CVE-2025-5353 8.8 0.04% 1 0 2025-06-12T16:06:39.330000 A hardcoded key in Ivanti Workspace Control before version 10.19.10.0 allows a l
CVE-2025-3052 8.2 0.02% 2 0 2025-06-12T16:06:29.520000 An arbitrary write vulnerability in Microsoft signed UEFI firmware allows for co
CVE-2025-49146 8.2 0.02% 2 0 2025-06-12T16:06:20.180000 pgjdbc is an open source postgresql JDBC Driver. From 42.7.4 and until 42.7.7, w
CVE-2025-2254 8.7 0.02% 1 0 2025-06-12T16:06:20.180000 An issue has been discovered in GitLab CE/EE affecting all versions from 17.9 be
CVE-2025-30085 0 0.40% 1 0 2025-06-12T16:06:20.180000 Remote code execution vulnerability in RSForm!pro component 3.0.0 - 3.3.14 for J
CVE-2025-6001 8.3 0.02% 1 0 2025-06-12T16:06:20.180000 A Cross-Site Request Forgery (CSRF) vulnerability exists in the product image up
CVE-2025-33053 8.8 16.50% 7 3 2025-06-12T14:51:07.700000 External control of file name or path in WebDAV allows an unauthorized attacker
CVE-2025-4278 8.7 0.02% 1 0 2025-06-12T12:32:09 An issue has been discovered in GitLab CE/EE affecting all versions starting wit
CVE-2025-32465 None 0.05% 1 0 2025-06-11T21:30:51 A stored XSS vulnerability in RSTickets! component 1.9.12 - 3.3.0 for Joomla was
CVE-2025-32466 None 0.04% 1 0 2025-06-11T21:30:50 A SQL injection vulnerability in RSMediaGallery! component 1.7.4 - 2.1.7 for Joo
CVE-2025-24016 9.9 91.49% 1 7 template 2025-06-11T21:11:44.863000 Wazuh is a free and open source platform used for threat prevention, detection,
CVE-2025-6002 7.2 0.28% 1 0 2025-06-11T18:35:49 An unrestricted file upload vulnerability exists in the Product Image section of
CVE-2025-4922 8.1 0.01% 1 1 2025-06-11T17:39:43 Nomad Community and Nomad Enterprise (“Nomad”) prefix-based ACL policy lookup ca
CVE-2025-5959 8.8 0.09% 1 0 2025-06-11T15:31:34 Type Confusion in V8 in Google Chrome prior to 137.0.7151.103 allowed a remote a
CVE-2025-5958 8.8 0.08% 1 0 2025-06-11T15:31:34 Use after free in Media in Google Chrome prior to 137.0.7151.103 allowed a remot
CVE-2025-43698 9.1 0.04% 1 0 2025-06-11T15:31:34 Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (Fle
CVE-2025-32711 9.3 0.14% 5 0 2025-06-11T15:30:38 Ai command injection in M365 Copilot allows an unauthorized attacker to disclose
CVE-2025-35941 5.5 0.01% 1 0 2025-06-11T15:30:38 A password is exposed locally.
CVE-2025-5986 6.5 0.04% 1 0 2025-06-11T15:30:29 A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited
CVE-2025-29756 None 0.02% 1 0 2025-06-11T09:30:38 SunGrow's back end users system iSolarCloud https://isolarcloud.com  uses an MQ
CVE-2025-4275 7.9 0.01% 6 1 2025-06-11T03:31:07 Running the provided utility changes the certificate on any Insyde BIOS and then
CVE-2025-48432 4.0 0.04% 1 0 2025-06-10T20:03:55 An issue was discovered in Django 5.2 before 5.2.2, 5.1 before 5.1.10, and 4.2 b
CVE-2025-47957 8.4 0.06% 1 0 2025-06-10T18:32:37 Use after free in Microsoft Office Word allows an unauthorized attacker to execu
CVE-2025-32710 8.1 0.11% 1 1 2025-06-10T18:32:35 Use after free in Windows Remote Desktop Services allows an unauthorized attacke
CVE-2025-40585 9.9 0.05% 1 0 2025-06-10T18:32:30 A vulnerability has been identified in Energy Services (All versions with G5DFR)
CVE-2025-22463 7.3 0.03% 1 0 2025-06-10T15:30:53 A hardcoded key in Ivanti Workspace Control before version 10.19.10.0 allows a l
CVE-2025-22455 8.8 0.04% 1 0 2025-06-10T15:30:53 A hardcoded key in Ivanti Workspace Control before version 10.19.0.0 allows a lo
CVE-2025-47950 7.5 0.08% 1 0 2025-06-09T21:39:34 ### Summary A **Denial of Service (DoS)** vulnerability was discovered in the C
CVE-2011-10007 8.8 0.06% 1 0 2025-06-06T06:31:31 File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution
CVE-2025-5601 7.8 0.02% 1 0 2025-06-04T14:54:33.783000 Column handling crashes in Wireshark 4.4.0 to 4.4.6 and 4.2.0 to 4.2.12 allows d
CVE-2024-56145 9.8 94.03% 1 4 template 2025-06-03T20:48:48.940000 Craft is a flexible, user-friendly CMS for creating custom digital experiences o
CVE-2025-31200 7.5 0.24% 1 2 2025-06-02T21:31:26 A memory corruption issue was addressed with improved bounds checking. This issu
CVE-2025-4123 7.6 1.61% 3 6 template 2025-05-28T19:46:08 A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining
CVE-2025-37899 None 0.01% 1 2 2025-05-24T21:31:30 In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix
CVE-2025-47934 None 0.01% 2 0 2025-05-19T21:54:44 ### Impact A maliciously modified message can be passed to either `openpgp.verif
CVE-2025-32414 5.6 0.02% 1 0 2025-04-23T19:09:35.517000 In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access c
CVE-2025-24813 9.8 93.66% 2 35 template 2025-04-03T20:59:51.680000 Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution an
CVE-2025-2783 8.4 6.26% 6 3 2025-03-26T18:30:57 Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome
CVE-2024-4577 9.8 94.41% 1 63 template 2025-03-14T03:31:23 In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, wh
CVE-2024-57727 7.5 94.10% 3 1 template 2025-01-16T21:32:03 SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple p
CVE-2024-55591 9.8 94.18% 1 10 template 2025-01-14T15:31:02 An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-2
CVE-2024-10099 6.1 0.07% 1 0 2024-10-21T21:03:53.647000 A stored cross-site scripting (XSS) vulnerability exists in comfyanonymous/comfy
CVE-2021-44026 9.8 71.50% 1 2 2024-06-27T21:33:09 Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL inje
CVE-2024-1086 7.8 84.90% 1 8 2024-06-27T12:30:43 A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables compon
CVE-2023-28771 9.8 94.35% 3 2 2024-04-04T03:40:24 Improper error message handling in Zyxel ZyWALL/USG series firmware versions 4.6
CVE-2025-6019 0 0.00% 7 0 N/A
CVE-2025-5310 0 0.00% 2 0 N/A
CVE-2025-6018 0 0.00% 4 0 N/A
CVE-2025-23092 0 0.00% 1 0 N/A
CVE-2025-4748 0 0.01% 2 0 N/A
CVE-2025-5121 0 0.00% 1 0 N/A

CVE-2025-24288
(9.8 CRITICAL)

EPSS: 0.00%

updated 2025-06-19T00:15:22.323000

1 posts

The Versa Director software exposes a number of services by default and allow attackers an easy foothold due to default credentials and multiple accounts (most with sudo access) that utilize the same default credentials. By default, Versa director exposes ssh and postgres to the internet, alongside a host of other services. Versa Networks is not aware of any reported instance where this vulnera

offseq at 2025-06-19T00:01:16.735Z ##

🚨 CVE-2025-24288: CRITICAL vuln in Versa Director (21.2.2–22.1.4). Exposed default creds + open SSH/Postgres. No active exploitation yet, but PoC is out. Change passwords & audit logs! radar.offseq.com/threat/cve-20

##

CVE-2025-23121
(9.9 CRITICAL)

EPSS: 0.00%

updated 2025-06-19T00:15:21.260000

8 posts

A vulnerability allowing remote code execution (RCE) on the Backup Server by an authenticated domain user

offseq at 2025-06-19T01:31:29.757Z ##

🚨 CRITICAL: Veeam Backup & Recovery 12.3.1 hit by RCE (CVE-2025-23121). Authenticated domain users can run code on backup servers—serious risk to data integrity & DR. Restrict access, monitor logs, prep for patches. radar.offseq.com/threat/cve-20

##

undercodenews@mastodon.social at 2025-06-18T17:29:49.000Z ##

Critical Veeam Backup Flaws Open Doors to Remote Code Execution: Urgent Patch Advised

Veeam Hit by Multiple High-Severity Security Vulnerabilities In a worrying turn for IT administrators and enterprises relying on Veeam’s data protection ecosystem, the company has disclosed several critical vulnerabilities affecting its Backup & Replication and Agent software. Chief among them is CVE-2025-23121, a flaw that carries a staggering CVSS score of 9.9, indicating…

undercodenews.com/critical-vee

##

beyondmachines1 at 2025-06-18T11:01:06.520Z ##

Multiple security vulnerabilities patched in Veeam Backup & Replication, one critical

Veeam has patched three security vulnerabilities in their backup software, including a critical remote code execution vulnerability (CVE-2025-23121) that allows any authenticated domain user to execute code on domain-joined backup servers.

**If you use Veeam Backup & Replication or Veeam Agent for Windows, review the flaws and plan a patch cycle. The critical flaw is applicable if your Veeam server is joined to your Active Directory domain, so check that first.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2025-06-18T11:01:06.000Z ##

Multiple security vulnerabilities patched in Veeam Backup & Replication, one critical

Veeam has patched three security vulnerabilities in their backup software, including a critical remote code execution vulnerability (CVE-2025-23121) that allows any authenticated domain user to execute code on domain-joined backup servers.

**If you use Veeam Backup & Replication or Veeam Agent for Windows, review the flaws and plan a patch cycle. The critical flaw is applicable if your Veeam server is joined to your Active Directory domain, so check that first.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

benzogaga33@mamot.fr at 2025-06-18T09:40:03.000Z ##

Faille dans Veeam : n’importe quel utilisateur du domaine peut compromettre le serveur ! it-connect.fr/faille-veeam-cve #ActuCybersécurité #Cybersécurité #Vulnérabilité #Veeam

##

jos1264@social.skynetcloud.site at 2025-06-18T06:35:03.000Z ##

Veeam Patches CVE-2025-23121: Critical RCE Bug Rated 9.9 CVSS in Backup & Replication thehackernews.com/2025/06/veea

##

jos1264@social.skynetcloud.site at 2025-06-18T06:35:02.000Z ##

Veeam Patches CVE-2025-23121: Critical RCE Bug Rated 9.9 CVSS in Backup & Replication thehackernews.com/2025/06/veea

##

jos1264@social.skynetcloud.site at 2025-06-18T06:35:02.000Z ##

Veeam Patches CVE-2025-23121: Critical RCE Bug Rated 9.9 CVSS in Backup & Replication thehackernews.com/2025/06/veea

##

CVE-2025-6192
(8.8 HIGH)

EPSS: 0.00%

updated 2025-06-18T20:15:19.890000

2 posts

Use after free in Metrics in Google Chrome prior to 137.0.7151.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

cR0w at 2025-06-18T19:31:26.650Z ##

One of these has been evaluated as sev:CRIT.

sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Use after free in Metrics in Google Chrome prior to 137.0.7151.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

nvd.nist.gov/vuln/detail/CVE-2

##

cR0w@infosec.exchange at 2025-06-18T19:31:26.000Z ##

One of these has been evaluated as sev:CRIT.

sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Use after free in Metrics in Google Chrome prior to 137.0.7151.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-20271
(8.6 HIGH)

EPSS: 0.00%

updated 2025-06-18T17:15:29.053000

2 posts

A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series Teleworker Gateway devices could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition in the Cisco AnyConnect service on an affected device. This vulnerability is due to variable initialization errors when an SSL VPN session is established. An attacker could exp

AAKL at 2025-06-18T16:24:12.188Z ##

New.

Cisco has listed a couple of vulnerabilities.

- Cisco Meraki MX and Z Series AnyConnect VPN with Client Certificate Authentication Denial of Service Vulnerability (high) - CVE-2025-20271 sec.cloudapps.cisco.com/securi

- ClamAV UDF File Parsing Out-of-Bounds Read Information Disclosure Vulnerability (medium) - CVE-2025-20234 sec.cloudapps.cisco.com/securi @TalosSecurity

##

AAKL@infosec.exchange at 2025-06-18T16:24:12.000Z ##

New.

Cisco has listed a couple of vulnerabilities.

- Cisco Meraki MX and Z Series AnyConnect VPN with Client Certificate Authentication Denial of Service Vulnerability (high) - CVE-2025-20271 sec.cloudapps.cisco.com/securi

- ClamAV UDF File Parsing Out-of-Bounds Read Information Disclosure Vulnerability (medium) - CVE-2025-20234 sec.cloudapps.cisco.com/securi @TalosSecurity #cybersecurity #infosec #Cisco

##

CVE-2025-20234
(5.3 MEDIUM)

EPSS: 0.00%

updated 2025-06-18T17:15:28.833000

2 posts

A vulnerability in Universal Disk Format (UDF) processing of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a memory overread during UDF file scanning. An attacker could exploit this vulnerability by submitting a crafted file containing UDF content to be scanned by ClamAV on an affected devi

AAKL at 2025-06-18T16:24:12.188Z ##

New.

Cisco has listed a couple of vulnerabilities.

- Cisco Meraki MX and Z Series AnyConnect VPN with Client Certificate Authentication Denial of Service Vulnerability (high) - CVE-2025-20271 sec.cloudapps.cisco.com/securi

- ClamAV UDF File Parsing Out-of-Bounds Read Information Disclosure Vulnerability (medium) - CVE-2025-20234 sec.cloudapps.cisco.com/securi @TalosSecurity

##

AAKL@infosec.exchange at 2025-06-18T16:24:12.000Z ##

New.

Cisco has listed a couple of vulnerabilities.

- Cisco Meraki MX and Z Series AnyConnect VPN with Client Certificate Authentication Denial of Service Vulnerability (high) - CVE-2025-20271 sec.cloudapps.cisco.com/securi

- ClamAV UDF File Parsing Out-of-Bounds Read Information Disclosure Vulnerability (medium) - CVE-2025-20234 sec.cloudapps.cisco.com/securi @TalosSecurity #cybersecurity #infosec #Cisco

##

CVE-2025-4821
(7.5 HIGH)

EPSS: 0.00%

updated 2025-06-18T16:15:28.527000

4 posts

Impact Cloudflare quiche was discovered to be vulnerable to incorrect congestion window growth, which could cause it to send data at a rate faster than the path might actually support. An unauthenticated remote attacker can exploit the vulnerability by first completing a handshake and initiating a congestion-controlled data transfer towards itself. Then, it could manipulate the victim's congesti

chrisvest@mastodon.social at 2025-06-18T20:22:49.000Z ##

We've released the Netty Incubator QUIC codec version 0.0.73.Final.
This includes an updated version of Quiche which fixes CVE-2025-4820 and CVE-2025-4821.
See the release notes: netty.io/news/2025/06/18/quic-
#netty #java

##

cR0w at 2025-06-18T16:30:05.337Z ##

Go DoS more Cloudflare shit.

github.com/cloudflare/quiche/s

Cloudflare quiche was discovered to be vulnerable to incorrect congestion window growth, which could cause it to send data at a rate faster than the path might actually support.

An unauthenticated remote attacker can exploit the vulnerability by first completing a handshake and initiating a congestion-controlled data transfer towards itself. Then, it could manipulate the victim's congestion control state by sending ACK frames exercising an opportunistic ACK attack; see RFC 9000 Section 21.4. The victim could grow the congestion window beyond typical expectations and allow more bytes in flight than the path might really support.

nvd.nist.gov/vuln/detail/CVE-2

github.com/cloudflare/quiche/s

Cloudflare quiche was discovered to be vulnerable to incorrect congestion window growth, which could cause it to send data at a rate faster than the path might actually support.

An unauthenticated remote attacker can exploit the vulnerability by first completing a handshake and initiating a congestion-controlled data transfer towards itself. Then, it could manipulate the victim's congestion control state by sending ACK frames covering a large range of packet numbers (including packet numbers that had never been sent); see RFC 9000 Section 19.3. The victim could grow the congestion window beyond typical expectations and allow more bytes in flight than the path might really support. In extreme cases, the window might grow beyond the limit of the internal variable's type, leading to an overflow panic.

nvd.nist.gov/vuln/detail/CVE-2

##

chrisvest@mastodon.social at 2025-06-18T20:22:49.000Z ##

We've released the Netty Incubator QUIC codec version 0.0.73.Final.
This includes an updated version of Quiche which fixes CVE-2025-4820 and CVE-2025-4821.
See the release notes: netty.io/news/2025/06/18/quic-
#netty #java

##

cR0w@infosec.exchange at 2025-06-18T16:30:05.000Z ##

Go DoS more Cloudflare shit.

github.com/cloudflare/quiche/s

Cloudflare quiche was discovered to be vulnerable to incorrect congestion window growth, which could cause it to send data at a rate faster than the path might actually support.

An unauthenticated remote attacker can exploit the vulnerability by first completing a handshake and initiating a congestion-controlled data transfer towards itself. Then, it could manipulate the victim's congestion control state by sending ACK frames exercising an opportunistic ACK attack; see RFC 9000 Section 21.4. The victim could grow the congestion window beyond typical expectations and allow more bytes in flight than the path might really support.

nvd.nist.gov/vuln/detail/CVE-2

github.com/cloudflare/quiche/s

Cloudflare quiche was discovered to be vulnerable to incorrect congestion window growth, which could cause it to send data at a rate faster than the path might actually support.

