24h | 7d | 30d

Overview

  • NLnet Labs
  • Unbound

22 Oct 2025
Published
27 Nov 2025
Updated

CVSS v4.0
MEDIUM (5.7)
EPSS
0.07%

KEV

Description

NLnet Labs Unbound up to and including version 1.24.2 is vulnerable to possible domain hijack attacks. Promiscuous NS RRSets that complement positive DNS replies in the authority section can be used to trick resolvers to update their delegation information for the zone. Usually these RRSets are used to update the resolver's knowledge of the zone's name servers. A malicious actor can exploit the possible poisonous effect by injecting NS RRSets (and possibly their respective address records) in a reply. This could be done for example by trying to spoof a packet or fragmentation attacks. Unbound would then proceed to update the NS RRSet data it already has since the new data has enough trust for it, i.e., in-zone data for the delegation point. Unbound 1.24.1 includes a fix that scrubs unsolicited NS RRSets (and their respective address records) from replies mitigating the possible poison effect. Unbound 1.24.2 includes an additional fix that scrubs unsolicited NS RRSets (and their respective address records) from YXDOMAIN and non-referral nodata replies, further mitigating the possible poison effect.

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture
This security release provides an additional fix for CVE-2025-11411.
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Microsoft
  • Windows 10 Version 1809

11 Mar 2025
Published
21 Oct 2025
Updated

CVSS v3.1
HIGH (7.0)
EPSS
9.34%

Description

Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.

Statistics

  • 1 Post

Last activity: 19 hours ago

Fediverse

Profile picture

đź“° Water Gamayun APT Exploits Novel 'MSC EvilTwin' Windows Flaw in Stealthy Attacks

⚠️ Russia-aligned APT Water Gamayun exploits novel 'MSC EvilTwin' Windows flaw (CVE-2025-26633). The attack uses malicious .msc files to proxy PowerShell execution via mmc.exe, bypassing defenses. #APT #Vulnerability #CyberAttack #WaterGamayun

đź”— cyber.netsecops.io/articles/wa

  • 0
  • 0
  • 0
  • 19h ago

Overview

  • ray-project
  • ray

26 Nov 2025
Published
26 Nov 2025
Updated

CVSS v4.0
CRITICAL (9.4)
EPSS
Pending

KEV

Description

Ray is an AI compute engine. Prior to version 2.52.0, developers working with Ray as a development tool can be exploited via a critical RCE vulnerability exploitable via Firefox and Safari. This vulnerability is due to an insufficient guard against browser-based attacks, as the current defense uses the User-Agent header starting with the string "Mozilla" as a defense mechanism. This defense is insufficient as the fetch specification allows the User-Agent header to be modified. Combined with a DNS rebinding attack against the browser, and this vulnerability is exploitable against a developer running Ray who inadvertently visits a malicious website, or is served a malicious advertisement (malvertising). This issue has been patched in version 2.52.0.

Statistics

  • 1 Post

Last activity: 12 hours ago

Fediverse

Profile picture

🚨 CVE-2025-62593 (CRITICAL): Ray AI <2.52.0 is vulnerable to RCE via DNS rebinding attacks (Firefox/Safari). Exploit enables unauthenticated code execution. Patch to 2.52.0+ ASAP! Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 12h ago

Overview

  • NVIDIA
  • NeMo Agent ToolKit

25 Nov 2025
Published
26 Nov 2025
Updated

CVSS v3.1
HIGH (7.6)
EPSS
0.03%

KEV

Description

NVIDIA NeMo Agent Toolkit UI for Web contains a vulnerability in the chat API endpoint where an attacker may cause a Server-Side Request Forgery. A successful exploit of this vulnerability may lead to information disclosure and denial of service.

Statistics

  • 1 Post

Last activity: 19 hours ago

Fediverse

Profile picture

đź“° NVIDIA AI Toolkit and WordPress Plugins Hit with High-Severity Flaws

Vulnerability alert: NVIDIA's NeMo AI toolkit is exposed to a high-severity SSRF flaw (CVE-2025-33203). Meanwhile, WordPress plugins 'Just Highlight' & 'Locker Content' are hit with XSS & info disclosure bugs. PATCH NOW! #Vulnerability #NVIDIA #Wor...

đź”— cyber.netsecops.io/articles/nv

  • 0
  • 0
  • 0
  • 19h ago

Overview

  • Elated Themes
  • FindAll Listing

27 Nov 2025
Published
27 Nov 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
Pending

KEV

Description

The FindAll Listing plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.5. This is due to the 'findall_listing_user_registration_additional_params' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site. Note: The vulnerability can only be exploited if the FindAll Membership plugin is also activated, because user registration is in that plugin.

