24h | 7d | 30d

Overview

  • Meta
  • react-server-dom-webpack

03 Dec 2025
Published
11 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
47.37%

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 1 hour ago

Bluesky

Profile picture
As of December 2025, the activity has been observed leveraging the recently disclosed React2Shell (CVE-2025-55182, CVSS score: 10.0) flaw as an initial access vector, CloudSEK said in an analysis.
  • 0
  • 1
  • 0
  • 1h ago
Profile picture
A nine-month campaign used React2Shell (CVE-2025-55182) and other N-day flaws to enroll IoT devices and web apps into the RondoDox botnet, deploying miners and Mirai variants.
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • IBM
  • API Connect

26 Dec 2025
Published
26 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.37%

KEV

Description

IBM API Connect 10.0.8.0 through 10.0.8.5, and 10.0.11.0 could allow a remote attacker to bypass authentication mechanisms and gain unauthorized access to the application.

Statistics

  • 2 Posts

Last activity: 15 hours ago

Bluesky

Profile picture
#IBM alerte sur une faille critique dans API Connect, permettant à un attaquant distant de contourner l’authentification. Classée CVE-2025-13915, elle obtient un score de 9.8/10. ⚠️🔐 #CyberSecurity #IAÉthique #InnovationIA https://kntn.ly/4aabbbf7
  • 0
  • 0
  • 0
  • 15h ago
Profile picture
IBM warns of critical API Connect auth bypass vulnerability (CVE-2025-13915) #patchmanagement
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • MongoDB Inc.
  • MongoDB Server

19 Dec 2025
Published
31 Dec 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
68.68%

Description

Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Server v4.4 versions prior to 4.4.30, MongoDB Server v4.2 versions greater than or equal to 4.2.0, MongoDB Server v4.0 versions greater than or equal to 4.0.0, and MongoDB Server v3.6 versions greater than or equal to 3.6.0.

Statistics

  • 2 Posts

Last activity: 2 hours ago

Fediverse

Profile picture

29.12.25.. hackede backend-serverne til Ubisofts FPS-spil Rainbow Six Siege og tildelte bruger-konti milliarder i spil-valuta

Ubisoft bekræftede, lukkede serverne ned og ophævede forbuddet for brugere, der havde modtaget valutaen og automatisk var blevet flag'd og udelukket af backend-serverne

.. en MongoDB-sårbarhed kendt som MongoBleed, CVE-2025-14847, der blev offentliggjort 2 dage før jul, og som meget få virksomheder havde haft mulighed for at patche
dexerto.com/rainbow-six/rainbo

  • 0
  • 0
  • 0
  • 2h ago

Bluesky

Profile picture
📌 Critical MongoBleed Vulnerability (CVE-2025-14847) Enables Remote Memory Exfiltration in MongoDB Servers https://www.cyberhub.blog/article/17490-critical-mongobleed-vulnerability-cve-2025-14847-enables-remote-memory-exfiltration-in-mongodb-servers
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • UTT
  • 进取 512W

02 Jan 2026
Published
02 Jan 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

A security vulnerability has been detected in UTT 进取 512W 1.7.7-171114. Affected by this vulnerability is the function strcpy of the file /goform/formConfigCliForEngineerOnly. Such manipulation of the argument addCommand leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 2 Posts

Last activity: 1 hour ago

Fediverse

Profile picture

🟠 CVE-2025-15429 - High (8.8)

A security vulnerability has been detected in UTT 进取 512W 1.7.7-171114. Affected by this vulnerability is the function strcpy of the file /goform/formConfigCliForEngineerOnly. Such manipulation of the argument addCommand leads to buffer overfl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

  • 0
  • 0
  • 1
  • 1h ago

Overview

  • PHP Group
  • PHP

09 Jun 2024
Published
21 Oct 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
94.37%

Description

In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture
Zero-Day to Zero-Trust: How a Recent PHP Exploit Exposes Critical Gaps in Modern Web Security + Video Introduction: A recent critical vulnerability in PHP, tracked as CVE-2024-4577, has sent shockwaves through the web application security landscape. This exploit, stemming from a flaw in how…
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • SignalK
  • signalk-server