An unauthenticated remote attacker can exploit the vulnerability by first completing a handshake and initiating a congestion-controlled data transfer towards itself. Then, it could manipulate the victim's congestion control state by sending ACK frames covering a large range of packet numbers (including packet numbers that had never been sent); see RFC 9000 Section 19.3. The victim could grow the congestion window beyond typical expectations and allow more bytes in flight than the path might really support. In extreme cases, the window might grow beyond the limit of the internal variable's type, leading to an overflow panic.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-4820
(5.3 MEDIUM)

EPSS: 0.00%

updated 2025-06-18T16:15:28.403000

4 posts

Impact Cloudflare quiche was discovered to be vulnerable to incorrect congestion window growth, which could cause it to send data at a rate faster than the path might actually support. An unauthenticated remote attacker can exploit the vulnerability by first completing a handshake and initiating a congestion-controlled data transfer towards itself. Then, it could manipulate the victim's congesti

chrisvest@mastodon.social at 2025-06-18T20:22:49.000Z ##

We've released the Netty Incubator QUIC codec version 0.0.73.Final.
This includes an updated version of Quiche which fixes CVE-2025-4820 and CVE-2025-4821.
See the release notes: netty.io/news/2025/06/18/quic-
#netty #java

##

cR0w at 2025-06-18T16:30:05.337Z ##

Go DoS more Cloudflare shit.

github.com/cloudflare/quiche/s

Cloudflare quiche was discovered to be vulnerable to incorrect congestion window growth, which could cause it to send data at a rate faster than the path might actually support.

An unauthenticated remote attacker can exploit the vulnerability by first completing a handshake and initiating a congestion-controlled data transfer towards itself. Then, it could manipulate the victim's congestion control state by sending ACK frames exercising an opportunistic ACK attack; see RFC 9000 Section 21.4. The victim could grow the congestion window beyond typical expectations and allow more bytes in flight than the path might really support.

nvd.nist.gov/vuln/detail/CVE-2

github.com/cloudflare/quiche/s

Cloudflare quiche was discovered to be vulnerable to incorrect congestion window growth, which could cause it to send data at a rate faster than the path might actually support.

An unauthenticated remote attacker can exploit the vulnerability by first completing a handshake and initiating a congestion-controlled data transfer towards itself. Then, it could manipulate the victim's congestion control state by sending ACK frames covering a large range of packet numbers (including packet numbers that had never been sent); see RFC 9000 Section 19.3. The victim could grow the congestion window beyond typical expectations and allow more bytes in flight than the path might really support. In extreme cases, the window might grow beyond the limit of the internal variable's type, leading to an overflow panic.

nvd.nist.gov/vuln/detail/CVE-2

##

chrisvest@mastodon.social at 2025-06-18T20:22:49.000Z ##

We've released the Netty Incubator QUIC codec version 0.0.73.Final.
This includes an updated version of Quiche which fixes CVE-2025-4820 and CVE-2025-4821.
See the release notes: netty.io/news/2025/06/18/quic-
#netty #java

##

cR0w@infosec.exchange at 2025-06-18T16:30:05.000Z ##

Go DoS more Cloudflare shit.

github.com/cloudflare/quiche/s

Cloudflare quiche was discovered to be vulnerable to incorrect congestion window growth, which could cause it to send data at a rate faster than the path might actually support.

An unauthenticated remote attacker can exploit the vulnerability by first completing a handshake and initiating a congestion-controlled data transfer towards itself. Then, it could manipulate the victim's congestion control state by sending ACK frames exercising an opportunistic ACK attack; see RFC 9000 Section 21.4. The victim could grow the congestion window beyond typical expectations and allow more bytes in flight than the path might really support.

nvd.nist.gov/vuln/detail/CVE-2

github.com/cloudflare/quiche/s

Cloudflare quiche was discovered to be vulnerable to incorrect congestion window growth, which could cause it to send data at a rate faster than the path might actually support.

An unauthenticated remote attacker can exploit the vulnerability by first completing a handshake and initiating a congestion-controlled data transfer towards itself. Then, it could manipulate the victim's congestion control state by sending ACK frames covering a large range of packet numbers (including packet numbers that had never been sent); see RFC 9000 Section 19.3. The victim could grow the congestion window beyond typical expectations and allow more bytes in flight than the path might really support. In extreme cases, the window might grow beyond the limit of the internal variable's type, leading to an overflow panic.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-45784
(9.8 CRITICAL)

EPSS: 0.00%

updated 2025-06-18T15:31:24

2 posts

D-Link DPH-400S/SE VoIP Phone v1.01 contains hardcoded provisioning variables, including PROVIS_USER_PASSWORD, which may expose sensitive user credentials. An attacker with access to the firmware image can extract these credentials using static analysis tools such as strings or xxd, potentially leading to unauthorized access to device functions or user accounts. This vulnerability exists due to in

cR0w at 2025-06-18T15:42:10.960Z ##

Hardcoded password in EoL D-Link VoIP phones.

cybermaya.in/posts/Post-37/

D-Link DPH-400S/SE VoIP Phone v1.01 contains hardcoded provisioning variables, including PROVIS_USER_PASSWORD, which may expose sensitive user credentials. An attacker with access to the firmware image can extract these credentials using static analysis tools such as strings or xxd, potentially leading to unauthorized access to device functions or user accounts. This vulnerability exists due to insecure storage of sensitive information in the firmware binary.

nvd.nist.gov/vuln/detail/CVE-2

##

cR0w@infosec.exchange at 2025-06-18T15:42:10.000Z ##

Hardcoded password in EoL D-Link VoIP phones.

cybermaya.in/posts/Post-37/

D-Link DPH-400S/SE VoIP Phone v1.01 contains hardcoded provisioning variables, including PROVIS_USER_PASSWORD, which may expose sensitive user credentials. An attacker with access to the firmware image can extract these credentials using static analysis tools such as strings or xxd, potentially leading to unauthorized access to device functions or user accounts. This vulnerability exists due to insecure storage of sensitive information in the firmware binary.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2023-0386
(7.8 HIGH)

EPSS: 55.44%

updated 2025-06-18T15:00:59.680000

11 posts

A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.

14 repos

https://github.com/AiK1d/CVE-2023-0386

https://github.com/Fanxiaoyao66/CVE-2023-0386

https://github.com/churamanib/CVE-2023-0386

https://github.com/EstamelGG/CVE-2023-0386-libs

https://github.com/orilevy8/cve-2023-0386

https://github.com/Anekant-Singhai/Exploits

https://github.com/chenaotian/CVE-2023-0386

https://github.com/xkaneiki/CVE-2023-0386

https://github.com/veritas501/CVE-2023-0386

https://github.com/puckiestyle/CVE-2023-0386

https://github.com/sxlmnwb/CVE-2023-0386

https://github.com/letsr00t/CVE-2023-0386

https://github.com/bchevCH/CVE-2023-0386

https://github.com/Satheesh575555/linux-4.19.72_CVE-2023-0386

tugatech@masto.pt at 2025-06-19T01:08:13.000Z ##

@DiogoConstantino ubuntu.com/security/CVE-2023-0

##

aimainainu@mastodon-japan.net at 2025-06-18T21:37:40.000Z ##

米当局、Linuxカーネルの脆弱性悪用に注意喚起 - Security NEXT
Security NEXT

米当局は、「Linuxカーネル」の既知脆弱性「CVE-2023-0386」が悪用されているとして注意喚起を行った。 :Security NEXT.
security-next.com/171506

##

undercodenews@mastodon.social at 2025-06-18T15:39:09.000Z ##

Critical Linux Kernel Flaw Exploited: CISA Flags CVE-2023-0386 in Active Attacks

Introduction: A Wake-Up Call for Linux Systems The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has raised alarms once again by adding a significant Linux vulnerability—CVE-2023-0386—to its Known Exploited Vulnerabilities (KEV) catalog. This move is not just bureaucratic red tape; it signals that this flaw is actively being exploited in the wild. Targeting the widely-used…

undercodenews.com/critical-lin

##

undercodenews@mastodon.social at 2025-06-18T15:22:19.000Z ##

CISA Issues Urgent Warning Over Exploited Linux Kernel Vulnerability: CVE-2023-0386

CISA's High-Priority Alert for Linux Systems The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning to all U.S. federal agencies following the discovery of an actively exploited vulnerability in the Linux kernel. Known as CVE-2023-0386, this security flaw lies within the OverlayFS subsystem and allows attackers to gain root access, elevating local user…

undercodenews.com/cisa-issues-

##

defendopsdiaries at 2025-06-18T14:07:31.894Z ##

Linux users: imagine your system's hidden door left wide open. CVE-2023-0386 lets attackers snag root access in popular distros. Is your setup at risk? Dive in to learn more before it’s too late.

thedefendopsdiaries.com/unders





##

tugatech@masto.pt at 2025-06-19T01:08:13.000Z ##

@DiogoConstantino ubuntu.com/security/CVE-2023-0

##

jos1264@social.skynetcloud.site at 2025-06-18T13:05:03.000Z ##

CISA Flags CVE-2023-0386 as Actively Exploited Linux Kernel Privilege Escalation Threat thecyberexpress.com/cisa-warns #LinuxKernelPrivilegeEscalation #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE20230386 #Linuxkernel #CyberNews

##

linux@activitypub.awakari.com at 2025-06-18T12:05:58.000Z ## CISA Flags CVE-2023-0386 as Actively Exploited Linux Kernel Privilege Escalation Threat The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning about the active exploitation of ...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2023-0386 #Linux #kernel #Linux #Kernel #Privilege

Origin | Interest | Match ##

Ubuntu@activitypub.awakari.com at 2025-06-18T09:00:07.000Z ## CISA Alerts on Linux Kernel Flaw Exploited in Attacks Through Improper Ownership Management A high-severity privilege escalation flaw, designated CVE-2023-0386 (CVSSv3: 7.8), has been identified in...

#Cyber #Security #News #Cybersecurity #Vulnerability #Cyber #Security #Cyber #security #news #vulnerability

Origin | Interest | Match ##

cisakevtracker@mastodon.social at 2025-06-17T18:00:45.000Z ##

CVE ID: CVE-2023-0386
Vendor: Linux
Product: Kernel
Date Added: 2025-06-17
Notes: This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. For more information, please see: git.kernel.org/pub/scm/linux/k ; access.redhat.com/security/cve ; security.netapp.com/advisory/n ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2025-06-17T17:27:54.000Z ##

New.

CISA has added one entry to the KEV catalogue.

- CVE-2023-0386: Linux Kernel Improper Ownership Management Vulnerability cve.org/CVERecord?id=CVE-2023- #CISA #cybersecurity #infosec #Linux

##

CVE-2025-49825
(9.8 CRITICAL)

EPSS: 0.20%

updated 2025-06-18T14:15:12

1 posts

### Impact A full technical disclosure and open-source patch will be published after the embargo period, ending on June 30th, to allow all users to upgrade. Teleport security engineers identified a critical security vulnerability that could allow remote authentication bypass of Teleport. Teleport Cloud Infrastructure and CI/CD build, test, and release infrastructure aren’t affected. For the

cR0w@infosec.exchange at 2025-06-17T22:03:07.000Z ##

Oh my. Check your Teleport, especially if on Community Edition.

github.com/gravitational/telep

sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Teleport provides connectivity, authentication, access controls and audit for infrastructure. Community Edition versions before and including 17.5.1 are vulnerable to remote authentication bypass. At time of posting, there is no available open-source patch.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-49149
(0 None)

EPSS: 0.05%

updated 2025-06-18T13:46:52.973000

1 posts

Dify is an open-source LLM app development platform. In version 1.2.0, there is insufficient filtering of user input by web applications. Attackers can use website vulnerabilities to inject malicious script code into web pages. This may result in a cross-site scripting (XSS) attack when a user browses these web pages. At time of posting, there is no known patched version.

cR0w@infosec.exchange at 2025-06-17T22:57:21.000Z ##

Go hack more AI shit.

github.com/langgenius/dify/sec

Dify is an open-source LLM app development platform. In version 1.2.0, there is insufficient filtering of user input by web applications. Attackers can use website vulnerabilities to inject malicious script code into web pages. This may result in a cross-site scripting (XSS) attack when a user browses these web pages. At time of posting, there is no known patched version.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-23252
(4.5 MEDIUM)

EPSS: 0.03%

updated 2025-06-18T13:46:52.973000

1 posts

The NVIDIA NVDebug tool contains a vulnerability that may allow an actor to gain access to restricted components. A successful exploit of this vulnerability may lead to information disclosure.

CVE-2025-38046(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-06-18T12:30:37

1 posts

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

linux@activitypub.awakari.com at 2025-06-18T11:24:16.000Z ## Re: CVE-2025-38046: xen: Add support for XenServer 6.1 platform device Summary not available


Origin | Interest | Match ##

CVE-2025-38026
(0 None)

EPSS: 0.00%

updated 2025-06-18T12:15:18.620000

1 posts

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

linux@activitypub.awakari.com at 2025-06-18T11:24:16.000Z ## Re: CVE-2025-38026: x86/sev: Do not touch VMSA pages during SNP gu ... Summary not available


Origin | Interest | Match ##

CVE-2025-26412
(6.8 MEDIUM)

EPSS: 0.03%

updated 2025-06-18T05:15:48.290000

1 posts

The SIMCom SIM7600G modem supports an undocumented AT command, which allows an attacker to execute system commands with root permission on the modem. An attacker needs either physical access or remote shell access to a device that interacts directly with the modem via AT commands.

cR0w@infosec.exchange at 2025-06-11T12:46:46.000Z ##

Get ready to explain some things to some youngsters for this one. Undocumented root shell access on SIMCom modem.

sec-consult.com/vulnerability-

sev:MED

The SIMCom SIM7600G modem supports an undocumented AT command, which allows an attacker to execute system commands with root permission on the modem. An attacker needs either physical access or remote shell access to a device that interacts directly with the modem via AT commands.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-49091
(8.2 HIGH)

EPSS: 0.13%

updated 2025-06-18T01:15:28.803000

1 posts

KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from the scheme handlers such as a ssh:// or telnet:// or rlogin:// URL. This can be executed regardless of whether the ssh, telnet, or rlogin binary is available. In this mode, there is a code path where if that binary is not available, Konsole falls back to using /bin/bash for the given argume

cR0w@infosec.exchange at 2025-06-11T01:59:58.000Z ##

RCE in KDE Konsole.

kde.org/info/security/advisory

sev:HIGH 8.2 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L

KDE Konsole before 25.04.2 allows remote code execution in a certain scenario. It supports loading URLs from the scheme handlers such as a ssh:// or telnet:// or rlogin:// URL. This can be executed regardless of whether the ssh, telnet, or rlogin binary is available. In this mode, there is a code path where if that binary is not available, Konsole falls back to using /bin/bash for the given arguments (i.e., the URL) provided. This allows an attacker to execute arbitrary code.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-48988
(7.5 HIGH)

EPSS: 0.04%

updated 2025-06-17T22:53:22

1 posts

Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.

cR0w@infosec.exchange at 2025-06-16T15:40:24.000Z ##

There are a couple other Tomcat CVEs folks might be interested in too.

Untrusted Search Path vulnerability in Apache Tomcat installer for Windows. During installation, the Tomcat installer for Windows used icacls.exe without specifying a full path.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0 through 10.1.41, from 9.0.23 through 9.0.105.

lists.apache.org/thread/lnow7t

nvd.nist.gov/vuln/detail/CVE-2

and

Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.

Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.

lists.apache.org/thread/nzkqso

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-6111
(8.8 HIGH)

EPSS: 0.08%

updated 2025-06-17T21:33:12

1 posts

A vulnerability classified as critical was found in Tenda FH1205 2.0.0.7(775). This vulnerability affects the function fromVirtualSer of the file /goform/VirtualSer. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-49080(CVSS UNKNOWN)

EPSS: 0.06%

updated 2025-06-17T21:33:12

1 posts

There is a memory management vulnerability in Absolute Secure Access server versions 9.0 to 13.54. Attackers with network access to the server can cause a Denial of Service by sending a specially crafted sequence of packets to the server. The attack complexity is low, there are no attack requirements, privileges, or user interaction required. Loss of availability is high; there is no impact on con

CVE-2025-28386
(9.8 CRITICAL)

EPSS: 0.29%

updated 2025-06-17T21:33:12

1 posts

A remote code execution (RCE) vulnerability in the Plugin Management component of OpenC3 COSMOS v6.0.0 allows attackers to execute arbitrary code via uploading a crafted .txt file.

cR0w@infosec.exchange at 2025-06-13T15:25:26.000Z ##

CVEs published for this train wreck in OpenC3 Cosmos.

visionspace.com/openc3-cosmos-

  • Cross-Site Scripting (XSS) in multiple tools within the web interface
  • Remote Code Execution (RCE) via malicious plugin installation and improper script execution
  • Arbitrary File Access and Manipulation through path traversal in multiple API endpoints
  • Credential Leakage through modifiable environment variables in containers
  • Insecure Authentication Mechanisms, including clear-text password usage and undocumented service accounts
  • CVE-2025-28380
  • CVE-2025-28381
  • CVE-2025-28382
  • CVE-2025-28384
  • CVE-2025-28386
  • CVE-2025-28388
  • CVE-2025-28389
##

CVE-2025-34510
(8.8 HIGH)

EPSS: 1.52%

updated 2025-06-17T21:32:37

1 posts

Sitecore Experience Manager (XM), Experience Platform (XP), and Experience Commerce (XC) versions 9.0 through 9.3 and 10.0 through 10.4 are affected by a Zip Slip vulnerability. A remote, authenticated attacker can exploit this issue by sending a crafted HTTP request to upload a ZIP archive containing path traversal sequences, allowing arbitrary file writes and leading to code execution.

