24h | 7d | 30d

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture
New cybersecurity bulletin: CVE-2025-11563 affects #SUSE Linux systems via curl path traversal vulnerability. Moderate severity (CVSS 6.5) but requires prompt attention due to curl's ubiquitous deployment. Read more: 👉 tinyurl.com/3c5kd3fk #Security
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Google
  • Chrome

12 Dec 2025
Published
12 Dec 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Use after free in Password Manager in Google Chrome prior to 143.0.7499.110 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)

Statistics

  • 2 Posts

Last activity: 16 hours ago

Bluesky

Profile picture
CRITICAL: #openSUSE patches actively exploited Chromium zero-day (CVE-2025-14372). Use-after-free in Password Manager. Patch IMMEDIATELY Read more: 👉 tinyurl.com/yckbvd3r #Security
  • 0
  • 0
  • 0
  • 16h ago
Profile picture
Critical security patch alert for #openSUSE Leap 16.0. The Chromium update fixes CVE-2025-14372, a use-after-free flaw in the Password Manager with known active exploits. Read more: 👉 tinyurl.com/5xdvuvmm #Security
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Pending

22 Dec 2022
Published
04 Nov 2025
Updated

CVSS
Pending
EPSS
0.46%

KEV

Description

Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture
🔍 Lambda Watchdog detected that CVE-2022-40897 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/293 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • AcademySoftwareFoundation
  • openexr

10 Nov 2025
Published
12 Nov 2025
Updated

CVSS v4.0
LOW (2.0)
EPSS
0.03%

KEV

Description

OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.3.0 through 3.3.5 and 3.4.0 through 3.4.2, while fuzzing `openexr_exrcheck_fuzzer`, Valgrind reports a conditional branch depending on uninitialized data inside `generic_unpack`. This indicates a use of uninitialized memory. The issue can result in undefined behavior and/or a potential crash/denial of service. Versions 3.3.6 and 3.4.3 fix the issue.

Statistics

  • 1 Post

Last activity: 23 hours ago

Bluesky

Profile picture
URGENT: #Fedora 42 users running USD for 3D work must patch for CVE-2025-64181. A memory corruption flaw in OpenEXRCore could let malicious EXR files execute code. Read more: 👉 tinyurl.com/37j8228j #Security
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • Pending

17 Mar 2022
Published
16 Dec 2025
Updated

CVSS
Pending
EPSS
0.73%

KEV

Description

In Paramiko before 2.10.1, a race condition (between creation and chmod) in the write_private_key_file function could allow unauthorized information disclosure.

Statistics

  • 1 Post

Last activity: 20 hours ago

Bluesky

Profile picture
Technical deep dive: CVE-2022-24302 in Paramiko represents a classic TOCTOU race condition between file creation and chmod in write_private_key_file. Read more: 👉 tinyurl.com/4sbz4vh6 #Security #Debian
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • Microsoft
  • Azure Agent for Site Recovery

11 Mar 2025
Published
19 May 2025
Updated

CVSS v3.1
MEDIUM (6.7)
EPSS
0.11%

KEV

Description

Improper privilege management in Azure Agent Installer allows an authorized attacker to elevate privileges locally.

Statistics

  • 1 Post

Last activity: 18 hours ago

Bluesky

Profile picture
CRITICAL PATCH: #SUSE addresses #Python flaw CVE-2025-21199 via update python311-suse-2025-21199-1. Remote code execution risk is HIGH. 🚨 Read more: 👉 tinyurl.com/2w4ubd2h #Security
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • NVIDIA
  • Isaac Lab

16 Dec 2025
Published
16 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.0)
EPSS
Pending

KEV

Description

NVIDIA Isaac Lab contains a deserialization vulnerability. A successful exploit of this vulnerability might lead to code execution.

Statistics

  • 1 Post

Last activity: 6 hours ago

Fediverse

Profile picture

🚨 CVE-2025-33210: CRITICAL deserialization flaw in NVIDIA Isaac Lab (<2.3.0). Remote code execution risk for robotics & AI. Patch when released, restrict network, validate inputs! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 6h ago

Overview

  • Pending

04 Aug 2021
Published
04 Aug 2024
Updated

CVSS
Pending
EPSS
0.21%

KEV

Description

read_header_tga in gd_tga.c in the GD Graphics Library (aka LibGD) through 2.3.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.

Statistics

  • 1 Post

Last activity: 18 hours ago

Bluesky

Profile picture
CVE-2021-38115: DoS vulnerability in libgd2. Out-of-bounds read in TGA file parsing can crash apps. Read more: 👉 tinyurl.com/yjpcfxec #Security #Debian
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Nginx Web Server, Nginx Plus

01 Jun 2021
Published
03 Aug 2024
Updated

CVSS
Pending
EPSS
73.17%

KEV

Description

A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.

