24h | 7d | 30d

Overview

  • Meta
  • react-server-dom-webpack

03 Dec 2025
Published
06 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
77.80%

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Statistics

  • 24 Posts
  • 54 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture

☕ & : CISA has moved the due date for mitigating CVE-2025-55182 (Meta React Server Components Remote Code Execution Vulnerability) up two weeks. It was initially set for December 26, but it is now due on December 12. IIRC, this is the first time the due date has been modified.

In all honesty, if you haven't already patched this vulnerability, it's likely too late. As a reminder, patching does not boot attackers, so you should check for indicators of compromise.

  • 13
  • 21
  • 1
  • 14h ago
Profile picture

⚠️ Podverse Alpha Update ⚠️

I'm shutting off the Alpha website for the night, as there is a critical security vulnerability with the version of Next.js it is using (CVE-2025-55182).

Should have it redeployed and patched tomorrow.

Good video explaining the CVE: youtube.com/watch?v=s81dVUM-cQM

Thanks to @suorcd or notifying me.

#podverse #pv2

  • 2
  • 7
  • 0
  • 22h ago
Profile picture

❗ Aktualizujcie swoje UMAMI, pisaliśmy o nich niedawno. Podatność React:

"Podatność CVE-2025-55182, dotycząca RSC, występuje w wersjach 19.0, 19.1.0, 19.1.1 oraz 19.2.0 następujących modułów:

react-server-dom-webpack
react-server-dom-parcel
react-server-dom-turbopack"

react.dev/blog/2025/12/03/crit

  • 1
  • 0
  • 0
  • 10h ago
Profile picture

Exploitation of recent React RCE vul (CVE-2025-55182 - #React2Shell) leading to #Mirai infection ⤵️

Botnet Mirai C2 domains 📡:
effeminate.fuckphillipthegerman .ru
trap.fuckphillipthegerman .ru
tranny.fuckphillipthegerman .ru

Botnet Mirai C2 servers , all hosted at FORTIS 🇷🇺:
138.124.72.251:52896
138.124.69.154:60328
5.144.176.19:60328

Mirai #malware sample 🤖:
bazaar.abuse.ch/sample/ee2fe11

Payload delivery host 🌐:
urlhaus.abuse.ch/host/172.237.

Releated IOCs 🦊:
threatfox.abuse.ch/browse/tag/

  • 0
  • 5
  • 0
  • 23h ago
Profile picture

Hvis du troede, at eksploiteringen af #React2Shell hovedsageligt var begrænset til virksomheds-apps bygget med React-frameworket, kan Bitdefender fortælle, at exploiteringen er blevet adopteret af IoT-botnet-operatører, der bruger den til at gå efter smarte enheder, der muligvis bruger React til deres web-administrations-paneler
bitdefender.com/en-us/blog/lab

  • 0
  • 1
  • 0
  • 19h ago
Profile picture

Interesting payload detected by my Lophiid honeypots. It does a comprehensive job to obtain secrets (including using trufflehog and gitleaks).