CVE-2025-34509
(8.2 HIGH)

EPSS: 0.04%

updated 2025-06-17T21:32:37

1 posts

Sitecore Experience Manager (XM) and Experience Platform (XP) versions 10.1 to 10.1.4 rev. 011974 PRE, all versions of 10.2, 10.3 to 10.3.3 rev. 011967 PRE, and 10.4 to 10.4.1 rev. 011941 PRE contain a hardcoded user account. Unauthenticated and remote attackers can use this account to access administrative API over HTTP.

CVE-2025-34511
(8.8 HIGH)

EPSS: 1.87%

updated 2025-06-17T21:32:30

1 posts

Sitecore PowerShell Extensions, an add-on to Sitecore Experience Manager (XM) and Experience Platform (XP), through version 7.0 is vulnerable to an unrestricted file upload issue. A remote, authenticated attacker can upload arbitrary files to the server using crafted HTTP requests, resulting in remote code execution.

CVE-2025-6110
(8.8 HIGH)

EPSS: 0.08%

updated 2025-06-17T21:32:09

1 posts

A vulnerability classified as critical has been found in Tenda FH1201 1.2.0.14(408). This affects an unknown part of the file /goform/SafeMacFilter. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-33122
(7.5 HIGH)

EPSS: 0.04%

updated 2025-06-17T20:50:23.507000

1 posts

IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 could allow a user to gain elevated privileges due to an unqualified library call in IBM Advanced Job Scheduler for i. A malicious actor could cause user-controlled code to run with administrator privilege.

cR0w@infosec.exchange at 2025-06-17T17:52:02.000Z ##

PrivEsc in IBM i.

ibm.com/support/pages/node/723

IBM i 7.2, 7.3, 7.4, 7.5, and 7.6 could allow a user to gain elevated privileges due to an unqualified library call in IBM Advanced Job Scheduler for i. A malicious actor could cause user-controlled code to run with administrator privilege.

nvd.nist.gov/vuln/detail/CVE-2

cc: @buherator since IIRC you were interested in IBM i things.

##

CVE-2025-6020
(7.8 HIGH)

EPSS: 0.02%

updated 2025-06-17T20:50:23.507000

1 posts

A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.

cR0w@infosec.exchange at 2025-06-17T13:53:24.000Z ##

PrivEsc in linux-pam.

openwall.com/lists/oss-securit

access.redhat.com/security/cve

sev:HIGH 7.8 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-32797
(0 None)

EPSS: 0.01%

updated 2025-06-17T20:50:23.507000

1 posts

Conda-build contains commands and tools to build conda packages. Prior to version 25.3.1, The write_build_scripts function in conda-build creates the temporary build script conda_build.sh with overly permissive file permissions (0o766), allowing write access to all users. Attackers with filesystem access can exploit a race condition to overwrite the script before execution, enabling arbitrary code

cR0w@infosec.exchange at 2025-06-16T19:26:54.000Z ##

I know some of you like a good race.

github.com/conda/conda-build/s

sev:MED 6.0 - CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N

Conda-build contains commands and tools to build conda packages. Prior to version 25.3.1, The write_build_scripts function in conda-build creates the temporary build script conda_build.sh with overly permissive file permissions (0o766), allowing write access to all users. Attackers with filesystem access can exploit a race condition to overwrite the script before execution, enabling arbitrary code execution under the victim's privileges. This risk is significant in shared environments, potentially leading to full system compromise. Even with non-static directory names, attackers can monitor parent directories for file creation events. The brief window between script creation (with insecure permissions) and execution allows rapid overwrites. Directory names can also be inferred via timestamps or logs, and automation enables exploitation even with semi-randomized paths by acting within milliseconds of detection. This issue has been patched in version 25.3.1. A workaround involves restricting conda_build.sh permissions from 0o766 to 0o700 (owner-only read/write/execute). Additionally, use atomic file creation (write to a temporary randomized filename and rename atomically) to minimize the race condition window.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-49796
(9.1 CRITICAL)

EPSS: 0.04%

updated 2025-06-17T20:50:23.507000

1 posts

A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.

CVE-2025-49124
(8.4 HIGH)

EPSS: 0.01%

updated 2025-06-17T20:50:23.507000

1 posts

Untrusted Search Path vulnerability in Apache Tomcat installer for Windows. During installation, the Tomcat installer for Windows used icacls.exe without specifying a full path. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0 through 10.1.41, from 9.0.23 through 9.0.105. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.

cR0w@infosec.exchange at 2025-06-16T15:40:24.000Z ##

There are a couple other Tomcat CVEs folks might be interested in too.

Untrusted Search Path vulnerability in Apache Tomcat installer for Windows. During installation, the Tomcat installer for Windows used icacls.exe without specifying a full path.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0 through 10.1.41, from 9.0.23 through 9.0.105.

lists.apache.org/thread/lnow7t

nvd.nist.gov/vuln/detail/CVE-2

and

Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.

Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.

lists.apache.org/thread/nzkqso

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-47176
(7.8 HIGH)

EPSS: 0.06%

updated 2025-06-17T20:36:20.047000

2 posts

'.../...//' in Microsoft Office Outlook allows an authorized attacker to execute code locally.

benzogaga33@mamot.fr at 2025-06-12T09:40:03.000Z ##

Microsoft Outlook menacé par une nouvelle faille de sécurité et des attaques Zero-click : CVE-2025-47176 it-connect.fr/microsoft-outloo #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft #Outlook

##

foxs@嘟文.com at 2025-06-12T02:43:52.000Z ##

近日,微软官方发布安全公告,确认其电子邮件客户端 Microsoft Outlook 存在一个 高危漏洞(CVE-2025-47176),攻击者可借此在目标系统上远程执行任意代码。尽管漏洞本质上为本地攻击向量,但其危害范围及利用条件使其具备远程利用的可能性。

微软已确认该漏洞的严重性,但当前 Microsoft 365 尚未发布修复补丁,预计将于后续版本中推送。微软承诺将在第一时间更新 CVE 页面以通知用户。
@board

##

AAKL at 2025-06-18T15:26:09.941Z ##

Posted yesterday, if you missed it.

Trend Micro: Critical Langflow Vulnerability (CVE-2025-3248) Actively Exploited to Deliver Flodrix Botnet trendmicro.com/en_us/research/ @TrendMicro

##

cR0w at 2025-06-18T14:38:13.628Z ##

More on the Langflow vuln ( CVE-2025-3248 ). In case you haven't followed it, it's hilarious. Literally rawdogging input to exec(). LMAO. People are going to keep trusting this shit.

Go hack more AI shit.

offsec.com/blog/cve-2025-3248/

##

undercodenews@mastodon.social at 2025-06-18T11:56:12.000Z ##

Flodrix Botnet Targets Langflow Servers via Critical Vulnerability: CVE-2025-3248

Langflow's AI Infrastructure Under Siege A dangerous new campaign has emerged in the cybersecurity landscape, exploiting a critical vulnerability in Langflow—an AI workflow builder. According to Trend Micro Research, attackers are actively leveraging CVE-2025-3248, a severe remote code execution (RCE) flaw, to install a new variant of the Flodrix botnet. This malware is capable of…

undercodenews.com/flodrix-botn

##

AAKL@infosec.exchange at 2025-06-18T15:26:09.000Z ##

Posted yesterday, if you missed it.

Trend Micro: Critical Langflow Vulnerability (CVE-2025-3248) Actively Exploited to Deliver Flodrix Botnet trendmicro.com/en_us/research/ @TrendMicro #cybersecurity #infosec

##

cR0w@infosec.exchange at 2025-06-18T14:38:13.000Z ##

More on the Langflow vuln ( CVE-2025-3248 ). In case you haven't followed it, it's hilarious. Literally rawdogging input to exec(). LMAO. People are going to keep trusting this shit.

Go hack more AI shit.

offsec.com/blog/cve-2025-3248/

#threatIntel

##

AAKL@infosec.exchange at 2025-06-17T14:42:30.000Z ##

Trend Micro: Critical Langflow Vulnerability (CVE-2025-3248) Actively Exploited to Deliver Flodrix Botnet trendmicro.com/en_us/research/ @TrendMicro #cybersecurity #infosec

##

patrickcmiller@infosec.exchange at 2025-06-16T19:42:16.000Z ##

Critical Langflow Vulnerability (CVE-2025-3248) Actively Exploited to Deliver Flodrix Botnet trendmicro.com/en_us/research/

##

cR0w@infosec.exchange at 2025-06-16T18:22:32.000Z ##

TrendMicro write-up on EITW exploitation of CVE-2025-3248 ( code exec in Langflow ). It's been EITW for at least a month or two but this is specifically about delivering Flodrix. Includes payloads and IOCs.

trendmicro.com/en_us/research/

#threatIntel

##

CVE-2025-22241
(5.6 MEDIUM)

EPSS: 0.04%

updated 2025-06-17T20:00:42

1 posts

File contents overwrite the VirtKey class is called when “on-demand pillar” data is requested and uses un-validated input to create paths to the “pki directory”. The functionality is used to auto-accept Minion authentication keys based on a pre-placed “authorization file” at a specific location and is present in the default configuration.

FunctionalProgramming@activitypub.awakari.com at 2025-06-13T07:04:38.000Z ## CVE-2025-22241 salt advisoryFile contents overwrite the VirtKey class is call... File contents overwrite the VirtKey class is called when “on-demand pillar” data is requested and uses un-valida...


Origin | Interest | Match ##

CVE-2025-28382
(7.5 HIGH)

EPSS: 0.42%

updated 2025-06-17T19:59:29

1 posts

An issue in the openc3-api/tables endpoint of OpenC3 COSMOS 6.0.0 allows attackers to execute a directory traversal.

cR0w@infosec.exchange at 2025-06-13T15:25:26.000Z ##

CVEs published for this train wreck in OpenC3 Cosmos.

visionspace.com/openc3-cosmos-

  • Cross-Site Scripting (XSS) in multiple tools within the web interface
  • Remote Code Execution (RCE) via malicious plugin installation and improper script execution
  • Arbitrary File Access and Manipulation through path traversal in multiple API endpoints
  • Credential Leakage through modifiable environment variables in containers
  • Insecure Authentication Mechanisms, including clear-text password usage and undocumented service accounts
  • CVE-2025-28380
  • CVE-2025-28381
  • CVE-2025-28382
  • CVE-2025-28384
  • CVE-2025-28386
  • CVE-2025-28388
  • CVE-2025-28389
##

CVE-2025-28388
(9.8 CRITICAL)

EPSS: 0.04%

updated 2025-06-17T19:41:40.320000

1 posts

OpenC3 COSMOS v6.0.0 was discovered to contain hardcoded credentials for the Service Account.

cR0w@infosec.exchange at 2025-06-13T15:25:26.000Z ##

CVEs published for this train wreck in OpenC3 Cosmos.

visionspace.com/openc3-cosmos-

  • Cross-Site Scripting (XSS) in multiple tools within the web interface
  • Remote Code Execution (RCE) via malicious plugin installation and improper script execution
  • Arbitrary File Access and Manipulation through path traversal in multiple API endpoints
  • Credential Leakage through modifiable environment variables in containers
  • Insecure Authentication Mechanisms, including clear-text password usage and undocumented service accounts
  • CVE-2025-28380
  • CVE-2025-28381
  • CVE-2025-28382
  • CVE-2025-28384
  • CVE-2025-28386
  • CVE-2025-28388
  • CVE-2025-28389
##

CVE-2025-6113
(8.8 HIGH)

EPSS: 0.08%

updated 2025-06-17T19:38:13.637000

1 posts

A vulnerability, which was classified as critical, was found in Tenda FH1203 2.0.1.6. Affected is the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-28384
(9.1 CRITICAL)

EPSS: 0.42%

updated 2025-06-17T19:31:52.810000

1 posts

An issue in the /script-api/scripts/ endpoint of OpenC3 COSMOS 6.0.0 allows attackers to execute a directory traversal.

cR0w@infosec.exchange at 2025-06-13T15:25:26.000Z ##

CVEs published for this train wreck in OpenC3 Cosmos.

visionspace.com/openc3-cosmos-

  • Cross-Site Scripting (XSS) in multiple tools within the web interface
  • Remote Code Execution (RCE) via malicious plugin installation and improper script execution
  • Arbitrary File Access and Manipulation through path traversal in multiple API endpoints
  • Credential Leakage through modifiable environment variables in containers
  • Insecure Authentication Mechanisms, including clear-text password usage and undocumented service accounts
  • CVE-2025-28380
  • CVE-2025-28381
  • CVE-2025-28382
  • CVE-2025-28384
  • CVE-2025-28386
  • CVE-2025-28388
  • CVE-2025-28389
##

CVE-2025-49220
(9.8 CRITICAL)

EPSS: 0.67%

updated 2025-06-17T18:31:43

2 posts

An insecure deserialization operation in Trend Micro Apex Central below version 8.0.7007 could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49219 but is in a different method.

offseq at 2025-06-18T10:31:20.127Z ##

🛡️ CVE-2025-49220: CRITICAL RCE in Trend Micro Apex Central <8.0.7007 via insecure deserialization (pre-auth). Major risk for EU orgs—restrict access, monitor, and prep for patch. radar.offseq.com/threat/cve-20

##

cR0w@infosec.exchange at 2025-06-17T17:57:42.000Z ##

Ooh, two very similar sev:CRIT CVEs for Trend Micro Apex Central.

success.trendmicro.com/en-US/s

sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

An insecure deserialization operation in Trend Micro Apex Central below versions 8.0.7007 could lead to a pre-authentication remote code execution on affected installations.

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-49219
(9.8 CRITICAL)

EPSS: 0.67%

updated 2025-06-17T18:31:43

1 posts

An insecure deserialization operation in Trend Micro Apex Central below versions 8.0.7007 could lead to a pre-authentication remote code execution on affected installations. Note that this vulnerability is similar to CVE-2025-49220 but is in a different method.

cR0w@infosec.exchange at 2025-06-17T17:57:42.000Z ##

Ooh, two very similar sev:CRIT CVEs for Trend Micro Apex Central.

success.trendmicro.com/en-US/s

sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

An insecure deserialization operation in Trend Micro Apex Central below versions 8.0.7007 could lead to a pre-authentication remote code execution on affected installations.

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-5689
(8.5 HIGH)

EPSS: 0.01%

updated 2025-06-17T18:15:27.403000

3 posts

A flaw was found in the temporary user record that authd uses in the pre-auth NSS. As a result, a user login for the first time will be considered to be part of the root group in the context of that SSH session.

cR0w@infosec.exchange at 2025-06-16T19:42:38.000Z ##

When's the over / under on CVE-2025-5689 being EITW? I'm going with Tuesday for public PoC. Thursday for public disclosure of EITW incident. KEV Catalog on Monday.

##

Dendrobatus_Azureus@bsd.cafe at 2025-06-16T15:38:46.000Z ##

These are the screenshots regarding the two toots on

polymaths.social/@dendrobatus_

and

polymaths.social/@dendrobatus_

nvd.nist.gov/vuln/detail/CVE-2

github.com/ubuntu/authd/securi

#InfoSec #Root #authD #systemD #Linux #POSIX #GNU #GPL

##

winterschon@bsd.cafe at 2025-06-16T15:00:52.000Z ##

CVE-2025-5689 😂🙃

Fire up your "anyone we don't know gets root!" account SSH sessions to gain unmitigated control over Ubuntu systems running "Systemd AuthD"

Clown shoes over there, ffs how is this even a real CVE 🤦🏼‍♀️

- nvd.nist.gov/vuln/detail/CVE-2
- github.com/ubuntu/authd/securi

#systemd #uhuhuhubuntu #ubuntu #infosec #cve #noreally #linux #authd

##

CVE-2025-43200
(4.8 MEDIUM)

EPSS: 0.58%

updated 2025-06-17T15:52:31.157000

5 posts

This issue was addressed with improved checks. This issue is fixed in watchOS 11.3.1, macOS Ventura 13.7.4, iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iPadOS 17.7.5, visionOS 2.3.1, macOS Sequoia 15.3.1, iOS 18.3.1 and iPadOS 18.3.1, macOS Sonoma 14.7.4. A logic issue existed when processing a maliciously crafted photo or video shared via an iCloud Link. Apple is aware of a repo

1 repos

https://github.com/allinsthon/CVE-2025-43200

cisakevtracker@mastodon.social at 2025-06-16T18:01:10.000Z ##

CVE ID: CVE-2025-43200
Vendor: Apple
Product: Multiple Products
Date Added: 2025-06-16
Notes: support.apple.com/en-us/122174 ; support.apple.com/en-us/122173 ; support.apple.com/en-us/122900 ; support.apple.com/en-us/122901 ; support.apple.com/en-us/122902 ; support.apple.com/en-us/122903 ; support.apple.com/en-us/122904 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2025-06-16T17:45:04.000Z ##

New. And TP-Link is baaaaaack.

CISA has added two items to the KEV catalogue:

- CVE-2025-43200: Apple Multiple Products Unspecified Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2023-33538: TP-Link Multiple Routers Command Injection Vulnerability cve.org/CVERecord?id=CVE-2023- #CISA #cybersecurity #infosec #Apple #TPLink

##

beyondmachines1@infosec.exchange at 2025-06-13T17:01:19.000Z ##

Paragon's Graphite Spyware targets European journalists through iPhone flaws

Forensic investigation by Citizen Lab confirmed that Paragon's Graphite spyware platform conducted zero-click attacks against European journalists using CVE-2025-43200, a critical iOS vulnerability that enabled remote code execution through maliciously crafted iCloud Link photos or videos sent via iMessage in early 2025. Apple patched the zero-day vulnerability in iOS 18.3.1 on February 10, 2025.

