#1 · PT-2023-6605 · Apache · Apache Activemq

Yejie@Threatbook.Cn

·

Published

2023-10-27

·

Updated

2025-11-29

·

CVE-2023-46604

10

Critical

Base

AV:N/AC:L/Au:N/C:C/I:C/A:C

Name of the Vulnerable Software and Affected Versions Apache ActiveMQ versions prior to 5.15.16 Apache ActiveMQ versions 5.16.x prior to 5.16.7 Apache ActiveMQ versions 5.17.x prior to 5.17.6 Apache ActiveMQ versions 5.18.x prior to 5.18.3 Bamboo Data Center versions prior to 9.2.7 Bamboo Data Center versions prior to 9.3.5 Bamboo Data Center versions prior to 9.4.1
Description Apache ActiveMQ is susceptible to a Remote Code Ex...
More

Exploit

Fix

RCE

Deserialization of Untrusted Data

224 Posts
357Reposts
4.0 M Audience

#2 · PT-2025-35106 · Freepbx · Freepbx

Matthewljensen

·

Published

2025-08-28

·

Updated

2025-11-29

·

CVE-2025-57819

10

Critical

Base

AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Name of the Vulnerable Software and Affected Versions FreePBX versions 15.0.0 through 15.0.65 FreePBX versions 16.0.0 through 16.0.88 FreePBX versions 17.0.0 through 17.0.2
Description FreePBX is vulnerable to an authentication bypass due to insufficiently sanitized user-supplied data. This allows unauthenticated access to the FreePBX Administrator interface, leading to arbitrary database manipulation and remote code execution...
More

Exploit

Fix

RCE

Authentication Bypass Using an Alternate Path or Channel

SQL injection

67 Posts
248Reposts
841.7 K Audience

#3 · PT-2025-23468 · Qualcomm · Qualcomm Snapdragon

Published

2025-01-24

·

Updated

2025-11-29

·

CVE-2025-21479

8.6

High

Base

AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions Qualcomm chipsets (affected versions not specified) Meta Quest 3 and 3S versions August 7, 2025 and earlier Samsung S23 (affected versions not specified)
Description A flaw exists in Qualcomm Adreno GPU firmware that allows unauthorized command execution in the GPU micronode. This can lead to memory corruption when a specific sequence of commands is processed. The issue has...
More

Exploit

LPE

RCE

Incorrect Authorization

42 Posts
360Reposts
26.2 M Audience

#4 · PT-2021-17153 · Microsoft · Windows

H3V0X

·

Published

2021-06-11

·

Updated

2025-11-29

·

CVE-2021-26829

5.4

Medium

Base

AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Name of the Vulnerable Software and Affected Versions OpenPLC ScadaBR versions through 0.9.1 on Linux OpenPLC ScadaBR versions through 1.12.4 on Windows
Description OpenPLC ScadaBR is susceptible to a stored cross-site scripting (XSS) issue. The issue is triggered through the
system settings.shtm
file. The pro-Russian hacktivist group TwoNet exploited this and other issues, including default credentials, to fabricate attacks...
More

Exploit

Fix

XSS

6 Posts
8Reposts
6.5 K Audience

#5 · PT-2024-9110 · Tp Link · Tp-Link Deco Series

Thottysploity

·

Published

2024-11-20

·

Updated

2025-11-28

·

CVE-2024-53375

8.0

High

Base

AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions TP-Link Archer Series routers TP-Link Deco Series routers TP-Link Tapo Series routers
Description An authenticated Remote Code Execution (RCE) issue affects TP-Link Archer, Deco, and Tapo series routers. The issue resides in the
tmp get sites
function within the HomeShield functionality. The issue is exploitable even without HomeShield being installed or activated. The vul...
More

