24h | 7d | 30d

Overview

  • Microsoft
  • Windows Server 2025

12 Nov 2024
Published
21 Oct 2025
Updated

CVSS v3.1
MEDIUM (6.5)
EPSS
89.99%

Description

NTLM Hash Disclosure Spoofing Vulnerability

Statistics

  • 1 Post

Last activity: 21 hours ago

Bluesky

Profile picture
Zombie Protocol: How NTLM Flaws Like CVE-2024-43451 Are Haunting 2025
  • 0
  • 0
  • 0
  • 21h ago

Overview

  • lukevella
  • rallly

29 Nov 2025
Published
29 Nov 2025
Updated

CVSS v4.0
HIGH (7.1)
EPSS
0.04%

KEV

Description

Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.6, an information disclosure vulnerability exposes participant details, including names and email addresses through the /api/trpc/polls.get,polls.participants.list endpoint, even when Pro privacy features are enabled. This bypasses intended privacy controls that should prevent participants from viewing other users’ personal information. This issue has been patched in version 4.5.6.

Statistics

  • 1 Post

Last activity: 7 hours ago

Fediverse

Profile picture

CVE-2025-66027: HIGH severity info disclosure in lukevella Rallly <4.5.6. Participant names & emails exposed via API despite Pro privacy. Patch to 4.5.6 now! đź”’ radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 7h ago

Overview

  • ASUS
  • Router

25 Nov 2025
Published
26 Nov 2025
Updated

CVSS v4.0
CRITICAL (9.2)
EPSS
0.10%

KEV

Description

An authentication-bypass vulnerability exists in AiCloud. This vulnerability can be triggered by an unintended side effect of the Samba functionality, potentially leading to allow execution of specific functions without proper authorization. Refer to the Security Update for ASUS Router Firmware section on the ASUS Security Advisory for more information.

Statistics

  • 1 Post

Last activity: 3 hours ago

Fediverse

Profile picture

Asus has released software updates to address a critical vulnerability in its AiCloud routers

Vulnerability:
CVE-2025-59366 - path traversal and OS command injection

Impact:
- Can allow a attacker to remotely execute OS commands

Recommendation: Apply patches ASAP

#cybersecurity #vulnerabilitymanagement #Asus

bleepingcomputer.com/news/secu

  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Apache Software Foundation
  • Apache SkyWalking

27 Nov 2025
Published
28 Nov 2025
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Apache SkyWalking. This issue affects Apache SkyWalking: <= 10.2.0. Users are recommended to upgrade to version 10.3.0, which fixes the issue.

Statistics

  • 1 Post

Last activity: 9 hours ago

Fediverse

Profile picture

VulnerabilitĂ  Apache SkyWalking: rischio di attacchi XSS

Di recente è stata scoperta una vulnerabilità in Apache SkyWalking, un popolare strumento di monitoraggio delle prestazioni delle applicazioni, che gli aggressori potrebbero sfruttare per eseguire script dannosi e lanciare attacchi cross-site scripting (XSS) .

La vulnerabilità, identificata come CVE-2025-54057 , riguarda tutte le versioni di SkyWalking, fino alla versione 10.2.0. Questa vulnerabilità rientra nella categoria degli ” XSS (cross-site scripting) stored“. Ciò significa che un aggressore può iniettare codice dannoso in una pagina web e, quando altri utenti visualizzano tale pagina web, il codice verrà eseguito nei loro browser.

Ciò potrebbe comportare una serie di problemi di sicurezza, tra cui il furto di credenziali di accesso e di informazioni sensibili come i dati personali. La vulnerabilità deriva dall’incapacità della pagina web di filtrare correttamente i tag HTML correlati agli script , consentendo agli aggressori di iniettare e memorizzare script dannosi.

Questa falla di sicurezza è classificata con severity media in quanto è necessaria una operazione da parte dell’utente per poter accedere ai suoi dati. Se sfruttata, gli aggressori potrebbero ottenere l’accesso non autorizzato agli account utente, impersonare altri utenti o manomettere il sito web . Per le organizzazioni che utilizzano Apache SkyWalking per monitorare le proprie applicazioni, il potenziale furto di dati rappresenta un problema significativo. Un attacco riuscito potrebbe compromettere l’intera applicazione e i relativi dati.

Questa vulnerabilità riguarda tutte le versioni di Apache SkyWalking dalla 10.2.0 alle precedenti . Il team di sviluppo di SkyWalking ha rilasciato una patch per la versione 10.3.0. Si consiglia vivamente a tutti gli utenti di Apache SkyWalking di aggiornare immediatamente alla versione più recente per proteggere i propri sistemi da potenziali attacchi. L’aggiornamento alla nuova versione è l’unico modo per mitigare il rischio di questa vulnerabilità.

