Cette page présente les vulnérabilités les plus discutées sur les sources publiques (Fediverse, Bluesky, GitHub, blogs) sur la période analysée.
Période analysée : 2025-12-01 → 2026-01-01.
Les données sont collectées via Vulnerability-Lookup (CIRCL) et enrichies automatiquement afin d’aider à la priorisation de la veille et de la remédiation.
📌 Légende :
- CVSS : score officiel de sévérité technique.
- EPSS : probabilité d’exploitation observée.
- VLAI : estimation de sévérité basée sur une analyse IA du contenu de la vulnérabilité.
- CISA KEV : vulnérabilité activement exploitée selon la CISA.
- seen / exploited : signaux observés dans les sources publiques.
CVE-2025-55182
Explications des termes
- Pré-authentification : l’attaque peut réussir sans compte ni connexion préalable.
- RCE (Remote Code Execution) : capacité à exécuter du code arbitraire sur le serveur à distance.
- Désérialisation : conversion de données reçues (ex. via HTTP) en objets/structures internes ; si elle est “unsafe”, elle peut être détournée.
- Payload : contenu malveillant inséré dans une requête pour déclencher le comportement vulnérable.
- Endpoint : URL/point d’entrée d’une API ou d’une fonctionnalité accessible via HTTP.
- React Server Components : fonctionnalité de React permettant d’exécuter une partie du rendu côté serveur.
Description originale (EN)
A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.
Posts / Sources (80)
https://bsky.app/profile/securityrss.bsky.social/post/3mbjoidwiad2b
https://bsky.app/profile/getpokemon7.bsky.social/post/3mbioeqxlos2q
https://bsky.app/profile/getpokemon7.bsky.social/post/3mbikve7ovs2q
https://bsky.app/profile/getpokemon7.bsky.social/post/3mbi3hmyxck2q
https://bsky.app/profile/getpokemon7.bsky.social/post/3mbi232yb7k2q
https://bsky.app/profile/hacker.at.thenote.app/post/3mbht3ytbjs2o
https://infosec.exchange/users/edwardk/statuses/115825698178695411
https://gist.github.com/Shreyas-gowdru/9e6a92a4ebeb9820d77e4b6aa61dc715
https://threatintel.cc/2026/01/02/rondodox-botnet-exploits-reactshell.html
https://bsky.app/profile/guardian360.bsky.social/post/3mbgerdjjwb2p
https://bsky.app/profile/pmloik.bsky.social/post/3mbftqanq7x2d
The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-02)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-02)
https://bsky.app/profile/hacker.at.thenote.app/post/3mbfde6jc7c2o
https://bsky.app/profile/infosecbriefly.bsky.social/post/3mbe5ahiqw22m
https://thehackernews.com/2026/01/rondodox-botnet-exploits-critical.html
https://bsky.app/profile/pmloik.bsky.social/post/3mbddfmocjv2p
The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-01)
The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-01)
https://bsky.app/profile/llarisah.bsky.social/post/3mbcm3hclqk2g
https://bsky.app/profile/TheDoctor512.mastodon.social.ap.brid.gy/post/3mbcapkv5ugc2
https://bsky.app/profile/bleepingcomputer.com/post/3mbc4vv3ctt2l
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-31)
https://gist.github.com/tolly765/741a7669083deb777e17f14f27cd6f3d
https://bsky.app/profile/opsmatters.com/post/3mb6pzkxufe2m
https://bsky.app/profile/undercode.bsky.social/post/3mb6kt2ieco2i
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-30)
https://bsky.app/profile/concisecyber.bsky.social/post/3mb4tqt3ezs2z
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-29)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-29)
https://poliverso.org/objects/0477a01e-3cf31148-d79cc710e0cfd8f9
https://bsky.app/profile/cyberhub.blog/post/3mazc7qzjul2i
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-28)
https://gist.github.com/getter-io/fd87b97e77f9185429471a11e77ae2c7
https://gist.github.com/getter-io/d0c302898ccef414aee90d4d62320552
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-27)
https://bsky.app/profile/concisecyber.bsky.social/post/3maveicurkb2u
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-26)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-25)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-25)
CVE-2025-14847 — Zlib compressed protocol header length confusion may allow memory read
Explications des termes
- zlib : bibliothèque de compression/décompression de données.
- En-tête (header) de protocole : métadonnées au début d’un message (ex. tailles, options) utilisées pour l’interpréter.
- Champs de longueur (length fields) : valeurs indiquant la taille attendue d’un bloc de données.
- Heap : zone mémoire dynamique utilisée par un programme pendant son exécution.
- Mémoire non initialisée : mémoire dont le contenu n’a pas été explicitement défini, pouvant contenir des fragments de données précédentes.
Description originale (EN)
Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Server v4.4 versions prior to 4.4.30, MongoDB Server v4.2 versions greater than or equal to 4.2.0, MongoDB Server v4.0 versions greater than or equal to 4.0.0, and MongoDB Server v3.6 versions greater than or equal to 3.6.0.
Posts / Sources (80)
https://bsky.app/profile/r-blueteamsec.bsky.social/post/3mbipuuyfl226
https://bsky.app/profile/opsmatters.com/post/3mbikdoomsz2z
https://bsky.app/profile/getpokemon7.bsky.social/post/3mbhzl56xt22q
https://gist.github.com/Darkcrai86/ffe61e50cd7a69cf010f9fdea29ae2bb
https://bsky.app/profile/keesnk.bsky.social/post/3mbhcacwarc22
https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3mbgmcg7ietw2
https://bsky.app/profile/infosec.skyfleet.blue/post/3mbgj7rennq23
https://bsky.app/profile/webring.in.th/post/3mbgb3ertkh27
https://bsky.app/profile/pmloik.bsky.social/post/3mbftqanq7x2d
https://bsky.app/profile/cyberhub.blog/post/3mbezq22t3z2s
https://bsky.app/profile/MongoDB.activitypub.awakari.com.ap.brid.gy/post/3mbejff4svch2
https://bsky.app/profile/hacker.at.thenote.app/post/3mbedsfdtok2o
https://bsky.app/profile/securitycipher.bsky.social/post/3mbdq6qp7bu2i
https://bsky.app/profile/pmloik.bsky.social/post/3mbddfmocjv2p
https://bsky.app/profile/opsmatters.com/post/3mbd7u6pr7h2a
https://bsky.app/profile/beikokucyber.bsky.social/post/3mbcraiwf5a2t
https://infosec.exchange/users/edwardk/statuses/115814362168463775
https://threatintel.cc/2025/12/31/us-australia-say-mongobleed-bug.html
https://bsky.app/profile/pentest-tools.com/post/3mbbqrvg2lk2h
https://bsky.app/profile/pentest-tools.com/post/3mbbqrsfplc2h
https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3mbblkh44kry2
https://bsky.app/profile/undercodenews.bsky.social/post/3mbbl4xxwfk2z
https://bsky.app/profile/infosec.skyfleet.blue/post/3mbbjf3phdj2p
https://bsky.app/profile/bluesky.awakari.com/post/3mbb3qdcbov2n
https://bsky.app/profile/opsmatters.com/post/3mbaymmsomk2r
https://bsky.app/profile/solidot.bsky.social/post/3mbarfwhx5v2b
https://bsky.app/profile/MongoDB.activitypub.awakari.com.ap.brid.gy/post/3mbadrwgix2p2
https://bsky.app/profile/getpokemon7.bsky.social/post/3mbadnlp56k24
https://bsky.app/profile/beikokucyber.bsky.social/post/3mbaarllfhi22
https://bsky.app/profile/qualysofficial.bsky.social/post/3mba7rtlxsf2l
https://bsky.app/profile/infosecbriefly.bsky.social/post/3mba4cwba2p2m
https://bsky.app/profile/thedailytechfeed.com/post/3mb7vd62twx2q
https://bsky.app/profile/thedailytechfeed.com/post/3mb7tixmtl32m
