24h | 7d | 30d

Overview

  • Python Software Foundation
  • CPython

01 Dec 2025
Published
02 Dec 2025
Updated

CVSS v4.0
LOW (2.1)
EPSS
0.02%

KEV

Description

When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues

Statistics

  • 1 Post

Last activity: 21 hours ago

Bluesky

Profile picture
CVE-2025-13837 Out-of-memory when loading Plist scq.ms/4pkcZvR #cybersecurity #SecQube
  • 0
  • 0
  • 0
  • 21h ago

Overview

  • Pending

11 Feb 2025
Published
12 Feb 2025
Updated

CVSS
Pending
EPSS
0.11%

KEV

Description

An issue in the BdApiUtil driver of Baidu Antivirus v5.2.3.116083 allows attackers to terminate arbitrary process via executing a BYOVD (Bring Your Own Vulnerable Driver) attack.

Statistics

  • 1 Post

Last activity: 11 hours ago

Fediverse

Profile picture

📰 DeadLock Ransomware Uses Vulnerable Baidu Driver to Blind EDRs

DeadLock ransomware evolves, using a novel BYOVD attack to disable EDRs. 🛡️ The campaign exploits a vulnerable Baidu AV driver (CVE-2024-51324) to gain kernel-level control and kill security processes. #Ransomware #BYOVD #CyberSecurity #DeadLock

🔗 cyber.netsecops.io/articles/de

  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Linux
  • Linux

06 Jun 2025
Published
03 Nov 2025
Updated

CVSS
Pending
EPSS
0.05%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice Savino says: "We are writing to report that this recent patch (141d34391abbb315d68556b7c67ad97885407547) [1] can be bypassed, and a UAF can still occur when HFSC is utilized with NETEM. The patch only checks the cl->cl_nactive field to determine whether it is the first insertion or not [2], but this field is only incremented by init_vf [3]. By using HFSC_RSC (which uses init_ed) [4], it is possible to bypass the check and insert the class twice in the eltree. Under normal conditions, this would lead to an infinite loop in hfsc_dequeue for the reasons we already explained in this report [5]. However, if TBF is added as root qdisc and it is configured with a very low rate, it can be utilized to prevent packets from being dequeued. This behavior can be exploited to perform subsequent insertions in the HFSC eltree and cause a UAF." To fix both the UAF and the infinite loop, with netem as an hfsc child, check explicitly in hfsc_enqueue whether the class is already in the eltree whenever the HFSC_RSC flag is set. [1] https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=141d34391abbb315d68556b7c67ad97885407547 [2] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1572 [3] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L677 [4] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1574 [5] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/T/#u

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture
An RbTree Family Drama Talk by William Liu and Savino Dicanosa @cor_ctf about exploiting CVE-2025-38001 — a use-after-free in the network packet scheduler. Video: www.youtube.com/watch?v=C-52... Slides: storage.googleapis.com/static.cor.t...
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • WBCE
  • WBCE_CMS

09 Dec 2025
Published
09 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.03%

KEV

Description

WBCE CMS is a content management system. Versions 1.6.4 and below use function GenerateRandomPassword() to create passwords using PHP's rand(). rand() is not cryptographically secure, which allows password sequences to be predicted or brute-forced. This can lead to user account compromise or privilege escalation if these passwords are used for new accounts or password resets. The vulnerability is fixed in version 1.6.5.

Statistics

  • 1 Post

Last activity: 23 hours ago

Fediverse

Profile picture

🔒 CVE-2025-67504: WBCE CMS <1.6.5 uses weak rand() for password generation, allowing attackers to predict or brute-force credentials. CRITICAL—upgrade to 1.6.5+ now! Monitor for suspicious logins. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 23h ago

Overview

  • Apache Software Foundation
  • Apache Tika PDF parser module
  • org.apache.tika:tika-parser-pdf-module

20 Aug 2025
Published
04 Nov 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Critical XXE in Apache Tika (tika-parser-pdf-module) in Apache Tika 1.13 through and including 3.2.1 on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. An attacker may be able to read sensitive data or trigger malicious requests to internal resources or third-party servers. Note that the tika-parser-pdf-module is used as a dependency in several Tika packages including at least: tika-parsers-standard-modules, tika-parsers-standard-package, tika-app, tika-grpc and tika-server-standard. Users are recommended to upgrade to version 3.2.2, which fixes this issue.

Statistics

  • 1 Post

Last activity: 19 hours ago

Bluesky

Profile picture
Apache Tika core, Apache Tika parsers, Apache Tika PDF parser module: Update to CVE-2025-54988 to expand scope of artifacts affected URL: lists.apache.org/thread/s5x3k... Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 10.0
  • 0
  • 0
  • 0
  • 19h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture
Zoomに、Mediumの脆弱性情報 ZSB-25051 が公開されました。 「CVE-2025-67461 : Zoom Rooms for macOS - External Control of File Name or Path」 CVSSv3: 5 → https://www.zoom.com/en/trust/security-bulletin/ZSB-25051/
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Adobe
  • ColdFusion

09 Dec 2025
Published
09 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
Pending

KEV

Description

ColdFusion versions 2025.4, 2023.16, 2021.22 and earlier are affected by an Unrestricted Upload of File with Dangerous Type vulnerability that could lead to arbitrary code execution by a high priviledged attacker. Exploitation of this issue does not require user interaction and scope is changed.

Statistics

  • 1 Post

Last activity: 2 hours ago

Fediverse

Profile picture

🚨 CRITICAL: CVE-2025-61808 in Adobe ColdFusion (2025.4, 2023.16, 2021.22 & earlier) allows unrestricted dangerous file uploads—arbitrary code exec, no user interaction. Patch ASAP & lock down uploads! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Microsoft
  • Windows Server 2019

14 Oct 2025
Published
22 Nov 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
62.31%

Description

Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.

Statistics

  • 1 Post

Last activity: 18 hours ago

Bluesky

Profile picture
Microsoft Rushes Emergency Fix for WSUS Remote Code Execution Flaw (CVE-2025-59287)
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Pending

17 Oct 2025
Published
20 Oct 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

radare2 v5.9.8 and before contains a memory leak in the function r_bin_object_new.

Statistics

  • 1 Post

Last activity: 11 hours ago

Bluesky

Profile picture
Just dissected the latest #Ubuntu security advisory. Critical patch for Radare2 (hex editor/reverse engineering tool) is out. Memory leak flaws (CVE-2025-60359-61) can cause DoS. Read more: 👉 tinyurl.com/4kbj6zdj #Security
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture
Zoomに、Highの脆弱性情報 ZSB-25050 が公開されました。 「CVE-2025-67460 : Zoom Rooms for Windows - Software Downgrade Protection Mechanism Failure」 CVSSv3: 7.8 → https://www.zoom.com/en/trust/security-bulletin/ZSB-25050/
  • 0
  • 0
  • 0
  • 12h ago
Showing 21 to 30 of 90 CVEs