Raw request here:
github.com/mrheinen/lophiid/bl

CVE-2025-55182

  • 0
  • 0
  • 0
  • 13h ago

Bluesky

Profile picture
vercel.com/changelog/cve-2... Summary of CVE-2025-55182 - Vercel
  • 0
  • 1
  • 0
  • 23h ago
Profile picture
The React2Shell Nightmare: How a Single CVE-2025-55182 Flaw Can Obliterate Your Nextjs Infrastructure Introduction: A critical remote code execution (RCE) vulnerability, dubbed React2Shell (CVE-2025-55182), is actively exploiting a fundamental flaw in React Server Components (RSC) and Next.js…
  • 0
  • 1
  • 0
  • 20h ago
Profile picture
Interesting #react2shell payload detected by my Lophiid honeypots. It does a comprehensive job to obtain secrets (including using trufflehog and gitleaks). Raw request here: github.com/mrheinen/lop... CVE-2025-55182 #honeypot #dfir #infosec #cybersecurity #exploits
  • 0
  • 1
  • 0
  • 13h ago
Profile picture
📌 React2Shell (CVE-2025-55182): Critical RCE Vulnerability in Next.js https://www.cyberhub.blog/article/16597-react2shell-cve-2025-55182-critical-rce-vulnerability-in-nextjs
  • 0
  • 1
  • 0
  • 7h ago
Profile picture
Exploitation of recent React RCE vul (CVE-2025-55182 - #React2Shell) leading to #Mirai infection ⤵️ Botnet Mirai C2 domains 📡: fuckphillipthegerman .ru Botnet Mirai C2 servers , all hosted at FORTIS 🇷🇺: 138.124.72.251:52896 138.124.69.154:60328 5.144.176.19:60328
  • 0
  • 0
  • 0
  • 23h ago
Profile picture
www.wiz.io/blog/critical-v... React2Shell (CVE-2025-55182): Critical React Vulnerability | Wiz Blog
  • 0
  • 0
  • 0
  • 23h ago
Profile picture
CVE-2025-55182 Exploitation Hits the Smart Home www.bitdefender.com/en-us/blog/l...
  • 0
  • 0
  • 0
  • 20h ago
Profile picture
📢 React2Shell (CVE-2025-55182) : GreyNoise observe une exploitation opportuniste à grande échelle 📝 Source et contexte: GreyNoise publie … https://cyberveille.ch/posts/2025-12-10-react2shell-cve-2025-55182-greynoise-observe-une-exploitation-opportuniste-a-grande-echelle/ #CVE_2025_55182 #Cyberveille
  • 0
  • 0
  • 0
  • 19h ago
Profile picture
⚠️ With the React2Shell vulnerability (CVE-2025-55182) now being actively exploited in the wild, some organizations may struggle to deploy patches quickly. To help reduce exposure, CrowdSec is releasing a free blocklist that tracks & blocks IPs currently involved 👉 app.crowdsec.net/blocklists/6...
  • 0
  • 0
  • 1
  • 19h ago
Profile picture
PeerBlight Linux Backdoor Exploits React2Shell CVE-2025-55182
  • 0
  • 0
  • 0
  • 12h ago
Profile picture
CVE-2025–55182 (React2Shell) — Complete Bug Bounty Hunting Guide https://medium.com/@Aacle/cve-2025-55182-react2shell-complete-bug-bounty-hunting-guide-9cbfd15b6e47?source=rss------bug_bounty-5
  • 0
  • 0
  • 0
  • 12h ago
Profile picture
React2Shell Unmasked: Inside the 5-Hour Zero-Day Frenzy That Bypassed Every WAF Introduction: CVE-2025-55182, dubbed "React2Shell," is a critical remote code execution flaw in React Server Components with a maximum CVSS score of 10.0. Exploited in the wild by China-nexus actors within hours of…
  • 0
  • 0
  • 0
  • 11h ago
Profile picture
CVE-2025-55182 Exploitation Hits the Smart Home - React
  • 0
  • 0
  • 0
  • 8h ago
Profile picture
Threat actors exploit CVE-2025-55182 in React Server Components to deliver cryptocurrency miners and novel malware: PeerBlight, CowTunnel, and ZinFoq.
  • 0
  • 0
  • 0
  • 7h ago
Profile picture
📢 EtherRAT : un implant Node.js avec C2 via Ethereum exploite React2Shell (CVE-2025-55182) 📝 Contexte — Source: Sysdig Threat Research Team (TRT). https://cyberveille.ch/posts/2025-12-10-etherrat-un-implant-node-js-avec-c2-via-ethereum-exploite-react2shell-cve-2025-55182/ #C2_blockchain #Cyberveille
  • 0
  • 0
  • 0
  • 5h ago
Profile picture
How widespread is the impact of Critical Security Vulnerability in React Server Components(CVE-2025-55182)
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Gogs
  • Gogs
  • Gogs

10 Dec 2025
Published
10 Dec 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

Improper Symbolic link handling in the PutContents API in Gogs allows Local Execution of Code.

