Red Hot Cyber
La cybersecurity è condivisione. Riconosci il rischio, combattilo, condividi le tue esperienze ed incentiva gli altri a fare meglio di te.
Cerca
Red Hot Cyber Academy

Lista CVE più critiche emesse negli ultimi 3 giorni

Di seguito sono riportate le vulnerabilità critiche pubblicate negli ultimi giorni dal National Vulnerability Database (NVD). Prestate massima attenzione per prevenire possibili sfruttamenti.
Ricerca singola vulnerabilità

07/10/2025

Unknown

HIGH (8.8)
CVE-2025-11355
A vulnerability has been found in UTT 1250GW up to v2v3.2.2-200710. Affected by this vulnerability is the function strcpy of...
Vendor/s:

Descrizione Completa

A vulnerability has been found in UTT 1250GW up to v2v3.2.2-200710. Affected by this vulnerability is the function strcpy of the file /goform/aspChangeChannel. The manipulation of the argument pvid leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-11356
A vulnerability was found in Tenda AC23 up to 16.03.07.52. Affected by this issue is the function sscanf of the...
Vendor/s:

Descrizione Completa

A vulnerability was found in Tenda AC23 up to 16.03.07.52. Affected by this issue is the function sscanf of the file /goform/SetStaticRouteCfg. The manipulation of the argument list results in buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

Informazioni Aggiuntive

Pubblicato il: 07/10/2025 07:15:44
Ultima modifica: 07/10/2025 07:15:44

Fonti e Riferimenti

06/10/2025

Unknown

CRITICAL (9.8)
CVE-2025-57515
A SQL injection vulnerability has been identified in Uniclare Student Portal v2. This flaw allows remote attackers to inject arbitrary...
Vendor/s:

Descrizione Completa

A SQL injection vulnerability has been identified in Uniclare Student Portal v2. This flaw allows remote attackers to inject arbitrary SQL commands via vulnerable input fields, enabling the execution of time-delay functions to infer database responses.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 06/10/2025 18:15:51
Ultima modifica: 06/10/2025 20:15:35

Fonti e Riferimenti

CRITICAL (9.4)
CVE-2025-61777
Flag Forge is a Capture The Flag (CTF) platform. Starting in version 2.0.0 and prior to version 2.3.2, the `/api/admin/badge-templates`...
Vendor/s:

Descrizione Completa

Flag Forge is a Capture The Flag (CTF) platform. Starting in version 2.0.0 and prior to version 2.3.2, the `/api/admin/badge-templates` (GET) and `/api/admin/badge-templates/create` (POST) endpoints previously allowed access without authentication or authorization. This could have enabled unauthorized users to retrieve all badge templates and sensitive metadata (createdBy, createdAt, updatedAt) and/or create arbitrary badge templates in the database. This could lead to data exposure, database pollution, or abuse of the badge system. The issue has been fixed in FlagForge v2.3.2. GET, POST, UPDATE, and DELETE endpoints now require authentication. Authorization checks ensure only admins can access and modify badge templates. No reliable workarounds are available.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: LOW
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
  • Score Sfruttabilità/Impatto: 3.9 / 5.5
CRITICAL (9.1)
CVE-2025-60964
OS Command Injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to...
Vendor/s:

Descrizione Completa

OS Command Injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to execute arbitrary code, cause a denial of service, gain escalated privileges, gain sensitive information, and possibly other unspecified impacts.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / HIGH
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.3 / 6

Informazioni Aggiuntive

Pubblicato il: 06/10/2025 17:16:07
Ultima modifica: 06/10/2025 18:15:52

Fonti e Riferimenti

CRITICAL (9.1)
CVE-2025-60965
OS Command Injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to...
Vendor/s:

Descrizione Completa

OS Command Injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to execute arbitrary code, cause a denial of service, gain escalated privileges, gain sensitive information, and possibly other unspecified impacts.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / HIGH
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.3 / 6

Informazioni Aggiuntive

Pubblicato il: 06/10/2025 17:16:07
Ultima modifica: 06/10/2025 18:15:52

Fonti e Riferimenti

CRITICAL (9.9)
CVE-2025-60957
OS Command Injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to...
Vendor/s:

Descrizione Completa

OS Command Injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to execute arbitrary code, cause a denial of service, gain escalated privileges, and gain sensitive information.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.1 / 6

Informazioni Aggiuntive

Pubblicato il: 06/10/2025 17:16:06
Ultima modifica: 06/10/2025 18:15:51

Fonti e Riferimenti

CRITICAL (9.1)
CVE-2025-57247
The BATBToken smart contract (address 0xfbf1388408670c02f0dbbb74251d8ded1d63b7a2, Compiler Version v0.8.26+commit.8a97fa7a) contains incorrect access control implementation in whitelist management functions. The setColdWhiteList()...
Vendor/s:

Descrizione Completa

The BATBToken smart contract (address 0xfbf1388408670c02f0dbbb74251d8ded1d63b7a2, Compiler Version v0.8.26+commit.8a97fa7a) contains incorrect access control implementation in whitelist management functions. The setColdWhiteList() and setSpecialAddress() functions in the base ERC20 contract are declared as public without proper access control modifiers, allowing any user to bypass transfer restrictions and manipulate special address settings. This enables unauthorized users to circumvent cold time transfer restrictions and potentially disrupt dividend distribution mechanisms, leading to privilege escalation and violation of the contract's intended tokenomics.

