## Updated at UTC 2025-11-13T19:19:59.525234

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2025-60694 7.5 0.00% 2 0 2025-11-13T18:31:17 A stack-based buffer overflow exists in the validate_static_route function of th
CVE-2025-60691 8.8 0.00% 2 0 2025-11-13T18:31:17 A stack-based buffer overflow exists in the httpd binary of Linksys E1200 v2 rou
CVE-2025-60692 8.4 0.00% 2 0 2025-11-13T18:31:17 A stack-based buffer overflow vulnerability exists in the libshared.so library o
CVE-2025-60689 5.4 0.00% 2 0 2025-11-13T18:31:17 An unauthenticated command injection vulnerability exists in the Start_EPI funct
CVE-2025-60695 5.9 0.00% 2 0 2025-11-13T18:31:16 A stack-based buffer overflow vulnerability exists in the mtk_dut binary of Link
CVE-2025-60690 8.8 0.00% 2 0 2025-11-13T18:31:16 A stack-based buffer overflow exists in the get_merge_ipaddr function of the htt
CVE-2025-60688 6.5 0.00% 2 0 2025-11-13T18:31:16 A stack buffer overflow vulnerability exists in the ToToLink LR1200GB (V9.1.0u.6
CVE-2025-60686 5.1 0.00% 2 0 2025-11-13T18:31:11 A local stack-based buffer overflow vulnerability exists in the infostat.cgi and
CVE-2025-60687 6.5 0.00% 2 0 2025-11-13T18:31:11 An unauthenticated command injection vulnerability exists in the ToToLink LR1200
CVE-2025-60683 6.5 0.00% 2 0 2025-11-13T18:31:11 A command injection vulnerability exists in the ToToLink A720R Router firmware V
CVE-2025-64383 6.5 0.03% 1 0 2025-11-13T18:31:05 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
CVE-2025-64380 6.5 0.03% 1 0 2025-11-13T18:31:05 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
CVE-2025-64379 4.3 0.02% 1 0 2025-11-13T18:31:04 Missing Authorization vulnerability in Pluggabl Booster for WooCommerce woocomme
CVE-2025-64370 5.3 0.02% 1 0 2025-11-13T18:31:04 Missing Authorization vulnerability in YOP YOP Poll yop-poll allows Exploiting I
CVE-2025-63666 9.8 0.03% 1 1 2025-11-13T18:31:03 Tenda AC15 v15.03.05.18_multi) issues an authentication cookie that exposes the
CVE-2025-60701 0 0.00% 2 0 2025-11-13T18:15:54.137000 A command injection vulnerability exists in the D-Link DIR-882 Router firmware D
CVE-2025-60700 0 0.00% 2 0 2025-11-13T18:15:54.010000 A command injection vulnerability exists in the D-Link DIR-882 Router firmware D
CVE-2025-60698 0 0.00% 2 0 2025-11-13T18:15:53.880000 A command injection vulnerability exists in the D-Link DIR-882 Router firmware D
CVE-2025-60697 0 0.00% 2 0 2025-11-13T18:15:53.753000 A command injection vulnerability exists in the D-Link DIR-882 Router firmware D
CVE-2025-60696 8.4 0.00% 2 0 2025-11-13T18:15:53.587000 A stack-based buffer overflow vulnerability exists in the makeRequest.cgi binary
CVE-2025-60693 6.5 0.00% 2 0 2025-11-13T18:15:53.040000 A stack-based buffer overflow exists in the get_merge_mac function of the httpd
CVE-2025-60685 5.1 0.00% 2 0 2025-11-13T18:15:51.567000 A stack buffer overflow exists in the ToToLink A720R Router firmware V4.1.5cu.61
CVE-2025-60684 6.5 0.00% 2 0 2025-11-13T18:15:51.387000 A stack buffer overflow vulnerability exists in the ToToLink LR1200GB (V9.1.0u.6
CVE-2025-60682 6.5 0.00% 2 0 2025-11-13T18:15:51.023000 A command injection vulnerability exists in the ToToLink A720R Router firmware V
CVE-2025-60671 0 0.00% 2 0 2025-11-13T18:15:50.877000 A command injection vulnerability exists in the D-Link DIR-823G router firmware
CVE-2025-59480 6.1 0.00% 2 0 2025-11-13T18:15:50.703000 Mattermost Mobile Apps versions <=2.32.0 fail to verify that SSO redirect tokens
CVE-2025-11777 3.1 0.00% 2 0 2025-11-13T18:15:49.393000 Mattermost versions 10.11.x <= 10.11.3, 10.5.x <= 10.5.11 fail to properly valid
CVE-2025-12762 9.1 0.00% 3 0 2025-11-13T17:39:19 pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnera
CVE-2025-64407 5.3 0.11% 1 0 2025-11-13T17:15:50.523000 Apache OpenOffice documents can contain links. A missing Authorization vulnerabi
CVE-2025-20346 4.3 0.00% 2 0 2025-11-13T17:15:45.630000 A vulnerability in Cisco Catalyst Center could allow an authenticated, remote at
CVE-2025-20341 8.8 0.00% 3 0 2025-11-13T17:15:45.400000 A vulnerability in Cisco Catalyst Center Virtual Appliance could allow an authen
CVE-2025-64382 4.3 0.02% 1 0 2025-11-13T16:15:55.877000 Missing Authorization vulnerability in WebToffee Order Export & Order Import for
CVE-2025-13118 6.3 0.00% 1 0 2025-11-13T16:15:50.843000 A vulnerability was detected in macrozheng mall-swarm up to 1.0.3. Affected by t
CVE-2025-13023 9.8 0.02% 1 0 2025-11-13T16:15:50.533000 Sandbox escape due to incorrect boundary conditions in the Graphics: WebGPU comp
CVE-2025-64517 4.4 0.02% 2 0 2025-11-13T15:36:04 ### Summary When `Defaults targetpw` (or `Defaults rootpw`) is enabled, the pass
CVE-2025-9242 9.8 60.33% 4 1 template 2025-11-13T15:31:32 An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remot
CVE-2025-64404 7.5 0.01% 2 0 2025-11-13T15:31:32 Apache OpenOffice documents can contain links to other files. A missing Authoriz
CVE-2025-64405 7.5 0.01% 2 0 2025-11-13T15:31:32 Apache OpenOffice documents can contain links. A missing Authorization vulnerabi
CVE-2025-30662 6.6 0.00% 1 0 2025-11-13T15:30:38 Symlink following in the installer for the Zoom Workplace VDI Plugin macOS Unive
CVE-2025-12817 3.1 0.00% 2 0 2025-11-13T15:30:37 Missing authorization in PostgreSQL CREATE STATISTICS command allows a table own
CVE-2025-12764 7.5 0.00% 2 0 2025-11-13T15:30:37 pgAdmin <= 9.9  is affected by an LDAP injection vulnerability in the LDAP authe
CVE-2025-64741 8.1 0.00% 2 0 2025-11-13T15:30:37 Improper authorization handling in Zoom Workplace for Android before version 6.5
CVE-2025-62483 5.3 0.00% 1 0 2025-11-13T15:30:37 Improper removal of sensitive information in certain Zoom Clients before version
CVE-2025-13119 4.3 0.00% 1 0 2025-11-13T15:30:37 A flaw has been found in Fabian Ros/SourceCodester Simple E-Banking System 1.0.
CVE-2025-30669 4.8 0.00% 1 0 2025-11-13T15:30:31 Improper certificate validation in certain Zoom Clients may allow an unauthentic
CVE-2025-64739 4.3 0.00% 1 0 2025-11-13T15:30:31 External control of file name or path in certain Zoom Clients may allow an unaut
CVE-2025-12763 6.8 0.00% 2 0 2025-11-13T15:30:30 pgAdmin 4 versions up to 9.9 are affected by a command injection vulnerability o
CVE-2025-64740 7.5 0.00% 1 0 2025-11-13T15:15:53.820000 Improper verification of cryptographic signature in the installer for Zoom Workp
CVE-2025-64711 3.9 0.01% 1 0 2025-11-13T15:15:52.707000 PrivateBin is an online pastebin where the server has zero knowledge of pasted d
CVE-2025-62482 4.3 0.00% 1 0 2025-11-13T15:15:51.697000 Cross-site scripting in Zoom Workplace for Windows before version 6.5.10 may all
CVE-2025-13117 5.4 0.00% 1 0 2025-11-13T15:15:50.463000 A security vulnerability has been detected in macrozheng mall-swarm up to 1.0.3.
CVE-2025-13076 4.7 0.03% 1 0 2025-11-13T15:15:50.250000 A flaw has been found in code-projects Responsive Hotel Site 1.0. The affected e
CVE-2025-12735 9.8 0.12% 1 0 2025-11-13T15:15:49.590000 The expr-eval library is a JavaScript expression parser and evaluator designed t
CVE-2023-7326 0 0.15% 1 0 2025-11-13T15:15:48.983000 The Epson Stylus SX510W embedded web management service fails to properly handle
CVE-2025-64402 6.5 0.03% 2 0 2025-11-13T15:08:55.247000 Apache OpenOffice documents can contain links. A missing Authorization vulnerabi
CVE-2025-64403 8.1 0.03% 3 0 2025-11-13T15:08:42.313000 Apache OpenOffice Calc spreadsheet can contain links to other files, in the form
CVE-2025-12480 9.1 52.34% 5 1 template 2025-11-13T15:07:03.620000 Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access
CVE-2025-59118 7.3 0.05% 2 1 2025-11-13T15:04:59.130000 Unrestricted Upload of File with Dangerous Type vulnerability in Apache OFBiz.
CVE-2025-12765 7.5 0.00% 2 0 2025-11-13T14:15:47.873000 pgAdmin <= 9.9  is affected by a vulnerability in the LDAP authentication mechan
CVE-2025-12818 5.9 0.00% 2 0 2025-11-13T13:15:45.313000 Integer wraparound in multiple PostgreSQL libpq client library functions allows
CVE-2025-64384 None 0.02% 1 0 2025-11-13T12:32:48 Missing Authorization vulnerability in jetmonsters JetFormBuilder jetformbuilder
CVE-2025-64292 None 0.03% 1 0 2025-11-13T12:32:46 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
CVE-2025-7704 5.4 0.04% 1 0 2025-11-13T10:15:54.823000 Supermicro BMC Insyde SMASH shell program has a stacked-based overflow vulnerab
CVE-2025-64381 0 0.03% 1 0 2025-11-13T10:15:54.180000 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripti
CVE-2025-64369 0 0.02% 1 0 2025-11-13T10:15:53.423000 Missing Authorization vulnerability in codepeople Contact Form Email contact-for
CVE-2025-12733 8.8 0.22% 2 0 2025-11-13T06:30:30 The Import any XML, CSV or Excel File to WordPress (WP All Import) plugin for Wo
CVE-2025-12620 4.9 0.02% 1 0 2025-11-13T06:30:30 The Poll Maker – Versus Polls, Anonymous Polls, Image Polls plugin for WordPress
CVE-2025-12536 5.3 0.04% 1 0 2025-11-13T06:30:30 The SureForms plugin for WordPress is vulnerable to Sensitive Information Exposu
CVE-2025-12366 4.3 0.03% 1 0 2025-11-13T06:30:30 The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress
CVE-2025-12089 6.5 0.99% 1 0 2025-11-13T06:30:30 The Data Tables Generator by Supsystic plugin for WordPress is vulnerable to arb
CVE-2025-12891 5.3 0.05% 1 0 2025-11-13T05:16:03.007000 The Survey Maker plugin for WordPress is vulnerable to unauthorized access of da
CVE-2025-12979 5.3 0.05% 1 0 2025-11-13T04:15:46.730000 The Welcart e-Commerce plugin for WordPress is vulnerable to unauthorized access
CVE-2025-12892 5.3 0.05% 1 0 2025-11-13T04:15:46.537000 The Survey Maker plugin for WordPress is vulnerable to unauthorized modification
CVE-2025-11923 8.8 0.04% 2 0 2025-11-13T04:15:44.543000 The LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes plugin for WordP
CVE-2025-59367 None 0.23% 1 0 2025-11-13T03:31:30 An authentication bypass vulnerability has been identified in certain DSL series
CVE-2025-59089 5.9 0.05% 1 0 2025-11-13T00:31:26 If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (
CVE-2025-59088 8.6 0.04% 2 0 2025-11-13T00:31:25 If kdcproxy receives a request for a realm which does not have server addresses
CVE-2025-63419 6.1 0.03% 1 1 2025-11-13T00:31:25 Cross Site Scripting (XSS) vulnerability in CrushFTP 11.3.6_48. The Web-Based Se
CVE-2025-52331 6.1 0.03% 1 0 2025-11-13T00:31:25 Cross-site scripting (XSS) vulnerability in the generate report functionality in
CVE-2025-13075 4.7 0.03% 1 0 2025-11-13T00:30:30 A vulnerability was detected in code-projects Responsive Hotel Site 1.0. Impacte
CVE-2025-12703 None 0.00% 1 0 2025-11-13T00:30:30 Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering
CVE-2023-7329 None 0.40% 1 0 2025-11-13T00:30:24 Tinycontrol LAN Controller v3 (LK3) firmware versions up to 1.58a (hardware v3.8
CVE-2023-7327 None 0.10% 1 0 2025-11-13T00:30:24 Ozeki SMS Gateway versions up to and including 10.3.208 contain a path traversal
CVE-2021-4463 None 0.07% 1 0 2025-11-13T00:30:24 Longjing Technology BEMS API versions up to and including 1.21 contains an unaut
CVE-2022-4982 None 0.06% 1 0 2025-11-13T00:30:24 DBLTek GoIP-1 firmware versions up to and including GHSFVT-1.1-67-5 contain a lo
CVE-2017-20211 None 0.29% 1 0 2025-11-13T00:30:24 UCanCode E-XD++ Visualization Enterprise Suite contains an untrusted pointer der
CVE-2016-15055 None 0.97% 1 0 2025-11-13T00:30:24 JVC VN-T IP-camera models firmware versions up to 2016-08-22 (confirmed on the V
CVE-2025-11560 6.1 0.03% 1 0 2025-11-13T00:30:17 The Team Members Showcase WordPress plugin before 3.5.0 does not sanitize and es
CVE-2025-64707 0 0.04% 1 0 2025-11-12T23:15:40.130000 Frappe Learning is a learning system that helps users structure their content. S
CVE-2025-64500 7.3 0.01% 1 1 2025-11-12T22:15:50.127000 Symfony is a PHP framework for web and console applications and a set of reusabl
CVE-2025-59491 6.1 0.03% 1 0 2025-11-12T22:15:48.847000 Cross Site Scripting vulnerability in CentralSquare Community Development 19.5.7
CVE-2025-43205 6.5 0.02% 1 0 2025-11-12T22:15:48.297000 An out-of-bounds access issue was addressed with improved bounds checking. This
CVE-2021-4464 0 0.34% 1 0 2025-11-12T22:15:42.027000 FiberHome AN5506-04-FA firmware versions up to and including RP2631 and HG6245D
CVE-2025-64186 8.7 0.01% 1 0 2025-11-12T21:45:07 ### Summary A vulnerability was identified in the `evervault-go` SDK’s attestat
CVE-2025-46608 9.1 0.04% 1 0 2025-11-12T21:31:15 Dell Data Lakehouse, versions prior to 1.6.0.0, contain(s) an Improper Access Co
CVE-2025-8485 7.3 0.01% 1 0 2025-11-12T21:31:15 An improper permissions vulnerability was reported in Lenovo App Store that coul
CVE-2025-8421 6.6 0.01% 1 0 2025-11-12T21:31:15 An improper default permission vulnerability was reported in Lenovo Dock Manager
CVE-2025-27368 4.3 0.03% 1 0 2025-11-12T21:31:15 IBM OpenPages 9.0 and 9.1 is vulnerable to information disclosure of sensitive i
CVE-2025-46427 8.8 0.17% 1 0 2025-11-12T21:31:14 Dell SmartFabric OS10 Software, versions prior to 10.6.1.0, contain an Improper
CVE-2025-64170 3.8 0.01% 2 0 2025-11-12T21:15:53.433000 sudo-rs is a memory safe implementation of sudo and su written in Rust. Starting
CVE-2025-13061 6.3 0.04% 1 0 2025-11-12T21:15:48.763000 A vulnerability was detected in itsourcecode Online Voting System 1.0. This impa
CVE-2025-62215 7.0 0.71% 8 0 2025-11-12T21:14:53.247000 Concurrent execution using shared resource with improper synchronization ('race
CVE-2025-46428 8.8 0.17% 1 0 2025-11-12T20:15:42.953000 Dell SmartFabric OS10 Software, versions prior to 10.6.1.0, contain an Improper
CVE-2025-13060 7.3 0.03% 1 0 2025-11-12T20:15:39.357000 A security vulnerability has been detected in SourceCodester Survey Application
CVE-2025-64531 7.8 0.03% 1 0 2025-11-12T18:41:07.100000 Substance3D - Stager versions 3.1.5 and earlier are affected by a Use After Free
CVE-2025-61834 7.8 0.03% 1 0 2025-11-12T18:40:52.677000 Substance3D - Stager versions 3.1.5 and earlier are affected by a Use After Free
CVE-2025-61833 7.8 0.03% 1 0 2025-11-12T18:40:45.433000 Substance3D - Stager versions 3.1.5 and earlier are affected by an out-of-bounds
CVE-2025-13042 8.8 0.07% 3 0 2025-11-12T18:31:32 Inappropriate implementation in V8 in Google Chrome prior to 142.0.7444.166 allo
CVE-2025-2843 8.8 0.02% 2 0 2025-11-12T18:31:32 A flaw was found in the Observability Operator. The Operator creates a ServiceAc
CVE-2025-11367 None 0.33% 1 0 2025-11-12T18:31:32 The N-central Software Probe < 2025.4 is vulnerable to Remote Code Execution via
CVE-2025-20378 3.1 0.04% 1 0 2025-11-12T18:31:32 In Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, 9.2.9, and Splunk Clou
CVE-2025-11366 None 0.10% 1 0 2025-11-12T18:31:31 N-central < 2025.4 is vulnerable to authentication bypass via path traversal
CVE-2025-64406 4.3 0.03% 2 0 2025-11-12T18:31:25 An out-of-bounds Write vulnerability in Apache OpenOffice could allow an attacke
CVE-2025-12871 9.8 0.13% 1 0 2025-11-12T18:31:24 The a+HRD developed by aEnrich has an Authentication Abuse vulnerability, allowi
CVE-2025-13026 9.8 0.04% 1 0 2025-11-12T18:31:20 Sandbox escape due to incorrect boundary conditions in the Graphics: WebGPU comp
CVE-2025-25236 5.3 0.03% 1 0 2025-11-12T18:15:35.200000 Omnissa Workspace ONE UEM contains an observable response discrepancy vulnerabil
CVE-2025-20379 3.5 0.02% 1 0 2025-11-12T18:15:35.030000 In Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, and 9.2.9 and Splunk C
CVE-2025-12870 9.8 0.08% 1 0 2025-11-12T17:15:36.727000 The a+HRD developed by aEnrich has an Authentication Abuse vulnerability, allowi
CVE-2025-52881 0 0.01% 4 2 2025-11-12T16:20:22.257000 runc is a CLI tool for spawning and running containers according to the OCI spec
CVE-2025-52565 0 0.01% 4 1 2025-11-12T16:20:22.257000 runc is a CLI tool for spawning and running containers according to the OCI spec
CVE-2025-42890 10.0 0.07% 4 0 2025-11-12T16:19:59.103000 SQL Anywhere Monitor (Non-GUI) baked credentials into the code,exposing the reso
CVE-2025-59499 8.8 0.07% 1 0 2025-11-12T16:19:34.210000 Improper neutralization of special elements used in an sql command ('sql injecti
CVE-2025-11700 0 0.04% 1 0 2025-11-12T16:19:12.850000 N-central versions < 2025.4 are vulnerable to an XML External Entities injection
CVE-2025-11567 0 0.01% 1 0 2025-11-12T16:19:12.850000 CWE-276: Incorrect Default Permissions vulnerability exists that could cause ele
CVE-2025-40177 0 0.02% 1 0 2025-11-12T16:19:12.850000 In the Linux kernel, the following vulnerability has been resolved: accel/qaic:
CVE-2025-40173 0 0.02% 1 0 2025-11-12T16:19:12.850000 In the Linux kernel, the following vulnerability has been resolved: net/ip6_tun
CVE-2025-40169 0 0.02% 1 0 2025-11-12T16:19:12.850000 In the Linux kernel, the following vulnerability has been resolved: bpf: Reject
CVE-2025-12901 4.3 0.01% 1 0 2025-11-12T16:19:12.850000 The Asgaros Forum plugin for WordPress is vulnerable to Cross-Site Request Forge
CVE-2025-12087 4.3 0.03% 1 0 2025-11-12T16:19:12.850000 The Wishlist and Save for later for Woocommerce plugin for WordPress is vulnerab
CVE-2025-40744 7.5 0.02% 1 0 2025-11-12T16:19:12.850000 A vulnerability has been identified in Solid Edge SE2025 (All versions < V225.0
CVE-2024-32011 8.8 0.06% 1 0 2025-11-12T16:19:12.850000 A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP
CVE-2024-32010 7.8 0.01% 1 0 2025-11-12T16:19:12.850000 A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP
CVE-2025-62452 8.0 0.06% 1 0 2025-11-12T16:19:12.850000 Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) a
CVE-2025-62220 8.8 0.06% 1 0 2025-11-12T16:19:12.850000 Heap-based buffer overflow in Windows Subsystem for Linux GUI allows an unauthor
CVE-2025-60715 8.0 0.06% 1 0 2025-11-12T16:19:12.850000 Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) a
CVE-2025-62876 None 0.01% 1 0 2025-11-12T15:31:37 A Execution with Unnecessary Privileges vulnerability in lightdm-kde-greeter all
CVE-2025-11566 None 0.07% 1 0 2025-11-12T15:31:30 CWE-307: Improper Restriction of Excessive Authentication Attempts vulnerability
CVE-2025-11565 None 0.01% 1 0 2025-11-12T15:31:30 CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Trave
CVE-2025-64401 7.5 0.03% 2 0 2025-11-12T15:31:29 Apache OpenOffice documents can contain links. A missing Authorization vulnerabi
CVE-2025-61623 6.5 0.04% 1 0 2025-11-12T15:31:29 Reflected cross-site scripting vulnerability in Apache OFBiz. This issue affect
CVE-2025-52665 10.0 8.39% 1 0 template 2025-11-12T14:51:21.057000 A malicious actor with access to the management network could exploit a misconfi
CVE-2025-40175 None 0.02% 1 0 2025-11-12T12:30:39 In the Linux kernel, the following vulnerability has been resolved: idpf: clean
CVE-2025-40172 None 0.02% 1 0 2025-11-12T12:30:38 In the Linux kernel, the following vulnerability has been resolved: accel/qaic:
CVE-2025-40174 None 0.02% 1 0 2025-11-12T12:30:38 In the Linux kernel, the following vulnerability has been resolved: x86/mm: Fix
CVE-2025-40171 None 0.02% 1 0 2025-11-12T12:30:37 In the Linux kernel, the following vulnerability has been resolved: nvmet-fc: m
CVE-2025-12998 None 0.05% 2 0 2025-11-12T12:30:36 Improper Authentication vulnerability in TYPO3 Extension "Modules" codingms/modu
CVE-2025-40176 None 0.02% 1 0 2025-11-12T12:30:36 In the Linux kernel, the following vulnerability has been resolved: tls: wait f
CVE-2025-40170 None 0.02% 1 0 2025-11-12T12:30:36 In the Linux kernel, the following vulnerability has been resolved: net: use ds
CVE-2025-12382 None 0.02% 2 0 2025-11-12T12:30:34 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v
CVE-2025-12903 7.5 0.21% 1 0 2025-11-12T09:30:33 The Payment Plugins Braintree For WooCommerce plugin for WordPress is vulnerable
CVE-2025-13047 7.5 0.05% 1 0 2025-11-12T09:30:33 Bacteriology Laboratory Reporting System developed by ViewLead Technology has a
CVE-2025-13046 7.5 0.05% 1 0 2025-11-12T09:30:32 Bacteriology Laboratory Reporting System developed by ViewLead Technology has a
CVE-2025-12833 4.3 0.03% 1 0 2025-11-12T06:30:30 The GeoDirectory – WP Business Directory Plugin and Classified Listings Director
CVE-2025-54983 5.2 0.01% 1 0 2025-11-12T06:30:24 A health check port on Zscaler Client Connector on Windows, versions 4.6 < 4.6.
CVE-2025-40111 None 0.02% 1 0 2025-11-12T03:30:37 In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx:
CVE-2025-40110 None 0.02% 1 0 2025-11-12T03:30:26 In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx:
CVE-2025-40827 7.8 0.01% 2 0 2025-11-11T21:30:39 A vulnerability has been identified in Siemens Software Center (All versions < V
CVE-2025-40815 7.2 0.04% 1 0 2025-11-11T21:30:39 A vulnerability has been identified in LOGO! 12/24RCE (6ED1052-1MD08-0BA2) (All
CVE-2025-40763 7.8 0.01% 1 0 2025-11-11T21:30:39 A vulnerability has been identified in Altair Grid Engine (All versions < V2026.
CVE-2024-32009 7.8 0.01% 1 0 2025-11-11T21:30:39 A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP
CVE-2024-32008 7.8 0.01% 1 0 2025-11-11T21:30:39 A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP
CVE-2025-61835 7.8 0.03% 1 0 2025-11-11T21:30:39 Substance3D - Stager versions 3.1.5 and earlier are affected by an Integer Under
CVE-2025-40817 6.5 0.02% 1 0 2025-11-11T21:30:39 A vulnerability has been identified in LOGO! 12/24RCE (6ED1052-1MD08-0BA2) (All
CVE-2025-62222 8.8 0.11% 1 0 2025-11-11T18:30:31 Improper neutralization of special elements used in a command ('command injectio
CVE-2025-60704 7.5 0.05% 1 0 2025-11-11T18:30:30 Missing cryptographic step in Windows Kerberos allows an unauthorized attacker t
CVE-2025-60724 9.8 0.07% 2 0 2025-11-11T18:30:30 Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorize
CVE-2025-30398 8.1 0.04% 1 0 2025-11-11T18:30:25 Missing authorization in Nuance PowerScribe allows an unauthorized attacker to d
CVE-2025-62211 8.7 0.05% 1 0 2025-11-11T18:30:23 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2025-62210 8.7 0.05% 1 0 2025-11-11T18:30:23 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2025-62204 8.0 0.32% 1 0 2025-11-11T18:30:23 Deserialization of untrusted data in Microsoft Office SharePoint allows an autho
CVE-2025-12101 None 4.69% 4 1 template 2025-11-11T15:31:27 Cross-Site Scripting (XSS) in NetScaler ADC and NetScaler Gateway when the appli
CVE-2025-42887 10.0 0.05% 1 0 2025-11-11T03:30:36 Due to missing input sanitation, SAP Solution Manager allows an authenticated at
CVE-2025-20354 9.8 0.12% 2 1 2025-11-07T15:44:35.293000 A vulnerability in the Java Remote Method Invocation (RMI) process of Cisco Unif
CVE-2025-31133 None 0.01% 4 3 2025-11-06T23:12:38 ### Impact ### The OCI runtime specification has a `maskedPaths` feature that
CVE-2025-20358 9.4 0.34% 2 0 2025-11-05T17:48:34 A vulnerability in the Contact Center Express (CCX) Editor application of Cisco
CVE-2025-40778 8.6 0.01% 1 1 2025-11-05T00:32:31 Under certain circumstances, BIND is too lenient when accepting records from ans
CVE-2025-27835 7.8 0.02% 2 0 2025-11-03T21:33:13 An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow
CVE-2025-40300 None 0.07% 1 0 2025-11-03T18:32:46 In the Linux kernel, the following vulnerability has been resolved: x86/vmscape
CVE-2025-20333 9.9 4.05% 1 0 2025-10-28T13:58:58.610000 A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security
CVE-2025-62518 8.1 0.01% 1 1 2025-10-27T15:13:04 ## Summary Versions of `astral-tokio-tar` prior to 0.5.6 contain a boundary par
CVE-2023-4966 9.4 94.33% 2 14 template 2025-10-24T13:42:55.550000 Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when con
CVE-2025-20337 10.0 1.51% 3 1 2025-10-22T00:34:26 A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an
CVE-2025-20362 6.5 29.72% 1 0 template 2025-10-22T00:34:26 A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security
CVE-2025-5777 7.5 55.19% 7 22 template 2025-10-22T00:34:22 Insufficient input validation leading to memory overread on the NetScaler Manage
CVE-2024-3400 9.8 94.34% 2 41 template 2025-10-22T00:34:06 A command injection vulnerability in the GlobalProtect feature of Palo Alto Netw
CVE-2017-0144 8.8 94.42% 1 15 2025-10-22T00:15:58.547000 The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2
CVE-2020-9802 8.8 42.55% 1 2 2025-05-05T18:30:44 A logic issue was addressed with improved restrictions. This issue is fixed in i
CVE-2022-45770 7.8 0.58% 2 1 2025-03-31T21:32:40 Improper input validation in driver adgnetworkwfpdrv.sys in Adguard For Windows
CVE-2025-64717 0 0.00% 2 0 N/A
CVE-2025-64705 0 0.04% 3 0 N/A
CVE-2025-64716 0 0.07% 1 0 N/A
CVE-2025-64710 0 0.05% 1 0 N/A
CVE-2025-64523 0 0.03% 1 0 N/A
CVE-2025-64503 0 0.01% 1 0 N/A
CVE-2025-64482 0 0.01% 1 0 N/A
CVE-2025-64117 0 0.01% 1 0 N/A
CVE-2025-4619 0 0.00% 1 0 N/A