Exploit

OS Command Injection

9 Posts
32Reposts
211.0 K Audience

#6 · PT-2024-7982 · D Link · D-Link Dns-325

Netsecfish

·

Published

2024-11-06

·

Updated

2025-11-28

·

CVE-2024-10915

10

High

Base

AV:N/AC:L/Au:N/C:C/I:C/A:C

Name of the Vulnerable Software and Affected Versions D-Link DNS-320, DNS-320LW, DNS-325, and DNS-340L versions up to 20241028
Description A critical issue exists in the
cgi user add
function of the file
/cgi-bin/account mgr.cgi?cmd=cgi user add
within the affected D-Link devices. Manipulation of the argument group allows for operating system command injection. This allows a remote attacker to execute arbitrary commands on...
More

Exploit

Fix

Improper Neutralization

Special Elements Injection

OS Command Injection

6 Posts
0Reposts
59.7 K Audience

#7 · PT-2025-48124 · Faction · Faction

Published

2025-11-26

·

Updated

2025-11-28

·

CVE-2025-66022

9.6

Critical

Base

AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions FACTION versions prior to 1.7.1
Description FACTION is a PenTesting Report Generation and Collaboration Framework. Prior to version 1.7.1, a flaw in the extension framework allows untrusted extension code to execute arbitrary system commands on the server when a lifecycle hook is invoked, leading to remote code execution (RCE). A missing authentication check on the `/portal/...
More

Exploit

Fix

RCE

Improper Authentication

6 Posts
3Reposts
599 Audience

#8 · PT-2025-39207 · Cryptolib · Cryptolib

Luiginoc

·

Published

2025-09-23

·

Updated

2025-11-29

·

CVE-2025-59534

7.8

High

Base

AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions CryptoLib versions prior to 1.4.2
Description CryptoLib is a software solution utilizing the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) for secure communications between spacecraft and ground stations. A command injection issue exists in the
initialize kerberos keytab file login()
function due to the direct interpolation of user-controlled inpu...
More

Fix

OS Command Injection

4 Posts
4Reposts
2.5 K Audience

#9 · PT-2025-47496 · Plex · Twonky Server

Published

2025-11-19

·

Updated

2025-11-29

·

CVE-2025-13315

9.3

Critical

Base

AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Name of the Vulnerable Software and Affected Versions Twonky Server version 8.5.2
Description An unauthenticated attacker can bypass web service API authentication controls. This allows access to a log file containing the administrator's username and encrypted password. The affected software is Twonky Server version 8.5.2 running on Linux and Windows. The API authentication bypass allows unauthorized access to sensitive informa...
More
6 Posts
6Reposts
2.6 K Audience

#10 · PT-2025-48105 · Db Elettronica Telecomunicazioni Spa · Mozart Fm Transmitter

Abdul Mhanni

·

Published

2025-11-26

·

Updated

2025-11-28

·

CVE-2025-66253

9.9

Critical

Base

AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Name of the Vulnerable Software and Affected Versions DB Electronica Telecomunicazioni S.p.A. Mozart FM Transmitter versions 30, 50, 100, 300, 500, 1000, 2000, 3000, 3500, 6000, 7000
Description An unauthenticated OS Command Injection issue exists in the
start upgrade.php
component of the software. The
/var/tdf/start upgrade.php
API endpoint directly passes user-controlled input from the
$ GET["filename"]
parameter to the...
More

Exploit

Fix

RCE

OS Command Injection

3 Posts
0Reposts
440 Audience

#11 · PT-2025-47514 · Plex · Twonky Server

Published

2025-11-19

·

Updated

2025-11-28

·

CVE-2025-13316

8.2

High

Base

AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Name of the Vulnerable Software and Affected Versions Twonky Server version 8.5.2
Description Twonky Server version 8.5.2 on Linux and Windows contains a cryptographic flaw due to the use of hard-coded cryptographic keys. An attacker who knows the encrypted administrator password can decrypt it using these static keys to reveal the plain text password and obtain administrator-level access to Twonky Server.
Recommendations...
More
4 Posts
5Reposts
2.0 K Audience

