24h | 7d | 30d

Overview

  • Microsoft
  • Windows 10 Version 1809

11 Mar 2025
Published
23 Mar 2025
Updated

CVSS v3.1
HIGH (7.0)
EPSS
4.29%

Description

Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.

Statistics

  • 1 Post

Overview

  • H3C
  • Magic NX30 Pro

25 Mar 2025
Published
25 Mar 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.20%

KEV

Description

A vulnerability, which was classified as critical, was found in H3C Magic NX30 Pro up to V100R007. This affects an unknown part of the file /api/wizard/getNetworkStatus of the component HTTP POST Request Handler. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 3 Posts

Fediverse

Profile picture

Critical alert: H3C Magic NX30 Pro routers (firmware up to V100R007) have a severe command injection flaw (CVE-2025-2727) allowing remote code execution. Patch immediately if possible. Details: redteamnews.com/exploit/cve/cr -2025-2727

  • 0
  • 0
  • 12 hours ago
Profile picture

Critical alert: H3C Magic NX30 Pro routers (firmware ≤V100R007) vulnerable to remote command injection (CVE-2025-2727, CVSS 8.8). Patch immediately and monitor for attacks on /api/wizard/getNetworkStatus. Details: redteamnews.com/exploit/cve/cr -2025-2727

  • 0
  • 0
  • 12 hours ago
Profile picture

Critical vulnerability alert! H3C Magic NX30 Pro routers (firmware up to V100R007) have a command injection flaw (CVE-2025-2727) allowing remote code execution. Patch ASAP or restrict access to management interfaces. Details: redteamnews.com/exploit/cve/cr -2025-2727

  • 0
  • 0
  • 12 hours ago

Overview

  • Microsoft
  • Windows 10 Version 1809

11 Oct 2022
Published
02 Jan 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
2.68%

Description

Windows Print Spooler Elevation of Privilege Vulnerability

Statistics

  • 3 Posts

Fediverse

Profile picture

Russian APT28's new "Nearest Neighbor Attack" exploits nearby Wi-Fi networks to breach targets. Weak authentication lets attackers pivot through adjacent orgs. Key defenses: enforce Wi-Fi MFA, segment networks, monitor LoLBins. -2022-38028 redteamnews.com/threat-intelli

  • 0
  • 0
  • 9 hours ago
Profile picture

Russian APT28's "Nearest Neighbor Attack" exploits nearby Wi-Fi networks to breach targets. Weak auth lets them pivot through adjacent orgs. MFA and network segmentation are critical. -2022-38028 Details: redteamnews.com/threat-intelli

  • 0
  • 0
  • 9 hours ago
Profile picture

Russian APT28's "Nearest Neighbor Attack" exploits nearby Wi-Fi networks to breach targets. Weak auth lets them pivot through adjacent orgs using LoLBins. MFA & segmentation are critical. -2022-38028 redteamnews.com/threat-intelli

  • 0
  • 0
  • 9 hours ago

Overview

  • H3C
  • Magic NX15

25 Mar 2025
Published
25 Mar 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.20%

KEV

Description

A vulnerability was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. It has been rated as critical. Affected by this issue is some unknown functionality of the file /api/wizard/getWifiNeighbour of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 3 Posts

Fediverse

Profile picture

Critical command injection flaw in H3C Magic routers (CVE-2025-2732) allows remote code execution via HTTP requests. Affects NX15, NX30 Pro, NX400, R3010, BE18000. Patch not yet available - isolate devices and monitor for exploitation. Details: redteamnews.com/exploit/cve/cr -2025-2732

  • 0
  • 0
  • 12 hours ago
Profile picture

Critical command injection flaw (CVE-2025-2732) found in H3C Magic routers—allows remote code execution via HTTP requests. Affects NX15, NX30 Pro, NX400, R3010, BE18000. Patch not yet available. Isolate devices and monitor for exploitation. Details: redteamnews.com/exploit/cve/cr

  • 0
  • 0
  • 12 hours ago
Profile picture

Critical command injection flaw (CVE-2025-2732) found in H3C Magic routers - allows remote code execution via HTTP requests. Patch ASAP if using NX15/NX30 Pro/NX400/R3010/BE18000 models. Isolate affected devices and monitor for exploitation. Details: redteamnews.com/exploit/cve/cr

  • 0
  • 0
  • 12 hours ago

Overview

  • CrushFTP
  • CrushFTP

22 Apr 2024
Published
04 Feb 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
94.27%

Description

A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.

Statistics

  • 1 Post

Overview

  • PostgreSQL

13 Feb 2025
Published
14 Mar 2025
Updated

CVSS v3.1
HIGH (8.1)
EPSS
84.02%

KEV

Description

Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns. Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal. Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL. Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.

