Red Hot Cyber
La cybersecurity è condivisione. Riconosci il rischio, combattilo, condividi le tue esperienze ed incentiva gli altri a fare meglio di te.
Cerca

Lista CVE più critiche emesse negli ultimi 3 giorni

Di seguito sono riportate le vulnerabilità critiche pubblicate negli ultimi giorni dal National Vulnerability Database (NVD). Prestate massima attenzione per prevenire possibili sfruttamenti.

Ricerca una singola vulnerabilità

30/09/2025

Unknown

HIGH (8.7)
CVE-2025-23293
NVIDIA Delegated Licensing Service for all appliance platforms contains a vulnerability where an User/Attacker may cause an authorized action. A...
Vendor/s:

Descrizione Completa

NVIDIA Delegated Licensing Service for all appliance platforms contains a vulnerability where an User/Attacker may cause an authorized action. A successful exploit of this vulnerability may lead to information disclosure.

Metriche CVSS v3.1

  • Impatto: Confid.: NONE, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: ADJACENT_NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.3 / 5.8

Informazioni Aggiuntive

Pubblicato il: 30/09/2025 18:15:49
Ultima modifica: 30/09/2025 18:15:49

Fonti e Riferimenti

CRITICAL (9.9)
CVE-2025-10725
A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, for...
Vendor/s:

Descrizione Completa

A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, for example as a data scientist using a standard Jupyter notebook, can escalate their privileges to a full cluster administrator. This allows for the complete compromise of the cluster's confidentiality, integrity, and availability. The attacker can steal sensitive data, disrupt all services, and take control of the underlying infrastructure, leading to a total breach of the platform and all applications hosted on it.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.1 / 6

Informazioni Aggiuntive

Pubblicato il: 30/09/2025 18:15:47
Ultima modifica: 30/09/2025 18:15:47

Fonti e Riferimenti

CRITICAL (9.1)
CVE-2025-7493
A privilege escalation flaw from host to domain administrator was found in FreeIPA. This vulnerability is similar to CVE-2025-4404, where...
Vendor/s:

Descrizione Completa

A privilege escalation flaw from host to domain administrator was found in FreeIPA. This vulnerability is similar to CVE-2025-4404, where it fails to validate the uniqueness of the krbCanonicalName. While the previously released version added validations for the admin@REALM credential, FreeIPA still does not validate the root@REALM canonical name, which can also be used as the realm administrator's name. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / HIGH
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.3 / 6
CRITICAL (9.8)
CVE-2025-11148
All versions of the package check-branches are vulnerable to Command Injection check-branches is a command-line tool that is interacted with...
Vendor/s:

Descrizione Completa

All versions of the package check-branches are vulnerable to Command Injection check-branches is a command-line tool that is interacted with locally, or via CI, to confirm no conflicts exist in git branches. However, the library follows these conventions which can be abused: 1. It trusts branch names as they are (plain text) 2. It spawns git commands by concatenating user input Since a branch name is potentially a user input - as users can create branches remotely via pull requests, or simply due to privileged access to a repository - it can effectively be abused to run any command.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 30/09/2025 11:37:38
Ultima modifica: 30/09/2025 11:37:38

Fonti e Riferimenti

CRITICAL (9.1)
CVE-2024-58040
Crypt::RandomEncryption for Perl version 0.01 uses insecure rand() function during encryption.
Vendor/s:

Descrizione Completa

Crypt::RandomEncryption for Perl version 0.01 uses insecure rand() function during encryption.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: NONE
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
  • Score Sfruttabilità/Impatto: 3.9 / 5.2

WordPress

CRITICAL (9.8)
CVE-2025-9762
The Post By Email plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in...
Vendor/s: WordPress

Descrizione Completa

The Post By Email plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the save_attachments function in all versions up to, and including, 1.0.4b. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9
CRITICAL (9.8)
CVE-2025-8625
The Copypress Rest API plugin for WordPress is vulnerable to Remote Code Execution via copyreap_handle_image() Function in versions 1.1 to...
Vendor/s: WordPress, php

Descrizione Completa

The Copypress Rest API plugin for WordPress is vulnerable to Remote Code Execution via copyreap_handle_image() Function in versions 1.1 to 1.2. The plugin falls back to a hard-coded JWT signing key when no secret is defined and does not restrict which file types can be fetched and saved as attachments. As a result, unauthenticated attackers can forge a valid token to gain elevated privileges and upload an arbitrary file (e.g. a PHP script) through the image handler, leading to remote code execution.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 30/09/2025 11:37:46
Ultima modifica: 30/09/2025 11:37:46

