24h | 7d | 30d

Overview

  • JumpCloud Inc.
  • Remote Assist

02 Dec 2025
Published
02 Dec 2025
Updated

CVSS v4.0
HIGH (8.5)
EPSS
0.02%

KEV

Description

JumpCloud Remote Assist for Windows versions prior to 0.317.0 include an uninstaller that is invoked by the JumpCloud Windows Agent as NT AUTHORITY\SYSTEM during agent uninstall or update operations. The Remote Assist uninstaller performs privileged create, write, execute, and delete actions on predictable files inside a user-writable %TEMP% subdirectory without validating that the directory is trusted or resetting its ACLs when it already exists. A local, low-privileged attacker can pre-create the directory with weak permissions and leverage mount-point or symbolic-link redirection to (a) coerce arbitrary file writes to protected locations, leading to denial of service (e.g., by overwriting sensitive system files), or (b) win a race to redirect DeleteFileW() to attacker-chosen targets, enabling arbitrary file or folder deletion and local privilege escalation to SYSTEM. This issue is fixed in JumpCloud Remote Assist 0.317.0 and affects Windows systems where Remote Assist is installed and managed through the Agent lifecycle.

Statistics

  • 1 Post

Last activity: 4 hours ago

Fediverse

Profile picture

A vulnerability in JumpCloud Remote Assist for Windows (CVE-2025-34352) could allow local attackers to escalate privileges and potentially take over endpoints by tricking the uninstaller into performing privileged operations on user-controlled directories. JumpCloud has automatically upgraded all customers to version 0.319.0, which addresses this flaw.
securityweek.com/jumpcloud-rem

  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Hewlett Packard Enterprise (HPE)
  • HPE OneView

16 Dec 2025
Published
17 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.25%

KEV

Description

A remote code execution issue exists in HPE OneView.

Statistics

  • 1 Post

Last activity: 11 hours ago

Bluesky

Profile picture
CVE-2025-37164: The Knock That Crashes the Door—A Deep Dive into the HPE OneView 100 RCE + Video Introduction: A critical, unauthenticated remote code execution (RCE) vulnerability, CVE-2025-37164, has been disclosed in HPE OneView, carrying the maximum CVSS score of 10.0. This flaw allows a…
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • pgadmin.org
  • pgAdmin 4

11 Dec 2025
Published
12 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.10%

KEV

Description

pgAdmin versions up to 9.10 are affected by a Remote Code Execution (RCE) vulnerability that occurs when running in server mode and performing restores from PLAIN-format dump files. This issue allows attackers to inject and execute arbitrary commands on the server hosting pgAdmin, posing a critical risk to the integrity and security of the database management system and underlying data.

Statistics

  • 1 Post

Last activity: 16 hours ago

Bluesky

Profile picture
pgAdmin に深刻な脆弱性(CVE-2025-13780) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Xen
  • Xen

31 Oct 2025
Published
04 Nov 2025
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

[This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Some Viridian hypercalls can specify a mask of vCPU IDs as an input, in one of three formats. Xen has boundary checking bugs with all three formats, which can cause out-of-bounds reads and writes while processing the inputs. * CVE-2025-58147. Hypercalls using the HV_VP_SET Sparse format can cause vpmask_set() to write out of bounds when converting the bitmap to Xen's format. * CVE-2025-58148. Hypercalls using any input format can cause send_ipi() to read d->vcpu[] out-of-bounds, and operate on a wild vCPU pointer.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture
🚨 Critical Xen hypervisor vulnerabilities (CVE-2025-58147/58148) allow VM escape via Viridian hypercalls. Read more: 👉 tinyurl.com/mvax78f3 #SUSE #Security
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Pending

12 Dec 2025
Published
12 Dec 2025
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

Plesk 18.0 has Incorrect Access Control.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture
サーバー管理ツール「Plesk for Linux」に致命的な脆弱性(CVE-2025-66430) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • kstover
  • Ninja Forms – The Contact Form Builder That Grows With You

17 Dec 2025
Published
17 Dec 2025
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.06%

KEV

Description

The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.13.2. This is due to the plugin not properly verifying that a user is authorized before the `ninja-forms-views` REST endpoints return form metadata and submission content. This makes it possible for unauthenticated attackers to read arbitrary form definitions and submission records via a leaked bearer token granted they can load any page containing the Submissions Table block. NOTE: The developer released a patch for this issue in 3.13.1, but inadvertently introduced a REST API endpoint in which a valid bearer token could be minted for arbitrary form IDs, making this patch ineffective.