https://bsky.app/profile/hacker.at.thenote.app/post/3mb7rvo4m2s2o
https://infosec.exchange/users/defendopsdiaries/statuses/115809084918203540
https://bsky.app/profile/aitldr.bsky.social/post/3mb7jasxxux2p
https://bsky.app/profile/aitldr.bsky.social/post/3mb7jaltykq26
https://bsky.app/profile/cyberveille-ch.bsky.social/post/3mb7j5gsddb2v
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/mongodb/cve_2025_14847_mongobleed.rb
https://bsky.app/profile/termsofsurrender.bsky.social/post/3mb7hic2qsg2y
CVE-2025-66478
Posts / Sources (80)
https://bsky.app/profile/getpokemon7.bsky.social/post/3mbikve7ovs2q
https://gist.github.com/lucasjarman/4a3a6e8a06949d49b52b8372bdd656b8
https://bsky.app/profile/concisecyber.bsky.social/post/3maveicurkb2u
https://bsky.app/profile/getpokemon7.bsky.social/post/3marfvlm6uc26
https://poliverso.org/objects/0477a01e-e40d4570-989b88cdb94f7d04
https://bsky.app/profile/opsmatters.com/post/3map5l6uilk2m
https://bsky.app/profile/thecascading.bsky.social/post/3mao2tfm46f2f
https://bsky.app/profile/cyberveille-ch.bsky.social/post/3majo3swwqf2i
https://gist.github.com/ThemeHackers/c6223a6ac26b5ce2c1b070c7118b7f4b
https://bsky.app/profile/hacker-news-jp.bsky.social/post/3maav7jmo262p
https://gist.github.com/cbardin89/256e142d3cef52eae89581fd02faff48
https://beelzebub.ai/blog/threat-huntinga-analysis-of-a-nextjs-exploit-campaign/
https://gist.github.com/cbardin89/4eb81c1bae832e32b05c7475ac33ca2a
https://gist.github.com/themadarchitect/ea82a060024373a2f5d5b54f9860149c
https://gist.github.com/themadarchitect/97f2aee0cd5b0258f803cbbde074abe1
https://bsky.app/profile/netmarkjp.bsky.social/post/3m7tm3zio2d26
https://bsky.app/profile/pmloik.bsky.social/post/3m7tjyvczmp23
https://bsky.app/profile/getpokemon7.bsky.social/post/3m7t4w3mulc2f
https://bsky.app/profile/getpokemon7.bsky.social/post/3m7t4vzmiz22f
https://bsky.app/profile/getpokemon7.bsky.social/post/3m7t4vy4ktc2f
https://bsky.app/profile/getpokemon7.bsky.social/post/3m7t4vx35ik2f
https://bsky.app/profile/infosecsherpa.bsky.social/post/3m7rqtd3tz72w
https://gist.github.com/alsapalat/36194af2c00fb648441110f7dc343a93
https://bsky.app/profile/pmloik.bsky.social/post/3m7qzshjbje2f
https://bsky.app/profile/opsmatters.com/post/3m7qxga5xay2m
https://bsky.app/profile/opsmatters.com/post/3m7qrq5jfvh25
https://bsky.app/profile/concisecyber.bsky.social/post/3m7qr6jz52w2u
https://bsky.app/profile/technews4869.bsky.social/post/3m7owtt7gp62y
https://bsky.app/profile/opsmatters.com/post/3m7ouzyrgfe2j
https://bsky.app/profile/pmloik.bsky.social/post/3m7ojdusgww23
MISP/b2de600f-ba5d-596d-ab6d-e16f07adabb2
https://bsky.app/profile/concisecyber.bsky.social/post/3m7mrwvnmll22
https://bsky.app/profile/technews4869.bsky.social/post/3m7m7p7wxsv2u
https://bsky.app/profile/pmloik.bsky.social/post/3m7lysor63o2w
https://bsky.app/profile/beikokucyber.bsky.social/post/3m7lgxeq3wz2l
https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m7l5bwbn6a62
https://bsky.app/profile/concisecyber.bsky.social/post/3m7kxtvu4ew25
https://bsky.app/profile/secpoint.bsky.social/post/3m7kg4yqob22c
https://gist.github.com/spynika/20969263b0c40e1ac04287f74fa247fa
https://bsky.app/profile/opsmatters.com/post/3m7jonz2ks426
CVE-2025-20393 — Cisco Secure Email Gateway and Cisco Secure Email and Web Manager Remote Command Execution Vulnerability
Aucun acronyme/terme technique spécifique n’est mentionné dans le texte source, donc aucune section “Explications des termes” n’est nécessaire.
Description originale (EN)
Cisco is aware of a potential vulnerability. Cisco is currently investigating and will update these details as appropriate as more information becomes available.
Posts / Sources (80)
https://bsky.app/profile/kpwn.infosec.exchange.ap.brid.gy/post/3maxw33krrao2
https://bsky.app/profile/pmloik.bsky.social/post/3mawqq7m4sf2g
https://bsky.app/profile/securitylab-jp.bsky.social/post/3mauja34whs2w
MISP/ed7e8b58-93ec-41c5-b15a-81e92c823798
https://bsky.app/profile/pmloik.bsky.social/post/3marpvokz3j2w
https://bsky.app/profile/guardian360.bsky.social/post/3mapyygsv6x22
https://bsky.app/profile/nilab.mstdn.jp.ap.brid.gy/post/3mapwbk4xdos2
https://bsky.app/profile/pmloik.bsky.social/post/3map7eeffkz2x
https://bsky.app/profile/concisecyber.bsky.social/post/3manuctiwip2u
https://bsky.app/profile/opsmatters.com/post/3mamz3zkhdz2z
https://bsky.app/profile/pmloik.bsky.social/post/3mamoy3lpvm2p
https://bsky.app/profile/cyberhub.blog/post/3mam3rfumr52o
https://bsky.app/profile/thedailytechfeed.com/post/3malvffum7r2w
https://bsky.app/profile/blackhatnews.tokyo/post/3makgdzb62u2w
https://bsky.app/profile/pmloik.bsky.social/post/3mak6noxd4f2u
https://bsky.app/profile/cyberveille-ch.bsky.social/post/3majmg645nh2p
https://bsky.app/profile/thedailytechfeed.com/post/3majer4b2542o
https://bsky.app/profile/eyalestrin.bsky.social/post/3maimygvzqp2a
https://bsky.app/profile/cybersecurity.poliverso.org.ap.brid.gy/post/3maijw2gpteg2
https://poliverso.org/objects/0477a01e-2f900a84-73ab83706da1f16b
https://bsky.app/profile/redhotcyber.bsky.social/post/3maicvqz77y2o
https://bsky.app/profile/getpokemon7.bsky.social/post/3maicnfyyps2i
https://bsky.app/profile/getpokemon7.bsky.social/post/3mai4ngucos2i
https://bsky.app/profile/getpokemon7.bsky.social/post/3mai3ybvnmc2i
https://infosec.exchange/users/edwardk/statuses/115755584693851031
https://bsky.app/profile/LLMs.activitypub.awakari.com.ap.brid.gy/post/3mahrwulp2ov2
https://bsky.app/profile/bluesky.awakari.com/post/3mahrwsqp5b26
https://threatintel.cc/2025/12/20/chinese-hackers-targeting-cisco-email.html
https://bsky.app/profile/pmloik.bsky.social/post/3maho7h567p2a
https://bsky.app/profile/shadowserver.bsky.social/post/3magtnpwepc2e
https://bsky.app/profile/shadowserver.bsky.social/post/3magtnpwdq22e
https://bsky.app/profile/shadowserver.bsky.social/post/3magtnm4jc22e
https://infosec.exchange/users/shadowserver/statuses/115753320652221549
https://bsky.app/profile/thedailytechfeed.com/post/3magjfiwore2i
https://bsky.app/profile/opsmatters.com/post/3mag7mg2kh626
https://bsky.app/profile/alirezagharib.net/post/3mafzi2rcbs2u
https://bsky.app/profile/hacker.at.thenote.app/post/3mafqdexmas2f
https://bsky.app/profile/undercode.bsky.social/post/3mafb6ezlz32j
https://bsky.app/profile/cyberhub.blog/post/3maeckdjzzr22
https://bsky.app/profile/netsecio.bsky.social/post/3mae2h57ncl2p
CVE-2025-14733 — WatchGuard Firebox iked Out of Bounds Write Vulnerability
Explications des termes
- Out-of-bounds Write : écriture en mémoire en dehors des limites prévues, pouvant corrompre la mémoire et mener à une compromission.
- Exécution de code arbitraire (RCE) : capacité pour un attaquant de faire exécuter des instructions de son choix sur la cible.
- IKEv2 : protocole de négociation/échange de clés utilisé pour établir des tunnels IPsec (VPN).
- Attaquant non authentifié : l’attaque ne nécessite pas de compte ni de connexion préalable.
- Dynamic gateway peer : configuration VPN où le pair distant peut avoir une adresse IP variable (passerelle “dynamique”).
Description originale (EN)
An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.5 and 2025.1 up to and including 2025.1.3.
