24h | 7d | 30d

Overview

  • abrt

03 Dec 2025
Published
03 Dec 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

A flaw was found in the ABRT daemon’s handling of user-supplied mount information.ABRT copies up to 12 characters from an untrusted input and places them directly into a shell command (docker inspect %s) without proper validation. An unprivileged local user can craft a payload that injects shell metacharacters, causing the root-running ABRT process to execute attacker-controlled commands and ultimately gain full root privileges.

Statistics

  • 2 Posts

Last activity: 6 hours ago

Bluesky

Profile picture
🔐 Detailed #Fedora 43 Security Advisory: CVE-2025-12744 The abrt tool patch is more than a routine update Read more:👉 tinyurl.com/5y6prrda #Security
  • 0
  • 0
  • 0
  • 11h ago
Profile picture
New critical vulnerability for #Fedora 42 users. CVE-2025-12744 in ABRT is a local privilege escalation to root. NVD/CVSS 8.8. Read more: 👉 tinyurl.com/ycn26s74 #Security
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • Linux
  • Linux

04 Dec 2025
Published
04 Dec 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: xfrm: delete x->tunnel as we delete x The ipcomp fallback tunnels currently get deleted (from the various lists and hashtables) as the last user state that needed that fallback is destroyed (not deleted). If a reference to that user state still exists, the fallback state will remain on the hashtables/lists, triggering the WARN in xfrm_state_fini. Because of those remaining references, the fix in commit f75a2804da39 ("xfrm: destroy xfrm_state synchronously on net exit path") is not complete. We recently fixed one such situation in TCP due to defered freeing of skbs (commit 9b6412e6979f ("tcp: drop secpath at the same time as we currently drop dst")). This can also happen due to IP reassembly: skbs with a secpath remain on the reassembly queue until netns destruction. If we can't guarantee that the queues are flushed by the time xfrm_state_fini runs, there may still be references to a (user) xfrm_state, preventing the timely deletion of the corresponding fallback state. Instead of chasing each instance of skbs holding a secpath one by one, this patch fixes the issue directly within xfrm, by deleting the fallback state as soon as the last user state depending on it has been deleted. Destruction will still happen when the final reference is dropped. A separate lockdep class for the fallback state is required since we're going to lock x->tunnel while x is locked.

Statistics

  • 1 Post

Last activity: 13 hours ago

Bluesky

Profile picture
CVE-2025-40215 xfrm: delete x->tunnel as we delete x scq.ms/48wlrm1 #SecQube #MicrosoftSecurity
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • yhirose
  • cpp-httplib

05 Dec 2025
Published
05 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.02%

KEV

Description

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.27.0, a vulnerability allows attacker-controlled HTTP headers to influence server-visible metadata, logging, and authorization decisions. An attacker can inject headers named REMOTE_ADDR, REMOTE_PORT, LOCAL_ADDR, LOCAL_PORT that are parsed into the request header multimap via read_headers() in httplib.h (headers.emplace), then the server later appends its own internal metadata using the same header names in Server::process_request without erasing duplicates. Because Request::get_header_value returns the first entry for a header key (id == 0) and the client-supplied headers are parsed before server-inserted headers, downstream code that uses these header names may inadvertently use attacker-controlled values. Affected files/locations: cpp-httplib/httplib.h (read_headers, Server::process_request, Request::get_header_value, get_header_value_u64) and cpp-httplib/docker/main.cc (get_client_ip, nginx_access_logger, nginx_error_logger). Attack surface: attacker-controlled HTTP headers in incoming requests flow into the Request.headers multimap and into logging code that reads forwarded headers, enabling IP spoofing, log poisoning, and authorization bypass via header shadowing. This vulnerability is fixed in 0.27.0.

Statistics

  • 1 Post

Last activity: 22 hours ago

Fediverse

Profile picture

⚠️ CRITICAL: CVE-2025-66570 in cpp-httplib (<0.27.0) lets attackers spoof IP headers, bypassing auth & poisoning logs. Upgrade to 0.27.0+ ASAP! Impacts web servers, APIs, embedded systems. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Pending

06 Aug 2024
Published
13 Mar 2025
Updated

CVSS
Pending
EPSS
0.58%

KEV

Description

K7RKScan.sys in K7 Ultimate Security before 17.0.2019 allows local users to cause a denial of service (BSOD) because of a NULL pointer dereference.