**You may not be a prominent journalist, but this flaw is already six months old, and even ordinary criminals will find a way to exploit it. Patch your iPhone and iPad to latest version ASAP!**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

jos1264@social.skynetcloud.site at 2025-06-13T12:20:04.000Z ##

iOS zero-click attacks used to deliver Graphite spyware (CVE-2025-43200) helpnetsecurity.com/2025/06/13 #governmentbackedattacks #AmnestyInternational #RecordedFuture #vulnerability #CitizenLab #Don'tmiss #Hotstuff #exploit #privacy #spyware #Europe #News #iOS

##

decio@infosec.exchange at 2025-06-12T18:45:36.000Z ##

“Graphite Caught
First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted”
⬇️
“On April 29, 2025, a select group of iOS users were notified by Apple that they were targeted with advanced spyware. Among the group were two journalists that consented for the technical analysis of their cases. The key findings from our forensic analysis of their devices are summarized below:
Our analysis finds forensic evidence confirming with high confidence that both a prominent European journalist (who requests anonymity), and Italian journalist Ciro Pellegrino, were targeted with Paragon’s Graphite mercenary spyware.
We identify an indicator linking both cases to the same Paragon operator.
Apple confirms to us that the zero-click attack deployed in these cases was mitigated as of iOS 18.3.1 and has assigned the vulnerability CVE-2025-43200.”
👇

citizenlab.ca/2025/06/first-fo

#cyberveille #spyware #forensic

##

CVE-2025-5777(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-06-17T15:31:16

2 posts

Insufficient input validation leading to memory overread on the NetScaler Management Interface NetScaler ADC and NetScaler Gateway

CVE-2025-5349(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-06-17T15:31:16

2 posts

Improper access control on the NetScaler Management Interface in NetScaler ADC and NetScaler Gateway

CVE-2025-34508
(6.3 MEDIUM)

EPSS: 0.13%

updated 2025-06-17T15:31:16

3 posts

A path traversal vulnerability exists in the file dropoff functionality of ZendTo versions 6.15-7 and prior. This could allow a remote, authenticated attacker to retrieve the files of other ZendTo users, retrieve files on the host system, or cause a denial of service.

_r_netsec@infosec.exchange at 2025-06-17T15:13:06.000Z ##

CVE-2025-34508: Another File Sharing Application, Another Path Traversal horizon3.ai/attack-research/at

##

cR0w@infosec.exchange at 2025-06-17T14:51:27.000Z ##

The CVE lists the CVSS assessment as a sev:MED here.

sev:MED 5.3 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

A path traversal vulnerability exists in the file dropoff functionality of ZendTo versions 6.15-7 and prior. This could allow a remote, authenticated attacker to retrieve the files of other ZendTo users, retrieve files on the host system, or cause a denial of service.

Retrieving the files of other users does not seem like VC:L. And a DoS does not seem like VA:L. But IDK, I'm just a random crow on the Internet.

nvd.nist.gov/vuln/detail/CVE-2

##

cR0w@infosec.exchange at 2025-06-17T13:40:34.000Z ##

Another sev:CRIT ../ ? This time in ZendTo. LMAO. PoC in the post.

horizon3.ai/attack-research/at

We discovered a path traversal vulnerability in ZendTo versions 6.15-7 and prior. This vulnerability allows malicious actors to bypass the security controls of the service to access or modify potentially sensitive information of other users. This issue is patched in 6.15-8, and we encourage all users to upgrade as soon as possible.

#directoryTraversalMemes

##

CVE-2025-4404
(9.1 CRITICAL)

EPSS: 0.06%

updated 2025-06-17T15:31:16

1 posts

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing

cR0w@infosec.exchange at 2025-06-17T14:55:55.000Z ##

Local post-auth to DA in FreeIPA ( not like the beer in either part of that misleading project name ).

access.redhat.com/security/cve

sev:CRIT 9.1 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the krbCanonicalName for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-3464(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-06-17T03:31:44

3 posts

A race condition vulnerability exists in Armoury Crate. This vulnerability arises from a Time-of-check Time-of-use issue, potentially leading to authentication bypass. Refer to the 'Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information.

beyondmachines1@infosec.exchange at 2025-06-17T17:01:06.000Z ##

Another flaw in ASUS Armoury Crate mainboard update system enables System-level privilege escalation

ASUS has patched a high-severity authorization bypass vulnerability (CVE-2025-3464) in its Armoury Crate system management software that allows attackers with existing system access to manipulate hard links and bypass driver security controls, potentially gaining complete operating system compromise through extensive low-level privileges.

**If you are running an ASUS mainboard on your computer, update the Armory Crate software. The exploit chain is complicated, but hackers have found a way to abuse it before, so they will find a way to abuse it again.**
#cybersecurity #infosec #advisory #ransomware
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2025-06-16T15:35:21.000Z ##

New.

ASUS has released an update for the Armory Crate App that addresses the CVE-2025-3464 vulnerability and other flaws asus.com/content/asus-product- #ASUS #cybersecurity #infosec

##

cR0w@infosec.exchange at 2025-06-16T13:18:03.000Z ##

ASUS with another vuln in their Armoury Crate app. Good thing ASUS auth bypasses haven't been a big deal or anything.

talosintelligence.com/vulnerab

asus.com/content/asus-product-

sev:HIGH 8.4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H

A race condition vulnerability exists in Armoury Crate. This vulnerability arises from a Time-of-check Time-of-use issue, potentially leading to authentication bypass.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-6087(CVSS UNKNOWN)

EPSS: 0.07%

updated 2025-06-16T21:46:53

1 posts

A Server-Side Request Forgery (SSRF) vulnerability was identified in the @opennextjs/cloudflare package. The vulnerability stems from an unimplemented feature in the Cloudflare adapter for Open Next, which allowed unauthenticated users to proxy arbitrary remote content via the `/_next/image` endpoint. This issue allowed attackers to load remote resources from arbitrary hosts under the victim s

cR0w@infosec.exchange at 2025-06-16T19:25:00.000Z ##

Go hack some Cloudflare shit.

github.com/opennextjs/opennext

sev:HIGH 7.8 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:H/SI:L/SA:N

A Server-Side Request Forgery (SSRF) vulnerability was identified in the @opennextjs/cloudflare package. The vulnerability stems from an unimplemented feature in the Cloudflare adapter for Open Next, which allowed unauthenticated users to proxy arbitrary remote content via the /_next/image endpoint.

This issue allowed attackers to load remote resources from arbitrary hosts under the victim site’s domain for any site deployed using the Cloudflare adapter for Open Next.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-49125(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-06-16T21:46:38

1 posts

Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat.  When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed.

2 repos

https://github.com/gregk4sec/CVE-2025-49125

https://github.com/detectrespondrepeat/CVE-2025-49125-Authentication-Bypass

cR0w@infosec.exchange at 2025-06-16T15:37:10.000Z ##

Hey @greynoise, you think this might be the reason for all that recent Tomcat scanning?

lists.apache.org/thread/m66cyt

When using PreResources or PostResources mounted other than at the root
of the web application, it was possible to access those resources via an
unexpected path. That path was likely not to be protected by the same
security constraints as the expected path, allowing those security
constraints to be bypassed.

Edit to include the CVE: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-48976(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-06-16T21:45:58

2 posts

Allocation of resources for multipart headers with insufficient limits enabled a DoS vulnerability in Apache Commons FileUpload. This issue affects Apache Commons FileUpload: from 1.0 before 1.6; from 2.0.0-M1 before 2.0.0-M4. Users are recommended to upgrade to versions 1.6 or 2.0.0-M4, which fix the issue.

weavejester@mastodon.social at 2025-06-17T01:34:38.000Z ##

Released Ring 1.14.2 to fix a vulnerability with Apache FileUpload (nvd.nist.gov/vuln/detail/CVE-2)

#clojure

##

garydgregory@fosstodon.org at 2025-06-16T15:31:28.000Z ##

Heads up CVE watchers! We just published CVE-2025-48976: Apache Commons FileUpload: DoS via part headers. Pick up version 1.6.0 or 2.0.0-M4 lists.apache.org/thread/fbs3wr #cve #apache #security

##

CVE-2023-33538
(8.8 HIGH)

EPSS: 90.99%

updated 2025-06-16T21:32:22

6 posts

TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm .

jbhall56@infosec.exchange at 2025-06-17T11:52:00.000Z ##

The vulnerability in question is CVE-2023-33538 (CVSS score: 8.8), a command injection bug that could result in the execution of arbitrary system commands when processing the ssid1 parameter in a specially crafted HTTP GET request. thehackernews.com/2025/06/tp-l

##

jos1264@social.skynetcloud.site at 2025-06-17T10:00:07.000Z ##

TP-Link Router Flaw CVE-2023-33538 Under Active Exploit, CISA Issues Immediate Alert thehackernews.com/2025/06/tp-l

##

jos1264@social.skynetcloud.site at 2025-06-17T10:00:07.000Z ##

TP-Link Router Flaw CVE-2023-33538 Under Active Exploit, CISA Issues Immediate Alert thehackernews.com/2025/06/tp-l

##

jos1264@social.skynetcloud.site at 2025-06-17T10:00:06.000Z ##

TP-Link Router Flaw CVE-2023-33538 Under Active Exploit, CISA Issues Immediate Alert thehackernews.com/2025/06/tp-l

##

cisakevtracker@mastodon.social at 2025-06-16T18:00:54.000Z ##

CVE ID: CVE-2023-33538
Vendor: TP-Link
Product: Multiple Routers
Date Added: 2025-06-16
Notes: tp-link.com/nordic/support/faq ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2025-06-16T17:45:04.000Z ##

New. And TP-Link is baaaaaack.

CISA has added two items to the KEV catalogue:

- CVE-2025-43200: Apple Multiple Products Unspecified Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2023-33538: TP-Link Multiple Routers Command Injection Vulnerability cve.org/CVERecord?id=CVE-2023- #CISA #cybersecurity #infosec #Apple #TPLink

##

CVE-2025-5309(CVSS UNKNOWN)

EPSS: 0.33%

updated 2025-06-16T18:32:26

4 posts

The chat feature within Remote Support (RS) and Privileged Remote Access (PRA) is vulnerable to a Server-Side Template Injection vulnerability which can lead to remote code execution.

RedTeamNews at 2025-06-18T10:23:59.275Z ##

Critical alert: BeyondTrust Remote Support has a pre-auth RCE flaw (CVE-2025-5309) allowing attackers to take over systems. Cloud instances are patched, but on-prem users must update now. Already exploited in ransomware attacks. Patch ASAP! redteamnews.com/red-team/cve/b

##

defendopsdiaries at 2025-06-18T10:20:15.784Z ##

BeyondTrust's platforms are under fire—a new flaw (CVE-2025-5309) lets attackers run code remotely without any credentials. Are your systems patched up? Discover what you need to know.

thedefendopsdiaries.com/beyond





##

AAKL@infosec.exchange at 2025-06-16T16:27:50.000Z ##

BeyondTrust: CVE-2025-5309: chat feature within Remote Support (RS) and Privileged Remote Access (PRA) vulnerable to Server-Side Template Injection vulnerability @BeyondTrust #cybersecurity #Infosec @cR0w

##

cR0w@infosec.exchange at 2025-06-16T16:25:52.000Z ##

I've already goofed on this company's name in the past so just take this SSTI in BeyondTrust's chat feature and run with it.

beyondtrust.com/trust-center/s

sev:HIGH 8.6 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Remote Support and Privileged Remote Access components do not properly escape input intended for the template engine, leading to a potential template injection vulnerability. This flaw may allow an attacker to execute arbitrary code in the context of the server. Notably, in the case of Remote Support, exploitation does not require authentication.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-49794
(9.1 CRITICAL)

EPSS: 0.05%

updated 2025-06-16T18:32:26

2 posts

A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.

offseq@infosec.exchange at 2025-06-17T00:01:42.000Z ##

🔒 CRITICAL: CVE-2025-49794 in libxml2 hits RHEL 10. Remote, unauthenticated use-after-free via crafted XML can crash apps or cause undefined behavior. Monitor for patches, filter XML inputs, and restrict access! radar.offseq.com/threat/cve-20 #OffSeq #Linux #RHEL #CVE2025 #Infosec

##

cR0w@infosec.exchange at 2025-06-16T16:24:03.000Z ##

Three DoS CVEs in libxml.

access.redhat.com/security/cve

access.redhat.com/security/cve

access.redhat.com/security/cve

##

CVE-2025-2327(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-06-16T18:32:26

1 posts

A flaw exists in FlashArray whereby the Key Encryption Key (KEK) is logged during key rotation when RDL is configured.

CVE-2025-6129
(8.8 HIGH)

EPSS: 0.14%

updated 2025-06-16T18:32:26

1 posts

A vulnerability classified as critical was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. This vulnerability affects unknown code of the file /boafrm/formSaveConfig of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-6128
(8.8 HIGH)

EPSS: 0.14%

updated 2025-06-16T18:32:26

1 posts

A vulnerability classified as critical has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. This affects an unknown part of the file /boafrm/formWirelessTbl of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-49795
(7.5 HIGH)

EPSS: 0.04%

updated 2025-06-16T18:32:26

1 posts

A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.

CVE-2025-4565(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-06-16T16:03:02

1 posts

### Summary Any project that uses Protobuf pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of **recursive groups**, **recursive messages** or **a series of [`SGROUP`](https://protobuf.dev/programming-guides/encoding/#groups) tags** can be corrupted by exceeding the Python recursion limit. Reporter: Alexis Challande, Trail of Bits Ecosystem Security Team

cR0w@infosec.exchange at 2025-06-16T19:07:14.000Z ##

Protobuf isn't used anywhere, right? Cool.

github.com/protocolbuffers/pro

sev:HIGH 8.2 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Any project that uses Protobuf Pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =>6.31.1 or beyond commit 17838beda2943d08b8a9d4df5b68f5f04f26d901

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-36632
(7.8 HIGH)

EPSS: 0.01%

updated 2025-06-16T15:32:27

1 posts

In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could execute code with SYSTEM privilege.

cR0w@infosec.exchange at 2025-06-16T14:20:52.000Z ##

I'm beginning to see a theme for today.

tenable.com/security/tns-2025-

sev:HIGH 7.8 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

In Tenable Agent versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could execute code with SYSTEM privilege.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-6029
(0 None)

EPSS: 0.02%

updated 2025-06-16T12:32:18.840000

4 posts

Use of fixed learning codes, one code to lock the car and the other code to unlock it, the Key Fob Transmitter in KIA-branded Aftermarket Generic Smart Keyless Entry System, primarily distributed in Ecuador, which allows a replay attack. Manufacture is unknown at the time of release.  CVE Record will be updated once this is clarified.

sambowne at 2025-06-18T20:55:03.858Z ##

CVE-2025-6029: KIA-branded Aftermarket Generic Smart Keyless Entry System Replay Attack - asrg.io asrg.io/security-advisories/cv

##

sambowne@infosec.exchange at 2025-06-18T20:55:03.000Z ##

CVE-2025-6029: KIA-branded Aftermarket Generic Smart Keyless Entry System Replay Attack - asrg.io asrg.io/security-advisories/cv

##

rhudaur@flipboard.com at 2025-06-16T22:58:00.000Z ##

Keyless Entry Vulnerability (CVE-2025-6029) Threatens KIA Vehicles in Ecuador, Researcher Reports
thecyberexpress.com/keyless-en

Posted into Cybersecurity Today @cybersecurity-today-rhudaur

##

beyondmachines1@infosec.exchange at 2025-06-16T17:01:44.000Z ##

Critical keyless entry vulnerability exposes KIA vehicles in Ecuador to theft

A critical vulnerability (CVE-2025-6029) has been discovered in KIA Ecuador's keyless entry systems affecting thousands of vehicles from 2022-2025, where outdated "learning code" technology using fixed codes instead of modern rolling codes makes cars vulnerable to signal cloning and brute force attacks. Despite being informed of the issue in May 2024, KIA Ecuador has not implemented any remediation for this flaw that essentially allows attackers to steal vehicles by exploiting the insecure aftermarket key fob technology.

**If you have a Kia car in Ecuador, reach out to the distributor for remediation or possibly disabling of the keyless system. Better to unlock manually then for your car to be stolen. If you are building security systems, don't go for the cheap solution that's been obsolete for decades. It's obsolete because it was breached. That applies both to physical devices and to software and algorithms.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-6112
(8.8 HIGH)

EPSS: 0.05%

updated 2025-06-16T12:32:18.840000

1 posts

A vulnerability, which was classified as critical, has been found in Tenda FH1205 2.0.0.7. This issue affects the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

CVE-2025-6104
(8.8 HIGH)

EPSS: 0.15%

updated 2025-06-16T12:32:18.840000

1 posts

A vulnerability, which was classified as critical, was found in Wifi-soft UniBox Controller up to 20250506. This affects an unknown part of the file /billing/pms_check.php. The manipulation of the argument ipaddress leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this d

CVE-2025-6121
(9.8 CRITICAL)

EPSS: 0.06%

updated 2025-06-16T12:30:32

1 posts

A vulnerability, which was classified as critical, has been found in D-Link DIR-632 FW103B08. Affected by this issue is the function get_pure_content of the component HTTP POST Request Handler. The manipulation of the argument Content-Length leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability on

CVE-2025-6115
(8.8 HIGH)

EPSS: 0.07%

updated 2025-06-16T09:30:44

1 posts

A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. Affected by this issue is the function form_macfilter. The manipulation of the argument mac_hostname_%d/sched_name_%d leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supp

CVE-2025-6114
(8.8 HIGH)

EPSS: 0.07%

updated 2025-06-16T09:30:44

1 posts

A vulnerability has been found in D-Link DIR-619L 2.06B01 and classified as critical. Affected by this vulnerability is the function form_portforwarding of the file /goform/form_portforwarding. The manipulation of the argument ingress_name_%d/sched_name_%d/name_%d leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used

CVE-2025-6098
(9.8 CRITICAL)

EPSS: 0.04%

updated 2025-06-16T03:30:33

1 posts

A vulnerability was found in UTT 进取 750W up to 5.0. It has been classified as critical. This affects the function strcpy of the file /goform/setSysAdm of the component API. The manipulation of the argument passwd1 leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosu

CVE-2025-6102
(8.8 HIGH)

EPSS: 0.21%

updated 2025-06-16T03:30:27

1 posts

A vulnerability classified as critical was found in Wifi-soft UniBox Controller up to 20250506. Affected by this vulnerability is an unknown functionality of the file /authentication/logout.php. The manipulation of the argument mac_address leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early

CVE-2025-6103
(8.8 HIGH)

EPSS: 0.15%

updated 2025-06-16T03:30:26

1 posts

A vulnerability, which was classified as critical, has been found in Wifi-soft UniBox Controller up to 20250506. Affected by this issue is some unknown functionality of the file /billing/test_accesscodelogin.php. The manipulation of the argument Password leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was

CVE-2025-5964(CVSS UNKNOWN)

EPSS: 0.05%

updated 2025-06-15T21:30:33

1 posts

A path traversal issue in the API endpoint in M-Files Server before version 25.6.14925.0 allows an authenticated user to read files in the server.

