
Live CVE Feed
Curated from global sources like ENISA EUVD and CVE Details
- CVE-2025-10317 - Multiple Cross-Site Request Forgery in Quick.Cart
CVE ID : CVE-2025-10317Published : Oct. 30, 2025, 12:15 p.m. | 29 minutes agoDescription : Quick.Cart is vulnerable to Cross-Site Request Forgery in product creation functionality. Malicious attacker can craft special website, which when visited by the admin, will automatically send a POST request creating a malicious product with content defined by the attacker. This software does not implement any protection against this type of attack. All forms available in this software are potentially vulnerable.The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only version 6.7 was tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.Severity: 5.1 | MEDIUMVisit the link for more details, such as CVSS details, affected products, timeline, and more...
- CVE-2025-53880 - susemanager-tftpsync-recv allows arbitrary file creation and deletion due to path traversal
CVE ID : CVE-2025-53880Published : Oct. 30, 2025, 11:15 a.m. | 1 hour, 29 minutes agoDescription : A Path Traversal vulnerability in the tftpsync/add and tftpsync/delete scripts allows a remote attacker on an adjacent network to write or delete files on the filesystem with the privileges of the unprivileged wwwrun user. Although the endpoint is unauthenticated, access is restricted to a list of allowed IP addresses.Severity: 8.7 | HIGHVisit the link for more details, such as CVSS details, affected products, timeline, and more...
- CVE-2025-53883 - spacewalk-java has various XSS issues on search page
CVE ID : CVE-2025-53883Published : Oct. 30, 2025, 11:15 a.m. | 1 hour, 29 minutes agoDescription : A Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability allows attackers to run arbitrary javascript via a reflected XSS issue in the search fields.This issue affects Container suse/manager/5.0/x86_64/server:latest: from ? before 5.0.28-150600.3.36.8; SUSE Manager Server LTS 4.3: from ? before 4.3.88-150400.3.113.5.Severity: 9.3 | CRITICALVisit the link for more details, such as CVSS details, affected products, timeline, and more...
- CVE-2025-39663 - Cross Site Scripting through compromised remote site
CVE ID : CVE-2025-39663Published : Oct. 30, 2025, 11:15 a.m. | 1 hour, 29 minutes agoDescription : Cross-Site Scripting (XSS) vulnerability in Checkmk's distributed monitoring allows a compromised remote site to inject malicious HTML code into service outputs in the central site. Affecting Checkmk before 2.4.0p14, 2.3.0p39, 2.2.0 and 2.1.0 (eol).Severity: 8.5 | HIGHVisit the link for more details, such as CVSS details, affected products, timeline, and more...
- CVE-2025-54471 - NeuVector is shipping cryptographic material into its binary
CVE ID : CVE-2025-54471Published : Oct. 30, 2025, 10:15 a.m. | 2 hours, 29 minutes agoDescription : NeuVector used a hard-coded cryptographic key embedded in the source code. At compilation time, the key value was replaced with the secret key value and used to encrypt sensitive configurations when NeuVector stores the data.Severity: 6.5 | MEDIUMVisit the link for more details, such as CVSS details, affected products, timeline, and more...
- CVE-2025-54941 - Apache Airflow: Command injection in "example_dag_decorator"
CVE ID : CVE-2025-54941Published : Oct. 30, 2025, 10:15 a.m. | 2 hours, 29 minutes agoDescription : An example dag `example_dag_decorator` had non-validated parameter that allowed the UI user to redirect the example to a malicious server and execute code on worker. This however required that the example dags are enabled in production (not default) or the example dag code copied to build your own similar dag. If you used the `example_dag_decorator` please review it and apply the changes implemented in Airflow 3.0.5 accordingly.Severity: 0.0 | NAVisit the link for more details, such as CVSS details, affected products, timeline, and more...
- CVE-2025-62402 - Apache Airflow: Airflow 3 API: /api/v2/dagReports executes DAG Python in API
CVE ID : CVE-2025-62402Published : Oct. 30, 2025, 10:15 a.m. | 2 hours, 29 minutes agoDescription : API users via `/api/v2/dagReports` could perform Dag code execution in the context of the api-server if the api-server was deployed in the environment where Dag files were available.Severity: 0.0 | NAVisit the link for more details, such as CVSS details, affected products, timeline, and more...
