24h | 7d | 30d

Overview

  • Google
  • Chrome

30 Jun 2025
Published
21 Oct 2025
Updated

CVSS
Pending
EPSS
0.36%

Description

Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 1 Post

Last activity: 13 hours ago

Fediverse

Profile picture

A tutta sorveglianza: Predator torna più potente che mai grazie a nuove vulnerabilità zero-day

Malgrado le difficoltà geopolitiche significative, il settore degli spyware mercenari resta una minaccia adattabile e persistente; in questo contesto, il noto fornitore Intellexa prosegue l’espansione del suo arsenale.

Un recente rapporto del Google Threat Intelligence Group (GTIG) mette in luce come l’azienda, famosa per il suo spyware “Predator”, non soltanto stia resistendo alle sanzioni imposte dagli Stati Uniti, ma stia anche attivamente aggirando le restrizioni per continuare a prosperare, grazie allo sfruttamento di un flusso costante di vulnerabilità zero-day.

Intellexa si è costruita una reputazione formidabile nel mercato della sorveglianza. Secondo l’analisi di Google , il fornitore ha “consolidato la sua posizione come uno dei fornitori di spyware più prolifici, se non il più prolifico, nello sfruttamento delle vulnerabilità zero-day contro i browser mobili”.

La portata delle loro operazioni è impressionante. Dal 2021, Google ha monitorato circa 70 vulnerabilità zero-day utilizzate in circolazione. Di queste, “Intellexa è responsabile di 15 vulnerabilità zero-day uniche, tra cui Remote Code Execution (RCE), Sandbox Escape (SBX) e Local Privilege Escalation (LPE)”.

Il rapporto descrive in dettaglio una sofisticata catena di exploit iOS, denominata internamente da Intellexa come “smack”, che è stata utilizzata contro obiettivi in Egitto per installare lo spyware Predator.

Questa catena si basava su un framework che Google chiama “JSKit”. Questo toolkit modulare è progettato per eseguire codice nativo sui dispositivi Apple analizzando i binari Mach-O direttamente in memoria. È interessante notare che i ricercatori di Google ritengono che Intellexa probabilmente non lo abbia sviluppato autonomamente.

“Riteniamo che Intellexa abbia acquisito i propri exploit iOS RCE da un’entità esterna, poiché abbiamo visto questo stesso identico framework JSKit utilizzato da altri fornitori di sistemi di sorveglianza e da aggressori sostenuti dal governo dal 2021”, afferma il rapporto.

Una volta compromesso il dispositivo, viene distribuito un payload tracciato come PREYHUNTER. Questa fase è composta da moduli “helper” e “watcher” che garantiscono che l’impianto rimanga nascosto durante l’esecuzione di attività di sorveglianza. Utilizzando framework di hooking personalizzati (“DMHooker” e “UMHooker”), il malware può registrare chiamate VOIP, eseguire keylogger e acquisire foto.

La portata di Intellexa si estende oltre gli iPhone. Il gruppo ha anche implementato framework personalizzati per sfruttare Chrome, prendendo di mira specificamente il motore JavaScript V8. Più di recente, nel giugno 2025, sono stati osservati mentre sfruttavano CVE-2025-6554 in Arabia Saudita, un errore di confusione di tipo che ha permesso loro di violare oggetti di memoria.

In risposta a queste scoperte, Google sta adottando misure dirette per avvisare le potenziali vittime. “Abbiamo deciso di inviare simultaneamente il nostro avviso di attacco, supportato dal governo, a tutti gli account presi di mira noti associati ai clienti di Intellexa dal 2023”, annuncia il rapporto.

Questa notifica di massa riguarda centinaia di utenti in Pakistan, Kazakistan, Angola, Egitto, Uzbekistan, Arabia Saudita e Tagikistan, segnalando una forte escalation nella lotta del gigante della tecnologia contro il commercio di spyware.

L'articolo A tutta sorveglianza: Predator torna più potente che mai grazie a nuove vulnerabilità zero-day proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 13h ago

Overview

  • Python Software Foundation
  • CPython

03 Dec 2025
Published
05 Dec 2025
Updated

CVSS v4.0
MEDIUM (6.3)
EPSS
0.04%

KEV

Description

When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture
CVE-2025-12084 Quadratic complexity in node ID cache clearing scq.ms/4ox5QqN #MicrosoftSecurity #cybersecurity
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • anthropics
  • claude-code

21 Nov 2025
Published
24 Nov 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.08%

KEV

Description

Claude Code is an agentic coding tool. Prior to version 2.0.31, due to an error in sed command parsing, it was possible to bypass the Claude Code read-only validation and write to arbitrary files on the host system. This issue has been patched in version 2.0.31.

Statistics

  • 2 Posts

Last activity: 23 hours ago

Bluesky

Profile picture
Anthropic slapped 1,000 regexes on a god—then sed whispered “w ~/.zshenv” and the angel wrote itself a shell. CVE-2025-64755: the AI that debug-blocked you still let its own code sign the eviction notice.
  • 0
  • 0
  • 1
  • 23h ago

Overview

  • UTT
  • 进取 512W

07 Dec 2025
Published
08 Dec 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.04%

KEV

Description

A vulnerability has been found in UTT 进取 512W up to 1.7.7-171114. Affected by this issue is the function strcpy of the file /goform/formP2PLimitConfig. Such manipulation of the argument except leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post

Last activity: 20 hours ago

Fediverse

Profile picture

🔎 CVE-2025-14191: HIGH severity buffer overflow in UTT 进取 512W (≤1.7.7-171114). Remote exploitation possible—public exploit, no vendor patch! Segment, restrict access, and monitor urgently. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 20h ago

