24h | 7d | 30d

Overview

  • pallets
  • jinja

05 Mar 2025
Published
03 Nov 2025
Updated

CVSS v4.0
MEDIUM (5.4)
EPSS
0.26%

KEV

Description

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6.

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture
Just published: Deep dive on the #SUSE Jinja2 vulnerability (CVE-2025-27516). Read more: 👉 tinyurl.com/5bwa5fkr #Security
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Apache Software Foundation
  • Apache Tika core
  • org.apache.tika:tika-core

04 Dec 2025
Published
05 Dec 2025
Updated

CVSS
Pending
EPSS
0.06%

KEV

Description

Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. This CVE covers the same vulnerability as in CVE-2025-54988. However, this CVE expands the scope of affected packages in two ways. First, while the entrypoint for the vulnerability was the tika-parser-pdf-module as reported in CVE-2025-54988, the vulnerability and its fix were in tika-core. Users who upgraded the tika-parser-pdf-module but did not upgrade tika-core to >= 3.2.2 would still be vulnerable. Second, the original report failed to mention that in the 1.x Tika releases, the PDFParser was in the "org.apache.tika:tika-parsers" module.

Statistics

  • 1 Post

Last activity: 14 hours ago

Bluesky

Profile picture
Critical CVE-2025-66516 Exposes Apache Tika to XXE Attacks Across Core and Parser Modules - CySecurity News - Latest Information Security and Hacking Incidents https://www.cysecurity.news/2025/12/critical-cve-2025-66516-exposes-apache.html
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Adobe
  • ColdFusion

09 Dec 2025
Published
10 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.25%

KEV

Description

ColdFusion versions 2025.4, 2023.16, 2021.22 and earlier are affected by an Unrestricted Upload of File with Dangerous Type vulnerability that could lead to arbitrary code execution by a high priviledged attacker. Exploitation of this issue does not require user interaction and scope is changed.

Statistics

  • 1 Post

Last activity: 17 hours ago

Fediverse

Profile picture

🚨 CRITICAL: CVE-2025-61808 in Adobe ColdFusion (2025.4, 2023.16, 2021.22 & earlier) allows unrestricted dangerous file uploads—arbitrary code exec, no user interaction. Patch ASAP & lock down uploads! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Ivanti
  • ICS

31 Jan 2024
Published
21 Oct 2025
Updated

CVSS v3.0
HIGH (8.2)
EPSS
94.32%

Description

A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.

Statistics

  • 1 Post

Last activity: 15 hours ago

Bluesky

Profile picture
MetaRATを利用した日本組織を狙った攻撃キャンペーン | LAC WATCH - 株式会社ラック 攻撃者グループは、初期侵入手段として標的組織のICSに存在する脆弱性(CVE-2024-21893およびCVE-2024-21887)を悪用し、対象機器にマルウェアを設置しました。 www.lac.co.jp/lacwatch/rep...
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Ivanti
  • ICS

12 Jan 2024
Published
21 Oct 2025
Updated

CVSS v3.0
CRITICAL (9.1)
EPSS
94.42%

Description

A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.

Statistics

  • 1 Post

Last activity: 15 hours ago

Bluesky

Profile picture
MetaRATを利用した日本組織を狙った攻撃キャンペーン | LAC WATCH - 株式会社ラック 攻撃者グループは、初期侵入手段として標的組織のICSに存在する脆弱性(CVE-2024-21893およびCVE-2024-21887)を悪用し、対象機器にマルウェアを設置しました。 www.lac.co.jp/lacwatch/rep...
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • OpenBSD
  • OpenSSH

06 Oct 2025
Published
06 Oct 2025
Updated

CVSS v3.1
LOW (3.6)
EPSS
0.01%

KEV

Description

ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture
Technical Deep Dive: New #OpenSSH vulnerabilities patched in #SUSE Linux Micro 6.2. CVE-2025-61984 (control chars in username) & CVE-2025-61985 (NULL char in ssh:// URI) both exploit ProxyCommand parsing. Read more: 👉 tinyurl.com/4y7a4xx6 #Security
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Apache Software Foundation
  • Apache Struts
  • org.apache.struts:struts2-core

10 Dec 2025
Published
10 Dec 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes disk exhaustion. This issue affects Apache Struts: from 2.0.0 through 6.7.4, from 7.0.0 through 7.0.3. Users are recommended to upgrade to version 6.8.0 or 7.1.1, which fixes the issue. It's related to  https://cve.org/CVERecord?id=CVE-2025-64775  - this CVE addresses missing affected version 6.7.4

Statistics

  • 1 Post

Last activity: 11 hours ago

Bluesky

Profile picture
SIOSセキュリティブログを更新しました。 Apache Struts 2の脆弱性(Important: CVE-2025-66675 (Old: CVE-2025-64775)) #sios_tech #security #vulnerability #セキュリティ #脆弱性 #apache #struts security.sios.jp/vulnerabilit...
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • OpenBSD
  • OpenSSH

06 Oct 2025
Published
11 Nov 2025
Updated

CVSS v3.1
LOW (3.6)
EPSS
0.01%

KEV

Description

ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture
Technical Deep Dive: New #OpenSSH vulnerabilities patched in #SUSE Linux Micro 6.2. CVE-2025-61984 (control chars in username) & CVE-2025-61985 (NULL char in ssh:// URI) both exploit ProxyCommand parsing. Read more: 👉 tinyurl.com/4y7a4xx6 #Security
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • WAGO
  • Indsutrial-Managed-Switches

10 Dec 2025
Published
10 Dec 2025
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.08%

KEV

Description

An unauthenticated remote attacker can abuse unsafe sscanf calls within the check_account() function to write arbitrary data into fixed-size stack buffers which leads to full device compromise.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 4 hours ago

Overview

  • Toto Link
  • X5000R's (AX1800 router)

10 Dec 2025
Published
10 Dec 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

Unauthenticated Telnet enablement via cstecgi.cgi (auth bypass) leading to unauthenticated root login with a blank password on factory/reset X5000R V9.1.0u.6369_B20230113 (arbitrary command execution). Earlier versions that share the same implementation, may also be affected.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 4 hours ago
Showing 31 to 40 of 48 CVEs