- CVE-2025-62503 - Apache Airflow: Privilege boundary bypass in bulk APIs (create action can upsert existing Pools/Connections/Variables)
CVE ID : CVE-2025-62503Published : Oct. 30, 2025, 10:15 a.m. | 2 hours, 29 minutes agoDescription : User with CREATE and no UPDATE privilege for Pools, Connections, Variables could update existing records via bulk create API with overwrite action.Severity: 0.0 | NAVisit the link for more details, such as CVSS details, affected products, timeline, and more...
- CVE-2025-54470 - NeuVector telemetry sender is vulnerable to MITM and DoS
CVE ID : CVE-2025-54470Published : Oct. 30, 2025, 10:15 a.m. | 2 hours, 29 minutes agoDescription : This vulnerability affects NeuVector deployments only when the Report anonymous cluster data option is enabled. When this option is enabled, NeuVector sends anonymous telemetry data to the telemetry server.In affected versions, NeuVector does not enforce TLS certificate verification when transmitting anonymous cluster data to the telemetry server. As a result, the communication channel is susceptible to man-in-the-middle (MITM) attacks, where an attacker could intercept or modify the transmitted data. Additionally, NeuVector loads the response of the telemetry server is loaded into memory without size limitation, which makes it vulnerable to a Denial of Service(DoS) attackSeverity: 8.6 | HIGHVisit the link for more details, such as CVSS details, affected products, timeline, and more...
- CVE-2025-40099 - cifs: parse_dfs_referrals: prevent oob on malformed input
CVE ID : CVE-2025-40099Published : Oct. 30, 2025, 10:15 a.m. | 2 hours, 29 minutes agoDescription : In the Linux kernel, the following vulnerability has been resolved:cifs: parse_dfs_referrals: prevent oob on malformed inputMalicious SMB server can send invalid reply to FSCTL_DFS_GET_REFERRALS- reply smaller than sizeof(struct get_dfs_referral_rsp) - reply with number of referrals smaller than NumberOfReferrals in the headerProcessing of such replies will cause oob.Return -EINVAL error on such replies to prevent oob-s.Severity: 0.0 | NAVisit the link for more details, such as CVSS details, affected products, timeline, and more...
- From Domain User to SYSTEM: Analyzing the NTLM LDAP Authentication Bypass Vulnerability (CVE-2025-54918)on October 30, 2025 at 11:49 am
From Domain User to SYSTEM: Analyzing the NTLM LDAP Authentication Bypass Vulnerability (CVE-2025-54918) In September 2025, a critical vulnerability (CVE-2025-54918) was discovered affecting domain controllers running LDAP or LDAPS services. This vulnerability allows attackers to elevate privileges from ... Read more Published Date: Oct 30, 2025 (55 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-61882 CVE-2025-54918 CVE-2025-48384
- How Falcon Exposure Management’s ExPRT.AI Predicts What Attackers Will Exploiton October 30, 2025 at 11:49 am
How Falcon Exposure Management’s ExPRT.AI Predicts What Attackers Will Exploit Nearly 40,000 vulnerabilities were disclosed in 2024.1 Security teams are overwhelmed, especially those relying on outdated tools. ExPRT.AI, the native intelligence engine embedded in CrowdStrike Falc ... Read more Published Date: Oct 30, 2025 (55 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-61882 CVE-2025-54918 CVE-2025-48384 CVE-2025-4664
- Falcon Defends Against Git Vulnerability CVE-2025-48384on October 30, 2025 at 11:49 am
Falcon Defends Against Git Vulnerability CVE-2025-48384 CrowdStrike has identified active exploitation of Git vulnerability CVE-2025-48384. In the observed activity, threat actors combined sophisticated social engineering tactics with malicious Git reposit ... Read more Published Date: Oct 30, 2025 (55 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-61882 CVE-2025-54918 CVE-2025-48384
- Vulnerability in OpenSolution Quick.Cart softwareon October 30, 2025 at 10:55 am
Vulnerability in OpenSolution Quick.Cart software Vulnerability in OpenSolution Quick.Cart software CVE ID CVE-2025-10317 Publication date 30 October 2025 Vendor OpenSolution Product Quick.Cart Vulnerable versions 6.7 Vulnerability type (CWE) Cross-S ... Read more Published Date: Oct 30, 2025 (1 hour, 49 minutes ago) Vulnerabilities has been mentioned in this article.
- ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Risingon October 30, 2025 at 10:54 am
ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising The comfort zone in cybersecurity is gone. Attackers are scaling down, focusing tighter, and squeezing more value from fewer, high-impact targets. At the same time, defenders face growing blind spots ... Read more Published Date: Oct 30, 2025 (1 hour, 50 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-40778 CVE-2017-11882
- New Attack Combines Ghost SPNs and Kerberos Reflection to Elevate Privileges on SMB Serverson October 30, 2025 at 9:52 am
New Attack Combines Ghost SPNs and Kerberos Reflection to Elevate Privileges on SMB Servers A sophisticated privilege escalation vulnerability in Windows SMB servers, leveraging Ghost Service Principal Names (SPNs) and Kerberos authentication reflection to achieve remote SYSTEM-level access. ... Read more Published Date: Oct 30, 2025 (2 hours, 52 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-58726 CVE-2025-33073
- Blue TryHackMe Walkthroughon October 30, 2025 at 9:05 am
Blue TryHackMe Walkthrough 23 min readFeb 6, 2025Room link [TryHackMe]ReconnaissanceThe first phase of Hacking involves in gathering information about a target to identify the potential technologies used by the target, which co ... Read more Published Date: Oct 30, 2025 (3 hours, 39 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2017-0143 CVE-2012-1182
- Planning — HackTheBox Walkthroughon October 30, 2025 at 9:01 am
Planning — HackTheBox Walkthrough 6 min read4 days agoIntroductionPlanning is an Easy Linux machine on HackTheBox that covers key penetration testing techniques such as Grafana exploitation, container escape, and privilege escalation ... Read more Published Date: Oct 30, 2025 (3 hours, 43 minutes ago) Vulnerabilities has been mentioned in this article.
- VS verzoekt organisaties om op kwetsbare Windows-servers te controlerenon October 30, 2025 at 8:52 am
VS verzoekt organisaties om op kwetsbare Windows-servers te controleren Het cyberagentschap van de Amerikaanse overheid heeft organisaties opgeroepen om op kwetsbare Windows-servers te controleren. Aanleiding is actief misbruik van een kritieke kwetsbaarheid in de Windows ... Read more Published Date: Oct 30, 2025 (3 hours, 52 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-59287
- WordPress-sites aangevallen via kritieke kwetsbaarheid in plug-in Freeioon October 30, 2025 at 8:25 am
WordPress-sites aangevallen via kritieke kwetsbaarheid in plug-in Freeio WordPress-sites worden actief aangevallen via een kritieke kwetsbaarheid in de plug-in Freeio, zo laat securitybedrijf Wordfence weten. Freeio is een plug-in waarmee WordPress-sites zijn te veranderen ... Read more Published Date: Oct 30, 2025 (4 hours, 19 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-11533
- Microsoft Windows Cloud Files Minifilter Privilege Escalation Vulnerability Exploitedon October 30, 2025 at 8:21 am
Microsoft Windows Cloud Files Minifilter Privilege Escalation Vulnerability Exploited Microsoft has patched a critical race condition vulnerability in its Windows Cloud Files Minifilter driver, known as CVE-2025-55680, which enables local attackers to escalate privileges and create arb ... Read more Published Date: Oct 30, 2025 (4 hours, 23 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-55680 CVE-2020-17136
- Falcon Defends Against Git Vulnerability CVE-2025-48384on October 30, 2025 at 7:49 am
Falcon Defends Against Git Vulnerability CVE-2025-48384 CrowdStrike has identified active exploitation of Git vulnerability CVE-2025-48384. In the observed activity, threat actors combined sophisticated social engineering tactics with malicious Git reposit ... Read more Published Date: Oct 30, 2025 (4 hours, 55 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-61882 CVE-2025-54918 CVE-2025-48384
- From Domain User to SYSTEM: Analyzing the NTLM LDAP Authentication Bypass Vulnerability (CVE-2025-54918)on October 30, 2025 at 7:49 am