#12 · PT-2025-48267 · Sdmc · Sdmc Ne6037 Routers

Grzegorz Bronka

·

Published

2025-11-27

·

Updated

2025-11-28

·

CVE-2025-8890

9.3

Critical

Base

AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Name of the Vulnerable Software and Affected Versions SDMC NE6037 routers versions prior to 7.1.12.2.44
Description The network diagnostics tool in SDMC NE6037 routers is susceptible to a shell command injection attack. Exploitation requires an attacker to log in to the router's administrative portal, which is accessible via LAN ports. Successful exploitation could lead to remote code execution.
Recommendations Versions pr...
More

Fix

RCE

OS Command Injection

5 Posts
1Reposts
597 Audience

#13 · PT-2025-48251 · WordPress · Blubrry Powerpress

Ismailshadow

·

Published

2025-11-27

·

Updated

2025-11-29

·

CVE-2025-13536

8.8

High

Base

AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions Blubrry PowerPress versions up to and including 11.15.2
Description The Blubrry PowerPress plugin for WordPress is susceptible to arbitrary file uploads because of inadequate file type validation. This occurs because the plugin validates file extensions but does not stop execution when validation fails within the
powerpress edit post
function. Authenticated attackers with...
More

Fix

RCE

Unrestricted File Upload

5 Posts
0Reposts
490 Audience

#14 · PT-2025-48268 · Wirtualna Uczelnia

Marcin Ressel

·

Published

2025-11-27

·

Updated

2025-11-27

·

CVE-2025-12140

9.3

Critical

Base

AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Name of the Vulnerable Software and Affected Versions Wirtualna Uczelnia versions prior to wu#2016.1.5513#0#20251014 113353
Description The application has an insecure 'redirectToUrl' mechanism that incorrectly processes the
redirectUrlParameter
parameter. The application interprets the entered string of characters as a Java expression, potentially allowing an unauthenticated attacker to execute arbitrary code. Real-world exp...
More

Fix

RCE

Eval Injection

3 Posts
1Reposts
506 Audience

#15 · PT-2025-44072 · Krita · Krita

Published

2025-01-01

·

Updated

2025-11-29

·

CVE-2025-59820

6.7

Medium

Base

AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:N

Name of the Vulnerable Software and Affected Versions Krita versions prior to 5.2.13 Krita versions 5.1.5+dfsg-2+deb12u1 through 5.1.5+dfsg-2+deb12u1 Krita versions 5.2.9+dfsg-1+deb13u1 through 5.2.9+dfsg-1+deb13u1
Description A heap-based buffer overflow exists in the TGA parser of Krita, a creative application for raster images. Loading a manipulated TGA file can lead to a buffer overflow in the
kis tga import.cpp
file (als...
More

Fix

RCE

3 Posts
0Reposts
463 Audience

#16 · PT-2025-48353 · Fonttools · Fonttools

Published

2025-11-29

·

Updated

2025-11-29

·

CVE-2025-66034

6.3

Medium

Base

AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L

Name of the Vulnerable Software and Affected Versions fontTools versions 4.33.0 through 4.60.1
Description fontTools is a Python library used for manipulating fonts. Versions from 4.33.0 up to, but not including, 4.60.2 contain a file write issue within the
varLib
script (or when using
python3 -m fontTools.varLib
). This can lead to remote code execution when processing a malicious
.designspace
file. The issue resides in t...
More

Fix

RCE

2 Posts
0Reposts
202 Audience

#17 · PT-2025-48365 · Orangehrm · Orangehrm

Published

2025-11-29

·

Updated

2025-11-29

·

CVE-2025-66224

9.0

Critical

Base

AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Name of the Vulnerable Software and Affected Versions OrangeHRM versions 5.0 through 5.7
Description OrangeHRM contains an input-neutralization flaw in its mail configuration and delivery workflow. User-controlled values are not sanitized before being used in the system’s sendmail command, allowing unintended sendmail behaviors during email processing. This can lead to the application writing files on the server, potentially en...
More