CVE-2025-60694
(7.5 HIGH)

EPSS: 0.00%

updated 2025-11-13T18:31:17

2 posts

A stack-based buffer overflow exists in the validate_static_route function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function improperly concatenates user-supplied CGI parameters (route_ipaddr_0~3, route_netmask_0~3, route_gateway_0~3) into fixed-size buffers (v6, v10, v14) without proper bounds checking. Remote attackers can exploit this vulnerabi

CVE-2025-60691
(8.8 HIGH)

EPSS: 0.00%

updated 2025-11-13T18:31:17

2 posts

A stack-based buffer overflow exists in the httpd binary of Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The apply_cgi and block_cgi functions copy user-supplied input from the "url" CGI parameter into stack buffers (v36, v29) using sprintf without bounds checking. Because these buffers are allocated as single-byte variables, any non-empty input will trigger a buffer overflow.

CVE-2025-60692
(8.4 HIGH)

EPSS: 0.00%

updated 2025-11-13T18:31:17

2 posts

A stack-based buffer overflow vulnerability exists in the libshared.so library of Cisco Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The functions get_mac_from_ip and get_ip_from_mac use sscanf with overly permissive "%100s" format specifiers to parse entries from /proc/net/arp into fixed-size buffers (v6: 50 bytes, v7 sub-arrays: 50 bytes). This allows local attackers controll

CVE-2025-60689
(5.4 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T18:31:17

2 posts

An unauthenticated command injection vulnerability exists in the Start_EPI function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The vulnerability occurs because user-supplied CGI parameters (wl_ant, wl_ssid, wl_rate, ttcp_num, ttcp_ip, ttcp_size) are concatenated into system command strings without proper sanitization and executed via wl_exec_cmd. Succes

CVE-2025-60695
(5.9 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T18:31:16

2 posts

A stack-based buffer overflow vulnerability exists in the mtk_dut binary of Linksys E7350 routers (Firmware 1.1.00.032). The function sub_4045A8 reads up to 256 bytes from /sys/class/net/%s/address into a local buffer and then copies it into caller-provided buffer a1 using strcpy without boundary checks. Since a1 is often allocated with significantly smaller sizes (20-32 bytes), local attackers co

CVE-2025-60690
(8.8 HIGH)

EPSS: 0.00%

updated 2025-11-13T18:31:16

2 posts

A stack-based buffer overflow exists in the get_merge_ipaddr function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function concatenates up to four user-supplied CGI parameters matching <parameter>_0~3 into a fixed-size buffer (a2) without bounds checking. Remote attackers can exploit this vulnerability via specially crafted HTTP requests to execute a

CVE-2025-60688
(6.5 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T18:31:16

2 posts

A stack buffer overflow vulnerability exists in the ToToLink LR1200GB (V9.1.0u.6619_B20230130) and NR1800X (V9.1.0u.6681_B20230703) Router firmware within the cstecgi.cgi binary (setDefResponse function). The binary reads the "IpAddress" parameter from a web request and copies it into a fixed-size stack buffer using strcpy() without any length validation. Maliciously crafted input can overflow the

CVE-2025-60686
(5.1 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T18:31:11

2 posts

A local stack-based buffer overflow vulnerability exists in the infostat.cgi and cstecgi.cgi binaries of ToToLink routers (A720R V4.1.5cu.614_B20230630, LR1200GB V9.1.0u.6619_B20230130, and NR1800X V9.1.0u.6681_B20230703). Both programs parse the contents of /proc/net/arp using sscanf() with "%s" format specifiers into fixed-size stack buffers without length validation. Specifically, one function

CVE-2025-60687
(6.5 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T18:31:11

2 posts

An unauthenticated command injection vulnerability exists in the ToToLink LR1200GB Router firmware V9.1.0u.6619_B20230130 within the cstecgi.cgi binary (sub_41EC68 function). The binary reads the "imei" parameter from a web request and verifies only that it is 15 characters long. The parameter is then directly inserted into a system command using sprintf() and executed with system(). Maliciously c

CVE-2025-60683
(6.5 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T18:31:11

2 posts

A command injection vulnerability exists in the ToToLink A720R Router firmware V4.1.5cu.614_B20230630 within the sysconf binary, specifically in the sub_40BFA4 function that handles network interface reinitialization from '/var/system/linux_vlan_reinit'. Input is only partially validated by checking the prefix of interface names, and is concatenated into shell commands executed via system() withou

CVE-2025-64383
(6.5 MEDIUM)

EPSS: 0.03%

updated 2025-11-13T18:31:05

1 posts

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Qode Qi Blocks qi-blocks allows Stored XSS.This issue affects Qi Blocks: from n/a through <= 1.4.3.

jos1264@social.skynetcloud.site at 2025-11-13T11:30:03.000Z ##

CVE-2025-64383 - WordPress Qi Blocks plugin <= 1.4.3 - Cross Site Scripting (XSS) vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64380
(6.5 MEDIUM)

EPSS: 0.03%

updated 2025-11-13T18:31:05

1 posts

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pluggabl Booster for WooCommerce woocommerce-jetpack allows Stored XSS.This issue affects Booster for WooCommerce: from n/a through <= 7.3.2.

jos1264@social.skynetcloud.site at 2025-11-13T11:30:02.000Z ##

CVE-2025-64380 - WordPress Booster for WooCommerce plugin <= 7.3.2 - Cross Site Scripting (XSS) vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64379
(4.3 MEDIUM)

EPSS: 0.02%

updated 2025-11-13T18:31:04

1 posts

Missing Authorization vulnerability in Pluggabl Booster for WooCommerce woocommerce-jetpack allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Booster for WooCommerce: from n/a through <= 7.4.0.

jos1264@social.skynetcloud.site at 2025-11-13T11:30:02.000Z ##

CVE-2025-64379 - WordPress Booster for WooCommerce plugin <= 7.4.0 - Broken Access Control vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64370
(5.3 MEDIUM)

EPSS: 0.02%

updated 2025-11-13T18:31:04

1 posts

Missing Authorization vulnerability in YOP YOP Poll yop-poll allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects YOP Poll: from n/a through <= 6.5.38.

jos1264@social.skynetcloud.site at 2025-11-13T11:30:02.000Z ##

CVE-2025-64370 - WordPress YOP Poll plugin <= 6.5.38 - Broken Access Control vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-63666
(9.8 CRITICAL)

EPSS: 0.03%

updated 2025-11-13T18:31:03

1 posts

Tenda AC15 v15.03.05.18_multi) issues an authentication cookie that exposes the account password hash to the client and uses a short, low-entropy suffix as the session identifier. An attacker with network access or the ability to run JS in a victim browser can steal the cookie and replay it to access protected resources.

