24h | 7d | 30d

Overview

  • Hewlett Packard Enterprise (HPE)
  • HPE OneView

16 Dec 2025
Published
19 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.29%

KEV

Description

A remote code execution issue exists in HPE OneView.

Statistics

  • 9 Posts
  • 64 Interactions

Last activity: 8 hours ago

Fediverse

Profile picture

HPE OneView CVE-2025-37164 worth paying attention to

- Widely used enterprise management software

- HPE added a REST command, executeCommand, which requires no authentication to execute commands. Obviously, this is dumb and now patched out

- Being on OneView allows attacker to access VMware, 3PAR storage etc by design

- Expect exploitation in the wild as it's so simple

- The vulnerability (executeCommand) was introduced around 2020, feels like a vulndoor

Shodan dork: product:"HPE OneView"

  • 31
  • 32
  • 0
  • 14h ago
Profile picture

⚠️ CRITICAL: HPE OneView vuln (CVE-2025-37164) enables unauthenticated RCE on all versions <11.00. No active exploits, but patch or hotfix ASAP. European orgs at high risk—full IT infra compromise possible. radar.offseq.com/threat/hpe-on

  • 0
  • 0
  • 0
  • 16h ago
Profile picture

A critical remote code execution vulnerability (CVE-2025-37164) has been discovered in HPE OneView, affecting all versions between 5.20 and 10.20. This vulnerability can be exploited by an unauthenticated user, and there is no workaround, necessitating the immediate application of a hotfix provided by HPE.
csoonline.com/article/4109162/

  • 0
  • 0
  • 0
  • 11h ago
Profile picture
  • 0
  • 0
  • 0
  • 9h ago
Profile picture

📰 HPE Issues Urgent Patch for 10.0 CVSS RCE Flaw in OneView

‼️ URGENT: HPE has patched a critical 10.0 CVSS unauthenticated RCE flaw (CVE-2025-37164) in its OneView management tool. This flaw gives attackers the 'keys to the kingdom.' Patch immediately! 🔑 #HPE #OneView #CyberSecurity #PatchNow

🔗 cyber.netsecops.io/articles/hp

  • 0
  • 0
  • 0
  • 8h ago

Bluesky

Profile picture
Une faille critique CVE-2025-37164 (score CVSS 10.0) dans #HPE OneView permet l'exécution de code à distance sans authentification. #HewlettPackardEnterprise a corrigé ce grave problème de sécurité. 🔒💻 #CyberSecurity #IA #IAÉthique https://kntn.ly/c16b6042
  • 0
  • 1
  • 0
  • 17h ago
Profile picture
📌 Critical RCE Flaw in HPE IT Infrastructure Management Software Patched (CVE-2025-37164) https://www.cyberhub.blog/article/16940-critical-rce-flaw-in-hpe-it-infrastructure-management-software-patched-cve-2025-37164
  • 0
  • 0
  • 0
  • 14h ago
Profile picture
Hewlett Packard Enterprise OneView had a critical unauthenticated remote code execution vulnerability (CVE-2025-37164) fixed in version 11.00 with hotfixes for older releases.
  • 0
  • 0
  • 0
  • 11h ago
Profile picture
A critical unauthenticated remote code execution vulnerability (CVE-2025-37164) in HPE OneView allows attackers centralized control; customers must upgrade or apply hotfix immediately.
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • WatchGuard
  • Fireware OS

19 Dec 2025
Published
19 Dec 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.21%

KEV

Description

An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.5 and 2025.1 up to and including 2025.1.3.

Statistics

  • 9 Posts
  • 2 Interactions

Last activity: 7 hours ago

Fediverse

Profile picture

🔥 CRITICAL: CVE-2025-14733 in WatchGuard Fireware OS (11.10.2–12.11.5, 2025.1–2025.1.3) enables remote unauthenticated code execution via VPN (IKEv2, dynamic peers). Review configs & restrict access—patches pending! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 23h ago
Profile picture

Zero-day nei firewall WatchGuard: Una RCE senza login è già sotto sfruttamento

Una vulnerabilità zero-day critica, identificata come CVE-2025-14733, ha messo in ginocchio gli amministratori di rete, costringendoli a una corsa contro il tempo per proteggere i loro sistemi.