Statistics

  • 1 Post

Last activity: 2 hours ago

Fediverse

Profile picture

🚨 CVE-2025-13538 (CRITICAL, CVSS 9.8): Elated Themes FindAll Listing plugin for WordPress lets unauthenticated attackers escalate to admin via registration if FindAll Membership is active. Disable user registration & monitor accounts! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Microsoft
  • Windows Server 2019

14 Oct 2025
Published
22 Nov 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
64.04%

Description

Deserialization of untrusted data in Windows Server Update Service allows an unauthorized attacker to execute code over a network.

Statistics

  • 1 Post

Last activity: 15 hours ago

Bluesky

Profile picture
📢 CVE-2025-59287 : une faille WSUS exploitée pour déployer le malware ShadowPad 📝 Selon l’AhnLab Security Intelligence Center (ASEC), dans un rapport pub… https://cyberveille.ch/posts/2025-11-25-cve-2025-59287-une-faille-wsus-exploitee-pour-deployer-le-malware-shadowpad/ #CVE_2025_59287 #Cyberveille
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Canonical Ltd.
  • Ubuntu EDK II
  • edk2

14 Feb 2024
Published
08 May 2025
Updated

CVSS v3.1
MEDIUM (6.7)
EPSS
0.01%

KEV

Description

An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. This allows an OS-resident attacker to bypass Secure Boot.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 18 hours ago

Fediverse

Profile picture

Not the most confidence-inspiring CVE description.

cve.org/CVERecord?id=CVE-2025-

The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure Boot restrictions. This is an additional repair on top of the incomplete fix for CVE-2023-48733.

  • 2
  • 1
  • 0
  • 18h ago

Overview

  • Ubuntu
  • edk2

26 Nov 2025
Published
26 Nov 2025
Updated

CVSS v4.0
LOW (3.7)
EPSS
Pending

KEV

Description

The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure Boot restrictions. This is an additional repair on top of the incomplete fix for CVE-2023-48733.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 18 hours ago

Fediverse

Profile picture

Not the most confidence-inspiring CVE description.

cve.org/CVERecord?id=CVE-2025-

The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure Boot restrictions. This is an additional repair on top of the incomplete fix for CVE-2023-48733.

  • 2
  • 1
  • 0
  • 18h ago

Overview

  • Unknown
  • W3 Total Cache

17 Nov 2025
Published
17 Nov 2025
Updated

CVSS
Pending
EPSS
1.16%

KEV

Description

The W3 Total Cache WordPress plugin before 2.8.13 is vulnerable to command injection via the _parse_dynamic_mfunc function, allowing unauthenticated users to execute PHP commands by submitting a comment with a malicious payload to a post.

Statistics

  • 1 Post

Last activity: 8 hours ago

Bluesky

Profile picture
The latest update for #IONIX includes "CVE-2025-61757: Critical Pre-Auth RCE in Oracle Identity Manager" and "CVE-2025-9501: Identifying High-Risk #WordPress Instances Using W3 Total Cache". #cybersecurity #AttackSurfaceManagement https://opsmtrs.com/3TB5mSA
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • DB Electronica Telecomunicazioni S.p.A.
  • Mozart FM Transmitter

26 Nov 2025
Published
26 Nov 2025
Updated

CVSS v4.0
CRITICAL (9.9)
EPSS
0.04%

KEV

Description

Unauthenticated Arbitrary File Upload (patch_contents.php) in DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000 allows an attacker to perform Unrestricted file upload in patch_contents.php allows uploading malicious files. The `/var/tdf/patch_contents.php` endpoint allows unauthenticated arbitrary file uploads without file type validation, MIME checking, or size restrictions beyond 16MB, enabling attackers to upload malicious files.

Statistics

  • 1 Post
  • 8 Interactions

Last activity: 21 hours ago

Fediverse

Profile picture

Go hack more radio shit.

abdulmhsblog.com/posts/webfmvu

  • CVE-2025-66259: Authenticated Root RCE (main_ok.php)
  • CVE-2025-66253: Unauthenticated OS Command Injection (Upgrade)
  • CVE-2025-66261: Unauthenticated OS Command Injection (Restore)
  • CVE-2025-66262: Arbitrary File Overwrite (Tar Path Traversal)
  • CVE-2025-66250: Unrestricted File Upload (Status)
  • CVE-2025-66255: Unsigned Firmware Upload
  • CVE-2025-66256: Unrestricted Patch Upload
  • CVE-2025-66251: Path Traversal File Deletion
  • CVE-2025-66254: Arbitrary File Deletion (Upgrade)
  • CVE-2025-66263: Arbitrary File Read (Null Byte Injection)
  • CVE-2025-66260: SQL Injection
  • CVE-2025-66258: Stored XSS via XML Injection
  • CVE-2025-66257: Arbitrary Patch Deletion
  • CVE-2025-66252: Infinite Loop Denial of Service
  • 5
  • 3
  • 0
  • 21h ago
Showing 21 to 30 of 43 CVEs