1 repos

https://github.com/Remenis/CVE-2025-63666

CVE-2025-60701
(0 None)

EPSS: 0.00%

updated 2025-11-13T18:15:54.137000

2 posts

A command injection vulnerability exists in the D-Link DIR-882 Router firmware DIR882A1_FW102B02 within the `prog.cgi` and `rc` binaries. The `sub_433188` function in `prog.cgi` stores user-supplied email configuration parameters (`EmailFrom`, `EmailTo`, `SMTPServerAddress`, `SMTPServerPort`, `AccountName`) in NVRAM via `nvram_safe_set`. These values are later retrieved in the `sub_448FDC` functio

CVE-2025-60700
(0 None)

EPSS: 0.00%

updated 2025-11-13T18:15:54.010000

2 posts

A command injection vulnerability exists in the D-Link DIR-882 Router firmware DIR882A1_FW102B02 within the `prog.cgi` and `librcm.so` binaries. The `sub_4455BC` function in `prog.cgi` stores user-supplied `SetDMZSettings/IPAddress` values in NVRAM via `nvram_safe_set("dmz_ipaddr", ...)`. These values are later retrieved in the `DMZ_run` function of `librcm.so` using `nvram_safe_get` and concatena

CVE-2025-60698
(0 None)

EPSS: 0.00%

updated 2025-11-13T18:15:53.880000

2 posts

A command injection vulnerability exists in the D-Link DIR-882 Router firmware DIR882A1_FW102B02 within the `prog.cgi` and `rc` binaries. The `sub_432F60` function in `prog.cgi` stores user-supplied `SetSysLogSettings/IPAddress` values in NVRAM via `nvram_safe_set("SysLogRemote_IPAddress", ...)`. These values are later retrieved in the `sub_448DCC` function of `rc` using `nvram_safe_get` and conca

CVE-2025-60697
(0 None)

EPSS: 0.00%

updated 2025-11-13T18:15:53.753000

2 posts

A command injection vulnerability exists in the D-Link DIR-882 Router firmware DIR882A1_FW102B02 within the `prog.cgi` and `rc` binaries. The `sub_4438A4` function in `prog.cgi` stores user-supplied DDNS parameters (`ServerAddress` and `Hostname`) in NVRAM via `nvram_safe_set`. These values are later retrieved in the `start_DDNS_ipv4` function of `rc` using `nvram_safe_get` and concatenated into D

CVE-2025-60696
(8.4 HIGH)

EPSS: 0.00%

updated 2025-11-13T18:15:53.587000

2 posts

A stack-based buffer overflow vulnerability exists in the makeRequest.cgi binary of Linksys RE7000 routers (Firmware FW_v2.0.15_211230_1012). The arplookup function parses lines from /proc/net/arp using sscanf("%16s ... %18s ..."), storing results into buffers v6 (12 bytes) and v7 (20 bytes). Since the format specifiers allow up to 16 and 18 bytes respectively, oversized input can overflow the buf

CVE-2025-60693
(6.5 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T18:15:53.040000

2 posts

A stack-based buffer overflow exists in the get_merge_mac function of the httpd binary on Linksys E1200 v2 routers (Firmware E1200_v2.0.11.001_us.tar.gz). The function concatenates up to six user-supplied CGI parameters matching <parameter>_0~5 into a fixed-size buffer (a2) without proper bounds checking, appending colon delimiters during concatenation. Remote attackers can exploit this vulnerabil

CVE-2025-60685
(5.1 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T18:15:51.567000

2 posts

A stack buffer overflow exists in the ToToLink A720R Router firmware V4.1.5cu.614_B20230630 within the sysconf binary (sub_401EE0 function). The binary reads the /proc/stat file using fgets() into a local buffer and subsequently parses the line using sscanf() into a single-byte variable with the %s format specifier. Maliciously crafted /proc/stat content can overwrite adjacent stack memory, potent

CVE-2025-60684
(6.5 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T18:15:51.387000

2 posts

A stack buffer overflow vulnerability exists in the ToToLink LR1200GB (V9.1.0u.6619_B20230130) and NR1800X (V9.1.0u.6681_B20230703) Router firmware within the cstecgi.cgi binary (sub_42F32C function). The web interface reads the "lang" parameter and constructs Help URL strings using sprintf() into fixed-size stack buffers without proper length validation. Maliciously crafted input can overflow the

CVE-2025-60682
(6.5 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T18:15:51.023000

2 posts

A command injection vulnerability exists in the ToToLink A720R Router firmware V4.1.5cu.614_B20230630 within the cloudupdate_check binary, specifically in the sub_402414 function that handles cloud update parameters. User-supplied 'magicid' and 'url' values are directly concatenated into shell commands and executed via system() without any sanitization or escaping. An unauthenticated remote attack

CVE-2025-60671
(0 None)

EPSS: 0.00%

updated 2025-11-13T18:15:50.877000

2 posts

A command injection vulnerability exists in the D-Link DIR-823G router firmware DIR823G_V1.0.2B05_20181207.bin in the timelycheck and sysconf binaries, which process the /var/system/linux_vlan_reinit file. The vulnerability occurs because content read from this file is only partially validated for a prefix and then formatted using vsnprintf() before being executed with system(), allowing an attack

CVE-2025-59480
(6.1 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T18:15:50.703000

2 posts

Mattermost Mobile Apps versions <=2.32.0 fail to verify that SSO redirect tokens originate from the trusted server, which allows a malicious Mattermost instance or on-path attacker to obtain user session credentials via crafted token-in-URL responses

cR0w at 2025-11-13T17:54:08.524Z ##

A couple Mattermost CVEs. Nothing too big but maybe worth looking into if that's your thing.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

cR0w@infosec.exchange at 2025-11-13T17:54:08.000Z ##

A couple Mattermost CVEs. Nothing too big but maybe worth looking into if that's your thing.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-11777
(3.1 LOW)

EPSS: 0.00%

updated 2025-11-13T18:15:49.393000

2 posts

Mattermost versions 10.11.x <= 10.11.3, 10.5.x <= 10.5.11 fail to properly validate team membership permissions in the Add Channel Member API which allows users from one team to access user metadata and channel membership information from other teams via the API endpoint

cR0w at 2025-11-13T17:54:08.524Z ##

A couple Mattermost CVEs. Nothing too big but maybe worth looking into if that's your thing.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

cR0w@infosec.exchange at 2025-11-13T17:54:08.000Z ##

A couple Mattermost CVEs. Nothing too big but maybe worth looking into if that's your thing.

cve.org/CVERecord?id=CVE-2025-

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-12762
(9.1 CRITICAL)

EPSS: 0.00%

updated 2025-11-13T17:39:19

3 posts

pgAdmin versions up to 9.9 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.

CVE-2025-64407
(5.3 MEDIUM)

EPSS: 0.11%

updated 2025-11-13T17:15:50.523000

1 posts

Apache OpenOffice documents can contain links. A missing Authorization vulnerability in Apache OpenOffice allowed an attacker to craft a document that would cause external links to be loaded without prompt. Such links could also be used to transmit system information, such as environment variables or configuration settings. In the affected versions of Apache OpenOffice, documents that used a cer

CVE-2025-20346
(4.3 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T17:15:45.630000

2 posts

A vulnerability in Cisco Catalyst Center could allow an authenticated, remote attacker to execute operations that should require Administrator privileges. The attacker would need valid read-only user credentials. This vulnerability is due to improper role-based access control (RBAC). An attacker could exploit this vulnerability by logging in to an affected system and modifying certain policy co

AAKL at 2025-11-13T17:42:21.380Z ##

New updates from Cisco. These are just the top three. There are seven of them.

Critical: CVE-2025-20354 and CVE-2025-20358: Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities sec.cloudapps.cisco.com/securi

New: High vulnerability CVE-2025-20341: Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi

New. CVE-2025-20346, medium severity: Cisco Catalyst Center Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity

##

AAKL@infosec.exchange at 2025-11-13T17:42:21.000Z ##

New updates from Cisco. These are just the top three. There are seven of them.

Critical: CVE-2025-20354 and CVE-2025-20358: Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities sec.cloudapps.cisco.com/securi

New: High vulnerability CVE-2025-20341: Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi

New. CVE-2025-20346, medium severity: Cisco Catalyst Center Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #vulnerability

##

CVE-2025-20341
(8.8 HIGH)

EPSS: 0.00%

updated 2025-11-13T17:15:45.400000

3 posts

A vulnerability in Cisco Catalyst Center Virtual Appliance could allow an authenticated, remote attacker to elevate privileges to Administrator on an affected system. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected system. A successful exploit could allow the attacker to

AAKL at 2025-11-13T17:42:21.380Z ##

New updates from Cisco. These are just the top three. There are seven of them.

Critical: CVE-2025-20354 and CVE-2025-20358: Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities sec.cloudapps.cisco.com/securi

New: High vulnerability CVE-2025-20341: Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi

New. CVE-2025-20346, medium severity: Cisco Catalyst Center Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity

##

BugBountyShorts at 2025-11-13T17:39:26.214Z ##

CVE-2025-20341 | *Severity:* HIGH
Bug Bounty Relevance: HIGH

An authenticated attacker can potentially gain Administrator privileges on affected Cisco systems. This could lead to unauthorized modifications, including creating new user accounts or elevating privileges.

Strategy: Focus on targets using Cisco Catalyst Center Virtual Appliance. Test for insufficient input validation in HTTP requests, especially during user account management operations.
sec.cloudapps.cisco.com/securi

##

AAKL@infosec.exchange at 2025-11-13T17:42:21.000Z ##

New updates from Cisco. These are just the top three. There are seven of them.

Critical: CVE-2025-20354 and CVE-2025-20358: Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities sec.cloudapps.cisco.com/securi

New: High vulnerability CVE-2025-20341: Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi

New. CVE-2025-20346, medium severity: Cisco Catalyst Center Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #vulnerability

##

CVE-2025-64382
(4.3 MEDIUM)

EPSS: 0.02%

updated 2025-11-13T16:15:55.877000

1 posts

Missing Authorization vulnerability in WebToffee Order Export & Order Import for WooCommerce order-import-export-for-woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Order Export & Order Import for WooCommerce: from n/a through <= 2.6.7.

jos1264@social.skynetcloud.site at 2025-11-13T11:30:03.000Z ##

CVE-2025-64382 - WordPress Order Export & Order Import for WooCommerce plugin <= 2.6.7 - Broken Access Control vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13118
(6.3 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T16:15:50.843000

1 posts

A vulnerability was detected in macrozheng mall-swarm up to 1.0.3. Affected by this issue is the function paySuccess of the file /order/paySuccess. The manipulation of the argument orderID results in improper authorization. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

jos1264@social.skynetcloud.site at 2025-11-13T15:35:03.000Z ##

CVE-2025-13118 - macrozheng mall-swarm paySuccess improper authorization cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13023
(9.8 CRITICAL)

EPSS: 0.02%

updated 2025-11-13T16:15:50.533000

1 posts

Sandbox escape due to incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145.

beyondmachines1@infosec.exchange at 2025-11-12T11:01:31.000Z ##

Mozilla releases Firefox patches, fixes 15 vulnerabilities including sandbox escape flaws

Mozilla Firefox 145, released November 11, 2025, patches 15 security vulnerabilities including two sandbox escape flaws (CVE-2025-13023 and CVE-2025-13026) in WebGPU that could allow attackers to execute arbitrary code outside the browser's security boundaries.

**Update your Firefox browser and Thunderbird email client. Firefox fixed two sandbox escape vulnerabilities in WebGPU that could let attackers break out of the browser and run code on your computer. There are no exploits yet, but your browser and email client are the first line of access to the internet, so they will stumble on the exploits first. Better to update, all tabs reopen automatically.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-64517
(4.4 MEDIUM)

EPSS: 0.02%

updated 2025-11-13T15:36:04

2 posts

### Summary When `Defaults targetpw` (or `Defaults rootpw`) is enabled, the password of the target account (or root account) instead of the invoking user is used for authentication. `sudo-rs` prior to 0.2.10 incorrectly recorded the invoking user’s UID instead of the authenticated-as user's UID in the authentication timestamp. Any later `sudo` invocation on the same terminal while the timestamp wa

dotstdy@mastodon.social at 2025-11-13T11:54:42.000Z ##

@zeux direct link to the actual issue if people are curious: security-tracker.debian.org/tr tl;dr a new feature that shipped was broken, making it worse than useless, but not compromising the normal functionality.

##

jos1264@social.skynetcloud.site at 2025-11-13T01:05:02.000Z ##

CVE-2025-64517 - sudo-rs doesn't record authenticating user properly in timestamp cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-9242
(9.8 CRITICAL)

EPSS: 60.33%

updated 2025-11-13T15:31:32

4 posts

An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.3 and

Nuclei template

1 repos

https://github.com/watchtowrlabs/watchTowr-vs-WatchGuard-CVE-2025-9242

netsecio@mastodon.social at 2025-11-13T15:59:03.000Z ##

📰 CISA KEV Alert: WatchGuard and Triofox Flaws Now Under Active Attack

📢 CISA KEV UPDATE: Three vulnerabilities are now under active attack, including flaws in WatchGuard Firebox (CVE-2025-9242) and Gladinet Triofox (CVE-2025-12480). Federal agencies must patch by Dec 3. All orgs urged to act now! #CISA #KEV #CyberSec...

🔗 cyber.netsecops.io/articles/ci

##

DarkWebInformer@infosec.exchange at 2025-11-12T21:58:20.000Z ##

CISA has added 3 new vulnerabilities to the KEV Catalog.

darkwebinformer.com/cisa-kev-c

CVE-2025-12480: Gladinet Triofox Improper Access Control Vulnerability

CVE-2025-62215: Microsoft Windows Race Condition Vulnerability

CVE-2025-9242: WatchGuard Firebox Out-of-Bounds Write Vulnerability

##

cisakevtracker@mastodon.social at 2025-11-12T16:01:40.000Z ##

CVE ID: CVE-2025-9242
Vendor: WatchGuard
Product: Firebox
Date Added: 2025-11-12
Notes: watchguard.com/wgrd-psirt/advi ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2025-11-12T15:53:59.000Z ##

CIA has updated the KEV catalogue.

CVE-2025-9242: WatchGuard Firebox Out-of-Bounds Write Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-62215: Microsoft Windows Race Condition Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-12480: Gladinet Triofox Improper Access Control Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #Microsoft #WIndows #infosec

##

CVE-2025-64404
(7.5 HIGH)

EPSS: 0.01%

updated 2025-11-13T15:31:32

2 posts

Apache OpenOffice documents can contain links to other files. A missing Authorization vulnerability in Apache OpenOffice allowed an attacker to craft a document that would cause external links to be loaded without prompt. In the affected versions of Apache OpenOffice, documents that used background fill images, or bullet images, linked to external files would load the contents of those files wit

CVE-2025-64405
(7.5 HIGH)

EPSS: 0.01%

updated 2025-11-13T15:31:32

2 posts

Apache OpenOffice documents can contain links. A missing Authorization vulnerability in Apache OpenOffice allowed an attacker to craft a document that would cause external links to be loaded without prompt. In the affected versions of Apache OpenOffice, Calc spreadsheet containing DDE links to external files would load the contents of those files without prompting the user for permission to do

CVE-2025-30662
(6.6 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T15:30:38

1 posts

Symlink following in the installer for the Zoom Workplace VDI Plugin macOS Universal installer before version 6.3.14, 6.4.14, and 6.5.10 in their respective tracks may allow an authenticated user to conduct a disclosure of information via network access.

jos1264@social.skynetcloud.site at 2025-11-13T15:35:02.000Z ##

CVE-2025-30662 - Zoom Workplace VDI Plugin macOS Universal Installer - Symlink Following cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12817
(3.1 LOW)

EPSS: 0.00%

updated 2025-11-13T15:30:37

2 posts

Missing authorization in PostgreSQL CREATE STATISTICS command allows a table owner to achieve denial of service against other CREATE STATISTICS users by creating in any schema. A later CREATE STATISTICS for the same name, from a user having the CREATE privilege, would then fail. Versions before PostgreSQL 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23 are affected.

CVE-2025-12764
(7.5 HIGH)

EPSS: 0.00%

updated 2025-11-13T15:30:37

2 posts

pgAdmin <= 9.9  is affected by an LDAP injection vulnerability in the LDAP authentication flow that allows an attacker to inject special LDAP characters in the username, causing the DC/LDAP server and the client to process an unusual amount of data DOS.

CVE-2025-64741
(8.1 HIGH)

EPSS: 0.00%

updated 2025-11-13T15:30:37

2 posts

Improper authorization handling in Zoom Workplace for Android before version 6.5.10 may allow an unauthenticated user to conduct an escalation of privilege via network access.

jos1264@social.skynetcloud.site at 2025-11-13T16:30:02.000Z ##

CVE-2025-64741 - Zoom Workplace for Android - Improper Authorization Handling cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-13T15:35:02.000Z ##

CVE-2025-64741 - Zoom Workplace for Android - Improper Authorization Handling cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-62483
(5.3 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T15:30:37

1 posts

Improper removal of sensitive information in certain Zoom Clients before version 6.5.10 may allow an unauthenticated user to conduct a disclosure of information via network access.

jos1264@social.skynetcloud.site at 2025-11-13T15:35:03.000Z ##

CVE-2025-62483 - Zoom Clients - Improper Removal of Sensitive Information cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13119
(4.3 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T15:30:37

1 posts

A flaw has been found in Fabian Ros/SourceCodester Simple E-Banking System 1.0. This affects an unknown part. This manipulation causes cross-site request forgery. The attack may be initiated remotely. The exploit has been published and may be used.

jos1264@social.skynetcloud.site at 2025-11-13T15:35:03.000Z ##

CVE-2025-13119 - Fabian Ros/SourceCodester Simple E-Banking System cross-site request forgery cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-30669
(4.8 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T15:30:31

1 posts

Improper certificate validation in certain Zoom Clients may allow an unauthenticated user to conduct a disclosure of information via adjacent access.

jos1264@social.skynetcloud.site at 2025-11-13T15:35:02.000Z ##

CVE-2025-30669 - Zoom Workplace Clients - Improper Certificate Validation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64739
(4.3 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T15:30:31

1 posts

External control of file name or path in certain Zoom Clients may allow an unauthenticated user to conduct a disclosure of information via network access.

jos1264@social.skynetcloud.site at 2025-11-13T15:35:01.000Z ##

CVE-2025-64739 - Zoom Clients - External Control of File Name or Path cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12763
(6.8 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T15:30:30

2 posts

pgAdmin 4 versions up to 9.9 are affected by a command injection vulnerability on Windows systems. This issue is caused by the use of shell=True during backup and restore operations, enabling attackers to execute arbitrary system commands by providing specially crafted file path input.