Questa falla, con un punteggio CVSS di 9,3 rilevata sui firewall WatchGuard, è davvero pericolosa: consente ad aggressori non autenticati di eseguire codice arbitrario e assumere il controllo dei firewall aziendali.

E il fatto che gli autori delle minacce stiano già tentando di sfruttare questa vulnerabilità non fa che aumentare l’allarme. Vediamo quindi di capire meglio cosa sta succedendo e come questa vulnerabilità possa essere sfruttata dagli aggressori.

Il processo iked, che gestisce le negoziazioni IKEv2 (Internet Key Exchange) per le VPN, presenta una vulnerabilità che risiede nella sua capacità di essere sfruttata per eseguire operazioni non previste. Gli aggressori possono, da remoto, causare un errore di tipo “Out-of-bounds Write”, il quale comporta la corruzione della memoria. Questa falla permette agli attaccanti di influenzare il comportamento del sistema.

Inviando pacchetti dannosi appositamente creati all’interfaccia VPN del firewall, un aggressore può bloccare il servizio o, peggio, iniettare i propri comandi con privilegi a livello di sistema.

Ciò che rende questa vulnerabilità particolarmente insidiosa è la sua persistenza. Prende di mira le configurazioni VPN per utenti mobili e VPN per filiali che utilizzano IKEv2. Tuttavia, disattivare semplicemente la funzionalità potrebbe non essere sufficiente.

L’avviso mette in guardia da uno scenario di configurazione “zombie”: “Se Firebox era precedentemente configurato con la VPN dell’utente mobile con IKEv2… ed entrambe le configurazioni sono state successivamente eliminate, Firebox potrebbe essere ancora vulnerabile se è ancora configurata una VPN di filiale verso un peer gateway statico”.

WatchGuard ha rilasciato specifici indicatori di attacco (IoA) per aiutare i difensori a capire se sono già sotto attacco. Gli aggressori lasciano impronte digitali nei log. Un segnale rivelatore di un tentativo di exploit è un payload di certificato insolitamente grande.

Inoltre, i seguenti indirizzi IP sono stati direttamente collegati alla campagna di sfruttamento attiva: 45.95.19[.]50, 51.15.17[.]89, 172.93.107[.]67, 199.247.7[.]82. La vulnerabilità interessa un’ampia gamma di versioni del sistema operativo Fireware, tra cui 12.x e 2025.1. WatchGuard ha rilasciato versioni con patch (2025.1.4, 12.11.6 e 12.5.15) e sollecita aggiornamenti immediati.

Tuttavia, applicare una patch al software è solo il primo passo. Poiché la falla consente la compromissione totale del dispositivo, un dispositivo con patch potrebbe comunque nascondere segreti rubati.

L'articolo Zero-day nei firewall WatchGuard: Una RCE senza login è già sotto sfruttamento proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 17h ago
Profile picture

Analysis of CVE-2025-14733, a critical WatchGuard Firebox security vulnerability. Learn why unauthenticated RCE persists even after deleting vulnerable VPN configurations.

#SecurityLand #CyberWatch #ZeroDay #Watchguard #SecurityVulnerability #Firewall #CVE

Read More: security.land/watchguard-cve-2

  • 0
  • 0
  • 0
  • 11h ago
Profile picture

📰 Actively Exploited RCE Flaw in WatchGuard Firewalls Puts Networks at Risk

📢 URGENT: WatchGuard warns of active exploitation of a critical RCE flaw (CVE-2025-14733, CVSS 9.3) in Fireware OS. Firebox firewalls with IKEv2 VPNs are at risk. Patch immediately to protect your network perimeter! 🔥 #WatchGuard #CyberAttack #VPN

