##
Updated at UTC 2025-11-13T19:19:59.525234
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-60694 | 7.5 | 0.00% | 2 | 0 | 2025-11-13T18:31:17 | A stack-based buffer overflow exists in the validate_static_route function of th | |
| CVE-2025-60691 | 8.8 | 0.00% | 2 | 0 | 2025-11-13T18:31:17 | A stack-based buffer overflow exists in the httpd binary of Linksys E1200 v2 rou | |
| CVE-2025-60692 | 8.4 | 0.00% | 2 | 0 | 2025-11-13T18:31:17 | A stack-based buffer overflow vulnerability exists in the libshared.so library o | |
| CVE-2025-60689 | 5.4 | 0.00% | 2 | 0 | 2025-11-13T18:31:17 | An unauthenticated command injection vulnerability exists in the Start_EPI funct | |
| CVE-2025-60695 | 5.9 | 0.00% | 2 | 0 | 2025-11-13T18:31:16 | A stack-based buffer overflow vulnerability exists in the mtk_dut binary of Link | |
| CVE-2025-60690 | 8.8 | 0.00% | 2 | 0 | 2025-11-13T18:31:16 | A stack-based buffer overflow exists in the get_merge_ipaddr function of the htt | |
| CVE-2025-60688 | 6.5 | 0.00% | 2 | 0 | 2025-11-13T18:31:16 | A stack buffer overflow vulnerability exists in the ToToLink LR1200GB (V9.1.0u.6 | |
| CVE-2025-60686 | 5.1 | 0.00% | 2 | 0 | 2025-11-13T18:31:11 | A local stack-based buffer overflow vulnerability exists in the infostat.cgi and | |
| CVE-2025-60687 | 6.5 | 0.00% | 2 | 0 | 2025-11-13T18:31:11 | An unauthenticated command injection vulnerability exists in the ToToLink LR1200 | |
| CVE-2025-60683 | 6.5 | 0.00% | 2 | 0 | 2025-11-13T18:31:11 | A command injection vulnerability exists in the ToToLink A720R Router firmware V | |
| CVE-2025-64383 | 6.5 | 0.03% | 1 | 0 | 2025-11-13T18:31:05 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti | |
| CVE-2025-64380 | 6.5 | 0.03% | 1 | 0 | 2025-11-13T18:31:05 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti | |
| CVE-2025-64379 | 4.3 | 0.02% | 1 | 0 | 2025-11-13T18:31:04 | Missing Authorization vulnerability in Pluggabl Booster for WooCommerce woocomme | |
| CVE-2025-64370 | 5.3 | 0.02% | 1 | 0 | 2025-11-13T18:31:04 | Missing Authorization vulnerability in YOP YOP Poll yop-poll allows Exploiting I | |
| CVE-2025-63666 | 9.8 | 0.03% | 1 | 1 | 2025-11-13T18:31:03 | Tenda AC15 v15.03.05.18_multi) issues an authentication cookie that exposes the | |
| CVE-2025-60701 | 0 | 0.00% | 2 | 0 | 2025-11-13T18:15:54.137000 | A command injection vulnerability exists in the D-Link DIR-882 Router firmware D | |
| CVE-2025-60700 | 0 | 0.00% | 2 | 0 | 2025-11-13T18:15:54.010000 | A command injection vulnerability exists in the D-Link DIR-882 Router firmware D | |
| CVE-2025-60698 | 0 | 0.00% | 2 | 0 | 2025-11-13T18:15:53.880000 | A command injection vulnerability exists in the D-Link DIR-882 Router firmware D | |
| CVE-2025-60697 | 0 | 0.00% | 2 | 0 | 2025-11-13T18:15:53.753000 | A command injection vulnerability exists in the D-Link DIR-882 Router firmware D | |
| CVE-2025-60696 | 8.4 | 0.00% | 2 | 0 | 2025-11-13T18:15:53.587000 | A stack-based buffer overflow vulnerability exists in the makeRequest.cgi binary | |
| CVE-2025-60693 | 6.5 | 0.00% | 2 | 0 | 2025-11-13T18:15:53.040000 | A stack-based buffer overflow exists in the get_merge_mac function of the httpd | |
| CVE-2025-60685 | 5.1 | 0.00% | 2 | 0 | 2025-11-13T18:15:51.567000 | A stack buffer overflow exists in the ToToLink A720R Router firmware V4.1.5cu.61 | |
| CVE-2025-60684 | 6.5 | 0.00% | 2 | 0 | 2025-11-13T18:15:51.387000 | A stack buffer overflow vulnerability exists in the ToToLink LR1200GB (V9.1.0u.6 | |
| CVE-2025-60682 | 6.5 | 0.00% | 2 | 0 | 2025-11-13T18:15:51.023000 | A command injection vulnerability exists in the ToToLink A720R Router firmware V | |
| CVE-2025-60671 | 0 | 0.00% | 2 | 0 | 2025-11-13T18:15:50.877000 | A command injection vulnerability exists in the D-Link DIR-823G router firmware | |
| CVE-2025-59480 | 6.1 | 0.00% | 2 | 0 | 2025-11-13T18:15:50.703000 | Mattermost Mobile Apps versions <=2.32.0 fail to verify that SSO redirect tokens | |
| CVE-2025-11777 | 3.1 | 0.00% | 2 | 0 | 2025-11-13T18:15:49.393000 | Mattermost versions 10.11.x <= 10.11.3, 10.5.x <= 10.5.11 fail to properly valid | |
| CVE-2025-12762 | 9.1 | 0.00% | 3 | 0 | 2025-11-13T17:39:19 | pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnera | |
| CVE-2025-64407 | 5.3 | 0.11% | 1 | 0 | 2025-11-13T17:15:50.523000 | Apache OpenOffice documents can contain links. A missing Authorization vulnerabi | |
| CVE-2025-20346 | 4.3 | 0.00% | 2 | 0 | 2025-11-13T17:15:45.630000 | A vulnerability in Cisco Catalyst Center could allow an authenticated, remote at | |
| CVE-2025-20341 | 8.8 | 0.00% | 3 | 0 | 2025-11-13T17:15:45.400000 | A vulnerability in Cisco Catalyst Center Virtual Appliance could allow an authen | |
| CVE-2025-64382 | 4.3 | 0.02% | 1 | 0 | 2025-11-13T16:15:55.877000 | Missing Authorization vulnerability in WebToffee Order Export & Order Import for | |
| CVE-2025-13118 | 6.3 | 0.00% | 1 | 0 | 2025-11-13T16:15:50.843000 | A vulnerability was detected in macrozheng mall-swarm up to 1.0.3. Affected by t | |
| CVE-2025-13023 | 9.8 | 0.02% | 1 | 0 | 2025-11-13T16:15:50.533000 | Sandbox escape due to incorrect boundary conditions in the Graphics: WebGPU comp | |
| CVE-2025-64517 | 4.4 | 0.02% | 2 | 0 | 2025-11-13T15:36:04 | ### Summary When `Defaults targetpw` (or `Defaults rootpw`) is enabled, the pass | |
| CVE-2025-9242 | 9.8 | 60.33% | 4 | 1 | template | 2025-11-13T15:31:32 | An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remot |
| CVE-2025-64404 | 7.5 | 0.01% | 2 | 0 | 2025-11-13T15:31:32 | Apache OpenOffice documents can contain links to other files. A missing Authoriz | |
| CVE-2025-64405 | 7.5 | 0.01% | 2 | 0 | 2025-11-13T15:31:32 | Apache OpenOffice documents can contain links. A missing Authorization vulnerabi | |
| CVE-2025-30662 | 6.6 | 0.00% | 1 | 0 | 2025-11-13T15:30:38 | Symlink following in the installer for the Zoom Workplace VDI Plugin macOS Unive | |
| CVE-2025-12817 | 3.1 | 0.00% | 2 | 0 | 2025-11-13T15:30:37 | Missing authorization in PostgreSQL CREATE STATISTICS command allows a table own | |
| CVE-2025-12764 | 7.5 | 0.00% | 2 | 0 | 2025-11-13T15:30:37 | pgAdmin <= 9.9 is affected by an LDAP injection vulnerability in the LDAP authe | |
| CVE-2025-64741 | 8.1 | 0.00% | 2 | 0 | 2025-11-13T15:30:37 | Improper authorization handling in Zoom Workplace for Android before version 6.5 | |
| CVE-2025-62483 | 5.3 | 0.00% | 1 | 0 | 2025-11-13T15:30:37 | Improper removal of sensitive information in certain Zoom Clients before version | |
| CVE-2025-13119 | 4.3 | 0.00% | 1 | 0 | 2025-11-13T15:30:37 | A flaw has been found in Fabian Ros/SourceCodester Simple E-Banking System 1.0. | |
| CVE-2025-30669 | 4.8 | 0.00% | 1 | 0 | 2025-11-13T15:30:31 | Improper certificate validation in certain Zoom Clients may allow an unauthentic | |
| CVE-2025-64739 | 4.3 | 0.00% | 1 | 0 | 2025-11-13T15:30:31 | External control of file name or path in certain Zoom Clients may allow an unaut | |
| CVE-2025-12763 | 6.8 | 0.00% | 2 | 0 | 2025-11-13T15:30:30 | pgAdmin 4 versions up to 9.9 are affected by a command injection vulnerability o | |
| CVE-2025-64740 | 7.5 | 0.00% | 1 | 0 | 2025-11-13T15:15:53.820000 | Improper verification of cryptographic signature in the installer for Zoom Workp | |
| CVE-2025-64711 | 3.9 | 0.01% | 1 | 0 | 2025-11-13T15:15:52.707000 | PrivateBin is an online pastebin where the server has zero knowledge of pasted d | |
| CVE-2025-62482 | 4.3 | 0.00% | 1 | 0 | 2025-11-13T15:15:51.697000 | Cross-site scripting in Zoom Workplace for Windows before version 6.5.10 may all | |
| CVE-2025-13117 | 5.4 | 0.00% | 1 | 0 | 2025-11-13T15:15:50.463000 | A security vulnerability has been detected in macrozheng mall-swarm up to 1.0.3. | |
| CVE-2025-13076 | 4.7 | 0.03% | 1 | 0 | 2025-11-13T15:15:50.250000 | A flaw has been found in code-projects Responsive Hotel Site 1.0. The affected e | |
| CVE-2025-12735 | 9.8 | 0.12% | 1 | 0 | 2025-11-13T15:15:49.590000 | The expr-eval library is a JavaScript expression parser and evaluator designed t | |
| CVE-2023-7326 | 0 | 0.15% | 1 | 0 | 2025-11-13T15:15:48.983000 | The Epson Stylus SX510W embedded web management service fails to properly handle | |
| CVE-2025-64402 | 6.5 | 0.03% | 2 | 0 | 2025-11-13T15:08:55.247000 | Apache OpenOffice documents can contain links. A missing Authorization vulnerabi | |
| CVE-2025-64403 | 8.1 | 0.03% | 3 | 0 | 2025-11-13T15:08:42.313000 | Apache OpenOffice Calc spreadsheet can contain links to other files, in the form | |
| CVE-2025-12480 | 9.1 | 52.34% | 5 | 1 | template | 2025-11-13T15:07:03.620000 | Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access |
| CVE-2025-59118 | 7.3 | 0.05% | 2 | 1 | 2025-11-13T15:04:59.130000 | Unrestricted Upload of File with Dangerous Type vulnerability in Apache OFBiz. | |
| CVE-2025-12765 | 7.5 | 0.00% | 2 | 0 | 2025-11-13T14:15:47.873000 | pgAdmin <= 9.9 is affected by a vulnerability in the LDAP authentication mechan | |
| CVE-2025-12818 | 5.9 | 0.00% | 2 | 0 | 2025-11-13T13:15:45.313000 | Integer wraparound in multiple PostgreSQL libpq client library functions allows | |
| CVE-2025-64384 | None | 0.02% | 1 | 0 | 2025-11-13T12:32:48 | Missing Authorization vulnerability in jetmonsters JetFormBuilder jetformbuilder | |
| CVE-2025-64292 | None | 0.03% | 1 | 0 | 2025-11-13T12:32:46 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti | |
| CVE-2025-7704 | 5.4 | 0.04% | 1 | 0 | 2025-11-13T10:15:54.823000 | Supermicro BMC Insyde SMASH shell program has a stacked-based overflow vulnerab | |
| CVE-2025-64381 | 0 | 0.03% | 1 | 0 | 2025-11-13T10:15:54.180000 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti | |
| CVE-2025-64369 | 0 | 0.02% | 1 | 0 | 2025-11-13T10:15:53.423000 | Missing Authorization vulnerability in codepeople Contact Form Email contact-for | |
| CVE-2025-12733 | 8.8 | 0.22% | 2 | 0 | 2025-11-13T06:30:30 | The Import any XML, CSV or Excel File to WordPress (WP All Import) plugin for Wo | |
| CVE-2025-12620 | 4.9 | 0.02% | 1 | 0 | 2025-11-13T06:30:30 | The Poll Maker – Versus Polls, Anonymous Polls, Image Polls plugin for WordPress | |
| CVE-2025-12536 | 5.3 | 0.04% | 1 | 0 | 2025-11-13T06:30:30 | The SureForms plugin for WordPress is vulnerable to Sensitive Information Exposu | |
| CVE-2025-12366 | 4.3 | 0.03% | 1 | 0 | 2025-11-13T06:30:30 | The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress | |
| CVE-2025-12089 | 6.5 | 0.99% | 1 | 0 | 2025-11-13T06:30:30 | The Data Tables Generator by Supsystic plugin for WordPress is vulnerable to arb | |
| CVE-2025-12891 | 5.3 | 0.05% | 1 | 0 | 2025-11-13T05:16:03.007000 | The Survey Maker plugin for WordPress is vulnerable to unauthorized access of da | |
| CVE-2025-12979 | 5.3 | 0.05% | 1 | 0 | 2025-11-13T04:15:46.730000 | The Welcart e-Commerce plugin for WordPress is vulnerable to unauthorized access | |
| CVE-2025-12892 | 5.3 | 0.05% | 1 | 0 | 2025-11-13T04:15:46.537000 | The Survey Maker plugin for WordPress is vulnerable to unauthorized modification | |
| CVE-2025-11923 | 8.8 | 0.04% | 2 | 0 | 2025-11-13T04:15:44.543000 | The LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes plugin for WordP | |
| CVE-2025-59367 | None | 0.23% | 1 | 0 | 2025-11-13T03:31:30 | An authentication bypass vulnerability has been identified in certain DSL series | |
| CVE-2025-59089 | 5.9 | 0.05% | 1 | 0 | 2025-11-13T00:31:26 | If an attacker causes kdcproxy to connect to an attacker-controlled KDC server ( | |
| CVE-2025-59088 | 8.6 | 0.04% | 2 | 0 | 2025-11-13T00:31:25 | If kdcproxy receives a request for a realm which does not have server addresses | |
| CVE-2025-63419 | 6.1 | 0.03% | 1 | 1 | 2025-11-13T00:31:25 | Cross Site Scripting (XSS) vulnerability in CrushFTP 11.3.6_48. The Web-Based Se | |
| CVE-2025-52331 | 6.1 | 0.03% | 1 | 0 | 2025-11-13T00:31:25 | Cross-site scripting (XSS) vulnerability in the generate report functionality in | |
| CVE-2025-13075 | 4.7 | 0.03% | 1 | 0 | 2025-11-13T00:30:30 | A vulnerability was detected in code-projects Responsive Hotel Site 1.0. Impacte | |
| CVE-2025-12703 | None | 0.00% | 1 | 0 | 2025-11-13T00:30:30 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering | |
| CVE-2023-7329 | None | 0.40% | 1 | 0 | 2025-11-13T00:30:24 | Tinycontrol LAN Controller v3 (LK3) firmware versions up to 1.58a (hardware v3.8 | |
| CVE-2023-7327 | None | 0.10% | 1 | 0 | 2025-11-13T00:30:24 | Ozeki SMS Gateway versions up to and including 10.3.208 contain a path traversal | |
| CVE-2021-4463 | None | 0.07% | 1 | 0 | 2025-11-13T00:30:24 | Longjing Technology BEMS API versions up to and including 1.21 contains an unaut | |
| CVE-2022-4982 | None | 0.06% | 1 | 0 | 2025-11-13T00:30:24 | DBLTek GoIP-1 firmware versions up to and including GHSFVT-1.1-67-5 contain a lo | |
| CVE-2017-20211 | None | 0.29% | 1 | 0 | 2025-11-13T00:30:24 | UCanCode E-XD++ Visualization Enterprise Suite contains an untrusted pointer der | |
| CVE-2016-15055 | None | 0.97% | 1 | 0 | 2025-11-13T00:30:24 | JVC VN-T IP-camera models firmware versions up to 2016-08-22 (confirmed on the V | |
| CVE-2025-11560 | 6.1 | 0.03% | 1 | 0 | 2025-11-13T00:30:17 | The Team Members Showcase WordPress plugin before 3.5.0 does not sanitize and es | |
| CVE-2025-64707 | 0 | 0.04% | 1 | 0 | 2025-11-12T23:15:40.130000 | Frappe Learning is a learning system that helps users structure their content. S | |
| CVE-2025-64500 | 7.3 | 0.01% | 1 | 1 | 2025-11-12T22:15:50.127000 | Symfony is a PHP framework for web and console applications and a set of reusabl | |
| CVE-2025-59491 | 6.1 | 0.03% | 1 | 0 | 2025-11-12T22:15:48.847000 | Cross Site Scripting vulnerability in CentralSquare Community Development 19.5.7 | |
| CVE-2025-43205 | 6.5 | 0.02% | 1 | 0 | 2025-11-12T22:15:48.297000 | An out-of-bounds access issue was addressed with improved bounds checking. This | |
| CVE-2021-4464 | 0 | 0.34% | 1 | 0 | 2025-11-12T22:15:42.027000 | FiberHome AN5506-04-FA firmware versions up to and including RP2631 and HG6245D | |
| CVE-2025-64186 | 8.7 | 0.01% | 1 | 0 | 2025-11-12T21:45:07 | ### Summary A vulnerability was identified in the `evervault-go` SDK’s attestat | |
| CVE-2025-46608 | 9.1 | 0.04% | 1 | 0 | 2025-11-12T21:31:15 | Dell Data Lakehouse, versions prior to 1.6.0.0, contain(s) an Improper Access Co | |
| CVE-2025-8485 | 7.3 | 0.01% | 1 | 0 | 2025-11-12T21:31:15 | An improper permissions vulnerability was reported in Lenovo App Store that coul | |
| CVE-2025-8421 | 6.6 | 0.01% | 1 | 0 | 2025-11-12T21:31:15 | An improper default permission vulnerability was reported in Lenovo Dock Manager | |
| CVE-2025-27368 | 4.3 | 0.03% | 1 | 0 | 2025-11-12T21:31:15 | IBM OpenPages 9.0 and 9.1 is vulnerable to information disclosure of sensitive i | |
| CVE-2025-46427 | 8.8 | 0.17% | 1 | 0 | 2025-11-12T21:31:14 | Dell SmartFabric OS10 Software, versions prior to 10.6.1.0, contain an Improper | |
| CVE-2025-64170 | 3.8 | 0.01% | 2 | 0 | 2025-11-12T21:15:53.433000 | sudo-rs is a memory safe implementation of sudo and su written in Rust. Starting | |
| CVE-2025-13061 | 6.3 | 0.04% | 1 | 0 | 2025-11-12T21:15:48.763000 | A vulnerability was detected in itsourcecode Online Voting System 1.0. This impa | |
| CVE-2025-62215 | 7.0 | 0.71% | 8 | 0 | 2025-11-12T21:14:53.247000 | Concurrent execution using shared resource with improper synchronization ('race | |
| CVE-2025-46428 | 8.8 | 0.17% | 1 | 0 | 2025-11-12T20:15:42.953000 | Dell SmartFabric OS10 Software, versions prior to 10.6.1.0, contain an Improper | |
| CVE-2025-13060 | 7.3 | 0.03% | 1 | 0 | 2025-11-12T20:15:39.357000 | A security vulnerability has been detected in SourceCodester Survey Application | |
| CVE-2025-64531 | 7.8 | 0.03% | 1 | 0 | 2025-11-12T18:41:07.100000 | Substance3D - Stager versions 3.1.5 and earlier are affected by a Use After Free | |
| CVE-2025-61834 | 7.8 | 0.03% | 1 | 0 | 2025-11-12T18:40:52.677000 | Substance3D - Stager versions 3.1.5 and earlier are affected by a Use After Free | |
| CVE-2025-61833 | 7.8 | 0.03% | 1 | 0 | 2025-11-12T18:40:45.433000 | Substance3D - Stager versions 3.1.5 and earlier are affected by an out-of-bounds | |
| CVE-2025-13042 | 8.8 | 0.07% | 3 | 0 | 2025-11-12T18:31:32 | Inappropriate implementation in V8 in Google Chrome prior to 142.0.7444.166 allo | |
| CVE-2025-2843 | 8.8 | 0.02% | 2 | 0 | 2025-11-12T18:31:32 | A flaw was found in the Observability Operator. The Operator creates a ServiceAc | |
| CVE-2025-11367 | None | 0.33% | 1 | 0 | 2025-11-12T18:31:32 | The N-central Software Probe < 2025.4 is vulnerable to Remote Code Execution via | |
| CVE-2025-20378 | 3.1 | 0.04% | 1 | 0 | 2025-11-12T18:31:32 | In Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, 9.2.9, and Splunk Clou | |
| CVE-2025-11366 | None | 0.10% | 1 | 0 | 2025-11-12T18:31:31 | N-central < 2025.4 is vulnerable to authentication bypass via path traversal | |
| CVE-2025-64406 | 4.3 | 0.03% | 2 | 0 | 2025-11-12T18:31:25 | An out-of-bounds Write vulnerability in Apache OpenOffice could allow an attacke | |
| CVE-2025-12871 | 9.8 | 0.13% | 1 | 0 | 2025-11-12T18:31:24 | The a+HRD developed by aEnrich has an Authentication Abuse vulnerability, allowi | |
| CVE-2025-13026 | 9.8 | 0.04% | 1 | 0 | 2025-11-12T18:31:20 | Sandbox escape due to incorrect boundary conditions in the Graphics: WebGPU comp | |
| CVE-2025-25236 | 5.3 | 0.03% | 1 | 0 | 2025-11-12T18:15:35.200000 | Omnissa Workspace ONE UEM contains an observable response discrepancy vulnerabil | |
| CVE-2025-20379 | 3.5 | 0.02% | 1 | 0 | 2025-11-12T18:15:35.030000 | In Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, and 9.2.9 and Splunk C | |
| CVE-2025-12870 | 9.8 | 0.08% | 1 | 0 | 2025-11-12T17:15:36.727000 | The a+HRD developed by aEnrich has an Authentication Abuse vulnerability, allowi | |
| CVE-2025-52881 | 0 | 0.01% | 4 | 2 | 2025-11-12T16:20:22.257000 | runc is a CLI tool for spawning and running containers according to the OCI spec | |
| CVE-2025-52565 | 0 | 0.01% | 4 | 1 | 2025-11-12T16:20:22.257000 | runc is a CLI tool for spawning and running containers according to the OCI spec | |
| CVE-2025-42890 | 10.0 | 0.07% | 4 | 0 | 2025-11-12T16:19:59.103000 | SQL Anywhere Monitor (Non-GUI) baked credentials into the code,exposing the reso | |
| CVE-2025-59499 | 8.8 | 0.07% | 1 | 0 | 2025-11-12T16:19:34.210000 | Improper neutralization of special elements used in an sql command ('sql injecti | |
| CVE-2025-11700 | 0 | 0.04% | 1 | 0 | 2025-11-12T16:19:12.850000 | N-central versions < 2025.4 are vulnerable to an XML External Entities injection | |
| CVE-2025-11567 | 0 | 0.01% | 1 | 0 | 2025-11-12T16:19:12.850000 | CWE-276: Incorrect Default Permissions vulnerability exists that could cause ele | |
| CVE-2025-40177 | 0 | 0.02% | 1 | 0 | 2025-11-12T16:19:12.850000 | In the Linux kernel, the following vulnerability has been resolved: accel/qaic: | |
| CVE-2025-40173 | 0 | 0.02% | 1 | 0 | 2025-11-12T16:19:12.850000 | In the Linux kernel, the following vulnerability has been resolved: net/ip6_tun | |
| CVE-2025-40169 | 0 | 0.02% | 1 | 0 | 2025-11-12T16:19:12.850000 | In the Linux kernel, the following vulnerability has been resolved: bpf: Reject | |
| CVE-2025-12901 | 4.3 | 0.01% | 1 | 0 | 2025-11-12T16:19:12.850000 | The Asgaros Forum plugin for WordPress is vulnerable to Cross-Site Request Forge | |
| CVE-2025-12087 | 4.3 | 0.03% | 1 | 0 | 2025-11-12T16:19:12.850000 | The Wishlist and Save for later for Woocommerce plugin for WordPress is vulnerab | |
| CVE-2025-40744 | 7.5 | 0.02% | 1 | 0 | 2025-11-12T16:19:12.850000 | A vulnerability has been identified in Solid Edge SE2025 (All versions < V225.0 | |
| CVE-2024-32011 | 8.8 | 0.06% | 1 | 0 | 2025-11-12T16:19:12.850000 | A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP | |
| CVE-2024-32010 | 7.8 | 0.01% | 1 | 0 | 2025-11-12T16:19:12.850000 | A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP | |
| CVE-2025-62452 | 8.0 | 0.06% | 1 | 0 | 2025-11-12T16:19:12.850000 | Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) a | |
| CVE-2025-62220 | 8.8 | 0.06% | 1 | 0 | 2025-11-12T16:19:12.850000 | Heap-based buffer overflow in Windows Subsystem for Linux GUI allows an unauthor | |
| CVE-2025-60715 | 8.0 | 0.06% | 1 | 0 | 2025-11-12T16:19:12.850000 | Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) a | |
| CVE-2025-62876 | None | 0.01% | 1 | 0 | 2025-11-12T15:31:37 | A Execution with Unnecessary Privileges vulnerability in lightdm-kde-greeter all | |
| CVE-2025-11566 | None | 0.07% | 1 | 0 | 2025-11-12T15:31:30 | CWE-307: Improper Restriction of Excessive Authentication Attempts vulnerability | |
| CVE-2025-11565 | None | 0.01% | 1 | 0 | 2025-11-12T15:31:30 | CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Trave | |
| CVE-2025-64401 | 7.5 | 0.03% | 2 | 0 | 2025-11-12T15:31:29 | Apache OpenOffice documents can contain links. A missing Authorization vulnerabi | |
| CVE-2025-61623 | 6.5 | 0.04% | 1 | 0 | 2025-11-12T15:31:29 | Reflected cross-site scripting vulnerability in Apache OFBiz. This issue affect | |
| CVE-2025-52665 | 10.0 | 8.39% | 1 | 0 | template | 2025-11-12T14:51:21.057000 | A malicious actor with access to the management network could exploit a misconfi |
| CVE-2025-40175 | None | 0.02% | 1 | 0 | 2025-11-12T12:30:39 | In the Linux kernel, the following vulnerability has been resolved: idpf: clean | |
| CVE-2025-40172 | None | 0.02% | 1 | 0 | 2025-11-12T12:30:38 | In the Linux kernel, the following vulnerability has been resolved: accel/qaic: | |
| CVE-2025-40174 | None | 0.02% | 1 | 0 | 2025-11-12T12:30:38 | In the Linux kernel, the following vulnerability has been resolved: x86/mm: Fix | |
| CVE-2025-40171 | None | 0.02% | 1 | 0 | 2025-11-12T12:30:37 | In the Linux kernel, the following vulnerability has been resolved: nvmet-fc: m | |
| CVE-2025-12998 | None | 0.05% | 2 | 0 | 2025-11-12T12:30:36 | Improper Authentication vulnerability in TYPO3 Extension "Modules" codingms/modu | |
| CVE-2025-40176 | None | 0.02% | 1 | 0 | 2025-11-12T12:30:36 | In the Linux kernel, the following vulnerability has been resolved: tls: wait f | |
| CVE-2025-40170 | None | 0.02% | 1 | 0 | 2025-11-12T12:30:36 | In the Linux kernel, the following vulnerability has been resolved: net: use ds | |
| CVE-2025-12382 | None | 0.02% | 2 | 0 | 2025-11-12T12:30:34 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v | |
| CVE-2025-12903 | 7.5 | 0.21% | 1 | 0 | 2025-11-12T09:30:33 | The Payment Plugins Braintree For WooCommerce plugin for WordPress is vulnerable | |
| CVE-2025-13047 | 7.5 | 0.05% | 1 | 0 | 2025-11-12T09:30:33 | Bacteriology Laboratory Reporting System developed by ViewLead Technology has a | |
| CVE-2025-13046 | 7.5 | 0.05% | 1 | 0 | 2025-11-12T09:30:32 | Bacteriology Laboratory Reporting System developed by ViewLead Technology has a | |
| CVE-2025-12833 | 4.3 | 0.03% | 1 | 0 | 2025-11-12T06:30:30 | The GeoDirectory – WP Business Directory Plugin and Classified Listings Director | |
| CVE-2025-54983 | 5.2 | 0.01% | 1 | 0 | 2025-11-12T06:30:24 | A health check port on Zscaler Client Connector on Windows, versions 4.6 < 4.6. | |
| CVE-2025-40111 | None | 0.02% | 1 | 0 | 2025-11-12T03:30:37 | In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: | |
| CVE-2025-40110 | None | 0.02% | 1 | 0 | 2025-11-12T03:30:26 | In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: | |
| CVE-2025-40827 | 7.8 | 0.01% | 2 | 0 | 2025-11-11T21:30:39 | A vulnerability has been identified in Siemens Software Center (All versions < V | |
| CVE-2025-40815 | 7.2 | 0.04% | 1 | 0 | 2025-11-11T21:30:39 | A vulnerability has been identified in LOGO! 12/24RCE (6ED1052-1MD08-0BA2) (All | |
| CVE-2025-40763 | 7.8 | 0.01% | 1 | 0 | 2025-11-11T21:30:39 | A vulnerability has been identified in Altair Grid Engine (All versions < V2026. | |
| CVE-2024-32009 | 7.8 | 0.01% | 1 | 0 | 2025-11-11T21:30:39 | A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP | |
| CVE-2024-32008 | 7.8 | 0.01% | 1 | 0 | 2025-11-11T21:30:39 | A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP | |
| CVE-2025-61835 | 7.8 | 0.03% | 1 | 0 | 2025-11-11T21:30:39 | Substance3D - Stager versions 3.1.5 and earlier are affected by an Integer Under | |
| CVE-2025-40817 | 6.5 | 0.02% | 1 | 0 | 2025-11-11T21:30:39 | A vulnerability has been identified in LOGO! 12/24RCE (6ED1052-1MD08-0BA2) (All | |
