Overview
- Grafana
- Grafana Enterprise
21 Nov 2025
Published
24 Nov 2025
Updated
CVSS v3.1
CRITICAL (10.0)
EPSS
0.02%
KEV
Description
SCIM provisioning was introduced in Grafana Enterprise and Grafana Cloud in April to improve how organizations manage users and teams in Grafana by introducing automated user lifecycle management.
In Grafana versions 12.x where SCIM provisioning is enabled and configured, a vulnerability in user identity handling allows a malicious or compromised SCIM client to provision a user with a numeric externalId, which in turn could allow to override internal user IDs and lead to impersonation or privilege escalation.
This vulnerability applies only if all of the following conditions are met:
- `enableSCIM` feature flag set to true
- `user_sync_enabled` config option in the `[auth.scim]` block set to true
Statistics
- 1 Post
Last activity: 20 hours ago
Overview
Description
Improper control of generation of code ('code injection') in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
Statistics
- 1 Post
Last activity: 9 hours ago
Overview
- Yottamaster
- DM2
08 Dec 2025
Published
08 Dec 2025
Updated
CVSS v4.0
MEDIUM (5.3)
EPSS
0.05%
KEV
Description
A vulnerability was found in Yottamaster DM2, DM3 and DM200 up to 1.2.23/1.9.12. Affected by this issue is some unknown functionality of the component File Upload. Performing manipulation results in path traversal. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Statistics
- 1 Post
- 2 Interactions
Last activity: 12 hours ago
Fediverse
Overview
- D-Link
- DCS-930L
08 Dec 2025
Published
08 Dec 2025
Updated
CVSS v4.0
MEDIUM (5.3)
EPSS
0.63%
KEV
Description
A vulnerability was determined in D-Link DCS-930L 1.15.04. This affects an unknown part of the file /setSystemAdmin of the component alphapd. Executing manipulation of the argument AdminID can lead to command injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.
Statistics
- 1 Post
- 2 Interactions
Last activity: 12 hours ago
Fediverse
Overview
- Yealink
- SIP-T21P E2
08 Dec 2025
Published
08 Dec 2025
Updated
CVSS v4.0
MEDIUM (5.1)
EPSS
0.03%
KEV
Description
A weakness has been identified in Yealink SIP-T21P E2 52.84.0.15. Impacted is an unknown function of the component Local Directory Page. This manipulation causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer.
Statistics
- 1 Post
- 2 Interactions
Last activity: 12 hours ago