🔗 cyber.netsecops.io/articles/wa

  • 0
  • 0
  • 0
  • 8h ago

Bluesky

Profile picture
Security administrators worldwide are rushing to patch a critical security vulnerability in WatchGuard Firebox appliances tracked as CVE-2025-14733. #SecurityLand #CyberWatch #ZeroDay #Watchguard #SecurityVulnerability #Firewall #CVE Read More: www.security.land/watchguard-c...
  • 0
  • 1
  • 0
  • 11h ago
Profile picture
WatchGuard fixed CVE-2025-14733, a critical Fireware OS VPN flaw with CVSS 9.3 that is actively exploited in the wild.
  • 0
  • 1
  • 0
  • 8h ago
Profile picture
WatchGuard fixed a critical out-of-bounds write vulnerability (CVE-2025-14733) in Fireware OS that enabled remote unauthenticated code execution and was actively exploited.
  • 0
  • 0
  • 0
  • 12h ago
Profile picture
WatchGuard released patches for a critical vulnerability in Fireware OS exploited in active attacks. The flaw, CVE-2025-14733, allows remote code […]
  • 0
  • 0
  • 0
  • 11h ago
Profile picture
📣 We have added a new #vulnerability detection to our #ASM #AttackSurfaceManagement solution for #WatchGuard Firebox: CVE-2025-14733: unauthenticated remote code execution through out of bound writes No one has patched yet, everyone is vulnerable.
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Cisco
  • Cisco Secure Email

17 Dec 2025
Published
18 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
4.56%

Description

Cisco is aware of a potential vulnerability.&nbsp; Cisco is currently investigating and&nbsp;will update these details as appropriate&nbsp;as more information becomes available.

Statistics

  • 5 Posts

Last activity: 8 hours ago

Fediverse

Profile picture

📰 China-Linked Hackers Exploit Critical Cisco Email Gateway Zero-Day

🇨🇳 A China-linked APT is exploiting a critical 10.0 CVSS zero-day (CVE-2025-20393) in Cisco Email Gateways for root-level RCE. CISA has added it to the KEV catalog. Patch immediately! 🛡️ #ZeroDay #Cisco #CyberSecurity #APT

🔗 cyber.netsecops.io/articles/ch

  • 0
  • 0
  • 0
  • 8h ago

Bluesky

Profile picture
Cisco AsyncOSのゼロデイが悪用される、パッチは未リリース:CVE-2025-20393 | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/43112/
  • 0
  • 0
  • 0
  • 17h ago
Profile picture
Cisco disclosed an actively exploited zero day in AsyncOS, tracked as CVE-2025-20393 (CVSS 10.0), allowing unauthenticated remote code execution as root on Cisco Secure Email Gateway and Secure Email and Web Manager appliances.
  • 0
  • 0
  • 0
  • 16h ago
Profile picture
CVE-2025–20393 (Cisco AsyncOS Zero-Day) https://cyberleelawat.medium.com/cve-2025-20393-cisco-asyncos-zero-day-72b35798cdf9?source=rss------bug_bounty-5
  • 0
  • 0
  • 0
  • 13h ago
Profile picture
Reports About Cyberattacks Against Cisco Secure Email Gateway And Cisco Secure Email and Web Manager (CVE-2025-20393) #patchmanagement
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Meta
  • react-server-dom-webpack

03 Dec 2025
Published
11 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
44.14%

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Statistics

  • 5 Posts
  • 2 Interactions

Last activity: 8 hours ago

Bluesky

Profile picture
The latest update for #BitSight includes "CVE-2025-55182: First Days of React2Shell Exploitations" and "Practitioner Insight: 4 Best Practices for #SupplyChain Risk Resilience in Finance". #Cybersecurity #RiskManagement https://opsmtrs.com/43KoF0t
  • 1
  • 1
  • 0
  • 18h ago
Profile picture
A Flight protocol validation failure in React Server Components and Next.js (React2Shell, CVE-2025-55182) enables unauthenticated remote code execution and rapid ransomware deployment.
  • 0
  • 0
  • 0
  • 21h ago
Profile picture
Understanding React2Shell: A Critical Vulnerability in React Server Components (CVE-2025–55182) https://osintteam.blog/understanding-react2shell-a-critical-vulnerability-in-react-server-components-cve-2025-55182-9a834711c0ee?source=rss------bug_bounty-5
  • 0
  • 0
  • 0
  • 20h ago
Profile picture
脆弱性「React2Shell」がランサムウェア攻撃に悪用される(CVE-2025-55182) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/43117/
  • 0
  • 0
  • 0
  • 17h ago
Profile picture
The latest update for #getastra includes "Critical React2Shell RCE Hits React and Next.js (CVE-2025-55182 / CVE-2025-66478)" and "Top 11 SOC 2 Vulnerability Assessment Tools #SaaS (2025)". #cybersecurity #webprotection #pentesting https://opsmtrs.com/3KjMi92
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Linux
  • Linux

