Overview
- ZSPACE
- Q2C NAS
05 Dec 2025
Published
05 Dec 2025
Updated
CVSS v4.0
HIGH (8.7)
EPSS
Pending
KEV
Description
A weakness has been identified in ZSPACE Q2C NAS up to 1.1.0210050. Affected by this issue is the function zfilev2_api.OpenSafe of the file /v2/file/safe/open of the component HTTP POST Request Handler. This manipulation of the argument safe_dir causes command injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
Statistics
- 1 Post
- 1 Interaction
Last activity: 9 hours ago
Overview
- Edimax
- BR-6478AC V3
05 Dec 2025
Published
05 Dec 2025
Updated
CVSS v4.0
MEDIUM (5.1)
EPSS
Pending
KEV
Description
A flaw has been found in Edimax BR-6478AC V3 1.0.15. The affected element is the function sub_44CCE4 of the file /boafrm/formSysCmd. This manipulation of the argument sysCmd causes os command injection. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Statistics
- 1 Post
- 1 Interaction
Last activity: 14 hours ago
Overview
- Go standard library
- crypto/x509
- crypto/x509
03 Dec 2025
Published
03 Dec 2025
Updated
CVSS
Pending
EPSS
0.02%
KEV
Description
An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.
Statistics
- 1 Post
- 1 Interaction
Last activity: 11 hours ago
Overview
- Edimax
- BR-6478AC V3
05 Dec 2025
Published
05 Dec 2025
Updated
CVSS v4.0
MEDIUM (5.1)
EPSS
Pending
KEV
Description
A vulnerability was detected in Edimax BR-6478AC V3 1.0.15. Impacted is the function sub_416990 of the file /boafrm/formTracerouteDiagnosticRun. The manipulation of the argument host results in os command injection. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Statistics
- 1 Post
- 1 Interaction
Last activity: 15 hours ago
Overview
- pnggroup
- libpng
24 Nov 2025
Published
25 Nov 2025
Updated
CVSS v3.1
MEDIUM (6.1)
EPSS
0.01%
KEV
Description
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.
Statistics
- 1 Post
- 1 Interaction
Last activity: 12 hours ago
Description
OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows stored XSS via system_settings.shtm.
Statistics
- 1 Post
Last activity: 16 hours ago
Overview
Description
pytorch v2.8.0 was discovered to display unexpected behavior when the components torch.rot90 and torch.randn_like are used together.
Statistics
- 1 Post
Last activity: 1 hour ago
Overview
Description
7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this product is required to exploit this vulnerability but attack vectors may vary depending on the implementation.
The specific flaw exists within the handling of symbolic links in ZIP files. Crafted data in a ZIP file can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of a service account. Was ZDI-CAN-26753.
Statistics
- 1 Post
Last activity: 8 hours ago
Fediverse
📰 Critical 7-Zip RCE Vulnerability Now Under Active Exploitation
A critical RCE vulnerability in 7-Zip (CVE-2025-11001) is now being actively exploited. ⚠️ The path traversal flaw allows code execution via malicious archives. Update to version 25.0.0 or later immediately! #7Zip #RCE #CyberSecurity
Overview
- yhirose
- cpp-httplib
05 Dec 2025
Published
05 Dec 2025
Updated
CVSS v3.1
CRITICAL (10.0)
EPSS
Pending
KEV
Description
cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.27.0, a vulnerability allows attacker-controlled HTTP headers to influence server-visible metadata, logging, and authorization decisions. An attacker can inject headers named REMOTE_ADDR, REMOTE_PORT, LOCAL_ADDR, LOCAL_PORT that are parsed into the request header multimap via read_headers() in httplib.h (headers.emplace), then the server later appends its own internal metadata using the same header names in Server::process_request without erasing duplicates. Because Request::get_header_value returns the first entry for a header key (id == 0) and the client-supplied headers are parsed before server-inserted headers, downstream code that uses these header names may inadvertently use attacker-controlled values. Affected files/locations: cpp-httplib/httplib.h (read_headers, Server::process_request, Request::get_header_value, get_header_value_u64) and cpp-httplib/docker/main.cc (get_client_ip, nginx_access_logger, nginx_error_logger). Attack surface: attacker-controlled HTTP headers in incoming requests flow into the Request.headers multimap and into logging code that reads forwarded headers, enabling IP spoofing, log poisoning, and authorization bypass via header shadowing. This vulnerability is fixed in 0.27.0.
Statistics
- 1 Post
Last activity: 6 hours ago
Fediverse
⚠️ CRITICAL: CVE-2025-66570 in cpp-httplib (<0.27.0) lets attackers spoof IP headers, bypassing auth & poisoning logs. Upgrade to 0.27.0+ ASAP! Impacts web servers, APIs, embedded systems. https://radar.offseq.com/threat/cve-2025-66570-cwe-290-authentication-bypass-by-sp-dc26efd3 #OffSeq #cpphttplib #CVE202566570 #infosec
Overview
- IBM
- InfoSphere Server
12 Jul 2024
Published
02 Aug 2024
Updated
CVSS v3.1
MEDIUM (5.4)
EPSS
0.24%
KEV
Description
IBM InfoSphere Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 297720.
Statistics
- 1 Post
Last activity: Last hour