01 Jan 2026
Published
01 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
Pending

KEV

Description

Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 expose two features that can be chained together to steal JWT authentication tokens without any prior authentication. The attack combines WebSocket-based request enumeration with unauthenticated polling of access request status. The first is Unauthenticated WebSocket Request Enumeration: When a WebSocket client connects to the SignalK stream endpoint with the `serverevents=all` query parameter, the server sends all cached server events including `ACCESS_REQUEST` events that contain details about pending access requests. The `startServerEvents` function iterates over `app.lastServerEvents` and writes each cached event to any connected client without verifying authorization level. Since WebSocket connections are allowed for readonly users (which includes unauthenticated users when `allow_readonly` is true), attackers receive these events containing request IDs, client identifiers, descriptions, requested permissions, and IP addresses. The second is Unauthenticated Token Polling: The access request status endpoint at `/signalk/v1/access/requests/:id` returns the full state of an access request without requiring authentication. When an administrator approves a request, the response includes the issued JWT token in plaintext. The `queryRequest` function returns the complete request object including the token field, and the REST endpoint uses readonly authentication, allowing unauthenticated access. An attacker has two paths to exploit these vulnerabilities. Either the attacker creates their own access request (using the IP spoofing vulnerability to craft a convincing spoofed request), then polls their own request ID until an administrator approves it, receiving the JWT token; or the attacker passively monitors the WebSocket stream to discover request IDs from legitimate devices, then polls those IDs and steals the JWT tokens when administrators approve them, hijacking legitimate device credentials. Both paths require zero authentication and enable complete authentication bypass. Version 2.19.0 fixes the underlying issues.

Statistics

  • 1 Post

Last activity: 12 hours ago

Fediverse

Profile picture

🔴 CVE-2025-68620 - Critical (9.1)

Signal K Server is a server application that runs on a central hub in a boat. Versions prior to 2.19.0 expose two features that can be chained together to steal JWT authentication tokens without any prior authentication. The attack combines WebSoc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Kopek Reem
  • ReKord client

01 Jan 2026
Published
01 Jan 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
Pending

KEV

Description

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Statistics

  • 1 Post

Last activity: 12 hours ago

Fediverse

Profile picture

🟠 CVE-2025-55065 - High (7.5)

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

  • 0
  • 0
  • 0
  • 12h ago

Overview

  • SmarterTools
  • SmarterMail

29 Dec 2025
Published
29 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.18%

KEV

Description

Successful exploitation of the vulnerability could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution.

Statistics

  • 1 Post

Last activity: 13 hours ago

Bluesky

Profile picture
📌 CSA Issues Critical Alert for SmarterMail RCE Vulnerability (CVE-2025-52691) https://www.cyberhub.blog/article/17492-csa-issues-critical-alert-for-smartermail-rce-vulnerability-cve-2025-52691
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • SignalK
  • signalk-server

01 Jan 2026
Published
01 Jan 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
Pending

KEV

Description

Signal K Server is a server application that runs on a central hub in a boat. A Denial of Service (DoS) vulnerability in versions prior to 2.19.0 allows an unauthenticated attacker to crash the SignalK Server by flooding the access request endpoint (`/signalk/v1/access/requests`). This causes a "JavaScript heap out of memory" error due to unbounded in-memory storage of request objects. Version 2.19.0 fixes the issue.

Statistics

  • 1 Post

Last activity: 14 hours ago

Fediverse

Profile picture

🟠 CVE-2025-68272 - High (7.5)

Signal K Server is a server application that runs on a central hub in a boat. A Denial of Service (DoS) vulnerability in versions prior to 2.19.0 allows an unauthenticated attacker to crash the SignalK Server by flooding the access request endpoin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

  • 0
  • 0
  • 0
  • 14h ago

Overview

  • UTT
  • 进取 512W

02 Jan 2026
Published
02 Jan 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

A vulnerability was detected in UTT 进取 512W 1.7.7-171114. Affected by this issue is the function strcpy of the file /goform/formFtpServerShareDirSelcet. Performing manipulation of the argument oldfilename results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post

Last activity: 1 hour ago

Fediverse

Profile picture

🟠 CVE-2025-15430 - High (8.8)

A vulnerability was detected in UTT 进取 512W 1.7.7-171114. Affected by this issue is the function strcpy of the file /goform/formFtpServerShareDirSelcet. Performing manipulation of the argument oldfilename results in buffer overflow. The attack...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda

  • 0
  • 0
  • 0
  • 1h ago
Showing 1 to 10 of 25 CVEs