Posts / Sources (60)
https://bsky.app/profile/opsmatters.com/post/3mb6pzkxufe2m
https://bsky.app/profile/pmloik.bsky.social/post/3mb3ryliijd2d
https://bsky.app/profile/pmloik.bsky.social/post/3mazbjwq6go2f
https://bsky.app/profile/pmloik.bsky.social/post/3mawqq7m4sf2g
https://bsky.app/profile/termsofsurrender.bsky.social/post/3masmo7dtdi2n
https://bsky.app/profile/pmloik.bsky.social/post/3map7eeffkz2x
https://bsky.app/profile/blackhatnews.tokyo/post/3maobyc3zeg2w
https://bsky.app/profile/thedailytechfeed.com/post/3mao4edgbof2i
https://infosec.exchange/users/edwardk/statuses/115769079875623050
https://threatintel.cc/2025/12/23/critical-rce-flaw-impacts-over.html
https://bsky.app/profile/shiojiri.com/post/3man3rl265c2r
https://bsky.app/profile/pmloik.bsky.social/post/3mamoy3lpvm2p
https://bsky.app/profile/getpokemon7.bsky.social/post/3mamlvl6kac2g
https://bsky.app/profile/securitylab-jp.bsky.social/post/3mamhfclnks2h
https://bsky.app/profile/getpokemon7.bsky.social/post/3mamh4fgbts2g
https://bsky.app/profile/getpokemon7.bsky.social/post/3mamgojuhp22g
https://bsky.app/profile/getpokemon7.bsky.social/post/3mamgdapekc2g
https://bsky.app/profile/kitafox.bsky.social/post/3mam72rpdip2z
https://cyber.gc.ca/en/alerts-advisories/al25-020-vulnerability-impacting-watchguard-fireware-os-cve-2025-14733
https://bsky.app/profile/alexlevberg.bsky.social/post/3malrgeceak2t
https://bsky.app/profile/alexlevberg.bsky.social/post/3malrgecdbc2t
https://bsky.app/profile/alexlevberg.bsky.social/post/3malrgec4gk2t
https://bsky.app/profile/infosec.skyfleet.blue/post/3maldv3vd7w2x
https://gist.github.com/Darkcrai86/76ab396fec8f6cf19343f849f10a89c5
https://bsky.app/profile/osanpo.bsky.social/post/3makwvjw44z2x
https://infosec.exchange/users/defendopsdiaries/statuses/115762452599169243
https://bsky.app/profile/pmloik.bsky.social/post/3mak6noxd4f2u
https://bsky.app/profile/kitafox.bsky.social/post/3majnqe5zsb23
https://bsky.app/profile/cyberhub.blog/post/3majgtiydf42y
https://infosec.exchange/users/shadowserver/statuses/115759026528029562
https://bsky.app/profile/shadowserver.bsky.social/post/3majeqe6q5s2k
https://bsky.app/profile/shadowserver.bsky.social/post/3majeqbolpc2k
https://bsky.app/profile/shadowserver.bsky.social/post/3majeq7gru22k
https://bsky.app/profile/beikokucyber.bsky.social/post/3mah44ekarg2p
https://bsky.app/profile/thedailytechfeed.com/post/3magibqknwc2w
https://bsky.app/profile/eyalestrin.bsky.social/post/3mafz7uqops27
https://bsky.app/profile/offseq.bsky.social/post/3mafvoqcjo22n
https://infosec.exchange/users/offseq/statuses/115751211179012534
https://bsky.app/profile/infosec.skyfleet.blue/post/3mafb3vvzgy2g
https://infosec.exchange/users/DarkWebInformer/statuses/115748244805470377
CVE-2025-66516 — Apache Tika core, Apache Tika parsers, Apache Tika PDF parser module: Update to CVE-2025-54988 to expand scope of artifacts affected
Cette CVE décrit la même faille que CVE-2025-54988, mais élargit le périmètre des composants affectés.
- Le point d’entrée identifié était
tika-parser-pdf-module, mais la faille (et son correctif) se situe danstika-core: mettre à jour uniquement le module PDF sans passertika-coreen >= 3.2.2 laisse le système vulnérable. - Dans les versions Tika 1.x, le parseur PDF (
PDFParser) se trouve dans le moduleorg.apache.tika:tika-parsers, également concerné.
Composants/versions affectés : tika-core (1.13–3.2.1), tika-pdf-module (2.0.0–3.2.1), tika-parsers (1.13–1.28.5).
Explications des termes
- XXE : injection d’« entités externes » dans du XML, pouvant forcer l’application à lire des ressources externes (fichiers/URLs) lors du parsing.
- XML : format de données structuré, souvent analysé par des parseurs pouvant interpréter des entités.
- XFA (XML Forms Architecture) : technologie de formulaires basée sur XML, pouvant être embarquée dans certains PDF.
- PDFParser : composant de Tika chargé d’analyser le contenu des fichiers PDF.
Description originale (EN)
Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. This CVE covers the same vulnerability as in CVE-2025-54988. However, this CVE expands the scope of affected packages in two ways. First, while the entrypoint for the vulnerability was the tika-parser-pdf-module as reported in CVE-2025-54988, the vulnerability and its fix were in tika-core. Users who upgraded the tika-parser-pdf-module but did not upgrade tika-core to >= 3.2.2 would still be vulnerable. Second, the original report failed to mention that in the 1.x Tika releases, the PDFParser was in the "org.apache.tika:tika-parsers" module.
Posts / Sources (57)
https://bsky.app/profile/getpokemon7.bsky.social/post/3mayo25zzxk2s
https://infosec.exchange/users/patrickcmiller/statuses/115729532250350624
https://mastodon.social/ap/users/115426718704364579/statuses/115724567191604180
https://bsky.app/profile/getpokemon7.bsky.social/post/3m7t4zpp3322i
https://bsky.app/profile/angelborroy.bsky.social/post/3m7sbkv2g7c2z
https://cyberplace.social/users/GossiTheDog/statuses/115706581664510899
https://bsky.app/profile/pmloik.bsky.social/post/3m7ojdusgww23
https://bsky.app/profile/thedailytechfeed.com/post/3m7npe2pftb2m
https://bsky.app/profile/shiojiri.com/post/3m7m7o2642k2r
https://bsky.app/profile/pmloik.bsky.social/post/3m7lysor63o2w
https://bsky.app/profile/cysecuritynews.bsky.social/post/3m7ku7qtj6m2a
https://bsky.app/profile/cyberhub.blog/post/3m7jyywlijd26
https://bsky.app/profile/blackhatnews.tokyo/post/3m7jm47ipkz2e
https://bsky.app/profile/pmloik.bsky.social/post/3m7jibfgupm2d
https://infosec.exchange/users/DarkWebInformer/statuses/115686401222424642
https://bsky.app/profile/getpokemon7.bsky.social/post/3m7j4hfru5k2j
https://bsky.app/profile/getpokemon7.bsky.social/post/3m7j33sirnc2j
https://bsky.app/profile/blackhatnews.tokyo/post/3m7j2zepzyn24
https://bsky.app/profile/nihonmatsu.bsky.social/post/3m7ik2b6cvs2b
https://bsky.app/profile/nihonmatsu.bsky.social/post/3m7ik2b624k2b
https://bsky.app/profile/blackhatnews.tokyo/post/3m7hue5t67t2w
https://cyberplace.social/users/GossiTheDog/statuses/115682732072274739
https://bsky.app/profile/securityrss.bsky.social/post/3m7grtihk5q26
https://bsky.app/profile/kitafox.bsky.social/post/3m7ggculmfv2n
https://bsky.app/profile/hacker.at.thenote.app/post/3m7fthliifs2s
https://bsky.app/profile/pvynckier.bsky.social/post/3m7fawz5ixc2t
https://bsky.app/profile/allsafeus.bsky.social/post/3m7f6a3r4r62g
https://bsky.app/profile/eyalestrin.bsky.social/post/3m7f3hjkye32n
https://bsky.app/profile/cyberhub.blog/post/3m7evtkinzg2g
https://bsky.app/profile/pmloik.bsky.social/post/3m7ehnudonx2d
https://bsky.app/profile/hacker.at.thenote.app/post/3m7efn62e2s2s
https://bsky.app/profile/infosec.skyfleet.blue/post/3m7dgt3cpxe2g
https://bsky.app/profile/thedailytechfeed.com/post/3m7ddt3yupg27
https://bsky.app/profile/thedailytechfeed.com/post/3m7dc76atat2m
https://bsky.app/profile/concisecyber.bsky.social/post/3m7cyxeyyog2r
https://bsky.app/profile/ninjaowl.ai/post/3m7cvufnis62c
https://bsky.app/profile/cybersecurity.poliverso.org.ap.brid.gy/post/3m7cltu36kc42
https://poliverso.org/objects/0477a01e-6bdcd230-c43a48e1e65c0d52
https://bsky.app/profile/offseq.bsky.social/post/3m7cbpjkliy2p
https://infosec.exchange/users/offseq/statuses/115670992562500095
CVE-2025-59718
Explications des termes
- SSO (Single Sign-On) : authentification unique permettant d’accéder à plusieurs services avec une seule connexion.
- FortiCloud : plateforme cloud de Fortinet (gestion/accès à des services Fortinet).
- SAML (Security Assertion Markup Language) : standard d’échange d’informations d’authentification/autorisation entre un fournisseur d’identité et un service.
- Signature cryptographique : mécanisme garantissant l’intégrité et l’authenticité d’un message ; une vérification incorrecte peut permettre la falsification.
Description originale (EN)
A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.
