24h | 7d | 30d

Overview

  • yhirose
  • cpp-httplib

05 Dec 2025
Published
05 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
Pending

KEV

Description

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.27.0, a vulnerability allows attacker-controlled HTTP headers to influence server-visible metadata, logging, and authorization decisions. An attacker can inject headers named REMOTE_ADDR, REMOTE_PORT, LOCAL_ADDR, LOCAL_PORT that are parsed into the request header multimap via read_headers() in httplib.h (headers.emplace), then the server later appends its own internal metadata using the same header names in Server::process_request without erasing duplicates. Because Request::get_header_value returns the first entry for a header key (id == 0) and the client-supplied headers are parsed before server-inserted headers, downstream code that uses these header names may inadvertently use attacker-controlled values. Affected files/locations: cpp-httplib/httplib.h (read_headers, Server::process_request, Request::get_header_value, get_header_value_u64) and cpp-httplib/docker/main.cc (get_client_ip, nginx_access_logger, nginx_error_logger). Attack surface: attacker-controlled HTTP headers in incoming requests flow into the Request.headers multimap and into logging code that reads forwarded headers, enabling IP spoofing, log poisoning, and authorization bypass via header shadowing. This vulnerability is fixed in 0.27.0.

Statistics

  • 1 Post

Last activity: 3 hours ago

Fediverse

Profile picture

⚠️ CRITICAL: CVE-2025-66570 in cpp-httplib (<0.27.0) lets attackers spoof IP headers, bypassing auth & poisoning logs. Upgrade to 0.27.0+ ASAP! Impacts web servers, APIs, embedded systems. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 3h ago

Overview

  • pickplugins
  • User Verification by PickPlugins

05 Dec 2025
Published
05 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.19%

KEV

Description

The Email Verification, Email OTP, Block Spam Email, Passwordless login, Hide Login, Magic Login – User Verification plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.0.39. This is due to the plugin not properly validating that an OTP was generated before comparing it to user input in the "user_verification_form_wrap_process_otpLogin" function. This makes it possible for unauthenticated attackers to log in as any user with a verified email address, such as an administrator, by submitting an empty OTP value.

Statistics

  • 1 Post

Last activity: 21 hours ago

Fediverse

Profile picture

🔥 CRITICAL: CVE-2025-12374 in 'User Verification by PickPlugins' (WP, ≤2.0.39) allows auth bypass via empty OTP—admin takeover possible. Disable plugin or implement WAF rules until patched! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 21h ago

Overview

  • Microsoft
  • Windows

26 Aug 2025
Published
05 Dec 2025
Updated

CVSS v3.0
HIGH (7.0)
EPSS
0.23%

KEV

Description

Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of .LNK files. Crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25373.

Statistics

  • 1 Post

Last activity: 16 hours ago

Bluesky

Profile picture
Microsoft Silently Patched CVE-2025-9491 - We Think Our Patch Provides More Security
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • FluentBit
  • Fluent Bit

24 Nov 2025
Published
28 Nov 2025
Updated

CVSS
Pending
EPSS
0.12%

KEV

Description

The extract_name function in Fluent Bit in_docker input plugin copies container names into a fixed size stack buffer without validating length. An attacker who can create containers or control container names, can supply a long name that overflows the buffer, leading to process crash or arbitrary code execution.

Statistics

  • 1 Post

Last activity: 18 hours ago

Bluesky

Profile picture
CVE-2025-12970 CVE-2025-12970 scq.ms/4oDbcB1 #SecQube #MicrosoftSecurity
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • OpenSSL
  • OpenSSL

30 Sep 2025
Published
04 Nov 2025
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code. Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture
🚨 Security Alert for #Oracle Linux 10 users 🚨 New OpenSSL patch (ELSA-2025-21248) addresses CVE-2025-9230 (Moderate severity). Out-of-bounds read/write flaw in RFC 3211 KEK Unwrap. Read more: tinyurl.com/yeyn4bhk #Security
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • NetScaler
  • ADC

