24h | 7d | 30d

Overview

  • JumpCloud Inc.
  • Remote Assist

02 Dec 2025
Published
02 Dec 2025
Updated

CVSS v4.0
HIGH (8.5)
EPSS
0.02%

KEV

Description

JumpCloud Remote Assist for Windows versions prior to 0.317.0 include an uninstaller that is invoked by the JumpCloud Windows Agent as NT AUTHORITY\SYSTEM during agent uninstall or update operations. The Remote Assist uninstaller performs privileged create, write, execute, and delete actions on predictable files inside a user-writable %TEMP% subdirectory without validating that the directory is trusted or resetting its ACLs when it already exists. A local, low-privileged attacker can pre-create the directory with weak permissions and leverage mount-point or symbolic-link redirection to (a) coerce arbitrary file writes to protected locations, leading to denial of service (e.g., by overwriting sensitive system files), or (b) win a race to redirect DeleteFileW() to attacker-chosen targets, enabling arbitrary file or folder deletion and local privilege escalation to SYSTEM. This issue is fixed in JumpCloud Remote Assist 0.317.0 and affects Windows systems where Remote Assist is installed and managed through the Agent lifecycle.

Statistics

  • 4 Posts

Last activity: 8 hours ago

Bluesky

Profile picture
Local Privilege Escalation (CVE-2025-34352) in JumpCloud Agent
  • 0
  • 0
  • 3
  • 8h ago

Overview

  • zed-industries
  • zed

17 Dec 2025
Published
18 Dec 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.02%

KEV

Description

Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Model Context Protocol (MCP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious MCP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered automatically without any user interaction besides opening the project in the IDE. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.

Statistics

  • 1 Post

Last activity: 17 hours ago

Fediverse

Profile picture

⚠️ CVE-2025-68433: HIGH severity in Zed IDE (<0.218.2-pre). Command injection risk—malicious settings.json can auto-execute code on project open. Patch ASAP or review configs before opening projects! Full details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Apache Software Foundation
  • Apache Struts
  • org.apache.struts:struts2-core

10 Dec 2025
Published
10 Dec 2025
Updated

CVSS
Pending
EPSS
0.14%

KEV

Description

Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes disk exhaustion. This issue affects Apache Struts: from 2.0.0 through 6.7.4, from 7.0.0 through 7.0.3. Users are recommended to upgrade to version 6.8.0 or 7.1.1, which fixes the issue. It's related to  https://cve.org/CVERecord?id=CVE-2025-64775  - this CVE addresses missing affected version 6.7.4

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture
The latest update for #Indusface includes "Secret Scanning: A Critical Practice for Protecting Sensitive Data in Code" and "CVE-2025-66675: Apache Struts DoS Vulnerability Leads to Disk Exhaustion". #cybersecurity #infosec https://opsmtrs.com/3ySs2VF
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • win.rar GmbH
  • WinRAR

08 Aug 2025
Published
21 Oct 2025
Updated

CVSS v4.0
HIGH (8.4)
EPSS
3.16%

Description

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture
The latest update for #Foresiet includes "Lazarus Group (APT38 / APT-C-26) Exploits WinRAR Vulnerability CVE-2025-8088 for Archive Poisoning Attacks" and "The New Mandate: CISA CPG 2.0 and the Evolution of Critical Infrastructure Security". #cybersecurity #infosec https://opsmtrs.com/3J3CMGz
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • glib

26 Nov 2025
Published
27 Nov 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.

Statistics

  • 1 Post

Last activity: 6 hours ago

Bluesky

Profile picture
URGENT: Critical glib2 vulnerabilities patched in #SUSE Linux (CVE-2025-13601, -14087, -14512). CVSS to 7.7 . Read more: 👉 tinyurl.com/3r9bp356 #Security
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • zed-industries
  • zed

17 Dec 2025
Published
18 Dec 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.02%

KEV

Description

Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.

Statistics

  • 1 Post

Last activity: 15 hours ago

Fediverse

Profile picture

🛑 CVE-2025-68432 (HIGH): Zed IDE <0.218.2-pre allows command injection via malicious .zed/settings.json LSP configs. Arbitrary code can run with user privileges. Upgrade ASAP & review project files before opening! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 15h ago

Overview

  • nicotsx
  • zerobyte

17 Dec 2025
Published
18 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.07%

KEV

Description

Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.

Statistics

  • 1 Post

Last activity: 18 hours ago

Fediverse

Profile picture

CRITICAL: CVE-2025-68435 in nicotsx Zerobyte (<0.18.5) enables authentication bypass via unprotected API endpoints. Remote attackers can access backup data. Upgrade ASAP or restrict access to trusted networks. More info: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 18h ago

Overview

  • D-Link
  • DIR-605

18 Dec 2025
Published
18 Dec 2025
Updated

CVSS v4.0
HIGH (8.6)
EPSS
Pending

KEV

Description

A vulnerability was detected in D-Link DIR-605 202WWB03. Affected by this issue is some unknown functionality of the component Firmware Update Service. Performing manipulation results in command injection. The attack can be initiated remotely. The exploit is now public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 1 hour ago

Overview

  • Tenda
  • WH450

18 Dec 2025
Published
18 Dec 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
Pending

KEV

Description

A weakness has been identified in Tenda WH450 1.0.0.18. Affected is an unknown function of the file /goform/onSSIDChange of the component HTTP Request Handler. This manipulation of the argument ssid_index causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 1 hour ago

Overview

  • TP-Link Systems Inc.
  • WA850RE

18 Dec 2025
Published
18 Dec 2025
Updated

CVSS v4.0
HIGH (7.1)
EPSS
Pending

KEV

Description

Command Injection vulnerability in TP-Link WA850RE (httpd modules) allows authenticated adjacent attacker to inject arbitrary commands.This issue affects: ≤ WA850RE V2_160527, ≤ WA850RE V3_160922.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: Last hour
Showing 31 to 40 of 64 CVEs