| CVE-2025-62222 | 8.8 | 0.11% | 1 | 0 | 2025-11-11T18:30:31 | Improper neutralization of special elements used in a command ('command injectio | |
| CVE-2025-60704 | 7.5 | 0.05% | 1 | 0 | 2025-11-11T18:30:30 | Missing cryptographic step in Windows Kerberos allows an unauthorized attacker t | |
| CVE-2025-60724 | 9.8 | 0.07% | 2 | 0 | 2025-11-11T18:30:30 | Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorize | |
| CVE-2025-30398 | 8.1 | 0.04% | 1 | 0 | 2025-11-11T18:30:25 | Missing authorization in Nuance PowerScribe allows an unauthorized attacker to d | |
| CVE-2025-62211 | 8.7 | 0.05% | 1 | 0 | 2025-11-11T18:30:23 | Improper neutralization of input during web page generation ('cross-site scripti | |
| CVE-2025-62210 | 8.7 | 0.05% | 1 | 0 | 2025-11-11T18:30:23 | Improper neutralization of input during web page generation ('cross-site scripti | |
| CVE-2025-62204 | 8.0 | 0.32% | 1 | 0 | 2025-11-11T18:30:23 | Deserialization of untrusted data in Microsoft Office SharePoint allows an autho | |
| CVE-2025-12101 | None | 4.69% | 4 | 1 | template | 2025-11-11T15:31:27 | Cross-Site Scripting (XSS) in NetScaler ADC and NetScaler Gateway when the appli |
| CVE-2025-42887 | 10.0 | 0.05% | 1 | 0 | 2025-11-11T03:30:36 | Due to missing input sanitation, SAP Solution Manager allows an authenticated at | |
| CVE-2025-20354 | 9.8 | 0.12% | 2 | 1 | 2025-11-07T15:44:35.293000 | A vulnerability in the Java Remote Method Invocation (RMI) process of Cisco Unif | |
| CVE-2025-31133 | None | 0.01% | 4 | 3 | 2025-11-06T23:12:38 | ### Impact ### The OCI runtime specification has a `maskedPaths` feature that | |
| CVE-2025-20358 | 9.4 | 0.34% | 2 | 0 | 2025-11-05T17:48:34 | A vulnerability in the Contact Center Express (CCX) Editor application of Cisco | |
| CVE-2025-40778 | 8.6 | 0.01% | 1 | 1 | 2025-11-05T00:32:31 | Under certain circumstances, BIND is too lenient when accepting records from ans | |
| CVE-2025-27835 | 7.8 | 0.02% | 2 | 0 | 2025-11-03T21:33:13 | An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow | |
| CVE-2025-40300 | None | 0.07% | 1 | 0 | 2025-11-03T18:32:46 | In the Linux kernel, the following vulnerability has been resolved: x86/vmscape | |
| CVE-2025-20333 | 9.9 | 4.05% | 1 | 0 | 2025-10-28T13:58:58.610000 | A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security | |
| CVE-2025-62518 | 8.1 | 0.01% | 1 | 1 | 2025-10-27T15:13:04 | ## Summary Versions of `astral-tokio-tar` prior to 0.5.6 contain a boundary par | |
| CVE-2023-4966 | 9.4 | 94.33% | 2 | 14 | template | 2025-10-24T13:42:55.550000 | Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when con |
| CVE-2025-20337 | 10.0 | 1.51% | 3 | 1 | 2025-10-22T00:34:26 | A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an | |
| CVE-2025-20362 | 6.5 | 29.72% | 1 | 0 | template | 2025-10-22T00:34:26 | A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security |
| CVE-2025-5777 | 7.5 | 55.19% | 7 | 22 | template | 2025-10-22T00:34:22 | Insufficient input validation leading to memory overread on the NetScaler Manage |
| CVE-2024-3400 | 9.8 | 94.34% | 2 | 41 | template | 2025-10-22T00:34:06 | A command injection vulnerability in the GlobalProtect feature of Palo Alto Netw |
| CVE-2017-0144 | 8.8 | 94.42% | 1 | 15 | 2025-10-22T00:15:58.547000 | The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 | |
| CVE-2020-9802 | 8.8 | 42.55% | 1 | 2 | 2025-05-05T18:30:44 | A logic issue was addressed with improved restrictions. This issue is fixed in i | |
| CVE-2022-45770 | 7.8 | 0.58% | 2 | 1 | 2025-03-31T21:32:40 | Improper input validation in driver adgnetworkwfpdrv.sys in Adguard For Windows | |
| CVE-2025-64717 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2025-64705 | 0 | 0.04% | 3 | 0 | N/A | ||
| CVE-2025-64716 | 0 | 0.07% | 1 | 0 | N/A | ||
| CVE-2025-64710 | 0 | 0.05% | 1 | 0 | N/A | ||
| CVE-2025-64523 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2025-64503 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2025-64482 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2025-64117 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2025-4619 | 0 | 0.00% | 1 | 0 | N/A |
updated 2025-11-13T18:31:17
2 posts
updated 2025-11-13T18:31:17
2 posts
Linksys
https://www.cve.org/CVERecord?id=CVE-2025-60690
https://www.cve.org/CVERecord?id=CVE-2025-60691
https://www.cve.org/CVERecord?id=CVE-2025-60692
##Linksys
https://www.cve.org/CVERecord?id=CVE-2025-60690
https://www.cve.org/CVERecord?id=CVE-2025-60691
https://www.cve.org/CVERecord?id=CVE-2025-60692
##updated 2025-11-13T18:31:17
2 posts
Linksys
https://www.cve.org/CVERecord?id=CVE-2025-60690
https://www.cve.org/CVERecord?id=CVE-2025-60691
https://www.cve.org/CVERecord?id=CVE-2025-60692
##Linksys
https://www.cve.org/CVERecord?id=CVE-2025-60690
https://www.cve.org/CVERecord?id=CVE-2025-60691
https://www.cve.org/CVERecord?id=CVE-2025-60692
##updated 2025-11-13T18:31:17
2 posts
updated 2025-11-13T18:31:16
2 posts
updated 2025-11-13T18:31:16
2 posts
Linksys
https://www.cve.org/CVERecord?id=CVE-2025-60690
https://www.cve.org/CVERecord?id=CVE-2025-60691
https://www.cve.org/CVERecord?id=CVE-2025-60692
##Linksys
https://www.cve.org/CVERecord?id=CVE-2025-60690
https://www.cve.org/CVERecord?id=CVE-2025-60691
https://www.cve.org/CVERecord?id=CVE-2025-60692
##updated 2025-11-13T18:31:16
2 posts
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60684
https://www.cve.org/CVERecord?id=CVE-2025-60686
https://www.cve.org/CVERecord?id=CVE-2025-60687
##TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60684
https://www.cve.org/CVERecord?id=CVE-2025-60686
https://www.cve.org/CVERecord?id=CVE-2025-60687
##updated 2025-11-13T18:31:11
2 posts
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60684
https://www.cve.org/CVERecord?id=CVE-2025-60686
https://www.cve.org/CVERecord?id=CVE-2025-60687
##TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60684
https://www.cve.org/CVERecord?id=CVE-2025-60686
https://www.cve.org/CVERecord?id=CVE-2025-60687
##updated 2025-11-13T18:31:11
2 posts
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60684
https://www.cve.org/CVERecord?id=CVE-2025-60686
https://www.cve.org/CVERecord?id=CVE-2025-60687
##TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60684
https://www.cve.org/CVERecord?id=CVE-2025-60686
https://www.cve.org/CVERecord?id=CVE-2025-60687
##updated 2025-11-13T18:31:11
2 posts
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60682
https://www.cve.org/CVERecord?id=CVE-2025-60683
##TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60682
https://www.cve.org/CVERecord?id=CVE-2025-60683
##updated 2025-11-13T18:31:05
1 posts
CVE-2025-64383 - WordPress Qi Blocks plugin <= 1.4.3 - Cross Site Scripting (XSS) vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64383
##updated 2025-11-13T18:31:05
1 posts
CVE-2025-64380 - WordPress Booster for WooCommerce plugin <= 7.3.2 - Cross Site Scripting (XSS) vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64380
##updated 2025-11-13T18:31:04
1 posts
CVE-2025-64379 - WordPress Booster for WooCommerce plugin <= 7.4.0 - Broken Access Control vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64379
##updated 2025-11-13T18:31:04
1 posts
CVE-2025-64370 - WordPress YOP Poll plugin <= 6.5.38 - Broken Access Control vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64370
##updated 2025-11-13T18:31:03
1 posts
1 repos
updated 2025-11-13T18:15:54.137000
2 posts
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60671
https://www.cve.org/CVERecord?id=CVE-2025-60697
https://www.cve.org/CVERecord?id=CVE-2025-60698
https://www.cve.org/CVERecord?id=CVE-2025-60700
https://www.cve.org/CVERecord?id=CVE-2025-60701
Linksys
##D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60671
https://www.cve.org/CVERecord?id=CVE-2025-60697
https://www.cve.org/CVERecord?id=CVE-2025-60698
https://www.cve.org/CVERecord?id=CVE-2025-60700
https://www.cve.org/CVERecord?id=CVE-2025-60701
Linksys
##updated 2025-11-13T18:15:54.010000
2 posts
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60671
https://www.cve.org/CVERecord?id=CVE-2025-60697
https://www.cve.org/CVERecord?id=CVE-2025-60698
https://www.cve.org/CVERecord?id=CVE-2025-60700
https://www.cve.org/CVERecord?id=CVE-2025-60701
Linksys
##D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60671
https://www.cve.org/CVERecord?id=CVE-2025-60697
https://www.cve.org/CVERecord?id=CVE-2025-60698
https://www.cve.org/CVERecord?id=CVE-2025-60700
https://www.cve.org/CVERecord?id=CVE-2025-60701
Linksys
##updated 2025-11-13T18:15:53.880000
2 posts
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60671
https://www.cve.org/CVERecord?id=CVE-2025-60697
https://www.cve.org/CVERecord?id=CVE-2025-60698
https://www.cve.org/CVERecord?id=CVE-2025-60700
https://www.cve.org/CVERecord?id=CVE-2025-60701
Linksys
##D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60671
https://www.cve.org/CVERecord?id=CVE-2025-60697
https://www.cve.org/CVERecord?id=CVE-2025-60698
https://www.cve.org/CVERecord?id=CVE-2025-60700
https://www.cve.org/CVERecord?id=CVE-2025-60701
Linksys
##updated 2025-11-13T18:15:53.753000
2 posts
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60671
https://www.cve.org/CVERecord?id=CVE-2025-60697
https://www.cve.org/CVERecord?id=CVE-2025-60698
https://www.cve.org/CVERecord?id=CVE-2025-60700
https://www.cve.org/CVERecord?id=CVE-2025-60701
Linksys
##D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60671
https://www.cve.org/CVERecord?id=CVE-2025-60697
https://www.cve.org/CVERecord?id=CVE-2025-60698
https://www.cve.org/CVERecord?id=CVE-2025-60700
https://www.cve.org/CVERecord?id=CVE-2025-60701
Linksys
##updated 2025-11-13T18:15:53.587000
2 posts
Linksys
https://www.cve.org/CVERecord?id=CVE-2025-60690
https://www.cve.org/CVERecord?id=CVE-2025-60691
https://www.cve.org/CVERecord?id=CVE-2025-60692
##Linksys
https://www.cve.org/CVERecord?id=CVE-2025-60690
https://www.cve.org/CVERecord?id=CVE-2025-60691
https://www.cve.org/CVERecord?id=CVE-2025-60692
##updated 2025-11-13T18:15:53.040000
2 posts
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60671
https://www.cve.org/CVERecord?id=CVE-2025-60697
https://www.cve.org/CVERecord?id=CVE-2025-60698
https://www.cve.org/CVERecord?id=CVE-2025-60700
https://www.cve.org/CVERecord?id=CVE-2025-60701
Linksys
##D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60671
https://www.cve.org/CVERecord?id=CVE-2025-60697
https://www.cve.org/CVERecord?id=CVE-2025-60698
https://www.cve.org/CVERecord?id=CVE-2025-60700
https://www.cve.org/CVERecord?id=CVE-2025-60701
Linksys
##updated 2025-11-13T18:15:51.567000
2 posts
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60682
https://www.cve.org/CVERecord?id=CVE-2025-60683
##TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60682
https://www.cve.org/CVERecord?id=CVE-2025-60683
##updated 2025-11-13T18:15:51.387000
2 posts
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60684
https://www.cve.org/CVERecord?id=CVE-2025-60686
https://www.cve.org/CVERecord?id=CVE-2025-60687
##TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60684
https://www.cve.org/CVERecord?id=CVE-2025-60686
https://www.cve.org/CVERecord?id=CVE-2025-60687
##updated 2025-11-13T18:15:51.023000
2 posts
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60682
https://www.cve.org/CVERecord?id=CVE-2025-60683
##TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-60682
https://www.cve.org/CVERecord?id=CVE-2025-60683
##updated 2025-11-13T18:15:50.877000
2 posts
D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60671
https://www.cve.org/CVERecord?id=CVE-2025-60697
https://www.cve.org/CVERecord?id=CVE-2025-60698
https://www.cve.org/CVERecord?id=CVE-2025-60700
https://www.cve.org/CVERecord?id=CVE-2025-60701
Linksys
##D-Link
https://www.cve.org/CVERecord?id=CVE-2025-60671
https://www.cve.org/CVERecord?id=CVE-2025-60697
https://www.cve.org/CVERecord?id=CVE-2025-60698
https://www.cve.org/CVERecord?id=CVE-2025-60700
https://www.cve.org/CVERecord?id=CVE-2025-60701
Linksys
##updated 2025-11-13T18:15:50.703000
2 posts
A couple Mattermost CVEs. Nothing too big but maybe worth looking into if that's your thing.