1 repos

https://github.com/byteReaper77/CVE-2025-5964-

cR0w@infosec.exchange at 2025-06-15T21:06:24.000Z ##

../ in M-Files. I didn't know what that was so I made the mistake of looking at their website and yeah, I expect there are plenty more bugs to be found there.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-28380
(6.1 MEDIUM)

EPSS: 0.03%

updated 2025-06-15T18:32:03

1 posts

A cross-site scripting (XSS) vulnerability in OpenC3 COSMOS v6.0.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the URL parameter.

cR0w@infosec.exchange at 2025-06-13T15:25:26.000Z ##

CVEs published for this train wreck in OpenC3 Cosmos.

visionspace.com/openc3-cosmos-

  • Cross-Site Scripting (XSS) in multiple tools within the web interface
  • Remote Code Execution (RCE) via malicious plugin installation and improper script execution
  • Arbitrary File Access and Manipulation through path traversal in multiple API endpoints
  • Credential Leakage through modifiable environment variables in containers
  • Insecure Authentication Mechanisms, including clear-text password usage and undocumented service accounts
  • CVE-2025-28380
  • CVE-2025-28381
  • CVE-2025-28382
  • CVE-2025-28384
  • CVE-2025-28386
  • CVE-2025-28388
  • CVE-2025-28389
##

CVE-2025-6092
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-06-15T18:31:03

1 posts

A vulnerability was found in comfyanonymous comfyui up to 0.3.39. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /upload/image of the component Incomplete Fix CVE-2024-10099. The manipulation of the argument image leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be u

FunctionalProgramming@activitypub.awakari.com at 2025-06-15T17:31:05.000Z ## comfyanonymous comfyui Incomplete Fix CVE-2024-10099 image cross site scripti... A vulnerability was found in comfyanonymous comfyui up to 0.3.39. It has been declared as problematic. Affected by t...


Origin | Interest | Match ##

CVE-2025-33108
(8.6 HIGH)

EPSS: 0.04%

updated 2025-06-14T03:30:34

1 posts

IBM Backup, Recovery and Media Services for i 7.4 and 7.5 could allow a user with the capability to compile or restore a program to gain elevated privileges due to a library unqualified call made by a BRMS program. A malicious actor could cause user-controlled code to run with component access to the host operating system.

cR0w@infosec.exchange at 2025-06-14T01:11:40.000Z ##

This one looks like it could be handy for ransomware crews.

ibm.com/support/pages/node/723

sev:HIGH 8.5 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

IBM Backup, Recovery and Media Services for i 7.4 and 7.5 could allow a user with the capability to compile or restore a program to gain elevated privileges due to a library unqualified call made by a BRMS program. A malicious actor could cause user-controlled code to run with component access to the host operating system.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-6083(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-06-14T00:31:23

1 posts

In ExtremeCloud Universal ZTNA, a syntax error in the 'searchKeyword' condition caused queries to bypass the owner_id filter. This issue may allow users to search data across the entire table instead of being restricted to their specfic owenr_id.

1 repos

https://github.com/Yuri08loveElaina/CVE_2025_6083

cR0w@infosec.exchange at 2025-06-13T22:18:57.000Z ##

Well that wasn't very Zero Trust of you.

In ExtremeCloud Universal ZTNA, a syntax error in the 'searchKeyword' condition caused queries to bypass the owner_id filter. This issue may allow users to search data across the entire table instead of being restricted to their specfic owenr_id.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-41234
(6.5 MEDIUM)

EPSS: 0.11%

updated 2025-06-13T22:12:58

1 posts

### Description In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x and 6.2.x, an application is vulnerable to a reflected file download (RFD) attack when it sets a “Content-Disposition” header with a non-ASCII charset, where the filename attribute is derived from user-supplied input. Specifically, an application is vulnerable when all the following are true: - The header is prep

bclozel@mamot.fr at 2025-06-12T13:36:00.000Z ##

#Spring Framework maintenance releases day with 6.1.21 and 6.2.8. Both contain a fix for CVE-2025-41234 that we just published.

spring.io/blog/2025/06/12/spri

##

CVE-2023-52922
(7.8 HIGH)

EPSS: 0.02%

updated 2025-06-13T21:32:14

1 posts

In the Linux kernel, the following vulnerability has been resolved: can: bcm: Fix UAF in bcm_proc_show() BUG: KASAN: slab-use-after-free in bcm_proc_show+0x969/0xa80 Read of size 8 at addr ffff888155846230 by task cat/7862 CPU: 1 PID: 7862 Comm: cat Not tainted 6.5.0-rc1-00153-gc8746099c197 #230 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 Call Trace: <TASK>

CVE-2025-22237
(6.7 MEDIUM)

EPSS: 0.02%

updated 2025-06-13T21:19:47

1 posts

An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially crafted git url which could cause and arbitrary command to be run on the master with the same privileges as the master process.

FunctionalProgramming@activitypub.awakari.com at 2025-06-13T06:55:39.000Z ## CVE-2025-22237 salt advisoryAn attacker with access to a minion key can explo... An attacker with access to a minion key can exploit the 'on demand' pillar functionality with a specially cr...


Origin | Interest | Match ##

decio@infosec.exchange at 2025-06-11T08:59:41.000Z ##

⚠️ Si vous administrez un Roundcube Webmail (v ≤ 1.6.10), c'est le moment de vérifier et appliquer les mises à jour.
⬇️
Une vulnérabilité critique (CVE-2025-49113) permet une exécution de code à distance après login via désérialisation PHP mal sécurisée.

->Déjà exploitée et revendue sur forums cybercriminels.
->Service omniprésent proposé par défaut entre autres chez cPanel, Plesk, etc.
-> Très utilisé dans des universités et institutions publiques.

Détails + PoC ici
👇
fearsoff.org/research/roundcube
🛡 Versions corrigées : 1.6.11 / 1.5.10

Roundcube stocke les sessions utilisateurs avec un système maison basé sur la sérialisation PHP (une manière d’enregistrer des objets dans des chaînes de texte).
Or, une faille dans la fonction qui lit ces sessions permet, si on est connecté, d’y injecter du code malveillant déguisé en objet PHP
Particularité : cette faille était cachée depuis plus de 10 ans. Le code vulnérable était minuscule (1 caractère mal interprété !) mais suffisait pour ouvrir une porte...

✅ Nécessite un login / compte logué/authentifié (mais des chaînes CSRF sont possibles)

#Cyberveille #RoundCube CVE_2025_49113

##

CVE-2025-28389
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-06-13T18:31:41

1 posts

Weak password requirements in OpenC3 COSMOS v6.0.0 allow attackers to bypass authentication via a brute force attack.

cR0w@infosec.exchange at 2025-06-13T15:25:26.000Z ##

CVEs published for this train wreck in OpenC3 Cosmos.

visionspace.com/openc3-cosmos-

  • Cross-Site Scripting (XSS) in multiple tools within the web interface
  • Remote Code Execution (RCE) via malicious plugin installation and improper script execution
  • Arbitrary File Access and Manipulation through path traversal in multiple API endpoints
  • Credential Leakage through modifiable environment variables in containers
  • Insecure Authentication Mechanisms, including clear-text password usage and undocumented service accounts
  • CVE-2025-28380
  • CVE-2025-28381
  • CVE-2025-28382
  • CVE-2025-28384
  • CVE-2025-28386
  • CVE-2025-28388
  • CVE-2025-28389
##

CVE-2025-28381
(7.5 HIGH)

EPSS: 0.03%

updated 2025-06-13T18:31:41

1 posts

A credential leak in OpenC3 COSMOS v6.0.0 allows attackers to access service credentials as environment variables stored in all containers.

cR0w@infosec.exchange at 2025-06-13T15:25:26.000Z ##

CVEs published for this train wreck in OpenC3 Cosmos.

visionspace.com/openc3-cosmos-

  • Cross-Site Scripting (XSS) in multiple tools within the web interface
  • Remote Code Execution (RCE) via malicious plugin installation and improper script execution
  • Arbitrary File Access and Manipulation through path traversal in multiple API endpoints
  • Credential Leakage through modifiable environment variables in containers
  • Insecure Authentication Mechanisms, including clear-text password usage and undocumented service accounts
  • CVE-2025-28380
  • CVE-2025-28381
  • CVE-2025-28382
  • CVE-2025-28384
  • CVE-2025-28386
  • CVE-2025-28388
  • CVE-2025-28389
##

CVE-2022-4976
(9.8 CRITICAL)

EPSS: 0.06%

updated 2025-06-13T18:30:34

1 posts

Archive::Unzip::Burst from 0.01 through 0.09 for Perl contains a bundled InfoZip library that is affected by several vulnerabilities. The bundled library is affected by CVE-2014-8139, CVE-2014-8140 and CVE-2014-8141.

cR0w@infosec.exchange at 2025-06-12T01:03:38.000Z ##

I'm just going to leave this one here and walk away.

cve.org/CVERecord?id=CVE-2022-

##

CVE-2025-4232(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-06-13T00:33:24

3 posts

An improper neutralization of wildcards vulnerability in the log collection feature of Palo Alto Networks GlobalProtect™ app on macOS allows a non administrative user to escalate their privileges to root.

AAKL@infosec.exchange at 2025-06-12T14:29:17.000Z ##

Palo Alto has patched several vulnerabilities across a range of products, including CVE-2025-4232 security.paloaltonetworks.com/

More:

Infosecurity-Magazine: infosecurity-magazine.com/news #cybersecurity #infosec #PaloAlto

##

jbhall56@infosec.exchange at 2025-06-12T12:11:35.000Z ##

The most severe of the resolved flaws is CVE-2025-4232, a high-severity improper neutralization of wildcards bug in GlobalProtect for macOS that leads to code injection. securityweek.com/palo-alto-net

##

mttaggart@infosec.exchange at 2025-06-11T18:27:57.000Z ##

Oh hi there Palo Alto privesc!

An improper neutralization of wildcards vulnerability in the log collection feature of Palo Alto Networks GlobalProtect™ app on macOS allows a non administrative user to escalate their privileges to root.

security.paloaltonetworks.com/

##

CVE-2025-33073
(8.8 HIGH)

EPSS: 0.32%

updated 2025-06-12T16:06:39.330000

9 posts

Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.

2 repos

https://github.com/mverschu/CVE-2025-33073

https://github.com/joaozixx/CVE-2025-33073

obivan@infosec.exchange at 2025-06-13T18:08:33.000Z ##

PoC Exploit for the NTLM reflection SMB flaw github.com/mverschu/CVE-2025-3

##

deeg@mastodon.social at 2025-06-12T11:48:00.000Z ##

@campuscodi SySS has also published its analysis of CVE-2025-33073 today:

blog.syss.com/posts/kerberos-r

##

campuscodi@mastodon.social at 2025-06-12T11:43:37.000Z ##

RedTeam Pentesting and Synacktiv have published technical analyses of CVE-2025-33073, a new way to execute NTLM reflection attacks.

This was fixed in this month's Patch Tuesday and also works against Kerberos.

blog.redteam-pentesting.de/202

synacktiv.com/publications/ntl

##

jos1264@social.skynetcloud.site at 2025-06-12T03:55:01.000Z ##

CVE-2025-33073: Windows SMB Client Zero-Day Lets Attackers Gain SYSTEM Privileges – Source: socprime.com ciso2ciso.com/cve-2025-33073-w #rssfeedpostgeneratorecho #ElevationofPrivileges #CyberSecurityNews #MicrosoftZeroDay #CVE-2025-33073 #Latestthreats #Vulnerability #socprimecom #socprime #zeroday #Blog #CVE

##

raptor@infosec.exchange at 2025-06-11T15:52:47.000Z ##

#NTLM reflection is dead, long live NTLM reflection! – An in-depth analysis of CVE-2025-33073 #vulnerability

synacktiv.com/en/publications/

A Look in the Mirror - The Reflective #Kerberos Relay Attack

blog.redteam-pentesting.de/202

##

obivan@infosec.exchange at 2025-06-11T14:23:28.000Z ##

NTLM reflection is dead, long live NTLM reflection! – An in-depth analysis of CVE-2025-33073 synacktiv.com/en/publications/

##

RedTeamPentesting@mastodon.social at 2025-06-11T10:45:38.000Z ##

Based on our testing, MS seems to have fixed CVE-2025-33073 by blocking the CredUnmarshalTargetInfo/CREDENTIAL_TARGET_INFORMATIONW trick!
@tiraniddo@decoder_it #netsec #infosec #windows #cybersecurity

mastodon.social/@RedTeamPentes

##

_r_netsec@infosec.exchange at 2025-06-11T08:13:06.000Z ##

CVE-2025-33073: A Look in the Mirror - The Reflective Kerberos Relay Attack blog.redteam-pentesting.de/202

##

RedTeamPentesting@mastodon.social at 2025-06-11T08:03:55.000Z ##

🚨 Our new blog post about Windows CVE-2025-33073 which we discovered is live:

🪞The Reflective Kerberos Relay Attack - Remote privilege escalation from low-priv user to SYSTEM with RCE by applying a long forgotten NTLM relay technique to Kerberos:

blog.redteam-pentesting.de/202

##

CVE-2025-5353
(8.8 HIGH)

EPSS: 0.04%

updated 2025-06-12T16:06:39.330000

1 posts

A hardcoded key in Ivanti Workspace Control before version 10.19.10.0 allows a local authenticated attacker to decrypt stored SQL credentials.

beyondmachines1@infosec.exchange at 2025-06-11T09:01:09.000Z ##

Ivanti reports three high severity hardcoded keys flawa in Ivanti Workspace Control

Ivanti released security updates for three high-severity vulnerabilities (CVE-2025-5353, CVE-2025-22455, CVE-2025-22463) in its Workspace Control platform that involve hardcoded cryptographic keys allowing authenticated attackers to decrypt stored SQL credentials and environment passwords, potentially compromising entire enterprise environments.

**This one is not critical, but is still quite concerning. The flaws enable attackers to decrypt credentials due to hardcoded encryption keys (which can be easily found on other installations). An exploit does require local access, so you are not in immediate danger. But given that hackers LOVE Ivanti vulnerabilities, plan a patch of this one.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-3052
(8.2 HIGH)

EPSS: 0.02%

updated 2025-06-12T16:06:29.520000

2 posts

An arbitrary write vulnerability in Microsoft signed UEFI firmware allows for code execution of untrusted software. This allows an attacker to control its value, leading to arbitrary memory writes, including modification of critical firmware settings stored in NVRAM. Exploiting this vulnerability could enable security bypasses, persistence mechanisms, or full system compromise.

CVE-2025-49146
(8.2 HIGH)

EPSS: 0.02%

updated 2025-06-12T16:06:20.180000

2 posts

pgjdbc is an open source postgresql JDBC Driver. From 42.7.4 and until 42.7.7, when the PostgreSQL JDBC driver is configured with channel binding set to required (default value is prefer), the driver would incorrectly allow connections to proceed with authentication methods that do not support channel binding (such as password, MD5, GSS, or SSPI authentication). This could allow a man-in-the-middl

PostgreSQL@activitypub.awakari.com at 2025-06-13T00:00:00.000Z ## PostgreSQL JDBC 42.7.7 Security update for CVE-2025-49146 The PostgreSQL JDBC team have released version 42.7.7. to address CVE-2025-49146 When the PostgreSQL JDBC driver is configured with channel...


Origin | Interest | Match ##

PostgreSQL@activitypub.awakari.com at 2025-06-13T13:40:53.000Z ## PostgreSQL JDBC 42.7.7 Security update for CVE-2025-49146 Article URL: https://www.postgresql.org/about/news/postgresql-jdbc-4277-security-update-for-cve-2025-49146-3088/ Comments URL: https://news...


Origin | Interest | Match ##

CVE-2025-2254
(8.7 HIGH)

EPSS: 0.02%

updated 2025-06-12T16:06:20.180000

1 posts

An issue has been discovered in GitLab CE/EE affecting all versions from 17.9 before 17.10.8, 17.11 before 17.11.4, and 18.0 before 18.0.2. Improper output encoding in the snipper viewer functionality lead to Cross-Site scripting attacks.

beyondmachines1@infosec.exchange at 2025-06-13T09:01:09.000Z ##

GitLab patches multiple account takeover and injection vulnerabilities

GitLab released security updates addressing multiple high-severity vulnerabilities including account takeover through HTML injection (CVE-2025-4278), cross-site scripting enabling user impersonation (CVE-2025-2254), and unauthorized CI/CD job injection in GitLab Ultimate (CVE-2025-5121) affecting both Community and Enterprise editions.

**If you are running self-managed GitLab installations, plan a quick patch to versions 18.0.2, 17.11.4, or 17.10.8. There are three near-critical flaws, and GitLab is by it's nature open to multiple users so the risk is not trivial.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-30085
(0 None)

EPSS: 0.40%

updated 2025-06-12T16:06:20.180000

1 posts

Remote code execution vulnerability in RSForm!pro component 3.0.0 - 3.3.14 for Joomla was discovered. The issue occurs within the submission export feature and requires administrative access to the export feature.