La vulnerabilità è stata scoperta e segnalata dal ricercatore di sicurezza Vinh Nguyễn Quang. Dopo la segnalazione, l’Apache Software Foundation ha sviluppato e rilasciato una correzione. La divulgazione di questa vulnerabilità evidenzia l’importanza della comunità open source nell’identificare e risolvere i problemi di sicurezza.

L'articolo VulnerabilitĂ  Apache SkyWalking: rischio di attacchi XSS proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Fortinet
  • FortiWeb

14 Nov 2025
Published
20 Nov 2025
Updated

CVSS v3.1
CRITICAL (9.4)
EPSS
66.90%

Description

A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.

Statistics

  • 1 Post

Last activity: Last hour

Bluesky

Profile picture
The latest update for #Detectify includes "Why traditional black box #testing is failing modern #AppSec teams" and "The researcher's desk: FortiWeb Authentication Bypass (CVE-2025-64446)". #cybersecurity #webvulnerabilities #websecurity https://opsmtrs.com/33CTOVX
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Google
  • Android

18 Nov 2025
Published
19 Nov 2025
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

In bta_hf_client_cb_init of bta_hf_client_main.cc, there is a possible remote code execution due to a use after free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

Statistics

  • 1 Post

Last activity: 10 hours ago

Fediverse

Profile picture

I got a write to 0x0041414141414141 with my proof-of-concept for CVE-2025-48593.

What can I do with this? Getting an infoleak is probably possible, but hard. For a proof-of-concept, I won’t bother defeating ASLR: I’ll just arbitrary-write to hardcoded memory addresses.

*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Build fingerprint: 'google/sdk_gphone64_arm64/emu64a:15/AE3A.240806.043/12960925:userdebug/dev-keys'
Revision: '0'
ABI: 'arm64'
Timestamp: 2025-11-29 01:05:20.770911586-0500
Process uptime: 0s
Cmdline: com.google.android.bluetooth
pid: 8175, tid: 8216, name: bt_main_thread  >>> com.google.android.bluetooth <<<
uid: 1002
tagged_addr_ctrl: 0000000000000001 (PR_TAGGED_ADDR_ENABLE)
pac_enabled_keys: 000000000000000f (PR_PAC_APIAKEY, PR_PAC_APIBKEY, PR_PAC_APDAKEY, PR_PAC_APDBKEY)
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0041414141414141
    x0  4141414141414141  x1  b4000077bfa55441  x2  0000000000000002  x3  00000076c7bbbfac
    x4  b4000077bfa55443  x5  4141414141414143  x6  0000000000000041  x7  b40000776fa25f19
    x8  0000000000000041  x9  4141414141414141  x10 0000000000000041  x11 0000000000000000
    x12 0000000000000000  x13 000000007fffffff  x14 0000000000000001  x15 000002cff1957708
    x16 000000766db7b360  x17 0000007994958700  x18 00000076677c4060  x19 000000766dbd3f58
    x20 b4000077bfa55441  x21 0000000000000fff  x22 00000076c7bbca80  x23 0000000000000002
    x24 00000076c7bbca80  x25 000000766d06d150  x26 b40000786fa33d10  x27 00000076c7bbca80
    x28 00000076c7bbc1f0  x29 00000076c7bbbff0
    lr  000000766d96ed58  sp  00000076c7bbbfa0  pc  000000799495877c  pst 0000000080001000

3 total frames
backtrace:
      #00 pc 000000000005577c  /apex/com.android.runtime/lib64/bionic/libc.so (__memcpy_aarch64_simd+124) (BuildId: 1b9fecf834d610f77e641f026ca7269b)
      #01 pc 0000000000966d54  /apex/com.android.btservices/lib64/libbluetooth_jni.so (sdp_copy_raw_data(tCONN_CB*, bool)+340) (BuildId: 6f08819253185bc44c9fec07ed93c598)
      #02 pc 0000000000000b08  <anonymous:79baf59000>
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • jvde-github
  • AIS-catcher

29 Nov 2025
Published
29 Nov 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.04%

KEV

Description

AIS-catcher is a multi-platform AIS receiver. Prior to version 0.64, a heap buffer overflow vulnerability has been identified in the AIS::Message class of AIS-catcher. This vulnerability allows an attacker to write approximately 1KB of arbitrary data into a 128-byte buffer. This issue has been patched in version 0.64.