Statistics

  • 1 Post

Last activity: 9 hours ago

Fediverse

Profile picture

⚠️ HIGH severity: CVE-2025-11924 impacts Ninja Forms (WordPress), letting unauthenticated attackers access form data via REST API. Patch 3.13.1 is ineffective. Restrict API, audit tokens, and monitor logs. More info: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Claris
  • FileMaker Server

16 Dec 2025
Published
17 Dec 2025
Updated

CVSS
Pending
EPSS
0.25%

KEV

Description

Apache Commons Text versions prior to 1.10.0 included interpolation features that could be abused when applications passed untrusted input into the text-substitution API. Because some interpolators could trigger actions like executing commands or accessing external resources, an attacker could potentially achieve remote code execution. This vulnerability has been fully addressed in FileMaker Server 22.0.4.

Statistics

  • 1 Post

Last activity: 15 hours ago

Fediverse

Profile picture

⚠️ CRITICAL: CVE-2025-46295 affects Claris FileMaker Server via Apache Commons Text <1.10.0, enabling RCE with untrusted input. Upgrade to 22.0.4+ ASAP and restrict access. Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Google
  • Chrome

26 Mar 2025
Published
21 Oct 2025
Updated

CVSS
Pending
EPSS
24.99%

Description

Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)

Statistics

  • 1 Post

Last activity: 8 hours ago

Fediverse

Profile picture

Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports

Introduction


In March 2025, we discovered Operation ForumTroll, a series of sophisticated cyberattacks exploiting the CVE-2025-2783 vulnerability in Google Chrome. We previously detailed the malicious implants used in the operation: the LeetAgent backdoor and the complex spyware Dante, developed by Memento Labs (formerly Hacking Team). However, the attackers behind this operation didn’t stop at their spring campaign and have continued to infect targets within the Russian Federation.

Emails posing as a scientific library


In October 2025, just days before we presented our report detailing the ForumTroll APT group’s attack at the Security Analyst Summit, we detected a new targeted phishing campaign by the same group. However, while the spring cyberattacks focused on organizations, the fall campaign honed in on specific individuals: scholars in the field of political science, international relations, and global economics, working at major Russian universities and research institutions.

The emails received by the victims were sent from the address support@e-library[.]wiki. The campaign purported to be from the scientific electronic library, eLibrary, whose legitimate website is elibrary.ru. The phishing emails contained a malicious link in the format: https://e-library[.]wiki/elib/wiki.php?id=<8 pseudorandom letters and digits>. Recipients were prompted to click the link to download a plagiarism report. Clicking that link triggered the download of an archive file. The filename was personalized, using the victim’s own name in the format: <LastName>_<FirstName>_<Patronymic>.zip.

A well-prepared attack


The attackers did their homework before sending out the phishing emails. The malicious domain, e-library[.]wiki, was registered back in March 2025, over six months before the email campaign started. This was likely done to build the domain’s reputation, as sending emails from a suspicious, newly registered domain is a major red flag for spam filters.

Furthermore, the attackers placed a copy of the legitimate eLibrary homepage on https://e-library[.]wiki. According to the information on the page, they accessed the legitimate website from the IP address 193.65.18[.]14 back in December 2024.


A screenshot of the malicious site elements showing the IP address and initial session date

The attackers also carefully personalized the phishing emails for their targets, specific professionals in the field. As mentioned above, the downloaded archive was named with the victim’s last name, first name, and patronymic.

Another noteworthy technique was the attacker’s effort to hinder security analysis by restricting repeat downloads. When we attempted to download the archive from the malicious site, we received a message in Russian, indicating the download link was likely for one-time use only:


The message that was displayed when we attempted to download the archive

Our investigation found that the malicious site displayed a different message if the download was attempted from a non-Windows device. In that case, it prompted the user to try again from a Windows computer.


The message that was displayed when we attempted to download the archive from a non-Windows OS

The malicious archive


The malicious archives downloaded via the email links contained the following:

  • A malicious shortcut file named after the victim: <LastName>_<FirstName>_<Patronymic>.lnk;
  • A .Thumbs directory containing approximately 100 image files with names in Russian. These images were not used during the infection process and were likely added to make the archives appear less suspicious to security solutions.


A portion of the .Thumbs directory contents

When the user clicked the shortcut, it ran a PowerShell script. The script’s primary purpose was to download and execute a PowerShell-based payload from a malicious server.