From Domain User to SYSTEM: Analyzing the NTLM LDAP Authentication Bypass Vulnerability (CVE-2025-54918) In September 2025, a critical vulnerability (CVE-2025-54918) was discovered affecting domain controllers running LDAP or LDAPS services. This vulnerability allows attackers to elevate privileges from ... Read more Published Date: Oct 30, 2025 (4 hours, 55 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-61882 CVE-2025-54918 CVE-2025-48384
- How Falcon Exposure Management’s ExPRT.AI Predicts What Attackers Will Exploiton October 30, 2025 at 7:49 am
How Falcon Exposure Management’s ExPRT.AI Predicts What Attackers Will Exploit Nearly 40,000 vulnerabilities were disclosed in 2024.1 Security teams are overwhelmed, especially those relying on outdated tools. ExPRT.AI, the native intelligence engine embedded in CrowdStrike Falc ... Read more Published Date: Oct 30, 2025 (4 hours, 55 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-61882 CVE-2025-54918 CVE-2025-48384 CVE-2025-4664
- Chrome 142 Released With Fix for 20 Vulnerabilities that Allows Malicious Code Executionon October 30, 2025 at 6:21 am
Chrome 142 Released With Fix for 20 Vulnerabilities that Allows Malicious Code Execution Google has officially promoted Chrome 142 to the stable channel, delivering critical security updates for Windows, Mac, and Linux users. The rollout begins immediately and will continue over the next ... Read more Published Date: Oct 30, 2025 (6 hours, 23 minutes ago) Vulnerabilities has been mentioned in this article.
- From Domain User to SYSTEM: Analyzing the NTLM LDAP Authentication Bypass Vulnerability (CVE-2025-54918)on October 30, 2025 at 5:49 am
From Domain User to SYSTEM: Analyzing the NTLM LDAP Authentication Bypass Vulnerability (CVE-2025-54918) In September 2025, a critical vulnerability (CVE-2025-54918) was discovered affecting domain controllers running LDAP or LDAPS services. This vulnerability allows attackers to elevate privileges from ... Read more Published Date: Oct 30, 2025 (6 hours, 55 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-61882 CVE-2025-54918 CVE-2025-48384
- How Falcon Exposure Management’s ExPRT.AI Predicts What Attackers Will Exploiton October 30, 2025 at 5:49 am
How Falcon Exposure Management’s ExPRT.AI Predicts What Attackers Will Exploit Nearly 40,000 vulnerabilities were disclosed in 2024.1 Security teams are overwhelmed, especially those relying on outdated tools. ExPRT.AI, the native intelligence engine embedded in CrowdStrike Falc ... Read more Published Date: Oct 30, 2025 (6 hours, 55 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-61882 CVE-2025-54918 CVE-2025-48384 CVE-2025-4664
- Falcon Defends Against Git Vulnerability CVE-2025-48384on October 30, 2025 at 5:49 am
Falcon Defends Against Git Vulnerability CVE-2025-48384 CrowdStrike has identified active exploitation of Git vulnerability CVE-2025-48384. In the observed activity, threat actors combined sophisticated social engineering tactics with malicious Git reposit ... Read more Published Date: Oct 30, 2025 (6 hours, 55 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-61882 CVE-2025-54918 CVE-2025-48384
- From Domain User to SYSTEM: Analyzing the NTLM LDAP Authentication Bypass Vulnerability (CVE-2025-54918)on October 30, 2025 at 3:49 am
From Domain User to SYSTEM: Analyzing the NTLM LDAP Authentication Bypass Vulnerability (CVE-2025-54918) In September 2025, a critical vulnerability (CVE-2025-54918) was discovered affecting domain controllers running LDAP or LDAPS services. This vulnerability allows attackers to elevate privileges from ... Read more Published Date: Oct 30, 2025 (8 hours, 55 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-61882 CVE-2025-54918 CVE-2025-48384
- How Falcon Exposure Management’s ExPRT.AI Predicts What Attackers Will Exploiton October 30, 2025 at 3:49 am
