24h | 7d | 30d

Overview

  • Meta
  • react-server-dom-webpack

03 Dec 2025
Published
11 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
76.01%

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Statistics

  • 14 Posts
  • 34 Interactions

Last activity: Last hour

Fediverse

Profile picture

Google is now tracking at least five Chinese cyber-espionage groups that are exploiting the React2Shell vulnerability for initial access.

The groups are UNC6600, UNC6586, UNC6588, UNC6595, and UNC6603. This is up from two at the beginning.

cloud.google.com/blog/topics/t

  • 8
  • 8
  • 0
  • Last hour
Profile picture

React2shell CVE-2025-55182のせいで勝手にサーバでマイニングされてた(むしろその程度で済んでよかったねクラスのあかんやつ)という話をたくさん聞いてるのでお気をつけくださいまし…

DifyをセルフホストしたやつをパブリックなIPに少しでも晒したら即死とか聞いとるでな。

  • 4
  • 4
  • 0
  • 2h ago
Profile picture

Missed this yesterday - Google TIG published what they've been seeing on React2Shell.

Dovetails with @hrbrmstr 's tireless work lately.

#threatintel

cloud.google.com/blog/topics/t

  • 3
  • 6
  • 0
  • 14h ago
Profile picture

Il Day-One del Caos di React2Shell! Spie, criminali e cryptominer si contendono i server

Un recente resoconto del gruppo Google Threat Intelligence (GTIG) illustra gli esiti disordinati della diffusione di informazioni, mettendo in luce come gli avversari più esperti abbiano già preso piede all’interno delle reti dei soggetti colpiti.

Una vulnerabilità critica, identificata come CVE-2025-55182, è stata segnalata alla comunità della sicurezza il 3 dicembre 2025, riguardante React Server Components (RSC). Questa falla di sicurezza, con un punteggioCVSS massimo di 10,0, permette a malintenzionati di eseguire codice arbitrario su un server mediante l’invio di una sola richiesta HTTP appositamente strutturata, senza necessità di autenticazione.

Il mondo informatico ha reagito con prontezza. Subito dopo la notizia pubblica, numerosi cluster di minacce sono stati sfruttati diffusamente, come rilevato dal Google Threat Intelligence Group (GTIG), che ha notato attività sia di gruppi di criminali informatici opportunisti fino a presunti operatori di spionaggio.

Poiché React e Next.js sono fondamentali per il web moderno, la superficie di attacco è enorme. “GTIG considera CVE-2025-55182 una vulnerabilità a rischio critico”. L’attività più allarmante identificata nel rapporto proviene da autori di minacce collegate alla Cina, che hanno rapidamente integrato l’exploit nei loro arsenali per distribuire malware specializzati. Il GTIG ha identificato diverse campagne distinte:

  • Tunnelers di UNC6600: questo gruppo è stato visto utilizzare MINOCAT, un sofisticato tunneler. Hanno fatto di tutto per nascondere le proprie tracce, creando directory nascoste come $HOME/.systemd-utils e uccidendo spietatamente i processi legittimi per liberare risorse.
  • C2 “legittimo” (UNC6603): questo autore ha implementato una versione aggiornata della backdoor HISONIC. In un’astuta mossa per mimetizzarsi, HISONIC “utilizza servizi cloud legittimi, come Cloudflare Pages e GitLab, per recuperare la sua configurazione crittografata”.
  • The Masqueraders (UNC6595): Distribuendo un malware denominato ANGRYREBEL.LINUX, questo gruppo ha tentato di eludere il rilevamento “mascherando il malware come il legittimo demone OpenSSH (sshd) all’interno della directory /etc/” e utilizzando tecniche anti-forensi come il timestomping.
  • Vim Impostor (UNC6588): in un’altra ondata di attacchi, gli autori hanno utilizzato l’exploit per scaricare COMPOOD, una backdoor che si camuffava da popolare editor di testo Vim per evitare sospetti.

“GTIG ha identificato campagne distinte che sfruttano questa vulnerabilità per distribuire un tunneler MINOCAT, un downloader SNOWLIGHT, una backdoor HISONIC e una backdoor COMPOOD, nonché miner di criptovalute XMRIG, alcune delle quali si sovrappongono all’attività precedentemente segnalata da Huntress“.

