24h | 7d | 30d

Overview

  • Apache Software Foundation
  • Apache Tika PDF parser module
  • org.apache.tika:tika-parser-pdf-module

20 Aug 2025
Published
04 Nov 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Critical XXE in Apache Tika (tika-parser-pdf-module) in Apache Tika 1.13 through and including 3.2.1 on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. An attacker may be able to read sensitive data or trigger malicious requests to internal resources or third-party servers. Note that the tika-parser-pdf-module is used as a dependency in several Tika packages including at least: tika-parsers-standard-modules, tika-parsers-standard-package, tika-app, tika-grpc and tika-server-standard. Users are recommended to upgrade to version 3.2.2, which fixes this issue.

Statistics

  • 1 Post
  • 7 Interactions

Last activity: 8 hours ago

Fediverse

Profile picture

Defer to @todb on this as CVE expert(tm) but shouldn't CVE-2025-66516 have been an update of CVE-2025-54988? It's the same vulnerability.

lists.apache.org/thread/s5x3k9

  • 2
  • 5
  • 0
  • 8h ago

Overview

  • Infinera
  • MTC-9

08 Dec 2025
Published
08 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.04%

KEV

Description

Remote shell service (RSH) in Infinera MTC-9 version R22.1.1.0275 allows an attacker to utilize password-less user accounts and obtain system access by activating a reverse shell.This issue affects MTC-9: from R22.1.1.0275 before R23.0.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 1 hour ago

Fediverse

Profile picture

Infinera yikes.

cve.org/CVERecord?id=CVE-2025-

Improper configuration of the SSH service in Infinera MTC-9 allows an unauthenticated attacker to execute arbitrary commands and access data on file system\n\n.\n\n\nThis issue affects MTC-9: from R22.1.1.0275 before R23.0.

and

cve.org/CVERecord?id=CVE-2025-

Remote shell service (RSH) in Infinera MTC-9 version R22.1.1.0275 allows\n an attacker to utilize password-less user accounts and obtain \nsystem access by activating a reverse shell.This issue affects MTC-9: from R22.1.1.0275 before R23.0.

  • 0
  • 1
  • 0
  • 1h ago

Overview

  • libpng

06 Mar 2023
Published
29 Oct 2024
Updated

CVSS
Pending
EPSS
0.00%

KEV

Description

Maintainer contacted. This is a false-positive. The flaw does not actually exist and was erroneously tested.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture
CRITICAL: #Debian LTS security update DLA-4396-1 patches multiple high-severity libpng1.6 vulnerabilities (CVE-2022-3857, CVE-2021-4214). Remote attackers could use crafted PNGs for RCE or DoS. Read more: 👉 tinyurl.com/bde7mffv #Security
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • libpng

24 Aug 2022
Published
03 Aug 2024
Updated

CVSS
Pending
EPSS
0.23%

KEV

Description

A heap overflow flaw was found in libpngs' pngimage.c program. This flaw allows an attacker with local network access to pass a specially crafted PNG file to the pngimage utility, causing an application to crash, leading to a denial of service.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture
CRITICAL: #Debian LTS security update DLA-4396-1 patches multiple high-severity libpng1.6 vulnerabilities (CVE-2022-3857, CVE-2021-4214). Remote attackers could use crafted PNGs for RCE or DoS. Read more: 👉 tinyurl.com/bde7mffv #Security
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Grafana
  • Grafana Enterprise

21 Nov 2025
Published
24 Nov 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.02%

KEV

Description

SCIM provisioning was introduced in Grafana Enterprise and Grafana Cloud in April to improve how organizations manage users and teams in Grafana by introducing automated user lifecycle management. In Grafana versions 12.x where SCIM provisioning is enabled and configured, a vulnerability in user identity handling allows a malicious or compromised SCIM client to provision a user with a numeric externalId, which in turn could allow to override internal user IDs and lead to impersonation or privilege escalation. This vulnerability applies only if all of the following conditions are met: - `enableSCIM` feature flag set to true - `user_sync_enabled` config option in the `[auth.scim]` block set to true

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture
The latest update for #CyCognito includes "Emerging Threat: CVE-2025-55182 (React2Shell) – React Server Components RCE Vulnerability" and "Emerging Threat: CVE-2025-41115 – Critical SCIM Privilege Escalation in Grafana Enterprise". #cybersecurity #EASM https://opsmtrs.com/44Srq0X
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Yottamaster
  • DM2

08 Dec 2025
Published
08 Dec 2025
Updated

CVSS v4.0
MEDIUM (5.3)
EPSS
0.05%

KEV

Description

A vulnerability was found in Yottamaster DM2, DM3 and DM200 up to 1.2.23/1.9.12. Affected by this issue is some unknown functionality of the component File Upload. Performing manipulation results in path traversal. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 1 hour ago

Overview

  • D-Link
  • DCS-930L

08 Dec 2025
Published
08 Dec 2025
Updated

CVSS v4.0
MEDIUM (5.3)
EPSS
0.63%

KEV

Description

A vulnerability was determined in D-Link DCS-930L 1.15.04. This affects an unknown part of the file /setSystemAdmin of the component alphapd. Executing manipulation of the argument AdminID can lead to command injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 1 hour ago

Overview

  • Yealink
  • SIP-T21P E2

08 Dec 2025
Published
08 Dec 2025
Updated

CVSS v4.0
MEDIUM (5.1)
EPSS
0.03%

KEV

Description

A weakness has been identified in Yealink SIP-T21P E2 52.84.0.15. Impacted is an unknown function of the component Local Directory Page. This manipulation causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 1 hour ago
Showing 21 to 28 of 28 CVEs