Metriche CVSS v3.1

  • Impatto: Confid.: NONE, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.2

Informazioni Aggiuntive

Pubblicato il: 06/10/2025 17:16:05
Ultima modifica: 06/10/2025 18:15:51

Fonti e Riferimenti

CRITICAL (9.6)
CVE-2025-59159
SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation...
Vendor/s:

Descrizione Completa

SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. In versions prior to 1.13.4, the web user interface for SillyTavern is susceptible to DNS rebinding, allowing attackers to perform actions like install malicious extensions, read chats, inject arbitrary HTML for phishing attacks, etc. The vulnerability has been patched in the version 1.13.4 by introducing a server configuration setting that enables a validation of host names in inbound HTTP requests according to the provided list of allowed hosts: `hostWhitelist.enabled` in config.yaml file or `SILLYTAVERN_HOSTWHITELIST_ENABLED` environment variable. While the setting is disabled by default to honor a wide variety of existing user configurations and maintain backwards compatibility, existing and new users are encouraged to review their server configurations and apply necessary changes to their setup, especially if hosting over the local network while not using SSL.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: REQUIRED / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 6
HIGH (8.9)
CVE-2025-61197
An issue in Orban Optimod 5950, Optimod 5950HD, Optimod 5750, Optimod 5750HD, Optimod Trio Optimod version 1.0.0.33 - System version...
Vendor/s:

Descrizione Completa

An issue in Orban Optimod 5950, Optimod 5950HD, Optimod 5750, Optimod 5750HD, Optimod Trio Optimod version 1.0.0.33 - System version 2.5.26 allows a remote attacker to escalate privileges via the application stores user privilege/role information in client-side browser storage

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: LOW
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: REQUIRED / LOW
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L
  • Score Sfruttabilità/Impatto: 2.3 / 6

Informazioni Aggiuntive

Pubblicato il: 06/10/2025 14:15:42
Ultima modifica: 06/10/2025 15:16:04

Fonti e Riferimenti

HIGH (8.8)
CVE-2025-11328
A vulnerability was detected in Tenda AC18 15.03.05.19(6318). This issue affects some unknown processing of the file /goform/SetDDNSCfg. The manipulation...
Vendor/s:

Descrizione Completa

A vulnerability was detected in Tenda AC18 15.03.05.19(6318). This issue affects some unknown processing of the file /goform/SetDDNSCfg. The manipulation of the argument ddnsEn results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-11327
A security vulnerability has been detected in Tenda AC18 15.03.05.19(6318). This vulnerability affects unknown code of the file /goform/SetUpnpCfg. The...
Vendor/s:

Descrizione Completa

A security vulnerability has been detected in Tenda AC18 15.03.05.19(6318). This vulnerability affects unknown code of the file /goform/SetUpnpCfg. The manipulation of the argument upnpEn leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-11326
A weakness has been identified in Tenda AC18 15.03.05.19(6318). This affects an unknown part of the file /goform/WifiMacFilterSet. Executing manipulation...
Vendor/s:

Descrizione Completa

A weakness has been identified in Tenda AC18 15.03.05.19(6318). This affects an unknown part of the file /goform/WifiMacFilterSet. Executing manipulation of the argument wifi_chkHz can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be exploited.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-11324
A vulnerability was identified in Tenda AC18 15.03.05.19(6318). Affected by this vulnerability is an unknown functionality of the file /goform/setNotUpgrade....
Vendor/s:

Descrizione Completa

A vulnerability was identified in Tenda AC18 15.03.05.19(6318). Affected by this vulnerability is an unknown functionality of the file /goform/setNotUpgrade. Such manipulation of the argument newVersion leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-11325
A security flaw has been discovered in Tenda AC18 15.03.05.19(6318). Affected by this issue is some unknown functionality of the...
Vendor/s:

Descrizione Completa

A security flaw has been discovered in Tenda AC18 15.03.05.19(6318). Affected by this issue is some unknown functionality of the file /goform/fast_setting_pppoe_set. Performing manipulation of the argument Username results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-11323
A vulnerability was determined in UTT 1250GW up to v2v3.2.2-200710. Affected is the function strcpy of the file /goform/formUserStatusRemark. This...
Vendor/s:

Descrizione Completa

A vulnerability was determined in UTT 1250GW up to v2v3.2.2-200710. Affected is the function strcpy of the file /goform/formUserStatusRemark. This manipulation of the argument Username causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

Informazioni Aggiuntive

Pubblicato il: 06/10/2025 06:15:35
Ultima modifica: 06/10/2025 14:56:21

Fonti e Riferimenti

Ibm

HIGH (8.5)
CVE-2025-36355
IBM Security Verify Access and IBM Security Verify Access Docker 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 could allow a...
Vendor/s: Ibm, Docker

Descrizione Completa

IBM Security Verify Access and IBM Security Verify Access Docker 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 could allow a locally authenticated user to execute malicious scripts from outside of its control sphere.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: LOW, Disp.: LOW
  • Vettore Attacco: LOCAL
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
  • Score Sfruttabilità/Impatto: 2.5 / 5.3

Informazioni Aggiuntive

Pubblicato il: 06/10/2025 17:16:05
Ultima modifica: 06/10/2025 17:16:05

Fonti e Riferimenti

CRITICAL (9.3)
CVE-2025-36356
IBM Security Verify Access and IBM Security Verify Access Docker 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 could allow a...
Vendor/s: Ibm, Docker

Descrizione Completa

IBM Security Verify Access and IBM Security Verify Access Docker 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 could allow a locally authenticated user to escalate their privileges to root due to execution with more privileges than required.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: LOCAL
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.5 / 6

Informazioni Aggiuntive

Pubblicato il: 06/10/2025 17:16:05
Ultima modifica: 06/10/2025 17:16:05

Fonti e Riferimenti

CRITICAL (9.8)
CVE-2023-49886
IBM Standards Processing Engine 10.0.1.10 could allow a remote attacker to execute arbitrary code on the system, caused by an...
Vendor/s: Ibm

Descrizione Completa

IBM Standards Processing Engine 10.0.1.10 could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe java deserialization. By sending specially crafted input, an attacker could exploit this vulnerability to execute arbitrary code on the system.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 06/10/2025 15:16:01
Ultima modifica: 06/10/2025 15:16:01

Fonti e Riferimenti

D-link

HIGH (8.8)
CVE-2025-11339
A vulnerability has been found in D-Link DI-7100G C1 up to 20250928. This issue affects the function sub_4BD4F8 of the...
Vendor/s: D-link

Descrizione Completa

A vulnerability has been found in D-Link DI-7100G C1 up to 20250928. This issue affects the function sub_4BD4F8 of the file /webchat/hi_block.asp of the component jhttpd. The manipulation of the argument popupId leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-11338
A flaw has been found in D-Link DI-7100G C1 up to 20250928. This vulnerability affects the function sub_4C0990 of the...
Vendor/s: D-link

Descrizione Completa

A flaw has been found in D-Link DI-7100G C1 up to 20250928. This vulnerability affects the function sub_4C0990 of the file /webchat/login.cgi of the component jhttpd. Executing manipulation of the argument openid can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

Informazioni Aggiuntive

Pubblicato il: 06/10/2025 16:15:33
Ultima modifica: 06/10/2025 16:15:33

Fonti e Riferimenti

Docker

HIGH (8.5)
CVE-2025-36355
IBM Security Verify Access and IBM Security Verify Access Docker 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 could allow a...
Vendor/s: Ibm, Docker

Descrizione Completa

IBM Security Verify Access and IBM Security Verify Access Docker 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 could allow a locally authenticated user to execute malicious scripts from outside of its control sphere.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: LOW, Disp.: LOW
  • Vettore Attacco: LOCAL
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
  • Score Sfruttabilità/Impatto: 2.5 / 5.3

Informazioni Aggiuntive

Pubblicato il: 06/10/2025 17:16:05
Ultima modifica: 06/10/2025 17:16:05

Fonti e Riferimenti

CRITICAL (9.3)
CVE-2025-36356
IBM Security Verify Access and IBM Security Verify Access Docker 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 could allow a...
Vendor/s: Ibm, Docker

Descrizione Completa

IBM Security Verify Access and IBM Security Verify Access Docker 10.0.0.0 through 10.0.9.0 and 11.0.0.0 through 11.0.1.0 could allow a locally authenticated user to escalate their privileges to root due to execution with more privileges than required.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: LOCAL
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.5 / 6

Informazioni Aggiuntive

Pubblicato il: 06/10/2025 17:16:05
Ultima modifica: 06/10/2025 17:16:05

Fonti e Riferimenti

05/10/2025

Oracle

CRITICAL (9.8)
CVE-2025-61882
Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business Suite (component: BI Publisher Integration). Supported versions that are...
Vendor/s: Oracle

