#1 · PT-2025-10859 · Apple · Ipados

Gary Kwong

·

Published

2025-03-11

·

Updated

2025-08-30

·

CVE-2025-24201

10

High

Base

AV:N/AC:L/Au:N/C:C/I:C/A:C

Name of the Vulnerable Software and Affected Versions: visionOS versions prior to 2.3.2 iOS versions prior to 18.3.2 iPadOS versions prior to 18.3.2 macOS Sequoia versions prior to 15.3.2 Safari versions prior to 18.3.1 Description: A critical vulnerability in the WebKit browser engine allows attackers to escape the Web Content sandbox, potentially leading to the execution of malicious code. This issue has been exploited in extremely s...More

Exploit

Fix

RCE

Memory Corruption

#2 · PT-2025-34177 · Apple · Ipados

Published

2025-08-20

·

Updated

2025-08-31

·

CVE-2025-43300

10

High

Base

AV:N/AC:L/Au:N/C:C/I:C/A:C

**Name of the Vulnerable Software and Affected Versions:** Apple iOS, iPadOS, and macOS versions 17.7.10, 18.6.2, 13.7.8, 14.7.8, and 15.6.1. **Description:** An out-of-bounds write vulnerability exists in the ImageIO framework. Processing a maliciously crafted image file may lead to memory corruption and potential remote code execution. This vulnerability (CVE-2025-43300) has been actively exploited in targeted attacks, potentially...More

Exploit

Fix

RCE

Memory Corruption

#3 · PT-2025-15596 · Microsoft · Windows

Oruga

·

Published

2025-04-08

·

Updated

2025-08-31

·

CVE-2025-29824

7.8

High

Base

AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:** Microsoft Windows versions prior to the April 2025 security update. **Description:** A use-after-free vulnerability exists in the Windows Common Log File System (CLFS) Driver. This vulnerability allows an authorized attacker to elevate privileges locally, potentially gaining SYSTEM-level access. The vulnerability, tracked as CVE-2025-29824, was actively exploited in targeted...More

Exploit

Fix

LPE

RCE

Use After Free

#4 · PT-2023-6605 · Apache · Apache Activemq

Yejie@Threatbook.Cn

·

Published

2023-10-27

·

Updated

2025-08-31

·

CVE-2023-46604

10

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:** Apache ActiveMQ versions prior to 5.15.16, prior to 5.16.7, prior to 5.17.6, and prior to 5.18.3. **Description:** Apache ActiveMQ is vulnerable to Remote Code Execution (RCE) due to insecure deserialization of data within the OpenWire protocol. Successful exploitation allows a remote, unauthenticated attacker to execute arbitrary code on the server. Public exploits exist, an...More

Exploit

Fix

RCE

Deserialization of Untrusted Data

#5 · PT-2025-34761 · Citrix · Netscaler Gateway

Published

2025-08-26

·

Updated

2025-08-31

·

CVE-2025-7775

9.8

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:** Citrix NetScaler ADC and NetScaler Gateway versions 13.1, 14.1, and 13.1-FIPS and NDcPP. **Description:** A memory overflow vulnerability exists in Citrix NetScaler ADC and NetScaler Gateway, potentially leading to Remote Code Execution (RCE) and/or Denial of Service (DoS). This vulnerability is actively exploited in the wild. The vulnerability is present when NetScaler is co...More

Fix

DoS

RCE

Buffer Overflow

#6 · PT-2025-30081 · Crushftp · Crushftp

Ben Spink

·

Published

2025-07-18

·

Updated

2025-08-31

·

CVE-2025-54309

9.8

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:** CrushFTP versions prior to 10.8.5 and versions prior to 11.3.4 23 **Description:** CrushFTP is vulnerable to a critical security flaw that allows remote attackers to gain administrative access via HTTPS when the DMZ proxy feature is not used. This vulnerability stems from improper handling of AS2 validation. Active exploitation of this flaw has been observed since July 18, 20...More