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture
📢 K7 Antivirus: abus de named pipes et escalade de privilèges jusqu’à SYSTEM (CVE-2024-36424) 📝 Source: billet technique de Lucas Laise. https://cyberveille.ch/posts/2025-12-06-k7-antivirus-abus-de-named-pipes-et-escalade-de-privileges-jusqua-system-cve-2024-36424/ #CVE_2024_36424 #Cyberveille
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Google
  • Chrome

02 Dec 2025
Published
03 Dec 2025
Updated

CVSS
Pending
EPSS
0.08%

KEV

Description

Type Confusion in V8 in Google Chrome prior to 143.0.7499.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 1 Post

Last activity: 11 hours ago

Bluesky

Profile picture
🚨 URGENT: #Fedora 43 users—Chromium 143.0.7499.40 patches 14 vulnerabilities, including HIGH-risk CVE-2025-13630 (Type Confusion in V8). Update immediately to prevent arbitrary code execution and privilege escalation risks. 🔗 Full advisory & commands: 👉 tinyurl.com/4tnc6fet #Security
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • win.rar GmbH
  • WinRAR

08 Aug 2025
Published
21 Oct 2025
Updated

CVSS v4.0
HIGH (8.4)
EPSS
2.82%

Description

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture
APT-C-53 (Gamaredon) uses CVE-2025-8088 to conduct phishing attacks.
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Cisco
  • Cisco IP Phones with Multiplatform Firmware

03 Mar 2023
Published
28 Oct 2024
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
20.10%

KEV

Description

Multiple vulnerabilities in the web-based management interface of certain Cisco IP Phones could allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture
CVE-2023-20078 technical analysis: Identifying and triggering a command injection vulnerability in Cisco IP phones https://lobste.rs/s/jv25vw #security
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • 10web
  • 10Web Booster – Website speed optimization, Cache & Page Speed optimizer

06 Dec 2025
Published
06 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.6)
EPSS
0.04%

KEV

Description

The 10Web Booster – Website speed optimization, Cache & Page Speed optimizer plugin for WordPress is vulnerable to arbitrary folder deletion due to insufficient file path validation in the get_cache_dir_for_page_from_url() function in all versions up to, and including, 2.32.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary folders on the server, which can easily lead to a loss of data or a denial of service condition.

Statistics

  • 1 Post

Last activity: 17 hours ago

Fediverse

Profile picture

🚨 CRITICAL vuln: 10Web Booster WordPress plugin (all versions ≤2.32.7) allows authenticated users to delete arbitrary folders via path traversal (CVE-2025-13377, CVSS 9.6). Risk: data loss, DoS. Restrict access & monitor systems. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Advantech Co., Ltd.
  • WISE-DeviceOn Server

05 Dec 2025
Published
05 Dec 2025
Updated

CVSS v4.0
CRITICAL (10.0)
EPSS
0.19%

KEV

Description

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a hard-coded cryptographic key vulnerability. The product uses a static HS512 HMAC secret for signing EIRMMToken JWTs across all installations. The server accepts forged JWTs that need only contain a valid email claim, allowing a remote unauthenticated attacker to generate arbitrary tokens and impersonate any DeviceOn account, including the root super admin. Successful exploitation permits full administrative control of the DeviceOn instance and can be leveraged to execute code on managed agents through DeviceOn’s remote management features.

Statistics

  • 1 Post

Last activity: 21 hours ago

Fediverse

Profile picture

🚨 CVE-2025-34256: CRITICAL (CVSS 10) vuln in Advantech WISE-DeviceOn Server <5.4—remote attackers can forge JWTs & gain full admin access via hard-coded key. Patch to v5.4+ or restrict access now! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 21h ago

Overview

  • ajitdas
  • Flex QR Code Generator

06 Dec 2025
Published
06 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.14%

KEV

Description

The Flex QR Code Generator plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the update_qr_code() function in all versions up to, and including, 1.2.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

Statistics

  • 1 Post

Last activity: 15 hours ago

Fediverse

Profile picture

🚨 CRITICAL: CVE-2025-12673 in Flex QR Code Generator for WordPress (≤1.2.6) allows unauthenticated arbitrary file uploads—possible RCE! Disable plugin, monitor for patches, restrict file exec in uploads. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 15h ago
Showing 21 to 30 of 35 CVEs