24h | 7d | 30d

Overview

  • Iskra
  • iHUB and iHUB Lite

02 Dec 2025
Published
02 Dec 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.09%

KEV

Description

The Iskra iHUB and iHUB Lite smart metering gateway exposes its web management interface without requiring authentication, allowing unauthenticated users to access and modify critical device settings.

Statistics

  • 1 Post

Last activity: 21 hours ago

Fediverse

Profile picture

🚨 CVE-2025-13510: CRITICAL vuln in Iskra iHUB/iHUB Lite (all versions). No auth on web interface—full admin access over network! Isolate, segment, and restrict access ASAP. Awaiting patch. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 21h ago

Overview

  • Go standard library
  • crypto/x509
  • crypto/x509

02 Dec 2025
Published
03 Dec 2025
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture
🚨 New UNKNOWN CVE detected in AWS Lambda 🚨 CVE-2025-61729 impacts stdlib in 27 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/356 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • traccar
  • traccar

02 Oct 2025
Published
03 Oct 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
3.64%

KEV

Description

Traccar is an open source GPS tracking system. Default installs of Traccar on Windows between versions 6.1- 6.8.1 and non default installs between versions 5.8 - 6.0 are vulnerable to unauthenticated local file inclusion attacks which can lead to leakage of passwords or any file on the file system including the Traccar configuration file. Versions 5.8 - 6.0 are only vulnerable if <entry key='web.override'>./override</entry> is set in the configuration file. Versions 6.1 - 6.8.1 are vulnerable by default as the web override is enabled by default. The vulnerable code is removed in version 6.9.0.

Statistics

  • 2 Posts

Last activity: 14 hours ago

Fediverse

Profile picture

🚨 New plugin: TraccarPlugin (CVE-2025-61666).

Traccar local file inclusion vulnerability detection - may expose configuration files.

Results: leakix.net/search?q=%2Bplugin%

  • 0
  • 0
  • 1
  • 14h ago

Overview

  • wpchill
  • Image Gallery – Photo Grid & Video Gallery

03 Dec 2025
Published
03 Dec 2025
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.19%

KEV

Description

The Modula Image Gallery plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'ajax_unzip_file' function in versions 2.13.1 to 2.13.2. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files with race condition on the affected site's server which may make remote code execution possible.

Statistics

  • 1 Post

Last activity: 17 hours ago

Fediverse

Profile picture

🛡️ CVE-2025-13646: HIGH severity in wpchill Image Gallery for WordPress (v2.13.1). Authenticated Author+ users can upload dangerous files, risking RCE. Restrict roles, monitor uploads, and patch ASAP. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 17h ago

Overview

  • angular
  • angular

01 Dec 2025
Published
02 Dec 2025
Updated

CVSS v4.0
HIGH (8.5)
EPSS
0.05%

KEV

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.

Statistics

  • 1 Post

Last activity: 9 hours ago

Bluesky

Profile picture
High-Severity Angular Flaw (CVE-2025-66412) Allows Stored XSS via SVG and MathML Bypass
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Linux
  • Linux

24 Apr 2024
Published
04 Nov 2025
Updated

CVSS
Pending
EPSS
0.17%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: do not free live element Pablo reports a crash with large batches of elements with a back-to-back add/remove pattern. Quoting Pablo: add_elem("00000000") timeout 100 ms ... add_elem("0000000X") timeout 100 ms del_elem("0000000X") <---------------- delete one that was just added ... add_elem("00005000") timeout 100 ms 1) nft_pipapo_remove() removes element 0000000X Then, KASAN shows a splat. Looking at the remove function there is a chance that we will drop a rule that maps to a non-deactivated element. Removal happens in two steps, first we do a lookup for key k and return the to-be-removed element and mark it as inactive in the next generation. Then, in a second step, the element gets removed from the set/map. The _remove function does not work correctly if we have more than one element that share the same key. This can happen if we insert an element into a set when the set already holds an element with same key, but the element mapping to the existing key has timed out or is not active in the next generation. In such case its possible that removal will unmap the wrong element. If this happens, we will leak the non-deactivated element, it becomes unreachable. The element that got deactivated (and will be freed later) will remain reachable in the set data structure, this can result in a crash when such an element is retrieved during lookup (stale pointer). Add a check that the fully matching key does in fact map to the element that we have marked as inactive in the deactivation step. If not, we need to continue searching. Add a bug/warn trap at the end of the function as well, the remove function must not ever be called with an invisible/unreachable/non-existent element. v2: avoid uneeded temporary variable (Stefano)

Statistics

  • 1 Post

Last activity: Last hour

Bluesky

Profile picture
🚨 USN-7907-2 Alert: Critical vuln (CVE-2024-26924) patched in #Ubuntu FIPS kernel. Impacts cryptographic integrity for regulated enterprises. Local exploit -> potential compliance breach. Read more: 👉 tinyurl.com/yz4f32pz #Security
  • 0
  • 0
  • 0
  • Last hour

Overview

  • djangoproject
  • Django
  • django

02 Dec 2025
Published
02 Dec 2025
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

An issue was discovered in 5.2 before 5.2.9, 5.1 before 5.1.15, and 4.2 before 4.2.27. `FilteredRelation` is subject to SQL injection in column aliases, using a suitably crafted dictionary, with dictionary expansion, as the `**kwargs` passed to `QuerySet.annotate()` or `QuerySet.alias()` on PostgreSQL. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Stackered for reporting this issue.

Statistics

  • 1 Post
  • 4 Interactions

Last activity: 23 hours ago

Fediverse

Profile picture

"Django security releases issued: 5.2.9, 5.1.15, and 4.2.27"

djangoproject.com/weblog/2025/

* CVE-2025-13372: Potential SQL injection in FilteredRelation column aliases on PostgreSQL
* CVE-2025-64460: Potential denial-of-service vulnerability in XML serializer text extraction

#python #django #security

  • 3
  • 1
  • 0
  • 23h ago

Overview

  • djangoproject
  • Django
  • django

02 Dec 2025
Published
02 Dec 2025
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

An issue was discovered in 5.2 before 5.2.9, 5.1 before 5.1.15, and 4.2 before 4.2.27. Algorithmic complexity in `django.core.serializers.xml_serializer.getInnerText()` allows a remote attacker to cause a potential denial-of-service attack triggering CPU and memory exhaustion via specially crafted XML input processed by the XML `Deserializer`. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.

Statistics

  • 1 Post
  • 4 Interactions

Last activity: 23 hours ago

Fediverse

Profile picture

"Django security releases issued: 5.2.9, 5.1.15, and 4.2.27"

djangoproject.com/weblog/2025/

* CVE-2025-13372: Potential SQL injection in FilteredRelation column aliases on PostgreSQL
* CVE-2025-64460: Potential denial-of-service vulnerability in XML serializer text extraction

#python #django #security

  • 3
  • 1
  • 0
  • 23h ago
Showing 21 to 28 of 28 CVEs