Statistics

  • 1 Post

Last activity: 14 hours ago

Fediverse

Profile picture

🔴 CRITICAL: CVE-2025-66216 impacts AIS-catcher <0.64 with a heap buffer overflow (CWE-131). Remote, no-auth exploit possible—code exec & DoS risk! Upgrade to v0.64+ now. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 14h ago

Overview

  • ricardoboss
  • PubNet

29 Nov 2025
Published
29 Nov 2025
Updated

CVSS v3.1
CRITICAL (9.4)
EPSS
0.07%

KEV

Description

PubNet is a self-hosted Dart & Flutter package service. Prior to version 1.1.3, the /api/storage/upload endpoint in PubNet allows unauthenticated users to upload packages as any user by providing arbitrary author-id values. This enables identity spoofing, privilege escalation, and supply chain attacks. This issue has been patched in version 1.1.3.

Statistics

  • 1 Post

Last activity: 16 hours ago

Fediverse

Profile picture

🔒 CVE-2025-65112 (CRITICAL, CVSS 9.4) in ricardoboss PubNet (<1.1.3) allows unauthenticated uploads as any user—enabling identity spoofing & supply chain risk. Patch to 1.1.3+ now & audit uploads! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 16h ago

Overview

  • OpenPrinting
  • libcupsfilters

12 Nov 2025
Published
12 Nov 2025
Updated

CVSS v3.1
LOW (3.7)
EPSS
0.04%

KEV

Description

CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. In CUPS-Filters versions up to and including 1.28.17 and libscupsfilters versions 2.0.0 through 2.1.1, CUPS-Filters's `imagetoraster` filter has an out of bounds read/write vulnerability in the processing of TIFF image files. While the pixel buffer is allocated with the number of pixels times a pre-calculated bytes-per-pixel value, the function which processes these pixels is called with a size of the number of pixels times 3. When suitable inputs are passed, the bytes-per-pixel value can be set to 1 and bytes outside of the buffer bounds get processed. In order to trigger the bug, an attacker must issue a print job with a crafted TIFF file, and pass appropriate print job options to control the bytes-per-pixel value of the output format. They must choose a printer configuration under which the `imagetoraster` filter or its C-function equivalent `cfFilterImageToRaster()` gets invoked. The vulnerability exists in both CUPS-Filters 1.x and the successor library libcupsfilters (CUPS-Filters 2.x). In CUPS-Filters 2.x, the vulnerable function is `_cfImageReadTIFF() in libcupsfilters`. When this function is invoked as part of `cfFilterImageToRaster()`, the caller passes a look-up-table during whose processing the out of bounds memory access happens. In CUPS-Filters 1.x, the equivalent functions are all found in the cups-filters repository, which is not split into subprojects yet, and the vulnerable code is in `_cupsImageReadTIFF()`, which is called through `cupsImageOpen()` from the `imagetoraster` tool. A patch is available in commit b69dfacec7f176281782e2f7ac44f04bf9633cfa.

Statistics

  • 2 Posts

Last activity: 17 hours ago

Bluesky

Profile picture
[Backport release-25.05] libcupsfilters: apply patches for CVE-2025-64503 and CVE-2025-57812 https://github.com/NixOS/nixpkgs/pull/466095 #security
  • 0
  • 0
  • 1
  • 17h ago

Overview

  • OpenPrinting
  • cups-filters

12 Nov 2025
Published
13 Nov 2025
Updated

CVSS v3.1
MEDIUM (4.0)
EPSS
0.02%

KEV

Description

cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In cups-filters prior to 1.28.18, by crafting a PDF file with a large `MediaBox` value, an attacker can cause CUPS-Filter 1.x’s `pdftoraster` tool to write beyond the bounds of an array. First, a PDF with a large `MediaBox` width value causes `header.cupsWidth` to become large. Next, the calculation of `bytesPerLine = (header.cupsBitsPerPixel * header.cupsWidth + 7) / 8` overflows, resulting in a small value. Then, `lineBuf` is allocated with the small `bytesPerLine` size. Finally, `convertLineChunked` calls `writePixel8`, which attempts to write to `lineBuf` outside of its buffer size (out of bounds write). In libcupsfilters, the maintainers found the same `bytesPerLine` multiplication without overflow check, but the provided test case does not cause an overflow there, because the values are different. Commit 50d94ca0f2fa6177613c97c59791bde568631865 contains a patch, which is incorporated into cups-filters version 1.28.18.

Statistics

  • 2 Posts

Last activity: 17 hours ago

Bluesky

Profile picture
[Backport release-25.05] libcupsfilters: apply patches for CVE-2025-64503 and CVE-2025-57812 https://github.com/NixOS/nixpkgs/pull/466095 #security
  • 0
  • 0
  • 1
  • 17h ago
Showing 11 to 20 of 28 CVEs