Oltre allo spionaggio, a partire dal 5 dicembre si sono uniti alla mischia anche criminali motivati da interessi finanziari, che hanno utilizzato i miner XMRig per dirottare le risorse del server e generare criptovalute.

Il caos è stato ulteriormente aggravato da un’ondata di disinformazione. Nelle prime ore successive alla divulgazione, Internet è stato inondato di exploit falsi. Un importante repository “che inizialmente sosteneva di essere un exploit funzionale legittimo, ha ora aggiornato il proprio file README per etichettare correttamente le affermazioni iniziali della ricerca come generate dall’intelligenza artificiale e non funzionali”.

L'articolo Il Day-One del Caos di React2Shell! Spie, criminali e cryptominer si contendono i server proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 11h ago
Profile picture

An actively exploited GeoServer XXE vulnerability is prompting renewed discussion around breach readiness in public-sector and enterprise environments.

Experts note that unauthenticated flaws in widely deployed open-source platforms significantly increase exposure, especially where asset discovery and patch coordination are constrained.

Venky Raju, Field CTO at ColorTokens:
“The massive adoption of open-source software has significantly increased the attack surface of many enterprises, often without their knowledge. Unauthenticated vulnerabilities are particularly concerning because they bypass identity and application-level controls. The GeoServer vulnerability comes on the heels of a larger one called React2Shell (CVE-2025-55182), which scored a perfect 10 on the CVSS metric.

However, enterprises may not be able to patch servers quickly due to internal challenges, such as discovering affected assets, identifying affected applications, scheduling patch updates, etc. As an emergency measure, organizations should consider microsegmentation controls to isolate affected assets or zones with just enough policies to maintain business continuity while preventing lateral movement using commonly used techniques. The MITRE framework is an excellent guide for identifying the tactics hackers use to move laterally from the initially compromised system.”

How are teams handling containment when patching isn’t immediate?

Engage and follow @technadu for grounded infosec coverage.

  • 0
  • 0
  • 0
  • 10h ago

Bluesky

Profile picture
between the ~1,400 networks we've seen exploiting React2Shell (CVE-2025-55182) we've captured about 100 different distinct malware payloads. Lots of vibe coded slop, coin miners, chinese comments, mirai variants, etc. hit us up if you're tracking this and want deets research@greynoise.io
  • 0
  • 1
  • 0
  • 9h ago
Profile picture
Multiple Threat Actors Exploit React2Shell (CVE-2025-55182) #googlecloud https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182/
  • 0
  • 0
  • 2
  • 23h ago
Profile picture
~Mandiant~ Multiple threat actors are exploiting the critical React2Shell RCE to deploy backdoors, tunnelers, and cryptominers. - IOCs: reactcdn. windowserrorapis. com, 82. 163. 22. 139, 45. 76. 155. 14 - #CVE202555182 #React #ThreatIntel
  • 0
  • 0
  • 0
  • 22h ago
Profile picture
piyolog.hatenadiary.jp/ent... React Server Componentsの脆弱性 CVE-2025-55182(React2Shell)についてまとめてみた。 - piyolog
  • 0
  • 0
  • 0
  • 19h ago
Profile picture
かわいそうだけど参考になるのでありがたい。 「私の環境は Next.js 15.4.3 + React 19.1.0。ドンピシャで脆弱だった」 「攻撃者のMoneroウォレットアドレスも特定できたが、仮想通貨の匿名性により追跡は困難だ」 「発見したマルウェアはVirusTotalに提出済み」 「「VirusTotalで検出ゼロ=安全」ではない」 個人開発のEC2が乗っ取られてMoneroを掘られていた話【CVE-2025-55182】|ねころこ note.com/nekoroko/n/n...
  • 0
  • 0
  • 0
  • 16h ago
Profile picture
www.ipa.go.jp/security/sec... React Server Componentsにおける脆弱性について(CVE-2025-55182) | 情報セキュリティ | IPA 独立行政法人 情報処理推進機構
  • 0
  • 0
  • 0
  • 12h ago
Profile picture
CVE-2025-55182 Exposed: The React Server Components RCE Flaw That Could Have Owned Your Nodejs Backend + Video Introduction: The landscape of modern web application security faces a new frontier with the disclosure of CVE-2025-55182, a critical Remote Code Execution (RCE) vulnerability within the…
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Google
  • Chrome