Posts / Sources (53)
https://bsky.app/profile/pterlisten.bsky.social/post/3mb4h4o652g2q
https://social.cologne/users/pterlisten/statuses/115801966138060567
https://bsky.app/profile/pvynckier.bsky.social/post/3maxaehrxy22f
https://bsky.app/profile/pmloik.bsky.social/post/3marpvokz3j2w
https://bsky.app/profile/pmloik.bsky.social/post/3map7eeffkz2x
https://bsky.app/profile/pmloik.bsky.social/post/3mamoy3lpvm2p
https://bsky.app/profile/giovanni-popolizio.bsky.social/post/3mam7irr23c2s
https://bsky.app/profile/giovanni-popolizio.bsky.social/post/3mam7fscd422y
https://bsky.app/profile/pmloik.bsky.social/post/3mak6noxd4f2u
https://bsky.app/profile/getpokemon7.bsky.social/post/3mai34ogksk2i
https://bsky.app/profile/pmloik.bsky.social/post/3maho7h567p2a
https://bsky.app/profile/getpokemon7.bsky.social/post/3mahlbjd4ec2l
https://bsky.app/profile/getpokemon7.bsky.social/post/3mahjubc6522b
https://bsky.app/profile/getpokemon7.bsky.social/post/3mahjjepd2k2b
https://www.cert.at/de/warnungen/2025/12/kritische-sicherheitslucken-in-mehreren-fortinet-produkten-forticloud-sso-aktiv-ausgenutzt-updates-verfugbar
https://bsky.app/profile/blackhatnews.tokyo/post/3madxvhmbri2u
https://infosec.exchange/users/shadowserver/statuses/115746159732778871
https://bsky.app/profile/giovanni-popolizio.bsky.social/post/3madndtv3qs2z
https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3macfn6iobpv2
https://infosec.exchange/users/catc0n/statuses/115741274012787863
https://bsky.app/profile/hacker.at.thenote.app/post/3mab3ilh2kc2s
https://bsky.app/profile/securitylab-jp.bsky.social/post/3maa5jyt34k2j
https://bsky.app/profile/pmloik.bsky.social/post/3maa4i2wdhv23
https://bsky.app/profile/kitafox.bsky.social/post/3ma7wu3ujm32w
https://bsky.app/profile/concisecyber.bsky.social/post/3ma7mhhh32i2u
https://bsky.app/profile/rapid7.com/post/3ma7kywj34s2w
https://bsky.app/profile/beikokucyber.bsky.social/post/3ma7kpo465h2l
https://bsky.app/profile/infosec.skyfleet.blue/post/3ma7gtb5y6h2d
https://bsky.app/profile/helpnetsecurity.com/post/3ma6vgships2g
https://bsky.app/profile/hacker.at.thenote.app/post/3ma6srynt4s2s
https://bsky.app/profile/vexaplus.bsky.social/post/3ma6mq2ew6p2c
https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ma6dqdhkloi2
https://infosec.exchange/users/DarkWebInformer/statuses/115732531461473691
https://infosec.exchange/users/cR0w/statuses/115730076962531791
https://mastodon.social/ap/users/115426718704364579/statuses/115730074940635795
https://infosec.exchange/users/edwardk/statuses/115729028277462597
https://threatintel.cc/2025/12/16/fortinet-fortigate-under-active-attack.html
https://thehackernews.com/2025/12/fortinet-fortigate-under-active-attack.html
https://advisories.ncsc.nl/advisory?id=NCSC-2025-0386
https://poliverso.org/objects/0477a01e-9bece338-f8e39c4a2473fc7a
CVE-2025-40602
Explications des termes
- Élévation de privilèges (LPE) : capacité à passer de droits limités à des droits plus élevés (ex. administrateur).
- Autorisation : mécanisme qui vérifie ce qu’un utilisateur a le droit de faire (à ne pas confondre avec l’authentification).
- SonicWall SMA1000 : appliance (équipement dédié) de la gamme Secure Mobile Access.
- AMC (Appliance Management Console) : console/portail d’administration de l’appliance.
Description originale (EN)
A local privilege escalation vulnerability due to insufficient authorization in the SonicWall SMA1000 appliance management console (AMC).
Posts / Sources (53)
https://bsky.app/profile/termsofsurrender.bsky.social/post/3mascfsyet42k
https://bsky.app/profile/termsofsurrender.bsky.social/post/3mascfcslsd2f
https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3malcptmtyhy2
https://bsky.app/profile/pmloik.bsky.social/post/3mak6noxd4f2u
https://bsky.app/profile/getpokemon7.bsky.social/post/3maicnfyyps2i
https://bsky.app/profile/getpokemon7.bsky.social/post/3maicixpjrs2i
https://bsky.app/profile/getpokemon7.bsky.social/post/3maicd2ivqc2i
https://bsky.app/profile/getpokemon7.bsky.social/post/3mai3iwgst22i
https://bsky.app/profile/getpokemon7.bsky.social/post/3mai3g5sdak2i
https://bsky.app/profile/getpokemon7.bsky.social/post/3mai2u6k2s22i
https://bsky.app/profile/alirezagharib.net/post/3magn3cw44k23
https://bsky.app/profile/alirezagharib.net/post/3magn3cw35c23
https://bsky.app/profile/alirezagharib.net/post/3magn3cw26223
https://bsky.app/profile/alirezagharib.net/post/3magn3cvz6s23
https://bsky.app/profile/alirezagharib.net/post/3magn3cvy7k23
https://bsky.app/profile/alirezagharib.net/post/3magn3cv6t223
https://bsky.app/profile/guardian360.bsky.social/post/3mafsmkrlsl27
https://bsky.app/profile/beikokucyber.bsky.social/post/3mac36lbj5q22
https://bsky.app/profile/hacker.at.thenote.app/post/3mabzrnfc5c2s
https://social.circl.lu/users/circl/statuses/115742383303260012
https://bsky.app/profile/hacker.at.thenote.app/post/3mabxxpl2mk2s
https://bsky.app/profile/hacker.at.thenote.app/post/3mabskiidi22s
https://bsky.app/profile/cyberhub.blog/post/3mabmil3xp42e
https://bsky.app/profile/hacker.at.thenote.app/post/3mablyu4ggk2s
https://bsky.app/profile/o2cloud.bsky.social/post/3mabhhqiusg2g
https://bsky.app/profile/infosecbriefly.bsky.social/post/3mabfyvc6vs2y
https://bsky.app/profile/cve.skyfleet.blue/post/3mabaztje2z2e
https://bsky.app/profile/ninjaowl.ai/post/3mab372ingf2n
https://bsky.app/profile/cybersecurity.poliverso.org.ap.brid.gy/post/3mab27hrnz332
https://poliverso.org/objects/0477a01e-bd2e9802-1b74c0e6debd85f8
https://bsky.app/profile/concisecyber.bsky.social/post/3maayritubr2m
https://bsky.app/profile/concisecyber.bsky.social/post/3maayoq46yf2b
https://bsky.app/profile/securityrss.bsky.social/post/3maat46imda2b
https://www.acn.gov.it/portale/w/sonicwall-rilevato-sfruttamento-della-cve-2025-40602-in-catene-d-attacco
https://bsky.app/profile/opsmatters.com/post/3maal7a2wnf2m
https://bsky.app/profile/pigondrugs.bsky.social/post/3maac3wsdd52a
https://infosec.exchange/users/DarkWebInformer/statuses/115738322934985655
https://bsky.app/profile/kitafox.bsky.social/post/3ma7wxj6zue22
https://bsky.app/profile/kitafox.bsky.social/post/3ma7wwoomdl2w
https://bsky.app/profile/kitafox.bsky.social/post/3ma7wt7twj627
CVE-2025-48633
Explications des termes
- Device Owner : application/entité ayant un contrôle étendu sur l’appareil (politiques de sécurité, restrictions, gestion).
- Provisioning : étape de configuration/initialisation de l’appareil (souvent lors de la première mise en service ou d’un enrôlement).
- Élévation de privilèges (EoP) : obtention de droits plus élevés que ceux initialement accordés.
- Erreur de logique : défaut dans le raisonnement/les conditions du code (pas forcément un bug mémoire), entraînant un comportement non prévu.