16 Dec 2025
Published
16 Dec 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: rust_binder: fix race condition on death_list Rust Binder contains the following unsafe operation: // SAFETY: A `NodeDeath` is never inserted into the death list // of any node other than its owner, so it is either in this // death list or in no death list. unsafe { node_inner.death_list.remove(self) }; This operation is unsafe because when touching the prev/next pointers of a list element, we have to ensure that no other thread is also touching them in parallel. If the node is present in the list that `remove` is called on, then that is fine because we have exclusive access to that list. If the node is not in any list, then it's also ok. But if it's present in a different list that may be accessed in parallel, then that may be a data race on the prev/next pointers. And unfortunately that is exactly what is happening here. In Node::release, we: 1. Take the lock. 2. Move all items to a local list on the stack. 3. Drop the lock. 4. Iterate the local list on the stack. Combined with threads using the unsafe remove method on the original list, this leads to memory corruption of the prev/next pointers. This leads to crashes like this one: Unable to handle kernel paging request at virtual address 000bb9841bcac70e Mem abort info: ESR = 0x0000000096000044 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: level 0 translation fault Data abort info: ISV = 0, ISS = 0x00000044, ISS2 = 0x00000000 CM = 0, WnR = 1, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [000bb9841bcac70e] address between user and kernel address ranges Internal error: Oops: 0000000096000044 [#1] PREEMPT SMP google-cdd 538c004.gcdd: context saved(CPU:1) item - log_kevents is disabled Modules linked in: ... rust_binder CPU: 1 UID: 0 PID: 2092 Comm: kworker/1:178 Tainted: G S W OE 6.12.52-android16-5-g98debd5df505-4k #1 f94a6367396c5488d635708e43ee0c888d230b0b Tainted: [S]=CPU_OUT_OF_SPEC, [W]=WARN, [O]=OOT_MODULE, [E]=UNSIGNED_MODULE Hardware name: MUSTANG PVT 1.0 based on LGA (DT) Workqueue: events _RNvXs6_NtCsdfZWD8DztAw_6kernel9workqueueINtNtNtB7_4sync3arc3ArcNtNtCs8QPsHWIn21X_16rust_binder_main7process7ProcessEINtB5_15WorkItemPointerKy0_E3runB13_ [rust_binder] pstate: 23400005 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : _RNvXs3_NtCs8QPsHWIn21X_16rust_binder_main7processNtB5_7ProcessNtNtCsdfZWD8DztAw_6kernel9workqueue8WorkItem3run+0x450/0x11f8 [rust_binder] lr : _RNvXs3_NtCs8QPsHWIn21X_16rust_binder_main7processNtB5_7ProcessNtNtCsdfZWD8DztAw_6kernel9workqueue8WorkItem3run+0x464/0x11f8 [rust_binder] sp : ffffffc09b433ac0 x29: ffffffc09b433d30 x28: ffffff8821690000 x27: ffffffd40cbaa448 x26: ffffff8821690000 x25: 00000000ffffffff x24: ffffff88d0376578 x23: 0000000000000001 x22: ffffffc09b433c78 x21: ffffff88e8f9bf40 x20: ffffff88e8f9bf40 x19: ffffff882692b000 x18: ffffffd40f10bf00 x17: 00000000c006287d x16: 00000000c006287d x15: 00000000000003b0 x14: 0000000000000100 x13: 000000201cb79ae0 x12: fffffffffffffff0 x11: 0000000000000000 x10: 0000000000000001 x9 : 0000000000000000 x8 : b80bb9841bcac706 x7 : 0000000000000001 x6 : fffffffebee63f30 x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000 x2 : 0000000000004c31 x1 : ffffff88216900c0 x0 : ffffff88e8f9bf00 Call trace: _RNvXs3_NtCs8QPsHWIn21X_16rust_binder_main7processNtB5_7ProcessNtNtCsdfZWD8DztAw_6kernel9workqueue8WorkItem3run+0x450/0x11f8 [rust_binder bbc172b53665bbc815363b22e97e3f7e3fe971fc] process_scheduled_works+0x1c4/0x45c worker_thread+0x32c/0x3e8 kthread+0x11c/0x1c8 ret_from_fork+0x10/0x20 Code: 94218d85 b4000155 a94026a8 d10102a0 (f9000509) ---[ end trace 0000000000000000 ]--- Thus, modify Node::release to pop items directly off the original list.