12 Dec 2025
Published
13 Dec 2025
Updated

CVSS
Pending
EPSS
23.28%

Description

Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 10 Posts
  • 33 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture

I see that Brendan Eich from Brave is out lying about @Vivaldi again. He claims that Brave was pretty much the first out with a fix for CVE-2025-14174 and that Vivaldi still has not released a fix.

AFAIK we were actually first because we released 7.7.3862.88 (Android) based on 142.0.7444.237 from the Extended Support Release branch at 13:00 UTC (and for Desktop [7.7.3851.61] one hour later) on the 10th of December (the day before Brave and even before Chrome), which includes a fix for CVE-2025-14174. However since that CVE was not being publicly discussed yet, it was not initially listed in the changelog.

I have updated the Desktop announcement to mention the CVE now. Here it is:

vivaldi.com/blog/desktop/minor

Also FWIW my Masto bot which tracks various desktop browser updates announced us here:

social.vivaldi.net/@browserver

That bot has a sibling that looks at Vivaldi only releases (all platforms), which caught the Android release:

social.vivaldi.net/@vivaldiver

And here is when it detected the Brave annoucement, more than a day later:

social.vivaldi.net/@browserver

  • 21
  • 11
  • 0
  • 18h ago
Profile picture

Apple has released security updates for multiple operating systems and its Safari browser to address two WebKit flaws that have been exploited in the wild. One of these vulnerabilities, CVE-2025-14174, is the same flaw previously patched in Google Chrome.
thehackernews.com/2025/12/appl

  • 0
  • 0
  • 0
  • 1h ago
Profile picture

Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild

Apple has released security updates for multiple operating systems and its Safari browser to address two WebKit flaws that have been exploited in the wild. One of these vulnerabilities, CVE-2025-14174, is the same flaw previously patched in Google Chrome. thehackernews.com/2025/12/appl

  • 0
  • 0
  • 0
  • 1h ago
Profile picture

[VULN] "Sécurité : Apple comble deux failles « zero-day » avec iOS 26.2 et macOS 26.2"

"La première (CVE-2025-43529) concerne WebKit, le moteur de rendu de Safari. Il s'agit d'une faille de type use-after-free qui permet l'exécution de code arbitraire simplement en traitant un contenu web malveillant. La seconde (CVE-2025-14174) est une corruption de mémoire identifiée non seulement par les équipes d'Apple, mais aussi par le Threat Analysis Group de Google.

Fait intéressant, Google a également dû corriger Chrome en urgence mercredi dernier pour une faille similaire..."
👇
macg.co/ios/2025/12/securite-a
⬇️
cve.circl.lu/vuln/CVE-2025-141

💬
⬇️
infosec.pub/post/38999452

  • 1
  • 0
  • 0
  • 14h ago
Profile picture

Apple aggiorna due bug 0day critici in iOS, presumibilmente abusati dagli spyware

In seguito alla scoperta di due vulnerabilità zero-day estremamente critiche nel motore del browser WebKit, Apple ha pubblicato urgentemente degli aggiornamenti di sicurezza per gli utenti di iPhone e iPad.

Entrambe le vulnerabilità risiedono in WebKit, il motore che alimenta Safari e visualizza i contenuti web nell’ecosistema iOS.

Catalogate come CVE-2025-43529 e CVE-2025-14174, permettono agli attaccanti di attivare codice malevolo attraverso l’inganno della vittima che viene portata a visitare una specifica pagina web.

Per attivare l’exploit, non è necessario che un aggressore abbia un accesso fisico al dispositivo; è sufficiente che venga elaborato un contenuto web creato in modo dannoso, ad esempio un sito web compromesso o una pubblicità dannosa.

L’avviso di Apple riporta quanto segue: “Apple è a conoscenza di una segnalazione secondo cui questo problema potrebbe essere stato sfruttato in un attacco estremamente sofisticato contro individui specifici nelle versioni di iOS precedenti a iOS 26″.