Description originale (EN)
In hasAccountsOnAnyUser of DevicePolicyManagerService.java, there is a possible way to add a Device Owner after provisioning due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Posts / Sources (39)
https://bsky.app/profile/getpokemon7.bsky.social/post/3maz3aq3ozc2s
https://bsky.app/profile/cve.skyfleet.blue/post/3m7ir7digdp2u
https://bsky.app/profile/hnews.southla.social/post/3m7iqiiggnk27
https://bsky.app/profile/getpokemon7.bsky.social/post/3m7brb3lpu22p
https://bsky.app/profile/getpokemon7.bsky.social/post/3m7bq3sxkwc2l
https://bsky.app/profile/getpokemon7.bsky.social/post/3m774gv4x4224
https://bsky.app/profile/getpokemon7.bsky.social/post/3m77376ekec24
https://bsky.app/profile/thedailytechfeed.com/post/3m76bbfnghz2e
https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m75orc7gggr2
https://bsky.app/profile/securitylab-jp.bsky.social/post/3m74zgawdvk2p
https://bsky.app/profile/uk-nb.bsky.social/post/3m74xstekru2q
https://bsky.app/profile/getpokemon7.bsky.social/post/3m74gcl3kjk2y
https://bsky.app/profile/getpokemon7.bsky.social/post/3m74g6t4a4s2y
https://bsky.app/profile/beikokucyber.bsky.social/post/3m74e5q2sr42b
https://bsky.app/profile/getpokemon7.bsky.social/post/3m74dkhdetk2y
https://bsky.app/profile/getpokemon7.bsky.social/post/3m74dhbl7l22y
https://bsky.app/profile/technadu.com/post/3m73pihnghk2j
https://infosec.exchange/users/technadu/statuses/115656193887869024
https://bsky.app/profile/hacker.at.thenote.app/post/3m735lhiirs2t
https://bsky.app/profile/shiojiri.com/post/3m72pjmllwc2h
https://bsky.app/profile/shiojiri.com/post/3m72o54q2ps2h
https://bsky.app/profile/kitafox.bsky.social/post/3m723mu64zl2x
https://bsky.app/profile/kitafox.bsky.social/post/3m723d475dp2n
https://infosec.exchange/users/DarkWebInformer/statuses/115652353105219695
https://bsky.app/profile/concisecyber.bsky.social/post/3m6zsbaoxmy27
https://bsky.app/profile/pigondrugs.bsky.social/post/3m6zqd7xsyl2v
https://bsky.app/profile/infosec.skyfleet.blue/post/3m6zlb5va232h
https://bsky.app/profile/helpnetsecurity.com/post/3m6z7aud2d22u
https://bsky.app/profile/kaldata.bsky.social/post/3m6z4cfqwff2r
https://bsky.app/profile/guardingpearsof.bsky.social/post/3m6z2cj7jkh2k
https://bsky.app/profile/blackhatnews.tokyo/post/3m6yzn6ugws2w
https://advisories.ncsc.nl/advisory?id=NCSC-2025-0379
https://bsky.app/profile/basefortify.bsky.social/post/3m6ytcqy4hs2v
https://bsky.app/profile/basefortify.bsky.social/post/3m6ytcg33jk2v
https://bsky.app/profile/basefortify.bsky.social/post/3m6ytc4pph22v
https://bsky.app/profile/securityrss.bsky.social/post/3m6ysabxve527
https://bsky.app/profile/blackhatnews.tokyo/post/3m6yni7hjav2m
https://infosec.exchange/users/tomcat/statuses/115649279605179618
https://infosec.exchange/users/cR0w/statuses/115646657177918322
CVE-2025-59374
Explications des termes
- Supply chain compromise : attaque visant un fournisseur ou un canal de distribution pour livrer un logiciel modifié aux utilisateurs.
- Build (version compilée) : paquet logiciel généré/compilé et distribué aux utilisateurs.
- Conditions de ciblage : critères utilisés pour ne déclencher le comportement que sur certains appareils.
- EOS (End-of-Support) : fin de support ; plus de correctifs ni de mises à jour de sécurité fournis.
Description originale (EN)
"UNSUPPORTED WHEN ASSIGNED" Certain versions of the ASUS Live Update client were distributed with unauthorized modifications introduced through a supply chain compromise. The modified builds could cause devices meeting specific targeting conditions to perform unintended actions. Only devices that met these conditions and installed the compromised versions were affected. The Live Update client has already reached End-of-Support (EOS) in October 2021, and no currently supported devices or products are affected by this issue.
Posts / Sources (39)
https://bsky.app/profile/bolhasec.com/post/3mbhcwhrcu42y
https://bsky.app/profile/pmloik.bsky.social/post/3mb3ryliijd2d
https://bsky.app/profile/pmloik.bsky.social/post/3mazbjwq6go2f
https://bsky.app/profile/ahmandonk.bsky.social/post/3mapno4lpgp2y
https://bsky.app/profile/cyberhub.blog/post/3mantnkektq27
https://bsky.app/profile/hacker.at.thenote.app/post/3man6cdguyk2o
https://bsky.app/profile/pmloik.bsky.social/post/3mamoy3lpvm2p
https://bsky.app/profile/getpokemon7.bsky.social/post/3mammh44fqk2g
https://bsky.app/profile/getpokemon7.bsky.social/post/3mamlzenrtk2g
https://bsky.app/profile/getpokemon7.bsky.social/post/3mamanqvyuc2g
https://bsky.app/profile/undercodenews.bsky.social/post/3malys5ftuf2z
https://bsky.app/profile/cyberhub.blog/post/3malgjw4n4w2y
https://bsky.app/profile/cyber-news-fi.bsky.social/post/3mal4no7pzs2b
https://infosec.exchange/users/defendopsdiaries/statuses/115762954159419837
https://bsky.app/profile/blackhatnews.tokyo/post/3mal4ez45oo23
https://bsky.app/profile/bleepingcomputer.com/post/3mal3vaqg2k27
https://bsky.app/profile/cyberveille-ch.bsky.social/post/3makfktsozr2i
https://bsky.app/profile/getpokemon7.bsky.social/post/3maicnfyyps2i
https://infosec.exchange/users/edwardk/statuses/115755575363524377
https://threatintel.cc/2025/12/20/cisa-warns-asus-live-update.html
https://bsky.app/profile/alirezagharib.net/post/3magn3cw44k23
https://bsky.app/profile/alirezagharib.net/post/3magn3cw35c23
https://bsky.app/profile/alirezagharib.net/post/3magn3cw26223
https://bsky.app/profile/alirezagharib.net/post/3magn3cvz6s23
https://bsky.app/profile/alirezagharib.net/post/3magn3cvy7k23
https://bsky.app/profile/alirezagharib.net/post/3magn3cv6t223
https://bsky.app/profile/thedailytechfeed.com/post/3maebnj2f7t2m
https://bsky.app/profile/beikokucyber.bsky.social/post/3mac36lw27h2f
https://bsky.app/profile/sctocs.bsky.social/post/3mabu5qj76c2a
https://poliverso.org/objects/0477a01e-51e3a85f-8592fbe159860167
https://bsky.app/profile/infosecbriefly.bsky.social/post/3maaiu753we27
https://bsky.app/profile/blackhatnews.tokyo/post/3maaimbgke62r
https://bsky.app/profile/cybersentinel404.bsky.social/post/3maai4kktzx2g
https://bsky.app/profile/pigondrugs.bsky.social/post/3maac3wsdd52a
https://thehackernews.com/2025/12/cisa-flags-critical-asus-live-update.html
https://infosec.exchange/users/DarkWebInformer/statuses/115738322934985655
https://bsky.app/profile/kitafox.bsky.social/post/3ma7wt7twj627
https://infosec.exchange/users/cR0w/statuses/115736851351799576
https://infosec.exchange/users/offseq/statuses/115733162386998883
CVE-2025-55184
Explications des termes
- Pré-authentification : exploitable sans que l’attaquant ait besoin de se connecter.
- DoS (Denial of Service / déni de service) : rendre un service indisponible en le surchargeant ou en le bloquant.
- Désérialisation : reconstruction d’un objet à partir de données reçues (ici via HTTP) ; si elle est “non sûre”, elle peut provoquer des comportements inattendus.
- Payload : contenu transmis dans une requête, pouvant être malveillant.
- Endpoint : URL/point d’accès d’une API ou d’une fonction côté serveur.
Description originale (EN)
A pre-authentication denial of service vulnerability exists in React Server Components versions 19.0.0, 19.0.1 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1, including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints, which can cause an infinite loop that hangs the server process and may prevent future HTTP requests from being served.