Exploit

Fix

RCE

#7 · PT-2025-34057 · Docker · Docker Desktop

Felix Boulet

+1

·

Published

2025-08-20

·

Updated

2025-08-31

·

CVE-2025-9074

9.3

Critical

Base

AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

**Name of the Vulnerable Software and Affected Versions:** Docker Desktop versions prior to 4.44.3 **Description:** A critical vulnerability exists in Docker Desktop that allows local Linux containers to access the Docker Engine API via the configured Docker subnet (defaulting to 192.168.65.7:2375). This vulnerability occurs regardless of Enhanced Container Isolation (ECI) being enabled or disabled, and even with the "Expose daemon on...More

Exploit

Fix

LPE

Exposure of Resource to Wrong Sphere

#8 · PT-2025-15063 · Facebook · Facebook Whatsapp Desktop

Published

2025-04-05

·

Updated

2025-08-30

·

CVE-2025-30401

6.8

Medium

Base

AV:N/AC:H/Au:S/C:C/I:C/A:P

**Name of the Vulnerable Software and Affected Versions:** WhatsApp for Windows versions prior to 2.2450.6 **Description:** A spoofing issue exists in WhatsApp for Windows, prior to version 2.2450.6, where attachments are displayed according to their MIME type, but the file opening handler is selected based on the filename extension. A maliciously crafted mismatch could cause the recipient to inadvertently execute arbitrary code instea...More

Fix

RCE

#9 · PT-2025-35106 · Freepbx · Freepbx

Matthewljensen

·

Published

2025-08-28

·

Updated

2025-08-30

·

CVE-2025-57819

10

Critical

Base

AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

**Name of the Vulnerable Software and Affected Versions:** FreePBX versions prior to 15.0.66 FreePBX versions prior to 16.0.89 FreePBX versions prior to 17.0.3 **Description:** FreePBX is vulnerable due to insufficiently sanitized user-supplied data, allowing unauthenticated access to the FreePBX Administrator interface. This can lead to arbitrary database manipulation and remote code execution (RCE). The vulnerability is actively expl...More

Fix

RCE

SQL injection

Authentication Bypass Using an Alternate Path or Channel

#10 · PT-2025-35227 · Meta · Whatsapp For Mac

Published

2025-08-29

·

Updated

2025-08-30

·

CVE-2025-55177

5.4

Medium

Base

AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

**Name of the Vulnerable Software and Affected Versions:** WhatsApp for iOS versions prior to 2.25.21.73 WhatsApp Business for iOS version prior to 2.25.21.78 WhatsApp for Mac version prior to 2.25.21.78 **Description:** A critical zero-click flaw exists in WhatsApp’s linked device synchronization feature due to incomplete authorization. This flaw allows attackers to trigger the processing of content from arbitrary URLs on a target dev...More

Fix

#11 · PT-2025-32855 · Microsoft · Windows Kerberos

Yug0Rd

+1

·

Published

2025-08-12

·

Updated

2025-08-31

·

CVE-2025-53779

9.0

High

Base

AV:N/AC:L/Au:S/C:C/I:C/A:C

**Name of the Vulnerable Software and Affected Versions:** Windows Kerberos versions prior to August 2025 Patch Tuesday **Description:** A relative path traversal vulnerability in Windows Kerberos allows an authorized attacker to elevate privileges over a network. The vulnerability, also known as “BadSuccessor” (CVE-2025-53779), involves the abuse of delegated Managed Service Accounts (dMSAs) in Windows Server 2025, potentially allowin...More

Fix

LPE

RCE

Relative Path Traversal

44 Posts
74Reposts
6.5 M Audience

#12 · PT-2024-38166 · Unknown · Ewelink Cloud Service

Published

2024-07-31

·

Updated

2025-08-30

·

CVE-2024-7205

9.4

Critical

Base

AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/AU:N/R:U/V:D/RE:L/U:Green

Name of the Vulnerable Software and Affected Versions: eWeLink Cloud Service versions prior to 2.19.0 eWeLink Cloud Service versions up to 2.18.x Description: When a device is shared, the homepage module in eWeLink Cloud Service allows a secondary user to take over devices as a primary user by sharing unnecessary device-sensitive information. Recommendations: eWeLink Cloud Service versions prior to 2.19.0: Upgrade to version 2.19.0 or...More

