Red Hot Cyber
La cybersecurity è condivisione. Riconosci il rischio, combattilo, condividi le tue esperienze ed incentiva gli altri a fare meglio di te.
Cerca
Crowdtour Promo Banner For Milan V1 970x120 Desktop
320×100

Lista CVE più critiche emesse negli ultimi 3 giorni

Di seguito sono riportate le vulnerabilità critiche pubblicate negli ultimi giorni dal National Vulnerability Database (NVD). Prestate massima attenzione per prevenire possibili sfruttamenti.
Ricerca singola vulnerabilità

20/10/2025

Unknown

CRITICAL (9.8)
CVE-2025-61932
Lanscope Endpoint Manager (On-Premises) (Client program (MR) and Detection agent (DA)) improperly verifies the origin of incoming requests, allowing an...
Vendor/s:

Descrizione Completa

Lanscope Endpoint Manager (On-Premises) (Client program (MR) and Detection agent (DA)) improperly verifies the origin of incoming requests, allowing an attacker to execute arbitrary code by sending specially crafted packets.

Metriche CVSS v3.0

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 20/10/2025 08:15:33
Ultima modifica: 20/10/2025 08:15:33

Fonti e Riferimenti

CRITICAL (9.8)
CVE-2025-11948
Document Management System developed by Excellent Infotek has an Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload and...
Vendor/s:

Descrizione Completa

Document Management System developed by Excellent Infotek has an Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 20/10/2025 04:15:36
Ultima modifica: 20/10/2025 04:15:36

Fonti e Riferimenti

18/10/2025

WordPress

CRITICAL (9.8)
CVE-2025-11391
The PPOM – Product Addons & Custom Fields for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due...
Vendor/s: WordPress

Descrizione Completa

The PPOM – Product Addons & Custom Fields for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image cropper functionality in all versions up to, and including, 33.0.15. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. While the vulnerable code is in the free version, this only affected users with the paid version of the software installed and activated.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9
CRITICAL (9.8)
CVE-2017-20208
The RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to PHP Object...
Vendor/s: WordPress, php

Descrizione Completa

The RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to PHP Object Injection in all versions up to 3.7.9.3 (exclusive) via deserialization of untrusted input from the is_expired_by_date() function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to fetch a remote file and install it on the site.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9
CRITICAL (9.8)
CVE-2017-20207
The Flickr Gallery plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.5.2 via...
Vendor/s: WordPress, php

Descrizione Completa

The Flickr Gallery plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.5.2 via deserialization of untrusted input from the `pager ` parameter. This allows unauthenticated attackers to inject a PHP Object. Attackers were actively exploiting this vulnerability with the WP_Theme() class to create backdoors.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9
CRITICAL (9.8)
CVE-2017-20206
The Appointments plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 2.2.1 via deserialization...
Vendor/s: WordPress, php

Descrizione Completa

The Appointments plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 2.2.1 via deserialization of untrusted input from the `wpmudev_appointments` cookie. This allows unauthenticated attackers to inject a PHP Object. Attackers were actively exploiting this vulnerability with the WP_Theme() class to create backdoors.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

php

CRITICAL (9.8)
CVE-2017-20208
The RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to PHP Object...
Vendor/s: WordPress, php

Descrizione Completa

The RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to PHP Object Injection in all versions up to 3.7.9.3 (exclusive) via deserialization of untrusted input from the is_expired_by_date() function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to fetch a remote file and install it on the site.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9
CRITICAL (9.8)
CVE-2017-20207
The Flickr Gallery plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.5.2 via...
Vendor/s: WordPress, php

Descrizione Completa

The Flickr Gallery plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.5.2 via deserialization of untrusted input from the `pager ` parameter. This allows unauthenticated attackers to inject a PHP Object. Attackers were actively exploiting this vulnerability with the WP_Theme() class to create backdoors.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9
CRITICAL (9.8)
CVE-2017-20206
The Appointments plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 2.2.1 via deserialization...
Vendor/s: WordPress, php

Descrizione Completa

The Appointments plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 2.2.1 via deserialization of untrusted input from the `wpmudev_appointments` cookie. This allows unauthenticated attackers to inject a PHP Object. Attackers were actively exploiting this vulnerability with the WP_Theme() class to create backdoors.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

17/10/2025

Unknown

CRITICAL (9.9)
CVE-2025-62645
The Restaurant Brands International (RBI) assistant platform through 2025-09-06 allows a remote authenticated attacker to obtain a token with administrative...
Vendor/s:

Descrizione Completa

The Restaurant Brands International (RBI) assistant platform through 2025-09-06 allows a remote authenticated attacker to obtain a token with administrative privileges for the entire platform via the createToken GraphQL mutation.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / LOW
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.1 / 6
CRITICAL (9.8)
CVE-2025-62515
pyquokka is a framework for making data lakes work for time series. In versions 0.3.1 and prior, the FlightServer class...
Vendor/s:

Descrizione Completa

pyquokka is a framework for making data lakes work for time series. In versions 0.3.1 and prior, the FlightServer class directly uses pickle.loads() to deserialize action bodies received from Flight clients without any sanitization or validation in the do_action() method. The vulnerable code is located in pyquokka/flight.py at line 283 where arbitrary data from Flight clients is directly passed to pickle.loads(). When FlightServer is configured to listen on 0.0.0.0, this allows attackers across the entire network to perform arbitrary remote code execution by sending malicious pickled payloads through the set_configs action. Additional vulnerability points exist in the cache_garbage_collect, do_put, and do_get functions where pickle.loads is used to deserialize untrusted remote data.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 17/10/2025 21:15:36
Ultima modifica: 17/10/2025 21:15:36

Fonti e Riferimenti

CRITICAL (9.8)
CVE-2025-56221
A lack of rate limiting in the login mechanism of SigningHub v8.6.8 allows attackers to bypass authentication via a brute...
Vendor/s:

Descrizione Completa

A lack of rate limiting in the login mechanism of SigningHub v8.6.8 allows attackers to bypass authentication via a brute force attack.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 17/10/2025 19:15:37
Ultima modifica: 17/10/2025 19:15:37

Fonti e Riferimenti

CRITICAL (10.0)
CVE-2025-62168
Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication...
Vendor/s:

Descrizione Completa

Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: NONE
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
  • Score Sfruttabilità/Impatto: 3.9 / 5.8

Informazioni Aggiuntive

Pubblicato il: 17/10/2025 17:15:49
Ultima modifica: 17/10/2025 17:15:49

Fonti e Riferimenti

CRITICAL (9.8)
CVE-2025-62353
A path traversal vulnerability in all versions of the Windsurf IDE enables a threat actor to read and write arbitrary...
Vendor/s:

Descrizione Completa

A path traversal vulnerability in all versions of the Windsurf IDE enables a threat actor to read and write arbitrary local files in and outside of current projects on an end user’s system. The vulnerability can be reached directly and through indirect prompt injection.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 17/10/2025 16:15:39
Ultima modifica: 17/10/2025 16:15:39

Fonti e Riferimenti

CRITICAL (9.8)
CVE-2025-49655
Deserialization of untrusted data can occur in versions of the Keras framework running versions 3.11.0 up to but not including...
Vendor/s:

Descrizione Completa

Deserialization of untrusted data can occur in versions of the Keras framework running versions 3.11.0 up to but not including 3.11.3, enabling a maliciously uploaded Keras file containing a TorchModuleWrapper class to run arbitrary code on an end user’s system when loaded despite safe mode being enabled. The vulnerability can be triggered through both local and remote files.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 17/10/2025 16:15:37
Ultima modifica: 17/10/2025 16:15:37

Fonti e Riferimenti

CRITICAL (9.8)
CVE-2023-28815
Some versions of Hikvision's iSecure Center Product contain insufficient parameter validation, resulting in a command injection vulnerability. Attackers may exploit...
Vendor/s:

Descrizione Completa

Some versions of Hikvision's iSecure Center Product contain insufficient parameter validation, resulting in a command injection vulnerability. Attackers may exploit this to gain platform privileges and execute arbitrary commands on the system.iSecure Center is software released for China's domestic market only, with no overseas release.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 17/10/2025 12:15:37
Ultima modifica: 17/10/2025 13:15:43

Fonti e Riferimenti

CRITICAL (9.8)
CVE-2023-28814
Some versions of Hikvision's iSecure Center Product have an improper file upload control vulnerability. Due to the improper verification of...
Vendor/s:

Descrizione Completa

Some versions of Hikvision's iSecure Center Product have an improper file upload control vulnerability. Due to the improper verification of file to be uploaded, attackers may upload malicious files to the server. iSecure Center is software released for China's domestic market only, with no overseas release.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 17/10/2025 11:15:33
Ultima modifica: 17/10/2025 13:15:43

Fonti e Riferimenti

CRITICAL (9.8)
CVE-2025-11900
The iSherlock developed by HGiga has an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands...
Vendor/s:

Descrizione Completa

The iSherlock developed by HGiga has an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server.

Metriche CVSS v3.1

  • Impatto: Confid.: HIGH, Integ.: HIGH, Disp.: HIGH
  • Vettore Attacco: NETWORK
  • Complessità Attacco: LOW
  • Interazione/Privilegi: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Score Sfruttabilità/Impatto: 3.9 / 5.9

Informazioni Aggiuntive

Pubblicato il: 17/10/2025 04:16:07
Ultima modifica: 17/10/2025 04:16:07

Fonti e Riferimenti