Posts / Sources (39)
https://bsky.app/profile/thecascading.bsky.social/post/3mao7jqj3ix2q
https://bsky.app/profile/undercode.bsky.social/post/3magj3q4kks2c
https://bsky.app/profile/pmloik.bsky.social/post/3macn2mdz322d
https://bsky.app/profile/wardenshield.bsky.social/post/3mac76ouh6s2f
https://bsky.app/profile/undercode.bsky.social/post/3maae2xgrgs2p
https://bsky.app/profile/pmloik.bsky.social/post/3maa4i2wdhv23
https://gist.github.com/cbardin89/256e142d3cef52eae89581fd02faff48
https://cyber.gc.ca/en/alerts-advisories/react-security-advisory-av25-834
https://gist.github.com/casamia918/a23a22296d29116230c41112aec1317e
https://gist.github.com/casamia918/d66f8a265ccc8ec358beffab20ed4a33
https://gist.github.com/cbardin89/4eb81c1bae832e32b05c7475ac33ca2a
https://seclists.org/oss-sec/2025/q4/276
https://infosec.exchange/users/edwardk/statuses/115715626333380839
https://threatintel.cc/2025/12/13/new-react-rsc-vulnerabilities-enable.html
https://bsky.app/profile/undercode.bsky.social/post/3m7u4r753ie2y
https://bsky.app/profile/pigondrugs.bsky.social/post/3m7tq2kwvzo2a
https://bsky.app/profile/opsmatters.com/post/3m7tmgi75yu2a
https://bsky.app/profile/pmloik.bsky.social/post/3m7tjyvczmp23
https://bsky.app/profile/iortizdezarate.com/post/3m7t7ibxx6s27
https://bsky.app/profile/hacker-news-jp.bsky.social/post/3m7t2niky2w2d
https://bsky.app/profile/blackhatnews.tokyo/post/3m7sqblukff2n
https://bsky.app/profile/sm.primo.business/post/3m7shiiy6qs2d
https://infosec.exchange/users/cR0w/statuses/115707047280148200
https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-55184.yaml
https://infosec.exchange/users/offseq/statuses/115706143266808732
https://poliverso.org/objects/0477a01e-c79eab72-2e4a9f98586ddbae
https://bsky.app/profile/bitboxer.mastodon.social.ap.brid.gy/post/3m7rf4lx2d5o2
https://bsky.app/profile/peterrobards.bsky.social/post/3m7rei52ye22f
https://bsky.app/profile/cve.skyfleet.blue/post/3m7r5chsn6u2q
https://bsky.app/profile/pmloik.bsky.social/post/3m7qzshjbje2f
https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m7qv4sllkx42
https://bsky.app/profile/react.dev/post/3m7qs2rtey22l
https://infosec.exchange/users/cR0w/statuses/115703237383602355
https://mstdn.social/users/jschauma/statuses/115703058651440730
https://bsky.app/profile/react.dev/post/3m7qhartr5t2v
https://bsky.app/profile/react.dev/post/3m7qhartp7d2v
https://bsky.app/profile/react.dev/post/3m7qhartp7c2v
https://bsky.app/profile/react.dev/post/3m7qhaqdxuc2v
https://bsky.app/profile/react.dev/post/3m7qhaqdtxc2v
CVE-2025-48572
Explications des termes
- Contournement des permissions (permissions bypass) : possibilité d’éviter les contrôles d’accès prévus par le système.
- Arrière-plan (background) : exécution d’actions sans interface visible ou sans intervention directe de l’utilisateur.
- Élévation de privilèges (EoP) : obtention de droits plus élevés que ceux initialement accordés (ex. passer d’un compte limité à des droits système).
- Attaquant local : l’attaquant doit déjà avoir un accès au système (compte, session, ou présence sur l’appareil).
Description originale (EN)
In multiple locations, there is a possible way to launch activities from the background due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Posts / Sources (36)
https://bsky.app/profile/getpokemon7.bsky.social/post/3maz3aq3ozc2s
https://bsky.app/profile/getpokemon7.bsky.social/post/3m7brb3lpu22p
https://bsky.app/profile/getpokemon7.bsky.social/post/3m7bq3sxkwc2l
https://bsky.app/profile/getpokemon7.bsky.social/post/3m774gv4x4224
https://bsky.app/profile/getpokemon7.bsky.social/post/3m77376ekec24
https://bsky.app/profile/thedailytechfeed.com/post/3m76bbfnghz2e
https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3m75orc7gggr2
https://bsky.app/profile/securitylab-jp.bsky.social/post/3m74zgawdvk2p
https://bsky.app/profile/uk-nb.bsky.social/post/3m74xstekru2q
https://bsky.app/profile/getpokemon7.bsky.social/post/3m74gcl3kjk2y
https://bsky.app/profile/getpokemon7.bsky.social/post/3m74g6t4a4s2y
https://bsky.app/profile/beikokucyber.bsky.social/post/3m74e5pycxo25
https://bsky.app/profile/getpokemon7.bsky.social/post/3m74dkhdetk2y
https://bsky.app/profile/getpokemon7.bsky.social/post/3m74dhbl7l22y
https://bsky.app/profile/technadu.com/post/3m73pihnghk2j
https://infosec.exchange/users/technadu/statuses/115656193887869024
https://bsky.app/profile/hacker.at.thenote.app/post/3m735lhiirs2t
https://bsky.app/profile/shiojiri.com/post/3m72pjmllwc2h
https://bsky.app/profile/shiojiri.com/post/3m72o54q2ps2h
https://bsky.app/profile/kitafox.bsky.social/post/3m723mu64zl2x
https://bsky.app/profile/kitafox.bsky.social/post/3m723d475dp2n
https://infosec.exchange/users/DarkWebInformer/statuses/115652353105219695
https://bsky.app/profile/concisecyber.bsky.social/post/3m6zsbaoxmy27
https://bsky.app/profile/pigondrugs.bsky.social/post/3m6zqd7xsyl2v
https://bsky.app/profile/infosec.skyfleet.blue/post/3m6zlb5va232h
https://bsky.app/profile/helpnetsecurity.com/post/3m6z7aud2d22u
https://bsky.app/profile/kaldata.bsky.social/post/3m6z4cfqwff2r
https://bsky.app/profile/guardingpearsof.bsky.social/post/3m6z2cj7jkh2k
https://bsky.app/profile/blackhatnews.tokyo/post/3m6yzn6ugws2w
https://advisories.ncsc.nl/advisory?id=NCSC-2025-0379
https://bsky.app/profile/basefortify.bsky.social/post/3m6ytcqy4hs2v
https://bsky.app/profile/basefortify.bsky.social/post/3m6ytcg33jk2v
https://bsky.app/profile/basefortify.bsky.social/post/3m6ytc4pph22v
https://bsky.app/profile/securityrss.bsky.social/post/3m6ysabxve527
https://infosec.exchange/users/tomcat/statuses/115649279605179618
https://infosec.exchange/users/cR0w/statuses/115646657177918322
CVE-2025-59719
Explications des termes
- SSO (Single Sign-On) : authentification unique permettant d’accéder à plusieurs services avec une seule connexion.
- SAML (Security Assertion Markup Language) : standard d’échange d’informations d’authentification/autorisation entre un fournisseur d’identité et une application.
- Signature cryptographique : mécanisme garantissant l’intégrité et l’authenticité d’un message ; si elle est mal vérifiée, un message falsifié peut être accepté.
- Non authentifié : l’attaquant n’a pas besoin de compte ni de session valide pour tenter l’exploitation.
Description originale (EN)
An improper verification of cryptographic signature vulnerability in Fortinet FortiWeb 8.0.0, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9 may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.
Posts / Sources (35)
https://bsky.app/profile/pterlisten.bsky.social/post/3mb4h4o652g2q
https://social.cologne/users/pterlisten/statuses/115801966138060567
https://bsky.app/profile/pmloik.bsky.social/post/3marpvokz3j2w
https://bsky.app/profile/pmloik.bsky.social/post/3map7eeffkz2x
https://bsky.app/profile/giovanni-popolizio.bsky.social/post/3mam7irr23c2s
https://bsky.app/profile/giovanni-popolizio.bsky.social/post/3mam7fscd422y
https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-sso-logins-following-disclosure-cve-2025-59718-cve-2025-59719/
https://bsky.app/profile/getpokemon7.bsky.social/post/3mahlbjd4ec2l
https://bsky.app/profile/getpokemon7.bsky.social/post/3mahjubc6522b
https://bsky.app/profile/getpokemon7.bsky.social/post/3mahjjepd2k2b
https://www.cert.at/de/warnungen/2025/12/kritische-sicherheitslucken-in-mehreren-fortinet-produkten-forticloud-sso-aktiv-ausgenutzt-updates-verfugbar
https://infosec.exchange/users/shadowserver/statuses/115746159732778871
https://bsky.app/profile/giovanni-popolizio.bsky.social/post/3madndtv3qs2z
https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3macfn6iobpv2
https://bsky.app/profile/securitylab-jp.bsky.social/post/3maa5jyt34k2j
https://bsky.app/profile/rapid7.com/post/3ma7kywj34s2w
https://bsky.app/profile/hacker.at.thenote.app/post/3ma6srynt4s2s
https://bsky.app/profile/vexaplus.bsky.social/post/3ma6mq2ew6p2c
https://infosec.exchange/users/cR0w/statuses/115730076962531791
https://mastodon.social/ap/users/115426718704364579/statuses/115730074940635795
https://infosec.exchange/users/edwardk/statuses/115729028277462597
https://threatintel.cc/2025/12/16/fortinet-fortigate-under-active-attack.html
https://advisories.ncsc.nl/advisory?id=NCSC-2025-0386
https://poliverso.org/objects/0477a01e-9bece338-f8e39c4a2473fc7a
https://cyber.gc.ca/en/alerts-advisories/al25-019-vulnerabilities-impacting-fortinet-products-forticloud-sso-login-authentication-bypass-cve-2025-59718-cve-2025-59719
https://bsky.app/profile/opsmatters.com/post/3m7oshy5ccf2q
https://bsky.app/profile/ahmandonk.bsky.social/post/3m7mr6xssqc2o
https://gist.github.com/Darkcrai86/de18a38407f796f037dea71f5c69e2ac
https://bsky.app/profile/cybersecurity.poliverso.org.ap.brid.gy/post/3m7mmokrmxgi2
https://poliverso.org/objects/0477a01e-a8e6500e-56698debb1d6144d
https://www.acn.gov.it/portale/w/vulnerabilita-in-prodotti-fortinet-aggiornamento
https://bsky.app/profile/eyalestrin.bsky.social/post/3m7mewnrc6o2i
https://bsky.app/profile/blackhatnews.tokyo/post/3m7mbq5ji6w2o
https://bsky.app/profile/shiojiri.com/post/3m7mbbsynsk2r
https://cyber.gc.ca/en/alerts-advisories/fortinet-security-advisory-av25-821
CVE-2025-8110 — File overwrite in file update API in Gogs
Explications des termes
- Lien symbolique (symlink) : “raccourci” au niveau système de fichiers pointant vers un autre fichier ou répertoire.