CVE-2025-6001
(8.3 HIGH)

EPSS: 0.02%

updated 2025-06-12T16:06:20.180000

1 posts

A Cross-Site Request Forgery (CSRF) vulnerability exists in the product image upload function of VirtueMart that bypasses the CSRF protection token. An attacker is able to craft a special CSRF request which will allow unrestricted file upload into the VirtueMart media manager.

cR0w@infosec.exchange at 2025-06-11T16:50:44.000Z ##

Doomla. LOL.

blog.blacklanternsecurity.com/

  • CVE-2025-6001Cross-Site Request Forgery (CSRF):
    Allows attackers to trick authenticated users into performing unauthorized actions without their knowledge.

  • CVE-2025-6002Unrestricted File Upload:
    Permits arbitrary file uploads, potentially leading to remote code execution or full server compromise.

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-33053
(8.8 HIGH)

EPSS: 16.50%

updated 2025-06-12T14:51:07.700000

7 posts

External control of file name or path in WebDAV allows an unauthorized attacker to execute code over a network.

3 repos

https://github.com/TheTorjanCaptain/CVE-2025-33053-Checker-PoC

https://github.com/DevBuiHieu/CVE-2025-33053-Proof-Of-Concept

https://github.com/kra1t0/CVE-2025-33053-WebDAV-RCE-PoC-and-C2-Concept

Ubuntu@activitypub.awakari.com at 2025-06-13T07:12:22.000Z ## PoC Released for Critical WebDAV 0-Day RCE Vulnerability Actively Exploited by APT Groups A proof-of-concept exploit for CVE-2025-33053, a critical zero-day vulnerability affecting WebDAV implement...

#APT #Cyber #Security #News #Cybersecurity #Vulnerability #Zero-day #Cyber #Security #Cyber #security

Origin | Interest | Match ##

soc_prime@infosec.exchange at 2025-06-12T15:05:53.000Z ##

Detect CVE-2025-33053 exploitation–zero-day RCE vulnerability in WebDAV used in Stealth Falcon APT attacks– with a set of Sigma rules in the SOC Prime Platform.
socprime.com/blog/cve-2025-330

##

jbhall56@infosec.exchange at 2025-06-12T12:32:45.000Z ##

The flaw, tracked as CVE-2025-33053, is a remote code execution vulnerability in Web Distributed Authoring and Versioning, or WebDAV. govinfosecurity.com/microsoft-

##

jos1264@social.skynetcloud.site at 2025-06-12T03:55:01.000Z ##

CVE-2025-33053 Exploitation: A Critical WebDAV Zero-Day RCE Vulnerability Actively Weaponized by Stealth Falcon APT Group – Source: socprime.com ciso2ciso.com/cve-2025-33053-e #rssfeedpostgeneratorecho #CyberSecurityNews #CVE-2025-33053 #Latestthreats #Vulnerability #socprimecom #socprime #zeroday #ZeroDay #Blog #CVE #rce

##

jos1264@social.skynetcloud.site at 2025-06-11T11:40:04.000Z ##

Microsoft fixes zero-day exploited for cyber espionage (CVE-2025-33053) helpnetsecurity.com/2025/06/11 #securityupdate #WindowsServer #PatchTuesday #CheckPoint #Don'tmiss #Microsoft #Hotstuff #MSOffice #Magento #Tenable #Windows #Akamai #Adobe #News

##

VirusBulletin@infosec.exchange at 2025-06-11T09:38:35.000Z ##

Check Point Research discovered a new campaign conducted by the APT group Stealth Falcon. The attack used a .url file that exploited a zero-day vulnerability (CVE-2025-33053) to execute malware from an actor-controlled WebDAV server. research.checkpoint.com/2025/s

##

beyondmachines1@infosec.exchange at 2025-06-11T08:01:14.000Z ##

Microsoft releases June 2025 Patch, fixing actively exploited flaw and 65 additional vulnerabilities

Microsoft's June 2025 Patch Tuesday addressed 66 vulnerabilities including one actively exploited zero-day (CVE-2025-33053) that was weaponized by the Stealth Falcon APT group against a Turkish defense company through malicious WebDAV URLs, and nine additional critical flaws affecting core Windows services like Remote Desktop, SMB, and Office applications.

**This month prioritize updating Windows OS patching, Microsoft Office and Microsoft Sharepoint. All these have actively exploited or critical flaws. Then move on to the others. Don't delay on the Windows update, there are actively exploited flaws.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-4278
(8.7 HIGH)

EPSS: 0.02%

updated 2025-06-12T12:32:09

1 posts

An issue has been discovered in GitLab CE/EE affecting all versions starting with 18.0 before 18.0.2. Under certain conditions html injection in new search page could lead to account takeover.

beyondmachines1@infosec.exchange at 2025-06-13T09:01:09.000Z ##

GitLab patches multiple account takeover and injection vulnerabilities

GitLab released security updates addressing multiple high-severity vulnerabilities including account takeover through HTML injection (CVE-2025-4278), cross-site scripting enabling user impersonation (CVE-2025-2254), and unauthorized CI/CD job injection in GitLab Ultimate (CVE-2025-5121) affecting both Community and Enterprise editions.

**If you are running self-managed GitLab installations, plan a quick patch to versions 18.0.2, 17.11.4, or 17.10.8. There are three near-critical flaws, and GitLab is by it's nature open to multiple users so the risk is not trivial.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-32465(CVSS UNKNOWN)

EPSS: 0.05%

updated 2025-06-11T21:30:51

1 posts

A stored XSS vulnerability in RSTickets! component 1.9.12 - 3.3.0 for Joomla was discovered. It allows attackers to perform cross-site scripting (XSS) attacks via sending crafted payload.

CVE-2025-32466(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-06-11T21:30:50

1 posts

A SQL injection vulnerability in RSMediaGallery! component 1.7.4 - 2.1.7 for Joomla was discovered. The issue occurs within the dashboard component, where user-supplied input is not properly sanitized before being stored and rendered. An attacker can inject malicious JavaScript code into text fields or other input points, which is subsequently executed in the browser of any user who clicks on the

CVE-2025-24016
(9.9 CRITICAL)

EPSS: 91.49%

updated 2025-06-11T21:11:44.863000

1 posts

Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 4.4.0 and prior to version 4.9.1, an unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. DistributedAPI parameters are a serialized as JSON and deserialized using `as_wazuh_object` (in `framework/wazuh/core/cluster/common.py`). If an attacker manages

Nuclei template

7 repos

https://github.com/0xjessie21/CVE-2025-24016

https://github.com/MuhammadWaseem29/CVE-2025-24016

https://github.com/cybersecplayground/CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE-PoC

https://github.com/celsius026/poc_CVE-2025-24016

https://github.com/B1ack4sh/Blackash-CVE-2025-24016

https://github.com/rxerium/CVE-2025-24016

https://github.com/huseyinstif/CVE-2025-24016-Nuclei-Template

CVE-2025-6002
(7.2 HIGH)

EPSS: 0.28%

updated 2025-06-11T18:35:49

1 posts

An unrestricted file upload vulnerability exists in the Product Image section of the VirtueMart backend. Authenticated attackers can upload files with arbitrary extensions, including executable or malicious files, potentially leading to remote code execution or other security impacts depending on server configuration.

cR0w@infosec.exchange at 2025-06-11T16:50:44.000Z ##

Doomla. LOL.

blog.blacklanternsecurity.com/

  • CVE-2025-6001Cross-Site Request Forgery (CSRF):
    Allows attackers to trick authenticated users into performing unauthorized actions without their knowledge.

  • CVE-2025-6002Unrestricted File Upload:
    Permits arbitrary file uploads, potentially leading to remote code execution or full server compromise.

nvd.nist.gov/vuln/detail/CVE-2

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-4922
(8.1 HIGH)

EPSS: 0.01%

updated 2025-06-11T17:39:43

1 posts

Nomad Community and Nomad Enterprise (“Nomad”) prefix-based ACL policy lookup can lead to incorrect rule application and shadowing. This vulnerability, identified as CVE-2025-4922, is fixed in Nomad Community Edition 1.10.2 and Nomad Enterprise 1.10.2, 1.9.10, and 1.8.14.

1 repos

https://github.com/louay-075/CVE-2025-49223-BillboardJS-PoC

cR0w@infosec.exchange at 2025-06-11T14:03:34.000Z ##

Whoopsie in Nomad.

discuss.hashicorp.com/t/hcsec-

sev:HIGH 8.1 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Nomad Community and Nomad Enterprise (“Nomad”) prefix-based ACL policy lookup can lead to incorrect rule application and shadowing. This vulnerability, identified as CVE-2025-4922, is fixed in Nomad Community Edition 1.10.2 and Nomad Enterprise 1.10.2, 1.9.10, and 1.8.14.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-5959
(8.8 HIGH)

EPSS: 0.09%

updated 2025-06-11T15:31:34

1 posts

Type Confusion in V8 in Google Chrome prior to 137.0.7151.103 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

AAKL@infosec.exchange at 2025-06-14T16:52:36.000Z ##

For those who missed this, Microsoft posted a couple of updates yesterday on its security guide, both related to Chromium-based Edge.

- Chromium: CVE-2025-5959 Type Confusion in V8 New
CVE-2025-5959 msrc.microsoft.com/update-guid

- Chromium: CVE-2025-5958 Use after free in Media (new) msrc.microsoft.com/update-guid #Microsoft #cybersecurity #Infosec

##

CVE-2025-5958
(8.8 HIGH)

EPSS: 0.08%

updated 2025-06-11T15:31:34

1 posts

Use after free in Media in Google Chrome prior to 137.0.7151.103 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

AAKL@infosec.exchange at 2025-06-14T16:52:36.000Z ##

For those who missed this, Microsoft posted a couple of updates yesterday on its security guide, both related to Chromium-based Edge.

- Chromium: CVE-2025-5959 Type Confusion in V8 New
CVE-2025-5959 msrc.microsoft.com/update-guid

- Chromium: CVE-2025-5958 Use after free in Media (new) msrc.microsoft.com/update-guid #Microsoft #cybersecurity #Infosec

##

CVE-2025-43698
(9.1 CRITICAL)

EPSS: 0.04%

updated 2025-06-11T15:31:34

1 posts

Improper Preservation of Permissions vulnerability in Salesforce OmniStudio (FlexCards) allows bypass of field level security controls for Salesforce objects. This impacts OmniStudio: before Spring 2025

beyondmachines1@infosec.exchange at 2025-06-12T17:01:10.000Z ##

Salesforce patches five vulnerabilities in Industry Cloud Components

Salesforce addressed multiple security vulnerabilities discovered by AppOmni researchers in its Industries platform components, including a critical SOQL data source flaw (CVE-2025-43698) that completely bypassed field-level security permissions and exposed sensitive data through Flexcards and Data Mappers. The company fixed three of five assigned CVEs and implemented customer-configurable security settings for the remaining vulnerabilities. They declined to assign CVEs to 16 additional issues classified as customer-responsibility misconfigurations.

**If you are using Salesforce industry cloud offerings, make sure to review your settings in Flexcard and DataMappers for the new security configuration. Then reach out to Salesforce support for the other 16 issues that the vendor claims are your problem.**
#cybersecurity #infosec #advisory #databreach
beyondmachines.net/event_detai

##

CVE-2025-32711
(9.3 CRITICAL)

EPSS: 0.14%

updated 2025-06-11T15:30:38

5 posts

Ai command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network.

jos1264@social.skynetcloud.site at 2025-06-12T22:15:01.000Z ##

CVE-2025-32711 Vulnerability: “EchoLeak” Flaw in Microsoft 365 Copilot Could Enable a Zero-Click Attack on an AI Agent – Source: socprime.com ciso2ciso.com/cve-2025-32711-v #rssfeedpostgeneratorecho #CyberSecurityNews #CVE-2025-32711 #Latestthreats #Vulnerability #socprimecom #zeroclick #EchoLeak #socprime #Blog #CVE

##

AAKL@infosec.exchange at 2025-06-12T14:21:24.000Z ##

Microsoft disclosed this new vulnerability yesterday, if you missed it.

Microsoft: M365 Copilot Information Disclosure Vulnerability - CVE-2025-32711 msrc.microsoft.com/update-guid

More:

The Hacker News: Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction thehackernews.com/2025/06/zero @thehackernews #Microsoft #AI #cybersecurity #infosec

##

jbhall56@infosec.exchange at 2025-06-12T11:54:17.000Z ##

The attack was devised by Aim Labs researchers in January 2025, who reported their findings to Microsoft. The tech giant assigned the CVE-2025-32711 identifier and fixed it server-side in May, so no user action is required. bleepingcomputer.com/news/secu

##

beyondmachines1@infosec.exchange at 2025-06-12T08:01:10.000Z ##

Critical vulnerability in Microsoft 365 Copilot AI called EchoLeak enabled data exfiltration

Microsoft disclosed "EchoLeak" (CVE-2025-32711), the first documented zero-click attack against an AI agent that exploits an "LLM Scope Violation" in Microsoft 365 Copilot. It allows attackers to exfiltrate sensitive organizational data through hidden prompt injection instructions in emails sent by attackers to an employee. The email is read by the Copilot and the prompt instructions are executed. Stolen data is sent via crafted URLs as parameters.

**Read how this flaw is exploited in detail. Be aware that similar attacks WILL happen across ALL AI integrated tools worldwide. So be very careful about content that looks like instructions to do something which makes little sense to you. If not needed, fully delete such content and report it to your admins so it's possibly not loaded into the AI.**
#cybersecurity #infosec #advisory #databreach
beyondmachines.net/event_detai

##

cR0w@infosec.exchange at 2025-06-11T13:56:46.000Z ##

This is patched now but go hack more AI shit.

msrc.microsoft.com/update-guid

sev:CRIT 9.3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C

Ai command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-35941
(5.5 MEDIUM)

EPSS: 0.01%

updated 2025-06-11T15:30:38

1 posts

A password is exposed locally.

cR0w@infosec.exchange at 2025-06-11T13:58:49.000Z ##

Can't say Tenable isn't succinct in their descriptions. This one is in MySCADA Pro Manager.

tenable.com/security/research/

sev:MED 5.5 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

A password is exposed locally.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-5986
(6.5 MEDIUM)

EPSS: 0.04%

updated 2025-06-11T15:30:29

1 posts

A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction

Haydar@social.tchncs.de at 2025-06-13T12:51:00.000Z ##

@kubikpixel

Für #Debian wird es wohl kein zeitnahes Update geben, da die Lücke als "minor" eingestuft wird " <postponed> (Minor issue, fix along with June update)" #Thunderbird

security-tracker.debian.org/tr

##

CVE-2025-29756(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-06-11T09:30:38

1 posts

SunGrow's back end users system iSolarCloud https://isolarcloud.com  uses an MQTT service to transport data from the user's connected devices to the user's web browser.  The MQTT server however did not have sufficient restrictions in place to limit the topics that a user could subscribe to.  While the data that is transmitted through the MQTT server is encrypted and the credentials for the MQTT s

cR0w@infosec.exchange at 2025-06-11T12:54:13.000Z ##

Watch this target space as more power utilities roll out virtual power plant projects.

csirt.divd.nl/cves/CVE-2025-29

sev:HIGH 8.3 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/AU:Y

SunGrow's back end users system iSolarCloud isolarcloud.com uses an MQTT service to transport data from the user's connected devices to the user's web browser.
The MQTT server however did not have sufficient restrictions in place to limit the topics that a user could subscribe to.
While the data that is transmitted through the MQTT server is encrypted and the credentials for the MQTT server are obtained though an API call, the credentials could be used to subscribe to any topic and the encryption key can be used to decrypt all messages received.
An attack with an account on iSolarCloud.com could extract MQTT credentials and the decryption key from the browser and then use an external program to subscribe to the topic '#' and thus recieve all messages from all connected devices.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-4275
(7.9 HIGH)

EPSS: 0.01%

updated 2025-06-11T03:31:07

6 posts

Running the provided utility changes the certificate on any Insyde BIOS and then the attached .efi file can be launched.

1 repos

https://github.com/NikolajSchlej/Hydroph0bia

Reverse-Engineering@activitypub.awakari.com at 2025-06-13T13:53:00.000Z ## Hydroph0bia (CVE-2025-4275) — от обхода SecureBoot к модификации DXE-тома в UEFI-совместимых прошивках Insyde H2O Здравствуй, читател...

#uefi #insyde #уязвимость #reverse-engineering #эксплуатация #уязвимостей #secure #boot #безопасная #загрузка

Origin | Interest | Match ##

Reverse-Engineering@activitypub.awakari.com at 2025-06-10T12:00:24.000Z ## Hydroph0bia (CVE-2025-4275) — тривиальный обход SecureBoot в UEFI-совместимых прошивках на базе платформы Insyde H2O Здравствуй, чи...

#UEFI #insyde #уязвимость #reverse-engineering #безопасная #загрузка #эксплуатация #уязвимостей

Origin | Interest | Match ##

Reverse-Engineering@activitypub.awakari.com at 2025-06-13T13:53:00.000Z ## Hydroph0bia (CVE-2025-4275) — от обхода SecureBoot к модификации DXE-тома в UEFI-совместимых прошивках Insyde H2O Здравствуй, читател...

#uefi #insyde #уязвимость #reverse-engineering #эксплуатация #уязвимостей

Origin | Interest | Match ##

lobsters@mastodon.social at 2025-06-11T13:40:18.000Z ##

Hydroph0bia (CVE-2025-4275) - a trivial SecureBoot bypass for UEFI-compatible firmware based on Insyde H2O, part 1 lobste.rs/s/b1rxqt #reversing #security
coderush.me/hydroph0bia-part1/

##

raptor@infosec.exchange at 2025-06-11T05:53:28.000Z ##

#Hydroph0bia (CVE-2025-4275) - a trivial #SecureBoot bypass for UEFI-compatible firmware based on Insyde #H2O, part 1

coderush.me/hydroph0bia-part1/

##

jos1264@social.skynetcloud.site at 2025-06-10T22:50:02.000Z ##

Hydroph0bia (CVE​-2025​-4275): otro golpe a Secure Boot hackplayers.com/2025/06/hydrop #vulnerabilidades #técnicas #bios #boot

##

CVE-2025-48432
(4.0 None)

EPSS: 0.04%

updated 2025-06-10T20:03:55

1 posts

An issue was discovered in Django 5.2 before 5.2.2, 5.1 before 5.1.10, and 4.2 before 4.2.22. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems.