Fonti e Riferimenti

HIGH (8.8)
CVE-2025-7052
The LatePoint plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.1.94. This...
Vendor/s: WordPress

Descrizione Completa

The LatePoint plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.1.94. This is due to missing nonce validation on the change_password() function of its customer_cabinet__change_password AJAX route. The plugin hooks this endpoint via wp_ajax and wp_ajax_nopriv but does not verify a nonce or user capability before resetting the user’s password. This makes it possible for unauthenticated attackers who trick a logged-in customer (or, with “WP users as customers” enabled, an administrator) into visiting a malicious link to take over their account.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: REQUIRED / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

php

CRITICAL (9.8)
CVE-2025-8625
The Copypress Rest API plugin for WordPress is vulnerable to Remote Code Execution via copyreap_handle_image() Function in versions 1.1 to...
Vendor/s: WordPress, php

Descrizione Completa

The Copypress Rest API plugin for WordPress is vulnerable to Remote Code Execution via copyreap_handle_image() Function in versions 1.1 to 1.2. The plugin falls back to a hard-coded JWT signing key when no secret is defined and does not restrict which file types can be fetched and saved as attachments. As a result, unauthenticated attackers can forge a valid token to gain elevated privileges and upload an arbitrary file (e.g. a PHP script) through the image handler, leading to remote code execution.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 30/09/2025 11:37:46
Ultima modifica: 30/09/2025 11:37:46

Fonti e Riferimenti

Acronis

HIGH (8.8)
CVE-2025-7779
Local privilege escalation due to insecure XPC service configuration. The following products are affected: Acronis True Image (macOS) before build...
Vendor/s: Acronis

Descrizione Completa

Local privilege escalation due to insecure XPC service configuration. The following products are affected: Acronis True Image (macOS) before build 42389, Acronis True Image for SanDisk (macOS) before build 42198, Acronis True Image for Western Digital (macOS) before build 42197.

Metriche CVSS v3.0

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: LOCAL
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: CHANGED
  • Vector String: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2 / 6

Informazioni Aggiuntive

Pubblicato il: 30/09/2025 15:15:59
Ultima modifica: 30/09/2025 15:15:59

Fonti e Riferimenti

29/09/2025

Unknown

CRITICAL (9.8)
CVE-2025-54875
FreshRSS is a free, self-hostable RSS aggregator. In versions 1.16.0 and above through 1.26.3, an unprivileged attacker can create a...
Vendor/s:

Descrizione Completa

FreshRSS is a free, self-hostable RSS aggregator. In versions 1.16.0 and above through 1.26.3, an unprivileged attacker can create a new admin user when registration is enabled through the use of a hidden field used only in the user management admin page, new_user_is_admin. This is fixed in version 1.27.0.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9
CRITICAL (9.8)
CVE-2025-57266
An issue was discovered in file AssistantController.java in ThriveX Blogging Framework 2.5.9 thru 3.1.3 allowing unauthenticated attackers to gain sensitive...
Vendor/s:

Descrizione Completa

An issue was discovered in file AssistantController.java in ThriveX Blogging Framework 2.5.9 thru 3.1.3 allowing unauthenticated attackers to gain sensitive information such as API Keys via the /api/assistant/list endpoint.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 29/09/2025 21:15:38
Ultima modifica: 29/09/2025 21:15:38

Fonti e Riferimenti

CRITICAL (9.8)
CVE-2024-13150
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Fayton Software and Consulting Services fayton.Pro...
Vendor/s:

Descrizione Completa

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Fayton Software and Consulting Services fayton.Pro ERP allows SQL Injection.This issue affects fayton.Pro ERP: through 20250929.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 29/09/2025 13:15:45
Ultima modifica: 29/09/2025 19:34:10

Fonti e Riferimenti

CRITICAL (9.8)
CVE-2025-11126
A security flaw has been discovered in Apeman ID71 218.53.203.117. This vulnerability affects unknown code of the file /system/www/system.ini. The...
Vendor/s:

Descrizione Completa

A security flaw has been discovered in Apeman ID71 218.53.203.117. This vulnerability affects unknown code of the file /system/www/system.ini. The manipulation results in hard-coded credentials. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 29/09/2025 00:15:31
Ultima modifica: 29/09/2025 19:34:10

Fonti e Riferimenti

Linux

CRITICAL (9.8)
CVE-2025-8868
In Progress Chef Automate, versions earlier than 4.13.295, on Linux x86 platform, an authenticated attacker can gain access to Chef...
Vendor/s: Linux, Chef