##A couple Mattermost CVEs. Nothing too big but maybe worth looking into if that's your thing.
##updated 2025-11-13T18:15:49.393000
2 posts
A couple Mattermost CVEs. Nothing too big but maybe worth looking into if that's your thing.
##A couple Mattermost CVEs. Nothing too big but maybe worth looking into if that's your thing.
##updated 2025-11-13T17:39:19
3 posts
Multiple CVEs in Postgresql stuff.
https://www.cve.org/CVERecord?id=CVE-2025-12762
https://www.cve.org/CVERecord?id=CVE-2025-12763
https://www.cve.org/CVERecord?id=CVE-2025-12764
https://www.cve.org/CVERecord?id=CVE-2025-12765
##CVE-2025-12762 - Remote Code Execution vulnerability when restoring PLAIN-format SQL dumps in server mode (pgAdmin 4) https://cvefeed.io/vuln/detail/CVE-2025-12762
##Multiple CVEs in Postgresql stuff.
https://www.cve.org/CVERecord?id=CVE-2025-12762
https://www.cve.org/CVERecord?id=CVE-2025-12763
https://www.cve.org/CVERecord?id=CVE-2025-12764
https://www.cve.org/CVERecord?id=CVE-2025-12765
##updated 2025-11-13T17:15:50.523000
1 posts
Heads-up to anyone still using OpenOffice.
https://www.openoffice.org/security/cves/CVE-2025-64401.html
https://www.openoffice.org/security/cves/CVE-2025-64402.html
https://www.openoffice.org/security/cves/CVE-2025-64403.html
https://www.openoffice.org/security/cves/CVE-2025-64404.html
https://www.openoffice.org/security/cves/CVE-2025-64405.html
https://www.openoffice.org/security/cves/CVE-2025-64406.html
https://www.openoffice.org/security/cves/CVE-2025-64407.html
##updated 2025-11-13T17:15:45.630000
2 posts
New updates from Cisco. These are just the top three. There are seven of them.
Critical: CVE-2025-20354 and CVE-2025-20358: Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-unauth-rce-QeN8h7mQ
New: High vulnerability CVE-2025-20341: Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catc-priv-esc-VS8EeCuX
New. CVE-2025-20346, medium severity: Cisco Catalyst Center Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-privesc-catc-rYjReeLU @TalosSecurity #infosec #vulnerability
##New updates from Cisco. These are just the top three. There are seven of them.
Critical: CVE-2025-20354 and CVE-2025-20358: Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-unauth-rce-QeN8h7mQ
New: High vulnerability CVE-2025-20341: Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catc-priv-esc-VS8EeCuX
New. CVE-2025-20346, medium severity: Cisco Catalyst Center Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-privesc-catc-rYjReeLU @TalosSecurity #infosec #vulnerability
##updated 2025-11-13T17:15:45.400000
3 posts
New updates from Cisco. These are just the top three. There are seven of them.
Critical: CVE-2025-20354 and CVE-2025-20358: Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-unauth-rce-QeN8h7mQ
New: High vulnerability CVE-2025-20341: Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catc-priv-esc-VS8EeCuX
New. CVE-2025-20346, medium severity: Cisco Catalyst Center Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-privesc-catc-rYjReeLU @TalosSecurity #infosec #vulnerability
##CVE-2025-20341 | *Severity:* HIGH
Bug Bounty Relevance: HIGH
An authenticated attacker can potentially gain Administrator privileges on affected Cisco systems. This could lead to unauthorized modifications, including creating new user accounts or elevating privileges.
Strategy: Focus on targets using Cisco Catalyst Center Virtual Appliance. Test for insufficient input validation in HTTP requests, especially during user account management operations.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catc-priv-esc-VS8EeCuX
New updates from Cisco. These are just the top three. There are seven of them.
Critical: CVE-2025-20354 and CVE-2025-20358: Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-unauth-rce-QeN8h7mQ
New: High vulnerability CVE-2025-20341: Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catc-priv-esc-VS8EeCuX
New. CVE-2025-20346, medium severity: Cisco Catalyst Center Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-privesc-catc-rYjReeLU @TalosSecurity #infosec #vulnerability
##updated 2025-11-13T16:15:55.877000
1 posts
CVE-2025-64382 - WordPress Order Export & Order Import for WooCommerce plugin <= 2.6.7 - Broken Access Control vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64382
##updated 2025-11-13T16:15:50.843000
1 posts
CVE-2025-13118 - macrozheng mall-swarm paySuccess improper authorization https://cvefeed.io/vuln/detail/CVE-2025-13118
##updated 2025-11-13T16:15:50.533000
1 posts
Mozilla releases Firefox patches, fixes 15 vulnerabilities including sandbox escape flaws
Mozilla Firefox 145, released November 11, 2025, patches 15 security vulnerabilities including two sandbox escape flaws (CVE-2025-13023 and CVE-2025-13026) in WebGPU that could allow attackers to execute arbitrary code outside the browser's security boundaries.
**Update your Firefox browser and Thunderbird email client. Firefox fixed two sandbox escape vulnerabilities in WebGPU that could let attackers break out of the browser and run code on your computer. There are no exploits yet, but your browser and email client are the first line of access to the internet, so they will stumble on the exploits first. Better to update, all tabs reopen automatically.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/mozilla-releases-firefox-patches-fixes-15-vulnerabilities-including-sandbox-escape-flaws-p-c-n-d-4/gD2P6Ple2L
updated 2025-11-13T15:36:04
2 posts
@zeux direct link to the actual issue if people are curious: https://security-tracker.debian.org/tracker/CVE-2025-64517 tl;dr a new feature that shipped was broken, making it worse than useless, but not compromising the normal functionality.
##CVE-2025-64517 - sudo-rs doesn't record authenticating user properly in timestamp https://cvefeed.io/vuln/detail/CVE-2025-64517
##updated 2025-11-13T15:31:32
4 posts
1 repos
https://github.com/watchtowrlabs/watchTowr-vs-WatchGuard-CVE-2025-9242
📰 CISA KEV Alert: WatchGuard and Triofox Flaws Now Under Active Attack
📢 CISA KEV UPDATE: Three vulnerabilities are now under active attack, including flaws in WatchGuard Firebox (CVE-2025-9242) and Gladinet Triofox (CVE-2025-12480). Federal agencies must patch by Dec 3. All orgs urged to act now! #CISA #KEV #CyberSec...
##CISA has added 3 new vulnerabilities to the KEV Catalog.
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2025-12480: Gladinet Triofox Improper Access Control Vulnerability
CVE-2025-62215: Microsoft Windows Race Condition Vulnerability
CVE-2025-9242: WatchGuard Firebox Out-of-Bounds Write Vulnerability
##CVE ID: CVE-2025-9242
Vendor: WatchGuard
Product: Firebox
Date Added: 2025-11-12
Notes: https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00015 ; https://nvd.nist.gov/vuln/detail/CVE-2025-9242
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-9242
CIA has updated the KEV catalogue.
CVE-2025-9242: WatchGuard Firebox Out-of-Bounds Write Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-9242
CVE-2025-62215: Microsoft Windows Race Condition Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-62215
CVE-2025-12480: Gladinet Triofox Improper Access Control Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-12480 #CISA #Microsoft #WIndows #infosec
##updated 2025-11-13T15:31:32
2 posts
Heads-up to anyone still using OpenOffice.
https://www.openoffice.org/security/cves/CVE-2025-64401.html
https://www.openoffice.org/security/cves/CVE-2025-64402.html
https://www.openoffice.org/security/cves/CVE-2025-64403.html
https://www.openoffice.org/security/cves/CVE-2025-64404.html
https://www.openoffice.org/security/cves/CVE-2025-64405.html
https://www.openoffice.org/security/cves/CVE-2025-64406.html
https://www.openoffice.org/security/cves/CVE-2025-64407.html
##CVE-2025-64404 - Apache OpenOffice: Remote documents loaded without prompt via background and bullet images https://cvefeed.io/vuln/detail/CVE-2025-64404
##updated 2025-11-13T15:31:32
2 posts
Heads-up to anyone still using OpenOffice.
https://www.openoffice.org/security/cves/CVE-2025-64401.html
https://www.openoffice.org/security/cves/CVE-2025-64402.html
https://www.openoffice.org/security/cves/CVE-2025-64403.html
https://www.openoffice.org/security/cves/CVE-2025-64404.html
https://www.openoffice.org/security/cves/CVE-2025-64405.html
https://www.openoffice.org/security/cves/CVE-2025-64406.html
https://www.openoffice.org/security/cves/CVE-2025-64407.html
##CVE-2025-64405 - Apache OpenOffice: Remote documents loaded without prompt via DDE function https://cvefeed.io/vuln/detail/CVE-2025-64405
##updated 2025-11-13T15:30:38
1 posts
CVE-2025-30662 - Zoom Workplace VDI Plugin macOS Universal Installer - Symlink Following https://cvefeed.io/vuln/detail/CVE-2025-30662
##updated 2025-11-13T15:30:37
2 posts
Multiple CVEs in Postgresql stuff.
https://www.cve.org/CVERecord?id=CVE-2025-12762
https://www.cve.org/CVERecord?id=CVE-2025-12763
https://www.cve.org/CVERecord?id=CVE-2025-12764
https://www.cve.org/CVERecord?id=CVE-2025-12765
##Multiple CVEs in Postgresql stuff.
https://www.cve.org/CVERecord?id=CVE-2025-12762
https://www.cve.org/CVERecord?id=CVE-2025-12763
https://www.cve.org/CVERecord?id=CVE-2025-12764
https://www.cve.org/CVERecord?id=CVE-2025-12765
##updated 2025-11-13T15:30:37
2 posts
Multiple CVEs in Postgresql stuff.
https://www.cve.org/CVERecord?id=CVE-2025-12762
https://www.cve.org/CVERecord?id=CVE-2025-12763
https://www.cve.org/CVERecord?id=CVE-2025-12764
https://www.cve.org/CVERecord?id=CVE-2025-12765
##Multiple CVEs in Postgresql stuff.
https://www.cve.org/CVERecord?id=CVE-2025-12762
https://www.cve.org/CVERecord?id=CVE-2025-12763
https://www.cve.org/CVERecord?id=CVE-2025-12764
https://www.cve.org/CVERecord?id=CVE-2025-12765
##updated 2025-11-13T15:30:37
2 posts
CVE-2025-64741 - Zoom Workplace for Android - Improper Authorization Handling https://cvefeed.io/vuln/detail/CVE-2025-64741
##CVE-2025-64741 - Zoom Workplace for Android - Improper Authorization Handling https://cvefeed.io/vuln/detail/CVE-2025-64741
##updated 2025-11-13T15:30:37
1 posts
CVE-2025-62483 - Zoom Clients - Improper Removal of Sensitive Information https://cvefeed.io/vuln/detail/CVE-2025-62483
##updated 2025-11-13T15:30:37
1 posts
CVE-2025-13119 - Fabian Ros/SourceCodester Simple E-Banking System cross-site request forgery https://cvefeed.io/vuln/detail/CVE-2025-13119
##updated 2025-11-13T15:30:31
1 posts
CVE-2025-30669 - Zoom Workplace Clients - Improper Certificate Validation https://cvefeed.io/vuln/detail/CVE-2025-30669
##updated 2025-11-13T15:30:31
1 posts
CVE-2025-64739 - Zoom Clients - External Control of File Name or Path https://cvefeed.io/vuln/detail/CVE-2025-64739
##updated 2025-11-13T15:30:30
2 posts
Multiple CVEs in Postgresql stuff.
https://www.cve.org/CVERecord?id=CVE-2025-12762
https://www.cve.org/CVERecord?id=CVE-2025-12763
https://www.cve.org/CVERecord?id=CVE-2025-12764
https://www.cve.org/CVERecord?id=CVE-2025-12765
##Multiple CVEs in Postgresql stuff.
https://www.cve.org/CVERecord?id=CVE-2025-12762
https://www.cve.org/CVERecord?id=CVE-2025-12763
https://www.cve.org/CVERecord?id=CVE-2025-12764
https://www.cve.org/CVERecord?id=CVE-2025-12765
##updated 2025-11-13T15:15:53.820000
1 posts
CVE-2025-64740 - Zoom Workplace VDI Client for Windows - Improper Verification of Cryptographic Signature https://cvefeed.io/vuln/detail/CVE-2025-64740
##updated 2025-11-13T15:15:52.707000
1 posts
CVE-2025-64711 - PrivateBin vulnerable to malicious filename use for self-XSS / HTML injection locally for users https://cvefeed.io/vuln/detail/CVE-2025-64711
##updated 2025-11-13T15:15:51.697000
1 posts
CVE-2025-62482 - Zoom Workplace for Windows - Cross-site Scripting https://cvefeed.io/vuln/detail/CVE-2025-62482
##updated 2025-11-13T15:15:50.463000
1 posts
CVE-2025-13117 - macrozheng mall-swarm cancelOrder improper authorization https://cvefeed.io/vuln/detail/CVE-2025-13117
##updated 2025-11-13T15:15:50.250000
1 posts
CVE-2025-13076 - code-projects Responsive Hotel Site usersetting.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-13076
##updated 2025-11-13T15:15:49.590000
1 posts
📢 CVE-2025-12735 Faille critique RCE dans la bibliothèque JavaScript expr-eval (800k téléchargements NPM)
📝 Selon BleepingComputer, une faille critique affecte la bibli...