26 Aug 2025
Published
21 Oct 2025
Updated

CVSS v4.0
CRITICAL (9.2)
EPSS
15.24%

Description

Memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service in NetScaler ADC and NetScaler Gateway when NetScaler is configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with IPv6 services or servicegroups bound with IPv6 servers (OR) NetScaler ADC and NetScaler Gateway 13.1, 14.1, 13.1-FIPS and NDcPP: LB virtual servers of type (HTTP, SSL or HTTP_QUIC) bound with DBS IPv6 services or servicegroups bound with IPv6 DBS servers (OR) CR virtual server with type HDX

Statistics

  • 1 Post

Last activity: 23 hours ago

Bluesky

Profile picture
Citrix发布关键NetScaler漏洞补丁,确认CVE-2025-7775漏洞已被主动利用 https://qian.cx/posts/0B404317-F9DD-40AC-8FC8-FA262C228420
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • Pending

19 Aug 2025
Published
19 Aug 2025
Updated

CVSS
Pending
EPSS
0.20%

KEV

Description

EzGED3 3.5.0 contains an unauthenticated arbitrary file read vulnerability due to improper access control and insufficient input validation in a script exposed via the web interface. A remote attacker can supply a crafted path parameter to a PHP script to read arbitrary files from the filesystem. The script lacks both authentication checks and secure path handling, allowing directory traversal attacks (e.g., ../../../) to access sensitive files such as configuration files, database dumps, source code, and password reset tokens. If phpMyAdmin is exposed, extracted credentials can be used for direct administrative access. In environments without such tools, attacker-controlled file reads still allow full database extraction by targeting raw MySQL data files. The vendor states that the issue is fixed in 3.5.72.27183.

Statistics

  • 2 Posts

Last activity: 21 hours ago

Fediverse

Profile picture

🚨 New plugin: EzGED3Plugin (CVE-2025-51539).

EzGED3 pre-authentication arbitrary file read vulnerability detection - may lead to admin takeover.

Results: leakix.net/search?q=%2Bplugin%

  • 0
  • 0
  • 1
  • 21h ago

Overview

  • wpkube
  • Cool Tag Cloud

05 Dec 2025
Published
05 Dec 2025
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.03%

KEV

Description

The Cool Tag Cloud plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'cool_tag_cloud' shortcode in all versions up to, and including, 2.29 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Statistics

  • 1 Post

Last activity: 18 hours ago

Fediverse

Profile picture

⚠️ CVE-2025-13614: HIGH-severity stored XSS in wpkube Cool Tag Cloud plugin (all versions). Authenticated contributors can inject malicious JS via shortcode, risking credential theft & site compromise. Audit permissions & monitor usage. Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Advantech Co., Ltd.
  • WISE-DeviceOn Server

05 Dec 2025
Published
05 Dec 2025
Updated

CVSS v4.0
CRITICAL (10.0)
EPSS
Pending

KEV

Description

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a hard-coded cryptographic key vulnerability. The product uses a static HS512 HMAC secret for signing EIRMMToken JWTs across all installations. The server accepts forged JWTs that need only contain a valid email claim, allowing a remote unauthenticated attacker to generate arbitrary tokens and impersonate any DeviceOn account, including the root super admin. Successful exploitation permits full administrative control of the DeviceOn instance and can be leveraged to execute code on managed agents through DeviceOn’s remote management features.

Statistics

  • 1 Post

Last activity: 1 hour ago

Fediverse

Profile picture

🚨 CVE-2025-34256: CRITICAL (CVSS 10) vuln in Advantech WISE-DeviceOn Server <5.4—remote attackers can forge JWTs & gain full admin access via hard-coded key. Patch to v5.4+ or restrict access now! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Linux
  • Linux

07 Mar 2025
Published
04 May 2025
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: io_uring/kbuf: reallocate buf lists on upgrade IORING_REGISTER_PBUF_RING can reuse an old struct io_buffer_list if it was created for legacy selected buffer and has been emptied. It violates the requirement that most of the field should stay stable after publish. Always reallocate it instead.

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture
Déjà Vu in Linux io_uring Talk by Pumpkin about exploiting CVE-2025-21836 — a race condition that leads to a use-after-free in the io_uring subsystem. Video: www.youtube.com/watch?v=Ry4e... Slides: u1f383.github.io/slides/talks...
  • 0
  • 0
  • 0
  • 4h ago
Showing 21 to 30 of 42 CVEs