Fix

#13 · PT-2024-38167 · Ewelink · Ewelink

Published

2024-10-07

·

Updated

2025-08-30

·

CVE-2024-7206

7.0

High

Base

AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Name of the Vulnerable Software and Affected Versions: eWeLink (affected versions not specified) Description: A local attacker can decrypt TLS communication and extract secrets to clone the device via flashing modified firmware due to a missing SSL pinning implementation. Recommendations: At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Using Hardcoded Credentials

Improper Certificate Validation

#14 · PT-2025-34216 · Plex · Plex Media Server

Luis Finke

·

Published

2025-08-21

·

Updated

2025-08-30

·

CVE-2025-34158

8.5

High

Base

AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N

**Name of the Vulnerable Software and Affected Versions:** Plex Media Server versions 1.41.7.x through 1.42.0.x **Description:** Plex Media Server (PMS) versions 1.41.7.x through 1.42.0.x are affected by an unspecified security vulnerability reported through Plex’s bug bounty program. The vulnerability involves incorrect resource transfer between spheres and has a maximum CVSS score. Over 300,000 instances of Plex Media Server remain v...More

Exploit

Fix

RCE

#15 · PT-2025-33117 · Netskope · Netskope Client

Richard Warren

·

Published

2025-08-14

·

Updated

2025-08-30

·

CVE-2025-0309

6.0

Medium

Base

AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

**Name of the Vulnerable Software and Affected Versions:** Netskope Client for Windows (affected versions not specified) **Description:** An insufficient validation exists on the server connection endpoint in Netskope Client, allowing local users to elevate privileges on the system. This insufficient validation enables the client to connect to any server presenting publicly signed CA TLS certificates and transmit specifically crafted r...More

LPE

Improper Certificate Validation

#16 · PT-2025-30546 · Dahua · Dahua Ip Products

Published

2025-07-23

·

Updated

2025-08-31

·

CVE-2025-31701

8.1

High

Base

AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:** Dahua products (affected versions not specified) **Description:** A buffer overflow vulnerability has been discovered in Dahua products. Attackers can exploit this issue by sending specially crafted malicious packets, potentially leading to service disruption, such as crashes, or remote code execution (RCE). Address Space Layout Randomization (ASLR), a security mechanism presen...More

DoS

RCE

Buffer Overflow

9 Posts
2Reposts
77.0 K Audience

#17 · PT-2025-30545 · Dahua · Dahua Ip Products

Published

2025-07-23

·

Updated

2025-08-31

·

CVE-2025-31700

8.1

High

Base

AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:** Dahua products (affected versions not specified) **Description:** A buffer overflow vulnerability exists in Dahua products. Attackers can exploit this issue by sending specially crafted malicious packets, potentially leading to service disruption, such as crashes, or remote code execution (RCE). Address Space Layout Randomization (ASLR), a security mechanism present in some dev...More

DoS

RCE

Buffer Overflow

9 Posts
2Reposts
77.0 K Audience

#18 · PT-2019-6103 · Facebook · Whatsapp For Tizen

Published

2019-05-13

·

Updated

2025-08-30

·

CVE-2019-3568

10

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:** WhatsApp versions prior to 2.19.134 (Android) WhatsApp Business versions prior to 2.19.44 (Android) WhatsApp versions prior to 2.19.51 (iOS) WhatsApp Business versions prior to 2.19.51 (iOS) WhatsApp versions prior to 2.18.348 (Windows Phone) WhatsApp versions prior to 2.18.15 (Tizen) **Description:** A heap-based buffer overflow vulnerability exists in the WhatsApp VOIP stack....More

Fix

RCE

Heap Based Buffer Overflow

Memory Corruption

Buffer Overflow

7 Posts
3Reposts
13.4 K Audience

#19 · PT-2025-25642 · Contact Form 7 · Drag/Drop Multiple File Upload – Contact Form 7

Michael Mazzolini

·

Published

2025-06-17

·

Updated

2025-08-30

·

CVE-2025-3515

9.8

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:** Drag and Drop Multiple File Upload for Contact Form 7 versions through 1.3.8.9 **Description:** The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is susceptible to arbitrary file uploads due to inadequate file type validation. This allows unauthenticated attackers to circumvent the plugin’s blacklist and upload potentially dangerous file types, such...More