Overview

  • UGREEN
  • DH2100+

07 Dec 2025
Published
08 Dec 2025
Updated

CVSS v4.0
HIGH (8.6)
EPSS
0.12%

KEV

Description

A security vulnerability has been detected in UGREEN DH2100+ up to 5.3.0.251125. This impacts the function handler_file_backup_create of the file /v1/file/backup/create of the component nas_svr. The manipulation of the argument path leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post

Last activity: 19 hours ago

Fediverse

Profile picture

🚨 CVE-2025-14188: HIGH severity RCE in UGREEN DH2100+ NAS (≤5.3.0.251125) via /v1/file/backup/create. No patch—restrict access, monitor traffic, audit logs, and segment devices! Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 19h ago

Overview

  • open-webui
  • open-webui

04 Dec 2025
Published
08 Dec 2025
Updated

CVSS v3.1
HIGH (8.5)
EPSS
0.04%

KEV

Description

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.37, a Server-Side Request Forgery (SSRF) vulnerability in Open WebUI allows any authenticated user to force the server to make HTTP requests to arbitrary URLs. This can be exploited to access cloud metadata endpoints (AWS/GCP/Azure), scan internal networks, access internal services behind firewalls, and exfiltrate sensitive information. No special permissions beyond basic authentication are required. This vulnerability is fixed in 0.6.37.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture
🚨 CVE-2025-65958 | Open WebUI | Authenticated SSRF (High) Authenticated users can force the server to send HTTP requests to arbitrary URLs, enabling internal network scanning and access to internal services. Affects versions < 0.6.37. Patch: Upgrade to v0.6.37 buff.ly/1dg6IHi buff.ly/Yewlmqu
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Infinera
  • MTC-9

08 Dec 2025
Published
08 Dec 2025
Updated

CVSS v3.1
HIGH (8.6)
EPSS
0.03%

KEV

Description

Server-Side Request Forgery (SSRF) vulnerability in Infinera MTC-9 version allows remote unauthenticated users to gain access to other network resources using HTTPS requests through the appliance used as a bridge.

Statistics

  • 1 Post

Last activity: 16 hours ago

Fediverse

Profile picture

⚠️ HIGH severity SSRF (CVE-2025-26487) in Infinera MTC-9 R22.1.1.0275 — attackers could abuse server requests for lateral movement. Monitor for updates; mitigate exposure! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Apache Software Foundation
  • Apache Tika PDF parser module
  • org.apache.tika:tika-parser-pdf-module

20 Aug 2025
Published
04 Nov 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Critical XXE in Apache Tika (tika-parser-pdf-module) in Apache Tika 1.13 through and including 3.2.1 on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. An attacker may be able to read sensitive data or trigger malicious requests to internal resources or third-party servers. Note that the tika-parser-pdf-module is used as a dependency in several Tika packages including at least: tika-parsers-standard-modules, tika-parsers-standard-package, tika-app, tika-grpc and tika-server-standard. Users are recommended to upgrade to version 3.2.2, which fixes this issue.

Statistics

  • 1 Post
  • 7 Interactions

Last activity: 17 hours ago

Fediverse

Profile picture

Defer to @todb on this as CVE expert(tm) but shouldn't CVE-2025-66516 have been an update of CVE-2025-54988? It's the same vulnerability.

lists.apache.org/thread/s5x3k9

  • 2
  • 5
  • 0
  • 17h ago

Overview

  • Infinera
  • MTC-9

08 Dec 2025
Published
08 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.04%

KEV

Description

Remote shell service (RSH) in Infinera MTC-9 version R22.1.1.0275 allows an attacker to utilize password-less user accounts and obtain system access by activating a reverse shell.This issue affects MTC-9: from R22.1.1.0275 before R23.0.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 11 hours ago

Fediverse

Profile picture

Infinera yikes.

cve.org/CVERecord?id=CVE-2025-

Improper configuration of the SSH service in Infinera MTC-9 allows an unauthenticated attacker to execute arbitrary commands and access data on file system\n\n.\n\n\nThis issue affects MTC-9: from R22.1.1.0275 before R23.0.

and

cve.org/CVERecord?id=CVE-2025-

Remote shell service (RSH) in Infinera MTC-9 version R22.1.1.0275 allows\n an attacker to utilize password-less user accounts and obtain \nsystem access by activating a reverse shell.This issue affects MTC-9: from R22.1.1.0275 before R23.0.

  • 0
  • 1
  • 0
  • 11h ago

Overview

  • Grafana
  • Grafana Enterprise

21 Nov 2025
Published
24 Nov 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.02%

KEV

Description

SCIM provisioning was introduced in Grafana Enterprise and Grafana Cloud in April to improve how organizations manage users and teams in Grafana by introducing automated user lifecycle management. In Grafana versions 12.x where SCIM provisioning is enabled and configured, a vulnerability in user identity handling allows a malicious or compromised SCIM client to provision a user with a numeric externalId, which in turn could allow to override internal user IDs and lead to impersonation or privilege escalation. This vulnerability applies only if all of the following conditions are met: - `enableSCIM` feature flag set to true - `user_sync_enabled` config option in the `[auth.scim]` block set to true

Statistics

  • 1 Post

Last activity: 19 hours ago

Bluesky

Profile picture
The latest update for #CyCognito includes "Emerging Threat: CVE-2025-55182 (React2Shell) – React Server Components RCE Vulnerability" and "Emerging Threat: CVE-2025-41115 – Critical SCIM Privilege Escalation in Grafana Enterprise". #cybersecurity #EASM https://opsmtrs.com/44Srq0X
  • 0
  • 0
  • 0
  • 19h ago
Showing 21 to 30 of 35 CVEs