Statistics

  • 3 Posts
  • 31 Interactions

Last activity: Last hour

Fediverse

Profile picture

🚨 With folks (rightfully) abandoning GitHub for other pastures, some are turning to self-hosting. One option is Gogs, and the epic team at Wiz says you gotta patch since there's an 0-day in the wild (pls RT for reach and someone pls post on the stupid fosstodon server b/c the folks there are likely to be doing this)

wiz.io/blog/wiz-research-gogs-

  • 22
  • 8
  • 0
  • 10h ago

Bluesky

Profile picture
Gogs Zero-Day (CVE-2025-8110) Risks RCE for 700+ Servers via Symlink Path Traversal Bypass
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Ivanti
  • Endpoint Manager

09 Dec 2025
Published
10 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.6)
EPSS
0.11%

KEV

Description

Stored XSS in Ivanti Endpoint Manager prior to version 2024 SU4 SR1 allows a remote unauthenticated attacker to execute arbitrary JavaScript in the context of an administrator session. User interaction is required.

Statistics

  • 6 Posts
  • 3 Interactions

Last activity: 4 hours ago

Fediverse

Profile picture

🚨 CRITICAL: Fortinet, Ivanti, SAP patch auth bypass & code exec flaws (e.g. CVE-2025-59718, CVE-2025-10573, CVE-2025-42880). Affects FortiOS, FortiWeb, Ivanti Endpoint Manager, SAP Solution Manager. Patch ASAP & disable risky features! radar.offseq.com/threat/fortin

  • 1
  • 0
  • 0
  • 22h ago
Profile picture

Ivanti risolve 4 vulnerabilità critiche in Endpoint Manager (EPM)

Un aggiornamento urgente è stato pubblicato da Ivanti per la sua piattaforma Endpoint Manager (EPM), al fine di risolvere un insieme di vulnerabilità significative che potrebbero permettere agli aggressori di eseguire codice a loro scelta o di prendere il controllo delle sessioni amministrative.

Tra le vulnerabilità corrette, vi sono quattro falle specifiche, compresa una particolarmente critica, contraddistinta da un punteggio di elevata gravità, che sono state sanate grazie a questo aggiornamento.

Per le organizzazioni che non sono in grado di applicare immediatamente la patch, e suggerisce di segregare al meglio le proprie reti riportando che : “Se i clienti non hanno esposto la propria soluzione su Internet, il rischio di questa vulnerabilità è significativamente ridotto”.

Una falla di sicurezza di Stored Cross-Site Scripting (XSS) monitorata con il CVE-2025-10573, ha ottenuto un punteggio CVSS di 9,6. Le versioni del software EPM antecedenti alla 2024 SU4 SR1 sono interessate da questa vulnerabilità.

L’avviso segnala che la vulnerabilità permette ad un aggressore remoto non autenticato di eseguire codice JavaScript a sua scelta all’interno di una sessione di amministrazione.

La falla richiede l’interazione dell’utente, in quanto è probabile che un amministratore venga indotto a visualizzare una pagina dannosa, tuttavia il rischio di un dirottamento dell’intera sessione impone una priorità assoluta per i responsabili della difesa.

Oltre al bug critico XSS, Ivanti ha corretto altre tre vulnerabilità di elevata gravità che espongono il sistema all’esecuzione di codice remoto (RCE) e alla manipolazione non autorizzata dei file:

  • Scrittura di file arbitraria (CVE-2025-13659): classificata CVSS 8.8, questa falla riguarda il “controllo improprio delle risorse di codice gestite dinamicamente”, consentendo a un aggressore remoto e non autenticato di scrivere file arbitrari sul server.
  • Errore di verifica della firma (CVE-2025-13662): con un punteggio CVSS di 7,8, questa vulnerabilità deriva da una “verifica impropria delle firme crittografiche nel componente di gestione delle patch”. Consente ad aggressori remoti non autenticati di eseguire codice arbitrario, sebbene richieda l’interazione dell’utente.
  • Path Traversal (CVE-2025-13661): questo problema (CVSS 7.1) consente a un aggressore autenticato di “scrivere file arbitrari al di fuori della directory prevista”, compromettendo potenzialmente l’integrità del sistema.

Sebbene Ivanti affermi di “non essere a conoscenza di alcun cliente sfruttato da queste vulnerabilità al momento della divulgazione”, consiglia vivamente ai clienti di effettuare immediatamente l’aggiornamento.