How Falcon Exposure Management’s ExPRT.AI Predicts What Attackers Will Exploit Nearly 40,000 vulnerabilities were disclosed in 2024.1 Security teams are overwhelmed, especially those relying on outdated tools. ExPRT.AI, the native intelligence engine embedded in CrowdStrike Falc ... Read more Published Date: Oct 30, 2025 (8 hours, 55 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-61882 CVE-2025-54918 CVE-2025-48384 CVE-2025-4664
- Falcon Defends Against Git Vulnerability CVE-2025-48384on October 30, 2025 at 3:49 am
Falcon Defends Against Git Vulnerability CVE-2025-48384 CrowdStrike has identified active exploitation of Git vulnerability CVE-2025-48384. In the observed activity, threat actors combined sophisticated social engineering tactics with malicious Git reposit ... Read more Published Date: Oct 30, 2025 (8 hours, 55 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-61882 CVE-2025-54918 CVE-2025-48384
- CISA Shares New Threat Detections for Actively Exploited WSUS Vulnerabilityon October 30, 2025 at 3:05 am
CISA Shares New Threat Detections for Actively Exploited WSUS Vulnerability In a critical update issued on October 29, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) has provided organizations with enhanced guidance on detecting and mitigating threat activi ... Read more Published Date: Oct 30, 2025 (9 hours, 39 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-59287
- OpenAI Releases GPT-OSS-SafeGuard Models for Customizable AI Safetyon October 30, 2025 at 2:38 am
OpenAI Releases GPT-OSS-SafeGuard Models for Customizable AI Safety Earlier in 2025, OpenAI released its own open-source artificial intelligence models, namely GPT-OSS-20B and GPT-OSS-120B, both of which demonstrated superior reasoning performance compared to many exi ... Read more Published Date: Oct 30, 2025 (10 hours, 6 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-11371 CVE-2025-54253 CVE-2025-27915 CVE-2024-0087
- Jenkins Faces Wave of Plugin Flaws, Including SAML Authentication Bypass (CVE-2025-64131)on October 30, 2025 at 2:08 am
Jenkins Faces Wave of Plugin Flaws, Including SAML Authentication Bypass (CVE-2025-64131) The Jenkins project has issued a major security advisory addressing a wave of vulnerabilities, including high-severity flaws that threaten the integrity and confidentiality of automation servers world ... Read more Published Date: Oct 30, 2025 (10 hours, 36 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-11232 CVE-2025-64150 CVE-2025-64149 CVE-2025-64148 CVE-2025-64147 CVE-2025-64143 CVE-2025-64140 CVE-2025-64134 CVE-2025-64133 CVE-2025-64132 CVE-2025-64131 CVE-2025-11371 CVE-2025-54253 CVE-2025-27915 CVE-2024-23897 CVE-2023-43495
- ISC Patches High-Severity Kea DHCPv4 DoS (CVE-2025-11232) Flaw, Allows Crash via Malformed Hostnameon October 30, 2025 at 1:54 am
ISC Patches High-Severity Kea DHCPv4 DoS (CVE-2025-11232) Flaw, Allows Crash via Malformed Hostname The Internet Systems Consortium (ISC) has issued a security advisory warning users of a denial-of-service (DoS) vulnerability in the Kea DHCPv4 server. Tracked as CVE-2025-11232 and rated CVSS 7.5 (Hi ... Read more Published Date: Oct 30, 2025 (10 hours, 50 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-11232 CVE-2025-64131 CVE-2025-11533 CVE-2025-11371 CVE-2025-40779 CVE-2025-54253 CVE-2025-27915 CVE-2024-12705 CVE-2024-11187 CVE-2024-28872
severity high
- CVE-2025-53880 - susemanager-tftpsync-recv allows arbitrary file creation and deletion due to path traversal
CVE ID : CVE-2025-53880Published : Oct. 30, 2025, 11:15 a.m. | 33 minutes agoDescription : A Path Traversal vulnerability in the tftpsync/add and tftpsync/delete scripts allows a remote attacker on an adjacent network to write or delete files on the filesystem with the privileges of the unprivileged wwwrun user. Although the endpoint is unauthenticated, access is restricted to a list of allowed IP addresses.Severity: 8.7 | HIGHVisit the link for more details, such as CVSS details, affected products, timeline, and more...