📖 cyberveille : https://cyberveille.ch/posts/2025-11-12-cve-2025-12735-faille-critique-rce-dans-la-bibliotheque-javascript-expr-eval-800k-telechargements-npm/
🌐 source : https://www.bleepingcomputer.com/news/security/popular-javascript-library-expr-eval-vulnerable-to-rce-flaw/
#JavaScript #NPM #Cyberveille
updated 2025-11-13T15:15:48.983000
1 posts
CVE-2023-7326 - Epson Stylus SX510W Printer Remote Power Off DoS https://cvefeed.io/vuln/detail/CVE-2023-7326
##updated 2025-11-13T15:08:55.247000
2 posts
Heads-up to anyone still using OpenOffice.
https://www.openoffice.org/security/cves/CVE-2025-64401.html
https://www.openoffice.org/security/cves/CVE-2025-64402.html
https://www.openoffice.org/security/cves/CVE-2025-64403.html
https://www.openoffice.org/security/cves/CVE-2025-64404.html
https://www.openoffice.org/security/cves/CVE-2025-64405.html
https://www.openoffice.org/security/cves/CVE-2025-64406.html
https://www.openoffice.org/security/cves/CVE-2025-64407.html
##CVE-2025-64402 - Apache OpenOffice: Remote documents loaded without prompt via OLE objects https://cvefeed.io/vuln/detail/CVE-2025-64402
##updated 2025-11-13T15:08:42.313000
3 posts
CVE-2025-64403 - Apache OpenOffice: Remote documents loaded without prompt via "external data sources" in Calc https://cvefeed.io/vuln/detail/CVE-2025-64403
##Heads-up to anyone still using OpenOffice.
https://www.openoffice.org/security/cves/CVE-2025-64401.html
https://www.openoffice.org/security/cves/CVE-2025-64402.html
https://www.openoffice.org/security/cves/CVE-2025-64403.html
https://www.openoffice.org/security/cves/CVE-2025-64404.html
https://www.openoffice.org/security/cves/CVE-2025-64405.html
https://www.openoffice.org/security/cves/CVE-2025-64406.html
https://www.openoffice.org/security/cves/CVE-2025-64407.html
##CVE-2025-64403 - Apache OpenOffice: Remote documents loaded without prompt via "external data sources" in Calc https://cvefeed.io/vuln/detail/CVE-2025-64403
##updated 2025-11-13T15:07:03.620000
5 posts
1 repos
Critical Zero-Day in Gladinet Triofox Exploited by UNC6485 Threat Group
Cybersecurity experts have sounded the alarm after discovering a severe zero-day vulnerability in Gladinet’s Triofox file-sharing platform. This flaw, tracked as CVE-2025-12480, has been actively exploited by the notorious threat actor group UNC6485 since August 24, 2025, allowing attackers to bypass authentication and execute malicious code with full system privileges. The implications for…
https://undercodenews.com/critical-zero-day-in-gladinet-triofox-exploited-by-unc6485-threat-group/
##📰 CISA KEV Alert: WatchGuard and Triofox Flaws Now Under Active Attack
📢 CISA KEV UPDATE: Three vulnerabilities are now under active attack, including flaws in WatchGuard Firebox (CVE-2025-9242) and Gladinet Triofox (CVE-2025-12480). Federal agencies must patch by Dec 3. All orgs urged to act now! #CISA #KEV #CyberSec...
##CISA has added 3 new vulnerabilities to the KEV Catalog.
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2025-12480: Gladinet Triofox Improper Access Control Vulnerability
CVE-2025-62215: Microsoft Windows Race Condition Vulnerability
CVE-2025-9242: WatchGuard Firebox Out-of-Bounds Write Vulnerability
##CVE ID: CVE-2025-12480
Vendor: Gladinet
Product: Triofox
Date Added: 2025-11-12
Notes: https://access.triofox.com/releases_history ; https://nvd.nist.gov/vuln/detail/CVE-2025-12480
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-12480
CIA has updated the KEV catalogue.
CVE-2025-9242: WatchGuard Firebox Out-of-Bounds Write Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-9242
CVE-2025-62215: Microsoft Windows Race Condition Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-62215
CVE-2025-12480: Gladinet Triofox Improper Access Control Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-12480 #CISA #Microsoft #WIndows #infosec
##updated 2025-11-13T15:04:59.130000
2 posts
1 repos
Whoopsie.
https://lists.apache.org/thread/202263kpy7g76pzsy1fm96h9lcmhsqpt
##CVE-2025-59118: Apache OFBiz: Critical Remote Command Execution via Unrestricted File Upload
CVE-2025-59118 - Apache OFBiz: Critical Remote Command Execution via Unrestricted File Upload https://cvefeed.io/vuln/detail/CVE-2025-59118
##updated 2025-11-13T14:15:47.873000
2 posts
Multiple CVEs in Postgresql stuff.
https://www.cve.org/CVERecord?id=CVE-2025-12762
https://www.cve.org/CVERecord?id=CVE-2025-12763
https://www.cve.org/CVERecord?id=CVE-2025-12764
https://www.cve.org/CVERecord?id=CVE-2025-12765
##Multiple CVEs in Postgresql stuff.
https://www.cve.org/CVERecord?id=CVE-2025-12762
https://www.cve.org/CVERecord?id=CVE-2025-12763
https://www.cve.org/CVERecord?id=CVE-2025-12764
https://www.cve.org/CVERecord?id=CVE-2025-12765
##updated 2025-11-13T13:15:45.313000
2 posts
Multiple CVEs in Postgresql stuff.
https://www.cve.org/CVERecord?id=CVE-2025-12762
https://www.cve.org/CVERecord?id=CVE-2025-12763
https://www.cve.org/CVERecord?id=CVE-2025-12764
https://www.cve.org/CVERecord?id=CVE-2025-12765
##Multiple CVEs in Postgresql stuff.
https://www.cve.org/CVERecord?id=CVE-2025-12762
https://www.cve.org/CVERecord?id=CVE-2025-12763
https://www.cve.org/CVERecord?id=CVE-2025-12764
https://www.cve.org/CVERecord?id=CVE-2025-12765
##updated 2025-11-13T12:32:48
1 posts
CVE-2025-64384 - WordPress JetFormBuilder plugin <= 3.5.3 - Broken Access Control vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64384
##updated 2025-11-13T12:32:46
1 posts
CVE-2025-64292 - WordPress Analytics Germanized for Google Analytics plugin <= 1.6.2 - Cross Site Scripting (XSS) vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64292
##updated 2025-11-13T10:15:54.823000
1 posts
CVE-2025-7704 - Supermicro BMC SMASH services has a Stack-based buffer overflow vulnerability https://cvefeed.io/vuln/detail/CVE-2025-7704
##updated 2025-11-13T10:15:54.180000
1 posts
CVE-2025-64381 - WordPress Booking Calendar plugin <= 10.14.7 - Cross Site Scripting (XSS) vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64381
##updated 2025-11-13T10:15:53.423000
1 posts
CVE-2025-64369 - WordPress Contact Form Email plugin <= 1.3.58 - Broken Access Control vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64369
##updated 2025-11-13T06:30:30
2 posts
CVE-2025-12733 - Import any XML, CSV or Excel File to WordPress (WP All Import) <= 3.9.6 - Authenticated (Administrator+) Remote Code Execution via Conditional Logic https://cvefeed.io/vuln/detail/CVE-2025-12733
##CVE-2025-12733 - Import any XML, CSV or Excel File to WordPress (WP All Import) <= 3.9.6 - Authenticated (Administrator+) Remote Code Execution via Conditional Logic https://cvefeed.io/vuln/detail/CVE-2025-12733
##updated 2025-11-13T06:30:30
1 posts
CVE-2025-12620 - Poll Maker – Versus Polls, Anonymous Polls, Image Polls <= 6.0.7 - Authenticated (Administrator+) SQL Injection via `filterbyauthor` Parameter https://cvefeed.io/vuln/detail/CVE-2025-12620
##updated 2025-11-13T06:30:30
1 posts
CVE-2025-12536 - SureForms <= 1.13.1 - Missing Authorization to Unauthenticated Sensitive Information Exposure https://cvefeed.io/vuln/detail/CVE-2025-12536
##updated 2025-11-13T06:30:30
1 posts
CVE-2025-12366 - Page Builder: Pagelayer – Drag and Drop website builder <= 2.0.5 - Authenticated (Author+) Insecure Direct Object Reference https://cvefeed.io/vuln/detail/CVE-2025-12366
##updated 2025-11-13T06:30:30
1 posts
CVE-2025-12089 - Data Tables Generator by Supsystic <= 1.10.45 - Authenticated (Admin+) Arbitrary File Deletion https://cvefeed.io/vuln/detail/CVE-2025-12089
##updated 2025-11-13T05:16:03.007000
1 posts
CVE-2025-12891 - Survey Maker <= 5.1.9.4 - Missing Authorization to Unauthenticated Information Exposure https://cvefeed.io/vuln/detail/CVE-2025-12891
##updated 2025-11-13T04:15:46.730000
1 posts
CVE-2025-12979 - Welcart e-Commerce <= 2.11.24 - Missing Authorization to Unauthenticated Information Exposure https://cvefeed.io/vuln/detail/CVE-2025-12979
##updated 2025-11-13T04:15:46.537000
1 posts
CVE-2025-12892 - Survey Maker <= 5.1.9.4 - Missing Authorization Unauthenticated Limited Option Update https://cvefeed.io/vuln/detail/CVE-2025-12892
##updated 2025-11-13T04:15:44.543000
2 posts
CVE-2025-11923 - LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes - Various Versions - Authenticated (Student+) Privilege Escalation https://cvefeed.io/vuln/detail/CVE-2025-11923
##CVE-2025-11923 - LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes - Various Versions - Authenticated (Student+) Privilege Escalation https://cvefeed.io/vuln/detail/CVE-2025-11923
##updated 2025-11-13T03:31:30
1 posts
CVE-2025-59367 - ASUS DSL Router Authentication Bypass Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-59367
##updated 2025-11-13T00:31:26
1 posts
CVE-2025-59089 - Python-kdcproxy: remote dos via unbounded tcp upstream buffering https://cvefeed.io/vuln/detail/CVE-2025-59089
##updated 2025-11-13T00:31:25
2 posts
CVE-2025-59088 - Python-kdcproxy: unauthenticated ssrf via realm‑controlled dns srv https://cvefeed.io/vuln/detail/CVE-2025-59088
##CVE-2025-59088 - Python-kdcproxy: unauthenticated ssrf via realm‑controlled dns srv https://cvefeed.io/vuln/detail/CVE-2025-59088
##updated 2025-11-13T00:31:25
1 posts
1 repos
CVE-2025-63419 - CrushFTP HTML Injection https://cvefeed.io/vuln/detail/CVE-2025-63419
##updated 2025-11-13T00:31:25
1 posts
CVE-2025-52331 - WinRAR XSS Report Generator https://cvefeed.io/vuln/detail/CVE-2025-52331
##updated 2025-11-13T00:30:30
1 posts
CVE-2025-13075 - code-projects Responsive Hotel Site usersettingdel.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-13075
##updated 2025-11-13T00:30:30
1 posts
CVE-2025-12703 - Apache Struts Remote Code Execution Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-12703
##updated 2025-11-13T00:30:24
1 posts
CVE-2023-7329 - Tinycontrol LAN Controller v3 (LK3) Remote DoS https://cvefeed.io/vuln/detail/CVE-2023-7329
##updated 2025-11-13T00:30:24
1 posts
CVE-2023-7327 - Ozeki SMS Gateway <= 10.3.208 Unauthenticated Arbitrary File Read https://cvefeed.io/vuln/detail/CVE-2023-7327
##updated 2025-11-13T00:30:24
1 posts
CVE-2021-4463 - Longjing Technology BEMS API <= 1.21 Remote Arbitrary File Download https://cvefeed.io/vuln/detail/CVE-2021-4463
##updated 2025-11-13T00:30:24
1 posts
CVE-2022-4982 - DBLTek GoIP-1 vGHSFVT-1.1-67-5 Unauthenticated LFI https://cvefeed.io/vuln/detail/CVE-2022-4982
##updated 2025-11-13T00:30:24
1 posts
CVE-2017-20211 - UCanCode E-XD++ Visualization Enterprise Suite Untrusted Pointer Dereference RCE https://cvefeed.io/vuln/detail/CVE-2017-20211
##updated 2025-11-13T00:30:24
1 posts
CVE-2016-15055 - JVC VN-T IP-Camera Directory Traversal via check.cgi https://cvefeed.io/vuln/detail/CVE-2016-15055
##updated 2025-11-13T00:30:17
1 posts
CVE-2025-11560 - Team Members Showcase < 3.5.0 - Reflected XSS https://cvefeed.io/vuln/detail/CVE-2025-11560
##updated 2025-11-12T23:15:40.130000
1 posts
CVE-2025-64707 - Frappe LMS revoking access did not show immediate effect as roles were cached https://cvefeed.io/vuln/detail/CVE-2025-64707
##updated 2025-11-12T22:15:50.127000
1 posts
1 repos
CVE-2025-64500 - Symfony's incorrect parsing of PATH_INFO can lead to limited authorization bypass https://cvefeed.io/vuln/detail/CVE-2025-64500
##updated 2025-11-12T22:15:48.847000
1 posts
CVE-2025-59491 - CentralSquare Community Development XSS https://cvefeed.io/vuln/detail/CVE-2025-59491
##updated 2025-11-12T22:15:48.297000
1 posts
CVE-2025-43205 - Apple iOS/WatchOS/TVOS/VisonOS Memory Corruption https://cvefeed.io/vuln/detail/CVE-2025-43205
##updated 2025-11-12T22:15:42.027000
1 posts
CVE-2021-4464 - FIberHome AN5506-04-FA / HG6245D Routers Remote Stack Overflow https://cvefeed.io/vuln/detail/CVE-2021-4464
##updated 2025-11-12T21:45:07
1 posts
CVE-2025-64186 - Evervault Go SDK: Incomplete PCR Validation in Enclave Attestation for non-Evervault hosted Enclaves https://cvefeed.io/vuln/detail/CVE-2025-64186
##updated 2025-11-12T21:31:15
1 posts
📰 Dell Patches Critical 9.1 CVSS Flaw in Data Lakehouse Platform
Dell patches critical 9.1 CVSS vulnerability (CVE-2025-46608) in its Data Lakehouse platform. The flaw allows a remote, high-privileged attacker to gain elevated rights. Update to version 1.6.0.0 immediately! 🚨 #Dell #Vulnerability #PatchNow #InfoSec
##updated 2025-11-12T21:31:15
1 posts
CVE-2025-8485 - Lenovo App Store Elevation of Privilege Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-8485
##updated 2025-11-12T21:31:15
1 posts
CVE-2025-8421 - Lenovo Dock Manager Improper Default Permission Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-8421
##updated 2025-11-12T21:31:15
1 posts
CVE-2025-27368 - IBM OpenPages Information Disclosure https://cvefeed.io/vuln/detail/CVE-2025-27368
##updated 2025-11-12T21:31:14
1 posts
CVE-2025-46427 - Dell SmartFabric OS10 Command Injection Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-46427
##updated 2025-11-12T21:15:53.433000
2 posts
@dotstdy Also https://security-tracker.debian.org/tracker/CVE-2025-64170
##CVE-2025-64170 - sudo-rs: Partial password reveal is possible after timeout https://cvefeed.io/vuln/detail/CVE-2025-64170
##updated 2025-11-12T21:15:48.763000
1 posts
CVE-2025-13061 - itsourcecode Online Voting System index.php unrestricted upload https://cvefeed.io/vuln/detail/CVE-2025-13061
##updated 2025-11-12T21:14:53.247000
8 posts
CISA has added 3 new vulnerabilities to the KEV Catalog.
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2025-12480: Gladinet Triofox Improper Access Control Vulnerability
CVE-2025-62215: Microsoft Windows Race Condition Vulnerability
CVE-2025-9242: WatchGuard Firebox Out-of-Bounds Write Vulnerability
##CVE ID: CVE-2025-62215
Vendor: Microsoft
Product: Windows
Date Added: 2025-11-12
Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62215 ; https://nvd.nist.gov/vuln/detail/CVE-2025-62215
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-62215
CIA has updated the KEV catalogue.
CVE-2025-9242: WatchGuard Firebox Out-of-Bounds Write Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-9242
CVE-2025-62215: Microsoft Windows Race Condition Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-62215
CVE-2025-12480: Gladinet Triofox Improper Access Control Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-12480 #CISA #Microsoft #WIndows #infosec
##Patch Tuesday: Microsoft fixes actively exploited Windows kernel vulnerability (CVE-2025-62215) https://www.helpnetsecurity.com/2025/11/12/patch-tuesday-microsoft-cve-2025-62215/ #securityupdate #PatchTuesday #TrendMicro #Don'tmiss #Immersive #Microsoft #Hotstuff #MSOffice #Windows #Ivanti #Rapid7 #News
##Microsoft’s November 2025 Patch Tuesday addresses 68 vulnerabilities - with 5 critical and 1 zero-day (CVE-2025-62215) under active exploitation.
Critical flaws affect Windows Kernel, DirectX, Office, and GDI+, emphasizing the need for rapid patch cycles.
💬 How do you evaluate patch prioritization across hybrid environments?
#Microsoft #PatchTuesday #CyberSecurity #CVE #ZeroDay #WindowsUpdate #InfoSec #TechNadu
##Microsoft November 2025 Patch Tuesday fixes one exploited zero-day flaw, 63 total
Microsoft's November 2025 Patch Tuesday addresses 63 vulnerabilities including one actively exploited Windows Kernel zero-day (CVE-2025-62215) that enables attackers to escalate privileges to SYSTEM level through a race condition exploit, plus four critical-severity flaws affecting Office, Visual Studio, DirectX, and Nuance PowerScribe.
**This advisory is important and urgent: One zero-day vulnerabilities are being actively exploited in the wild. Patch your Windows Operating Systems ASAP, then Microsoft Office and Visual Studio. Then review the advisory for the rest of the Microsoft products and Windows components you use.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/microsoft-november-2025-patch-tuesday-fixes-one-zero-day-flaw-63-total-t-i-e-b-t/gD2P6Ple2L
updated 2025-11-12T20:15:42.953000
1 posts
CVE-2025-46428 - Dell SmartFabric OS10 Command Injection Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-46428
##updated 2025-11-12T20:15:39.357000
1 posts
CVE-2025-13060 - SourceCodester Survey Application System view_survey.php sql injection https://cvefeed.io/vuln/detail/CVE-2025-13060
##updated 2025-11-12T18:41:07.100000
1 posts
CVE-2025-64531 - Substance3D - Stager | Use After Free (CWE-416) https://cvefeed.io/vuln/detail/CVE-2025-64531
##updated 2025-11-12T18:40:52.677000
1 posts
CVE-2025-61834 - Substance3D - Stager | Use After Free (CWE-416) https://cvefeed.io/vuln/detail/CVE-2025-61834
##updated 2025-11-12T18:40:45.433000
1 posts
CVE-2025-61833 - Substance3D - Stager | Out-of-bounds Read (CWE-125) https://cvefeed.io/vuln/detail/CVE-2025-61833
##updated 2025-11-12T18:31:32
3 posts
🔧#Google випустила позапланове оновлення безпеки для браузера #Chrome, яке усуває критичну вразливість CVE-2025-13042 у механізмі JavaScript V8. Проблема стосується користувачів Chrome на Android, Linux, macOS та Windows.
Щось останнім часом забагато позапланових оновлень у хромі🤔
##CVE-2025-13042 - Google Chrome Heap Corruption Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-13042
##updated 2025-11-12T18:31:32
2 posts
CVE-2025-2843 - Observability-operator: observability operator privilege escalation https://cvefeed.io/vuln/detail/CVE-2025-2843
##CVE-2025-2843 - Observability-operator: observability operator privilege escalation https://cvefeed.io/vuln/detail/CVE-2025-2843
##updated 2025-11-12T18:31:32
1 posts
CVE-2025-11367 - N-central windows software probe Remote Code Execution https://cvefeed.io/vuln/detail/CVE-2025-11367
##updated 2025-11-12T18:31:32
1 posts
CVE-2025-20378 - Open Redirect on Web Login endpoint in Splunk Enterprise https://cvefeed.io/vuln/detail/CVE-2025-20378
##updated 2025-11-12T18:31:31
1 posts
CVE-2025-11366 - N-central Authentication bypass via path traversal https://cvefeed.io/vuln/detail/CVE-2025-11366
##updated 2025-11-12T18:31:25
2 posts
Heads-up to anyone still using OpenOffice.
https://www.openoffice.org/security/cves/CVE-2025-64401.html
https://www.openoffice.org/security/cves/CVE-2025-64402.html
https://www.openoffice.org/security/cves/CVE-2025-64403.html
https://www.openoffice.org/security/cves/CVE-2025-64404.html
https://www.openoffice.org/security/cves/CVE-2025-64405.html
https://www.openoffice.org/security/cves/CVE-2025-64406.html
https://www.openoffice.org/security/cves/CVE-2025-64407.html
##CVE-2025-64406 - Apache OpenOffice: Possible memory corruption during CSV import https://cvefeed.io/vuln/detail/CVE-2025-64406
##updated 2025-11-12T18:31:24
1 posts
CVE-2025-12871 - aEnrich|a+HRD - Authentication Abuse https://cvefeed.io/vuln/detail/CVE-2025-12871
##updated 2025-11-12T18:31:20
1 posts
Mozilla releases Firefox patches, fixes 15 vulnerabilities including sandbox escape flaws
Mozilla Firefox 145, released November 11, 2025, patches 15 security vulnerabilities including two sandbox escape flaws (CVE-2025-13023 and CVE-2025-13026) in WebGPU that could allow attackers to execute arbitrary code outside the browser's security boundaries.
**Update your Firefox browser and Thunderbird email client. Firefox fixed two sandbox escape vulnerabilities in WebGPU that could let attackers break out of the browser and run code on your computer. There are no exploits yet, but your browser and email client are the first line of access to the internet, so they will stumble on the exploits first. Better to update, all tabs reopen automatically.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/mozilla-releases-firefox-patches-fixes-15-vulnerabilities-including-sandbox-escape-flaws-p-c-n-d-4/gD2P6Ple2L
updated 2025-11-12T18:15:35.200000
1 posts
CVE-2025-25236 - VMware Workspace ONE UEM Information Disclosure https://cvefeed.io/vuln/detail/CVE-2025-25236
##updated 2025-11-12T18:15:35.030000
1 posts
CVE-2025-20379 - Risky command safeguards bypass using the “/services/streams/search“ REST endpoint through “q“ parameter in Splunk Enterprise https://cvefeed.io/vuln/detail/CVE-2025-20379
##updated 2025-11-12T17:15:36.727000
1 posts
CVE-2025-12870 - aEnrich|eHRD - Authentication Abuse https://cvefeed.io/vuln/detail/CVE-2025-12870
##updated 2025-11-12T16:20:22.257000
4 posts
2 repos
updated 2025-11-12T16:20:22.257000
4 posts
1 repos
updated 2025-11-12T16:19:59.103000
4 posts
RE: https://infosec.exchange/@cR0w/115537090378807136
CVE-2025-42890: the hardcoded credentials also appeared in the documentation "UID: MDBA and password: sqlany".
https://web.archive.org/web/20250729132909/https://help.sap.com/doc/4dbffc39d22945a7ac69af24995cc3dc/17.0/en-US/SQL-Anywhere-Monitor-Non-GUI-User-Guide.pdf
RE: https://infosec.exchange/@cR0w/115537090378807136
CVE-2025-42890: the hardcoded credentials also appeared in the documentation "UID: MDBA and password: sqlany".
https://web.archive.org/web/20250729132909/https://help.sap.com/doc/4dbffc39d22945a7ac69af24995cc3dc/17.0/en-US/SQL-Anywhere-Monitor-Non-GUI-User-Guide.pdf
Arctic Wolf: CVE-2025-42890: Hard-Coded Credentials in SAP SQL Anywhere Monitor (Non-GUI) https://arcticwolf.com/resources/blog-uk/cve-2025-42890-hard-coded-credentials-in-sap-sql-anywhere-monitor-non-gui/
SAP advisory, posted yesterday: https://support.sap.com/en/my-support/knowledge-base/security-notes-news/november-2025.html #SAP
#infosec
Hardcoded creds? In some SAP shit? I'm sure their cloud shit is just fine though. Let them keep burning your money.
##updated 2025-11-12T16:19:34.210000
1 posts
CVE-2025-59499 - Microsoft SQL Server Elevation of Privilege Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-59499
##updated 2025-11-12T16:19:12.850000
1 posts
CVE-2025-11700 - N-central importServiceFromFile XXE Injection https://cvefeed.io/vuln/detail/CVE-2025-11700
##updated 2025-11-12T16:19:12.850000
1 posts
CVE-2025-11567 - Citrix Vulnerability: Unsecured Installation Folder Permissions https://cvefeed.io/vuln/detail/CVE-2025-11567
##updated 2025-11-12T16:19:12.850000
1 posts
CVE-2025-40177 - accel/qaic: Fix bootlog initialization ordering https://cvefeed.io/vuln/detail/CVE-2025-40177
##updated 2025-11-12T16:19:12.850000
1 posts
CVE-2025-40173 - net/ip6_tunnel: Prevent perpetual tunnel growth https://cvefeed.io/vuln/detail/CVE-2025-40173
##updated 2025-11-12T16:19:12.850000
1 posts
CVE-2025-40169 - bpf: Reject negative offsets for ALU ops https://cvefeed.io/vuln/detail/CVE-2025-40169
##updated 2025-11-12T16:19:12.850000
1 posts
CVE-2025-12901 - Asgaros Forum <= 3.2.1 - Cross-Site Request Forgery to Subscription Settings Update https://cvefeed.io/vuln/detail/CVE-2025-12901
##updated 2025-11-12T16:19:12.850000
1 posts
CVE-2025-12087 - Wishlist and Save for later for Woocommerce <= 1.1.22 - Insecure Direct Object Reference to Authenticated (Subscriber+) Wishlist Item Deletion https://cvefeed.io/vuln/detail/CVE-2025-12087
##updated 2025-11-12T16:19:12.850000
1 posts
CVE-2025-40744 - "Solid Edge Certificate Validation Weakness" https://cvefeed.io/vuln/detail/CVE-2025-40744
##updated 2025-11-12T16:19:12.850000
1 posts
CVE-2024-32011 - Spectrum Power Command Injection Vulnerability https://cvefeed.io/vuln/detail/CVE-2024-32011
##updated 2025-11-12T16:19:12.850000
1 posts
CVE-2024-32010 - Spectrum Power 4 Database Credential Extraction and Command Injection Vulnerability https://cvefeed.io/vuln/detail/CVE-2024-32010
##updated 2025-11-12T16:19:12.850000
1 posts
CVE-2025-62452 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-62452
##updated 2025-11-12T16:19:12.850000
1 posts
CVE-2025-62220 - Windows Subsystem for Linux GUI Remote Code Execution Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-62220
##updated 2025-11-12T16:19:12.850000
1 posts
CVE-2025-60715 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-60715
##updated 2025-11-12T15:31:37
1 posts
CVE-2025-62876 - Lightdm-Kde-Greeter Execution Privilege Escalation Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-62876
##updated 2025-11-12T15:31:30
1 posts
CVE-2025-11566 - Apache HTTP Server Brute Force Authentication Bypass https://cvefeed.io/vuln/detail/CVE-2025-11566
##updated 2025-11-12T15:31:30
1 posts
CVE-2025-11565 - Apache Web Admin Path Traversal https://cvefeed.io/vuln/detail/CVE-2025-11565
##updated 2025-11-12T15:31:29
2 posts
Heads-up to anyone still using OpenOffice.
https://www.openoffice.org/security/cves/CVE-2025-64401.html
https://www.openoffice.org/security/cves/CVE-2025-64402.html
https://www.openoffice.org/security/cves/CVE-2025-64403.html
https://www.openoffice.org/security/cves/CVE-2025-64404.html
https://www.openoffice.org/security/cves/CVE-2025-64405.html
https://www.openoffice.org/security/cves/CVE-2025-64406.html
https://www.openoffice.org/security/cves/CVE-2025-64407.html
##CVE-2025-64401 - Apache OpenOffice: Remote documents loaded without prompt via IFrame https://cvefeed.io/vuln/detail/CVE-2025-64401
##updated 2025-11-12T15:31:29
1 posts
CVE-2025-61623 - Apache OFBiz: Reflected Cross-site Scripting https://cvefeed.io/vuln/detail/CVE-2025-61623
##updated 2025-11-12T14:51:21.057000
1 posts
📢 CVE-2025-52665 : RCE non authentifiée dans UniFi OS expose routeurs et contrôle d’accès Ubiquiti
📝 Selon gbhackers.com (Divya, 3 novembre 2025), des chercheurs ont découvert une vulnérabilité critique d’exécution de code à distance n...
