24h | 7d | 30d

Overview

  • djangoproject
  • Django
  • django

05 Nov 2025
Published
08 Nov 2025
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. The methods `QuerySet.filter()`, `QuerySet.exclude()`, and `QuerySet.get()`, and the class `Q()`, are subject to SQL injection when using a suitably crafted dictionary, with dictionary expansion, as the `_connector` argument. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank cyberstan for reporting this issue.

Statistics

  • 1 Post

Last activity: 22 hours ago

Fediverse

Profile picture

This GitHub post presents a testbed for Django CVE-2025-64459, a parameter injection vulnerability in QuerySet.filter() affecting Django versions prior to 5.1.14. The testbed, runnable via Docker, demonstrates how attackers can exploit this by injecting parameters like _connector to manipulate query logic, potentially bypassing filters and accessing unauthorized data.
github.com/omarkurt/django-con

  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Microsoft
  • Windows 10 Version 1809

10 Oct 2023
Published
14 Apr 2025
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.22%

KEV

Description

Layer 2 Tunneling Protocol Remote Code Execution Vulnerability

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture
Unpatched and Powerful: How a Windows Update Tool Became Your Worst Security Nightmare Introduction: A critical Remote Code Execution (RCE) vulnerability was discovered within the Windows Update Health Tools, a trusted component managed by Microsoft. This flaw, designated as CVE-2023-38166,…
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Pending

13 Nov 2025
Published
14 Nov 2025
Updated

CVSS
Pending
EPSS
0.28%

KEV

Description

An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetDMZSettings' functionality, where the 'IPAddress' parameter in prog.cgi is stored in NVRAM and later used by librcm.so to construct iptables commands executed via twsystem(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 1 hour ago

Fediverse

Profile picture

D-Link is warning of three vulnerabilities in end-of-life routers

Vulnerabilities:
CVE-2025-60672 - vulnerability in SetDynamicDNSSettings parameters stored in NVRAM and used in system commands
CVE-2025-60673 - vulnerability in SetDMZSettings and unsanitized IPAddress value
CVE-2025-60676 - Unsanitized fields in /tmp/new_qos.rule

Impact: Allows attackers to remote execute code on D-Link DIR-878 router that has been end-of-life since 2021

Remediation: Replace with a supported router

#cybersecurity #DLink #vulnerabilitymanagement

bleepingcomputer.com/news/secu

  • 0
  • 1
  • 0
  • 1h ago

Overview

  • Pending

13 Nov 2025
Published
14 Nov 2025
Updated

CVSS
Pending
EPSS
0.28%

KEV

Description

An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetDynamicDNSSettings' functionality, where the 'ServerAddress' and 'Hostname' parameters in prog.cgi are stored in NVRAM and later used by rc to construct system commands executed via twsystem(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 1 hour ago

Fediverse

Profile picture

D-Link is warning of three vulnerabilities in end-of-life routers

Vulnerabilities:
CVE-2025-60672 - vulnerability in SetDynamicDNSSettings parameters stored in NVRAM and used in system commands
CVE-2025-60673 - vulnerability in SetDMZSettings and unsanitized IPAddress value
CVE-2025-60676 - Unsanitized fields in /tmp/new_qos.rule

Impact: Allows attackers to remote execute code on D-Link DIR-878 router that has been end-of-life since 2021

Remediation: Replace with a supported router

#cybersecurity #DLink #vulnerabilitymanagement

bleepingcomputer.com/news/secu

  • 0
  • 1
  • 0
  • 1h ago

Overview

  • Pending

13 Nov 2025
Published
14 Nov 2025
Updated

CVSS
Pending
EPSS
0.28%

KEV

Description

An unauthenticated command injection vulnerability exists in the D-Link DIR-878A1 router firmware FW101B04.bin. The vulnerability occurs in the 'SetNetworkSettings' functionality of prog.cgi, where the 'IPAddress' and 'SubnetMask' parameters are directly concatenated into shell commands executed via system(). An attacker can exploit this vulnerability remotely without authentication by sending a specially crafted HTTP request, leading to arbitrary command execution on the device.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 1 hour ago

Fediverse

Profile picture

D-Link is warning of three vulnerabilities in end-of-life routers

Vulnerabilities:
CVE-2025-60672 - vulnerability in SetDynamicDNSSettings parameters stored in NVRAM and used in system commands
CVE-2025-60673 - vulnerability in SetDMZSettings and unsanitized IPAddress value
CVE-2025-60676 - Unsanitized fields in /tmp/new_qos.rule

Impact: Allows attackers to remote execute code on D-Link DIR-878 router that has been end-of-life since 2021

Remediation: Replace with a supported router

#cybersecurity #DLink #vulnerabilitymanagement

bleepingcomputer.com/news/secu

  • 0
  • 1
  • 0
  • 1h ago
Showing 11 to 15 of 15 CVEs