Statistics

  • 3 Posts

Fediverse

Profile picture

New Snort rules alert: Critical PostgreSQL SQLi (CVE-2025-1094) and Palo Alto VPN exploits in the wild. Also covers phishing kits and implant.js trojan activity. Update your defenses now. -2025-1094 redteamnews.com/threat-intelli

  • 0
  • 0
  • 8 hours ago
Profile picture

New Snort rules alert: Critical PostgreSQL SQLi (CVE-2025-1094) and Palo Alto VPN exploits in the wild. Plus phishing patterns and implant.js trojan coverage. Security teams should prioritize testing these detections. Details: redteamnews.com/threat-intelli -2025-1094

  • 0
  • 0
  • 8 hours ago
Profile picture

New Snort rules alert! Critical PostgreSQL SQLi (CVE-2025-1094) and Palo Alto VPN exploits now detectable, plus phishing infrastructure patterns. Stay ahead of active threats with this update. -2025-1094 redteamnews.com/threat-intelli

  • 0
  • 0
  • 8 hours ago

Overview

  • Kentico
  • Xperience

24 Mar 2025
Published
24 Mar 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.10%

KEV

Description

An authentication bypass vulnerability in Kentico Xperience allows authentication bypass via the Staging Sync Server password handling of empty SHA1 usernames in digest authentication. Authentication bypass allows an attacker to control administrative objects.This issue affects Xperience through 13.0.172.

Statistics

  • 1 Post

Fediverse

Profile picture

Critical auth bypass found in Kentico Xperience CMS (CVE-2025-2746, CVSS 9.8). Affects versions through 13.0.172 - allows attackers to bypass auth via staging service. Patch now or disable if unused. Details: redteamnews.com/exploit/cve/cr -2025-2746

  • 0
  • 0
  • 23 hours ago

Overview

  • H3C
  • Magic NX15

25 Mar 2025
Published
25 Mar 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.20%

KEV

Description

A vulnerability, which was classified as critical, has been found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. Affected by this issue is some unknown functionality of the file /api/esps of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 3 Posts

Fediverse

Profile picture

Critical command injection flaw (CVE-2025-2726) found in H3C Magic routers - no patch yet. Affects NX15, NX30 Pro, NX400, R3010, BE18000. Attackers can execute arbitrary commands via HTTP requests. Mitigate now: restrict access, monitor /api/esps. -2025-2726 redteamnews.com/exploit/cve/cr

  • 0
  • 0
  • 12 hours ago
Profile picture

Critical command injection flaw (CVE-2025-2726) found in H3C Magic routers - no patch yet. Attackers can run arbitrary commands via HTTP requests. Affects NX15, NX30 Pro, NX400, R3010, BE18000 models. Mitigate now: restrict access, monitor /api/esps. -2025-2726 redteamnews.com/exploit/cve/cr

  • 0
  • 0
  • 12 hours ago
Profile picture

Critical command injection flaw (CVE-2025-2726) found in H3C Magic routers—allows unauthenticated attackers to execute arbitrary commands. No patch yet. Affects NX15, NX30 Pro, NX400, R3010, BE18000. Mitigate by restricting access to /api/esps. Details: redteamnews.com/exploit/cve/cr -2025-2726

  • 0
  • 0
  • 12 hours ago

Overview

  • Microsoft
  • Windows 10 Version 1809

11 Mar 2025
Published
23 Mar 2025
Updated

CVSS v3.1
HIGH (7.5)
EPSS
15.70%

KEV

Description

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 1 Post

Overview

  • geoserver
  • geoserver

01 Jul 2024
Published
25 Mar 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
94.37%

Description

GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions. The GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code. Versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed.

Statistics

  • 6 Posts

Fediverse

Profile picture

Chinese APT Earth Estries has been targeting telecoms & governments worldwide since 2023 with malware like GHOSTSPIDER & DEMODEX. Uses Cloudflare Workers for C2 and shares infra with other Chinese groups. Patch Ivanti/Fortinet (CVE-2024-36401). Details: redteamnews.com/threat-intelli

  • 0
  • 0
  • 11 hours ago
Profile picture

Chinese APT Earth Estries has been targeting global telecoms & govs since 2023 with malware like GHOSTSPIDER & DEMODEX. Uses Cloudflare Workers for stealth. Patch CVE-2024-36401. IOCs & detection tips: redteamnews.com/threat-intelli

  • 0
  • 0
  • 11 hours ago
Profile picture

Chinese APT Earth Estries has been targeting global telecom & govt since 2023 with malware like GHOSTSPIDER & DEMODEX. Uses Cloudflare Workers for C2. Patch Ivanti/Fortinet (CVE-2024-36401). IOCs: redteamnews.com/threat-intelli

  • 0
  • 0
  • 11 hours ago
Profile picture

Chinese APT Earth Baxia is targeting APAC orgs with GeoServer exploits (CVE-2024-36401) and sophisticated malware like EAGLEDOOR. Patch now and watch for these IOCs. Details: redteamnews.com/threat-intelli -2024-36401

  • 0
  • 0
  • 11 hours ago
Profile picture

Chinese APT Earth Baxia is targeting APAC orgs with GeoServer exploits (CVE-2024-36401) and custom malware like EAGLEDOOR. Patch now and watch for suspicious cloud C2 traffic. Details: redteamnews.com/threat-intelli -2024-36401

  • 0
  • 0
  • 11 hours ago
Profile picture

Chinese APT Earth Baxia is targeting APAC orgs with GeoServer exploits (CVE-2024-36401) and custom malware like EAGLEDOOR. Patch now and watch for suspicious cloud C2 traffic. -2024-36401 redteamnews.com/threat-intelli

  • 0
  • 0
  • 11 hours ago
Showing 21 to 30 of 74 CVEs