L'articolo Ivanti risolve 4 vulnerabilità critiche in Endpoint Manager (EPM) proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 13h ago

Bluesky

Profile picture
Ivanti、EPMの重大なRCE欠陥について警告(CVE-2025-10573) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/42995/
  • 1
  • 0
  • 0
  • 21h ago
Profile picture
Tracked as CVE-2025-10573 with a CVSS score of 9.6, the flaw was patched on December 9, 2025, with the release of Ivanti EPM 2024 SU4 SR1.
  • 0
  • 1
  • 0
  • 10h ago
Profile picture
📢 Ivanti corrige une faille critique XSS dans Endpoint Manager permettant l’exécution de code 📝 Selon BleepingComputer, Ivanti alerte sur … https://cyberveille.ch/posts/2025-12-10-ivanti-corrige-une-faille-critique-xss-dans-endpoint-manager-permettant-lexecution-de-code/ #CVE_2025_10573 #Cyberveille
  • 0
  • 0
  • 0
  • 6h ago
Profile picture
📌 Ivanti Patches Critical Stored XSS Vulnerability in Endpoint Manager (CVE-2025-10573) https://www.cyberhub.blog/article/16601-ivanti-patches-critical-stored-xss-vulnerability-in-endpoint-manager-cve-2025-10573
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Microsoft
  • Windows 10 Version 1809

09 Dec 2025
Published
10 Dec 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
8.21%

Description

Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.

Statistics

  • 6 Posts
  • 2 Interactions

Last activity: 15 hours ago

Fediverse

Profile picture

🚨 Microsoft patches 56 Windows vulnerabilities, incl. 2 zero-days. Actively exploited: privilege escalation in Cloud Files Mini Filter Driver (CVE-2025-62221). Patch ASAP to defend cloud-linked endpoints! radar.offseq.com/threat/micros

  • 0
  • 0
  • 0
  • 17h ago
Profile picture

Microsoft rilascia aggiornamenti urgenti per un bug zero-day di PLE sfruttato in Windows

Una vulnerabilità zero-day nel driver Windows Cloud Files Mini Filter (cldflt.sys) è attualmente oggetto di sfruttamento attivo. Microsoft ha provveduto al rilascio di aggiornamenti di sicurezza urgenti al fine di risolvere tale falla.

La classificazione della vulnerabilità è high, secondo il punteggio base CVSS v3.1, pari a 7,8; inoltre, secondo l’avviso rilasciato da Microsoft, risulta che gli aggressori stanno sfruttando exploit funzionanti sulle macchine al fine di ottenere i privilegi di SYSTEM.

Un’ampia gamma di sistemi operativi Windows, dalle più recenti versioni di Windows 11, come la 25H2, e Windows Server 2025, fino a Windows 10 versione 1809, è interessata da questa vulnerabilità di escalation dei privilegi (PLE).

La vulnerabilità è descritta come una debolezza Use-After-Free all’interno del Cloud Files Mini Filter Driver, un componente del kernel responsabile della gestione dei “segnaposto” e della sincronizzazione per i servizi di archiviazione cloud come OneDrive.

A differenza delle falle di esecuzione di codice in modalità remota (RCE) questa vulnerabilità viene sfruttata come fase secondaria nelle catene di attacco, in cui gli avversari hanno già messo piede nel sistema e cercano di aumentare i propri privilegi per persistere o disabilitare i controlli di sicurezza.

La falla consente infatti ad un aggressore con privilegi bassi e autenticato localmente di innescare uno stato di danneggiamento della memoria, consentendogli successivamente di eseguire codice arbitrario con i privilegi di sistema più elevati.

Microsoft Threat Intelligence Center (MSTIC) e Microsoft Security Response Center (MSRC) hanno individuato il bug , sottolineando che, sebbene la complessità dell’attacco sia bassa e non richieda alcuna interazione da parte dell’utente, l’aggressore deve aver stabilito l’accesso locale al computer di destinazione.

Gli amministratori dovrebbero dare priorità all’applicazione immediata di patch a questi sistemi, dato lo stato di sfruttamento attivo confermato.

L'articolo Microsoft rilascia aggiornamenti urgenti per un bug zero-day di PLE sfruttato in Windows proviene da Red Hot Cyber.