Questa formulazione è solitamente riservata alle campagne di spyware mercenarie sponsorizzate dallo Stato, in cui vengono presi di mira obiettivi di alto valore come giornalisti, diplomatici e dissidenti.

Le due falle sfruttano debolezze diverse nel modo in cui il browser gestisce la memoria:

CVE-2025-43529 (Use-After-Free): scoperta dal Google Threat Analysis Group (TAG), questa vulnerabilità comporta un errore “use-after-free”. In parole povere, il programma tenta di utilizzare la memoria dopo che è stata liberata, consentendo agli hacker di manipolarla per eseguire codice arbitrario. Apple ha risolto questo problema migliorando la gestione della memoria (WebKit Bugzilla: 302502).

CVE-2025-14174 (Corruzione della memoria): attribuito sia ad Apple che a Google TAG, questo problema consente la corruzione della memoria, una condizione che può causare il crash di un sistema o aprire una backdoor per gli aggressori. È stato corretto con una convalida dell’input migliorata (WebKit Bugzilla: 303614).

L'articolo Apple aggiorna due bug 0day critici in iOS, presumibilmente abusati dagli spyware proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 18h ago

Bluesky

Profile picture
~Cisa~ CISA added an actively exploited Google Chromium out-of-bounds memory access vulnerability (CVE-2025-14174) to its KEV catalog. - IOCs: CVE-2025-14174 - #CISA #CVE202514174 #ThreatIntel
  • 0
  • 0
  • 0
  • 22h ago
Profile picture
Apple issued security updates on December 13, 2025, addressing two WebKit vulnerabilities exploited in the wild. One flaw (CVE-2025-14174) is […]
  • 0
  • 0
  • 0
  • 18h ago
Profile picture
【UPDATE】利用者はアップデートの実施を 「Microsoft Edge」でもゼロデイ脆弱性「CVE-2025-14174」が修正、実環境での悪用を確認 forest.watch.impress.co.jp/docs/news/20... #SecurityUpdate
  • 0
  • 0
  • 0
  • 9h ago
Profile picture
Apple’s Emergency Zero-Day Patch Reveals New Spyware Attack Surface—Are You Already Compromised? + Video Introduction: Apple has issued emergency security updates to patch two critical zero-day vulnerabilities (CVE-2025-43529 and CVE-2025-14174) exploited in what the company describes as an…
  • 0
  • 0
  • 0
  • 16h ago
Profile picture
Apple fixes two zero-day flaws exploited in ‘sophisticated’ attacks Apple has released emergency updates to patch two zero-day vulnerabilities that were exploited in an “extremely sophisticated attack” targeting specific individuals. The zero-days are tracked as CVE-2025-43529 and CVE-2025-14174…
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 4 Posts
  • 1 Interaction

Last activity: 10 hours ago

Fediverse

Profile picture

[VULN] "Sécurité : Apple comble deux failles « zero-day » avec iOS 26.2 et macOS 26.2"

"La première (CVE-2025-43529) concerne WebKit, le moteur de rendu de Safari. Il s'agit d'une faille de type use-after-free qui permet l'exécution de code arbitraire simplement en traitant un contenu web malveillant. La seconde (CVE-2025-14174) est une corruption de mémoire identifiée non seulement par les équipes d'Apple, mais aussi par le Threat Analysis Group de Google.

Fait intéressant, Google a également dû corriger Chrome en urgence mercredi dernier pour une faille similaire..."
👇
macg.co/ios/2025/12/securite-a
⬇️
cve.circl.lu/vuln/CVE-2025-141

💬
⬇️
infosec.pub/post/38999452

  • 1
  • 0
  • 0
  • 14h ago
Profile picture

Apple aggiorna due bug 0day critici in iOS, presumibilmente abusati dagli spyware

In seguito alla scoperta di due vulnerabilità zero-day estremamente critiche nel motore del browser WebKit, Apple ha pubblicato urgentemente degli aggiornamenti di sicurezza per gli utenti di iPhone e iPad.

