24h | 7d | 30d

Overview

  • RARLAB
  • WinRAR

21 Jun 2025
Published
23 Jun 2025
Updated

CVSS v3.0
HIGH (7.8)
EPSS
0.49%

KEV

Description

RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.

Statistics

  • 1 Post

Last activity: 5 hours ago

Bluesky

Profile picture
📢 Gamaredon exploite une faille WinRAR (CVE-2025-6218) pour cibler l’Ukraine via des archives piégées 📝 Selon le blog Synaptic System… https://cyberveille.ch/posts/2025-12-02-gamaredon-exploite-une-faille-winrar-cve-2025-6218-pour-cibler-lukraine-via-des-archives-piegees/ #CVE_2025_6218 #Cyberveille
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • NLnet Labs
  • Unbound

22 Oct 2025
Published
01 Dec 2025
Updated

CVSS v4.0
MEDIUM (5.7)
EPSS
0.09%

KEV

Description

NLnet Labs Unbound up to and including version 1.24.2 is vulnerable to possible domain hijack attacks. Promiscuous NS RRSets that complement positive DNS replies in the authority section can be used to trick resolvers to update their delegation information for the zone. Usually these RRSets are used to update the resolver's knowledge of the zone's name servers. A malicious actor can exploit the possible poisonous effect by injecting NS RRSets (and possibly their respective address records) in a reply. This could be done for example by trying to spoof a packet or fragmentation attacks. Unbound would then proceed to update the NS RRSet data it already has since the new data has enough trust for it, i.e., in-zone data for the delegation point. Unbound 1.24.1 includes a fix that scrubs unsolicited NS RRSets (and their respective address records) from replies mitigating the possible poison effect. Unbound 1.24.2 includes an additional fix that scrubs unsolicited NS RRSets (and their respective address records) from YXDOMAIN and non-referral nodata replies, further mitigating the possible poison effect.

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture
Just published a deep dive on the new #Fedora 42 security advisory (FEDORA-2025-38b1c0f3b5). It patches CVE-2025-11411 in the Unbound DNS resolver. Read more: 👉 tinyurl.com/mpnxe4r4 #Security
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Microsoft
  • Azure App Gateway

26 Nov 2025
Published
27 Nov 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.09%

KEV

Description

Stack-based buffer overflow in Azure Application Gateway allows an unauthorized attacker to elevate privileges over a network.

Statistics

  • 1 Post

Last activity: 8 hours ago

Bluesky

Profile picture
‌CVE 2025 64657: e il cielo non è più Azure! Azure Application Gateway e l’elevazione di privilegi di novembre 2025 www.aiutocomputerhelp.it?p=16193 #bug_microsoft #CVE_2025_64657 #cybersicurezza #Microsoft #Vulnerabilità_Azure_Cloud
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Pending

26 Nov 2025
Published
01 Dec 2025
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

Insecure permissions in fail2ban-client v0.11.2 allows attackers with limited sudo privileges to perform arbitrary operations as root. NOTE: this is disputed by multiple parties because the action for a triggered rule can legitimately be an arbitrary operation as root. Thus, the software is behaving in accordance with its intended privilege model.

Statistics

  • 1 Post

Last activity: 6 hours ago

Fediverse

Profile picture

@gnyman @falken @neilmadden I'm glad they got it sorted but if it was real, it would have been pretty cool. And I see the CVE is now listed as disputed.

cve.org/CVERecord?id=CVE-2025-

  • 0
  • 0
  • 0
  • 6h ago

Overview

  • stylemix
  • Cost Calculator Builder

02 Dec 2025
Published
02 Dec 2025
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.14%

KEV

Description

The Cost Calculator Builder plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the deleteOrdersFiles() function in all versions up to, and including, 3.6.3. This makes it possible for unauthenticated attackers to inject arbitrary file paths into the orders that are removed, when an administrator deletes them. This can lead to remote code execution when the right file is deleted (such as wp-config.php). This vulnerability requires the Cost Calculator Builder Pro version to be installed along with the free version in order to be exploitable.

Statistics

  • 1 Post

Last activity: 16 hours ago

Fediverse

Profile picture

⚠️ CVE-2025-12529 (HIGH) in stylemix Cost Calculator Builder for WordPress: Arbitrary file deletion via admin order removals can lead to RCE. Affects all versions ≤3.6.3. Audit, restrict, and monitor now! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 16h ago

Overview

  • stellarwp
  • Kadence WooCommerce Email Designer

02 Dec 2025
Published
02 Dec 2025
Updated

CVSS v3.1
HIGH (7.2)
EPSS
0.07%

KEV

Description

The Kadence WooCommerce Email Designer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the customer name in all versions up to, and including, 1.5.17 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Statistics

  • 1 Post

Last activity: 15 hours ago

Fediverse

Profile picture

🔍 HIGH severity: CVE-2025-13387 in Kadence WooCommerce Email Designer (≤1.5.17) enables unauthenticated stored XSS via customer name field. Risk of data theft & session hijack. Patch or mitigate now! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Samsung Mobile
  • MotionPhoto

02 Dec 2025
Published
02 Dec 2025
Updated

CVSS v3.1
HIGH (7.3)
EPSS
0.01%

KEV

Description

Improper access control in MPLocalService of MotionPhoto prior to version 4.1.51 allows local attackers to start privileged service.

Statistics

  • 1 Post

Last activity: 11 hours ago

Fediverse

Profile picture

🚨 CVE-2025-58482 (HIGH): Samsung MotionPhoto pre-4.1.51 has improper access control, letting local attackers escalate privileges. Patch not yet public—monitor and restrict MotionPhoto use on corporate devices. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post
  • 23 Interactions

Last activity: 4 hours ago

Bluesky

Profile picture
🥳 Go 1.25.5 and 1.24.11 are released! 🔐 Security: Includes security fixes for crypto/x509 (CVE-2025-61729, CVE-2025-61727). 🗣 Announcement: https://groups.google.com/g/golang-announce/c/8FJoBkPddm4/m/kYpVlPw1CQAJ 📦 Download: https://go.dev/dl/#go1.25.5 #golang
  • 4
  • 19
  • 0
  • 4h ago

Overview

  • Go standard library
  • crypto/x509
  • crypto/x509

02 Dec 2025
Published
02 Dec 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.

Statistics

  • 1 Post
  • 23 Interactions

Last activity: 4 hours ago

Bluesky

Profile picture
🥳 Go 1.25.5 and 1.24.11 are released! 🔐 Security: Includes security fixes for crypto/x509 (CVE-2025-61729, CVE-2025-61727). 🗣 Announcement: https://groups.google.com/g/golang-announce/c/8FJoBkPddm4/m/kYpVlPw1CQAJ 📦 Download: https://go.dev/dl/#go1.25.5 #golang
  • 4
  • 19
  • 0
  • 4h ago

Overview

  • Microsoft
  • Windows 11 version 22H2

11 Mar 2025
Published
19 May 2025
Updated

CVSS v3.1
HIGH (7.3)
EPSS
0.16%

KEV

Description

Improper access control in Windows Cross Device Service allows an authorized attacker to elevate privileges locally.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 11 hours ago

Bluesky

Profile picture
New video out! Security analyst John Ostrowski show the hands-on process behind discovering CVE-2025-24076 and CVE-2025-24994 described in our recent blog post. Watch here: youtu.be/YwNcTuHxnAI #security #pentest #windowsinternals #vulnresearch
  • 1
  • 2
  • 0
  • 11h ago
Showing 21 to 30 of 32 CVEs