24h | 7d | 30d

Overview

  • Monsta Limited of New Zealand
  • Monsta FTP

07 Nov 2025
Published
19 Nov 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.04%

KEV

Description

Monsta FTP versions 2.11 and earlier contain a vulnerability that allows unauthenticated arbitrary file uploads. This flaw enables attackers to execute arbitrary code by uploading a specially crafted file from a malicious (S)FTP server.

Statistics

  • 3 Posts
  • 2 Interactions

Last activity: 7 hours ago

Bluesky

Profile picture
๐Ÿ›ก๏ธ Want automated detection of risks like CVE-2025-34299? BaseFortify maps threats to your systems and gives clear mitigation guidance. Register free ๐Ÿ‘‰ basefortify.eu/register #BaseFortify #CyberSecurity #VulnManagement #BlueTeam
  • 0
  • 1
  • 0
  • 7h ago
Profile picture
๐Ÿšจ A critical Monsta FTP flaw (CVE-2025-34299) is still exposing hundreds of servers weeks after disclosure. Many remain unpatched and internet-facing. Full article ๐Ÿ‘‰ basefortify.eu/posts/2025/1... #CyberSecurity #CVE2025 #MonstaFTP #RCE #BaseFortify
  • 0
  • 1
  • 0
  • 7h ago
Profile picture
โš ๏ธ CVE-2025-34299 lets attackers upload malicious files and gain remote code execution. Shadowserver still sees ~800 vulnerable Monsta FTP servers exposed today. More technical details here โฌ‡๏ธ basefortify.eu/cve_reports/... #InfoSec #CVE2025 #MonstaFTP #RCE #CyberAlert
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Shenzhen TVT Digital Technology Co., Ltd.
  • NVMS-9000

24 Nov 2025
Published
25 Nov 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
1.11%

KEV

Description

Shenzhen TVT Digital Technology Co., Ltd. NVMS-9000 firmware (used by many white-labeled DVR/NVR/IPC products) contains hardcoded API credentials and an OS command injection flaw in its configuration services. The web/API interface accepts HTTP/XML requests authenticated with a fixed vendor credential string and passes user-controlled fields into shell execution contexts without proper argument sanitization. An unauthenticated remote attacker can leverage the hard-coded credential to access endpoints such as /editBlackAndWhiteList and inject shell metacharacters inside XML parameters, resulting in arbitrary command execution as root. The same vulnerable backend is also reachable in some models through a proprietary TCP service on port 4567 that accepts a magic GUID preface and base64-encoded XML, enabling the same command injection sink. Firmware releases from mid-February 2018 and later are reported to have addressed this issue.ย Exploitation evidence was observed by the Shadowserver Foundation on 2025-01-28 UTC.

Statistics

  • 2 Posts
  • 3 Interactions

Last activity: 20 hours ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 8 hours ago

Bluesky

Profile picture
Just published a technical deep-dive on a critical Kubernetes security patch. The post analyzes the new #Fedora 42 advisory (FEDORA-2025-4c576d1bd9) for #Kubernetes 1.34, which resolves CVE-2025-28840. Read more: ๐Ÿ‘‰ tinyurl.com/3sxzeevu #Security
  • 0
  • 1
  • 0
  • 8h ago

Overview

  • Pending

Pending
Published
03 Feb 2023
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2023. Notes: none.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 21 hours ago

Fediverse

Profile picture

@cR0w
CVE-2023-25126 says it's unassigned,

  • 0
  • 1
  • 0
  • 21h ago

Overview

  • Google Cloud
  • Looker

24 Nov 2025
Published
24 Nov 2025
Updated

CVSS v4.0
HIGH (7.7)
EPSS
0.08%

KEV

Description

A Looker user with a Developer role could create a database connection using IBM DB2 driver and, by manipulating LookML, cause Looker to execute a malicious command, due to inadequate filtering of the driver's parameters. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances.ย No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 25.0.93+ * 25.6.84+ * 25.12.42+ * 25.14.50+ * 25.16.44+