📖 cyberveille : https://cyberveille.ch/posts/2025-11-12-cve-2025-52665-rce-non-authentifiee-dans-unifi-os-expose-routeurs-et-controle-dacces-ubiquiti/
🌐 source : https://gbhackers.com/critical-unifi-os-flaw/
#CVE_2025_52665 #RCE #Cyberveille
updated 2025-11-12T12:30:39
1 posts
CVE-2025-40175 - idpf: cleanup remaining SKBs in PTP flows https://cvefeed.io/vuln/detail/CVE-2025-40175
##updated 2025-11-12T12:30:38
1 posts
CVE-2025-40172 - accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages() https://cvefeed.io/vuln/detail/CVE-2025-40172
##updated 2025-11-12T12:30:38
1 posts
CVE-2025-40174 - x86/mm: Fix SMP ordering in switch_mm_irqs_off() https://cvefeed.io/vuln/detail/CVE-2025-40174
##updated 2025-11-12T12:30:37
1 posts
CVE-2025-40171 - nvmet-fc: move lsop put work to nvmet_fc_ls_req_op https://cvefeed.io/vuln/detail/CVE-2025-40171
##updated 2025-11-12T12:30:36
2 posts
CVE-2025-12998 - Broken Authentication in extension “Modules” (modules) https://cvefeed.io/vuln/detail/CVE-2025-12998
##CVE-2025-12998 - Broken Authentication in extension “Modules” (modules) https://cvefeed.io/vuln/detail/CVE-2025-12998
##updated 2025-11-12T12:30:36
1 posts
CVE-2025-40176 - tls: wait for pending async decryptions if tls_strp_msg_hold fails https://cvefeed.io/vuln/detail/CVE-2025-40176
##updated 2025-11-12T12:30:36
1 posts
CVE-2025-40170 - net: use dst_dev_rcu() in sk_setup_caps() https://cvefeed.io/vuln/detail/CVE-2025-40170
##updated 2025-11-12T12:30:34
2 posts
../ in another security tool.
https://techdocs.algosec.com/en/cves/Content/tech-notes/cves/cve-2025-12382.htm
##Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Algosec Firewall Analyzer on Linux, 64 bit allows Path Traversal, Code Injection.
CVE-2025-12382 - Path Traversal Allows Remote Code Execution in AlgoSec Firewall Analyzer https://cvefeed.io/vuln/detail/CVE-2025-12382
##updated 2025-11-12T09:30:33
1 posts
CVE-2025-12903 - Payment Plugins Braintree For WooCommerce <= 3.2.78 - Missing Authorization to Payment Token Exposure and Transaction Fraud https://cvefeed.io/vuln/detail/CVE-2025-12903
##updated 2025-11-12T09:30:33
1 posts
CVE-2025-13047 - ViewLead Technology|Bacteriology Laboratory Reporting System https://cvefeed.io/vuln/detail/CVE-2025-13047
##updated 2025-11-12T09:30:32
1 posts
CVE-2025-13046 - ViewLead Technology|Bacteriology Laboratory Reporting System - SQL Injection https://cvefeed.io/vuln/detail/CVE-2025-13046
##updated 2025-11-12T06:30:30
1 posts
CVE-2025-12833 - GeoDirectory – WP Business Directory Plugin and Classified Listings Directory <= 2.8.139 - Missing Authorization to Authenticated (Author+) Arbitrary Image Attachment https://cvefeed.io/vuln/detail/CVE-2025-12833
##updated 2025-11-12T06:30:24
1 posts
CVE-2025-54983 - Health check port on ZCC allows tunnel bypass https://cvefeed.io/vuln/detail/CVE-2025-54983
##updated 2025-11-12T03:30:37
1 posts
CVE-2025-40111 - drm/vmwgfx: Fix Use-after-free in validation https://cvefeed.io/vuln/detail/CVE-2025-40111
##updated 2025-11-12T03:30:26
1 posts
CVE-2025-40110 - drm/vmwgfx: Fix a null-ptr access in the cursor snooper https://cvefeed.io/vuln/detail/CVE-2025-40110
##updated 2025-11-11T21:30:39
2 posts
CVE-2025-40827 - Siemens Software Center/DLL Hijacking https://cvefeed.io/vuln/detail/CVE-2025-40827
##CVE-2025-40827 - Siemens Software Center/DLL Hijacking https://cvefeed.io/vuln/detail/CVE-2025-40827
##updated 2025-11-11T21:30:39
1 posts
CVE-2025-40815 - Siemens LOGO! TCP Packet Structure Validation Buffer Overflow https://cvefeed.io/vuln/detail/CVE-2025-40815
##updated 2025-11-11T21:30:39
1 posts
CVE-2025-40763 - "Altair Grid Engine Environment Variable Path Hijacking (Local Privilege Escalation)" https://cvefeed.io/vuln/detail/CVE-2025-40763
##updated 2025-11-11T21:30:39
1 posts
CVE-2024-32009 - Spectrum Power Privilege Escalation Vulnerability https://cvefeed.io/vuln/detail/CVE-2024-32009
##updated 2025-11-11T21:30:39
1 posts
CVE-2024-32008 - Spectrum Power 4 Local Privilege Escalation https://cvefeed.io/vuln/detail/CVE-2024-32008
##updated 2025-11-11T21:30:39
1 posts
CVE-2025-61835 - Substance3D - Stager | Integer Underflow (Wrap or Wraparound) (CWE-191) https://cvefeed.io/vuln/detail/CVE-2025-61835
##updated 2025-11-11T21:30:39
1 posts
CVE-2025-40817 - Siemens LOGO! Time Manipulation Remote Command Execution https://cvefeed.io/vuln/detail/CVE-2025-40817
##updated 2025-11-11T18:30:31
1 posts
CVE-2025-62222 - Agentic AI and Visual Studio Code Remote Code Execution Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-62222
##updated 2025-11-11T18:30:30
1 posts
Active Directory : Kerberos impacté par la CVE-2025-60704, quels sont les risques ? https://www.it-connect.fr/active-directory-kerberos-impacte-par-la-cve-2025-60704-quels-sont-les-risques/ #ActuCybersécurité #ActiveDirectory #Cybersécurité #Vulnérabilité
##updated 2025-11-11T18:30:30
2 posts
🔴 CRITICAL heap overflow (CVE-2025-60724) in MS Office LTSC for Mac 2021 (v16.0.1): Remote code execution possible—no auth or user action needed. Restrict network, monitor for abuse, and prep for patch. Details: https://radar.offseq.com/threat/cve-2025-60724-cwe-122-heap-based-buffer-overflow--8ba2b170 #OffSeq #CVE202560724 #macOS #InfoSec
##CVE-2025-60724 - GDI+ Remote Code Execution Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-60724
##updated 2025-11-11T18:30:25
1 posts
CVE-2025-30398 - Nuance PowerScribe 360 Information Disclosure Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-30398
##updated 2025-11-11T18:30:23
1 posts
CVE-2025-62211 - Dynamics 365 Field Service (online) Spoofing Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-62211
##updated 2025-11-11T18:30:23
1 posts
CVE-2025-62210 - Dynamics 365 Field Service (online) Spoofing Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-62210
##updated 2025-11-11T18:30:23
1 posts
CVE-2025-62204 - Microsoft SharePoint Remote Code Execution Vulnerability https://cvefeed.io/vuln/detail/CVE-2025-62204
##updated 2025-11-11T15:31:27
4 posts
1 repos
There's a CitrixBleed 4? When was 3?
##New.
WatchTower: Is It CitrixBleed4? Well, No. Is It Good? Also, No. (Citrix NetScaler Memory Leak & RXSS CVE-2025-12101) https://labs.watchtowr.com/is-it-citrixbleed4-well-no-is-it-good-also-no-citrix-netscalers-memory-leak-rxss-cve-2025-12101/ #infoec #threatresearch
##I see the Internet survived Patch Tuesday. Again. Which is unfortunate. But at least we got a new watchTowr Labs post.
##Is It CitrixBleed4? Well, No. Is It Good? Also, No. (Citrix NetScaler Memory Leak & RXSS CVE-2025-12101) - watchTowr Labs https://labs.watchtowr.com/is-it-citrixbleed4-well-no-is-it-good-also-no-citrix-netscalers-memory-leak-rxss-cve-2025-12101/
##updated 2025-11-11T03:30:36
1 posts
🚨 Urgent patch alert: a 9.9/10 severity flaw (CVE-2025-42887) in #SAP Solution Manager allows code injection and full system takeover. Act now.
Read: https://hackread.com/sap-patch-cve-2025-42887-takeover-vulnerability/
##updated 2025-11-07T15:44:35.293000
2 posts
1 repos
New updates from Cisco. These are just the top three. There are seven of them.
Critical: CVE-2025-20354 and CVE-2025-20358: Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-unauth-rce-QeN8h7mQ
New: High vulnerability CVE-2025-20341: Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catc-priv-esc-VS8EeCuX
New. CVE-2025-20346, medium severity: Cisco Catalyst Center Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-privesc-catc-rYjReeLU @TalosSecurity #infosec #vulnerability
##New updates from Cisco. These are just the top three. There are seven of them.
Critical: CVE-2025-20354 and CVE-2025-20358: Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-unauth-rce-QeN8h7mQ
New: High vulnerability CVE-2025-20341: Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catc-priv-esc-VS8EeCuX
New. CVE-2025-20346, medium severity: Cisco Catalyst Center Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-privesc-catc-rYjReeLU @TalosSecurity #infosec #vulnerability
##updated 2025-11-06T23:12:38
4 posts
3 repos
https://github.com/sahar042/CVE-2025-31133
updated 2025-11-05T17:48:34
2 posts
New updates from Cisco. These are just the top three. There are seven of them.
Critical: CVE-2025-20354 and CVE-2025-20358: Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-unauth-rce-QeN8h7mQ
New: High vulnerability CVE-2025-20341: Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catc-priv-esc-VS8EeCuX
New. CVE-2025-20346, medium severity: Cisco Catalyst Center Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-privesc-catc-rYjReeLU @TalosSecurity #infosec #vulnerability
##New updates from Cisco. These are just the top three. There are seven of them.
Critical: CVE-2025-20354 and CVE-2025-20358: Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-unauth-rce-QeN8h7mQ
New: High vulnerability CVE-2025-20341: Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catc-priv-esc-VS8EeCuX
New. CVE-2025-20346, medium severity: Cisco Catalyst Center Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-privesc-catc-rYjReeLU @TalosSecurity #infosec #vulnerability
##updated 2025-11-05T00:32:31
1 posts
1 repos
And now they ( publicly ) addressed CVE-2025-40778.
https://my.f5.com/manage/s/article/K000157334
##Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
updated 2025-11-03T21:33:13
2 posts
🚨8 months after public disclosure, RHEL, @almalinux and @rockylinux are still vulnerable for a Ghostscript RCE with a reliable public exploit (CVE-2025-27835 and others)! It can be triggered by opening LibreOffice docs or through a server that uses ImageMagick for file conversion!
##Red Hat is aware, but they chose not to fix it. They also assigned a low CVSS score 5.5 because it is supposed to be "only exploitable locally" even though many web apps process uploaded documents using Ghostscript:
##updated 2025-11-03T18:32:46
1 posts
updated 2025-10-28T13:58:58.610000
1 posts
“Patched” but still exposed: US federal agencies must remediate Cisco flaws (again) https://www.helpnetsecurity.com/2025/11/13/cisa-directive-cve-2025-20333-cve-2025-20362/ #vulnerability #government #Don'tmiss #Hotstuff #patching #Cisco #News #CISA
##updated 2025-10-27T15:13:04
1 posts
1 repos
🪤 TARmageddon (CVE-2025-62518): RCE Vulnerability Highlights the Challenges of Open Source Abandonware
「 In the worst-case scenario, this vulnerability has a severity of 8.1 (High) and can lead to Remote Code Execution (RCE) through file overwriting attacks, such as replacing configuration files or hijacking build backends 」
##updated 2025-10-24T13:42:55.550000
2 posts
14 repos
https://github.com/byte4RR4Y/CVE-2023-4966
https://github.com/akshthejo/CVE-2023-4966-exploit
https://github.com/0xKayala/CVE-2023-4966
https://github.com/certat/citrix-logchecker
https://github.com/s-bt/CVE-2023-4966
https://github.com/jmussmann/cve-2023-4966-iocs
https://github.com/IceBreakerCode/CVE-2023-4966
https://github.com/RevoltSecurities/CVE-2023-4966
https://github.com/morganwdavis/overread
https://github.com/LucasOneZ/CVE-2023-4966
https://github.com/dinosn/citrix_cve-2023-4966
https://github.com/mlynchcogent/CVE-2023-4966-POC
Citrix disclosed CVE-2025-5777 in June, and researcher Kevin Beaumont quickly dubbed it CitrixBleed 2 due to its similarities to the original CitrixBleed (CVE-2023-4966). https://www.darkreading.com/vulnerabilities-threats/citrixbleed-2-cisco-zero-day-bugs
##Citrix disclosed CVE-2025-5777 in June, and researcher Kevin Beaumont quickly dubbed it CitrixBleed 2 due to its similarities to the original CitrixBleed (CVE-2023-4966). https://www.darkreading.com/vulnerabilities-threats/citrixbleed-2-cisco-zero-day-bugs
##updated 2025-10-22T00:34:26
3 posts
1 repos
APT Group Exploits Zero-Days in Cisco and Citrix Systems
Amazon’s MadPot honeypot service detected the exploitation attempts, leading to the identification of CVE-2025-5777 and CVE-2025-20337. The threat actor deployed a custom web shell disguised as a legitimate component, operating in-memory and using Java reflection for stealth.
https://cyberdigests.com/article/apt-group-exploits-zero-days-in-cisco-and-citrix-systems
##Zero-Day Vulnerabilities in Cisco and Citrix Targeted by APT Group, Amazon Confirms https://thecyberexpress.com/cve-2025-20337-cve-2025-5777-exploits/ #zerodayvulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202520337 #CVE20255777 #CyberNews #Citrix #Cisco #APT
##Hackers exploited Citrix, Cisco ISE flaws in zero-day attacks
An advanced threat actor exploited the critical vulnerabilities "Citrix Bleed 2" (CVE-2025-5777) in NetScaler ADC and Gateway, and CVE-2025-20337...