Entrambe le vulnerabilità risiedono in WebKit, il motore che alimenta Safari e visualizza i contenuti web nell’ecosistema iOS.

Catalogate come CVE-2025-43529 e CVE-2025-14174, permettono agli attaccanti di attivare codice malevolo attraverso l’inganno della vittima che viene portata a visitare una specifica pagina web.

Per attivare l’exploit, non è necessario che un aggressore abbia un accesso fisico al dispositivo; è sufficiente che venga elaborato un contenuto web creato in modo dannoso, ad esempio un sito web compromesso o una pubblicità dannosa.

L’avviso di Apple riporta quanto segue: “Apple è a conoscenza di una segnalazione secondo cui questo problema potrebbe essere stato sfruttato in un attacco estremamente sofisticato contro individui specifici nelle versioni di iOS precedenti a iOS 26″.

Questa formulazione è solitamente riservata alle campagne di spyware mercenarie sponsorizzate dallo Stato, in cui vengono presi di mira obiettivi di alto valore come giornalisti, diplomatici e dissidenti.

Le due falle sfruttano debolezze diverse nel modo in cui il browser gestisce la memoria:

CVE-2025-43529 (Use-After-Free): scoperta dal Google Threat Analysis Group (TAG), questa vulnerabilità comporta un errore “use-after-free”. In parole povere, il programma tenta di utilizzare la memoria dopo che è stata liberata, consentendo agli hacker di manipolarla per eseguire codice arbitrario. Apple ha risolto questo problema migliorando la gestione della memoria (WebKit Bugzilla: 302502).

CVE-2025-14174 (Corruzione della memoria): attribuito sia ad Apple che a Google TAG, questo problema consente la corruzione della memoria, una condizione che può causare il crash di un sistema o aprire una backdoor per gli aggressori. È stato corretto con una convalida dell’input migliorata (WebKit Bugzilla: 303614).

L'articolo Apple aggiorna due bug 0day critici in iOS, presumibilmente abusati dagli spyware proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 18h ago

Bluesky

Profile picture
Apple’s Emergency Zero-Day Patch Reveals New Spyware Attack Surface—Are You Already Compromised? + Video Introduction: Apple has issued emergency security updates to patch two critical zero-day vulnerabilities (CVE-2025-43529 and CVE-2025-14174) exploited in what the company describes as an…
  • 0
  • 0
  • 0
  • 16h ago
Profile picture
Apple fixes two zero-day flaws exploited in ‘sophisticated’ attacks Apple has released emergency updates to patch two zero-day vulnerabilities that were exploited in an “extremely sophisticated attack” targeting specific individuals. The zero-days are tracked as CVE-2025-43529 and CVE-2025-14174…
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Meta
  • react-server-dom-webpack

11 Dec 2025
Published
11 Dec 2025
Updated

CVSS v3.1
HIGH (7.5)
EPSS
2.96%

KEV

Description

A pre-authentication denial of service vulnerability exists in React Server Components versions 19.0.0, 19.0.1 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1, including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints, which can cause an infinite loop that hangs the server process and may prevent future HTTP requests from being served.

Statistics

  • 3 Posts
  • 2 Interactions

Last activity: 18 hours ago

Bluesky

Profile picture
The latest update for #AikidoSecurity includes "React & Next.js DoS Vulnerability (CVE-2025-55184): What You Need to Fix After React2Shell" and "#OWASP Top 10 for Agentic Applications (2026): What Developers and Security Teams Need to Know". #Cybersecurity #AppSec https://opsmtrs.com/48vGyRP
  • 0
  • 0
  • 0
  • 23h ago
Profile picture
Critical RSC Flaws Exposed: How CVE-2025-55184 & CVE-2025-55183 Threaten Nextjs, React, and Your Entire Stack + Video Introduction: The React Server Components (RSC) paradigm, designed to enhance performance and developer experience in modern web frameworks, has become the latest attack vector for…
  • 0
  • 1
  • 0
  • 18h ago
Profile picture
~Socket~ New Denial of Service and Source Code Exposure vulnerabilities found in React Server Components require immediate patching. - IOCs: CVE-2025-55184, CVE-2025-67779, CVE-2025-55183 - #NextJS #React #ThreatIntel
  • 0
  • 1
  • 0
  • 22h ago

Overview

  • GIMP
  • GIMP

29 Oct 2025
Published
03 Nov 2025
Updated

CVSS v3.0
HIGH (7.8)
EPSS
0.08%

KEV

Description

GIMP HDR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of HDR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27803.