Statistics

  • 1 Post
  • 7 Interactions

Last activity: 16 hours ago

Fediverse

Profile picture

Ich hab' immernoch 180 Puls.
Wir haben Verkäufer einer Antivirensoftware im Haus. Nicht meine Baustelle, na ja, angeblich braucht man sowas, schon wegen ISO 27001, NIS2 und sonstwelchen Zertifikaten. Und sie haben nicht nur einen Virenscanner, sondern können auch das Netz auf Sicherheitslücken scannen und mit AI auswerten, hört, hört!
Auf einem Mailserver entdecken sie, daß TCP/25 offen ist, und das ist immerhin zu 87% gefährlich. Warum der andere Mailserver, exakt gleich konfiguriert, nur zu 78% gefährdet ist, weiß nur die AI.
Aber der hat noch mehr, der nginx dort hat mehrere CVEs.

A security expert's analysis reveals that the domain (example.com) is exposed to the internet and vulnerable due to two critical issues: CVE-2021-23017 and CVE-2023-44487. The first vulnerability allows an attacker to exploit a memory overwrite in nginx potentially leading to remote code execution, while the second can cause a denial of service through HTTP/2 protocol abuse. These vulnerabilities could be exploited to gain initial access to the domain, enabling lateral movement to the public IP (x.x.x.x) and compromising it.


Ja, den nginx sollte ich wirklich mal updaten, habe ich schon sehr lange nicht mehr gemacht. SEHR lange.

❯ nmap -p80,443 x.x.x.x
Starting Nmap 7.98 ( https://nmap.org ) at 2025-12-16 18:44 +0100
Nmap scan report for example.com (x.x.x.x)
Host is up (0.25s latency).

PORT    STATE  SERVICE
80/tcp  closed http
443/tcp closed https

Nmap done: 1 IP address (1 host up) scanned in 0.78 seconds
❯

Die restlichen "Findings" sind von ähnlichem Kaliber.
Jesus hätte das Pack einfach aus dem Tempel geworfen,

Ich könnte gerade ziemlich viel kaputtschlagen.

  • 6
  • 1
  • 0
  • 16h ago

Overview

  • Pending

10 Oct 2023
Published
04 Nov 2025
Updated

CVSS
Pending
EPSS
94.42%

Description

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

Statistics

  • 1 Post
  • 7 Interactions

Last activity: 16 hours ago

Fediverse

Profile picture

Ich hab' immernoch 180 Puls.
Wir haben Verkäufer einer Antivirensoftware im Haus. Nicht meine Baustelle, na ja, angeblich braucht man sowas, schon wegen ISO 27001, NIS2 und sonstwelchen Zertifikaten. Und sie haben nicht nur einen Virenscanner, sondern können auch das Netz auf Sicherheitslücken scannen und mit AI auswerten, hört, hört!
Auf einem Mailserver entdecken sie, daß TCP/25 offen ist, und das ist immerhin zu 87% gefährlich. Warum der andere Mailserver, exakt gleich konfiguriert, nur zu 78% gefährdet ist, weiß nur die AI.
Aber der hat noch mehr, der nginx dort hat mehrere CVEs.

A security expert's analysis reveals that the domain (example.com) is exposed to the internet and vulnerable due to two critical issues: CVE-2021-23017 and CVE-2023-44487. The first vulnerability allows an attacker to exploit a memory overwrite in nginx potentially leading to remote code execution, while the second can cause a denial of service through HTTP/2 protocol abuse. These vulnerabilities could be exploited to gain initial access to the domain, enabling lateral movement to the public IP (x.x.x.x) and compromising it.


Ja, den nginx sollte ich wirklich mal updaten, habe ich schon sehr lange nicht mehr gemacht. SEHR lange.

❯ nmap -p80,443 x.x.x.x
Starting Nmap 7.98 ( https://nmap.org ) at 2025-12-16 18:44 +0100
Nmap scan report for example.com (x.x.x.x)
Host is up (0.25s latency).

PORT    STATE  SERVICE
80/tcp  closed http
443/tcp closed https

Nmap done: 1 IP address (1 host up) scanned in 0.78 seconds
❯

Die restlichen "Findings" sind von ähnlichem Kaliber.
Jesus hätte das Pack einfach aus dem Tempel geworfen,

Ich könnte gerade ziemlich viel kaputtschlagen.

  • 6
  • 1
  • 0
  • 16h ago
Showing 31 to 40 of 72 CVEs