CVE-2025-64740
(7.5 HIGH)

EPSS: 0.00%

updated 2025-11-13T15:15:53.820000

1 posts

Improper verification of cryptographic signature in the installer for Zoom Workplace VDI Client for Windows may allow an authenticated user to conduct an escalation of privilege via local access.

jos1264@social.skynetcloud.site at 2025-11-13T15:35:02.000Z ##

CVE-2025-64740 - Zoom Workplace VDI Client for Windows - Improper Verification of Cryptographic Signature cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64711
(3.9 LOW)

EPSS: 0.01%

updated 2025-11-13T15:15:52.707000

1 posts

PrivateBin is an online pastebin where the server has zero knowledge of pasted data. Starting in version 1.7.7 and prior to version 2.0.3, dragging a file whose filename contains HTML is reflected verbatim into the page via the drag-and-drop helper, so any user who drops a crafted file on PrivateBin will execute arbitrary JavaScript within their own session (self-XSS). This allows an attacker who

jos1264@social.skynetcloud.site at 2025-11-13T04:25:01.000Z ##

CVE-2025-64711 - PrivateBin vulnerable to malicious filename use for self-XSS / HTML injection locally for users cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-62482
(4.3 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T15:15:51.697000

1 posts

Cross-site scripting in Zoom Workplace for Windows before version 6.5.10 may allow an unauthenticated user to impact integrity via network access.

jos1264@social.skynetcloud.site at 2025-11-13T15:35:02.000Z ##

CVE-2025-62482 - Zoom Workplace for Windows - Cross-site Scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13117
(5.4 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T15:15:50.463000

1 posts

A security vulnerability has been detected in macrozheng mall-swarm up to 1.0.3. Affected by this vulnerability is the function cancelOrder of the file /order/cancelOrder. The manipulation of the argument orderId leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but di

jos1264@social.skynetcloud.site at 2025-11-13T15:35:02.000Z ##

CVE-2025-13117 - macrozheng mall-swarm cancelOrder improper authorization cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13076
(4.7 MEDIUM)

EPSS: 0.03%

updated 2025-11-13T15:15:50.250000

1 posts

A flaw has been found in code-projects Responsive Hotel Site 1.0. The affected element is an unknown function of the file /admin/usersetting.php. Executing manipulation of the argument usname can lead to sql injection. The attack can be executed remotely. The exploit has been published and may be used.

jos1264@social.skynetcloud.site at 2025-11-13T01:05:03.000Z ##

CVE-2025-13076 - code-projects Responsive Hotel Site usersetting.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12735
(9.8 CRITICAL)

EPSS: 0.12%

updated 2025-11-13T15:15:49.590000

1 posts

The expr-eval library is a JavaScript expression parser and evaluator designed to safely evaluate mathematical expressions with user-defined variables. However, due to insufficient input validation, an attacker can pass a crafted variables object into the evaluate() function and trigger arbitrary code execution.

cyberveille@mastobot.ping.moi at 2025-11-13T16:30:11.000Z ##

📢 CVE-2025-12735 Faille critique RCE dans la bibliothèque JavaScript expr-eval (800k téléchargements NPM)
📝 Selon BleepingComputer, une faille critique affecte la bibli...
📖 cyberveille : cyberveille.ch/posts/2025-11-1
🌐 source : bleepingcomputer.com/news/secu
#JavaScript #NPM #Cyberveille

##

CVE-2023-7326
(0 None)

EPSS: 0.15%

updated 2025-11-13T15:15:48.983000

1 posts

The Epson Stylus SX510W embedded web management service fails to properly handle consecutive ampersand characters in query parameters when accessing /PRESENTATION/HTML/TOP/INDEX.HTML. A remote attacker can send a malformed request that triggers improper input parsing or memory handling, resulting in the printer process shutting down or powering off, causing a denial of service condition.

jos1264@social.skynetcloud.site at 2025-11-12T22:40:02.000Z ##

CVE-2023-7326 - Epson Stylus SX510W Printer Remote Power Off DoS cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64402
(6.5 MEDIUM)

EPSS: 0.03%

updated 2025-11-13T15:08:55.247000

2 posts

Apache OpenOffice documents can contain links. A missing Authorization vulnerability in Apache OpenOffice allowed an attacker to craft a document that would cause external links to be loaded without prompt. In the affected versions of Apache OpenOffice, documents that used "OLE objects" linked to external files would load the contents of those files without prompting the user for permission to

CVE-2025-64403
(8.1 HIGH)

EPSS: 0.03%

updated 2025-11-13T15:08:42.313000

3 posts

Apache OpenOffice Calc spreadsheet can contain links to other files, in the form of "external data sources". A missing Authorization vulnerability in Apache OpenOffice allowed an attacker to craft a document that would cause such links to be loaded without prompt. This issue affects Apache OpenOffice: through 4.1.15. Users are recommended to upgrade to version 4.1.16, which fixes the issue.

CVE-2025-12480
(9.1 CRITICAL)

EPSS: 52.34%

updated 2025-11-13T15:07:03.620000

5 posts

Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.

Nuclei template

1 repos

https://github.com/velmetrac/CVE-2025-12480

undercodenews@mastodon.social at 2025-11-13T17:42:41.000Z ##

Critical Zero-Day in Gladinet Triofox Exploited by UNC6485 Threat Group

Cybersecurity experts have sounded the alarm after discovering a severe zero-day vulnerability in Gladinet’s Triofox file-sharing platform. This flaw, tracked as CVE-2025-12480, has been actively exploited by the notorious threat actor group UNC6485 since August 24, 2025, allowing attackers to bypass authentication and execute malicious code with full system privileges. The implications for…

undercodenews.com/critical-zer

##

netsecio@mastodon.social at 2025-11-13T15:59:03.000Z ##

📰 CISA KEV Alert: WatchGuard and Triofox Flaws Now Under Active Attack

📢 CISA KEV UPDATE: Three vulnerabilities are now under active attack, including flaws in WatchGuard Firebox (CVE-2025-9242) and Gladinet Triofox (CVE-2025-12480). Federal agencies must patch by Dec 3. All orgs urged to act now! #CISA #KEV #CyberSec...

🔗 cyber.netsecops.io/articles/ci

##

DarkWebInformer@infosec.exchange at 2025-11-12T21:58:20.000Z ##

CISA has added 3 new vulnerabilities to the KEV Catalog.

darkwebinformer.com/cisa-kev-c

CVE-2025-12480: Gladinet Triofox Improper Access Control Vulnerability

CVE-2025-62215: Microsoft Windows Race Condition Vulnerability

CVE-2025-9242: WatchGuard Firebox Out-of-Bounds Write Vulnerability

##

cisakevtracker@mastodon.social at 2025-11-12T16:01:09.000Z ##

CVE ID: CVE-2025-12480
Vendor: Gladinet
Product: Triofox
Date Added: 2025-11-12
Notes: access.triofox.com/releases_hi ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2025-11-12T15:53:59.000Z ##

CIA has updated the KEV catalogue.

CVE-2025-9242: WatchGuard Firebox Out-of-Bounds Write Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-62215: Microsoft Windows Race Condition Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-12480: Gladinet Triofox Improper Access Control Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #Microsoft #WIndows #infosec

##

CVE-2025-59118
(7.3 HIGH)

EPSS: 0.05%

updated 2025-11-13T15:04:59.130000

2 posts

Unrestricted Upload of File with Dangerous Type vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 24.09.03. Users are recommended to upgrade to version 24.09.03, which fixes the issue.

1 repos

https://github.com/B1ack4sh/Blackash-CVE-2025-59118

cR0w@infosec.exchange at 2025-11-12T14:06:45.000Z ##

Whoopsie.

lists.apache.org/thread/202263

CVE-2025-59118: Apache OFBiz: Critical Remote Command Execution via Unrestricted File Upload

##

jos1264@social.skynetcloud.site at 2025-11-12T11:40:02.000Z ##

CVE-2025-59118 - Apache OFBiz: Critical Remote Command Execution via Unrestricted File Upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12765
(7.5 HIGH)

EPSS: 0.00%

updated 2025-11-13T14:15:47.873000

2 posts

pgAdmin <= 9.9  is affected by a vulnerability in the LDAP authentication mechanism allows bypassing TLS certificate verification.

CVE-2025-12818
(5.9 MEDIUM)

EPSS: 0.00%

updated 2025-11-13T13:15:45.313000

2 posts

Integer wraparound in multiple PostgreSQL libpq client library functions allows an application input provider or network peer to cause libpq to undersize an allocation and write out-of-bounds by hundreds of megabytes. This results in a segmentation fault for the application using libpq. Versions before PostgreSQL 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23 are affected.

CVE-2025-64384(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-13T12:32:48

1 posts

Missing Authorization vulnerability in jetmonsters JetFormBuilder jetformbuilder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JetFormBuilder: from n/a through <= 3.5.3.

jos1264@social.skynetcloud.site at 2025-11-13T11:30:03.000Z ##

CVE-2025-64384 - WordPress JetFormBuilder plugin <= 3.5.3 - Broken Access Control vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64292(CVSS UNKNOWN)

EPSS: 0.03%

updated 2025-11-13T12:32:46

1 posts

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PascalBajorat Analytics Germanized for Google Analytics ga-germanized allows DOM-Based XSS.This issue affects Analytics Germanized for Google Analytics: from n/a through <= 1.6.2.

jos1264@social.skynetcloud.site at 2025-11-13T11:30:02.000Z ##

CVE-2025-64292 - WordPress Analytics Germanized for Google Analytics plugin <= 1.6.2 - Cross Site Scripting (XSS) vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-7704
(5.4 MEDIUM)

EPSS: 0.04%

updated 2025-11-13T10:15:54.823000

1 posts

Supermicro BMC Insyde SMASH shell program has a stacked-based overflow vulnerability

jos1264@social.skynetcloud.site at 2025-11-13T11:30:03.000Z ##

CVE-2025-7704 - Supermicro BMC SMASH services has a Stack-based buffer overflow vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64381
(0 None)

EPSS: 0.03%

updated 2025-11-13T10:15:54.180000

1 posts

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpdevelop Booking Calendar booking allows Stored XSS.This issue affects Booking Calendar: from n/a through <= 10.14.7.

jos1264@social.skynetcloud.site at 2025-11-13T11:30:03.000Z ##

CVE-2025-64381 - WordPress Booking Calendar plugin <= 10.14.7 - Cross Site Scripting (XSS) vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64369
(0 None)

EPSS: 0.02%

updated 2025-11-13T10:15:53.423000

1 posts

Missing Authorization vulnerability in codepeople Contact Form Email contact-form-to-email allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Contact Form Email: from n/a through <= 1.3.58.

jos1264@social.skynetcloud.site at 2025-11-13T11:30:02.000Z ##

CVE-2025-64369 - WordPress Contact Form Email plugin <= 1.3.58 - Broken Access Control vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12733
(8.8 HIGH)

EPSS: 0.22%

updated 2025-11-13T06:30:30

2 posts

The Import any XML, CSV or Excel File to WordPress (WP All Import) plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 3.9.6. This is due to the use of eval() on unsanitized user-supplied input in the pmxi_if function within helpers/functions.php. This makes it possible for authenticated attackers, with import capabilities (typically administrators), t

jos1264@social.skynetcloud.site at 2025-11-13T07:40:02.000Z ##

CVE-2025-12733 - Import any XML, CSV or Excel File to WordPress (WP All Import) <= 3.9.6 - Authenticated (Administrator+) Remote Code Execution via Conditional Logic cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-13T04:25:02.000Z ##

CVE-2025-12733 - Import any XML, CSV or Excel File to WordPress (WP All Import) <= 3.9.6 - Authenticated (Administrator+) Remote Code Execution via Conditional Logic cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12620
(4.9 MEDIUM)

EPSS: 0.02%

updated 2025-11-13T06:30:30

1 posts

The Poll Maker – Versus Polls, Anonymous Polls, Image Polls plugin for WordPress is vulnerable to generic SQL Injection via the ‘filterbyauthor’ parameter in all versions up to, and including, 6.0.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level a

jos1264@social.skynetcloud.site at 2025-11-13T08:10:02.000Z ##

CVE-2025-12620 - Poll Maker – Versus Polls, Anonymous Polls, Image Polls <= 6.0.7 - Authenticated (Administrator+) SQL Injection via `filterbyauthor` Parameter cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12536
(5.3 MEDIUM)

EPSS: 0.04%

updated 2025-11-13T06:30:30

1 posts

The SureForms plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.13.1 via the '_srfm_email_notification' post meta registration. This is due to setting the 'auth_callback' parameter to '__return_true', which allows unauthenticated access to the metadata. This makes it possible for unauthenticated attackers to extract sensitive data includin

jos1264@social.skynetcloud.site at 2025-11-13T04:25:02.000Z ##

CVE-2025-12536 - SureForms <= 1.13.1 - Missing Authorization to Unauthenticated Sensitive Information Exposure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12366
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-13T06:30:30

1 posts

The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.0.5 via the pagelayer_replace_page function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to replace media files belonging to other use

jos1264@social.skynetcloud.site at 2025-11-13T04:25:02.000Z ##

CVE-2025-12366 - Page Builder: Pagelayer – Drag and Drop website builder <= 2.0.5 - Authenticated (Author+) Insecure Direct Object Reference cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12089
(6.5 MEDIUM)

EPSS: 0.99%

updated 2025-11-13T06:30:30

1 posts

The Data Tables Generator by Supsystic plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the cleanCache() function in all versions up to, and including, 1.10.45. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution

jos1264@social.skynetcloud.site at 2025-11-13T04:25:02.000Z ##

CVE-2025-12089 - Data Tables Generator by Supsystic <= 1.10.45 - Authenticated (Admin+) Arbitrary File Deletion cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12891
(5.3 MEDIUM)

EPSS: 0.05%

updated 2025-11-13T05:16:03.007000

1 posts

The Survey Maker plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'ays_survey_show_results' AJAX endpoint in all versions up to, and including, 5.1.9.4. This makes it possible for unauthenticated attackers to view all survey submissions.

jos1264@social.skynetcloud.site at 2025-11-13T08:10:02.000Z ##

CVE-2025-12891 - Survey Maker <= 5.1.9.4 - Missing Authorization to Unauthenticated Information Exposure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12979
(5.3 MEDIUM)

EPSS: 0.05%

updated 2025-11-13T04:15:46.730000

1 posts

The Welcart e-Commerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'usces_export' action in all versions up to, and including, 2.11.24. This makes it possible for unauthenticated attackers to access configured payment credentials (ex. PayPal api secret) , as well as business contact details, mail templates, and other operational settin

jos1264@social.skynetcloud.site at 2025-11-13T04:25:02.000Z ##

CVE-2025-12979 - Welcart e-Commerce <= 2.11.24 - Missing Authorization to Unauthenticated Information Exposure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12892
(5.3 MEDIUM)

EPSS: 0.05%

updated 2025-11-13T04:15:46.537000

1 posts

The Survey Maker plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the deactivate_plugin_option() function in all versions up to, and including, 5.1.9.4. This makes it possible for unauthenticated attackers to update the ays_survey_maker_upgrade_plugin option.

jos1264@social.skynetcloud.site at 2025-11-13T04:25:02.000Z ##

CVE-2025-12892 - Survey Maker <= 5.1.9.4 - Missing Authorization Unauthenticated Limited Option Update cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11923
(8.8 HIGH)

EPSS: 0.04%

updated 2025-11-13T04:15:44.543000

2 posts

The LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes plugin for WordPress is vulnerable to privilege escalation. This is due to the plugin not properly validating a user's identity prior to allowing them to modify their own role via the REST API. The permission check in the update_item_permissions_check() function returns true when a user updates their own account without verifying the

jos1264@social.skynetcloud.site at 2025-11-13T07:40:02.000Z ##

CVE-2025-11923 - LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes - Various Versions - Authenticated (Student+) Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-13T04:25:03.000Z ##

CVE-2025-11923 - LifterLMS – WP LMS for eLearning, Online Courses, & Quizzes - Various Versions - Authenticated (Student+) Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59367(CVSS UNKNOWN)

EPSS: 0.23%

updated 2025-11-13T03:31:30

1 posts

An authentication bypass vulnerability has been identified in certain DSL series routers, may allow remote attackers to gain unauthorized access into the affected system. Refer to the 'Security Update for DSL Series Router' section on the ASUS Security Advisory for more information.

jos1264@social.skynetcloud.site at 2025-11-13T05:20:01.000Z ##

CVE-2025-59367 - ASUS DSL Router Authentication Bypass Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59089
(5.9 MEDIUM)

EPSS: 0.05%

updated 2025-11-13T00:31:26

1 posts

If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new buffer on each recv() call, even when the transfer is incompl

jos1264@social.skynetcloud.site at 2025-11-12T18:20:03.000Z ##

CVE-2025-59089 - Python-kdcproxy: remote dos via unbounded tcp upstream buffering cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59088
(8.6 HIGH)

EPSS: 0.04%

updated 2025-11-13T00:31:25

2 posts

If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames

jos1264@social.skynetcloud.site at 2025-11-12T20:00:02.000Z ##

CVE-2025-59088 - Python-kdcproxy: unauthenticated ssrf via realm‑controlled dns srv cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-12T18:20:02.000Z ##

CVE-2025-59088 - Python-kdcproxy: unauthenticated ssrf via realm‑controlled dns srv cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-63419
(6.1 MEDIUM)

EPSS: 0.03%

updated 2025-11-13T00:31:25

1 posts

Cross Site Scripting (XSS) vulnerability in CrushFTP 11.3.6_48. The Web-Based Server has a feature where users can share files, the feature reflects the filename to an emailbody field with no sanitations leading to HTML Injection.