  • 0
  • 0
  • 1
  • 18h ago

Bluesky

Profile picture
🚨 Microsoft’s Dec 2025 Patch Advisory is live! 50+ vulnerabilities patched across Windows, Office, Outlook, SharePoint, Azure Monitor & more, including multiple Critical RCEs and an actively exploited CLFS EoP (CVE-2025-62221). 🛡️ Patch now → stay resilient. www.sequretek.com/resources/re...
  • 1
  • 1
  • 0
  • 15h ago
Profile picture
「この内 CVE-2025-62221 の脆弱性について、Microsoft 社では悪用の事実を確認済みと公表しており、今後被害が拡大するおそれがあるため、至急、セキュリティ更新プログラムを適用してください。」
  • 0
  • 0
  • 0
  • 23h ago
Profile picture
マイクロソフト、2025年12月の月例パッチで悪用されるゼロデイ含む脆弱性57件を修正(CVE-2025-62221ほか) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/42977/
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • RARLAB
  • WinRAR

21 Jun 2025
Published
10 Dec 2025
Updated

CVSS v3.0
HIGH (7.8)
EPSS
8.03%

Description

RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.

Statistics

  • 5 Posts
  • 1 Interaction

Last activity: 5 hours ago

Bluesky

Profile picture
CISA warns WinRAR CVE-2025-6218 is under active attack by multiple threat groups, requiring federal fixes by Dec. 30, 2025.
  • 0
  • 1
  • 0
  • 11h ago
Profile picture
A path traversal vulnerability in the Windows version of WinRAR (CVE-2025-6218) enables code execution and has active exploitation. The flaw […]
  • 0
  • 0
  • 0
  • 15h ago
Profile picture
Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups #thehackersnews
  • 0
  • 0
  • 1
  • 10h ago
Profile picture
警告:WinRARの脆弱性CVE-2025-6218が複数の脅威グループによる攻撃を受けている Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups #HackerNews (Dec 10) thehackernews.com/2025/12/warn...
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Fortinet
  • FortiWeb

09 Dec 2025
Published
10 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.10%

KEV

Description

An improper verification of cryptographic signature vulnerability in Fortinet FortiWeb 8.0.0, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9 may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.

Statistics

  • 3 Posts

Last activity: 21 hours ago

Fediverse

Profile picture

Vulnerabilità critica in FortiOS e altri prodotti Fortinet: aggiornamenti urgenti

Una vulnerabilità critica, monitorata con il codice CVE-2025-59719, riguarda le linee di prodotti FortiOS, FortiWeb, FortiProxy e FortiSwitchManager è stata segnalata da Fortinet tramite un avviso di sicurezza urgente. Tale avviso è stato emesso in relazione a falle di sicurezza che interessano tali prodotti.

Un aggressore potrebbe ottenere l’accesso amministrativo non autorizzato al dispositivo creando un messaggio SAML specifico, se la vulnerabilità viene sfruttata. Tale vulnerabilità è causata dall’incapacità del dispositivo di verificare in modo corretto le firme dei messaggi SAML.
Pannello CVE Details di Red Hot Cyber
Fortinet raccomanda ai propri clienti di procedere con l’aggiornamento alle versioni più recenti che seguono. Per quelle organizzazioni che non sono in grado di applicare le patch immediatamente, è stata messa a disposizione una soluzione provvisoria. Disabilitanto la funzionalità di accesso a FortiCloud, gli amministratori sono in grado di ridurre il rischio.

La falla di sicurezza, identificata come Verifica impropria della firma crittografica (CWE-347), potrebbe consentire a un aggressore non autenticato di aggirare l’autenticazione di accesso Single Sign-On (SSO) di FortiCloud.

Quando un amministratore registra un dispositivo su FortiCare tramite l’interfaccia utente grafica (GUI), l’opzione “Consenti accesso amministrativo tramite FortiCloud SSO” è abilitata per impostazione predefinita. A meno che l’amministratore non disattivi esplicitamente questa opzione durante la registrazione, il dispositivo diventa immediatamente vulnerabile a questo bypass.

La scoperta del problema è stata fatta internamente da Theo Leleu e Yonghui Han del team di sicurezza dei prodotti Fortinet, e l’informazione è stata resa pubblica il 9 dicembre 2025. La funzionalità SSO di FortiCloud, costituisce un rischio considerevole soprattutto negli ambienti di rete distribuiti.