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture
Security Advisory: CVE-2025-10921 - GEGL Heap-Based Buffer Overflow #SUSE has released critical patches for a memory corruption vulnerability in the GEGL graphics library. Read more: tinyurl.com/5n8yct6c
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Growatt
  • ShineLan-X

13 Dec 2025
Published
13 Dec 2025
Updated

CVSS v4.0
CRITICAL (9.4)
EPSS
0.02%

KEV

Description

ShineLan-X contains a set of credentials for an FTP server was found within the firmware, allowing testers to establish an insecure FTP connection with the server. This may allow an attacker to replace legitimate files being deployed to devices with their own malicious versions, since the firmware signature verification is not enforced.

Statistics

  • 1 Post

Last activity: 17 hours ago

Fediverse

Profile picture

🚨 CVE-2025-36747 (CRITICAL, CVSS 9.4): Hard-coded FTP creds in Growatt ShineLan-X 3.6.0.0 allow file tampering—no signature checks! Patch, restrict FTP, and monitor for abuse. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 17h ago

Overview

  • The Qt Company
  • Qt

03 Dec 2025
Published
03 Dec 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.12%

KEV

Description

Allocation of Resources Without Limits or Throttling, Improper Validation of Specified Quantity in Input vulnerability in The Qt Company Qt on Windows, MacOS, Linux, iOS, Android, x86, ARM, 64 bit, 32 bit allows Excessive Allocation. This issue affects users of the Text component in Qt Quick. Missing validation of the width and height in the <img> tag could cause an application to become unresponsive. This issue affects Qt: from 5.0.0 through 6.5.10, from 6.6.0 through 6.8.5, from 6.9.0 through 6.10.0.

Statistics

  • 1 Post

Last activity: 20 hours ago

Bluesky

Profile picture
CVE-2025-12385 Improper validation of tag size in Text component parser scq.ms/49ZY4lR #SecQube #MicrosoftSecurity
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • pnggroup
  • libpng

03 Dec 2025
Published
04 Dec 2025
Updated

CVSS v3.1
HIGH (7.1)
EPSS
0.05%

KEV

Description

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng's simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng's internal state management. Upgrade to libpng 1.6.52 or later.

Statistics

  • 1 Post

Last activity: 23 hours ago

Bluesky

Profile picture
CVE-2025-66293 LIBPNG has an out-of-bounds read in png_image_read_composite scq.ms/48qtwII #SecQube #MicrosoftSecurity
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • Oracle Corporation
  • Oracle Concurrent Processing

05 Oct 2025
Published
21 Oct 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
74.64%

Description

Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business Suite (component: BI Publisher Integration). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks of this vulnerability can result in takeover of Oracle Concurrent Processing. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture
CL0P/FIN11 turned Oracle EBS into an Airbnb—no files, just memory. “TLSv3.1” beacons now, extortion emails later. Patch CVE-2025-61882 and choke egress before finance chokes you. 🔒🕵️ Read the breakdown—then subscribe: blog.alphahunt.io/cl0p-fin11-g... #AlphaHunt #CyberSecurity #Ransomware #Oracle
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • rupok98
  • URL Shortener Plugin For WordPress

13 Dec 2025
Published
13 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.05%

KEV

Description

The URL Shortener Plugin For WordPress plugin for WordPress is vulnerable to SQL Injection via the ‘analytic_id’ parameter in all versions up to, and including, 3.0.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Statistics

  • 1 Post

Last activity: 19 hours ago

Fediverse

Profile picture

🚨 CVE-2025-10738 (CRITICAL, CVSS 9.8): Unauthenticated SQL Injection in rupok98 URL Shortener Plugin for WordPress (all versions). Exploitation risks full DB compromise. Disable or restrict plugin ASAP! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 19h ago
Showing 1 to 10 of 32 CVEs