Overview
- Azure Access Technology
- BLU-IC2
01 Nov 2025
Published
01 Nov 2025
Updated
CVSS v4.0
CRITICAL (10.0)
EPSS
0.04%
KEV
Description
Web UI Malfunction when setting unexpected locale via API.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.
Statistics
- 1 Post
Last activity: 14 hours ago
Fediverse
🔔 CVE-2025-12600 (CRITICAL, CVSS 10): Azure BLU-IC2 & BLU-IC4 (≤1.19.5) face remote unauthenticated DoS via malformed locale API input—no patch yet. Restrict admin access & monitor for exploitation. https://radar.offseq.com/threat/cve-2025-12600-cwe-730-denial-of-service-in-azure--bcd06cc5 #OffSeq #Azure #Vuln
Overview
Description
IBM i 7.6, 7.5, 7.4, 7.3, and 7.2 is vulnerable to privilege escalation caused by an invalid IBM i SQL services authorization check. A malicious actor can use the elevated privileges of another user profile to gain root access to the host operating system.
Statistics
- 1 Post
Last activity: 7 hours ago
Fediverse
🚨 HIGH severity: CVE-2025-36367 affects IBM i 7.2–7.6. Missing SQL services authorization lets low-priv users escalate to root. Restrict access, audit privileges, monitor closely. Patch pending. https://radar.offseq.com/threat/cve-2025-36367-cwe-862-missing-authorization-6422a3cf #OffSeq #IBMi #CVE2025_36367 #PrivilegeEscalation #Security
Overview
- rathena
- rathena
09 Sep 2025
Published
10 Sep 2025
Updated
CVSS v3.1
CRITICAL (9.8)
EPSS
0.28%
KEV
Description
rAthena is an open-source cross-platform massively multiplayer online role playing game (MMORPG) server. Versions prior to commit 2f5248b have a heap-based buffer overflow in the login server, remote attacker to overwrite adjacent session fields by sending a crafted `CA_SSO_LOGIN_REQ` with an oversized token length. This leads to immediate denial of service (crash) and it is possible to achieve remote code execution via heap corruption. Commit 2f5248b fixes the issue.
Statistics
- 1 Post
Last activity: Last hour
Bluesky
📢 Analyse Ghidra d’un correctif pour une écriture hors limites dans rAthena (CVE-2025-58447)
📝 Selon l'extrait fourni, il s’agit d’un walkthr…
https://cyberveille.ch/posts/2025-11-02-analyse-ghidra-dun-correctif-pour-une-ecriture-hors-limites-dans-rathena-cve-2025-58447/ #CVE_2025_58447 #Cyberveille
Overview
- editorconfig
- editorconfig-core-c
26 Nov 2024
Published
27 Nov 2024
Updated
CVSS v4.0
MEDIUM (4.8)
EPSS
0.10%
KEV
Description
editorconfig-core-c is theEditorConfig core library written in C (for use by plugins supporting EditorConfig parsing). In affected versions several overflows may occur in switch case '[' when the input pattern contains many escaped characters. The added backslashes leave too little space in the output pattern when processing nested brackets such that the remaining input length exceeds the output capacity. This issue has been addressed in release version 0.12.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Statistics
- 1 Post
Last activity: 20 hours ago
Overview
- HashiCorp
- Consul
28 Oct 2025
Published
29 Oct 2025
Updated
CVSS v3.1
MEDIUM (6.5)
EPSS
0.01%
KEV
Description
Consul and Consul Enterprise’s (“Consul”) event endpoint is vulnerable to denial of service (DoS) due to lack of maximum value on the Content Length header. This vulnerability, CVE-2025-11375, is fixed in Consul Community Edition 1.22.0 and Consul Enterprise 1.22.0, 1.21.6, 1.20.8 and 1.18.12.
Statistics
- 2 Posts
- 1 Interaction
Last activity: Last hour
Overview
- HashiCorp
- Consul
28 Oct 2025
Published
28 Oct 2025
Updated
CVSS v3.1
MEDIUM (6.5)
EPSS
0.01%
KEV
Description
Consul and Consul Enterprise’s (“Consul”) key/value endpoint is vulnerable to denial of service (DoS) due to incorrect Content Length header validation. This vulnerability, CVE-2025-11374, is fixed in Consul Community Edition 1.22.0 and Consul Enterprise 1.22.0, 1.21.6, 1.20.8 and 1.18.12.
Statistics
- 2 Posts
- 1 Interaction
Last activity: Last hour
Overview
- warmcat
- libwebsocket
20 Oct 2025
Published
20 Oct 2025
Updated
CVSS v4.0
HIGH (7.5)
EPSS
0.02%
KEV
Description
Stack-based Buffer Overflow in lws_adns_parse_label in warmcat libwebsockets allows, when the LWS_WITH_SYS_ASYNC_DNS flag is enabled during compilation, to overflow the label_stack, when the attacker is able to sniff a DNS request in order to craft a response with a matching id containing a label longer than the maximum.
Statistics
- 1 Post
Last activity: 4 hours ago
Overview
- warmcat
- libwebsockets
20 Oct 2025
Published
24 Oct 2025
Updated
CVSS v4.0
MEDIUM (6.3)
EPSS
0.06%
KEV
Description
Use After Free in WebSocket server implementation in lws_handshake_server in warmcat libwebsockets may allow an attacker, in specific configurations where the user provides a callback function that handles LWS_CALLBACK_HTTP_CONFIRM_UPGRADE, to achieve denial of service.
Statistics
- 1 Post
Last activity: 4 hours ago