#1 · PT-2025-17845 · Sap · Sap Netweaver Visual Composer

Benjamin Harris

·

Published

2025-04-22

·

Updated

2025-07-17

·

CVE-2025-31324

10

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

## Vulnerability Summary **Name of the Vulnerable Software and Affected Versions:** SAP NetWeaver versions 7.50 and earlier **Description:** SAP NetWeaver is vulnerable to a critical, remotely exploitable vulnerability (CVE-2025-31324) stemming from a missing authorization check in the Visual Composer Metadata Uploader. This flaw allows unauthenticated attackers to upload malicious files, potentially leading to remote code execution...More

Fix

RCE

Unrestricted File Upload

Deserialization of Untrusted Data

#2 · PT-2025-25651 · Citrix · Citrix Netscaler Adc

Jdoe

+1

·

Published

2025-06-17

·

Updated

2025-07-17

·

CVE-2025-5777

10

Critical

Base

AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L

**Name of the Vulnerable Software and Affected Versions:** Citrix NetScaler ADC and NetScaler Gateway versions prior to 14.1-29.72 Citrix NetScaler ADC and NetScaler Gateway (affected versions not specified) **Description:** Citrix NetScaler ADC and Gateway are affected by an out-of-bounds read vulnerability (CVE-2025-5777) stemming from insufficient input validation. This flaw allows unauthenticated remote attackers to potentially lea...More

Exploit

Fix

DoS

Use of Uninitialized Resource

Out of bounds Read

#3 · PT-2025-15596 · Microsoft · Windows

Oruga

·

Published

2025-04-08

·

Updated

2025-07-17

·

CVE-2025-29824

7.8

High

Base

AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:** Microsoft Windows versions prior to the April 2025 security updates. **Description:** A use-after-free vulnerability exists in the Windows Common Log File System (CLFS) driver. This vulnerability allows an authorized attacker to elevate privileges locally. Multiple threat actors, including Storm-2460 and Play ransomware group, have actively exploited this vulnerability in the...More

Exploit

Fix

LPE

RCE

Use After Free

#4 · PT-2025-15232 · Langflow · Langflow

Naveen Sunkavally

·

Published

2025-04-07

·

Updated

2025-07-17

·

CVE-2025-3248

10

Critical

Base

AV:N/AC:L/Au:N/C:C/I:C/A:C

## Vulnerability Report **Name of the Vulnerable Software and Affected Versions:** Langflow versions prior to 1.3.0 **Description:** Langflow is susceptible to a critical remote code execution (RCE) vulnerability (CVE-2025-3248) due to a missing authentication check in the `/api/v1/validate/code` endpoint. This allows unauthenticated attackers to send crafted HTTP requests to execute arbitrary code on the system. The Flodrix botnet i...More

Exploit

Fix

RCE

Code Injection

Missing Authentication

#5 · PT-2025-20903 · Fortinet · Forticamera

Published

2025-05-13

·

Updated

2025-07-17

·

CVE-2025-32756

10

Critical

Base

AV:N/AC:L/Au:N/C:C/I:C/A:C

Name of the Vulnerable Software and Affected Versions: FortiVoice versions 7.2.0, 7.0.0 through 7.0.6, 6.4.0 through 6.4.10 FortiRecorder versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.5, 6.4.0 through 6.4.5 FortiMail versions 7.6.0 through 7.6.2, 7.4.0 through 7.4.4, 7.2.0 through 7.2.7, 7.0.0 through 7.0.8 FortiNDR versions 7.6.0, 7.4.0 through 7.4.7, 7.2.0 through 7.2.4, 7.0.0 through 7.0.6 FortiCamera versions 2.1.0 through 2.1.3,...More

Exploit

Fix

RCE

Stack Overflow

Memory Corruption

#6 · PT-2025-29589 · Google · Google Chrome

Clément Lecigne

+1

·

Published

2025-07-15

·

Updated

2025-07-16

·

CVE-2025-6558

8.8

High

Base

AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions: Google Chrome versions prior to 138.0.7204.157 Description: Insufficient validation of untrusted input in ANGLE and GPU allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. This issue is actively exploited in the wild. The vulnerability involves incorrect validation of untrusted input, specifically related to transform feedback buffer modificat...More

Fix

RCE

#7 · PT-2025-27478 · Google · V8 Javascript Engine

Clément Lecigne

·

Published

2025-06-30

·

Updated

2025-07-17

·

CVE-2025-6554

10

High

Base

AV:N/AC:L/Au:N/C:C/I:C/A:C

**Name of the Vulnerable Software and Affected Versions:** Google Chrome versions prior to 138.0.7204.96 **Description:** A type confusion vulnerability exists in the V8 JavaScript engine in Google Chrome, prior to version 138.0.7204.96. This flaw allows a remote attacker to perform arbitrary read/write operations via a crafted HTML page. The vulnerability is actively exploited in the wild, and proof-of-concept (PoC) code is publicly...More

Fix

DoS

RCE

Type Confusion

#8 · PT-2025-27480 · Wing Ftp · Wing Ftp Server

Julien Ahrens

·

Published

2025-06-30

·

Updated

2025-07-17

·

CVE-2025-47812

10

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:** Wing FTP Server versions prior to 7.4.4 **Description:** Wing FTP Server is vulnerable to remote code execution (RCE) due to improper handling of null bytes ('0') in the web interface. This allows attackers to inject arbitrary Lua code into user session files, potentially executing system commands with FTP service privileges (root or SYSTEM by default). The vulnerability is e...More

Exploit

Fix

RCE

#9 · PT-2025-28847 · Fortinet · Fortiweb

Published

2025-07-08

·

Updated

2025-07-17

·

CVE-2025-25257

10

High

Base

AV:N/AC:L/Au:N/C:C/I:C/A:C

**Name of the Vulnerable Software and Affected Versions:** Fortinet FortiWeb versions prior to 7.6.4 Fortinet FortiWeb versions prior to 7.4.8 Fortinet FortiWeb versions prior to 7.2.11 Fortinet FortiWeb versions prior to 7.0.11 **Description:** FortiWeb is vulnerable to a critical SQL injection flaw that allows unauthenticated attackers to execute arbitrary SQL commands via crafted HTTP or HTTPS requests. This vulnerability, specifi...More

Exploit

Fix

SQL injection

129 Posts
360Reposts
6.6 M Audience

#10 · PT-2024-4434 · Apache · Apache Http Server

Orange_8361

·

Published

2024-07-01

·

Updated

2025-07-17

·

CVE-2024-38475

9.4

Critical

Base

AV:N/AC:L/Au:N/C:C/I:C/A:N

**Name of the Vulnerable Software and Affected Versions:** Apache HTTP Server versions 2.4.59 and earlier **Description:** A flaw exists in the mod rewrite module of the Apache HTTP Server due to improper escaping of output. This allows an attacker to map URLs to filesystem locations that are permitted to be served by the server, even if those locations are not directly reachable via URL. This can result in code execution or source c...More

Exploit

Fix

RCE

Improper Encoding or Escaping of Output

81 Posts
215Reposts
1.8 M Audience

#11 · PT-2025-20920 · Ivanti · Ivanti Endpoint Manager Mobile

Published

2025-05-13

·

Updated

2025-07-17

·

CVE-2025-4427

7.5

High

Base

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

**Name of the Vulnerable Software and Affected Versions:** Ivanti Endpoint Manager Mobile (EPMM) versions 12.5.0.0 and earlier **Description:** An authentication bypass vulnerability exists in the API component of Ivanti Endpoint Manager Mobile (EPMM). This flaw allows attackers to access protected resources without proper credentials via the API. Exploitation of this vulnerability has been observed in real-world attacks by the China-l...More

Fix

RCE

Code Injection

Authentication Bypass Using an Alternate Path or Channel

99 Posts
314Reposts
3.1 M Audience

#12 · PT-2025-20281 · Sonicwall · Sonicwall Sma100

Ryan Emmons

·

Published

2025-05-07

·

Updated

2025-07-16

·

CVE-2025-32819

9.0

High

Base

AV:N/AC:L/Au:S/C:C/I:C/A:C

**Name of the Vulnerable Software and Affected Versions:** SonicWall SMA 100 versions 10.2.1.14-75sv and earlier **Description:** A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass path traversal checks and delete an arbitrary file, potentially resulting in a reboot to factory default settings. This vulnerability has been actively exploited in the wild and may have been exploited as a...More

Exploit

Fix

DoS

LPE

RCE

Files Accessible to External Parties

38 Posts
15Reposts
201.3 K Audience

#13 · PT-2025-20921 · Ivanti · Ivanti Endpoint Manager Mobile

Published

2025-05-13

·

Updated

2025-07-16

·

CVE-2025-4428

9.0

High

Base

AV:N/AC:L/Au:S/C:C/I:C/A:C

**Name of the Vulnerable Software and Affected Versions:** Ivanti Endpoint Manager Mobile (EPMM) versions 12.5.0.0 and prior **Description:** Ivanti Endpoint Manager Mobile (EPMM) (formerly MobileIron Core) contains a vulnerability due to improper management of code generation. This allows a remote attacker to execute arbitrary code. The vulnerability is actively exploited by a China-Nexus threat actor (UNC5221) targeting organizations...More

RCE

Code Injection

84 Posts
314Reposts
1.1 M Audience

#14 · PT-2021-13733 · Sma100 · Sma100

Published

2021-09-24

·

Updated

2025-07-16

·

CVE-2021-20035

9.0

High

Base

AV:N/AC:L/Au:S/C:C/I:C/A:C

**Name of the Vulnerable Software and Affected Versions:** SonicWall SMA 100 series appliances SonicWall SMA 200 SonicWall SMA 210 SonicWall SMA 400 SonicWall SMA 410 SonicWall SMA 500v versions prior to the fixed version **Description:** A command injection vulnerability exists in the web management interface of SonicWall SMA appliances. This vulnerability allows a remote, authenticated attacker to inject arbitrary commands as a 'nobo...More

Fix

RCE

OS Command Injection

XSS

48 Posts
78Reposts
1.3 M Audience

#15 · PT-2025-29558 · Sqlite · Sqlite

Vlad Stolyarov

·

Published

2025-07-15

·

Updated

2025-07-16

·

CVE-2025-6965

7.2

High

Base

AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:D/RE:L/U:Green

### Name of the Vulnerable Software and Affected Versions: SQLite versions prior to 3.50.2 ### Description: A vulnerability exists where the number of aggregate terms could exceed the number of columns available, potentially leading to a memory corruption issue. Google’s AI agent, Big Sleep, detected this flaw before it was exploited in the wild, marking the first known instance of an AI agent preemptively thwarting a cyberattack. The...More

Fix

#16 · PT-2025-27465 · Sudo · Sudo

Rich Mirch

·

Published

2025-06-30

·

Updated

2025-07-17

·

CVE-2025-32462

2.8

Low

Base

AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N

## Vulnerability Report **Name of the Vulnerable Software and Affected Versions:** Sudo versions prior to 1.9.17p1 Sudo versions 1.8.8 through 1.9.17 Sudo versions prior to 1.9.5p2-3+deb11u2 (Debian 11 bullseye) Sudo versions prior to 1.9.13p3-1+deb12u2 (Debian bookworm) Sudo versions prior to 1.9.16p2-1ubuntu1.1 (Ubuntu plucky) Sudo versions prior to 1.8.31-1ubuntu1.5+esm1 (Ubuntu 20.04 LTS, 18.04 LTS, 16.04 LTS, and 14.04 LTS) **De...More

Fix

LPE

Incorrect Authorization

#17 · PT-2025-10830 · Microsoft · Windows Fast Fat Driver

Oruga

·

Published

2025-03-11

·

Updated

2025-07-16

·

CVE-2025-24985

7.8

High

Base

AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:** Microsoft Windows versions prior to the March 2025 security update. **Description:** An integer overflow or wraparound vulnerability exists in the Windows Fast FAT File System Driver. This flaw allows an unauthorized attacker to execute code locally. The vulnerability has been actively exploited in the wild, with threat actors utilizing a backdoor named PipeMagic. Exploitation...More

Exploit

Fix

LPE

RCE

Heap Based Buffer Overflow

Integer Overflow

Buffer Overflow

30 Posts
132Reposts
1.0 M Audience

#18 · PT-2025-29591 · Google · Google Chrome

Shaheen Fazim

·

Published

2025-07-15

·

Updated

2025-07-16

·

CVE-2025-7656

8.8

High

Base

AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions: Google Chrome versions prior to 138.0.7204.157 Description: An integer overflow in V8, the JavaScript engine used in Google Chrome, could allow a remote attacker to exploit heap corruption via a specially crafted HTML page. Recommendations: Update Google Chrome to version 138.0.7204.157 or later.

Fix

#19 · PT-2025-29592 · Google · Google Chrome

Jakebiles

·

Published

2025-07-15

·

Updated

2025-07-16

·

CVE-2025-7657

8.8

High

Base

AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions: Google Chrome versions prior to 138.0.7204.157 Description: A use-after-free issue exists in the WebRTC component of Google Chrome. This allows a remote attacker to potentially exploit heap corruption through a specially crafted HTML page. The security severity is rated as High. Recommendations: Update Google Chrome to version 138.0.7204.157 or later.

Fix

Use After Free

#20 · PT-2024-2545 · Microsoft · Edge

Manfred Paul

·

Published

2024-03-26

·

Updated

2025-07-16

·

CVE-2024-2887

10

High

Base

AV:N/AC:L/Au:N/C:C/I:C/A:C

**Name of the Vulnerable Software and Affected Versions:** Google Chrome versions prior to 123.0.6312.86 Microsoft Edge versions prior to 123.0.6312.86 Chromium versions prior to 123.0.6312.86 Chromium versions prior to 126.0.6478.182-alt0.p10.1 Chromium versions prior to 126.0.6478.182-alt0.c10.1 nodejs-electron versions prior to 28.2.10-1.1 chromedriver versions prior to 124.0.6367.201-1.1 yandex-browser-certified, chromium (affected...More

Exploit

RCE

Type Confusion

#21 · PT-2025-6424 · Nvidia · Nvidia Container Toolkit

Andres Riancho

+4

·

Published

2025-02-11

·

Updated

2025-07-16

·

CVE-2025-23359

8.3

High

Base

AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:** NVIDIA Container Toolkit versions up to and including 1.17.3 NVIDIA GPU Operator versions up to and including 24.9.1 **Description:** NVIDIA Container Toolkit and NVIDIA GPU Operator are affected by a Time-of-Check Time-of-Use (TOCTOU) vulnerability. This flaw can allow a crafted container image to gain access to the host file system, potentially leading to code execution, deni...More

Exploit

Fix

DoS

LPE

Time Of Check To Time Of Use

#22 · PT-2025-28609 · Microsoft · Sql Server

Vladimir Aleksic

·

Published

2025-07-08

·

Updated

2025-07-17

·

CVE-2025-49719

7.8

High

Base

AV:N/AC:L/Au:N/C:C/I:N/A:N

**Name of the Vulnerable Software and Affected Versions:** Microsoft SQL Server (affected versions not specified) **Description:** Improper input validation in Microsoft SQL Server allows an unauthorized attacker to disclose sensitive information over a network. The vulnerability has been publicly disclosed and is actively exploited. Approximately 2.9 million services are found to be affected yearly. The vulnerability allows a remote,...More

LPE

RCE

#23 · PT-2025-6815 · Linux · Linux Kernel

Published

2025-01-01

·

Updated

2025-07-16

·

CVE-2025-0927

8.8

High

Base

AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions: Linux Kernel versions up to 6.12.0 Ubuntu 22.04 with Linux Kernel 6.5.0-18-generic Linux Kernel versions 2.x up to 6.13 Description: The issue is related to a heap overflow vulnerability in the HFS+ file system implementation in the Linux Kernel. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbit...More

Exploit

Fix

DoS

LPE

Heap Based Buffer Overflow

Memory Corruption

Buffer Overflow

#24 · PT-2025-17312 · Pytorch · Pytorch

Azraelxuemo

·

Published

2024-11-07

·

Updated

2025-07-16

·

CVE-2025-32434

10

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:** PyTorch versions prior to 2.6.0 **Description:** PyTorch is a Python package that provides tensor computation with strong GPU acceleration and deep neural networks. A Remote Command Execution (RCE) vulnerability exists in PyTorch when loading a model using `torch.load()` with `weights only=True`. This vulnerability allows attackers to execute arbitrary code on the system by c...More

Fix

RCE

Deserialization of Untrusted Data

22 Posts
3Reposts
153.8 K Audience

#25 · PT-2025-28516 · Microsoft · Windows

Guhe120

+1

·

Published

2025-07-08

·

Updated

2025-07-17

·

CVE-2025-47981

10

Critical

Base

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:** Windows versions (affected versions not specified) **Description:** A critical vulnerability exists in the Windows SPNEGO Extended Negotiation (NEGOEX) security mechanism. This flaw is a heap-based buffer overflow that allows an unauthorized attacker to execute code remotely over a network. The vulnerability is considered 'wormable', meaning it has the potential to spread autom...More

RCE

Heap Based Buffer Overflow

30 Posts
14Reposts
5.4 M Audience

#26 · PT-2025-21809 · Mozilla · Firefox Esr

Manfred Paul

·

Published

2025-05-17

·

Updated

2025-07-17

·

CVE-2025-4919

10

High

Base

AV:N/AC:L/Au:N/C:C/I:C/A:C

**Name of the Vulnerable Software and Affected Versions:** Mozilla Firefox versions prior to 128.10.1esr-1~deb12u1 Mozilla Firefox ESR versions less than 115.23.1 Mozilla Thunderbird versions prior to 1:128.11.0esr-1~deb12u1 **Description:** A vulnerability exists in the Mozilla Firefox and Thunderbird browsers due to an out-of-bounds read or write condition in the JavaScript engine. This occurs when handling array index sizes, poten...More

Fix

RCE

Out of bounds Read

Memory Corruption

28 Posts
327Reposts
1.2 M Audience

#27 · PT-2025-28894 · Unknown · Mcp-Remote

Or Peles

·

Published

2025-07-09

·

Updated

2025-07-16

·

CVE-2025-6514

9.6

Critical

Base

AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:** mcp-remote versions 0.0.5 through 0.1.15 **Description:** mcp-remote is susceptible to OS command injection when connecting to untrusted MCP servers due to crafted input from the `authorization endpoint` response URL. This vulnerability allows for remote code execution, potentially leading to full system compromise. Over 437,000 downloads have been impacted. This marks the firs...More

Fix

RCE

OS Command Injection

#28 · PT-2025-28533 · Microsoft · Windows Update Service

Filip Dragović

+1

·

Published

2024-09-03

·

Updated

2025-07-17

·

CVE-2025-48799

7.8

High

Base

AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:** Windows versions prior to July 8, 2025 **Description:** An improper link resolution vulnerability exists in the Windows Update Service before file access. This allows an authorized attacker to elevate privileges locally. The vulnerability affects Windows clients (Windows 10 and Windows 11) with at least two hard drives. The issue involves incorrect handling of symbolic links du...More

Exploit

Fix

LPE

Link Following

11 Posts
146Reposts
117.4 K Audience

#29 · PT-2025-29508 · Unknown · Imagemagick

Iwashiira

+3

·

Published

2025-07-14

·

Updated

2025-07-16

·

CVE-2025-53101

7.4

High

Base

AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H

**Name of the Vulnerable Software and Affected Versions:** ImageMagick versions prior to 7.1.2-0 ImageMagick versions prior to 6.9.13-26 **Description:** ImageMagick is free and open-source software used for editing and manipulating digital images. In versions prior to 7.1.2-0 and 6.9.13-26, specifying multiple consecutive `%d` format specifiers in a filename template within the `magick mogrify` command causes internal pointer arithmet...More

Exploit

Fix

RCE

#30 · PT-2025-29823 · Hyperledger · Sawtooth Lighthouse Studio

Adam Kues

·

Published

2025-07-16

·

Updated

2025-07-16

·

CVE-2025-34300

10

Critical

Base

AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Name of the Vulnerable Software and Affected Versions: Sawtooth Lighthouse Studio versions prior to 9.16.14 Description: A template injection vulnerability exists in Sawtooth Lighthouse Studio. Exploitation allows an unauthenticated attacker to execute arbitrary commands. The software is prevalent and hidden. Recommendations: Update Sawtooth Lighthouse Studio to version 9.16.14 or later.

Exploit

Fix

RCE