1 repos

https://github.com/MMAKINGDOM/CVE-2025-63419

CVE-2025-52331
(6.1 MEDIUM)

EPSS: 0.03%

updated 2025-11-13T00:31:25

1 posts

Cross-site scripting (XSS) vulnerability in the generate report functionality in Rarlab WinRAR 7.11, allows attackers to disclose user information such as the computer username, generated report directory, and IP address. The generate report command includes archived file names without validation in the HTML report, which allows potentially malicious HTML tags to be injected into the report. User

CVE-2025-13075
(4.7 MEDIUM)

EPSS: 0.03%

updated 2025-11-13T00:30:30

1 posts

A vulnerability was detected in code-projects Responsive Hotel Site 1.0. Impacted is an unknown function of the file /admin/usersettingdel.php. Performing manipulation of the argument eid results in sql injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.

jos1264@social.skynetcloud.site at 2025-11-13T01:05:03.000Z ##

CVE-2025-13075 - code-projects Responsive Hotel Site usersettingdel.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12703(CVSS UNKNOWN)

EPSS: 0.00%

updated 2025-11-13T00:30:30

1 posts

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

jos1264@social.skynetcloud.site at 2025-11-13T01:05:03.000Z ##

CVE-2025-12703 - Apache Struts Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2023-7329(CVSS UNKNOWN)

EPSS: 0.40%

updated 2025-11-13T00:30:24

1 posts

Tinycontrol LAN Controller v3 (LK3) firmware versions up to 1.58a (hardware v3.8) contain a missing authentication vulnerability in the stm.cgi endpoint. A remote, unauthenticated attacker can send crafted requests to forcibly reboot the device or restore factory settings, leading to a denial of service and configuration loss.

jos1264@social.skynetcloud.site at 2025-11-12T22:40:02.000Z ##

CVE-2023-7329 - Tinycontrol LAN Controller v3 (LK3) Remote DoS cvefeed.io/vuln/detail/CVE-202

##

CVE-2023-7327(CVSS UNKNOWN)

EPSS: 0.10%

updated 2025-11-13T00:30:24

1 posts

Ozeki SMS Gateway versions up to and including 10.3.208 contain a path traversal vulnerability. Successful exploitation allows an unauthenticated attacker to use URL-encoded traversal sequences to read arbitrary files from the underlying filesystem with the privileges of the gateway service, leading to disclosure of sensitive information.

jos1264@social.skynetcloud.site at 2025-11-12T22:40:02.000Z ##

CVE-2023-7327 - Ozeki SMS Gateway <= 10.3.208 Unauthenticated Arbitrary File Read cvefeed.io/vuln/detail/CVE-202

##

CVE-2021-4463(CVSS UNKNOWN)

EPSS: 0.07%

updated 2025-11-13T00:30:24

1 posts

Longjing Technology BEMS API versions up to and including 1.21 contains an unauthenticated arbitrary file download vulnerability in the 'downloads' endpoint. The 'fileName' parameter is not properly sanitized, allowing attackers to craft traversal sequences and access sensitive files outside the intended directory.

jos1264@social.skynetcloud.site at 2025-11-12T22:40:02.000Z ##

CVE-2021-4463 - Longjing Technology BEMS API <= 1.21 Remote Arbitrary File Download cvefeed.io/vuln/detail/CVE-202

##

CVE-2022-4982(CVSS UNKNOWN)

EPSS: 0.06%

updated 2025-11-13T00:30:24

1 posts

DBLTek GoIP-1 firmware versions up to and including GHSFVT-1.1-67-5 contain a local file inclusion vulnerability. The device's web server exposes handlers (`frame.html` and `frame.A100.html`) that accept a path parameter (`content` or `sidebar`) which is not properly validated or canonicalized. An attacker can supply directory-traversal sequences to cause the server to read and return arbitrary fi

jos1264@social.skynetcloud.site at 2025-11-12T22:40:02.000Z ##

CVE-2022-4982 - DBLTek GoIP-1 vGHSFVT-1.1-67-5 Unauthenticated LFI cvefeed.io/vuln/detail/CVE-202

##

CVE-2017-20211(CVSS UNKNOWN)

EPSS: 0.29%

updated 2025-11-13T00:30:24

1 posts

UCanCode E-XD++ Visualization Enterprise Suite contains an untrusted pointer dereference vulnerability via the TKDRAWCAD.TKDrawCADCtrl.1 ActiveX control. This is because it exposes a RotateShape method that dereferences a user-supplied pointer without sufficient validation. A crafted input may cause the control to dereference an attacker-controlled pointer, enabling remote code execution in the co

jos1264@social.skynetcloud.site at 2025-11-12T22:40:01.000Z ##

CVE-2017-20211 - UCanCode E-XD++ Visualization Enterprise Suite Untrusted Pointer Dereference RCE cvefeed.io/vuln/detail/CVE-201

##

CVE-2016-15055(CVSS UNKNOWN)

EPSS: 0.97%

updated 2025-11-13T00:30:24

1 posts

JVC VN-T IP-camera models firmware versions up to 2016-08-22 (confirmed on the VN-T216VPRU model) contain a directory traversal vulnerability in the checkcgi endpoint that accepts a user-controlled file parameter. An unauthenticated remote attacker can leverage this vulnerability to read arbitrary files on the device.

jos1264@social.skynetcloud.site at 2025-11-12T22:40:01.000Z ##

CVE-2016-15055 - JVC VN-T IP-Camera Directory Traversal via check.cgi cvefeed.io/vuln/detail/CVE-201

##

CVE-2025-11560
(6.1 MEDIUM)

EPSS: 0.03%

updated 2025-11-13T00:30:17

1 posts

The Team Members Showcase WordPress plugin before 3.5.0 does not sanitize and escape a parameter before outputting it back in the page, leading to reflected cross-site scripting, which could be used against high-privilege users such as admins.

jos1264@social.skynetcloud.site at 2025-11-12T08:10:02.000Z ##

CVE-2025-11560 - Team Members Showcase < 3.5.0 - Reflected XSS cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64707
(0 None)

EPSS: 0.04%

updated 2025-11-12T23:15:40.130000

1 posts

Frappe Learning is a learning system that helps users structure their content. Starting in version 2.0.0 and prior to version 2.41.0, when admins revoked a role from the user, the effect was not immediate because of caching. The issue has been fixed in version 2.41.0 by ensuring the cache is cleared after roles are updated.

jos1264@social.skynetcloud.site at 2025-11-13T01:05:03.000Z ##

CVE-2025-64707 - Frappe LMS revoking access did not show immediate effect as roles were cached cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64500
(7.3 HIGH)

EPSS: 0.01%

updated 2025-11-12T22:15:50.127000

1 posts

Symfony is a PHP framework for web and console applications and a set of reusable PHP components. Symfony's HttpFoundation component defines an object-oriented layer for the HTTP specification. Starting in version 2.0.0 and prior to version 5.4.50, 6.4.29, and 7.3.7, the `Request` class improperly interprets some `PATH_INFO` in a way that leads to representing some URLs with a path that doesn't st

1 repos

https://github.com/B1ack4sh/Blackash-CVE-2025-64500

jos1264@social.skynetcloud.site at 2025-11-13T01:05:02.000Z ##

CVE-2025-64500 - Symfony's incorrect parsing of PATH_INFO can lead to limited authorization bypass cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-59491
(6.1 MEDIUM)

EPSS: 0.03%

updated 2025-11-12T22:15:48.847000

1 posts

Cross Site Scripting vulnerability in CentralSquare Community Development 19.5.7 via form fields.

CVE-2025-43205
(6.5 MEDIUM)

EPSS: 0.02%

updated 2025-11-12T22:15:48.297000

1 posts

An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in watchOS 11.4, tvOS 18.4, visionOS 2.4, iOS 18.4 and iPadOS 18.4. An app may be able to bypass ASLR.

jos1264@social.skynetcloud.site at 2025-11-12T01:10:02.000Z ##

CVE-2025-43205 - Apple iOS/WatchOS/TVOS/VisonOS Memory Corruption cvefeed.io/vuln/detail/CVE-202

##

CVE-2021-4464
(0 None)

EPSS: 0.34%

updated 2025-11-12T22:15:42.027000

1 posts

FiberHome AN5506-04-FA firmware versions up to and including RP2631 and HG6245D prior to RP2602 contain a stack-based buffer overflow, as the HTTP service ('webs') fails to enforce maximum lengths for Cookie header values. When a cookie longer than 511 bytes is processed, a stack buffer is overrun, leading to a crash or potential control of execution flow.

jos1264@social.skynetcloud.site at 2025-11-12T22:40:02.000Z ##

CVE-2021-4464 - FIberHome AN5506-04-FA / HG6245D Routers Remote Stack Overflow cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64186
(8.7 HIGH)

EPSS: 0.01%

updated 2025-11-12T21:45:07

1 posts

### Summary A vulnerability was identified in the `evervault-go` SDK’s attestation verification logic that may allow incomplete documents to pass validation. This may cause the client to trust an enclave operator that does not meet expected integrity guarantees. The exploitability of this issue is limited in Evervault-hosted environments as an attacker would require the pre-requisite ability to

jos1264@social.skynetcloud.site at 2025-11-12T22:20:03.000Z ##

CVE-2025-64186 - Evervault Go SDK: Incomplete PCR Validation in Enclave Attestation for non-Evervault hosted Enclaves cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-46608
(9.1 CRITICAL)

EPSS: 0.04%

updated 2025-11-12T21:31:15

1 posts

Dell Data Lakehouse, versions prior to 1.6.0.0, contain(s) an Improper Access Control vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges. This vulnerability is considered Critical, as it may result in unauthorized access with elevated privileges, compromising system integrity and customer data. Dell recommen

netsecio@mastodon.social at 2025-11-13T15:59:01.000Z ##

📰 Dell Patches Critical 9.1 CVSS Flaw in Data Lakehouse Platform

Dell patches critical 9.1 CVSS vulnerability (CVE-2025-46608) in its Data Lakehouse platform. The flaw allows a remote, high-privileged attacker to gain elevated rights. Update to version 1.6.0.0 immediately! 🚨 #Dell #Vulnerability #PatchNow #InfoSec

🔗 cyber.netsecops.io/articles/de

##

CVE-2025-8485
(7.3 HIGH)

EPSS: 0.01%

updated 2025-11-12T21:31:15

1 posts

An improper permissions vulnerability was reported in Lenovo App Store that could allow a local authenticated user to execute code with elevated privileges during installation of an application.

jos1264@social.skynetcloud.site at 2025-11-12T22:20:02.000Z ##

CVE-2025-8485 - Lenovo App Store Elevation of Privilege Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-8421
(6.6 MEDIUM)

EPSS: 0.01%

updated 2025-11-12T21:31:15

1 posts

An improper default permission vulnerability was reported in Lenovo Dock Manager that, under certain conditions during installation, could allow an authenticated local user to redirect log files with elevated privileges.

jos1264@social.skynetcloud.site at 2025-11-12T22:20:02.000Z ##

CVE-2025-8421 - Lenovo Dock Manager Improper Default Permission Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-27368
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-12T21:31:15

1 posts

IBM OpenPages 9.0 and 9.1 is vulnerable to information disclosure of sensitive information due to a weaker than expected security for certain REST end points used by the user interface of OpenPages. An authenticated user is able to obtain certain information about system metadata for areas beyond what the user is intended to view.

CVE-2025-46427
(8.8 HIGH)

EPSS: 0.17%

updated 2025-11-12T21:31:14

1 posts

Dell SmartFabric OS10 Software, versions prior to 10.6.1.0, contain an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Command execution.

jos1264@social.skynetcloud.site at 2025-11-12T22:20:02.000Z ##

CVE-2025-46427 - Dell SmartFabric OS10 Command Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64170
(3.8 LOW)

EPSS: 0.01%

updated 2025-11-12T21:15:53.433000

2 posts

sudo-rs is a memory safe implementation of sudo and su written in Rust. Starting in version 0.2.7 and prior to version 0.2.10, if a user begins entering a password but does not press return for an extended period, a password timeout may occur. When this happens, the keystrokes that were entered are echoed back to the console. This could reveal partial password information, possibly exposing histor

CVE-2025-13061
(6.3 MEDIUM)

EPSS: 0.04%

updated 2025-11-12T21:15:48.763000

1 posts

A vulnerability was detected in itsourcecode Online Voting System 1.0. This impacts an unknown function of the file /index.php?page=manage_voting. Performing manipulation results in unrestricted upload. The attack is possible to be carried out remotely. The exploit is now public and may be used.

jos1264@social.skynetcloud.site at 2025-11-12T22:20:03.000Z ##

CVE-2025-13061 - itsourcecode Online Voting System index.php unrestricted upload cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-62215
(7.0 HIGH)

EPSS: 0.71%

updated 2025-11-12T21:14:53.247000

8 posts

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kernel allows an authorized attacker to elevate privileges locally.

DarkWebInformer@infosec.exchange at 2025-11-12T21:58:20.000Z ##

CISA has added 3 new vulnerabilities to the KEV Catalog.

darkwebinformer.com/cisa-kev-c

CVE-2025-12480: Gladinet Triofox Improper Access Control Vulnerability

CVE-2025-62215: Microsoft Windows Race Condition Vulnerability

CVE-2025-9242: WatchGuard Firebox Out-of-Bounds Write Vulnerability

##

cisakevtracker@mastodon.social at 2025-11-12T16:01:24.000Z ##

CVE ID: CVE-2025-62215
Vendor: Microsoft
Product: Windows
Date Added: 2025-11-12
Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2025-11-12T15:53:59.000Z ##

CIA has updated the KEV catalogue.

CVE-2025-9242: WatchGuard Firebox Out-of-Bounds Write Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-62215: Microsoft Windows Race Condition Vulnerability cve.org/CVERecord?id=CVE-2025-

CVE-2025-12480: Gladinet Triofox Improper Access Control Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #Microsoft #WIndows #infosec

##

jos1264@social.skynetcloud.site at 2025-11-12T11:35:02.000Z ##

Patch Tuesday: Microsoft fixes actively exploited Windows kernel vulnerability (CVE-2025-62215) helpnetsecurity.com/2025/11/12 #securityupdate #PatchTuesday #TrendMicro #Don'tmiss #Immersive #Microsoft #Hotstuff #MSOffice #Windows #Ivanti #Rapid7 #News

##

technadu@infosec.exchange at 2025-11-12T10:36:48.000Z ##

Microsoft’s November 2025 Patch Tuesday addresses 68 vulnerabilities - with 5 critical and 1 zero-day (CVE-2025-62215) under active exploitation.

Critical flaws affect Windows Kernel, DirectX, Office, and GDI+, emphasizing the need for rapid patch cycles.
💬 How do you evaluate patch prioritization across hybrid environments?

#Microsoft #PatchTuesday #CyberSecurity #CVE #ZeroDay #WindowsUpdate #InfoSec #TechNadu

##

beyondmachines1@infosec.exchange at 2025-11-12T09:01:32.000Z ##

Microsoft November 2025 Patch Tuesday fixes one exploited zero-day flaw, 63 total

Microsoft's November 2025 Patch Tuesday addresses 63 vulnerabilities including one actively exploited Windows Kernel zero-day (CVE-2025-62215) that enables attackers to escalate privileges to SYSTEM level through a race condition exploit, plus four critical-severity flaws affecting Office, Visual Studio, DirectX, and Nuance PowerScribe.

**This advisory is important and urgent: One zero-day vulnerabilities are being actively exploited in the wild. Patch your Windows Operating Systems ASAP, then Microsoft Office and Visual Studio. Then review the advisory for the rest of the Microsoft products and Windows components you use.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

FunctionalProgramming@activitypub.awakari.com at 2025-11-11T13:46:08.000Z ## Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215) 5 Critical 58 Important 0 Moderate 0 Low Microsoft addresses 63 CVEs including one zero-day vulnerability which was expl...


Origin | Interest | Match ##

FunctionalProgramming@activitypub.awakari.com at 2025-11-11T18:46:08.000Z ## Microsoft’s November 2025 Patch Tuesday Addresses 63 CVEs (CVE-2025-62215) 5 Critical 58 Important 0 Moderate 0 Low Microsoft addresses 63 CVEs including one zero-day vulnerability which was expl...


Origin | Interest | Match ##

CVE-2025-46428
(8.8 HIGH)

EPSS: 0.17%

updated 2025-11-12T20:15:42.953000

1 posts

Dell SmartFabric OS10 Software, versions prior to 10.6.1.0, contain an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Code execution.

jos1264@social.skynetcloud.site at 2025-11-12T22:20:02.000Z ##

CVE-2025-46428 - Dell SmartFabric OS10 Command Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13060
(7.3 HIGH)

EPSS: 0.03%

updated 2025-11-12T20:15:39.357000

1 posts

A security vulnerability has been detected in SourceCodester Survey Application System 1.0. This affects an unknown function of the file /view_survey.php. Such manipulation of the argument ID leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.

jos1264@social.skynetcloud.site at 2025-11-12T22:20:01.000Z ##

CVE-2025-13060 - SourceCodester Survey Application System view_survey.php sql injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64531
(7.8 HIGH)

EPSS: 0.03%

updated 2025-11-12T18:41:07.100000

1 posts

Substance3D - Stager versions 3.1.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

jos1264@social.skynetcloud.site at 2025-11-11T21:55:02.000Z ##

CVE-2025-64531 - Substance3D - Stager | Use After Free (CWE-416) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-61834
(7.8 HIGH)

EPSS: 0.03%

updated 2025-11-12T18:40:52.677000

1 posts

Substance3D - Stager versions 3.1.5 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

jos1264@social.skynetcloud.site at 2025-11-11T21:55:02.000Z ##

CVE-2025-61834 - Substance3D - Stager | Use After Free (CWE-416) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-61833
(7.8 HIGH)

EPSS: 0.03%

updated 2025-11-12T18:40:45.433000

1 posts

Substance3D - Stager versions 3.1.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

jos1264@social.skynetcloud.site at 2025-11-11T21:55:03.000Z ##

CVE-2025-61833 - Substance3D - Stager | Out-of-bounds Read (CWE-125) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13042
(8.8 HIGH)

EPSS: 0.07%

updated 2025-11-12T18:31:32

3 posts

Inappropriate implementation in V8 in Google Chrome prior to 142.0.7444.166 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

AndriiKuznietsov75@social.kyiv.dcomm.net.ua at 2025-11-13T17:27:18.000Z ##

🔧#Google випустила позапланове оновлення безпеки для браузера #Chrome, яке усуває критичну вразливість CVE-2025-13042 у механізмі JavaScript V8. Проблема стосується користувачів Chrome на Android, Linux, macOS та Windows.

Щось останнім часом забагато позапланових оновлень у хромі🤔

##

linux@activitypub.awakari.com at 2025-11-13T09:31:21.000Z ## Debian: Chromium Critical Exec Code Risk DSA-6055-1 CVE-2025-13042 A security issue was discovered in Chromium which could result in the execution of arbitrary code, denial of service, or informati...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

jos1264@social.skynetcloud.site at 2025-11-12T18:20:02.000Z ##

CVE-2025-13042 - Google Chrome Heap Corruption Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-2843
(8.8 HIGH)

EPSS: 0.02%

updated 2025-11-12T18:31:32

2 posts

A flaw was found in the Observability Operator. The Operator creates a ServiceAccount with *ClusterRole* upon deployment of the *Namespace-Scoped* Custom Resource MonitorStack. This issue allows an adversarial Kubernetes Account with only namespaced-level roles, for example, a tenant controlling a namespace, to create a MonitorStack in the authorized namespace and then elevate permission to the cl

jos1264@social.skynetcloud.site at 2025-11-12T20:00:02.000Z ##

CVE-2025-2843 - Observability-operator: observability operator privilege escalation cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-12T18:20:02.000Z ##

CVE-2025-2843 - Observability-operator: observability operator privilege escalation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11367(CVSS UNKNOWN)

EPSS: 0.33%

updated 2025-11-12T18:31:32

1 posts

The N-central Software Probe < 2025.4 is vulnerable to Remote Code Execution via deserialization

jos1264@social.skynetcloud.site at 2025-11-12T20:00:02.000Z ##

CVE-2025-11367 - N-central windows software probe Remote Code Execution cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-20378
(3.1 LOW)

EPSS: 0.04%

updated 2025-11-12T18:31:32

1 posts

In Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, 9.2.9, and Splunk Cloud Platform versions below 10.0.2503.5, 9.3.2411.111, and 9.3.2408.121, an unauthenticated attacker could craft a malicious URL using the `return_to` parameter of the Splunk Web login endpoint. When an authenticated user visits the malicious URL, it could cause an unvalidated redirect to an external malicious site. To b

jos1264@social.skynetcloud.site at 2025-11-12T18:20:03.000Z ##

CVE-2025-20378 - Open Redirect on Web Login endpoint in Splunk Enterprise cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11366(CVSS UNKNOWN)

EPSS: 0.10%

updated 2025-11-12T18:31:31

1 posts

N-central < 2025.4 is vulnerable to authentication bypass via path traversal

jos1264@social.skynetcloud.site at 2025-11-12T20:00:02.000Z ##

CVE-2025-11366 - N-central Authentication bypass via path traversal cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64406
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-12T18:31:25

2 posts

An out-of-bounds Write vulnerability in Apache OpenOffice could allow an attacker to craft a document that would crash the program, or otherwise corrupt other memory areas. This issue affects Apache OpenOffice: through 4.1.15. Users are recommended to upgrade to version 4.1.16, which fixes the issue.