DarkWebInformer@infosec.exchange at 2025-06-11T18:26:09.000Z ##

🚨CVE-2025-48432: Improper Output Neutralization for Logs

FOFA Link: en.fofa.info/result?qbase64=YX

FOFA Query: app="django"

Results: 1,696,617

Advisory: github.com/advisories/GHSA-7xr

CVSS: 4.0

##

CVE-2025-47957
(8.4 HIGH)

EPSS: 0.06%

updated 2025-06-10T18:32:37

1 posts

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

CVE-2025-32710
(8.1 HIGH)

EPSS: 0.11%

updated 2025-06-10T18:32:35

1 posts

Use after free in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.

1 repos

https://github.com/Sincan2/RCE-CVE-2025-32710

Firefox@activitypub.awakari.com at 2025-06-11T08:54:03.000Z ## Windows Remote Desktop Services Vulnerability Allows Remote Code Execution A critical security vulnerability in Windows Remote Desktop Services, designated as CVE-2025-32710, which allows unauthori...

#Cyber #Security #Cyber #Security #News #Vulnerability #Windows #cyber #security #cyber #security

Origin | Interest | Match ##

CVE-2025-40585
(9.9 CRITICAL)

EPSS: 0.05%

updated 2025-06-10T18:32:30

1 posts

A vulnerability has been identified in Energy Services (All versions with G5DFR). Affected solutions using G5DFR contain default credentials. This could allow an attacker to gain control of G5DFR component and tamper with outputs from the device.

beyondmachines1@infosec.exchange at 2025-06-16T16:01:14.000Z ##

Default credentials vulnerability discovered in Siemens Energy Services Digital Fault Recorder

Siemens reports a critical vulnerability (CVE-2025-40585) in its Energy Services solutions using the Elspec G5 Digital Fault Recorder, where hardcoded default admin credentials could allow attackers to remotely control devices and tamper with outputs. Users should immediately change default credentials and implement network segmentation to protect against potential exploitation.

**Change all default usernames and passwords of Energy Services using the Elspec G5 Digital Fault Recorder. There are hardcoded well known credentials in the system that will be abused if not reset. Also, make sure to isolate the system from the internet and be accessible only from trusted networks.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-22463
(7.3 HIGH)

EPSS: 0.03%

updated 2025-06-10T15:30:53

1 posts

A hardcoded key in Ivanti Workspace Control before version 10.19.10.0 allows a local authenticated attacker to decrypt the stored environment password.

beyondmachines1@infosec.exchange at 2025-06-11T09:01:09.000Z ##

Ivanti reports three high severity hardcoded keys flawa in Ivanti Workspace Control

Ivanti released security updates for three high-severity vulnerabilities (CVE-2025-5353, CVE-2025-22455, CVE-2025-22463) in its Workspace Control platform that involve hardcoded cryptographic keys allowing authenticated attackers to decrypt stored SQL credentials and environment passwords, potentially compromising entire enterprise environments.

**This one is not critical, but is still quite concerning. The flaws enable attackers to decrypt credentials due to hardcoded encryption keys (which can be easily found on other installations). An exploit does require local access, so you are not in immediate danger. But given that hackers LOVE Ivanti vulnerabilities, plan a patch of this one.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-22455
(8.8 HIGH)

EPSS: 0.04%

updated 2025-06-10T15:30:53

1 posts

A hardcoded key in Ivanti Workspace Control before version 10.19.0.0 allows a local authenticated attacker to decrypt stored SQL credentials.

beyondmachines1@infosec.exchange at 2025-06-11T09:01:09.000Z ##

Ivanti reports three high severity hardcoded keys flawa in Ivanti Workspace Control

Ivanti released security updates for three high-severity vulnerabilities (CVE-2025-5353, CVE-2025-22455, CVE-2025-22463) in its Workspace Control platform that involve hardcoded cryptographic keys allowing authenticated attackers to decrypt stored SQL credentials and environment passwords, potentially compromising entire enterprise environments.

**This one is not critical, but is still quite concerning. The flaws enable attackers to decrypt credentials due to hardcoded encryption keys (which can be easily found on other installations). An exploit does require local access, so you are not in immediate danger. But given that hackers LOVE Ivanti vulnerabilities, plan a patch of this one.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-47950
(7.5 HIGH)

EPSS: 0.08%

updated 2025-06-09T21:39:34

1 posts

### Summary A **Denial of Service (DoS)** vulnerability was discovered in the CoreDNS DNS-over-QUIC (DoQ) server implementation. The server previously created a new goroutine for every incoming QUIC stream without imposing any limits on the number of concurrent streams or goroutines. A remote, unauthenticated attacker could open a large number of streams, leading to uncontrolled memory consumptio

cloud-native@activitypub.awakari.com at 2025-06-11T12:02:32.000Z ## CoreDNS Vulnerability Allows Attackers to Exhaust Server Memory via Amplification Attack A high-severity vulnerability (CVE-2025-47950) in CoreDNS’s DNS-over-QUIC (DoQ) implementation enables rem...

#cyber #security #Cyber #Security #News #Vulnerability

Origin | Interest | Match ##

CVE-2011-10007
(8.8 HIGH)

EPSS: 0.06%

updated 2025-06-06T06:31:31

1 posts

File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename. A file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed. Example: $ mkdir /tmp/poc; echo > "/tmp/poc/|id" $ perl -MFile::Find::Rule

CVE-2025-5601
(7.8 HIGH)

EPSS: 0.02%

updated 2025-06-04T14:54:33.783000

1 posts

Column handling crashes in Wireshark 4.4.0 to 4.4.6 and 4.2.0 to 4.2.12 allows denial of service via packet injection or crafted capture file

linux@activitypub.awakari.com at 2025-06-17T04:32:55.000Z ## Wireshark 4.4.7 Network Protocol Analyzer Patches Security Flaw and Fixes Bugs Wireshark 4.4.7 is here to patch a security vulnerability (CVE-2025-5601) that could allow a denial of service attack ...

#Blog #CVE #packet #injection #WireShark

Origin | Interest | Match ##

CVE-2024-56145
(9.8 CRITICAL)

EPSS: 94.03%

updated 2025-06-03T20:48:48.940000

1 posts

Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Users of affected versions are affected by this vulnerability if their php.ini configuration has `register_argc_argv` enabled. For these users an unspecified remote code execution vector is present. Users are advised to update to version 3.9.14, 4.13.2, or 5.5.2. Users unable to upgrade should dis

Nuclei template

4 repos

https://github.com/hmhlol/craft-cms-RCE-CVE-2024-56145

https://github.com/Chocapikk/CVE-2024-56145

https://github.com/Sachinart/CVE-2024-56145-craftcms-rce

https://github.com/rawtips/craft_cve_2024_56145_exploit.py

pentesttools@infosec.exchange at 2025-06-16T14:12:39.000Z ##

🌊 Drowning in tools and manual triage just to get clean findings into client reports or internal dashboards?

🔗 You can now push scan results directly into Nucleus Security to maintain separation between assets, scans, and clients, and to automate vuln management without sacrificing data structure.

🧠 Website scans got smarter with passive detections added to Light mode, GraphQL endpoint fuzzing, and new detection for response header injection.

✅ Sniper validates CVE-2024-56145 automatically, with payloads and screenshots included, so you don’t have to script it yourself.

Looking for more updates? Find them in the video below ⬇️

#ethicalhacking #offensivesecurity #cybersecurity

##

CVE-2025-31200
(7.5 HIGH)

EPSS: 0.24%

updated 2025-06-02T21:31:26

1 posts

A memory corruption issue was addressed with improved bounds checking. This issue is fixed in tvOS 18.4.1, visionOS 2.4.1, iOS iOS 18.4.1 and iPadOS 18.4.1, macOS Sequoia 15.4.1. Processing an audio stream in a maliciously crafted media file may result in code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targete

2 repos

https://github.com/JGoyd/CVE-2025-31200-iOS-AudioConverter-RCE

https://github.com/zhuowei/apple-positional-audio-codec-invalid-header

raptor@infosec.exchange at 2025-06-11T08:32:53.000Z ##

This Video Can #Exploit Your #iPhone (CVE-2025-31200)

youtube.com/watch?v=nTO3TRBW00E

Besides the clickbaity title, this video is actually a simple and fun initial analysis of the #1day in question.

As a side note, I started watching it on a device with no #adblocker and damn, YouTube has become so annoying and utterly unusable 😠

##

CVE-2025-4123
(7.6 HIGH)

EPSS: 1.61%

updated 2025-05-28T19:46:08

3 posts

A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is inst

Nuclei template

6 repos

https://github.com/DesDoTvl/CVE-2025-4123grafana

https://github.com/B1ack4sh/Blackash-CVE-2025-4123

https://github.com/ynsmroztas/CVE-2025-4123-Exploit-Tool-Grafana-

https://github.com/kk12-30/CVE-2025-4123

https://github.com/imbas007/CVE-2025-4123-template

https://github.com/NightBloodz/CVE-2025-4123

CVE-2025-37899(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-05-24T21:31:30

1 posts

In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in session logoff The sess->user object can currently be in use by another thread, for example if another connection has sent a session setup request to bind to the session being free'd. The handler for that connection could be in the smb2_sess_setup function which makes use of sess->user.

2 repos

https://github.com/vett3x/SMB-LINUX-CVE-2025-37899

https://github.com/SeanHeelan/o3_finds_cve-2025-37899

StevenSaus@faithcollapsing.com at 2025-06-13T23:03:45.000Z ##

(29 May) ChatGPT’s o3 Model Found Remote Zeroday in Linux Kernel Code

OpenAI&#039;s o3 just uncovered a remote 0-day in the Linux kernel&#039;s SMB code—CVE-2025-37899. A patch has already been rolled out.

s.faithcollapsing.com/szvk9
Archive: ais: archive.md/wip/DlZCC ia: s.faithcollapsing.com/syjjb

#ai #kernel #latest-in-foss-tech #linux-&-open-source-news #security

##

CVE-2025-47934(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-05-19T21:54:44

2 posts

### Impact A maliciously modified message can be passed to either `openpgp.verify` or `openpgp.decrypt`, causing these functions to return a valid signature verification result while returning data that was not actually signed. This flaw allows signature verifications of inline (non-detached) signed messages (using `openpgp.verify`) and signed-and-encrypted messages (using `openpgp.decrypt` with

CVE-2025-32414
(5.6 MEDIUM)

EPSS: 0.02%

updated 2025-04-23T19:09:35.517000

1 posts

In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters.

linux@activitypub.awakari.com at 2025-06-13T12:54:50.000Z ## Oracle Linux 8: ELSA-2025-8958 moderate: libxml2 upgrade for CVE-2025-32414 The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-24813
(9.8 CRITICAL)

EPSS: 93.66%

updated 2025-04-03T20:59:51.680000

2 posts

Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. If all of the following were true, a malicious user was able t

Nuclei template

35 repos

https://github.com/tonyarris/CVE-2025-24813-PoC

https://github.com/Alaatk/CVE-2025-24813-POC

https://github.com/u238/Tomcat-CVE_2025_24813

https://github.com/horsehacks/CVE-2025-24813-checker

https://github.com/charis3306/CVE-2025-24813

https://github.com/AsaL1n/CVE-2025-24813

https://github.com/gregk4sec/CVE-2025-24813

https://github.com/GadaLuBau1337/CVE-2025-24813

https://github.com/ps-interactive/lab-cve-2025-24813

https://github.com/N0c1or/CVE-2025-24813_POC

https://github.com/Eduardo-hardvester/CVE-2025-24813

https://github.com/msadeghkarimi/CVE-2025-24813-Exploit

https://github.com/imbas007/CVE-2025-24813-apache-tomcat

https://github.com/B1gN0Se/Tomcat-CVE-2025-24813

https://github.com/fatkz/CVE-2025-24813

https://github.com/michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813

https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE

https://github.com/Heimd411/CVE-2025-24813-noPoC

https://github.com/Franconyu/Poc_for_CVE-2025-24813

https://github.com/Erosion2020/CVE-2025-24813-vulhub

https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813

https://github.com/MuhammadWaseem29/CVE-2025-24813

https://github.com/iSee857/CVE-2025-24813-PoC

https://github.com/FY036/cve-2025-24813_poc

https://github.com/beyond-devsecops/CVE-2025-24813

https://github.com/La3B0z/CVE-2025-24813-POC

https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-

https://github.com/Mattb709/CVE-2025-24813-Scanner

https://github.com/hakankarabacak/CVE-2025-24813

https://github.com/maliqto/PoC-CVE-2025-24813

https://github.com/manjula-aw/CVE-2025-24813

https://github.com/AlperenY-cs/CVE-2025-24813

https://github.com/f8l124/CVE-2025-24813-POC

https://github.com/issamjr/CVE-2025-24813-Scanner

https://github.com/absholi7ly/POC-CVE-2025-24813

DarkWebInformer at 2025-06-18T16:05:18.675Z ##

🚨CVE-2025-24813: Apache Tomcat potential RCE and/or information disclosure and/or information corruption with partial PUT

ZoomEye Link: zoomeye.ai/searchResult?q=YXBw

ZoomEye Dork: app="Apache Tomcat"

Results: 815,431

Advisory: github.com/advisories/GHSA-83q

PoC: github.com/absholi7ly/POC-CVE-

CVSS: 9.2

——————————

Follow @zoomeye_team's official Twitter/X account and send the message “Dark Web Informer” via DM to receive an extra 15-day membership.

I am trying to do more for this community, so this is just the start! 💙

##

DarkWebInformer@infosec.exchange at 2025-06-18T16:05:18.000Z ##

🚨CVE-2025-24813: Apache Tomcat potential RCE and/or information disclosure and/or information corruption with partial PUT

ZoomEye Link: zoomeye.ai/searchResult?q=YXBw

ZoomEye Dork: app="Apache Tomcat"

Results: 815,431

Advisory: github.com/advisories/GHSA-83q

PoC: github.com/absholi7ly/POC-CVE-

CVSS: 9.2

——————————

Follow @zoomeye_team's official Twitter/X account and send the message “Dark Web Informer” via DM to receive an extra 15-day membership.

I am trying to do more for this community, so this is just the start! 💙

##

CVE-2025-2783
(8.4 HIGH)

EPSS: 6.26%

updated 2025-03-26T18:30:57

6 posts

Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)

3 repos

https://github.com/byteReaper77/CVE-2025-2783

https://github.com/Alchemist3dot14/CVE-2025-2783

https://github.com/Leviticus-Triage/ChromSploit-Framework

oversecurity@mastodon.social at 2025-06-18T15:20:07.000Z ##

Bug di Chrome sfruttato per prendere il controllo dei nostri sistemi: come difendersi

Il gruppo criminale TaxOff sta sfruttando in rete la vulnerabilità zero-day CVE-2025-2783 di Chrome per distribuire il backdoor Trinper:...

🔗️ [Cybersecurity360] link.is.it/YZgKCt

##

oversecurity@mastodon.social at 2025-06-18T15:20:07.000Z ##

Bug di Chrome sfruttato per prendere il controllo dei nostri sistemi: come difendersi

Il gruppo criminale TaxOff sta sfruttando in rete la vulnerabilità zero-day CVE-2025-2783 di Chrome per distribuire il backdoor Trinper:...

