24h | 7d | 30d

Overview

  • Red Hat
  • Red Hat Enterprise Linux 10
  • util-linux

05 Dec 2025
Published
15 Dec 2025
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 23 hours ago

Bluesky

Profile picture
CRITICAL: CVE-2025-14104 for #Fedora 42. Heap buffer overflow in util-linux's setpwnam(). Local privilege escalation risk. Read more: 👉 tinyurl.com/yk34b9n5 #Security
  • 1
  • 0
  • 0
  • 23h ago

Overview

  • Meta
  • react-server-dom-webpack

03 Dec 2025
Published
11 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
43.43%

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 7 hours ago

Fediverse

Profile picture

This is legit a Christmas miracle b/c I rly did not want to spend the break tending to #React2Shell

viz.greynoise.io/tags/react-se

  • 0
  • 1
  • 0
  • 7h ago

Overview

  • Sharp Display Solutions, Ltd.
  • NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

22 Dec 2025
Published
22 Dec 2025
Updated

CVSS v4.0
CRITICAL (9.5)
EPSS
Pending

KEV

Description

Improper Validation of Integrity Check Value vulnerability in Sharp Display Solutions projectors allows a attacker may create and run unauthorized firmware.

Statistics

  • 1 Post

Last activity: Last hour

Fediverse

Profile picture

🚨 CVE-2025-11543 (CRITICAL, CVSS 9.5): Sharp projectors (all models/versions) let attackers deploy rogue firmware via network—no auth needed. Segment, restrict, and monitor devices. No patch yet. Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • Last hour

Overview

  • Campcodes
  • Complete Online Beauty Parlor Management System

21 Dec 2025
Published
21 Dec 2025
Updated

CVSS v4.0
MEDIUM (6.9)
EPSS
Pending

KEV

Description

A security flaw has been discovered in Campcodes Complete Online Beauty Parlor Management System 1.0. Impacted is an unknown function of the file /admin/view-appointment.php. Performing manipulation of the argument viewid results in sql injection. The attack may be initiated remotely. The exploit has been released to the public and may be exploited.

Statistics

  • 1 Post

Last activity: 5 hours ago

Fediverse

Profile picture

Some increased actor activities are shown targeting Campcodes Complete Online Beauty Parlor Management System (CVE-2025-14990) vuldb.com/?ctiid.337684

  • 0
  • 0
  • 0
  • 5h ago

Overview

  • n8n-io
  • n8n

19 Dec 2025
Published
19 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
Pending

KEV

Description

n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. This issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0. Users are strongly advised to upgrade to a patched version, which introduces additional safeguards to restrict expression evaluation. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only; and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully eliminate the risk and should only be used as short-term measures.

Statistics

  • 1 Post

Last activity: Last hour

Fediverse

Profile picture

🚨 Critical RCE (CVSS 10) vulnerability affecting n8n instances: CVE-2025-68613

I've created a vulnerability detection script here:
github.com/rxerium/CVE-2025-68

No signs of active exploitation, yet.

Patches are available and users are strongly advised to upgrade to version 1.122.0 or later, which introduces additional safeguards to restrict expression evaluation.

Workarounds are available as mentioned here:
github.com/n8n-io/n8n/security

  • 0
  • 0
  • 0
  • Last hour

Overview

  • themeisle
  • Redirection for Contact Form 7

21 Dec 2025
Published
21 Dec 2025
Updated

CVSS v3.1
HIGH (8.1)
EPSS
Pending

KEV

Description

The Redirection for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'move_file_to_upload' function in all versions up to, and including, 3.2.7. This makes it possible for unauthenticated attackers to copy arbitrary files on the affected site's server. If 'allow_url_fopen' is set to 'On', it is possible to upload a remote file to the server.

Statistics

  • 1 Post

Last activity: 9 hours ago

Fediverse

Profile picture

⚠️ CVE-2025-14800: HIGH severity in themeisle Redirection for Contact Form 7 plugin—arbitrary file upload via missing validation in all versions ≤3.2.7. Disable plugin & 'allow_url_fopen', monitor for patches. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Go standard library
  • crypto/x509
  • crypto/x509

29 Oct 2025
Published
04 Nov 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.

Statistics

  • 1 Post

Last activity: Last hour

Bluesky

Profile picture
🔐 CRITICAL UPDATE: #Fedora patches #GoBuster to address CVE-2025-58188 (v3.8.2). This directory/DNS busting tool is vital for pentesters. A flaw in it could compromise security audits. Read more: 👉 tinyurl.com/4vwzkvwr #Security
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Apple
  • iOS and iPadOS

17 Dec 2025
Published
19 Dec 2025
Updated

CVSS
Pending
EPSS
0.07%

KEV

Description

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture
New deep-dive analysis for the #Mageia community. The MGASA-2025-0331 advisory patches critical memory safety bugs in webkit2 (CVE-2025-43501, etc.). Read more: 👉 tinyurl.com/49w5m829 #Security
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Sharp Display Solutions, Ltd.
  • NP-P502HL-2, NP-P502WL-2, NP-P502HLG-2, NP-P502WLG, NP-P502H, NP-P502W, NP-P452H, NP-P452W, NP-P502HG, NP-P502WG, NP-P452HG, NP-P452WG, NP-P502H+, NP-P502W+, NP-CR5450H, NP-CR5450W, NP-P502HL, NP-P502WL, NP-P502HLG, NP-P502WLG, NP-P502HL+, NP-P502WL+, NP-CR5450HL, NP-CR5450WL, NP-UM352W, NP-UM352WG, NP-UM352W+

22 Dec 2025
Published
22 Dec 2025
Updated

CVSS v4.0
CRITICAL (9.2)
EPSS
Pending

KEV

Description

Stack-based Buffer Overflow vulnerability in Sharp Display Solutions projectors allows a attacker may execute arbitrary commands and programs.

Statistics

  • 1 Post

Last activity: 2 hours ago

Fediverse

Profile picture

A severe vulnerability was disclosed for Sharp Display Solutions NP-P502HL-2 and other products (CVE-2025-11541) vuldb.com/?id.337728

  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Ragic
  • Enterprise Cloud Database

22 Dec 2025
Published
22 Dec 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
Pending

KEV

Description

Enterprise Cloud Database developed by Ragic has a Hard-coded Cryptographic Key vulnerability, allowing unauthenticated remote attackers to exploit the fixed key to generate verification information and log into the system as any user.

Statistics

  • 1 Post

Last activity: 5 hours ago

Fediverse

Profile picture

🚨 CVE-2025-15016: CRITICAL flaw in Ragic Enterprise Cloud Database. Hard-coded crypto key enables remote, unauthenticated access as any user. Audit & restrict access urgently. No patch yet—mitigate now! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 5h ago
Showing 11 to 20 of 34 CVEs