Overview
Description
An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.5 and 2025.1 up to and including 2025.1.3.
Statistics
- 5 Posts
- 6 Interactions
Last activity: 1 hour ago
Bluesky
Attention! We are scanning & reporting WatchGuard Firebox devices unpatched to CVE-2025-14733 (Out of Bounds Write Vulnerability, unauthenticated RCE, CVSS 9.8). Nearly 125 000 IPs found (2025-12-20): dashboard.shadowserver.org/statistics/c...
WatchGuard Advisory: www.watchguard.com/wgrd-psirt/a...
Most affected (most unpatched IPs): US (38.3K), Germany (14K), Italy (12.3K)
CVE-2025-14733 World Map view: dashboard.shadowserver.org/statistics/c...
CVE-2025-14733 Tracker: dashboard.shadowserver.org/statistics/c...
#CyberCivilDefense
We share daily IP data in our Vulnerable ISAKMP Report, tagged 'cve-2025-14733': www.shadowserver.org/what-we-do/n...
CVE-2025-14733 is reported exploited in the wild & on US CISA KEV: www.cisa.gov/known-exploi...
If you receive a report from us, check for signs of compromise as well
📌 CISA Adds Critical WatchGuard Fireware OS Vulnerability (CVE-2025-14733) to KEV Catalog https://www.cyberhub.blog/article/17010-cisa-adds-critical-watchguard-fireware-os-vulnerability-cve-2025-14733-to-kev-catalog
Overview
Description
Cisco is aware of a potential vulnerability. Cisco is currently investigating and will update these details as appropriate as more information becomes available.
Statistics
- 2 Posts
Last activity: 8 hours ago
Bluesky
CVE-2025-20393: zero-day critico nei Cisco Secure Email Gateway
📌 Link all'articolo : www.redhotcyber.com/post/cve...
#redhotcyber #news #cybersecurity #hacking #malware #ciscovulnerabile #sicurezzainformatica #vulnerabilita
Overview
- uriparser project
- uriparser
14 Dec 2025
Published
15 Dec 2025
Updated
CVSS v3.1
LOW (2.9)
EPSS
0.02%
KEV
Description
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
Statistics
- 1 Post
- 1 Interaction
Last activity: 9 hours ago
Overview
- Red Hat
- Red Hat Enterprise Linux 10
- util-linux
05 Dec 2025
Published
15 Dec 2025
Updated
CVSS
Pending
EPSS
0.01%
KEV
Description
A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.
Statistics
- 1 Post
- 1 Interaction
Last activity: 10 hours ago
Overview
Description
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.
Statistics
- 1 Post
Last activity: 8 hours ago
Overview
Description
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Statistics
- 1 Post
Last activity: 3 hours ago
Overview
Description
This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.
Statistics
- 1 Post
Last activity: 11 hours ago
Overview
Description
This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.
Statistics
- 1 Post
Last activity: 9 hours ago
Overview
Description
This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.
Statistics
- 1 Post
Last activity: 19 hours ago
Overview
- Apache Software Foundation
- Apache Commons Text
13 Oct 2022
Published
20 Nov 2024
Updated
CVSS
Pending
EPSS
97.16%
KEV
Description
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.
Statistics
- 1 Post
Last activity: 11 hours ago