- API PutContents : interface permettant d’écrire/mettre à jour du contenu (par ex. un fichier) via une requête applicative.
- Gogs : logiciel de forge Git auto‑hébergée (gestion de dépôts Git via une application web).
- Exécution de code en local : exécution de code sur l’hôte cible (pas nécessairement à distance), avec les droits du processus vulnérable.
Description originale (EN)
Improper Symbolic link handling in the PutContents API in Gogs allows Local Execution of Code.
Posts / Sources (38)
https://bsky.app/profile/getpokemon7.bsky.social/post/3mbiwagxqhs2q
https://bsky.app/profile/getpokemon7.bsky.social/post/3mbivrerjuk2q
https://bsky.app/profile/getpokemon7.bsky.social/post/3mbir4au5js2q
https://bsky.app/profile/smartermsp.bsky.social/post/3ma77nvvfbt2w
https://bsky.app/profile/blackhatnews.tokyo/post/3m7uga3hasu2o
https://bsky.app/profile/thedailytechfeed.com/post/3m7sil5f2xb2q
https://poliverso.org/objects/0477a01e-0122b398-ead7a30f46f5b85a
https://bsky.app/profile/thedailytechfeed.com/post/3m7sffah3fa2y
https://bsky.app/profile/aimainainnu.bsky.social/post/3m7r6524lkc2x
https://bsky.app/profile/beikokucyber.bsky.social/post/3m7qhvb2pwb22
https://bsky.app/profile/blackhatnews.tokyo/post/3m7qgewv7422j
https://infosec.exchange/users/DarkWebInformer/statuses/115702790383440072
https://bsky.app/profile/infosec.skyfleet.blue/post/3m7q3qkdfo42x
https://bsky.app/profile/eyalestrin.bsky.social/post/3m7q2lezxtr27
https://bsky.app/profile/calimegai.bsky.social/post/3m7q2ew4ro32g
https://bsky.app/profile/infosec.skyfleet.blue/post/3m7pzhnr44w2u
https://bsky.app/profile/securityrss.bsky.social/post/3m7pvjjk37n2b
https://infosec.exchange/users/threatcodex/statuses/115701592582836512
https://seclists.org/oss-sec/2025/q4/266
https://seclists.org/oss-sec/2025/q4/265
https://bsky.app/profile/jbhall56.bsky.social/post/3m7poq77kq22h
https://infosec.exchange/users/defendopsdiaries/statuses/115701181776508669
https://infosec.exchange/users/jbhall56/statuses/115701181799426734
https://bsky.app/profile/blackhatnews.tokyo/post/3m7pof7skfb2r
https://bsky.app/profile/cyberhub.blog/post/3m7po32jl3w2s
https://bsky.app/profile/bleepingcomputer.com/post/3m7po2jrjxg2f
https://www.wiz.io/blog/wiz-research-gogs-cve-2025-8110-rce-exploit#exploitation-in-the-wild-24
https://bsky.app/profile/bitnewsbot.bsky.social/post/3m7pgpxnbk42y
https://bsky.app/profile/infosecbriefly.bsky.social/post/3m7pfundgjr2u
https://bsky.app/profile/cybersentinel404.bsky.social/post/3m7peyt36w72e
https://thehackernews.com/2025/12/unpatched-gogs-zero-day-exploited.html
https://www.acn.gov.it/portale/w/gogs-rilevato-sfruttamento-in-rete-di-una-vulnerabilita-zero-day
https://bsky.app/profile/crowdcyber.bsky.social/post/3m7oo2pkcmb2j
https://bsky.app/profile/infosec.skyfleet.blue/post/3m7oas42st723
https://seclists.org/oss-sec/2025/q4/262
https://mastodon.social/users/hrbrmstr/statuses/115696439143563635
https://bsky.app/profile/cve.skyfleet.blue/post/3m7nfazcxjj2g
https://infosec.exchange/users/cR0w/statuses/115695894618278419
CVE-2025-55183
Explications des termes
- React Server Components (RSC) : fonctionnalité React permettant d’exécuter certains composants côté serveur et d’envoyer un rendu/flux au client.
- Server Function : fonction exécutée côté serveur et accessible via le mécanisme RSC (appelée indirectement depuis le client).
- Requête HTTP : message réseau (ex. GET/POST) envoyé au serveur web.
- Stringified argument : argument transformé en texte (ex. via conversion en chaîne), pouvant être renvoyé tel quel dans une réponse.
Description originale (EN)
An information leak vulnerability exists in specific configurations of React Server Components versions 19.0.0, 19.0.1 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1, including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. A specifically crafted HTTP request sent to a vulnerable Server Function may unsafely return the source code of any Server Function. Exploitation requires the existence of a Server Function which explicitly or implicitly exposes a stringified argument.
Posts / Sources (32)
https://gist.github.com/win3zz/3dfbbd99abf3844a331eefddeb68accd
https://bsky.app/profile/thecascading.bsky.social/post/3mao7jqj3ix2q
https://bsky.app/profile/wardenshield.bsky.social/post/3mac76ouh6s2f
https://gist.github.com/ThemeHackers/c6223a6ac26b5ce2c1b070c7118b7f4b
https://bsky.app/profile/pmloik.bsky.social/post/3maa4i2wdhv23
https://gist.github.com/cbardin89/256e142d3cef52eae89581fd02faff48
https://cyber.gc.ca/en/alerts-advisories/react-security-advisory-av25-834
https://gist.github.com/casamia918/a23a22296d29116230c41112aec1317e
https://gist.github.com/casamia918/d66f8a265ccc8ec358beffab20ed4a33
https://gist.github.com/cbardin89/4eb81c1bae832e32b05c7475ac33ca2a
https://seclists.org/oss-sec/2025/q4/276
https://infosec.exchange/users/edwardk/statuses/115715626333380839
https://threatintel.cc/2025/12/13/new-react-rsc-vulnerabilities-enable.html
https://bsky.app/profile/undercode.bsky.social/post/3m7u4r753ie2y
https://bsky.app/profile/pigondrugs.bsky.social/post/3m7tq2kwvzo2a
https://bsky.app/profile/iortizdezarate.com/post/3m7t7ibxx6s27
https://gist.github.com/bolhasec/6d9b2dd0710c28882a25ef14c283a226
https://bsky.app/profile/hacker-news-jp.bsky.social/post/3m7t2niky2w2d
https://bsky.app/profile/undercode.bsky.social/post/3m7sm445ifr2g
https://bsky.app/profile/sm.primo.business/post/3m7shiiy6qs2d
https://infosec.exchange/users/offseq/statuses/115706143266808732
https://poliverso.org/objects/0477a01e-c79eab72-2e4a9f98586ddbae
https://bsky.app/profile/bitboxer.mastodon.social.ap.brid.gy/post/3m7rf4lx2d5o2
https://bsky.app/profile/peterrobards.bsky.social/post/3m7rei52ye22f
https://bsky.app/profile/cyberkendra.com/post/3m7r4nrbdfc2l
https://bsky.app/profile/pmloik.bsky.social/post/3m7qzshjbje2f
https://mstdn.social/users/jschauma/statuses/115703058651440730
https://bsky.app/profile/react.dev/post/3m7qhartr5t2v
https://bsky.app/profile/react.dev/post/3m7qhartp7d2v
https://bsky.app/profile/react.dev/post/3m7qhartp7c2v
https://bsky.app/profile/react.dev/post/3m7qhaqdxuc2v
https://bsky.app/profile/react.dev/post/3m7qhaqdtxc2v
CVE-2015-2051
Explications des termes
- Firmware : logiciel interne embarqué dans l’équipement (ici, le routeur).
- HNAP (Home Network Administration Protocol) : protocole/Interface d’administration réseau utilisé par certains routeurs pour la gestion à distance.
- GetDeviceSettings : action/commande de l’interface HNAP visant à récupérer des paramètres de l’appareil.