- CVE-2025-53883 - spacewalk-java has various XSS issues on search page
CVE ID : CVE-2025-53883Published : Oct. 30, 2025, 11:15 a.m. | 33 minutes agoDescription : A Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability allows attackers to run arbitrary javascript via a reflected XSS issue in the search fields.This issue affects Container suse/manager/5.0/x86_64/server:latest: from ? before 5.0.28-150600.3.36.8; SUSE Manager Server LTS 4.3: from ? before 4.3.88-150400.3.113.5.Severity: 9.3 | CRITICALVisit the link for more details, such as CVSS details, affected products, timeline, and more...
- CVE-2025-39663 - Cross Site Scripting through compromised remote site
CVE ID : CVE-2025-39663Published : Oct. 30, 2025, 11:15 a.m. | 33 minutes agoDescription : Cross-Site Scripting (XSS) vulnerability in Checkmk's distributed monitoring allows a compromised remote site to inject malicious HTML code into service outputs in the central site. Affecting Checkmk before 2.4.0p14, 2.3.0p39, 2.2.0 and 2.1.0 (eol).Severity: 8.5 | HIGHVisit the link for more details, such as CVSS details, affected products, timeline, and more...
- CVE-2025-54470 - NeuVector telemetry sender is vulnerable to MITM and DoS
CVE ID : CVE-2025-54470Published : Oct. 30, 2025, 10:15 a.m. | 1 hour, 33 minutes agoDescription : This vulnerability affects NeuVector deployments only when the Report anonymous cluster data option is enabled. When this option is enabled, NeuVector sends anonymous telemetry data to the telemetry server.In affected versions, NeuVector does not enforce TLS certificate verification when transmitting anonymous cluster data to the telemetry server. As a result, the communication channel is susceptible to man-in-the-middle (MITM) attacks, where an attacker could intercept or modify the transmitted data. Additionally, NeuVector loads the response of the telemetry server is loaded into memory without size limitation, which makes it vulnerable to a Denial of Service(DoS) attackSeverity: 8.6 | HIGHVisit the link for more details, such as CVSS details, affected products, timeline, and more...
- CVE-2025-54469 - NeuVector Enforcer is vulnerable to Command Injection and Buffer overflow
CVE ID : CVE-2025-54469Published : Oct. 30, 2025, 10:15 a.m. | 1 hour, 33 minutes agoDescription : A vulnerability was identified in NeuVector, where the enforcer used environment variables CLUSTER_RPC_PORT and CLUSTER_LAN_PORT to generate a command to be executed via popen, without first sanitising their values.The entry process of the enforcer container is the monitor process. When the enforcer container stops, the monitor process checks whether the consul subprocess has exited. To perform this check, the monitor process uses the popen function to execute a shell command that determines whether the ports used by the consul subprocess are still active.The values of environment variables CLUSTER_RPC_PORT and CLUSTER_LAN_PORT are used directly to compose shell commands via popen without validation or sanitization. This behavior could allow a malicious user to inject malicious commands through these variables within the enforcer container.Severity: 9.9 | CRITICALVisit the link for more details, such as CVSS details, affected products, timeline, and more...
- CVE-2025-54459 - Vertikal Systems Hospital Manager Backend Services Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE ID : CVE-2025-54459Published : Oct. 29, 2025, 10:15 p.m. | 13 hours, 33 minutes agoDescription : Prior to September 19, 2025, the Hospital Manager Backend Services exposed the ASP.NET tracing endpoint /trace.axd without authentication, allowing a remote attacker to obtain live request traces and sensitive information such as request metadata, session identifiers, authorization headers, server variables, and internal file paths.Severity: 8.7 | HIGHVisit the link for more details, such as CVSS details, affected products, timeline, and more...
- CVE-2025-11200 - MLflow Weak Password Requirements Authentication Bypass Vulnerability
CVE ID : CVE-2025-11200Published : Oct. 29, 2025, 8:15 p.m. | 15 hours, 33 minutes agoDescription : MLflow Weak Password Requirements Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of passwords. The issue results from weak password requirements. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26916.Severity: 8.1 | HIGHVisit the link for more details, such as CVSS details, affected products, timeline, and more...
- CVE-2025-11201 - MLflow Tracking Server Model Creation Directory Traversal Remote Code Execution Vulnerability
CVE ID : CVE-2025-11201Published : Oct. 29, 2025, 8:15 p.m. | 15 hours, 33 minutes agoDescription : MLflow Tracking Server Model Creation Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflow Tracking Server. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of model file paths. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-26921.Severity: 8.1 | HIGHVisit the link for more details, such as CVSS details, affected products, timeline, and more...
- CVE-2025-11202 - win-cli-mcp-server resolveCommandPath Command Injection Remote Code Execution Vulnerability
CVE ID : CVE-2025-11202Published : Oct. 29, 2025, 8:15 p.m. | 15 hours, 33 minutes agoDescription : win-cli-mcp-server resolveCommandPath Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of win-cli-mcp-server. Authentication is not required to exploit this vulnerability.The specific flaw exists within the implementation of the resolveCommandPath method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-27787.Severity: 9.8 | CRITICALVisit the link for more details, such as CVSS details, affected products, timeline, and more...
- CVE-2025-64103 - Zitadel Bypass Second Authentication Factor
CVE ID : CVE-2025-64103Published : Oct. 29, 2025, 7:15 p.m. | 16 hours, 33 minutes agoDescription : Starting from 2.53.6, 2.54.3, and 2.55.0, Zitadel only required multi factor authentication in case the login policy has either enabled requireMFA or requireMFAForLocalUsers. If a user has set up MFA without this requirement, Zitadel would consider single factor auhtenticated sessions as valid as well and not require multiple factors. Bypassing second authentication factors weakens multifactor authentication and enables attackers to bypass the more secure factor. An attacker can target the TOTP code alone, only six digits, bypassing password verification entirely and potentially compromising accounts with 2FA enabled. This vulnerability is fixed in 4.6.0, 3.4.3, and 2.71.18.Severity: 8.7 | HIGHVisit the link for more details, such as CVSS details, affected products, timeline, and more...
NEWS Events
- CAISI Evaluation of DeepSeek AI Models Finds Shortcomings and Risks
The Center for AI Standards and Innovation at NIST evaluated several leading models from DeepSeek, an AI company based in the People’s Republic of China.
- NIST Engineers Design 5 New Ways to Connect Concrete Pieces for More Resilient Buildings
One of the biggest challenges with precast concrete is connecting the concrete pieces at a job site.
- NIST Issues Broad Agency Announcement for Proposals to Advance Microelectronics Technologies
The CHIPS for America funding opportunity will support critical research, prototyping and commercial solutions that advance microelectronics technology in the United States.
- NIST Awards More Than $3 Million to Support Cybersecurity Workforce Development Across 13 States
There are currently more than 514,000 cybersecurity job openings in the U.S.
- In Quantum Sensing, What Beats Beating Noise? Meeting Noise Halfway.
A team including scientists at NIST may have found a new way of dealing with noise at the microscopic scales where quantum physics reigns.
- Champlain Towers South Investigation Nears Completion of Technical Work
Investigators share likely failure scenarios, advance indicators of building’s distress.
- NIST’s ‘Living Reference Material’ Could Accelerate R&D of Lifesaving Biological Drugs
The NIST reference material, called NISTCHO, will help the biopharmaceutical industry develop new drugs more quickly and ensure that they are safe and effective.
- Some Air Cleaners Release Harmful By-Products. Now We Have a Way to Measure Them.
Many types of air cleaners can generate small amounts of air pollution. Until now, there was no standard way to measure these negative by-products.
- NIST Revises Security and Privacy Control Catalog to Improve Software Update and Patch Releases
The catalog revision is part of NIST’s response to a recent executive order on strengthening the nation’s cybersecurity.
- New Technique for Measuring DNA Damage Could Improve Cancer Therapy and Radiological Emergency Response
The technology, which may someday be as portable as a smartphone, promises faster and more accurate measurements of radiation exposure, potentially saving lives in critical situations.