CVE-2025-12871
(9.8 CRITICAL)

EPSS: 0.13%

updated 2025-11-12T18:31:24

1 posts

The a+HRD developed by aEnrich has an Authentication Abuse vulnerability, allowing unauthenticated remote attackers to craft administrator access tokens and use them to access the system with elevated privileges.

CVE-2025-13026
(9.8 CRITICAL)

EPSS: 0.04%

updated 2025-11-12T18:31:20

1 posts

Sandbox escape due to incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145.

beyondmachines1@infosec.exchange at 2025-11-12T11:01:31.000Z ##

Mozilla releases Firefox patches, fixes 15 vulnerabilities including sandbox escape flaws

Mozilla Firefox 145, released November 11, 2025, patches 15 security vulnerabilities including two sandbox escape flaws (CVE-2025-13023 and CVE-2025-13026) in WebGPU that could allow attackers to execute arbitrary code outside the browser's security boundaries.

**Update your Firefox browser and Thunderbird email client. Firefox fixed two sandbox escape vulnerabilities in WebGPU that could let attackers break out of the browser and run code on your computer. There are no exploits yet, but your browser and email client are the first line of access to the internet, so they will stumble on the exploits first. Better to update, all tabs reopen automatically.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-25236
(5.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-12T18:15:35.200000

1 posts

Omnissa Workspace ONE UEM contains an observable response discrepancy vulnerability. A malicious actor may be able to enumerate sensitive information such as tenant ID and user accounts that could facilitate brute-force, password-spraying or credential-stuffing attacks.

jos1264@social.skynetcloud.site at 2025-11-12T18:20:03.000Z ##

CVE-2025-25236 - VMware Workspace ONE UEM Information Disclosure cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-20379
(3.5 LOW)

EPSS: 0.02%

updated 2025-11-12T18:15:35.030000

1 posts

In Splunk Enterprise versions below 10.0.1, 9.4.5, 9.3.7, and 9.2.9 and Splunk Cloud Platform versions below 9.3.2411.116, 9.3.2408.124, 10.0.2503.5 and 10.1.2507.1, a low-privileged user that does not hold the “admin“ or “power“ Splunk roles could run a saved search with a risky command using the permissions of a higher-privileged user to bypass the SPL safeguards for risky commands. They could b

jos1264@social.skynetcloud.site at 2025-11-12T18:20:03.000Z ##

CVE-2025-20379 - Risky command safeguards bypass using the “/services/streams/search“ REST endpoint through “q“ parameter in Splunk Enterprise cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12870
(9.8 CRITICAL)

EPSS: 0.08%

updated 2025-11-12T17:15:36.727000

1 posts

The a+HRD developed by aEnrich has an Authentication Abuse vulnerability, allowing unauthenticated remote attackers to send crafted packets to obtain administrator access tokens and use them to access the system with elevated privileges.

CVE-2025-52881
(0 None)

EPSS: 0.01%

updated 2025-11-12T16:20:22.257000

4 posts

runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use of a racing container with shared mounts (we have also verified this attack is possible to exploit using a standard Dockerfile with docker buildx build as that also perm

2 repos

https://github.com/jq6l43d1/proxmox-lxc-docker-fix

https://github.com/omne-earth/arca

Kubernetes@activitypub.awakari.com at 2025-11-11T07:45:39.000Z ## Researchers Uncover Critical runC Bugs Allowing Full Container Escape Security researchers have revealed three serious vulnerabilities in runC, the Open Container Initiative (OCI)-compliant runtime...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2025-31133 #CVE-2025-52565 #CVE-2025-52881 #Docker #Kubernetes #runC

Origin | Interest | Match ##

Kubernetes@activitypub.awakari.com at 2025-11-11T07:45:39.000Z ## Researchers Uncover Critical runC Bugs Allowing Full Container Escape Security researchers have revealed three serious vulnerabilities in runC, the Open Container Initiative (OCI)-compliant runtime...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2025-31133 #CVE-2025-52565 #CVE-2025-52881 #Docker #Kubernetes #runC

Origin | Interest | Match ##

Kubernetes@activitypub.awakari.com at 2025-11-11T07:45:39.000Z ## Researchers Uncover Critical runC Bugs Allowing Full Container Escape Security researchers have revealed three serious vulnerabilities in runC, the Open Container Initiative (OCI)-compliant runtime...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2025-31133 #CVE-2025-52565 #CVE-2025-52881 #Docker #Kubernetes #runC

Origin | Interest | Match ##

Kubernetes@activitypub.awakari.com at 2025-11-11T07:45:39.000Z ## Researchers Uncover Critical runC Bugs Allowing Full Container Escape Security researchers have revealed three serious vulnerabilities in runC, the Open Container Initiative (OCI)-compliant runtime...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2025-31133 #CVE-2025-52565 #CVE-2025-52881 #Docker #Kubernetes #runC

Origin | Interest | Match ##

CVE-2025-52565
(0 None)

EPSS: 0.01%

updated 2025-11-12T16:20:22.257000

4 posts

runc is a CLI tool for spawning and running containers according to the OCI specification. Versions 1.0.0-rc3 through 1.2.7, 1.3.0-rc.1 through 1.3.2, and 1.4.0-rc.1 through 1.4.0-rc.2, due to insufficient checks when bind-mounting `/dev/pts/$n` to `/dev/console` inside the container, an attacker can trick runc into bind-mounting paths which would normally be made read-only or be masked onto a pat

1 repos

https://github.com/omne-earth/arca

Kubernetes@activitypub.awakari.com at 2025-11-11T07:45:39.000Z ## Researchers Uncover Critical runC Bugs Allowing Full Container Escape Security researchers have revealed three serious vulnerabilities in runC, the Open Container Initiative (OCI)-compliant runtime...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2025-31133 #CVE-2025-52565 #CVE-2025-52881 #Docker #Kubernetes #runC

Origin | Interest | Match ##

Kubernetes@activitypub.awakari.com at 2025-11-11T07:45:39.000Z ## Researchers Uncover Critical runC Bugs Allowing Full Container Escape Security researchers have revealed three serious vulnerabilities in runC, the Open Container Initiative (OCI)-compliant runtime...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2025-31133 #CVE-2025-52565 #CVE-2025-52881 #Docker #Kubernetes #runC

Origin | Interest | Match ##

Kubernetes@activitypub.awakari.com at 2025-11-11T07:45:39.000Z ## Researchers Uncover Critical runC Bugs Allowing Full Container Escape Security researchers have revealed three serious vulnerabilities in runC, the Open Container Initiative (OCI)-compliant runtime...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2025-31133 #CVE-2025-52565 #CVE-2025-52881 #Docker #Kubernetes #runC

Origin | Interest | Match ##

Kubernetes@activitypub.awakari.com at 2025-11-11T07:45:39.000Z ## Researchers Uncover Critical runC Bugs Allowing Full Container Escape Security researchers have revealed three serious vulnerabilities in runC, the Open Container Initiative (OCI)-compliant runtime...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2025-31133 #CVE-2025-52565 #CVE-2025-52881 #Docker #Kubernetes #runC

Origin | Interest | Match ##

CVE-2025-42890
(10.0 CRITICAL)

EPSS: 0.07%

updated 2025-11-12T16:19:59.103000

4 posts

SQL Anywhere Monitor (Non-GUI) baked credentials into the code,exposing the resources or functionality to unintended users and providing attackers with the possibility of arbitrary code execution.This could cause high impact on confidentiality integrity and availability of the system.

CVE-2025-59499
(8.8 HIGH)

EPSS: 0.07%

updated 2025-11-12T16:19:34.210000

1 posts

Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.

jos1264@social.skynetcloud.site at 2025-11-11T20:25:01.000Z ##

CVE-2025-59499 - Microsoft SQL Server Elevation of Privilege Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11700
(0 None)

EPSS: 0.04%

updated 2025-11-12T16:19:12.850000

1 posts

N-central versions < 2025.4 are vulnerable to an XML External Entities injection leading to information disclosure

jos1264@social.skynetcloud.site at 2025-11-12T20:00:02.000Z ##

CVE-2025-11700 - N-central importServiceFromFile XXE Injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11567
(0 None)

EPSS: 0.01%

updated 2025-11-12T16:19:12.850000

1 posts

CWE-276: Incorrect Default Permissions vulnerability exists that could cause elevated system access when the target installation folder is not properly secured.

jos1264@social.skynetcloud.site at 2025-11-12T16:05:03.000Z ##

CVE-2025-11567 - Citrix Vulnerability: Unsecured Installation Folder Permissions cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-40177
(0 None)

EPSS: 0.02%

updated 2025-11-12T16:19:12.850000

1 posts

In the Linux kernel, the following vulnerability has been resolved: accel/qaic: Fix bootlog initialization ordering As soon as we queue MHI buffers to receive the bootlog from the device, we could be receiving data. Therefore all the resources needed to process that data need to be setup prior to queuing the buffers. We currently initialize some of the resources after queuing the buffers which

jos1264@social.skynetcloud.site at 2025-11-12T14:00:03.000Z ##

CVE-2025-40177 - accel/qaic: Fix bootlog initialization ordering cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-40173
(0 None)

EPSS: 0.02%

updated 2025-11-12T16:19:12.850000

1 posts

In the Linux kernel, the following vulnerability has been resolved: net/ip6_tunnel: Prevent perpetual tunnel growth Similarly to ipv4 tunnel, ipv6 version updates dev->needed_headroom, too. While ipv4 tunnel headroom adjustment growth was limited in commit 5ae1e9922bbd ("net: ip_tunnel: prevent perpetual headroom growth"), ipv6 tunnel yet increases the headroom without any ceiling. Reflect ipv4

jos1264@social.skynetcloud.site at 2025-11-12T14:00:03.000Z ##

CVE-2025-40173 - net/ip6_tunnel: Prevent perpetual tunnel growth cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-40169
(0 None)

EPSS: 0.02%

updated 2025-11-12T16:19:12.850000

1 posts

In the Linux kernel, the following vulnerability has been resolved: bpf: Reject negative offsets for ALU ops When verifying BPF programs, the check_alu_op() function validates instructions with ALU operations. The 'offset' field in these instructions is a signed 16-bit integer. The existing check 'insn->off > 1' was intended to ensure the offset is either 0, or 1 for BPF_MOD/BPF_DIV. However, b

CVE-2025-12901
(4.3 MEDIUM)

EPSS: 0.01%

updated 2025-11-12T16:19:12.850000

1 posts

The Asgaros Forum plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.2.1. This is due to missing nonce validation on the set_subscription_level() function. This makes it possible for unauthenticated attackers to modify the subscription settings of authenticated users via a forged request granted they can trick a logged-in user into performing a

jos1264@social.skynetcloud.site at 2025-11-12T08:10:02.000Z ##

CVE-2025-12901 - Asgaros Forum <= 3.2.1 - Cross-Site Request Forgery to Subscription Settings Update cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12087
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-12T16:19:12.850000

1 posts

The Wishlist and Save for later for Woocommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.1.22 via the 'awwlm_remove_added_wishlist_page' AJAX action due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete wishlist items from other u

jos1264@social.skynetcloud.site at 2025-11-12T08:10:02.000Z ##

CVE-2025-12087 - Wishlist and Save for later for Woocommerce <= 1.1.22 - Insecure Direct Object Reference to Authenticated (Subscriber+) Wishlist Item Deletion cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-40744
(7.5 HIGH)

EPSS: 0.02%

updated 2025-11-12T16:19:12.850000

1 posts

A vulnerability has been identified in Solid Edge SE2025 (All versions < V225.0 Update 11). Affected applications do not properly validate client certificates to connect to License Service endpoint. This could allow an unauthenticated remote attacker to perform man in the middle attacks.

jos1264@social.skynetcloud.site at 2025-11-12T00:35:02.000Z ##

CVE-2025-40744 - "Solid Edge Certificate Validation Weakness" cvefeed.io/vuln/detail/CVE-202

##

CVE-2024-32011
(8.8 HIGH)

EPSS: 0.06%

updated 2025-11-12T16:19:12.850000

1 posts

A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP12 Update 2). The affected application is vulnerable to run arbitrary commands via the user interface. This user interface can be used via the network and allows the execution of commands as administrative application user.

jos1264@social.skynetcloud.site at 2025-11-12T00:35:02.000Z ##

CVE-2024-32011 - Spectrum Power Command Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2024-32010
(7.8 HIGH)

EPSS: 0.01%

updated 2025-11-12T16:19:12.850000

1 posts

A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP12 Update 2). The affected application is vulnerable to extraction of database credentials via a world-readable credential file. This allows an attacker to connect to the database as privileged application user and to run system commands via the database.

jos1264@social.skynetcloud.site at 2025-11-12T00:35:02.000Z ##

CVE-2024-32010 - Spectrum Power 4 Database Credential Extraction and Command Injection Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-62452
(8.0 HIGH)

EPSS: 0.06%

updated 2025-11-12T16:19:12.850000

1 posts

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

jos1264@social.skynetcloud.site at 2025-11-11T20:25:03.000Z ##

CVE-2025-62452 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-62220
(8.8 HIGH)

EPSS: 0.06%

updated 2025-11-12T16:19:12.850000

1 posts

Heap-based buffer overflow in Windows Subsystem for Linux GUI allows an unauthorized attacker to execute code over a network.

jos1264@social.skynetcloud.site at 2025-11-11T20:25:03.000Z ##

CVE-2025-62220 - Windows Subsystem for Linux GUI Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-60715
(8.0 HIGH)

EPSS: 0.06%

updated 2025-11-12T16:19:12.850000

1 posts

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

jos1264@social.skynetcloud.site at 2025-11-11T20:25:01.000Z ##

CVE-2025-60715 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-62876(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-11-12T15:31:37

1 posts

A Execution with Unnecessary Privileges vulnerability in lightdm-kde-greeter allows escalation from the service user to root.This issue affects lightdm-kde-greeter. before 6.0.4.

jos1264@social.skynetcloud.site at 2025-11-12T16:05:02.000Z ##

CVE-2025-62876 - Lightdm-Kde-Greeter Execution Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11566(CVSS UNKNOWN)

EPSS: 0.07%

updated 2025-11-12T15:31:30

1 posts

CWE-307: Improper Restriction of Excessive Authentication Attempts vulnerability exists that would allow an attacker on the local network to gain access to the user account by performing an arbitrary number of authentication attempts with different credentials on the /REST/shutdownnow endpoint.

jos1264@social.skynetcloud.site at 2025-11-12T16:05:02.000Z ##

CVE-2025-11566 - Apache HTTP Server Brute Force Authentication Bypass cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-11565(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-11-12T15:31:30

1 posts

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability exists that could cause elevated system access when a Web Admin user on the local network tampers with the POST/REST/UpdateJRE request payload.

CVE-2025-64401
(7.5 HIGH)

EPSS: 0.03%

updated 2025-11-12T15:31:29

2 posts

Apache OpenOffice documents can contain links. A missing Authorization vulnerability in Apache OpenOffice allowed an attacker to craft a document that would cause external links to be loaded without prompt. In the affected versions of Apache OpenOffice, documents that used "floating frames" linked to external files would load the contents of those frames without prompting the user for permissio

CVE-2025-61623
(6.5 MEDIUM)

EPSS: 0.04%

updated 2025-11-12T15:31:29

1 posts

Reflected cross-site scripting vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 24.09.03. Users are recommended to upgrade to version 24.09.03, which fixes the issue.

jos1264@social.skynetcloud.site at 2025-11-12T11:40:03.000Z ##

CVE-2025-61623 - Apache OFBiz: Reflected Cross-site Scripting cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-52665
(10.0 CRITICAL)

EPSS: 8.39%

updated 2025-11-12T14:51:21.057000

1 posts

A malicious actor with access to the management network could exploit a misconfiguration in UniFi’s door access application, UniFi Access, that exposed a management API without proper authentication. This vulnerability was introduced in Version 3.3.22 and was fixed in Version 4.0.21 and later.  Affected Products: UniFi Access Application (Version 3.3.22 through 3.4.31). 
 Mitigation: Update yo

Nuclei template

cyberveille@mastobot.ping.moi at 2025-11-13T16:00:24.000Z ##

📢 CVE-2025-52665 : RCE non authentifiée dans UniFi OS expose routeurs et contrôle d’accès Ubiquiti
📝 Selon gbhackers.com (Divya, 3 novembre 2025), des chercheurs ont découvert une vulnérabilité critique d’exécution de code à distance n...
📖 cyberveille : cyberveille.ch/posts/2025-11-1
🌐 source : gbhackers.com/critical-unifi-o
#CVE_2025_52665 #RCE #Cyberveille

##

CVE-2025-40175(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-12T12:30:39

1 posts

In the Linux kernel, the following vulnerability has been resolved: idpf: cleanup remaining SKBs in PTP flows When the driver requests Tx timestamp value, one of the first steps is to clone SKB using skb_get. It increases the reference counter for that SKB to prevent unexpected freeing by another component. However, there may be a case where the index is requested, SKB is assigned and never cons

jos1264@social.skynetcloud.site at 2025-11-12T14:00:03.000Z ##

CVE-2025-40175 - idpf: cleanup remaining SKBs in PTP flows cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-40172(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-12T12:30:38

1 posts

In the Linux kernel, the following vulnerability has been resolved: accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages() Currently, if find_and_map_user_pages() takes a DMA xfer request from the user with a length field set to 0, or in a rare case, the host receives QAIC_TRANS_DMA_XFER_CONT from the device where resources->xferred_dma_size is equal to the requested transaction

jos1264@social.skynetcloud.site at 2025-11-12T14:00:02.000Z ##

CVE-2025-40172 - accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages() cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-40174(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-12T12:30:38

1 posts

In the Linux kernel, the following vulnerability has been resolved: x86/mm: Fix SMP ordering in switch_mm_irqs_off() Stephen noted that it is possible to not have an smp_mb() between the loaded_mm store and the tlb_gen load in switch_mm(), meaning the ordering against flush_tlb_mm_range() goes out the window, and it becomes possible for switch_mm() to not observe a recent tlb_gen update and fail

jos1264@social.skynetcloud.site at 2025-11-12T14:00:03.000Z ##

CVE-2025-40174 - x86/mm: Fix SMP ordering in switch_mm_irqs_off() cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-40171(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-12T12:30:37

1 posts

In the Linux kernel, the following vulnerability has been resolved: nvmet-fc: move lsop put work to nvmet_fc_ls_req_op It’s possible for more than one async command to be in flight from __nvmet_fc_send_ls_req. For each command, a tgtport reference is taken. In the current code, only one put work item is queued at a time, which results in a leaked reference. To fix this, move the work item to t

jos1264@social.skynetcloud.site at 2025-11-12T14:00:02.000Z ##

CVE-2025-40171 - nvmet-fc: move lsop put work to nvmet_fc_ls_req_op cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12998(CVSS UNKNOWN)

EPSS: 0.05%

updated 2025-11-12T12:30:36

2 posts

Improper Authentication vulnerability in TYPO3 Extension "Modules" codingms/modules.This issue affects Extension "Modules": before 4.3.11, from 5.0.0 before 5.7.4, from 6.0.0 before 6.4.2, from 7.0.0 before 7.5.5.

jos1264@social.skynetcloud.site at 2025-11-12T14:00:03.000Z ##

CVE-2025-12998 - Broken Authentication in extension “Modules” (modules) cvefeed.io/vuln/detail/CVE-202

##

jos1264@social.skynetcloud.site at 2025-11-12T13:15:02.000Z ##

CVE-2025-12998 - Broken Authentication in extension “Modules” (modules) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-40176(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-12T12:30:36

1 posts

In the Linux kernel, the following vulnerability has been resolved: tls: wait for pending async decryptions if tls_strp_msg_hold fails Async decryption calls tls_strp_msg_hold to create a clone of the input skb to hold references to the memory it uses. If we fail to allocate that clone, proceeding with async decryption can lead to various issues (UAF on the skb, writing into userspace memory aft

jos1264@social.skynetcloud.site at 2025-11-12T14:00:03.000Z ##

CVE-2025-40176 - tls: wait for pending async decryptions if tls_strp_msg_hold fails cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-40170(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-12T12:30:36

1 posts

In the Linux kernel, the following vulnerability has been resolved: net: use dst_dev_rcu() in sk_setup_caps() Use RCU to protect accesses to dst->dev from sk_setup_caps() and sk_dst_gso_max_size(). Also use dst_dev_rcu() in ip6_dst_mtu_maybe_forward(), and ip_dst_mtu_maybe_forward(). ip4_dst_hoplimit() can use dst_dev_net_rcu().

jos1264@social.skynetcloud.site at 2025-11-12T14:00:02.000Z ##

CVE-2025-40170 - net: use dst_dev_rcu() in sk_setup_caps() cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12382(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-12T12:30:34

2 posts

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Algosec Firewall Analyzer on Linux, 64 bit allows Path Traversal, Code Injection.This issue affects Algosec Firewall Analyzer: A33.0 (up to build 320), A33.10 (up to build 210).

cR0w@infosec.exchange at 2025-11-12T14:05:52.000Z ##

../ in another security tool.

techdocs.algosec.com/en/cves/C

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Algosec Firewall Analyzer on Linux, 64 bit allows Path Traversal, Code Injection.

