24h | 7d | 30d

Overview

  • Microsoft
  • Windows 11 Version 25H2

09 Dec 2025
Published
12 Dec 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.05%

KEV

Description

Out-of-bounds read in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.

Statistics

  • 1 Post

Last activity: 8 hours ago

Bluesky

Profile picture
CVE-2025-62457 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability scq.ms/3Yhdc7b #cybersecurity #SecQube
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • geoserver
  • geoserver

25 Nov 2025
Published
12 Dec 2025
Updated

CVSS v3.1
HIGH (8.2)
EPSS
71.92%

Description

GeoServer is an open source server that allows users to share and edit geospatial data. From version 2.26.0 to before 2.26.2 and before 2.25.6, an XML External Entity (XXE) vulnerability was identified. The application accepts XML input through a specific endpoint /geoserver/wms operation GetMap. However, this input is not sufficiently sanitized or restricted, allowing an attacker to define external entities within the XML request. This issue has been patched in GeoServer 2.25.6, GeoServer 2.26.3, and GeoServer 2.27.0.

Statistics

  • 1 Post

Last activity: 13 hours ago

Bluesky

Profile picture
📌 CISA Adds OSGeo GeoServer Vulnerability (CVE-2025-58360) to KEV Catalog https://www.cyberhub.blog/article/16768-cisa-adds-osgeo-geoserver-vulnerability-cve-2025-58360-to-kev-catalog
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • geoserver
  • geoserver

01 Jul 2024
Published
21 Oct 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
94.42%

Description

GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code. Versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed.

Statistics

  • 1 Post

Last activity: 14 hours ago

Bluesky

Profile picture
📌 CISA Orders Immediate Patching of Actively Exploited GeoServer RCE Flaw (CVE-2024-36401) https://www.cyberhub.blog/article/16766-cisa-orders-immediate-patching-of-actively-exploited-geoserver-rce-flaw-cve-2024-36401
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Pending

25 Aug 2018
Published
05 Aug 2024
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

Endless recursion exists in xkbcomp/expr.c in xkbcommon and libxkbcommon before 0.8.1, which could be used by local attackers to crash xkbcommon users by supplying a crafted keymap file that triggers boolean negation.

Statistics

  • 1 Post

Last activity: 20 hours ago

Bluesky

Profile picture
Critical patch for #Fedora 42: Update xkbcomp to v1.5.0 NOW. Fixes CVE-2018-15853 (DoS risk) + related CVEs. Read more: 👉 tinyurl.com/3uczsyt4 #Security
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • Red Hat
  • Red Hat Enterprise Linux 10
  • coreutils

27 May 2025
Published
20 Nov 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.

Statistics

  • 1 Post

Last activity: 22 hours ago

Fediverse

Profile picture

@irisnk@dorm.social nothing on cat and ls obviously but anything mildly more complex is pretty problematic lol

the most recent one was CVE-2025-5278

  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Microsoft
  • Windows 11 Version 25H2

09 Dec 2025
Published
12 Dec 2025
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.08%

KEV

Description

Heap-based buffer overflow in Windows Resilient File System (ReFS) allows an authorized attacker to execute code over a network.

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture
CVE-2025-62456 Windows Resilient File System (ReFS) Remote Code Execution Vulnerability scq.ms/4q2ptZe #cybersecurity #SecQube
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Shiguangwu
  • sgwbox N3

15 Dec 2025
Published
15 Dec 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.04%

KEV

Description

A weakness has been identified in Shiguangwu sgwbox N3 2.0.25. Affected by this vulnerability is an unknown functionality of the file /usr/sbin/http_eshell_server of the component WIREDCFGGET Interface. Executing manipulation of the argument params can lead to buffer overflow. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post

Last activity: 6 hours ago

Fediverse

Profile picture

🛑 CRITICAL: CVE-2025-14708 in Shiguangwu sgwbox N3 v2.0.25 allows remote buffer overflow via WIREDCFGGET—public exploit, no patch. Segment networks, restrict access, and monitor for attacks. Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 6h ago

Overview

  • Microsoft
  • Windows Server 2025 (Server Core installation)

11 Nov 2025
Published
11 Dec 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.09%

KEV

Description

Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally.

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture
CVE-2025-60710 Host Process for Windows Tasks Elevation of Privilege Vulnerability scq.ms/4iN65Nn #SecQube #cybersecurity
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Cisco
  • Cisco TelePresence Video Communication Server (VCS) Expressway

08 Oct 2020
Published
13 Nov 2024
Updated

CVSS v3.1
MEDIUM (5.9)
EPSS
0.60%

KEV

Description

A vulnerability in the Session Initiation Protocol (SIP) of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect handling of incoming SIP traffic. An attacker could exploit this vulnerability by sending a series of SIP packets to an affected device. A successful exploit could allow the attacker to exhaust memory on an affected device, causing it to crash and leading to a DoS condition.

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture
Performing CVE-2020–3596 in Four Steps: Crashing Cisco VCS via SIP https://junoonbro.medium.com/performing-cve-2020-3596-in-four-steps-crashing-cisco-vcs-via-sip-42059155037e?source=rss------bug_bounty-5
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Shiguangwu
  • sgwbox N3

15 Dec 2025
Published
15 Dec 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.15%

KEV

Description

A security flaw has been discovered in Shiguangwu sgwbox N3 2.0.25. Affected is an unknown function of the file /usr/sbin/http_eshell_server of the component DOCKER Feature. Performing manipulation of the argument params results in command injection. The attack may be initiated remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post

Last activity: 4 hours ago

Fediverse

Profile picture

⚠️ CRITICAL: CVE-2025-14707 in Shiguangwu sgwbox N3 v2.0.25 enables unauthenticated RCE via the DOCKER feature. No patch, public exploit available. Restrict network access, monitor logs, and disable if possible. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 4h ago
Showing 11 to 20 of 33 CVEs