- Exécution de commandes arbitraires : capacité à faire exécuter au système des commandes choisies par l’attaquant (commande système).
Description originale (EN)
The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface.
Posts / Sources (80)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-02)
The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-02)
The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-01)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-01)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-31)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-31)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-30)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-30)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-29)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-29)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-28)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-28)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-27)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-27)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-26)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-26)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-25)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-25)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-24)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-24)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-23)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-23)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-22)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-22)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-21)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-21)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-20)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-20)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-19)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-19)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-18)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-18)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-17)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-17)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-16)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-16)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-15)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-15)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-14)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-14)
CVE-2017-18368
Explications des termes
- Injection de commandes : possibilité d’exécuter des commandes système en injectant du texte malveillant dans une entrée non correctement filtrée.
- Non authentifié : l’attaque peut être menée sans identifiant/mot de passe.
- Remote System Log forwarding : fonction qui envoie les logs (journaux) du routeur vers un hôte distant pour centralisation/supervision.
- Paramètre (remote_host) : valeur transmise à une page web (ici ViewLog.asp) et utilisée par l’application ; si elle n’est pas validée, elle peut servir de point d’injection.
Description originale (EN)
The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the ViewLog.asp page and can be exploited through the remote_host parameter.
Posts / Sources (80)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-02)
The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-02)
The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-01)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-01)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-31)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-31)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-30)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-30)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-29)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-29)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-28)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-28)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-27)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-27)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-26)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-26)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-25)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-25)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-24)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-24)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-23)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-23)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-22)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-22)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-21)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-21)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-20)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-20)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-19)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-19)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-18)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-18)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-17)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-17)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-16)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-16)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-15)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-15)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-14)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-14)
CVE-2025-14174
Explications des termes
- ANGLE : composant graphique (couche de compatibilité) utilisé par Chrome pour gérer le rendu via des API graphiques.
- Out-of-bounds / accès mémoire hors limites : lecture/écriture en dehors de la zone mémoire prévue, pouvant provoquer un crash ou d’autres effets indésirables.
- HTML : langage de base des pages web ; ici, une page “craftée” sert à déclencher la vulnérabilité.
- Chromium : projet open source sur lequel Google Chrome est basé.
Description originale (EN)
Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
Posts / Sources (32)
https://bsky.app/profile/opera-security.bsky.social/post/3mab6zjgid22h
https://bsky.app/profile/ferramentaslinux.bsky.social/post/3mab5goviws2t
https://bsky.app/profile/solidot.bsky.social/post/3ma6ushe7vc2b
https://bsky.app/profile/bluesky.awakari.com/post/3ma6m7qocjd2h
https://bsky.app/profile/buchikuma.bsky.social/post/3ma6ipwwser2n
https://support.apple.com/en-us/125884
https://cyber.gc.ca/en/alerts-advisories/apple-security-advisory-av25-837
https://social.circl.lu/users/circl/statuses/115724467601871533
https://cyber.gc.ca/en/alerts-advisories/microsoft-edge-security-advisory-av25-832
https://infosec.exchange/users/edwardk/statuses/115723686400449270
https://threatintel.cc/2025/12/15/apple-fixes-two-zeroday-flaws.html
https://mastodon.social/users/verbrecher/statuses/115720201828646496
https://infosec.exchange/users/edwardk/statuses/115715286886993205
https://infosec.exchange/users/edwardk/statuses/115715284399686140
https://infosec.exchange/users/decio/statuses/115712117671837539
https://bsky.app/profile/undercode.bsky.social/post/3m7ud364ypz2j
https://poliverso.org/objects/0477a01e-24ffa59d-f6bd1f54954653f0
https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3m7u7ntwm3ge2
https://bsky.app/profile/bluesky.awakari.com/post/3m7u7m7umxr2k
https://www.acn.gov.it/portale/w/apple-rilevato-sfruttamento-attivo-di-vulnerabilita-in-webkit
https://bsky.app/profile/bitnewsbot.bsky.social/post/3m7u4qnpb252b
https://bsky.app/profile/pigondrugs.bsky.social/post/3m7tprslf5w2a
https://infosec.exchange/users/DarkWebInformer/statuses/115709232652916760
https://gist.github.com/Darkcrai86/1d06f0db35e47ce235939df02d910afc
https://gist.github.com/Darkcrai86/2417cfb1b55d4188b9c3856d2e3302fc
https://infosec.exchange/users/cR0w/statuses/115708352000214919
https://bsky.app/profile/applsec.bsky.social/post/3m7su2tpgsd2z
https://infosec.exchange/users/applsec/statuses/115708312902658376
https://bsky.app/profile/applsec.bsky.social/post/3m7srlmndl22z
https://infosec.exchange/users/applsec/statuses/115708138694582722
https://bsky.app/profile/deskmodder.de/post/3m7rgxz2tjg23
https://bsky.app/profile/shiojiri.com/post/3m7raqgof4c2c
CVE-2025-37164
Explications des termes
- HPE OneView : outil de gestion centralisée d’infrastructure (serveurs, stockage, réseau) de Hewlett Packard Enterprise.
- RCE (Remote Code Execution) : capacité pour un attaquant d’exécuter des commandes ou du code arbitraire à distance sur une machine vulnérable.
Description originale (EN)
A remote code execution issue exists in HPE OneView.
Posts / Sources (31)
https://bsky.app/profile/PostgreSQL.activitypub.awakari.com.ap.brid.gy/post/3mazw4ilg6362
https://bsky.app/profile/termsofsurrender.bsky.social/post/3maqn3b7ty62k
https://bsky.app/profile/thedailytechfeed.com/post/3maqk5kesrc2z
https://bsky.app/profile/beikokucyber.bsky.social/post/3mah44enans2d
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/hpe_oneview_rce.rb
https://bsky.app/profile/hack4career.com/post/3maedhzllql2q
https://bsky.app/profile/thedailytechfeed.com/post/3maeazuesgn2y
https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-37164.yaml
https://bsky.app/profile/netsecio.bsky.social/post/3mae2ha7ry62z
https://mastodon.social/ap/users/115426718704364579/statuses/115747042422772085
https://cyberplace.social/users/GossiTheDog/statuses/115746866896615822
https://bsky.app/profile/infosecbriefly.bsky.social/post/3madraxequt2o
https://bsky.app/profile/infosecbriefly.bsky.social/post/3madqnnpu4f2u
https://infosec.exchange/users/edwardk/statuses/115746327958380635
https://threatintel.cc/2025/12/19/hpe-oneview-vulnerable-to-remote.html
https://cyberplace.social/users/GossiTheDog/statuses/115745701289876342
https://infosec.exchange/users/offseq/statuses/115745315435788020
https://bsky.app/profile/pmloik.bsky.social/post/3macn2mdz322d
https://bsky.app/profile/securityrss.bsky.social/post/3mac6l6wcsn24
https://bsky.app/profile/rapid7.com/post/3mabrvqeey22d
https://bsky.app/profile/blackhatnews.tokyo/post/3mabi6mkgo72m
https://bsky.app/profile/infosecbriefly.bsky.social/post/3mabhmnc4732o
https://bsky.app/profile/cybersentinel404.bsky.social/post/3mabh4x6eyt2y
https://thehackernews.com/2025/12/hpe-oneview-flaw-rated-cvss-100-allows.html
https://infosec.exchange/users/defendopsdiaries/statuses/115740409680221536
https://bsky.app/profile/blackhatnews.tokyo/post/3mab3zhk66g2w
https://bsky.app/profile/bleepingcomputer.com/post/3mab3j2kffa2y
https://bsky.app/profile/infosec.skyfleet.blue/post/3maatpxwei72x
https://poliverso.org/objects/0477a01e-12f62d7c-077c63f4f1d9f417
https://infosec.exchange/users/vuldb/statuses/115735540741211292
https://infosec.exchange/users/cR0w/statuses/115730294700387877
CVE-2016-1555
Explications des termes
- PHP : langage de script côté serveur utilisé pour des pages/fonctions web sur l’équipement.
- Exécution de commandes arbitraires : capacité pour un attaquant de lancer les commandes de son choix sur le système cible (souvent via l’interface web).
Description originale (EN)
(1) boardData102.php, (2) boardData103.php, (3) boardDataJP.php, (4) boardDataNA.php, and (5) boardDataWW.php in Netgear WN604 before 3.3.3 and WN802Tv2, WNAP210v2, WNAP320, WNDAP350, WNDAP360, and WNDAP660 before 3.5.5.0 allow remote attackers to execute arbitrary commands.
Posts / Sources (80)
The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-02)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-31)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-29)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-28)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-27)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-26)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-25)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-24)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-23)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-22)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-21)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-20)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-19)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-18)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-17)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-16)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-15)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-14)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-13)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-12)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-10)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-09)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-08)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-07)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-06)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-05)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-05)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-04)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-03)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-03)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-02)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-01)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-30)
The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-30)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-29)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-28)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-27)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-26)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-25)
The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-24)