##

jos1264@social.skynetcloud.site at 2025-11-12T11:40:03.000Z ##

CVE-2025-12382 - Path Traversal Allows Remote Code Execution in AlgoSec Firewall Analyzer cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12903
(7.5 HIGH)

EPSS: 0.21%

updated 2025-11-12T09:30:33

1 posts

The Payment Plugins Braintree For WooCommerce plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the wc-braintree/v1/3ds/vaulted_nonce REST API endpoint in all versions up to, and including, 3.2.78. This is due to the endpoint being registered with permission_callback set to __return_true and processing user-supplied token IDs without verifying ownershi

jos1264@social.skynetcloud.site at 2025-11-12T11:40:01.000Z ##

CVE-2025-12903 - Payment Plugins Braintree For WooCommerce <= 3.2.78 - Missing Authorization to Payment Token Exposure and Transaction Fraud cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13047
(7.5 HIGH)

EPSS: 0.05%

updated 2025-11-12T09:30:33

1 posts

Bacteriology Laboratory Reporting System developed by ViewLead Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.

jos1264@social.skynetcloud.site at 2025-11-12T11:00:03.000Z ##

CVE-2025-13047 - ViewLead Technology|Bacteriology Laboratory Reporting System cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-13046
(7.5 HIGH)

EPSS: 0.05%

updated 2025-11-12T09:30:32

1 posts

Bacteriology Laboratory Reporting System developed by ViewLead Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.

jos1264@social.skynetcloud.site at 2025-11-12T20:00:02.000Z ##

CVE-2025-13046 - ViewLead Technology|Bacteriology Laboratory Reporting System - SQL Injection cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12833
(4.3 MEDIUM)

EPSS: 0.03%

updated 2025-11-12T06:30:30

1 posts

The GeoDirectory – WP Business Directory Plugin and Classified Listings Directory plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.8.139 via the 'post_attachment_upload' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with author-level access and above, to attach arbitrary

jos1264@social.skynetcloud.site at 2025-11-12T08:10:02.000Z ##

CVE-2025-12833 - GeoDirectory – WP Business Directory Plugin and Classified Listings Directory <= 2.8.139 - Missing Authorization to Authenticated (Author+) Arbitrary Image Attachment cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-54983
(5.2 MEDIUM)

EPSS: 0.01%

updated 2025-11-12T06:30:24

1 posts

A health check port on Zscaler Client Connector on Windows, versions 4.6 < 4.6.0.216 and 4.7 < 4.7.0.47, which under specific circumstances was not released after use, allowed traffic to potentially bypass ZCC forwarding controls.

jos1264@social.skynetcloud.site at 2025-11-12T05:15:02.000Z ##

CVE-2025-54983 - Health check port on ZCC allows tunnel bypass cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-40111(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-12T03:30:37

1 posts

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix Use-after-free in validation Nodes stored in the validation duplicates hashtable come from an arena allocator that is cleared at the end of vmw_execbuf_process. All nodes are expected to be cleared in vmw_validation_drop_ht but this node escaped because its resource was destroyed prematurely.

jos1264@social.skynetcloud.site at 2025-11-12T05:15:02.000Z ##

CVE-2025-40111 - drm/vmwgfx: Fix Use-after-free in validation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-40110(CVSS UNKNOWN)

EPSS: 0.02%

updated 2025-11-12T03:30:26

1 posts

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix a null-ptr access in the cursor snooper Check that the resource which is converted to a surface exists before trying to use the cursor snooper on it. vmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers because some svga commands accept SVGA3D_INVALID_ID to mean "no surface", unfortunately f

jos1264@social.skynetcloud.site at 2025-11-12T05:15:02.000Z ##

CVE-2025-40110 - drm/vmwgfx: Fix a null-ptr access in the cursor snooper cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-40827
(7.8 HIGH)

EPSS: 0.01%

updated 2025-11-11T21:30:39

2 posts

A vulnerability has been identified in Siemens Software Center (All versions < V3.5), Solid Edge SE2025 (All versions < V225.0 Update 10). The affected application is vulnerable to DLL hijacking. This could allow an attacker to execute arbitrary code via placing a crafted DLL file on the system.

CVE-2025-40815
(7.2 HIGH)

EPSS: 0.04%

updated 2025-11-11T21:30:39

1 posts

A vulnerability has been identified in LOGO! 12/24RCE (6ED1052-1MD08-0BA2) (All versions), LOGO! 12/24RCEo (6ED1052-2MD08-0BA2) (All versions), LOGO! 230RCE (6ED1052-1FB08-0BA2) (All versions), LOGO! 230RCEo (6ED1052-2FB08-0BA2) (All versions), LOGO! 24CE (6ED1052-1CC08-0BA2) (All versions), LOGO! 24CEo (6ED1052-2CC08-0BA2) (All versions), LOGO! 24RCE (6ED1052-1HB08-0BA2) (All versions), LOGO! 24R

jos1264@social.skynetcloud.site at 2025-11-12T00:35:03.000Z ##

CVE-2025-40815 - Siemens LOGO! TCP Packet Structure Validation Buffer Overflow cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-40763
(7.8 HIGH)

EPSS: 0.01%

updated 2025-11-11T21:30:39

1 posts

A vulnerability has been identified in Altair Grid Engine (All versions < V2026.0.0). Affected products do not properly validate environment variables when loading shared libraries, allowing path hijacking through malicious library substitution. This could allow a local attacker to execute arbitrary code with superuser privileges by manipulating the environment variable and placing a malicious lib

jos1264@social.skynetcloud.site at 2025-11-12T00:35:02.000Z ##

CVE-2025-40763 - "Altair Grid Engine Environment Variable Path Hijacking (Local Privilege Escalation)" cvefeed.io/vuln/detail/CVE-202

##

CVE-2024-32009
(7.8 HIGH)

EPSS: 0.01%

updated 2025-11-11T21:30:39

1 posts

A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP12 Update 2). The affected application is vulnerable to a local privilege escalation due to wrongly set permissions to a binary which allows any local attacker to gain administrative privileges.

jos1264@social.skynetcloud.site at 2025-11-12T00:35:02.000Z ##

CVE-2024-32009 - Spectrum Power Privilege Escalation Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2024-32008
(7.8 HIGH)

EPSS: 0.01%

updated 2025-11-11T21:30:39

1 posts

A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP12 Update 2). The affected application is vulnerable to a local privilege escalation due to an exposed debug interface on the localhost. This allows any local user to gain code execution as administrative application user.

jos1264@social.skynetcloud.site at 2025-11-12T00:35:02.000Z ##

CVE-2024-32008 - Spectrum Power 4 Local Privilege Escalation cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-61835
(7.8 HIGH)

EPSS: 0.03%

updated 2025-11-11T21:30:39

1 posts

Substance3D - Stager versions 3.1.5 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

jos1264@social.skynetcloud.site at 2025-11-11T21:55:03.000Z ##

CVE-2025-61835 - Substance3D - Stager | Integer Underflow (Wrap or Wraparound) (CWE-191) cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-40817
(6.5 MEDIUM)

EPSS: 0.02%

updated 2025-11-11T21:30:39

1 posts

A vulnerability has been identified in LOGO! 12/24RCE (6ED1052-1MD08-0BA2) (All versions), LOGO! 12/24RCEo (6ED1052-2MD08-0BA2) (All versions), LOGO! 230RCE (6ED1052-1FB08-0BA2) (All versions), LOGO! 230RCEo (6ED1052-2FB08-0BA2) (All versions), LOGO! 24CE (6ED1052-1CC08-0BA2) (All versions), LOGO! 24CEo (6ED1052-2CC08-0BA2) (All versions), LOGO! 24RCE (6ED1052-1HB08-0BA2) (All versions), LOGO! 24R

jos1264@social.skynetcloud.site at 2025-11-11T21:55:02.000Z ##

CVE-2025-40817 - Siemens LOGO! Time Manipulation Remote Command Execution cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-62222
(8.8 HIGH)

EPSS: 0.11%

updated 2025-11-11T18:30:31

1 posts

Improper neutralization of special elements used in a command ('command injection') in Visual Studio Code CoPilot Chat Extension allows an unauthorized attacker to execute code over a network.

jos1264@social.skynetcloud.site at 2025-11-11T20:25:03.000Z ##

CVE-2025-62222 - Agentic AI and Visual Studio Code Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-60704
(7.5 HIGH)

EPSS: 0.05%

updated 2025-11-11T18:30:30

1 posts

Missing cryptographic step in Windows Kerberos allows an unauthorized attacker to elevate privileges over a network.

CVE-2025-60724
(9.8 CRITICAL)

EPSS: 0.07%

updated 2025-11-11T18:30:30

2 posts

Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.

offseq@infosec.exchange at 2025-11-12T03:01:55.000Z ##

🔴 CRITICAL heap overflow (CVE-2025-60724) in MS Office LTSC for Mac 2021 (v16.0.1): Remote code execution possible—no auth or user action needed. Restrict network, monitor for abuse, and prep for patch. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202560724 #macOS #InfoSec

##

jos1264@social.skynetcloud.site at 2025-11-11T20:25:02.000Z ##

CVE-2025-60724 - GDI+ Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-30398
(8.1 HIGH)

EPSS: 0.04%

updated 2025-11-11T18:30:25

1 posts

Missing authorization in Nuance PowerScribe allows an unauthorized attacker to disclose information over a network.

jos1264@social.skynetcloud.site at 2025-11-11T20:25:01.000Z ##

CVE-2025-30398 - Nuance PowerScribe 360 Information Disclosure Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-62211
(8.7 HIGH)

EPSS: 0.05%

updated 2025-11-11T18:30:23

1 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Dynamics 365 Field Service (online) allows an authorized attacker to perform spoofing over a network.

jos1264@social.skynetcloud.site at 2025-11-11T20:25:02.000Z ##

CVE-2025-62211 - Dynamics 365 Field Service (online) Spoofing Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-62210
(8.7 HIGH)

EPSS: 0.05%

updated 2025-11-11T18:30:23

1 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Dynamics 365 Field Service (online) allows an authorized attacker to perform spoofing over a network.

jos1264@social.skynetcloud.site at 2025-11-11T20:25:02.000Z ##

CVE-2025-62210 - Dynamics 365 Field Service (online) Spoofing Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-62204
(8.0 HIGH)

EPSS: 0.32%

updated 2025-11-11T18:30:23

1 posts

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

jos1264@social.skynetcloud.site at 2025-11-11T20:25:02.000Z ##

CVE-2025-62204 - Microsoft SharePoint Remote Code Execution Vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-12101(CVSS UNKNOWN)

EPSS: 4.69%

updated 2025-11-11T15:31:27

4 posts

Cross-Site Scripting (XSS) in NetScaler ADC and NetScaler Gateway when the appliance is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server

Nuclei template

1 repos

https://github.com/6h4ack/CVE-2025-12101-checker

CVE-2025-42887
(10.0 CRITICAL)

EPSS: 0.05%

updated 2025-11-11T03:30:36

1 posts

Due to missing input sanitation, SAP Solution Manager allows an authenticated attacker to insert malicious code when calling a remote-enabled function module. This could provide the attacker with full control of the system hence leading to high impact on confidentiality, integrity and availability of the system.

Hackread@mstdn.social at 2025-11-13T13:17:01.000Z ##

🚨 Urgent patch alert: a 9.9/10 severity flaw (CVE-2025-42887) in #SAP Solution Manager allows code injection and full system takeover. Act now.

Read: hackread.com/sap-patch-cve-202

#CyberSecurity #Vulnerability #ZeroDay #InfoSec #PatchNow

##

CVE-2025-20354
(9.8 CRITICAL)

EPSS: 0.12%

updated 2025-11-07T15:44:35.293000

2 posts

A vulnerability in the Java Remote Method Invocation (RMI) process of Cisco Unified CCX could allow an unauthenticated, remote attacker to upload arbitrary files and execute arbitrary commands with root permissions on an affected system. This vulnerability is due to improper authentication mechanisms that are associated to specific Cisco Unified CCX features. An attacker could exploit this vuln

1 repos

https://github.com/B1ack4sh/Blackash-CVE-2025-20354

AAKL at 2025-11-13T17:42:21.380Z ##

New updates from Cisco. These are just the top three. There are seven of them.

Critical: CVE-2025-20354 and CVE-2025-20358: Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities sec.cloudapps.cisco.com/securi

New: High vulnerability CVE-2025-20341: Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi

New. CVE-2025-20346, medium severity: Cisco Catalyst Center Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity

##

AAKL@infosec.exchange at 2025-11-13T17:42:21.000Z ##

New updates from Cisco. These are just the top three. There are seven of them.

Critical: CVE-2025-20354 and CVE-2025-20358: Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities sec.cloudapps.cisco.com/securi

New: High vulnerability CVE-2025-20341: Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi

New. CVE-2025-20346, medium severity: Cisco Catalyst Center Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #vulnerability

##

CVE-2025-31133(CVSS UNKNOWN)

EPSS: 0.01%

updated 2025-11-06T23:12:38

4 posts

### Impact ### The OCI runtime specification has a `maskedPaths` feature that allows for files or directories to be "masked" by placing a mount on top of them to conceal their contents. This is primarily intended to protect against privileged users in non-user-namespaced from being able to write to files or access directories that would either provide sensitive information about the host to cont

3 repos

https://github.com/sahar042/CVE-2025-31133

https://github.com/skynet-f-nvidia/CVE-2025-31133

https://github.com/omne-earth/arca

Kubernetes@activitypub.awakari.com at 2025-11-11T07:45:39.000Z ## Researchers Uncover Critical runC Bugs Allowing Full Container Escape Security researchers have revealed three serious vulnerabilities in runC, the Open Container Initiative (OCI)-compliant runtime...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2025-31133 #CVE-2025-52565 #CVE-2025-52881 #Docker #Kubernetes #runC

Origin | Interest | Match ##

Kubernetes@activitypub.awakari.com at 2025-11-11T07:45:39.000Z ## Researchers Uncover Critical runC Bugs Allowing Full Container Escape Security researchers have revealed three serious vulnerabilities in runC, the Open Container Initiative (OCI)-compliant runtime...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2025-31133 #CVE-2025-52565 #CVE-2025-52881 #Docker #Kubernetes #runC

Origin | Interest | Match ##

Kubernetes@activitypub.awakari.com at 2025-11-11T07:45:39.000Z ## Researchers Uncover Critical runC Bugs Allowing Full Container Escape Security researchers have revealed three serious vulnerabilities in runC, the Open Container Initiative (OCI)-compliant runtime...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2025-31133 #CVE-2025-52565 #CVE-2025-52881 #Docker #Kubernetes #runC

Origin | Interest | Match ##

Kubernetes@activitypub.awakari.com at 2025-11-11T07:45:39.000Z ## Researchers Uncover Critical runC Bugs Allowing Full Container Escape Security researchers have revealed three serious vulnerabilities in runC, the Open Container Initiative (OCI)-compliant runtime...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2025-31133 #CVE-2025-52565 #CVE-2025-52881 #Docker #Kubernetes #runC

Origin | Interest | Match ##

CVE-2025-20358
(9.4 CRITICAL)

EPSS: 0.34%

updated 2025-11-05T17:48:34

2 posts

A vulnerability in the Contact Center Express (CCX) Editor application of Cisco Unified CCX could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative permissions pertaining to script creation and execution. This vulnerability is due to improper authentication mechanisms in the communication between the CCX Editor and an affected Unified CCX server. An atta

AAKL at 2025-11-13T17:42:21.380Z ##

New updates from Cisco. These are just the top three. There are seven of them.

Critical: CVE-2025-20354 and CVE-2025-20358: Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities sec.cloudapps.cisco.com/securi

New: High vulnerability CVE-2025-20341: Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi

New. CVE-2025-20346, medium severity: Cisco Catalyst Center Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity

##

AAKL@infosec.exchange at 2025-11-13T17:42:21.000Z ##

New updates from Cisco. These are just the top three. There are seven of them.

Critical: CVE-2025-20354 and CVE-2025-20358: Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities sec.cloudapps.cisco.com/securi

New: High vulnerability CVE-2025-20341: Cisco Catalyst Center Virtual Appliance Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi

New. CVE-2025-20346, medium severity: Cisco Catalyst Center Privilege Escalation Vulnerability sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #vulnerability

##

CVE-2025-40778
(8.6 HIGH)

EPSS: 0.01%

updated 2025-11-05T00:32:31

1 posts

Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.

1 repos

https://github.com/nehkark/CVE-2025-40778

cR0w@infosec.exchange at 2025-11-12T14:15:34.000Z ##

And now they ( publicly ) addressed CVE-2025-40778.

my.f5.com/manage/s/article/K00

Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.