Descrizione Completa

In Progress Chef Automate, versions earlier than 4.13.295, on Linux x86 platform, an authenticated attacker can gain access to Chef Automate restricted functionality in the compliance service via improperly neutralized inputs used in an SQL command using a well-known token.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 29/09/2025 12:15:49
Ultima modifica: 29/09/2025 19:34:10

Fonti e Riferimenti

HIGH (8.8)
CVE-2025-6724
In Progress Chef Automate, versions earlier than 4.13.295, on Linux x86 platform, an authenticated attacker can gain access to Chef...
Vendor/s: Linux, Chef

Descrizione Completa

In Progress Chef Automate, versions earlier than 4.13.295, on Linux x86 platform, an authenticated attacker can gain access to Chef Automate restricted functionality in multiple services via improperly neutralized inputs used in an SQL command.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

Informazioni Aggiuntive

Pubblicato il: 29/09/2025 12:15:48
Ultima modifica: 29/09/2025 19:34:10

Fonti e Riferimenti

Chef

CRITICAL (9.8)
CVE-2025-8868
In Progress Chef Automate, versions earlier than 4.13.295, on Linux x86 platform, an authenticated attacker can gain access to Chef...
Vendor/s: Linux, Chef

Descrizione Completa

In Progress Chef Automate, versions earlier than 4.13.295, on Linux x86 platform, an authenticated attacker can gain access to Chef Automate restricted functionality in the compliance service via improperly neutralized inputs used in an SQL command using a well-known token.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 29/09/2025 12:15:49
Ultima modifica: 29/09/2025 19:34:10

Fonti e Riferimenti

HIGH (8.8)
CVE-2025-6724
In Progress Chef Automate, versions earlier than 4.13.295, on Linux x86 platform, an authenticated attacker can gain access to Chef...
Vendor/s: Linux, Chef

Descrizione Completa

In Progress Chef Automate, versions earlier than 4.13.295, on Linux x86 platform, an authenticated attacker can gain access to Chef Automate restricted functionality in multiple services via improperly neutralized inputs used in an SQL command.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

Informazioni Aggiuntive

Pubblicato il: 29/09/2025 12:15:48
Ultima modifica: 29/09/2025 19:34:10

Fonti e Riferimenti

Vmware

HIGH (8.5)
CVE-2025-41250
VMware vCenter contains an SMTP header injection vulnerability. A malicious actor with non-administrative privileges on vCenter who has permission to create...
Vendor/s: Vmware

Descrizione Completa

VMware vCenter contains an SMTP header injection vulnerability. A malicious actor with non-administrative privileges on vCenter who has permission to create scheduled tasks may be able to manipulate the notification emails sent for scheduled tasks.

Metriche CVSS v3.1

  • Impatto: Confid.: NONE, Integ.: HIGH, Disp.: LOW
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L
  • Score Sfruttabilità/Impatto: 3.1 / 4.7

Informazioni Aggiuntive

Pubblicato il: 29/09/2025 18:15:31
Ultima modifica: 29/09/2025 19:34:10

Fonti e Riferimenti

Ibm

HIGH (8.8)
CVE-2025-36245
IBM InfoSphere 11.7.0.0 through 11.7.1.6 Information Server could allow an authenticated user to execute arbitrary commands with elevated privileges on...
Vendor/s: Ibm

Descrizione Completa

IBM InfoSphere 11.7.0.0 through 11.7.1.6 Information Server could allow an authenticated user to execute arbitrary commands with elevated privileges on the system due to improper validation of user supplied input.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

Informazioni Aggiuntive

Pubblicato il: 29/09/2025 23:15:30
Ultima modifica: 29/09/2025 23:15:30

Fonti e Riferimenti

28/09/2025

Unknown

HIGH (8.8)
CVE-2025-11123
A flaw has been found in Tenda AC18 15.03.05.19. This impacts an unknown function of the file /goform/saveAutoQos. This manipulation...
Vendor/s:

Descrizione Completa

A flaw has been found in Tenda AC18 15.03.05.19. This impacts an unknown function of the file /goform/saveAutoQos. This manipulation of the argument enable causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-11122
A vulnerability was detected in Tenda AC18 15.03.05.19. This affects an unknown function of the file /goform/WizardHandle. The manipulation of...
Vendor/s:

Descrizione Completa

A vulnerability was detected in Tenda AC18 15.03.05.19. This affects an unknown function of the file /goform/WizardHandle. The manipulation of the argument WANT/mtuvalue results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-11120
A weakness has been identified in Tenda AC8 16.03.34.06. The affected element is the function formSetServerConfig of the file /goform/SetServerConfig....
Vendor/s:

Descrizione Completa

A weakness has been identified in Tenda AC8 16.03.34.06. The affected element is the function formSetServerConfig of the file /goform/SetServerConfig. Executing manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-11117
A vulnerability was determined in Tenda CH22 1.0.0.1. This vulnerability affects the function formWrlExtraGet of the file /goform/GstDhcpSetSer. This manipulation...
Vendor/s:

Descrizione Completa

A vulnerability was determined in Tenda CH22 1.0.0.1. This vulnerability affects the function formWrlExtraGet of the file /goform/GstDhcpSetSer. This manipulation of the argument dips causes buffer overflow. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

Informazioni Aggiuntive

Pubblicato il: 28/09/2025 20:15:47
Ultima modifica: 29/09/2025 19:34:10

Fonti e Riferimenti

HIGH (8.8)
CVE-2025-11091
A security flaw has been discovered in Tenda AC21 up to 16.03.08.16. Affected by this vulnerability is the function sscanf...
Vendor/s:

Descrizione Completa

A security flaw has been discovered in Tenda AC21 up to 16.03.08.16. Affected by this vulnerability is the function sscanf of the file /goform/SetStaticRouteCfg. The manipulation of the argument list results in buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be exploited.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

27/09/2025

Unknown

HIGH (8.6)
CVE-2025-59932
Flag Forge is a Capture The Flag (CTF) platform. From versions 2.0.0 to before 2.3.1, the /api/resources endpoint previously allowed...
Vendor/s:

Descrizione Completa

Flag Forge is a Capture The Flag (CTF) platform. From versions 2.0.0 to before 2.3.1, the /api/resources endpoint previously allowed POST and DELETE requests without proper authentication or authorization. This could have enabled unauthorized users to create, modify, or delete resources on the platform. The issue has been fixed in FlagForge version 2.3.1.

Metriche CVSS v3.1

  • Impatto: Confid.: LOW, Integ.: HIGH, Disp.: LOW
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
  • Score Sfruttabilità/Impatto: 3.9 / 4.7

Informazioni Aggiuntive

Pubblicato il: 27/09/2025 01:15:43
Ultima modifica: 29/09/2025 19:34:10

Fonti e Riferimenti

CRITICAL (9.4)
CVE-2025-59936
get-jwks contains fetch utils for JWKS keys. In versions prior to 11.0.2, a vulnerability in get-jwks can lead to cache...
Vendor/s:

Descrizione Completa

get-jwks contains fetch utils for JWKS keys. In versions prior to 11.0.2, a vulnerability in get-jwks can lead to cache poisoning in the JWKS key-fetching mechanism. When the iss (issuer) claim is validated only after keys are retrieved from the cache, it is possible for cached keys from an unexpected issuer to be reused, resulting in a bypass of issuer validation. This design flaw enables a potential attack where a malicious actor crafts a pair of JWTs, the first one ensuring that a chosen public key is fetched and stored in the shared JWKS cache, and the second one leveraging that cached key to pass signature validation for a targeted iss value. The vulnerability will work only if the iss validation is done after the use of get-jwks for keys retrieval. This issue has been patched in version 11.0.2.

Metriche CVSS v3.0

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: LOW
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
  • Score Sfruttabilità/Impatto: 3.9 / 5.5

Informazioni Aggiuntive

Pubblicato il: 27/09/2025 01:15:43
Ultima modifica: 29/09/2025 19:34:10

Fonti e Riferimenti

HIGH (8.8)
CVE-2025-59939
WeGIA is a Web manager for charitable institutions. Prior to version 3.5.0, WeGIA is vulnerable to SQL Injection attacks in...
Vendor/s:

Descrizione Completa

WeGIA is a Web manager for charitable institutions. Prior to version 3.5.0, WeGIA is vulnerable to SQL Injection attacks in the control.php endpoint with the following parameters: nomeClasse=ProdutoControle&metodo=excluir&id_produto=[malicious command]. It is necessary to apply prepared statements methods, sanitization, and validations on theid_produto parameter. This issue has been patched in version 3.5.0.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

Informazioni Aggiuntive

Pubblicato il: 27/09/2025 01:15:43
Ultima modifica: 29/09/2025 19:34:10

Fonti e Riferimenti