The script that was launched by opening the shortcut

The downloaded payload then performed the following actions:

  • Contacted a URL in the format: https://e-library[.]wiki/elib/query.php?id=<8 pseudorandom letters and digits>&key=<32 hexadecimal characters> to retrieve the final payload, a DLL file.
  • Saved the downloaded file to %localappdata%\Microsoft\Windows\Explorer\iconcache_<4 pseudorandom digits>.dll.
  • Established persistence for the payload using COM Hijacking. This involved writing the path to the DLL file into the registry key HKCR\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32. Notably, the attackers had used that same technique in their spring attacks.
  • Downloaded a decoy PDF from a URL in the format: https://e-library[.]wiki/pdf/<8 pseudorandom letters and digits>.pdf. This PDF was saved to the user’s Downloads folder with a filename in the format: <LastName>_<FirstName>_<Patronymic>.pdf and then opened automatically.

The decoy PDF contained no valuable information. It was merely a blurred report generated by a Russian plagiarism-checking system.


A screenshot of a page from the downloaded report

At the time of our investigation, the links for downloading the final payloads didn’t work. Attempting to access them returned error messages in English: “You are already blocked…” or “You have been bad ended” (sic). This likely indicates the use of a protective mechanism to prevent payloads from being downloaded more than once. Despite this, we managed to obtain and analyze the final payload.

The final payload: the Tuoni framework


The DLL file deployed to infected devices proved to be an OLLVM-obfuscated loader, which we described in our previous report on Operation ForumTroll. However, while this loader previously delivered rare implants like LeetAgent and Dante, this time the attackers opted for a better-known commercial red teaming framework: Tuoni. Portions of the Tuoni code are publicly available on GitHub. By deploying this tool, the attackers gained remote access to the victim’s device along with other capabilities for further system compromise.

As in the previous campaign, the attackers used fastly.net as C2 servers.

Conclusion


The cyberattacks carried out by the ForumTroll APT group in the spring and fall of 2025 share significant similarities. In both campaigns, infection began with targeted phishing emails, and persistence for the malicious implants was achieved with the COM Hijacking technique. The same loader was used to deploy the implants both in the spring and the fall.

Despite these similarities, the fall series of attacks cannot be considered as technically sophisticated as the spring campaign. In the spring, the ForumTroll APT group exploited zero-day vulnerabilities to infect systems. By contrast, the autumn attacks relied entirely on social engineering, counting on victims not only clicking the malicious link but also downloading the archive and launching the shortcut file. Furthermore, the malware used in the fall campaign, the Tuoni framework, is less rare.

ForumTroll has been targeting organizations and individuals in Russia and Belarus since at least 2022. Given this lengthy timeline, it is likely this APT group will continue to target entities and individuals of interest within these two countries. We believe that investigating ForumTroll’s potential future campaigns will allow us to shed light on shadowy malicious implants created by commercial developers – much as we did with the discovery of the Dante spyware.

Indicators of compromise


e-library[.]wiki
perf-service-clients2.global.ssl.fastly[.]net
bus-pod-tenant.global.ssl.fastly[.]net
status-portal-api.global.ssl.fastly[.]net

securelist.com/operation-forum…

  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Microsoft
  • Windows 11 Version 25H2

14 Oct 2025
Published
11 Dec 2025
Updated

CVSS v3.1
HIGH (7.0)
EPSS
0.07%

KEV

Description

Out-of-bounds read in Windows DWM allows an authorized attacker to elevate privileges locally.

Statistics

  • 1 Post

Last activity: 9 hours ago

Fediverse

Profile picture

🚨 New advisory was just published! 🚨

CVE-2025-55681 - A new Desktop Window Manager LPE. This vulnerability is caused when an out-of-bounds bug is first triggered to execute shellcode, then MapViewOfFile is hooked to tamper with shared memory and abuse consent.exe, and finally a malicious DLL is loaded to execute cmd: ssd-disclosure.com/desktop-win

  • 0
  • 0
  • 0
  • 9h ago

Overview

  • GG Soft Software Services Inc.
  • PaperWork

17 Dec 2025
Published
17 Dec 2025
Updated

CVSS v3.1
HIGH (7.1)
EPSS
0.03%

KEV

Description

Authorization Bypass Through User-Controlled Key vulnerability in GG Soft Software Services Inc. PaperWork allows Exploitation of Trusted Identifiers.This issue affects PaperWork: from 5.2.0.9427 before 6.0.

Statistics

  • 1 Post

Last activity: 8 hours ago

Fediverse

Profile picture

⚠️ HIGH severity: CVE-2025-14101 affects GG Soft PaperWork ≤5.2.0.9427. Authorization bypass via user-controlled key risks trusted identifiers. Update to 6.0+ recommended. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 8h ago
Showing 11 to 20 of 40 CVEs