##

CVE-2025-27835
(7.8 HIGH)

EPSS: 0.02%

updated 2025-11-03T21:33:13

2 posts

An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs when converting glyphs to Unicode in psi/zbfont.c.

RedTeamPentesting@mastodon.social at 2025-11-13T09:04:52.000Z ##

🚨8 months after public disclosure, RHEL, @almalinux and @rockylinux are still vulnerable for a Ghostscript RCE with a reliable public exploit (CVE-2025-27835 and others)! It can be triggered by opening LibreOffice docs or through a server that uses ImageMagick for file conversion!

##

RedTeamPentesting@mastodon.social at 2025-11-13T09:05:34.000Z ##

Red Hat is aware, but they chose not to fix it. They also assigned a low CVSS score 5.5 because it is supposed to be "only exploitable locally" even though many web apps process uploaded documents using Ghostscript:

access.redhat.com/security/cve

##

CVE-2025-40300(CVSS UNKNOWN)

EPSS: 0.07%

updated 2025-11-03T18:32:46

1 posts

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors af

Ubuntu@activitypub.awakari.com at 2025-11-13T14:52:34.000Z ## Ubuntu 22.04 LTS USN-7862-3 Important Info Exposure CVE-2025-40300 The system could be made to expose sensitive information.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-20333
(9.9 CRITICAL)

EPSS: 4.05%

updated 2025-10-28T13:58:58.610000

1 posts

A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker with valid VPN user credentials cou

CVE-2025-62518
(8.1 HIGH)

EPSS: 0.01%

updated 2025-10-27T15:13:04

1 posts

## Summary Versions of `astral-tokio-tar` prior to 0.5.6 contain a boundary parsing vulnerability that allows attackers to smuggle additional archive entries by exploiting inconsistent PAX/ustar header handling. When processing archives with PAX-extended headers containing size overrides, the parser incorrectly advances stream position based on ustar header size (often zero) instead of the PAX-sp

1 repos

https://github.com/edera-dev/cve-tarmageddon

jbz@indieweb.social at 2025-11-12T03:01:01.000Z ##

🪤 TARmageddon (CVE-2025-62518): RCE Vulnerability Highlights the Challenges of Open Source Abandonware

「 In the worst-case scenario, this vulnerability has a severity of 8.1 (High) and can lead to Remote Code Execution (RCE) through file overwriting attacks, such as replacing configuration files or hijacking build backends 」

edera.dev/stories/tarmageddon

#TARmageddon #CVE202562518 #rust #rce #cybersecurity

##

jbhall56 at 2025-11-13T14:01:58.940Z ##

Citrix disclosed CVE-2025-5777 in June, and researcher Kevin Beaumont quickly dubbed it CitrixBleed 2 due to its similarities to the original CitrixBleed (CVE-2023-4966). darkreading.com/vulnerabilitie

##

jbhall56@infosec.exchange at 2025-11-13T14:01:58.000Z ##

Citrix disclosed CVE-2025-5777 in June, and researcher Kevin Beaumont quickly dubbed it CitrixBleed 2 due to its similarities to the original CitrixBleed (CVE-2023-4966). darkreading.com/vulnerabilitie

##

CVE-2025-20337
(10.0 CRITICAL)

EPSS: 1.51%

updated 2025-10-22T00:34:26

3 posts

A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying operating system as root. The attacker does not require any valid credentials to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitti

1 repos

https://github.com/B1ack4sh/Blackash-CVE-2025-20337

threatintelligence@mastodon.social at 2025-11-13T14:45:52.000Z ##

APT Group Exploits Zero-Days in Cisco and Citrix Systems

Amazon’s MadPot honeypot service detected the exploitation attempts, leading to the identification of CVE-2025-5777 and CVE-2025-20337. The threat actor deployed a custom web shell disguised as a legitimate component, operating in-memory and using Java reflection for stealth.

cyberdigests.com/article/apt-g

##

jos1264@social.skynetcloud.site at 2025-11-13T08:25:02.000Z ##

Zero-Day Vulnerabilities in Cisco and Citrix Targeted by APT Group, Amazon Confirms thecyberexpress.com/cve-2025-2 #zerodayvulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202520337 #CVE20255777 #CyberNews #Citrix #Cisco #APT

##

oversecurity@mastodon.social at 2025-11-12T14:20:07.000Z ##

Hackers exploited Citrix, Cisco ISE flaws in zero-day attacks

An advanced threat actor exploited the critical vulnerabilities "Citrix Bleed 2" (CVE-2025-5777) in NetScaler ADC and Gateway, and CVE-2025-20337...

🔗️ [Bleepingcomputer] link.is.it/aFw9S5

##

CVE-2025-20362
(6.5 MEDIUM)

EPSS: 29.72%

updated 2025-10-22T00:34:26

1 posts

A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints without authentication that should otherwise be inaccessible without authentication. This vulnerability is due to improper validation of user-supplied i

Nuclei template

threatintelligence@mastodon.social at 2025-11-13T14:45:52.000Z ##

APT Group Exploits Zero-Days in Cisco and Citrix Systems

Amazon’s MadPot honeypot service detected the exploitation attempts, leading to the identification of CVE-2025-5777 and CVE-2025-20337. The threat actor deployed a custom web shell disguised as a legitimate component, operating in-memory and using Java reflection for stealth.

cyberdigests.com/article/apt-g

##

jbhall56 at 2025-11-13T14:01:58.940Z ##

Citrix disclosed CVE-2025-5777 in June, and researcher Kevin Beaumont quickly dubbed it CitrixBleed 2 due to its similarities to the original CitrixBleed (CVE-2023-4966). darkreading.com/vulnerabilitie

##

jbhall56@infosec.exchange at 2025-11-13T14:01:58.000Z ##

Citrix disclosed CVE-2025-5777 in June, and researcher Kevin Beaumont quickly dubbed it CitrixBleed 2 due to its similarities to the original CitrixBleed (CVE-2023-4966). darkreading.com/vulnerabilitie

##

campuscodi@mastodon.social at 2025-11-13T10:13:27.000Z ##

AWS dug through its honeypot data and confirmed that CVE-2025-5777 (Cisco ISE RCE) and CVE-2025-5777 (memory leak in Citrix NetScaler) were exploited as zero-days before their patches.

Nothing new here except the confirmation that an APT was behind the attacks

aws.amazon.com/blogs/security/

##

jos1264@social.skynetcloud.site at 2025-11-13T08:25:02.000Z ##

Zero-Day Vulnerabilities in Cisco and Citrix Targeted by APT Group, Amazon Confirms thecyberexpress.com/cve-2025-2 #zerodayvulnerabilities #TheCyberExpressNews #Vulnerabilities #TheCyberExpress #FirewallDaily #CVE202520337 #CVE20255777 #CyberNews #Citrix #Cisco #APT

##

oversecurity@mastodon.social at 2025-11-12T18:40:05.000Z ##

‘Advanced’ hacker seen exploiting Cisco, Citrix zero-days

The hackers notably used custom malware and were exploiting CVE-2025-5777 — now known colloquially as “Citrix Bleed Two” — before it was disclosed...

🔗️ [Therecord] link.is.it/HyrRC5

##

oversecurity@mastodon.social at 2025-11-12T14:20:07.000Z ##

Hackers exploited Citrix, Cisco ISE flaws in zero-day attacks

An advanced threat actor exploited the critical vulnerabilities "Citrix Bleed 2" (CVE-2025-5777) in NetScaler ADC and Gateway, and CVE-2025-20337...

🔗️ [Bleepingcomputer] link.is.it/aFw9S5

##

CVE-2024-3400
(9.8 CRITICAL)

EPSS: 94.34%

updated 2025-10-22T00:34:06

2 posts

A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Fixes for PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 are in development and are expected to be released by April 14, 2024. Cloud NG

Nuclei template

41 repos

https://github.com/HackingLZ/panrapidcheck

https://github.com/nanwinata/CVE-2024-3400

https://github.com/CyberBibs/SOC274---Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400-

https://github.com/FoxyProxys/CVE-2024-3400

https://github.com/LoanVitor/CVE-2024-3400-

https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection

https://github.com/momika233/CVE-2024-3400

https://github.com/index2014/CVE-2024-3400-Checker

https://github.com/pwnj0hn/CVE-2024-3400

https://github.com/CONDITIONBLACK/CVE-2024-3400-POC

https://github.com/zam89/CVE-2024-3400-pot

https://github.com/0x0d3ad/CVE-2024-3400

https://github.com/ZephrFish/CVE-2024-3400-Canary

https://github.com/h4x0r-dz/CVE-2024-3400

https://github.com/hashdr1ft/SOC274-Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400

https://github.com/Kr0ff/cve-2024-3400

https://github.com/ihebski/CVE-2024-3400

https://github.com/Ravaan21/CVE-2024-3400

https://github.com/Yafiah-Darwesh/cs50-cyber-paloalto-oauth

https://github.com/codeblueprint/CVE-2024-3400

https://github.com/MrR0b0t19/CVE-2024-3400

https://github.com/tfrederick74656/cve-2024-3400-poc

https://github.com/ak1t4/CVE-2024-3400

https://github.com/workshop748/CVE-2024-3400

https://github.com/retkoussa/CVE-2024-3400

https://github.com/schooldropout1337/CVE-2024-3400

https://github.com/hahasagined/CVE-2024-3400

https://github.com/CyprianAtsyor/letsdefend-cve2024-3400-case-study

https://github.com/CerTusHack/CVE-2024-3400-PoC

https://github.com/terminalJunki3/CVE-2024-3400-Checker

https://github.com/Chocapikk/CVE-2024-3400

https://github.com/W01fh4cker/CVE-2024-3400-RCE-Scan

https://github.com/XiaomingX/CVE-2024-3400-poc

https://github.com/marconesler/CVE-2024-3400

https://github.com/sxyrxyy/CVE-2024-3400-Check

https://github.com/andrelia-hacks/CVE-2024-3400

https://github.com/Yuvvi01/CVE-2024-3400

https://github.com/iwallarm/cve-2024-3400

https://github.com/AdaniKamal/CVE-2024-3400

https://github.com/swaybs/CVE-2024-3400

https://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker

hrbrmstr@mastodon.social at 2025-11-13T17:01:04.000Z ##

It's not too late to depress @neurovagrant!

Worked backwards from an uptick in Palo Alto PAN-OS CVE-2024-3400 RCE Attempts

Most hits from U.S. cloud infra. Second was combo of Netherlands/Switzerland & two significant JA4t clusters:

- 33280_2-4-8-1-3_65495_7 (mostly US)
- 64240_2-4-8-1-3_1460_7 (others)

The oddly high MSS in the first is an increasing "thing". TTL of 7 for both does help suggest this is a coordinated poke for and exploitation of enterprise "edge" kit.

##

hrbrmstr@mastodon.social at 2025-11-13T17:01:04.000Z ##

It's not too late to depress @neurovagrant!

Worked backwards from an uptick in Palo Alto PAN-OS CVE-2024-3400 RCE Attempts

Most hits from U.S. cloud infra. Second was combo of Netherlands/Switzerland & two significant JA4t clusters:

- 33280_2-4-8-1-3_65495_7 (mostly US)
- 64240_2-4-8-1-3_1460_7 (others)

The oddly high MSS in the first is an increasing "thing". TTL of 7 for both does help suggest this is a coordinated poke for and exploitation of enterprise "edge" kit.

##

taylorparizo@infosec.exchange at 2025-11-12T05:12:37.000Z ##

From the ESET APT Activity Report:

In August, we gained greater insight into a post-compromise toolkit used by Konni. ESET software was installed on an already compromised machine in Uzbekistan and during the initial scan we detected a Konni backdoor, custom reverse TCP tunnel software, a copy of the RDP Wrapper library, and a custom
tool that uses the EternalBlue exploit for vulnerability CVE-2017-0144.

web-assets.esetstatic.com/wls/

#ThreatIntel #ESETresearch #NorthKorea #APT

##

CVE-2020-9802
(8.8 HIGH)

EPSS: 42.55%

updated 2025-05-05T18:30:44

1 posts

A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to arbitrary code execution.

2 repos

https://github.com/Billy-Ellis/jitsploitation

https://github.com/khcujw/CVE-2020-9802

HexRaysSA@infosec.exchange at 2025-11-12T21:31:17.000Z ##

Check out how Billy Ellis dives into 1-click iOS browser exploits, walking through CVE-2020-9802, a JIT bug.
Great step-by-step explanation of how WebKit and JavaScriptCore vulnerabilities are exploited.

youtu.be/o6mVgygo-hk

##

CVE-2022-45770
(7.8 HIGH)

EPSS: 0.58%

updated 2025-03-31T21:32:40

2 posts

Improper input validation in driver adgnetworkwfpdrv.sys in Adguard For Windows x86 up to version 7.11 allows attacker to gain local privileges escalation.

1 repos

https://github.com/Marsel-marsel/CVE-2022-45770

hackmag at 2025-11-13T16:17:24.199Z ##

⚪ Sad Guard. Identifying and exploiting vulnerability in AdGuard driver for Windows

🗨️ Last year, I discovered a binary bug in the AdGuard driver. Its ID in the National Vulnerability Database is CVE-2022-45770. I was disassembling the ad blocker and found a way to use the identified vulnerability for local privilege escalation.…

🔗 hackmag.com/security/aguard-cve

##

hackmag@infosec.exchange at 2025-11-13T16:17:24.000Z ##

⚪ Sad Guard. Identifying and exploiting vulnerability in AdGuard driver for Windows

🗨️ Last year, I discovered a binary bug in the AdGuard driver. Its ID in the National Vulnerability Database is CVE-2022-45770. I was disassembling the ad blocker and found a way to use the identified vulnerability for local privilege escalation.…

🔗 hackmag.com/security/aguard-cve

#security

##

CVE-2025-64717
(0 None)

EPSS: 0.00%

2 posts

N/A

cR0w at 2025-11-13T15:54:07.688Z ##

This kind of feels like another you had one job thing.

ZITADEL is an open source identity management platform. Starting in version 2.50.0 and prior to versions 2.71.19, 3.4.4, and 4.6.6, a vulnerability in ZITADEL's federation process allowed auto-linking users from external identity providers to existing users in ZITADEL even if the corresponding IdP was not active or if the organization did not allow federated authentication. This vulnerability stems from the platform's failure to correctly check or enforce an organization's specific security settings during the authentication flow. An Organization Administrator can explicitly disable an IdP or disallow federation, but this setting was not being honored during the auto-linking process. This allowed an unauthenticated attacker to initiate a login using an IdP that should have been disabled for that organization. The platform would incorrectly validate the login and, based on a matching criteria, link the attacker's external identity to an existing internal user account. This may result in a full Account Takeover, bypassing the organization's mandated security controls. Note that accounts with MFA enabled can not be taken over by this attack. Also note that only IdPs create on an instance level would allow this to work. IdPs registered on another organization would always be denied in the (auto-)linking process. Versions 4.6.6, 3.4.4, and 2.71.19 resolve the issue by correctly validating the organization's login policy before auto-linking an external user. No known workarounds are available aside from upgrading.

cve.org/CVERecord?id=CVE-2025-

##

cR0w@infosec.exchange at 2025-11-13T15:54:07.000Z ##

This kind of feels like another you had one job thing.

ZITADEL is an open source identity management platform. Starting in version 2.50.0 and prior to versions 2.71.19, 3.4.4, and 4.6.6, a vulnerability in ZITADEL's federation process allowed auto-linking users from external identity providers to existing users in ZITADEL even if the corresponding IdP was not active or if the organization did not allow federated authentication. This vulnerability stems from the platform's failure to correctly check or enforce an organization's specific security settings during the authentication flow. An Organization Administrator can explicitly disable an IdP or disallow federation, but this setting was not being honored during the auto-linking process. This allowed an unauthenticated attacker to initiate a login using an IdP that should have been disabled for that organization. The platform would incorrectly validate the login and, based on a matching criteria, link the attacker's external identity to an existing internal user account. This may result in a full Account Takeover, bypassing the organization's mandated security controls. Note that accounts with MFA enabled can not be taken over by this attack. Also note that only IdPs create on an instance level would allow this to work. IdPs registered on another organization would always be denied in the (auto-)linking process. Versions 4.6.6, 3.4.4, and 2.71.19 resolve the issue by correctly validating the organization's login policy before auto-linking an external user. No known workarounds are available aside from upgrading.

cve.org/CVERecord?id=CVE-2025-

##

CVE-2025-64705
(0 None)

EPSS: 0.04%

3 posts

N/A

cR0w at 2025-11-13T15:07:36.355Z ##

Perfect example of how risk models differ and CVSS scores need to be contextualized for your use case.

sev:LOW 1.3 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U

Frappe Learning is a learning system that helps users structure their content. Starting in version 2.0.0 and prior to version 2.41.0, users were able to access the submissions made by other students The issue has been fixed in version 2.41.0 by ensuring proper roles and redirecting if accessed via direct URL.

cve.org/CVERecord?id=CVE-2025-

##

cR0w@infosec.exchange at 2025-11-13T15:07:36.000Z ##

Perfect example of how risk models differ and CVSS scores need to be contextualized for your use case.

sev:LOW 1.3 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U

Frappe Learning is a learning system that helps users structure their content. Starting in version 2.0.0 and prior to version 2.41.0, users were able to access the submissions made by other students The issue has been fixed in version 2.41.0 by ensuring proper roles and redirecting if accessed via direct URL.

cve.org/CVERecord?id=CVE-2025-

##

jos1264@social.skynetcloud.site at 2025-11-13T01:05:03.000Z ##

CVE-2025-64705 - Frappe user was able to access the submission of other students cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64716
(0 None)

EPSS: 0.07%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-13T04:25:01.000Z ##

CVE-2025-64716 - Anubis vulnerable to possible XSS via redir parameter when using subrequest auth mode cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64710
(0 None)

EPSS: 0.05%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-13T04:25:01.000Z ##

CVE-2025-64710 - Bitplatform Boilerplate has cross-site scripting vulnerability cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64523
(0 None)

EPSS: 0.03%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-13T01:05:03.000Z ##

CVE-2025-64523 - FileBrowser has Insecure Direct Object Reference (IDOR) in Share Deletion Function cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64503
(0 None)

EPSS: 0.01%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-13T01:05:02.000Z ##

CVE-2025-64503 - [BIGSLEEP-434615384] cups-filters 1.x: out of bounds write in pdftoraster cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64482
(0 None)

EPSS: 0.01%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-13T01:05:02.000Z ##

CVE-2025-64482 - Tuleap missing CSRF protections in the File Release System cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-64117
(0 None)

EPSS: 0.01%

1 posts

N/A

jos1264@social.skynetcloud.site at 2025-11-12T22:20:02.000Z ##

CVE-2025-64117 - Tuleap missing CSRF protection in the management of SVN commit rules and immutable tags cvefeed.io/vuln/detail/CVE-202

##

CVE-2025-4619
(0 None)

EPSS: 0.00%

1 posts

N/A

Visit counter For Websites