Descrizione Completa

Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business Suite (component: BI Publisher Integration). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks of this vulnerability can result in takeover of Oracle Concurrent Processing. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Unknown

HIGH (8.8)
CVE-2025-11305
A vulnerability has been found in UTT HiPER 840G up to 3.1.1-190328. Affected by this issue is the function strcpy...
Vendor/s:

Descrizione Completa

A vulnerability has been found in UTT HiPER 840G up to 3.1.1-190328. Affected by this issue is the function strcpy of the file /goform/formTaskEdit. The manipulation of the argument txtMin2 leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-11302
A security vulnerability has been detected in Belkin F9K1015 1.00.10. This impacts an unknown function of the file /goform/formWpsStart. Such...
Vendor/s:

Descrizione Completa

A security vulnerability has been detected in Belkin F9K1015 1.00.10. This impacts an unknown function of the file /goform/formWpsStart. Such manipulation of the argument pinCode leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-11301
A weakness has been identified in Belkin F9K1015 1.00.10. This affects an unknown function of the file /goform/formWlanSetupWPS. This manipulation...
Vendor/s:

Descrizione Completa

A weakness has been identified in Belkin F9K1015 1.00.10. This affects an unknown function of the file /goform/formWlanSetupWPS. This manipulation of the argument webpage causes buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-11300
A security flaw has been discovered in Belkin F9K1015 1.00.10. The impacted element is an unknown function of the file...
Vendor/s:

Descrizione Completa

A security flaw has been discovered in Belkin F9K1015 1.00.10. The impacted element is an unknown function of the file /goform/formWlanMP. The manipulation of the argument ateFunc results in buffer overflow. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-11299
A vulnerability was identified in Belkin F9K1015 1.00.10. The affected element is an unknown function of the file /goform/formWanTcpipSetup. The...
Vendor/s:

Descrizione Completa

A vulnerability was identified in Belkin F9K1015 1.00.10. The affected element is an unknown function of the file /goform/formWanTcpipSetup. The manipulation of the argument pppUserName leads to buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-11297
A vulnerability was found in Belkin F9K1015 1.00.10. This issue affects some unknown processing of the file /goform/formSetLanguage. Performing manipulation...
Vendor/s:

Descrizione Completa

A vulnerability was found in Belkin F9K1015 1.00.10. This issue affects some unknown processing of the file /goform/formSetLanguage. Performing manipulation of the argument webpage results in buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-11296
A vulnerability has been found in Belkin F9K1015 1.00.10. This vulnerability affects unknown code of the file /goform/formPPTPSetup. Such manipulation...
Vendor/s:

Descrizione Completa

A vulnerability has been found in Belkin F9K1015 1.00.10. This vulnerability affects unknown code of the file /goform/formPPTPSetup. Such manipulation of the argument pptpUserName leads to buffer overflow. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-11295
A flaw has been found in Belkin F9K1015 1.00.10. This affects an unknown part of the file /goform/formPPPoESetup. This manipulation...
Vendor/s:

Descrizione Completa

A flaw has been found in Belkin F9K1015 1.00.10. This affects an unknown part of the file /goform/formPPPoESetup. This manipulation of the argument pppUserName causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-11294
A vulnerability was detected in Belkin F9K1015 1.00.10. Affected by this issue is some unknown functionality of the file /goform/formL2TPSetup....
Vendor/s:

Descrizione Completa

A vulnerability was detected in Belkin F9K1015 1.00.10. Affected by this issue is some unknown functionality of the file /goform/formL2TPSetup. The manipulation of the argument L2TPUserName results in buffer overflow. The attack may be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9
HIGH (8.8)
CVE-2025-11293
A security vulnerability has been detected in Belkin F9K1015 1.00.10. Affected by this vulnerability is an unknown functionality of the...
Vendor/s:

Descrizione Completa

A security vulnerability has been detected in Belkin F9K1015 1.00.10. Affected by this vulnerability is an unknown functionality of the file /goform/formConnectionSetting. The manipulation of the argument max_Conn leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 2.8 / 5.9

04/10/2025

WordPress

CRITICAL (9.8)
CVE-2025-9485
The OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is vulnerable to Improper Verification of Cryptographic Signature...
Vendor/s: WordPress

Descrizione Completa

The OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is vulnerable to Improper Verification of Cryptographic Signature in versions up to, and including, 6.26.12. This is due to the plugin performing unsafe JWT token processing without verification or validation in the `get_resource_owner_from_id_token` function. This makes it possible for unauthenticated attackers to bypass authentication and gain access to any existing user account - including administrators in certain configurations - or to create arbitrary subscriber-level accounts.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9