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 11 hours ago

Bluesky

Profile picture
๐Ÿ›‘ CVE-2025-12740 โ€” Looker (Google) Dev-role users can abuse DB2 configs to trigger command execution via LookML. Patch Self-Hosted now! ๐Ÿ”— basefortify.eu/cve_reports/... #CVE #Looker #Google #RCE #CyberSecurity
  • 0
  • 1
  • 0
  • 11h ago

Overview

  • pnggroup
  • libpng

24 Nov 2025
Published
24 Nov 2025
Updated

CVSS v3.1
HIGH (7.1)
EPSS
0.01%

KEV

Description

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 11 hours ago

Bluesky

Profile picture
๐Ÿ–ผ๏ธ CVE-2025-65018 โ€” LibPNG 16-bit interlaced PNGs can trigger heap overflow in png_image_finish_read. Malicious files = memory corruption. Upgrade to 1.6.51! ๐Ÿ”— basefortify.eu/cve_reports/... #CVE #LibPNG #Overflow #Security
  • 0
  • 1
  • 0
  • 11h ago

Overview

  • Pending

28 Nov 2023
Published
28 Oct 2024
Updated

CVSS
Pending
EPSS
91.53%

KEV

Description

Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment

Statistics

  • 1 Post

Last activity: 21 hours ago

Fediverse

Profile picture

A threat actor known as IronErn440 is exploiting a vulnerability (CVE-2023-48022) in the Ray framework to hijack AI compute infrastructure and turn it into a self-propagating cryptomining botnet. This campaign, dubbed ShadowRay 2.0, has seen attackers leverage platforms like GitLab and GitHub for command-and-control, targeting organizations with exposed Ray dashboards and job submission APIs.
darkreading.com/cyber-risk/sha

  • 0
  • 0
  • 0
  • 21h ago

Overview

  • Intercom, Inc.
  • Security Point (Windows) of MaLion

25 Nov 2025
Published
25 Nov 2025
Updated

CVSS v3.0
CRITICAL (9.8)
EPSS
0.23%

KEV

Description

Security Point (Windows) of MaLion and MaLionCloud contains a heap-based buffer overflow vulnerability in processing Content-Length. Receiving a specially crafted request from a remote unauthenticated attacker could lead to arbitrary code execution with SYSTEM privilege.

Statistics

  • 1 Post

Last activity: 12 hours ago

Fediverse

Profile picture

โš ๏ธ CRITICAL: CVE-2025-64693 โ€” Heap-based buffer overflow in Intercom Security Point (Windows) of MaLion (<7.1.1.9). Remote unauthenticated RCE possible with SYSTEM rights. Patch recommended! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Bjango
  • iStats

24 Nov 2025
Published
24 Nov 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.16%

KEV

Description

iStats contains an insecure XPC service that allows local, unprivileged users to escalate their privileges to root via command injection.This issue affects iStats: 7.10.4.

Statistics

  • 1 Post

Last activity: 20 hours ago

Fediverse

Profile picture

๐Ÿšจ CVE-2025-11921: CRITICAL in Bjango iStats 7.10.4 (macOS) โ€” insecure XPC service lets local users escalate to root via command injection. No patch yet. Limit access, monitor endpoints, & prepare response. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 20h ago

Overview

  • QuantumNous
  • new-api

24 Nov 2025
Published
24 Nov 2025
Updated

CVSS v3.1
HIGH (8.5)
EPSS
0.03%

KEV

Description

New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.9.6, a recently patched SSRF vulnerability contains a bypass method that can bypass the existing security fix and still allow SSRF to occur. Because the existing fix only applies security restrictions to the first URL request, a 302 redirect can bypass existing security measures and successfully access the intranet. This issue has been patched in version 0.9.6.

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture
๐Ÿšจ CVE-2025-62155 | New API โ€” SSRF Redirect Bypass (High) A new SSRF vulnerability in New API allows bypassing a previous fix using HTTP 302 redirects, enabling malicious requests to access internal resources by only validating the first URL. Patch: Update to v0.9.6 buff.ly/iPMLSlT
  • 0
  • 0
  • 0
  • 4h ago
Showing 11 to 20 of 40 CVEs