🔗️ [Bleepingcomputer] https://link.is.it/aFw9S5
##updated 2025-10-22T00:34:26
1 posts
“Patched” but still exposed: US federal agencies must remediate Cisco flaws (again) https://www.helpnetsecurity.com/2025/11/13/cisa-directive-cve-2025-20333-cve-2025-20362/ #vulnerability #government #Don'tmiss #Hotstuff #patching #Cisco #News #CISA
##updated 2025-10-22T00:34:22
7 posts
22 repos
https://github.com/bughuntar/CVE-2025-5777
https://github.com/0xgh057r3c0n/CVE-2025-5777
https://github.com/win3zz/CVE-2025-5777
https://github.com/fox-it/citrix-netscaler-triage
https://github.com/RaR1991/citrix_bleed_2
https://github.com/FrenzisRed/CVE-2025-5777
https://github.com/cyberleelawat/ExploitVeer
https://github.com/orange0Mint/CitrixBleed-2-CVE-2025-5777
https://github.com/Shivshantp/CVE-2025-5777-TrendMicro-ApexCentral-RCE
https://github.com/idobarel/CVE-2025-5777
https://github.com/below0day/Honeypot-Logs-CVE-2025-5777
https://github.com/Chocapikk/CVE-2025-5777
https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-
https://github.com/rootxsushant/Citrix-NetScaler-Memory-Leak-CVE-2025-5777
https://github.com/ndr-repo/CVE-2025-5777
https://github.com/SleepNotF0und/CVE-2025-5777
https://github.com/soltanali0/CVE-2025-5777-Exploit
https://github.com/nocerainfosec/cve-2025-5777
https://github.com/rob0tstxt/POC-CVE-2025-5777
https://github.com/B1ack4sh/Blackash-CVE-2025-57773
APT Group Exploits Zero-Days in Cisco and Citrix Systems
Amazon’s MadPot honeypot service detected the exploitation attempts, leading to the identification of CVE-2025-5777 and CVE-2025-20337. The threat actor deployed a custom web shell disguised as a legitimate component, operating in-memory and using Java reflection for stealth.
https://cyberdigests.com/article/apt-group-exploits-zero-days-in-cisco-and-citrix-systems
##Citrix disclosed CVE-2025-5777 in June, and researcher Kevin Beaumont quickly dubbed it CitrixBleed 2 due to its similarities to the original CitrixBleed (CVE-2023-4966). https://www.darkreading.com/vulnerabilities-threats/citrixbleed-2-cisco-zero-day-bugs
##Citrix disclosed CVE-2025-5777 in June, and researcher Kevin Beaumont quickly dubbed it CitrixBleed 2 due to its similarities to the original CitrixBleed (CVE-2023-4966). https://www.darkreading.com/vulnerabilities-threats/citrixbleed-2-cisco-zero-day-bugs
##AWS dug through its honeypot data and confirmed that CVE-2025-5777 (Cisco ISE RCE) and CVE-2025-5777 (memory leak in Citrix NetScaler) were exploited as zero-days before their patches.
Nothing new here except the confirmation that an APT was behind the attacks
https://aws.amazon.com/blogs/security/amazon-discovers-apt-exploiting-cisco-and-citrix-zero-days/
##Zero-Day Vulnerabilities in Cisco and Citrix Targeted by APT Group, Amazon Confirms https://thecyberexpress.com/cve-2025-20337-cve-2025-5777-exploits/ #zerodayvulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202520337 #CVE20255777 #CyberNews #Citrix #Cisco #APT
##‘Advanced’ hacker seen exploiting Cisco, Citrix zero-days
The hackers notably used custom malware and were exploiting CVE-2025-5777 — now known colloquially as “Citrix Bleed Two” — before it was disclosed...
🔗️ [Therecord] https://link.is.it/HyrRC5
##Hackers exploited Citrix, Cisco ISE flaws in zero-day attacks
An advanced threat actor exploited the critical vulnerabilities "Citrix Bleed 2" (CVE-2025-5777) in NetScaler ADC and Gateway, and CVE-2025-20337...
🔗️ [Bleepingcomputer] https://link.is.it/aFw9S5
##updated 2025-10-22T00:34:06
2 posts
41 repos
https://github.com/HackingLZ/panrapidcheck
https://github.com/nanwinata/CVE-2024-3400
https://github.com/FoxyProxys/CVE-2024-3400
https://github.com/LoanVitor/CVE-2024-3400-
https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection
https://github.com/momika233/CVE-2024-3400
https://github.com/index2014/CVE-2024-3400-Checker
https://github.com/pwnj0hn/CVE-2024-3400
https://github.com/CONDITIONBLACK/CVE-2024-3400-POC
https://github.com/zam89/CVE-2024-3400-pot
https://github.com/0x0d3ad/CVE-2024-3400
https://github.com/ZephrFish/CVE-2024-3400-Canary
https://github.com/h4x0r-dz/CVE-2024-3400
https://github.com/Kr0ff/cve-2024-3400
https://github.com/ihebski/CVE-2024-3400
https://github.com/Ravaan21/CVE-2024-3400
https://github.com/Yafiah-Darwesh/cs50-cyber-paloalto-oauth
https://github.com/codeblueprint/CVE-2024-3400
https://github.com/MrR0b0t19/CVE-2024-3400
https://github.com/tfrederick74656/cve-2024-3400-poc
https://github.com/ak1t4/CVE-2024-3400
https://github.com/workshop748/CVE-2024-3400
https://github.com/retkoussa/CVE-2024-3400
https://github.com/schooldropout1337/CVE-2024-3400
https://github.com/hahasagined/CVE-2024-3400
https://github.com/CyprianAtsyor/letsdefend-cve2024-3400-case-study
https://github.com/CerTusHack/CVE-2024-3400-PoC
https://github.com/terminalJunki3/CVE-2024-3400-Checker
https://github.com/Chocapikk/CVE-2024-3400
https://github.com/W01fh4cker/CVE-2024-3400-RCE-Scan
https://github.com/XiaomingX/CVE-2024-3400-poc
https://github.com/marconesler/CVE-2024-3400
https://github.com/sxyrxyy/CVE-2024-3400-Check
https://github.com/andrelia-hacks/CVE-2024-3400
https://github.com/Yuvvi01/CVE-2024-3400
https://github.com/iwallarm/cve-2024-3400
https://github.com/AdaniKamal/CVE-2024-3400
https://github.com/swaybs/CVE-2024-3400
https://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker
It's not too late to depress @neurovagrant!
Worked backwards from an uptick in Palo Alto PAN-OS CVE-2024-3400 RCE Attempts
Most hits from U.S. cloud infra. Second was combo of Netherlands/Switzerland & two significant JA4t clusters:
- 33280_2-4-8-1-3_65495_7 (mostly US)
- 64240_2-4-8-1-3_1460_7 (others)
The oddly high MSS in the first is an increasing "thing". TTL of 7 for both does help suggest this is a coordinated poke for and exploitation of enterprise "edge" kit.
##It's not too late to depress @neurovagrant!
Worked backwards from an uptick in Palo Alto PAN-OS CVE-2024-3400 RCE Attempts
Most hits from U.S. cloud infra. Second was combo of Netherlands/Switzerland & two significant JA4t clusters:
- 33280_2-4-8-1-3_65495_7 (mostly US)
- 64240_2-4-8-1-3_1460_7 (others)
The oddly high MSS in the first is an increasing "thing". TTL of 7 for both does help suggest this is a coordinated poke for and exploitation of enterprise "edge" kit.
##updated 2025-10-22T00:15:58.547000
1 posts
15 repos
https://github.com/kimocoder/eternalblue
https://github.com/luckyman2907/SMB-Protocol-Vulnerability_CVE-2017-0144
https://github.com/denuwanjayasekara/CVE-Exploitation-Reports
https://github.com/peterpt/eternal_scanner
https://github.com/B1ack4sh/Blackash-CVE-2017-0144
https://github.com/AdityaBhatt3010/VAPT-Report-on-SMB-Exploitation-in-Windows-10-Finance-Endpoint
https://github.com/nivedh-j/EternalBlue-Explained
https://github.com/quynhold/Detect-CVE-2017-0144-attack
https://github.com/AtithKhawas/autoblue
https://github.com/EEsshq/CVE-2017-0144---EtneralBlue-MS17-010-Remote-Code-Execution
https://github.com/sethwhy/BlueDoor
https://github.com/AnugiArrawwala/CVE-Research
https://github.com/ducanh2oo3/Vulnerability-Research-CVE-2017-0144
https://github.com/pelagornisandersi/WIndows-7-automated-exploitation-using-metasploit-framework-
https://github.com/MedX267/EternalBlue-Vulnerability-Scanner
From the ESET APT Activity Report:
##In August, we gained greater insight into a post-compromise toolkit used by Konni. ESET software was installed on an already compromised machine in Uzbekistan and during the initial scan we detected a Konni backdoor, custom reverse TCP tunnel software, a copy of the RDP Wrapper library, and a custom
tool that uses the EternalBlue exploit for vulnerability CVE-2017-0144.
updated 2025-05-05T18:30:44
1 posts
2 repos
Check out how Billy Ellis dives into 1-click iOS browser exploits, walking through CVE-2020-9802, a JIT bug.
Great step-by-step explanation of how WebKit and JavaScriptCore vulnerabilities are exploited.
updated 2025-03-31T21:32:40
2 posts
1 repos
⚪ Sad Guard. Identifying and exploiting vulnerability in AdGuard driver for Windows
🗨️ Last year, I discovered a binary bug in the AdGuard driver. Its ID in the National Vulnerability Database is CVE-2022-45770. I was disassembling the ad blocker and found a way to use the identified vulnerability for local privilege escalation.…
##⚪ Sad Guard. Identifying and exploiting vulnerability in AdGuard driver for Windows
🗨️ Last year, I discovered a binary bug in the AdGuard driver. Its ID in the National Vulnerability Database is CVE-2022-45770. I was disassembling the ad blocker and found a way to use the identified vulnerability for local privilege escalation.…
##This kind of feels like another you had one job thing.
##ZITADEL is an open source identity management platform. Starting in version 2.50.0 and prior to versions 2.71.19, 3.4.4, and 4.6.6, a vulnerability in ZITADEL's federation process allowed auto-linking users from external identity providers to existing users in ZITADEL even if the corresponding IdP was not active or if the organization did not allow federated authentication. This vulnerability stems from the platform's failure to correctly check or enforce an organization's specific security settings during the authentication flow. An Organization Administrator can explicitly disable an IdP or disallow federation, but this setting was not being honored during the auto-linking process. This allowed an unauthenticated attacker to initiate a login using an IdP that should have been disabled for that organization. The platform would incorrectly validate the login and, based on a matching criteria, link the attacker's external identity to an existing internal user account. This may result in a full Account Takeover, bypassing the organization's mandated security controls. Note that accounts with MFA enabled can not be taken over by this attack. Also note that only IdPs create on an instance level would allow this to work. IdPs registered on another organization would always be denied in the (auto-)linking process. Versions 4.6.6, 3.4.4, and 2.71.19 resolve the issue by correctly validating the organization's login policy before auto-linking an external user. No known workarounds are available aside from upgrading.
This kind of feels like another you had one job thing.
##ZITADEL is an open source identity management platform. Starting in version 2.50.0 and prior to versions 2.71.19, 3.4.4, and 4.6.6, a vulnerability in ZITADEL's federation process allowed auto-linking users from external identity providers to existing users in ZITADEL even if the corresponding IdP was not active or if the organization did not allow federated authentication. This vulnerability stems from the platform's failure to correctly check or enforce an organization's specific security settings during the authentication flow. An Organization Administrator can explicitly disable an IdP or disallow federation, but this setting was not being honored during the auto-linking process. This allowed an unauthenticated attacker to initiate a login using an IdP that should have been disabled for that organization. The platform would incorrectly validate the login and, based on a matching criteria, link the attacker's external identity to an existing internal user account. This may result in a full Account Takeover, bypassing the organization's mandated security controls. Note that accounts with MFA enabled can not be taken over by this attack. Also note that only IdPs create on an instance level would allow this to work. IdPs registered on another organization would always be denied in the (auto-)linking process. Versions 4.6.6, 3.4.4, and 2.71.19 resolve the issue by correctly validating the organization's login policy before auto-linking an external user. No known workarounds are available aside from upgrading.
Perfect example of how risk models differ and CVSS scores need to be contextualized for your use case.
sev:LOW 1.3 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
##Frappe Learning is a learning system that helps users structure their content. Starting in version 2.0.0 and prior to version 2.41.0, users were able to access the submissions made by other students The issue has been fixed in version 2.41.0 by ensuring proper roles and redirecting if accessed via direct URL.
Perfect example of how risk models differ and CVSS scores need to be contextualized for your use case.
sev:LOW 1.3 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U
##Frappe Learning is a learning system that helps users structure their content. Starting in version 2.0.0 and prior to version 2.41.0, users were able to access the submissions made by other students The issue has been fixed in version 2.41.0 by ensuring proper roles and redirecting if accessed via direct URL.
CVE-2025-64705 - Frappe user was able to access the submission of other students https://cvefeed.io/vuln/detail/CVE-2025-64705
##CVE-2025-64716 - Anubis vulnerable to possible XSS via redir parameter when using subrequest auth mode https://cvefeed.io/vuln/detail/CVE-2025-64716
##CVE-2025-64710 - Bitplatform Boilerplate has cross-site scripting vulnerability https://cvefeed.io/vuln/detail/CVE-2025-64710
##CVE-2025-64523 - FileBrowser has Insecure Direct Object Reference (IDOR) in Share Deletion Function https://cvefeed.io/vuln/detail/CVE-2025-64523
##CVE-2025-64503 - [BIGSLEEP-434615384] cups-filters 1.x: out of bounds write in pdftoraster https://cvefeed.io/vuln/detail/CVE-2025-64503
##CVE-2025-64482 - Tuleap missing CSRF protections in the File Release System https://cvefeed.io/vuln/detail/CVE-2025-64482
##CVE-2025-64117 - Tuleap missing CSRF protection in the management of SVN commit rules and immutable tags https://cvefeed.io/vuln/detail/CVE-2025-64117
##