Statistics

  • 2 Posts

Last activity: 18 hours ago

Fediverse

Profile picture

La prima CVE del codice Rust nel kernel Linux è già un bug critico

Il mondo della tecnologia è un vero e proprio campo di battaglia, dove i geni del coding sfidano ogni giorno i malintenzionati a colpi di exploit e patch di sicurezza. Ecco perché la recente scoperta di una vulnerabilità nel kernel Linux è una notizia che ha fatto scalpore nel mondo dell’informatica: una falla di sicurezza, ufficialmente riconosciuta come CVE-2025-68260, è stata individuata e corretta nel kernel Linux.

In pratica, questa vulnerabilità, riguardante il driver Android Binder riscritto in Rust, avrebbe potuto creare non pochi problemi agli utenti Linux, come crash di sistema nel caso peggiore. L’importanza della scoperta risiede nel fatto che rappresenta la prima CVE formalmente assegnata al codice Rust nel kernel principale.

Per chi fosse interessato ad approfondire la questione, Greg Kroah-Hartman è stato determinante per segnalare e risolvere il problema. Insomma, niente panico, la falla è stata fixata ma l’episodio offre spunti interessanti per chi è appassionato di sicurezza digitale e sviluppo del kernel Linux.

Al centro del bug c’è un’operazione non sicura all’interno dell’implementazione di Binder basata su Rust, in cui un elemento viene rimosso da una lista concatenata mentre un altro thread può manipolare contemporaneamente gli stessi puntatori prev/next. Il progetto presupponeva che un oggetto NodeDeath non sarebbe mai apparso in una lista “esterna”; in pratica, tuttavia, si è verificato uno scenario in cui lo stesso elemento poteva essere elaborato simultaneamente da più contesti.

Il problema derivava dalla logica di Node::release: veniva acquisito un blocco, tutti gli elementi venivano spostati in un elenco temporaneo basato su stack, il blocco veniva rilasciato e quindi l’elenco locale veniva attraversato. Se, in parallelo, un altro thread invocava una rimozione non sicura sull’elenco originale, si verificava una condizione di competizione che corrompeva i puntatori prev/next, causando infine corruzione della memoria e crash del kernel. Un esempio di errore citava “Impossibile gestire la richiesta di paging del kernel” nel modulo rust_binder.

La correzione ha comportato la riscrittura di Node::release per estrarre gli elementi direttamente dall’elenco originale, eliminando del tutto l’elenco intermedio basato sullo stack. Secondo il team CVE del kernel Linux, il problema è stato introdotto in Linux 6.18 (commit eafedbc7c050c44744fbdf80bdf3315e860b7513) e risolto in 6.18.1 (3428831264096d32f830a7fcfc7885dd263e511a), così come in 6.19-rc1 (3e0ae02ba831da2b707905f4e602e43f8507b8cc). Il file interessato è drivers/android/binder/node.rs.

Il team CVE del kernel Linux suggerisce fortemente di passare a una versione stabile del kernel corrente come strategia di riduzione dei rischi: le modifiche individuali non sono soggette a test distinti e l’applicazione mirata di patch non riceve supporto ufficiale. Qualora non sia possibile eseguire l’aggiornamento, è possibile individuare le correzioni adatte consultando i commit menzionati nel repository del ramo stabile.

L'articolo La prima CVE del codice Rust nel kernel Linux è già un bug critico proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 18h ago

Bluesky

Profile picture
Rust’s First Breach: CVE-2025-68260 Marks the First Rust Vulnerability in the Linux Kernel
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • Fortinet
  • FortiSwitchManager

09 Dec 2025
Published
17 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
5.57%

Description

A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.