L'articolo Vulnerabilità critica in FortiOS e altri prodotti Fortinet: aggiornamenti urgenti proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 21h ago

Bluesky

Profile picture
Fortinet、FortiCloud SSOログイン認証バイパスの重大な脆弱性について警告(CVE-2025-59718、CVE-2025-59719) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/42981/
  • 0
  • 0
  • 0
  • 23h ago
Profile picture
Fortinet warns of critical FortiCloud SSO login auth bypass flaws (CVE-2025-59718 and CVE-2025-59719) #patchmanagement
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Microsoft
  • Windows 10 Version 1809

09 Dec 2025
Published
10 Dec 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.16%

KEV

Description

Improper neutralization of special elements used in a command ('command injection') in Windows PowerShell allows an unauthorized attacker to execute code locally.

Statistics

  • 2 Posts

Last activity: 11 hours ago

Fediverse

Profile picture

As Microsoft explains, this mitigates a high-severity PowerShell remote code execution vulnerability (CVE-2025-54100), which primarily affects enterprise or IT-managed environments that use PowerShell scripts for automation, since PowerShell scripts are not as commonly used
2/3

  • 0
  • 0
  • 0
  • 21h ago
Profile picture

Le patch pour la vulnérabilité CVE-2025-54100 peut avoir un impact sur vos scripts PowerShell it-connect.fr/windows-powershe #Cybersécurité #Logiciel-OS #Powershell #Microsoft

  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Apache Software Foundation
  • Apache Struts
  • org.apache.struts:struts2-core

01 Dec 2025
Published
01 Dec 2025
Updated

CVSS
Pending
EPSS
0.12%

KEV

Description

Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes disk exhaustion. This issue affects Apache Struts: from 2.0.0 through 6.7.0, from 7.0.0 through 7.0.3. Users are recommended to upgrade to version 6.8.0 or 7.1.1, which fixes the issue.

Statistics

  • 2 Posts
  • 3 Interactions

Last activity: 13 hours ago

Fediverse

Profile picture

Related to this one.

Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes disk exhaustion.\n\nThis issue affects Apache Struts: from 2.0.0 through 6.7.4, from 7.0.0 through 7.0.3.\n\nUsers are recommended to upgrade to version 6.8.0 or 7.1.1, which fixes the issue.\n\nIt's related to cve.org/CVERecord?id=CVE-2025- - this CVE addresses missing affected version 6.7.4

cwiki.apache.org/confluence/di

  • 0
  • 3
  • 0
  • 13h ago

Bluesky

Profile picture
SIOSセキュリティブログを更新しました。 Apache Struts 2の脆弱性(Important: CVE-2025-66675 (Old: CVE-2025-64775)) #sios_tech #security #vulnerability #セキュリティ #脆弱性 #apache #struts security.sios.jp/vulnerabilit...
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • Fortinet
  • FortiSwitchManager

09 Dec 2025
Published
10 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.09%

KEV

Description

A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 22 hours ago

Fediverse

Profile picture

🚨 CRITICAL: Fortinet, Ivanti, SAP patch auth bypass & code exec flaws (e.g. CVE-2025-59718, CVE-2025-10573, CVE-2025-42880). Affects FortiOS, FortiWeb, Ivanti Endpoint Manager, SAP Solution Manager. Patch ASAP & disable risky features! radar.offseq.com/threat/fortin

  • 1
  • 0
  • 0
  • 22h ago

Bluesky

Profile picture
Fortinet、FortiCloud SSOログイン認証バイパスの重大な脆弱性について警告(CVE-2025-59718、CVE-2025-59719) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/42981/
  • 0
  • 0
  • 0
  • 23h ago
Profile picture
Fortinet warns of critical FortiCloud SSO login auth bypass flaws (CVE-2025-59718 and CVE-2025-59719) #patchmanagement
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Pending

10 Dec 2025
Published
10 Dec 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

XiangShan Nanhu V2 and XiangShan Kunmighu V3 were discovered to use speculative execution and indirect branch prediction, allowing attackers to access sensitive information via side-channel analysis of the data cache.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 10 hours ago

Fediverse

Profile picture

Spectre on XiangShan for you low-level nerds. The post is six months old but the CVE was just published.

CVE-2025-63094

github.com/necst/aca25-xiangsh

  • 1
  • 1
  • 0
  • 10h ago
Showing 1 to 10 of 50 CVEs