RCE

Unrestricted File Upload

2 Posts
0Reposts
91.8 K Audience

#20 · PT-2025-35346 · Itsourcecode · Itsourcecode Student Information System

Chessplayer

·

Published

2025-08-30

·

Updated

2025-08-30

·

CVE-2025-9679

7.5

High

Base

AV:N/AC:L/Au:N/C:P/I:P/A:P

Name of the Vulnerable Software and Affected Versions: itsourcecode Student Information System version 1.0 Description: A security issue exists in itsourcecode Student Information System 1.0. The vulnerability is related to SQL injection in the `/course edit1.php` file. Manipulation of the `ID` argument can lead to exploitation. The exploit has been publicly disclosed and may be used remotely. Recommendations: As a temporary workaroun...More

Exploit

Fix

SQL injection

Special Elements Injection

#21 · PT-2025-35372 · Unknown · Campcodes Online Shopping System

M00N_L33

·

Published

2025-08-30

·

Updated

2025-08-30

·

CVE-2025-9692

7.5

High

Base

AV:N/AC:L/Au:N/C:P/I:P/A:P

Name of the Vulnerable Software and Affected Versions: Campcodes Online Shopping System version 1.0 Description: A SQL injection issue exists in Campcodes Online Shopping System 1.0. The issue is located in the `/product.php` file, where manipulation of the `p` argument can lead to SQL injection. The attack can be initiated remotely. The exploit has been made public. Recommendations: At the moment, there is no information about a newe...More

Exploit

SQL injection

Special Elements Injection

#22 · PT-2025-35378 · Sourcecodester · Simple Cafe Billing System

Xyz123

·

Published

2025-08-30

·

Updated

2025-08-30

·

CVE-2025-9701

7.5

High

Base

AV:N/AC:L/Au:N/C:P/I:P/A:P

Name of the Vulnerable Software and Affected Versions: SourceCodester Simple Cafe Billing System version 1.0 Description: A SQL injection issue exists in the file `/receipt.php` due to manipulation of the `ID` parameter. The attack can be launched remotely. The exploit has been publicly disclosed. Recommendations: As a temporary workaround, consider restricting access to the `/receipt.php` file until a fix is available. Avoid using th...More

Exploit

Fix

SQL injection

Special Elements Injection

#23 · PT-2025-35379 · Sourcecodester · Simple Cafe Billing System

Xyz123

·

Published

2025-08-30

·

Updated

2025-08-30

·

CVE-2025-9702

7.5

High

Base

AV:N/AC:L/Au:N/C:P/I:P/A:P

Name of the Vulnerable Software and Affected Versions: SourceCodester Simple Cafe Billing System version 1.0 Description: A SQL injection issue exists in SourceCodester Simple Cafe Billing System 1.0. The vulnerability is located in the `/sales report.php` file, affecting an unknown function. Manipulation of the `month` argument can lead to SQL injection. The exploit is publicly available and may be used to initiate attacks remotely....More

Exploit

Fix

SQL injection

Special Elements Injection

#24 · PT-2025-35377 · Unknown · Sourcecodester Online-Book-Store

Xyz123

·

Published

2025-08-30

·

Updated

2025-08-30

·

CVE-2025-9700

7.5

High

Base

AV:N/AC:L/Au:N/C:P/I:P/A:P

Name of the Vulnerable Software and Affected Versions: SourceCodester Online Book Store version 1.0 Description: A SQL injection issue exists due to the manipulation of the `pubid` parameter when processing the `/publisher list.php` file. This allows for remote attacks. The exploit has been published. Recommendations: As a temporary workaround, restrict access to the `/publisher list.php` file to minimize the risk of exploitation. Avo...More