🔗️ [Cybersecurity360] link.is.it/YZgKCt

##

jos1264@social.skynetcloud.site at 2025-06-18T00:05:03.000Z ##

Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor – Source:thehackernews.com ciso2ciso.com/google-chrome-ze #rssfeedpostgeneratorecho #CyberSecurityNews #TheHackerNews #Google

##

jos1264@social.skynetcloud.site at 2025-06-17T19:45:03.000Z ##

Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor thehackernews.com/2025/06/goog

##

jos1264@social.skynetcloud.site at 2025-06-17T19:45:03.000Z ##

Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor thehackernews.com/2025/06/goog

##

jos1264@social.skynetcloud.site at 2025-06-17T19:45:03.000Z ##

Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor thehackernews.com/2025/06/goog

##

CVE-2024-4577
(9.8 CRITICAL)

EPSS: 94.41%

updated 2025-03-14T03:31:23

1 posts

In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP bina

Nuclei template

63 repos

https://github.com/WanLiChangChengWanLiChang/CVE-2024-4577-RCE-EXP

https://github.com/Dejavu666/CVE-2024-4577

https://github.com/PhinehasNarh/CVE-2024-4577-LetsDefend-walkthrough

https://github.com/sug4r-wr41th/CVE-2024-4577

https://github.com/bibo318/CVE-2024-4577-RCE-ATTACK

https://github.com/Junp0/CVE-2024-4577

https://github.com/shockingbonu/CVE-2024-4577-PHP-RCE

https://github.com/charis3306/CVE-2024-4577

https://github.com/olebris/CVE-2024-4577

https://github.com/zjhzjhhh/CVE-2024-4577

https://github.com/a-roshbaik/CVE-2024-4577-PHP-RCE

https://github.com/taida957789/CVE-2024-4577

https://github.com/a-roshbaik/CVE-2024-4577

https://github.com/tpdlshdmlrkfmcla/php-cgi-cve-2024-4577

https://github.com/AlperenY-cs/CVE-2024-4577

https://github.com/bughuntar/CVE-2024-4577

https://github.com/Sh0ckFR/CVE-2024-4577

https://github.com/Gill-Singh-A/CVE-2024-4577-Exploit

https://github.com/Night-have-dreams/php-cgi-Injector

https://github.com/Entropt/CVE-2024-4577_Analysis

https://github.com/jakabakos/CVE-2024-4577-PHP-CGI-argument-injection-RCE

https://github.com/ywChen-NTUST/PHP-CGI-RCE-Scanner

https://github.com/watchtowrlabs/CVE-2024-4577

https://github.com/Jcccccx/CVE-2024-4577

https://github.com/ggfzx/CVE-2024-4577

https://github.com/mistakes1337/CVE-2024-4577

https://github.com/manuelinfosec/CVE-2024-4577

https://github.com/xcanwin/CVE-2024-4577-PHP-RCE

https://github.com/JeninSutradhar/CVE-2024-4577-checker

https://github.com/VictorShem/CVE-2024-4577

https://github.com/0x20c/CVE-2024-4577-nuclei

https://github.com/gotr00t0day/CVE-2024-4577

https://github.com/huseyinstif/CVE-2024-4577-Nuclei-Template

https://github.com/bl4cksku11/CVE-2024-4577

https://github.com/11whoami99/CVE-2024-4577

https://github.com/princew88/CVE-2024-4577

https://github.com/Sysc4ll3r/CVE-2024-4577

https://github.com/KimJuhyeong95/cve-2024-4577

https://github.com/hexedbyte/cve-2024-4577

https://github.com/l0n3m4n/CVE-2024-4577-RCE

https://github.com/ibrahmsql/CVE-2024-4577

https://github.com/gh-ost00/CVE-2024-4577-RCE

https://github.com/Wh02m1/CVE-2024-4577

https://github.com/Chocapikk/CVE-2024-4577

https://github.com/BitMEXResearch/CVE-2024-4577

https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE

https://github.com/phirojshah/CVE-2024-4577

https://github.com/ahmetramazank/CVE-2024-4577

https://github.com/BTtea/CVE-2024-4577-RCE-PoC

https://github.com/Didarul342/CVE-2024-4577

https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOIT

https://github.com/longhoangth18/CVE-2024-4577

https://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE

https://github.com/dbyMelina/CVE-2024-4577

https://github.com/TAM-K592/CVE-2024-4577

https://github.com/nemu1k5ma/CVE-2024-4577

https://github.com/ohhhh693/CVE-2024-4577

https://github.com/d3ck4/Shodan-CVE-2024-4577

https://github.com/aaddmin1122345/cve-2024-4577

https://github.com/tntrock/CVE-2024-4577_PowerShell

https://github.com/zomasec/CVE-2024-4577

https://github.com/AhmedMansour93/Event-ID-268-Rule-Name-SOC292-Possible-PHP-Injection-Detected-CVE-2024-4577-

https://github.com/gmh5225/CVE-2024-4577-PHP-RCE

oversecurity@mastodon.social at 2025-06-11T06:40:12.000Z ##

CVE-2024-4577: analisi di un payload

Come accennavo in questo post ho iniziato ad utilizzare i dati che il nostro honeypot sta collezionando per studiare alcuni tentatici di exploiting...

🔗️ [Roccosicilia] link.is.it/qgSYkQ

##

CVE-2024-57727
(7.5 HIGH)

EPSS: 94.10%

updated 2025-01-16T21:32:03

3 posts

SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords.

Nuclei template

1 repos

https://github.com/imjdl/CVE-2024-57727

AAKL@infosec.exchange at 2025-06-17T15:36:19.000Z ##

Fortinet posted this yesterday, if you missed it.

Fortinet: SimpleHelp Support Software Attack - CVE-2024-57727, high severity fortiguard.fortinet.com/outbre @fortinet #cybersecurity #Infosec

Also from yesterday.

GreyNoise Observes Exploit Attempts Targeting Zyxel CVE-2023-28771 greynoise.io/blog/exploit-atte @greynoise

##

techbeams@mastodon.social at 2025-06-14T07:51:03.000Z ##

CISA urges immediate patching for SimpleHelp flaw CVE-2024-57727 to protect organizations from ransomware gangs exploiting unpatched vulnerabilities.

techbeams.com/tech/cisa-urges-

#tech #technews #technology #cybersecurity #techbeams

##

AAKL@infosec.exchange at 2025-06-13T16:20:22.000Z ##

Picus: Ransomware Actors Exploit CVE-2024-57727 in Unpatched SimpleHelp RMM picussecurity.com/resource/blo #cybersecurity #infosec #ransomware

##

CVE-2024-55591
(9.8 CRITICAL)

EPSS: 94.18%

updated 2025-01-14T15:31:02

1 posts

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.

Nuclei template

10 repos

https://github.com/rawtips/CVE-2024-55591

https://github.com/exfil0/CVE-2024-55591-POC

https://github.com/watchtowrlabs/fortios-auth-bypass-poc-CVE-2024-55591

https://github.com/UMChacker/CVE-2024-55591-POC

https://github.com/sysirq/fortios-auth-bypass-poc-CVE-2024-55591

https://github.com/watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591

https://github.com/0x7556/CVE-2024-55591

https://github.com/sysirq/fortios-auth-bypass-exploit-CVE-2024-55591

https://github.com/binarywarm/exp-cmd-add-admin-vpn-CVE-2024-55591

https://github.com/virus-or-not/CVE-2024-55591

DarkWebInformer@infosec.exchange at 2025-06-17T17:10:24.000Z ##

🚨CVE-2024-55591: Fortinet FortiOS Authentication Bypass

ZoomEye Link: zoomeye.ai/searchResult?q=YXBw

ZoomEye Dork: app="Fortinet Firewall"

Results: 5,320,990

Advisory: nvd.nist.gov/vuln/detail/cve-2

PoC: github.com/watchtowrlabs/forti

CVSS: 9.8

—————-

Follow @zoomeye_team's official Twitter/X account and send the message “Dark Web Informer” via DM to receive an extra 15-day membership.

I am trying to do more for this community, so this is just the start! 💙

##

CVE-2024-10099
(6.1 MEDIUM)

EPSS: 0.07%

updated 2024-10-21T21:03:53.647000

1 posts

A stored cross-site scripting (XSS) vulnerability exists in comfyanonymous/comfyui version 0.2.2 and possibly earlier. The vulnerability occurs when an attacker uploads an HTML file containing a malicious XSS payload via the `/api/upload/image` endpoint. The payload is executed when the file is viewed through the `/view` API endpoint, leading to potential execution of arbitrary JavaScript code.

FunctionalProgramming@activitypub.awakari.com at 2025-06-15T17:31:05.000Z ## comfyanonymous comfyui Incomplete Fix CVE-2024-10099 image cross site scripti... A vulnerability was found in comfyanonymous comfyui up to 0.3.39. It has been declared as problematic. Affected by t...


Origin | Interest | Match ##

CVE-2021-44026
(9.8 CRITICAL)

EPSS: 71.50%

updated 2024-06-27T21:33:09

1 posts

Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search_params.

2 repos

https://github.com/pentesttoolscom/roundcube-cve-2021-44026

https://github.com/skyllpro/CVE-2021-44026-PoC

beyondmachines1@infosec.exchange at 2025-06-18T08:01:15.000Z ##

Data Breach at Cock.li email provider exposes over 1 Million user records

Privacy-focused email provider Cock.li suffered a data breach affecting over 1 million users after threat actors exploited an old SQL injection vulnerability (CVE-2021-44026) in their Roundcube webmail platform that had remained unpatched since 2016. The breach exposed login information for over 1 million users and contact details for 93,000 additional users.

****
#cybersecurity #infosec #incident #ransomware
beyondmachines.net/event_detai

##

CVE-2024-1086
(7.8 HIGH)

EPSS: 84.90%

updated 2024-06-27T12:30:43

1 posts

A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT. We recommend upgradi

8 repos

https://github.com/feely666/CVE-2024-1086

https://github.com/andigandhi/bitpixie

https://github.com/xzx482/CVE-2024-1086

https://github.com/Notselwyn/CVE-2024-1086

https://github.com/kevcooper/CVE-2024-1086-checker

https://github.com/Alicey0719/docker-POC_CVE-2024-1086

https://github.com/LLfam/CVE-2024-1086

https://github.com/CCIEVoice2009/CVE-2024-1086

RedTeamNews at 2025-06-18T14:07:25.007Z ##

CISA warns attackers are exploiting a critical Linux kernel flaw (CVE-2024-1086) to gain root access. Patch now—federal agencies must fix by June 20. Check your kernel version and mitigate ASAP. Details: redteamnews.com/red-team/cve/c

##

CVE-2023-28771
(9.8 CRITICAL)

EPSS: 94.35%

updated 2024-04-04T03:40:24

3 posts

Improper error message handling in Zyxel ZyWALL/USG series firmware versions 4.60 through 4.73, VPN series firmware versions 4.60 through 5.35, USG FLEX series firmware versions 4.60 through 5.35, and ATP series firmware versions 4.60 through 5.35, which could allow an unauthenticated attacker to execute some OS commands remotely by sending crafted packets to an affected device.

2 repos

https://github.com/benjaminhays/CVE-2023-28771-PoC

https://github.com/getdrive/PoC

beyondmachines1@infosec.exchange at 2025-06-17T18:01:06.000Z ##

Coordinated cyberattacks target two years old Zyxel firewall flaw

A coordinated global cyberattack campaign on June 16, 2025, involved 244 unique IP addresses exploiting a critical command injection vulnerability (CVE-2023-28771) in Zyxel firewall and VPN devices that allows unauthenticated remote code execution via a single malicious packet to UDP port 500. Even though patches are available for over two years since the vulnerability's original disclosure in April 2023, organizations worldwide remain vulnerable.

**If you still haven't patched your ZyXel firewall, and it's exposed on UDP port 500 to the internet, time to act NOW! Isolate the UDP port 500 from the internet, and start patching your firewalls. And check for any indicators of compromise, if possible even do a factory reset and load a trusted configuration.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2025-06-17T15:36:19.000Z ##

Fortinet posted this yesterday, if you missed it.

Fortinet: SimpleHelp Support Software Attack - CVE-2024-57727, high severity fortiguard.fortinet.com/outbre @fortinet #cybersecurity #Infosec

Also from yesterday.

GreyNoise Observes Exploit Attempts Targeting Zyxel CVE-2023-28771 greynoise.io/blog/exploit-atte @greynoise

##

cR0w@infosec.exchange at 2025-06-16T20:55:48.000Z ##

Greynoise reporting on more exploitation attempts from UUNET AS701 ( VZW ). This time against Zyxel devices.

greynoise.io/blog/exploit-atte

##

CVE-2025-6019
(0 None)

EPSS: 0.00%

7 posts

N/A

DiogoConstantino@masto.pt at 2025-06-18T14:48:13.000Z ##

@tugatech ubuntu.com/security/CVE-2025-6

##

undercodenews@mastodon.social at 2025-06-18T11:22:23.000Z ##

Critical Linux Vulnerabilities Expose Systems to Full Root Control: What You Need to Know

A recent discovery by the Qualys Threat Research Unit (TRU) has unveiled two severe local privilege escalation (LPE) vulnerabilities in major Linux distributions, labeled CVE-2025-6018 and CVE-2025-6019. These flaws can be combined to allow attackers with minimal access—such as an unprivileged SSH user—to escalate their privileges and gain full root control over affected systems.…

undercodenews.com/critical-lin

##

DiogoConstantino@masto.pt at 2025-06-18T14:48:13.000Z ##

@tugatech ubuntu.com/security/CVE-2025-6

##

Ubuntu@activitypub.awakari.com at 2025-06-18T11:38:49.000Z ## Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019) Qualys researchers have unearthed two local privilege escalation vulnerabilities (CVE-2025-6018, CV...

#Don't #miss #Hot #stuff #News #Debian #Fedora #Linux #openSUSE #Qualys #Ubuntu

Origin | Interest | Match ##

jos1264@social.skynetcloud.site at 2025-06-18T12:00:03.000Z ##

Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019) helpnetsecurity.com/2025/06/18 #vulnerability #Don'tmiss #Hotstuff #openSUSE #Debian #Fedora #Qualys #Ubuntu #Linux #News

##

linux@activitypub.awakari.com at 2025-06-18T06:32:41.000Z ## Critical Linux Privilege Escalation Vulnerabilities Let Attackers Gain Full Root Access Two critical, interconnected flaws, CVE-2025-6018 and CVE-2025-6019, enable unprivileged attackers to achieve...

#Cyber #Security #Cyber #Security #News #Vulnerability #News #cyber #security #cyber #security

Origin | Interest | Match ##

andersonc0d3@infosec.exchange at 2025-06-17T22:55:51.000Z ##

CVE-2025-6019: LPE from allow_active to root in libblockdev via udisks

seclists.org/oss-sec/2025/q2/2

##

CVE-2025-5310
(0 None)

EPSS: 0.00%

2 posts

N/A

beyondmachines1 at 2025-06-18T13:01:06.785Z ##

Critical authentication bypass flaw reported in Dover ProGauge MagLink LX Consoles

Dover Fueling Solutions patched a critical vulnerability (CVE-2025-5310) in ProGauge MagLink LX console systems that exposed an undocumented backdoor allowing unauthenticated remote code execution through a Target Communication Framework interface.

**If you have Dover Fueling Solutions ProGauge MagLink LX consoles, make sure they are isolated from the internet. Then immediately update to the latest firmware versions (4.20.3+ for LX 4/Plus models, 5.20.3+ for Ultimate models). Because your consoles have a backdoor, and hackers will find it very fast.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2025-06-18T13:01:06.000Z ##

Critical authentication bypass flaw reported in Dover ProGauge MagLink LX Consoles

Dover Fueling Solutions patched a critical vulnerability (CVE-2025-5310) in ProGauge MagLink LX console systems that exposed an undocumented backdoor allowing unauthenticated remote code execution through a Target Communication Framework interface.

**If you have Dover Fueling Solutions ProGauge MagLink LX consoles, make sure they are isolated from the internet. Then immediately update to the latest firmware versions (4.20.3+ for LX 4/Plus models, 5.20.3+ for Ultimate models). Because your consoles have a backdoor, and hackers will find it very fast.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-6018
(0 None)

EPSS: 0.00%

4 posts

N/A

undercodenews@mastodon.social at 2025-06-18T11:22:23.000Z ##

Critical Linux Vulnerabilities Expose Systems to Full Root Control: What You Need to Know

A recent discovery by the Qualys Threat Research Unit (TRU) has unveiled two severe local privilege escalation (LPE) vulnerabilities in major Linux distributions, labeled CVE-2025-6018 and CVE-2025-6019. These flaws can be combined to allow attackers with minimal access—such as an unprivileged SSH user—to escalate their privileges and gain full root control over affected systems.…

undercodenews.com/critical-lin

##

Ubuntu@activitypub.awakari.com at 2025-06-18T11:38:49.000Z ## Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019) Qualys researchers have unearthed two local privilege escalation vulnerabilities (CVE-2025-6018, CV...

#Don't #miss #Hot #stuff #News #Debian #Fedora #Linux #openSUSE #Qualys #Ubuntu

Origin | Interest | Match ##

jos1264@social.skynetcloud.site at 2025-06-18T12:00:03.000Z ##

Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019) helpnetsecurity.com/2025/06/18 #vulnerability #Don'tmiss #Hotstuff #openSUSE #Debian #Fedora #Qualys #Ubuntu #Linux #News

##

linux@activitypub.awakari.com at 2025-06-18T06:32:41.000Z ## Critical Linux Privilege Escalation Vulnerabilities Let Attackers Gain Full Root Access Two critical, interconnected flaws, CVE-2025-6018 and CVE-2025-6019, enable unprivileged attackers to achieve...

#Cyber #Security #Cyber #Security #News #Vulnerability #News #cyber #security #cyber #security

Origin | Interest | Match ##

CVE-2025-23092
(0 None)

EPSS: 0.00%

1 posts

N/A

beyondmachines1@infosec.exchange at 2025-06-17T09:01:44.000Z ##

Mitel reports critical path traversal flaw in Mitel MiCollab

Mitel has disclosed a critical path traversal vulnerability (CVE-2025-23092) in its MiCollab platform that allows remote, unauthenticated attackers to access provisioning information and perform unauthorized administrative actions. This flaw bypasses a previous security patch and similar vulnerabilities have already been exploited in the wild.

**If you have Mitel MiCollab systems running version 9.8 SP2 or earlier, immediately upgrade to version 9.8 SP3 or apply the available patch to fix CVE-2025-23092. Hackers love the Mitel platform since it's a messaging platform exposed to the world by it's very design. Don't ignore this one.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-4748
(0 None)

EPSS: 0.01%

2 posts

N/A

scrum_log@mastodon.social at 2025-06-16T15:01:24.000Z ##

Be aware of a CVE in erlang's zip library.

cna.erlef.org/cves/cve-2025-47

#erlang #elixir #elixirlang #gleam

##

cR0w@infosec.exchange at 2025-06-16T13:12:13.000Z ##

Since you all have an updated inventory of your Erlang OTP now ( sorry, had to make myself laugh ) go deal with a ../ in it.

github.com/erlang/otp/security

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation. This vulnerability is associated with program files lib/stdlib/src/zip.erl and program routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2 unless the memory option is passed.

This issue affects OTP from OTP 17.0 until OTP 28.0.1, OTP 27.3.4.1 and OTP 26.2.5.13, corresponding to stdlib from 2.0 until 7.0.1, 6.2.2.1 and 5.2.3.4.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-5121
(0 None)

EPSS: 0.00%

1 posts

N/A

beyondmachines1@infosec.exchange at 2025-06-13T09:01:09.000Z ##

GitLab patches multiple account takeover and injection vulnerabilities

GitLab released security updates addressing multiple high-severity vulnerabilities including account takeover through HTML injection (CVE-2025-4278), cross-site scripting enabling user impersonation (CVE-2025-2254), and unauthorized CI/CD job injection in GitLab Ultimate (CVE-2025-5121) affecting both Community and Enterprise editions.

**If you are running self-managed GitLab installations, plan a quick patch to versions 18.0.2, 17.11.4, or 17.10.8. There are three near-critical flaws, and GitLab is by it's nature open to multiple users so the risk is not trivial.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

Visit counter For Websites