Fix

RCE

Code Injection

2 Posts
0Reposts
184 Audience

#18 · PT-2025-48281 · Mattermost · Mattermost

Daw10

·

Published

2025-11-27

·

Updated

2025-11-28

·

CVE-2025-12421

9.9

Critical

Base

AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions Mattermost versions 10.5.x through 10.5.12 Mattermost versions 10.11.x through 10.11.4 Mattermost versions 10.12.x through 10.12.1 Mattermost versions 11.0.x through 11.0.2
Description Mattermost fails to verify that the token used during the code exchange originates from the same authentication flow. This allows an authenticated user to perform account takeover by using a s...
More

Fix

8 Posts
2Reposts
1.2 K Audience

#19 · PT-2025-48273 · Mattermost · Mattermost

Daw10

·

Published

2025-11-27

·

Updated

2025-11-28

·

CVE-2025-12419

9.9

Critical

Base

AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions Mattermost versions 10.5.x through 10.12.1 Mattermost versions 10.11.x through 10.11.4 Mattermost versions 11.0.x through 11.0.3
Description Mattermost fails to properly validate OAuth state tokens during OpenID Connect authentication. This allows an authenticated attacker with team creation privileges to take over a user account by manipulating authentication data during th...
More

Fix

8 Posts
3Reposts
1.2 K Audience

#20 · PT-2025-48111 · Redaxo · Redaxo

Published

2025-11-25

·

Updated

2025-11-29

·

CVE-2025-66026

6.1

Medium

Base

AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Name of the Vulnerable Software and Affected Versions REDAXO versions prior to 5.20.1
Description REDAXO is a PHP-based CMS. A reflected Cross-Site Scripting (XSS) vulnerability exists in the Mediapool view where the request parameter
args[types]
is rendered into an info banner without HTML-escaping. This allows arbitrary JavaScript execution in the backend context when an authenticated user visits a crafted link while logged...
More

Exploit

Fix

XSS

1 Posts
0Reposts
64 Audience

#21 · PT-2025-48334 · Netskope · Netskope

Published

2025-11-28

·

Updated

2025-11-28

·

CVE-2025-11156

5.9

Medium

Base

AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Name of the Vulnerable Software and Affected Versions Netskope versions (affected versions not specified)
Description A flaw exists in the Netskope agent (NS Client) on Windows systems. A local, authenticated user with Administrator privileges can improperly load the driver as a generic kernel service, triggering a system crash (Blue-Screen-of-Death) and resulting in a Denial of Service (DoS) for the affected machine.
**Recomm...
More

LPE

DoS

NULL Pointer Dereference

2 Posts
0Reposts
252 Audience

#22 · PT-2025-48317 · Cerebrate · Cerebrate

Published

2025-11-28

·

Updated

2025-11-28

·

CVE-2025-66385

9.4

Critical

Base

AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Name of the Vulnerable Software and Affected Versions Cerebrate versions prior to 1.30
Description An authenticated, non-privileged user can escalate their privileges, such as obtaining an administrator role, in Cerebrate. This is achieved through the
user-edit
endpoint by modifying the
role id
or
organisation id
fields within an edit request to the
UsersController::edit
function. The
role id
and
organisation id
are...
More

Fix

LPE

3 Posts
1Reposts
339 Audience

#23 · PT-2025-48086 · Geoserver · Geoserver

Published

2025-11-25

·

Updated

2025-11-29

·

CVE-2025-58360

8.5

High

Base

AV:N/AC:L/Au:N/C:C/I:N/A:P

Name of the Vulnerable Software and Affected Versions GeoServer versions 2.26.0 through 2.26.1 and versions prior to 2.25.6
Description GeoServer is an open-source server used for sharing and editing geospatial data. A flaw exists in the way the software handles XML input received through the
/geoserver/wms
GetMap
operation. Insufficient sanitization of this input allows attackers to define external entities within XML requ...
More

Fix

XXE

7 Posts
23Reposts
23.7 K Audience

#24 · PT-2025-48303 · Huawei · Harmonyos

Published

2025-11-28

·

Updated

2025-11-28

·

CVE-2025-64314

9.3

Critical

Base

AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions Huawei HarmonyOS version 5.1.0
Description A permission control issue exists within the memory management module. Successful exploitation of this issue may lead to a compromise of confidentiality. The issue allows unprivileged local attackers to gain complete system access.
Recommendations Restrict access to the affected system as a mitigation measure.