Exploit

Fix

SQL injection

Special Elements Injection

#25 · PT-2025-35361 · Unknown · Campcodes Online Shopping System

M00N_L33

·

Published

2025-08-30

·

Updated

2025-08-30

·

CVE-2025-9691

7.5

High

Base

AV:N/AC:L/Au:N/C:P/I:P/A:P

Name of the Vulnerable Software and Affected Versions: Campcodes Online Shopping System version 1.0 Description: A SQL injection issue exists in Campcodes Online Shopping System version 1.0. The issue is located in the `/login.php` file, affecting an unknown function. Manipulation of the `Password` argument can lead to successful exploitation. The exploit has been publicly disclosed. Recommendations: As a temporary workaround, conside...More

Exploit

Fix

SQL injection

Special Elements Injection

#26 · PT-2025-35381 · Sourcecodester · Sourcecodester Water Billing System

Xyz123

·

Published

2025-08-30

·

Updated

2025-08-30

·

CVE-2025-9705

7.5

High

Base

AV:N/AC:L/Au:N/C:P/I:P/A:P

Name of the Vulnerable Software and Affected Versions: SourceCodester Water Billing System version 1.0 Description: A SQL injection weakness exists in the `/paybill.php` file due to manipulation of the `ID` argument. Remote exploitation is possible. The exploit has been made publicly available. Recommendations: As a temporary workaround, consider restricting access to the `/paybill.php` file until a fix is available. Sanitize the `ID`...More

Exploit

Fix

SQL injection

Special Elements Injection

#27 · PT-2025-35375 · Sourcecodester · Online Polling System

Quchunyi1

·

Published

2025-08-30

·

Updated

2025-08-30

·

CVE-2025-9699

7.5

High

Base

AV:N/AC:L/Au:N/C:P/I:P/A:P

Name of the Vulnerable Software and Affected Versions: SourceCodester Online Polling System Code version 1.0 Description: A SQL injection issue exists due to the manipulation of the `myusername` argument in the `/admin/checklogin.php` file. The attack can be performed remotely. The exploit is publicly available. Recommendations: As a temporary workaround, sanitize the `myusername` input to prevent SQL injection. Restrict access to the...More

Exploit

Fix

SQL injection

Special Elements Injection

#28 · PT-2025-35382 · Sourcecodester · Sourcecodester Water Billing System

Xyz123

·

Published

2025-08-30

·

Updated

2025-08-30

·

CVE-2025-9706

7.5

High

Base

AV:N/AC:L/Au:N/C:P/I:P/A:P

Name of the Vulnerable Software and Affected Versions: SourceCodester Water Billing System version 1.0 Description: A security issue exists in SourceCodester Water Billing System 1.0. The vulnerability is related to SQL injection within an unknown functionality of the file `/edit.php`. Manipulation of the `ID` argument can lead to exploitation. The exploit has been publicly disclosed. Recommendations: At the moment, there is no inform...More

Exploit

SQL injection

Special Elements Injection

#29 · PT-2025-35358 · Ibm · Watsonx Orchestrate Cartridge For Ibm Cloud Pak For Data

Published

2025-08-30

·

Updated

2025-08-30

·

CVE-2025-0165

7.6

High

Base

AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L

Name of the Vulnerable Software and Affected Versions: IBM watsonx Orchestrate Cartridge for IBM Cloud Pak for Data versions 4.8.4 through 4.8.5 IBM watsonx Orchestrate Cartridge for IBM Cloud Pak for Data versions 5.0.0 through 5.2.0 Description: IBM watsonx Orchestrate Cartridge for IBM Cloud Pak for Data is susceptible to SQL injection. A remote attacker could potentially send crafted SQL statements to view, add, modify, or delete i...More

SQL injection

#30 · PT-2025-35373 · Unknown · Campcodes Advanced Online Voting System

Daojie Zhao

·

Published

2025-08-30

·

Updated

2025-08-30

·

CVE-2025-9694

7.5

High

Base

AV:N/AC:L/Au:N/C:P/I:P/A:P

Name of the Vulnerable Software and Affected Versions: Campcodes Advanced Online Voting System version 1.0 Description: A SQL injection issue exists in an unknown functionality of the file `/admin/login.php`. Manipulation of the `Username` argument can lead to successful exploitation. The attack can be launched remotely, and the exploit has been publicly disclosed. Recommendations: As a temporary workaround, consider restricting acces...More

Exploit

Fix

SQL injection

Special Elements Injection