Statistics

  • 3 Posts
  • 21 Interactions

Last activity: 12 hours ago

Bluesky

Profile picture
We added fingerprinting of Fortinet devices with FortiCloud SSO enabled to our Device Identification reporting (at least 25K IPs seen globally). While not necessarily vulnerable to CVE-2025-59718/CVE-2025-59719 if you get a report from us regarding exposure, please verify/patch!
  • 7
  • 14
  • 0
  • 12h ago
Profile picture
Fortinet CVE-2025-59718 e CVE-2025-59719. CISA docet. Quando entra in gioco CISA, la vulnerabilità smette di essere solo tecnica Nel precedente articolo abbiamo visto come le vulnerabilità CVE-2025-59718 e.. www.aiutocomputerhelp.it?p=16474 #CVE_2025_59718 #CVE_2025_59719 #FortiCloud_SSO #fortinet
  • 0
  • 0
  • 1
  • 12h ago

Overview

  • Fortinet
  • FortiWeb

09 Dec 2025
Published
10 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.07%

KEV

Description

An improper verification of cryptographic signature vulnerability in Fortinet FortiWeb 8.0.0, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9 may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.

Statistics

  • 3 Posts
  • 21 Interactions

Last activity: 12 hours ago

Bluesky

Profile picture
We added fingerprinting of Fortinet devices with FortiCloud SSO enabled to our Device Identification reporting (at least 25K IPs seen globally). While not necessarily vulnerable to CVE-2025-59718/CVE-2025-59719 if you get a report from us regarding exposure, please verify/patch!
  • 7
  • 14
  • 0
  • 12h ago
Profile picture
Fortinet CVE-2025-59718 e CVE-2025-59719. CISA docet. Quando entra in gioco CISA, la vulnerabilità smette di essere solo tecnica Nel precedente articolo abbiamo visto come le vulnerabilità CVE-2025-59718 e.. www.aiutocomputerhelp.it?p=16474 #CVE_2025_59718 #CVE_2025_59719 #FortiCloud_SSO #fortinet
  • 0
  • 0
  • 1
  • 12h ago

Overview

  • TrioFox
  • TrioFox

10 Nov 2025
Published
12 Nov 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
74.31%

Description

Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 22 hours ago

Fediverse

Profile picture

Yooo @yeslikethefood wrote a neat bunch of words about developing an exploit for Gladinet Triofox CVE-2025-12480 that closely followed the real-world attack pattern Mandiant wrote about last month and attributed to UNC6485.

20+ requests, an AV config trigger, and an embedded PostgreSQL server later:

vulncheck.com/blog/triofox-exp

  • 1
  • 2
  • 0
  • 22h ago

Overview

  • auth0
  • node-jws

04 Dec 2025
Published
05 Dec 2025
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.01%

KEV

Description

auth0/node-jws is a JSON Web Signature implementation for Node.js. In versions 3.2.2 and earlier and version 4.0.0, auth0/node-jws has an improper signature verification vulnerability when using the HS256 algorithm under specific conditions. Applications are affected when they use the jws.createVerify() function for HMAC algorithms and use user-provided data from the JSON Web Signature protected header or payload in HMAC secret lookup routines, which can allow attackers to bypass signature verification. This issue has been patched in versions 3.2.3 and 4.0.1.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 17 hours ago

Fediverse

Profile picture

for CVE-2025-65945 (Improper Verification of Cryptographic Signature in node-jws)

github.com/jedisct1/CVE-2025-6

  • 1
  • 2
  • 0
  • 17h ago

Overview

  • Microsoft
  • Microsoft Partner Center

18 Dec 2025
Published
19 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.09%

KEV

Description

Improper authorization in Microsoft Partner Center allows an unauthorized attacker to elevate privileges over a network.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 20 hours ago

Fediverse

Profile picture

🚨 CRITICAL vuln: CVE-2025-65041 in Microsoft Partner Center enables unauthenticated remote privilege escalation (CVSS 10). No patch yet—segment networks, enforce MFA, and monitor for abuse. Stay updated! radar.offseq.com/threat/cve-20

  • 1
  • 1
  • 0
  • 20h ago
Showing 1 to 10 of 32 CVEs