24h | 7d | 30d

Overview

  • ZSPACE
  • Q2C NAS

05 Dec 2025
Published
05 Dec 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

A weakness has been identified in ZSPACE Q2C NAS up to 1.1.0210050. Affected by this issue is the function zfilev2_api.OpenSafe of the file /v2/file/safe/open of the component HTTP POST Request Handler. This manipulation of the argument safe_dir causes command injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 9 hours ago

Overview

  • Edimax
  • BR-6478AC V3

05 Dec 2025
Published
05 Dec 2025
Updated

CVSS v4.0
MEDIUM (5.1)
EPSS
Pending

KEV

Description

A flaw has been found in Edimax BR-6478AC V3 1.0.15. The affected element is the function sub_44CCE4 of the file /boafrm/formSysCmd. This manipulation of the argument sysCmd causes os command injection. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 14 hours ago

Overview

  • Go standard library
  • crypto/x509
  • crypto/x509

03 Dec 2025
Published
03 Dec 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 11 hours ago

Bluesky

Profile picture
🔐 Critical update for @openSUSE #Tumbleweed users: Advisory 2025:15796-1 patches two "important" severity vulnerabilities in go1.24 (CVE-2025-61727/61729). One allows resource exhaustion via malicious certs. Read more: 👉 tinyurl.com/2zttx7yy #Security
  • 0
  • 1
  • 0
  • 11h ago

Overview

  • Edimax
  • BR-6478AC V3

05 Dec 2025
Published
05 Dec 2025
Updated

CVSS v4.0
MEDIUM (5.1)
EPSS
Pending

KEV

Description

A vulnerability was detected in Edimax BR-6478AC V3 1.0.15. Impacted is the function sub_416990 of the file /boafrm/formTracerouteDiagnosticRun. The manipulation of the argument host results in os command injection. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 15 hours ago

Overview

  • pnggroup
  • libpng

24 Nov 2025
Published
25 Nov 2025
Updated

CVSS v3.1
MEDIUM (6.1)
EPSS
0.01%

KEV

Description

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 12 hours ago

Bluesky

Profile picture
🔐 Security Update: #openSUSE Tumbleweed patches libpng12-0 for CVE-2025-64505 (Moderate). Read more: 👉 tinyurl.com/55yfbfeb #Security
  • 0
  • 1
  • 0
  • 12h ago

Overview

  • Pending

11 Jun 2021
Published
02 Dec 2025
Updated

CVSS
Pending
EPSS
32.79%

Description

OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows stored XSS via system_settings.shtm.

Statistics

  • 1 Post

Last activity: 16 hours ago

Bluesky

Profile picture
📌 CISA Adds OpenPLC ScadaBR XSS Vulnerability (CVE-2021-26829) to Known Exploited Vulnerabilities Catalog https://www.cyberhub.blog/article/16210-cisa-adds-openplc-scadabr-xss-vulnerability-cve-2021-26829-to-known-exploited-vulnerabilities-catalog
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Pending

25 Sep 2025
Published
29 Sep 2025
Updated

CVSS
Pending
EPSS
0.06%

KEV

Description

pytorch v2.8.0 was discovered to display unexpected behavior when the components torch.rot90 and torch.randn_like are used together.

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture
CVE-2025-55552 pytorch v2.8.0 was discovered to display unexpected behavior when the components torch.rot90 and torch.randn_like are used together. scq.ms/48Cnl39 #SecQube #MicrosoftSecurity
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • 7-Zip
  • 7-Zip

19 Nov 2025
Published
21 Nov 2025
Updated

CVSS v3.0
HIGH (7.0)
EPSS
0.29%

KEV

Description

7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this product is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of symbolic links in ZIP files. Crafted data in a ZIP file can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of a service account. Was ZDI-CAN-26753.

Statistics

  • 1 Post

Last activity: 8 hours ago

Fediverse

Profile picture

📰 Critical 7-Zip RCE Vulnerability Now Under Active Exploitation

A critical RCE vulnerability in 7-Zip (CVE-2025-11001) is now being actively exploited. ⚠️ The path traversal flaw allows code execution via malicious archives. Update to version 25.0.0 or later immediately! #7Zip #RCE #CyberSecurity

🔗 cyber.netsecops.io/articles/ac

  • 0
  • 0
  • 0
  • 8h ago

Overview

  • yhirose
  • cpp-httplib

05 Dec 2025
Published
05 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
Pending

KEV

Description

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.27.0, a vulnerability allows attacker-controlled HTTP headers to influence server-visible metadata, logging, and authorization decisions. An attacker can inject headers named REMOTE_ADDR, REMOTE_PORT, LOCAL_ADDR, LOCAL_PORT that are parsed into the request header multimap via read_headers() in httplib.h (headers.emplace), then the server later appends its own internal metadata using the same header names in Server::process_request without erasing duplicates. Because Request::get_header_value returns the first entry for a header key (id == 0) and the client-supplied headers are parsed before server-inserted headers, downstream code that uses these header names may inadvertently use attacker-controlled values. Affected files/locations: cpp-httplib/httplib.h (read_headers, Server::process_request, Request::get_header_value, get_header_value_u64) and cpp-httplib/docker/main.cc (get_client_ip, nginx_access_logger, nginx_error_logger). Attack surface: attacker-controlled HTTP headers in incoming requests flow into the Request.headers multimap and into logging code that reads forwarded headers, enabling IP spoofing, log poisoning, and authorization bypass via header shadowing. This vulnerability is fixed in 0.27.0.

Statistics

  • 1 Post

Last activity: 6 hours ago

Fediverse

Profile picture

⚠️ CRITICAL: CVE-2025-66570 in cpp-httplib (<0.27.0) lets attackers spoof IP headers, bypassing auth & poisoning logs. Upgrade to 0.27.0+ ASAP! Impacts web servers, APIs, embedded systems. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 6h ago

Overview

  • IBM
  • InfoSphere Server

12 Jul 2024
Published
02 Aug 2024
Updated

CVSS v3.1
MEDIUM (5.4)
EPSS
0.24%

KEV

Description

IBM InfoSphere Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 297720.

Statistics

  • 1 Post

Last activity: Last hour

Bluesky

Profile picture
📌 Critical React and Next.js Vulnerability (CVE-2024-40690) Demands Immediate Patching https://www.cyberhub.blog/article/16410-critical-react-and-nextjs-vulnerability-cve-2024-40690-demands-immediate-patching
  • 0
  • 0
  • 0
  • Last hour
Showing 11 to 20 of 39 CVEs