Fix

Type Confusion

4 Posts
0Reposts
563 Audience

#25 · PT-2025-48284 · Logpoint · Logpoint

Published

2025-11-27

·

Updated

2025-11-28

·

CVE-2025-66360

6.9

Medium

Base

AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Name of the Vulnerable Software and Affected Versions Logpoint versions prior to 7.7.0
Description An improperly configured access control policy exposes sensitive Logpoint internal service (Redis) information to
li-admin
users. This exposure can lead to privilege escalation.
Recommendations Update to version 7.7.0 or later.

Fix

LPE

Incorrect Authorization

2 Posts
0Reposts
400 Audience

#26 · PT-2025-48344 · Lz4-Java · Lz4-Java

Jonas Konrad

+1

·

Published

2025-11-28

·

Updated

2025-11-28

·

CVE-2025-12183

8.8

High

Base

AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Name of the Vulnerable Software and Affected Versions org.lz4:lz4-java versions prior to 1.8.0
Description The software contains flaws related to memory handling. Specifically, out-of-bounds memory operations can occur when processing untrusted compressed input. This can lead to a denial of service and potential reading of adjacent memory.
Recommendations Update to a version newer than 1.8.0.

Fix

DoS

Out of bounds Read

2 Posts
0Reposts
311 Audience

#27 · PT-2025-48350 · Pubnet · Pubnet

Published

2025-11-29

·

Updated

2025-11-29

·

CVE-2025-65112

9.4

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

Name of the Vulnerable Software and Affected Versions PubNet versions prior to 1.1.3
Description PubNet is a self-hosted Dart & Flutter package service. The
/api/storage/upload
endpoint allows unauthenticated users to upload packages as any user by providing arbitrary
author-id
values. This enables identity spoofing, privilege escalation, and supply chain attacks.
Recommendations Update to version 1.1.3 or later.

Fix

Missing Authorization

Missing Authentication

5 Posts
0Reposts
303 Audience

#28 · PT-2025-48196 · Google · Angular

Published

2025-11-26

·

Updated

2025-11-29

·

CVE-2025-66035

7.7

High

Base

AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N

Name of the Vulnerable Software and Affected Versions Angular versions prior to 19.2.16 Angular versions prior to 20.3.14 Angular versions prior to 21.0.1
Description Angular’s HttpClient has a built-in Cross-Site Request Forgery (XSRF) protection mechanism. When handling requests with protocol-relative URLs (URLs starting with '//'), the system incorrectly treats them as same-origin requests. This results in the automatic addi...
More

Fix

5 Posts
0Reposts
685 Audience

#29 · PT-2025-48322 · Uniong · Webitr

Published

2025-11-28

·

Updated

2025-11-28

·

CVE-2025-13771

6.5

Medium

Base

AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Name of the Vulnerable Software and Affected Versions WebITR (affected versions not specified)
Description WebITR, developed by Uniong, contains an Arbitrary File Read issue stemming from Relative Path Traversal. Authenticated remote attackers can exploit this to download arbitrary system files. The issue allows attackers to read arbitrary files via path traversal.
Recommendations At the moment, there is no information abo...
More

Relative Path Traversal

3 Posts
0Reposts
397 Audience

#30 · PT-2025-48300 · Video-Related System Service Module

Published

2025-11-28

·

Updated

2025-11-28

·

CVE-2025-58316

7.3

High

Base

AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

Name of the Vulnerable Software and Affected Versions versions prior to 2025-58316
Description A denial-of-service condition exists in the video-related system service module. Successful exploitation of this issue may affect availability.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

DoS

Race Condition

1 Posts
0Reposts
295 Audience