24h | 7d | 30d

Overview

  • ISC
  • BIND 9

22 Oct 2025
Published
04 Nov 2025
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.06%

KEV

Description

Querying for records within a specially crafted zone containing certain malformed DNSKEY records can lead to CPU exhaustion. This issue affects BIND 9 versions 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.

Statistics

  • 1 Post
  • 4 Interactions

Last activity: 17 hours ago

Fediverse

Profile picture

F5 finally published an advisory confirming that some of their systems are impacted by CVE-2025-8677:

my.f5.com/manage/s/article/K00

  • 0
  • 4
  • 0
  • 17h ago

Overview

  • saadiqbal
  • Post SMTP – Complete SMTP Solution with Logs, Alerts, Backup SMTP & Mobile App

01 Nov 2025
Published
03 Nov 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.09%

KEV

Description

The Post SMTP – Complete SMTP Solution with Logs, Alerts, Backup SMTP & Mobile App plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the __construct function in all versions up to, and including, 3.6.0. This makes it possible for unauthenticated attackers to read arbitrary logged emails sent through the Post SMTP plugin, including password reset emails containing password reset links, which can lead to account takeover.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 19 hours ago

Fediverse

Profile picture

💥 Hackers exploit WordPress plugin Post SMTP to hijack admin accounts

「 Threat actors are actively exploiting a critical vulnerability in the Post SMTP plugin installed on more than 400,000 WordPress sites, to take complete control by hijacking administrator accounts 」

bleepingcomputer.com/news/secu

#CVE202511833 #wp #cybersecurity

  • 0
  • 2
  • 0
  • 19h ago

Overview

  • BUFFALO INC.
  • WSR-1800AX4

07 Nov 2025
Published
07 Nov 2025
Updated

CVSS v3.0
MEDIUM (4.3)
EPSS
0.01%

KEV

Description

Use of password hash with insufficient computational effort issue exists in BUFFALO Wi-Fi router 'WSR-1800AX4 series'. When WPS is enabled, PIN code and/or Wi-Fi password may be obtained by an attacker.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 23 hours ago

Overview

  • PHP Group
  • PHP

09 Jun 2024
Published
21 Oct 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
94.37%

Description

In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 18 hours ago

Overview

  • Cisco
  • Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

25 Sep 2025
Published
05 Nov 2025
Updated

CVSS v3.1
CRITICAL (9.9)
EPSS
4.05%

Description

A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker with valid VPN user credentials could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as root, possibly resulting in the complete compromise of the affected device.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 6 hours ago

Bluesky

Profile picture
🚨 Cisco firewalls under attack again! Two new zero-days (CVE-2025-20333, CVE-2025-20362) exploited for remote access + persistence. Patch ASAP + upgrade to Secure Boot models 🔒 #CyberSecurity #Cisco #ZeroDay #Firewall
  • 0
  • 1
  • 0
  • 21h ago
Profile picture
#Cisco alerte sur une nouvelle attaque ciblant les pare-feux via les failles CVE-2025-20333 et CVE-2025-20362. Les appareils non corrigés peuvent redémarrer de façon imprévue, causant un déni de service. 🔥🛡️ #CyberSecurity #InnovationIA #IA2025 https://kntn.ly/f519377d
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • Cisco
  • Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

25 Sep 2025
Published
05 Nov 2025
Updated

CVSS v3.1
MEDIUM (6.5)
EPSS
12.67%

Description

Update: On November 5, 2025, Cisco became aware of a new attack variant against devices running Cisco Secure ASA Software or Cisco Secure FTD Software releases that are affected by CVE-2025-20333 and CVE-2025-20362. This attack can cause unpatched devices to unexpectedly reload, leading to denial of service (DoS) conditions. Cisco strongly recommends that all customers upgrade to the fixed software releases that are listed in the Fixed Software ["#fs"] section of this advisory. A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on a device. A successful exploit could allow the attacker to access a restricted URL without authentication.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 6 hours ago

Bluesky

Profile picture
🚨 Cisco firewalls under attack again! Two new zero-days (CVE-2025-20333, CVE-2025-20362) exploited for remote access + persistence. Patch ASAP + upgrade to Secure Boot models 🔒 #CyberSecurity #Cisco #ZeroDay #Firewall
  • 0
  • 1
  • 0
  • 21h ago
Profile picture
#Cisco alerte sur une nouvelle attaque ciblant les pare-feux via les failles CVE-2025-20333 et CVE-2025-20362. Les appareils non corrigés peuvent redémarrer de façon imprévue, causant un déni de service. 🔥🛡️ #CyberSecurity #InnovationIA #IA2025 https://kntn.ly/f519377d
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • Sudo project
  • Sudo

30 Jun 2025
Published
21 Oct 2025
Updated

CVSS v3.1
CRITICAL (9.3)
EPSS
21.13%

Description

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

Statistics

  • 1 Post

Last activity: 19 hours ago

Bluesky

Profile picture
This appears to be a collection of different conversations and content: 1. LinkedIn Security Alert Post: David L. shared an important security alert about CVE-2025-32463, a privilege escalation vulnerability in sudo (versions 1.9.14-1.9.17) involving the `--chroot` command. He provides: - CVSS…
  • 0
  • 0
  • 0
  • 19h ago

Overview

  • Vercel
  • AI SDK

07 Nov 2025
Published
07 Nov 2025
Updated

CVSS v3.1
LOW (3.7)
EPSS
0.03%

KEV

Description

A vulnerability in Vercel’s AI SDK has been fixed in versions 5.0.52, 5.1.0-beta.9, and 6.0.0-beta. This issue may have allowed users to bypass filetype whitelists when uploading files. All users are encouraged to upgrade. More details: https://vercel.com/changelog/cve-2025-48985-input-validation-bypass-on-ai-sdk

Statistics

  • 1 Post

Last activity: 23 hours ago

Overview

  • kovidgoyal
  • calibre

07 Nov 2025
Published
07 Nov 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
Pending

KEV

Description

calibre is an e-book manager. In versions 8.13.0 and prior, calibre does not validate filenames when handling binary assets in FB2 files, allowing an attacker to write arbitrary files on the filesystem when viewing or converting a malicious FictionBook file. This can be leveraged to achieve arbitrary code execution. This issue is fixed in version 8.14.0.

Statistics

  • 1 Post

Last activity: 13 hours ago

Fediverse

Profile picture

🛑 CVE-2025-64486: calibre (<8.14.0) suffers a CRITICAL vuln (CVSS 9.3). Malicious FB2 files can force arbitrary file writes & code exec. Update to 8.14.0+ ASAP! For orgs handling e-books, patch is urgent. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 13h ago

Overview

  • GE Vernova
  • Smallworld

07 Nov 2025
Published
07 Nov 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
Pending

KEV

Description

Improper Authentication vulnerability in GE Vernova Smallworld on Windows, Linux allows Authentication Abuse.This issue affects Smallworld: 5.3.3 and prior versions for Linux, and 5.3.4. and prior versions for Windows.

Statistics

  • 1 Post

Last activity: 10 hours ago

Fediverse

Profile picture

🚨 CVE-2025-3222: CRITICAL vuln in GE Vernova Smallworld (≤5.3.3 Linux, ≤5.3.4 Windows). Improper auth lets remote attackers bypass login, risking full access. Restrict network, monitor logs, await patch. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 10h ago
Showing 11 to 20 of 35 CVEs