Overview
- Apache Software Foundation
- Apache Struts
- com.opensymphony:xwork
Description
Statistics
- 3 Posts
Fediverse
CVE-2025-68493 turns your XML config into a confession booth: one malicious entity and the server doxxes itself. Patch to 6.1.1 or keep streaming internal secrets to the outside like it’s reality TV.
https://gbhackers.com/critical-apache-struts-2-flaw/
Overview
- Trend Micro, Inc.
- Trend Micro Apex Central
Description
Statistics
- 3 Posts
- 1 Interaction
Fediverse
‼️Trend Micro Apex Central Multiple Vulnerabilities
CVE:
CVE-2025-69258 (CVSS: 9.8)
CVE-2025-69259 (CVSS: 7.5)
CVE-2025-69260 (CVSS: 7.5)
CWE: CWE-1285, CWE-306, CWE-641
PoC/Writeup: https://www.tenable.com/security/research/tra-2026-01
Disclosure Date: January 7. 2026
Disclosure: https://success.trendmicro.com/en-US/solution/KA-0022071
Bluesky
Overview
Description
Statistics
- 3 Posts
- 11 Interactions
Fediverse
CERT-Bund benachrichtigt seit dem 09.01.2026 deutsche Netzbetreiber zu im Internet exponierten veraltete Instanzen der Open-Source Workflow-Automatisierungsplattform n8n, die noch für mindestens eine der kritischen Schwachstellen CVE-2025-68613, CVE-2025-68668, CVE-2026-21858 oder CVE-2026-21877 verwundbar sind.
Aktuell sind uns rund 24.000 n8n-Systeme bei deutschen Netzbetreibern bekannt, von denen ca. 13.800 (58%) noch verwundbar sind.
Bluesky
Overview
- Hikvision
- DS-96xxxNI-Hx
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
🟠 CVE-2025-66177 - High (8.8)
There is a Stack overflow Vulnerability in the device Search and Discovery feature of Hikvision NVR/DVR/CVR/IPC models. If exploited, an attacker on the same local area network (LAN) could cause the device to malfunction by sending specially craft...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66177/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
- Hikvision
- DS-K1T331
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
🟠 CVE-2025-66176 - High (8.8)
There is a Stack overflow Vulnerability in the device Search and Discovery feature of Hikvision Access Control Products. If exploited, an attacker on the same local area network (LAN) could cause the device to malfunction by sending specially craf...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66176/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
Description
Statistics
- 1 Post
- 4 Interactions
Fediverse
I had a chance last week to chat with Benjamin Read of #Wiz. Last month, Read and other members of his team published a deep dive into the #React2Shell
(CVE-2025-55182) vulnerability, and I was curious to see what has been hitting my honeypot, so I took a closer look.
This is doing some weird stuff, friends.
As is normally the case with exploits targeting internet-facing devices, once the exploit becomes known, it ends up in the automated scanners used by threat actors and security researchers. What I've seen over the past week is a combination of both.
In just a few hours of operation, I identified a small number of source IP addresses exploiting React2Shell by pointing the vulnerable system at URLs hosting BASH scripts. These scripts are really familiar to anyone who routinely looks at honeypot data - they contain a series of commands that pull down and execute malicious payloads.
And as I've seen in the past, some of these payloads use racially inflammatory language in their malware. It's weird and gross, but unfortunately, really common.
But while most of these payloads were "the usual suspects" - remote shells, cryptocurrency miners - there was one payload that stuck out.
It's an exploit file, based on this proof-of-concept [https://github.com/iotwar/FIVEM-POC/blob/main/fivem-poc.py] designed to DDoS a modded server running "FiveM," a popular version of the game Grand Theft Auto V.
Let that one sink in: among the earliest adopters of a brand new exploit are...people trying to mess with other people's online game servers.
I've long said that exploits like these are the canaries in the datacenter coal mine. After all, if an attacker can force your server to run a cryptominer (or a game DDoS tool), they can force it to run far more malicious code.
I guess someone, or a group of someones, just want to ruin everyone's good time, no matter how or what form that takes. And they'll do it in the most offensive way possible.
Anyway, patch your servers, please, if only to stick it to these people who want to be the reason we can't have nice things.
#PoC #exploit #CVE_2025_55182 #DDoS #FiveM #REACT #Bash #cryptominer #malware
Overview
Description
Statistics
- 1 Post
- 4 Interactions
Fediverse
Go ../ more MCP shit. 🤘
https://github.com/Team-Off-course/MCP-Server-Vuln-Analysis/blob/main/CVE-2025-66689.md
Overview
Description
Statistics
- 3 Posts
- 1 Interaction
Bluesky
Overview
Description
Statistics
- 1 Post
Fediverse
🔴 CVE-2025-63314 - Critical (10)
A static password reset token in the password reset function of DDSN Interactive Acora CMS v10.7.1 allows attackers to arbitrarily reset the user password and execute a full account takeover via a replay attack.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-63314/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
Overview
- Zohocorp
- ManageEngine ADSelfService Plus
Description
Statistics
- 1 Post
Fediverse
🔴 CVE-2025-11250 - Critical (9.1)
Zohocorp ManageEngine ADSelfService Plus versions before 6519 are vulnerable to Authentication Bypass due to improper filter configurations.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-11250/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack