#cve search results

🚨Sitecore CVE-2025-53690 (CVSS 9.0) POC I just dropped a blog about CVE-2025-53690 🔹 Fully weaponized POC 🔹 Sneaky MemShell persistence tricks 🔹 Nuclei template I built to scan at scale eriklearningsec.com/p/cve-2025-536… Feedbacks are welcome! #infosec#sitecore #rce #cve

ErikPham141's tweet image. 🚨Sitecore CVE-2025-53690 (CVSS 9.0) POC
I just dropped a blog about CVE-2025-53690 

🔹 Fully weaponized POC
🔹 Sneaky MemShell persistence tricks 
🔹 Nuclei template I built to scan at scale eriklearningsec.com/p/cve-2025-536…
Feedbacks are welcome! 
#infosec#sitecore #rce #cve

🚨 CVE-2025-64446 - critical 🚨 FortiWeb - Authentication Bypass > A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, For... 👾 cloud.projectdiscovery.io/library/CVE-20… @pdnuclei #NucleiTemplates #cve


Christine @x71n3 and JBO (@yo_yo_yo_jbo ) (& Alexia Wilson) from @Microsoft showed #OBTS how Spotlight just got too bright. 😬 They found a macOS TCC bypass (#CVE-2025-31199) that abuses Spotlight to get your private data - locally and remotely - and showed how to detect!

forensicdave's tweet image. Christine @x71n3 and JBO (@yo_yo_yo_jbo ) (& Alexia Wilson) from @Microsoft showed #OBTS how Spotlight just got too bright. 😬
They found a macOS TCC bypass (#CVE-2025-31199) that abuses Spotlight to get your private data - locally and remotely - and showed how to detect!
forensicdave's tweet image. Christine @x71n3 and JBO (@yo_yo_yo_jbo ) (& Alexia Wilson) from @Microsoft showed #OBTS how Spotlight just got too bright. 😬
They found a macOS TCC bypass (#CVE-2025-31199) that abuses Spotlight to get your private data - locally and remotely - and showed how to detect!

Ian Beer (@i41nbeer) from @Google’s Project Zero spoke again at #OBTS! Zero’ing read-only pages in XNU - possible? Yes! Weaponizing the bug ( #CVE-2025-24203 ) to get root? Yes!!

forensicdave's tweet image. Ian Beer (@i41nbeer) from @Google’s Project Zero spoke again at #OBTS! Zero’ing read-only pages in XNU - possible? Yes! Weaponizing the bug ( #CVE-2025-24203 ) to get root? Yes!!

⚠️#INCIBEaviso | Cross-Site Scripting (XSS) en Omnichannel de #xCally #CVE CVE-2025-40681 incibe.es/incibe-cert/al… #AvisosDeSeguridad #TI #CNA

incibe_cert's tweet image. ⚠️#INCIBEaviso | Cross-Site Scripting (XSS) en Omnichannel de #xCally
#CVE CVE-2025-40681

incibe.es/incibe-cert/al…

#AvisosDeSeguridad #TI #CNA

I no longer test VDP programs. However, since this is an open-source project and vulnerabilities found can be assigned CVEs, I spent some time last week reviewing it. I'm also glad that these are my first 4 CVEs #bugbounty #CVE

yoyomiski's tweet image. I no longer test VDP programs. However, since this is an open-source project and vulnerabilities found can be assigned CVEs, I spent some time last week reviewing it. I'm also glad that these are my first 4 CVEs
#bugbounty #CVE

Sal (@malwarezoo) from @jamf gave an excellent talk at #OBTS of how Apple tracks and revokes malicious apps. But Revoked doesn’t always mean Vanquished! Sal found a Gatekeeper/CDHash weakness that brings blocked apps back to life — no re-signing required. #CVE-2025-43296

forensicdave's tweet image. Sal (@malwarezoo) from @jamf gave an excellent talk at #OBTS of how Apple tracks and revokes malicious apps. But Revoked doesn’t always mean Vanquished! Sal found a Gatekeeper/CDHash weakness that brings blocked apps back to life — no re-signing required.  #CVE-2025-43296

Just got 2 CVEs assigned from a major CRM software application (5 Million+ users): 1. CVE-2025-64489 2. CVE-2025-64490 Can't disclose much, public release is pending. #CVE

prakhar0x01's tweet image. Just got 2 CVEs assigned from a major CRM software application (5 Million+ users):

1. CVE-2025-64489 
2. CVE-2025-64490

Can't disclose much, public release is pending.

#CVE
prakhar0x01's tweet image. Just got 2 CVEs assigned from a major CRM software application (5 Million+ users):

1. CVE-2025-64489 
2. CVE-2025-64490

Can't disclose much, public release is pending.

#CVE
prakhar0x01's tweet image. Just got 2 CVEs assigned from a major CRM software application (5 Million+ users):

1. CVE-2025-64489 
2. CVE-2025-64490

Can't disclose much, public release is pending.

#CVE

Just got 3 CVEs assigned for 0-days i discovered in a major LMS (30 Million+ users): 1. CVE-2025-59541 : CSRF (High 🟠) 2. CVE-2025-59542 : Account Takeover (Critical🔴) 3. CVE-2025-59543 : Account Takeover (Critical🔴) Can’t disclose much, public release is pending. #CVE

prakhar0x01's tweet image. Just got 3 CVEs assigned for 0-days i discovered in a major LMS (30 Million+ users):

1.  CVE-2025-59541 : CSRF (High 🟠)

2. CVE-2025-59542 : Account Takeover (Critical🔴)

3. CVE-2025-59543 : Account Takeover (Critical🔴)

Can’t disclose much, public release is pending.
#CVE
prakhar0x01's tweet image. Just got 3 CVEs assigned for 0-days i discovered in a major LMS (30 Million+ users):

1.  CVE-2025-59541 : CSRF (High 🟠)

2. CVE-2025-59542 : Account Takeover (Critical🔴)

3. CVE-2025-59543 : Account Takeover (Critical🔴)

Can’t disclose much, public release is pending.
#CVE
prakhar0x01's tweet image. Just got 3 CVEs assigned for 0-days i discovered in a major LMS (30 Million+ users):

1.  CVE-2025-59541 : CSRF (High 🟠)

2. CVE-2025-59542 : Account Takeover (Critical🔴)

3. CVE-2025-59543 : Account Takeover (Critical🔴)

Can’t disclose much, public release is pending.
#CVE


Update for #CVE-2025-52970 a RCE in Fortinet - Fortiweb web application firewall. We have signs of active exploitation of this CVE in the wild. Check our advisory: bit.ly/4oNuS6e #patch #patch #patch


Tanium is now a CVE Numbering Authority (CNA) assigning CVE IDs for Tanium products & in 3rd-party software discovered by Tanium that are not in another CNA’s scope cve.org/Media/News/ite… #CVE #CNA #Vulnerability #VulnerabilityManagement #Cybersecurity @CVEnew @Tanium

CVEannounce's tweet image. Tanium is now a CVE Numbering Authority (CNA) assigning CVE IDs for Tanium products & in 3rd-party software discovered by Tanium that are not in another CNA’s scope 
 
cve.org/Media/News/ite… 
 
#CVE #CNA #Vulnerability #VulnerabilityManagement #Cybersecurity @CVEnew @Tanium

ooooooooh 🟥 CVE-2025-10230, CVSS: 10.0 (#Critical) Samba New CVE reported for a critical vulnerability in WINS hook handling. Unsanitized NetBIOS names from registration packets can lead to remote command execution by unauthenticated attackers. #CyberSecurity #CVE

UjlakiMarci's tweet image. ooooooooh

🟥 CVE-2025-10230, CVSS: 10.0 (#Critical)

Samba

New CVE reported for a critical vulnerability in WINS hook handling. 

Unsanitized NetBIOS names from registration packets can lead to remote command execution by unauthenticated attackers.

#CyberSecurity #CVE…

Django Software Foundation is now a CVE Numbering Authority (CNA) assigning CVE IDs for only supported and end-of-life Django versions, and projects, excluding distributions maintained by third-party redistributors. cve.org/Media/News/ite… #CVE #CNA #Cybersecurity @CVEnew

CVEannounce's tweet image. Django Software Foundation is now a CVE Numbering Authority (CNA) assigning CVE IDs for only supported and end-of-life Django versions, and projects, excluding distributions maintained by third-party redistributors.

cve.org/Media/News/ite…

#CVE #CNA #Cybersecurity @CVEnew

Warning: Privilege Escalation flaw in #Cisco Catalyst Center VA. #CVE-2025-20341 CVSS:8.8. Authenticated attackers with Observer role can send crafted HTTP requests to gain Administrator privileges! This enables unauthorized system changes & account creation. #Patch #Patch #Patch


Altera is now a CVE Numbering Authority (CNA) assigning CVE IDs for Altera products only cve.org/Media/News/ite… #CVE #CNA #Vulnerability #VulnerabilityManagement #Cybersecurity @CVEnew @AlteraFPGA_

CVEannounce's tweet image. Altera is now a CVE Numbering Authority (CNA) assigning CVE IDs for Altera products only 
 
cve.org/Media/News/ite… 
 
#CVE #CNA #Vulnerability #VulnerabilityManagement #Cybersecurity @CVEnew @AlteraFPGA_

Offensive SIEM 👊🏽 Flip your SIEM mindset from reactive detection to proactive hunting. Uncover local privilege escalations, hidden misconfigs, and even potential #CVE before attackers do 🔥🔥 🎥 youtu.be/5nfL_4ek4dY #BlueTeam #SIEM #CyberSecurity #ThreatHunting #DFIR

eki_erk's tweet card. SEC-T 0x11: Erkan Ekici & Shanti Lindström - Offensive SIEM: When the...

youtube.com

YouTube

SEC-T 0x11: Erkan Ekici & Shanti Lindström - Offensive SIEM: When the...


⚠️#INCIBEaviso | Cross-Site Scripting (XSS) almacenado en #Smart School #CVE CVE-2025-41107 incibe.es/incibe-cert/al… #AvisosDeSeguridad #TI #CNA

incibe_cert's tweet image. ⚠️#INCIBEaviso | Cross-Site Scripting (XSS) almacenado en #Smart School
#CVE CVE-2025-41107

incibe.es/incibe-cert/al…

#AvisosDeSeguridad #TI #CNA

🚨 CVE-2025-64446 - critical 🚨 FortiWeb - Authentication Bypass > A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, For... 👾 cloud.projectdiscovery.io/library/CVE-20… @pdnuclei #NucleiTemplates #cve


Update for #CVE-2025-52970 a RCE in Fortinet - Fortiweb web application firewall. We have signs of active exploitation of this CVE in the wild. Check our advisory: bit.ly/4oNuS6e #patch #patch #patch


[CVE-2025-54339: CRITICAL] An Incorrect Access Control vulnerability was found in the Application Server of Desktop Alert PingAlert version 6.1.0.11 to 6.1.1.2 exploitable remotely for Escalation of Privileges.#cve,CVE-2025-54339,#cybersecurity cvefind.com/CVE-2025-54339

CveFindCom's tweet image. [CVE-2025-54339: CRITICAL] An Incorrect Access Control vulnerability was found in the Application Server of Desktop Alert PingAlert version 6.1.0.11 to 6.1.1.2 exploitable remotely for Escalation of Privileges.#cve,CVE-2025-54339,#cybersecurity cvefind.com/CVE-2025-54339

[CVE-2025-54343: CRITICAL] An Incorrect Access Control vulnerability was found in the Application Server of Desktop Alert PingAlert version 6.1.0.11 to 6.1.1.2 exploitable remotely for Escalation of Privileges.#cve,CVE-2025-54343,#cybersecurity cvefind.com/CVE-2025-54343

CveFindCom's tweet image. [CVE-2025-54343: CRITICAL] An Incorrect Access Control vulnerability was found in the Application Server of Desktop Alert PingAlert version 6.1.0.11 to 6.1.1.2 exploitable remotely for Escalation of Privileges.#cve,CVE-2025-54343,#cybersecurity cvefind.com/CVE-2025-54343

Post-#FreeSyria Prevent Strategy: Glorifying violence is OK as long as you're a pro-LGBT mentally ill leftist retard 😂 #cve

Hasan is an evil Islamic Terrorist.

TheStockBro's tweet image. Hasan is an evil Islamic Terrorist.


[CVE-2025-64446: CRITICAL] Security alert: Fortinet FortiWeb versions 8.0.0 through 8.0.1, 7.6.0 through 7.6.4, 7.4.0 through 7.4.9, 7.2.0 through 7.2.11, and 7.0.0 through 7.0.11 vulnerable to relative path...#cve,CVE-2025-64446,#cybersecurity cvefind.com/CVE-2025-64446

CveFindCom's tweet image. [CVE-2025-64446: CRITICAL] Security alert: Fortinet FortiWeb versions 8.0.0 through 8.0.1, 7.6.0 through 7.6.4, 7.4.0 through 7.4.9, 7.2.0 through 7.2.11, and 7.0.0 through 7.0.11 vulnerable to relative path...#cve,CVE-2025-64446,#cybersecurity cvefind.com/CVE-2025-64446

Warning: Privilege Escalation flaw in #Cisco Catalyst Center VA. #CVE-2025-20341 CVSS:8.8. Authenticated attackers with Observer role can send crafted HTTP requests to gain Administrator privileges! This enables unauthorized system changes & account creation. #Patch #Patch #Patch


Warning: Insecure Temporary File flaw in #Alienware Command Center 6.x. #CVE-2025-46369 CVSS/7.8. Affects versions < 6.10.15.0. A low-privilege local attacker can exploit it for Privilege Escalation. #Patch #Patch #Patch


🚨Sitecore CVE-2025-53690 (CVSS 9.0) POC I just dropped a blog about CVE-2025-53690 🔹 Fully weaponized POC 🔹 Sneaky MemShell persistence tricks 🔹 Nuclei template I built to scan at scale eriklearningsec.com/p/cve-2025-536… Feedbacks are welcome! #infosec#sitecore #rce #cve

ErikPham141's tweet image. 🚨Sitecore CVE-2025-53690 (CVSS 9.0) POC
I just dropped a blog about CVE-2025-53690 

🔹 Fully weaponized POC
🔹 Sneaky MemShell persistence tricks 
🔹 Nuclei template I built to scan at scale eriklearningsec.com/p/cve-2025-536…
Feedbacks are welcome! 
#infosec#sitecore #rce #cve

🚨Detect Actor Token Abuse (#CVE-2025-55241) After verifying the details with @_dirkjan, I created a query to detect Actor Token abuse, regardless of the activity involved. The idea is simple: If these activities are S2S, they should originate from Microsoft service IPs. 🧐…

Cyb3rMonk's tweet image. 🚨Detect Actor Token Abuse (#CVE-2025-55241)

After verifying the details with @_dirkjan, I created a query to detect Actor Token abuse, regardless of the activity involved. The idea is simple: If these activities are S2S, they should originate from Microsoft service IPs. 🧐…

Just got 3 CVEs assigned for 0-days i discovered in a major LMS (30 Million+ users): 1. CVE-2025-59541 : CSRF (High 🟠) 2. CVE-2025-59542 : Account Takeover (Critical🔴) 3. CVE-2025-59543 : Account Takeover (Critical🔴) Can’t disclose much, public release is pending. #CVE

prakhar0x01's tweet image. Just got 3 CVEs assigned for 0-days i discovered in a major LMS (30 Million+ users):

1.  CVE-2025-59541 : CSRF (High 🟠)

2. CVE-2025-59542 : Account Takeover (Critical🔴)

3. CVE-2025-59543 : Account Takeover (Critical🔴)

Can’t disclose much, public release is pending.
#CVE
prakhar0x01's tweet image. Just got 3 CVEs assigned for 0-days i discovered in a major LMS (30 Million+ users):

1.  CVE-2025-59541 : CSRF (High 🟠)

2. CVE-2025-59542 : Account Takeover (Critical🔴)

3. CVE-2025-59543 : Account Takeover (Critical🔴)

Can’t disclose much, public release is pending.
#CVE
prakhar0x01's tweet image. Just got 3 CVEs assigned for 0-days i discovered in a major LMS (30 Million+ users):

1.  CVE-2025-59541 : CSRF (High 🟠)

2. CVE-2025-59542 : Account Takeover (Critical🔴)

3. CVE-2025-59543 : Account Takeover (Critical🔴)

Can’t disclose much, public release is pending.
#CVE

Excited 🎉 to share that I have been credited with my 4th CVE from Apple: CVE-2025-43356. This issue was addressed in Apple’s new security releases of iOS 26, iPadOS 26, and Safari 26. #Apple #CVE #BugBounty #iOS #ApplicationSecurity #iOS26

cybor_j's tweet image. Excited 🎉 to share that I have been credited with my 4th CVE from Apple:

CVE-2025-43356.

This issue was addressed in Apple’s new security releases of iOS 26, iPadOS 26, and Safari 26.

#Apple #CVE #BugBounty #iOS #ApplicationSecurity #iOS26
cybor_j's tweet image. Excited 🎉 to share that I have been credited with my 4th CVE from Apple:

CVE-2025-43356.

This issue was addressed in Apple’s new security releases of iOS 26, iPadOS 26, and Safari 26.

#Apple #CVE #BugBounty #iOS #ApplicationSecurity #iOS26
cybor_j's tweet image. Excited 🎉 to share that I have been credited with my 4th CVE from Apple:

CVE-2025-43356.

This issue was addressed in Apple’s new security releases of iOS 26, iPadOS 26, and Safari 26.

#Apple #CVE #BugBounty #iOS #ApplicationSecurity #iOS26

Observed threat actor abusing a vulnerable driver (wsftprm.sys, Topaz OFD – Brazilian antifraud vendor, #CVE-2023-52271) for defense evasion. Attack chain: cartel.exe → vulnerable driver → Lazarus.exe (final payload, extension ".cry"). First seen in Colombia. 1/3

johnk3r's tweet image. Observed threat actor abusing a vulnerable driver (wsftprm.sys, Topaz OFD – Brazilian antifraud vendor, #CVE-2023-52271) for defense evasion.

Attack chain: cartel.exe → vulnerable driver → Lazarus.exe (final payload, extension &quot;.cry&quot;). First seen in Colombia.

1/3
johnk3r's tweet image. Observed threat actor abusing a vulnerable driver (wsftprm.sys, Topaz OFD – Brazilian antifraud vendor, #CVE-2023-52271) for defense evasion.

Attack chain: cartel.exe → vulnerable driver → Lazarus.exe (final payload, extension &quot;.cry&quot;). First seen in Colombia.

1/3
johnk3r's tweet image. Observed threat actor abusing a vulnerable driver (wsftprm.sys, Topaz OFD – Brazilian antifraud vendor, #CVE-2023-52271) for defense evasion.

Attack chain: cartel.exe → vulnerable driver → Lazarus.exe (final payload, extension &quot;.cry&quot;). First seen in Colombia.

1/3

#CVE-2025-53833 挺直给的一个漏洞,直接官方demo即可快速复现,步骤见图1,和grok协同搞了个漏洞分析报告,见图2. 题外话,没看懂360这个复现。 github.com/saleem-hadad/l…

_r00tuser's tweet image. #CVE-2025-53833
挺直给的一个漏洞,直接官方demo即可快速复现,步骤见图1,和grok协同搞了个漏洞分析报告,见图2. 
题外话,没看懂360这个复现。
github.com/saleem-hadad/l…
_r00tuser's tweet image. #CVE-2025-53833
挺直给的一个漏洞,直接官方demo即可快速复现,步骤见图1,和grok协同搞了个漏洞分析报告,见图2. 
题外话,没看懂360这个复现。
github.com/saleem-hadad/l…
_r00tuser's tweet image. #CVE-2025-53833
挺直给的一个漏洞,直接官方demo即可快速复现,步骤见图1,和grok协同搞了个漏洞分析报告,见图2. 
题外话,没看懂360这个复现。
github.com/saleem-hadad/l…

My research on CVE-2025-49113 is out. fearsoff.org/research/round…. Happy reading! #CVE #roundcube #poc @FearsOff

k_firsov's tweet image. My research on CVE-2025-49113 is out. fearsoff.org/research/round…. Happy reading! #CVE #roundcube #poc @FearsOff

The exploit for CVE-2025-49113 is already available for sale on the dark web. I feel sorry for anyone who hasn’t upgraded to the newest version yet. Doomsday is coming, believe me. #roundcube #CVE @FearsOff

k_firsov's tweet image. The exploit for CVE-2025-49113 is already available for sale on the dark web. I feel sorry for anyone who hasn’t upgraded to the newest version yet. Doomsday is coming, believe me. #roundcube #CVE @FearsOff

Looks like the patch for #CVE-2025-33073 might not fully resolve the issue... curious to see where this leads

decoder_it's tweet image. Looks like the patch for #CVE-2025-33073 might not fully resolve the issue... curious to see where this leads

🟥 CVE-2025-7775, CVSS: 9.2 (#Critical) NetScaler ADC and NetScaler Gateway, and NDcPP, Citrix. A memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service. #CyberSecurity #CVE #Vulnerability #Citrix #RemoteCodeExecution #DenialOfService

UjlakiMarci's tweet image. 🟥 CVE-2025-7775, CVSS: 9.2 (#Critical)

NetScaler ADC and NetScaler Gateway, and NDcPP, Citrix.

A memory overflow vulnerability leading to Remote Code Execution and/or Denial of Service.

#CyberSecurity #CVE #Vulnerability #Citrix #RemoteCodeExecution #DenialOfService…

I’m excited to announce that I've been credited with my third CVE from @Apple CVE-2025-43228 Funny thing is, I reported this vulnerability back in August 2024 It has been addressed in the new iOS 18.6 and Safari 18.6 security update support.apple.com/en-us/124147 #CVE #BugBounty

cybor_j's tweet image. I’m excited to announce that I&apos;ve been credited with my third CVE from @Apple 

CVE-2025-43228 

Funny thing is, I reported this vulnerability back in August 2024

It has been addressed in the new iOS 18.6 and Safari 18.6 security update

support.apple.com/en-us/124147

#CVE #BugBounty
cybor_j's tweet image. I’m excited to announce that I&apos;ve been credited with my third CVE from @Apple 

CVE-2025-43228 

Funny thing is, I reported this vulnerability back in August 2024

It has been addressed in the new iOS 18.6 and Safari 18.6 security update

support.apple.com/en-us/124147

#CVE #BugBounty

🎉 We are excited to welcome Leonardo Spa as a #CVE Partner to help disseminate vulnerability information! For more info on efforts to protect #ICS or how your org can become a CVE Numbering Authority, visit 👉 cve.org/PartnerInforma…

CISACyber's tweet image. 🎉 We are excited to welcome Leonardo Spa as a #CVE Partner to help disseminate vulnerability information! For more info on efforts to protect #ICS or how your org can become a CVE Numbering Authority, visit 👉 cve.org/PartnerInforma…

Christine @x71n3 and JBO (@yo_yo_yo_jbo ) (& Alexia Wilson) from @Microsoft showed #OBTS how Spotlight just got too bright. 😬 They found a macOS TCC bypass (#CVE-2025-31199) that abuses Spotlight to get your private data - locally and remotely - and showed how to detect!

forensicdave's tweet image. Christine @x71n3 and JBO (@yo_yo_yo_jbo ) (&amp;amp; Alexia Wilson) from @Microsoft showed #OBTS how Spotlight just got too bright. 😬
They found a macOS TCC bypass (#CVE-2025-31199) that abuses Spotlight to get your private data - locally and remotely - and showed how to detect!
forensicdave's tweet image. Christine @x71n3 and JBO (@yo_yo_yo_jbo ) (&amp;amp; Alexia Wilson) from @Microsoft showed #OBTS how Spotlight just got too bright. 😬
They found a macOS TCC bypass (#CVE-2025-31199) that abuses Spotlight to get your private data - locally and remotely - and showed how to detect!

I no longer test VDP programs. However, since this is an open-source project and vulnerabilities found can be assigned CVEs, I spent some time last week reviewing it. I'm also glad that these are my first 4 CVEs #bugbounty #CVE

yoyomiski's tweet image. I no longer test VDP programs. However, since this is an open-source project and vulnerabilities found can be assigned CVEs, I spent some time last week reviewing it. I&apos;m also glad that these are my first 4 CVEs
#bugbounty #CVE

📊 #VulnReport Security Summary - April 16, 2025. Today's vulnerability report shows over 200 new #CVE's across various platforms 🧵👇 ⚠️ Oracle Critical Patch Update released today with 50+ security fixes. Most critical: CVE-2025-30727 (CRITICAL 9.8) in Oracle Scripting.…

gothburz's tweet image. 📊 #VulnReport Security Summary - April 16, 2025. Today&apos;s vulnerability report shows over 200 new #CVE&apos;s across various platforms 🧵👇

⚠️ Oracle Critical Patch Update released today with 50+ security fixes. Most critical: CVE-2025-30727 (CRITICAL 9.8) in Oracle Scripting.…

Ian Beer (@i41nbeer) from @Google’s Project Zero spoke again at #OBTS! Zero’ing read-only pages in XNU - possible? Yes! Weaponizing the bug ( #CVE-2025-24203 ) to get root? Yes!!

forensicdave's tweet image. Ian Beer (@i41nbeer) from @Google’s Project Zero spoke again at #OBTS! Zero’ing read-only pages in XNU - possible? Yes! Weaponizing the bug ( #CVE-2025-24203 ) to get root? Yes!!

Just got 2 CVEs assigned from a major CRM software application (5 Million+ users): 1. CVE-2025-64489 2. CVE-2025-64490 Can't disclose much, public release is pending. #CVE

prakhar0x01's tweet image. Just got 2 CVEs assigned from a major CRM software application (5 Million+ users):

1. CVE-2025-64489 
2. CVE-2025-64490

Can&apos;t disclose much, public release is pending.

#CVE
prakhar0x01's tweet image. Just got 2 CVEs assigned from a major CRM software application (5 Million+ users):

1. CVE-2025-64489 
2. CVE-2025-64490

Can&apos;t disclose much, public release is pending.

#CVE
prakhar0x01's tweet image. Just got 2 CVEs assigned from a major CRM software application (5 Million+ users):

1. CVE-2025-64489 
2. CVE-2025-64490

Can&apos;t disclose much, public release is pending.

#CVE

Just got 3 CVEs assigned for 0-days i discovered in a major LMS (30 Million+ users): 1. CVE-2025-59541 : CSRF (High 🟠) 2. CVE-2025-59542 : Account Takeover (Critical🔴) 3. CVE-2025-59543 : Account Takeover (Critical🔴) Can’t disclose much, public release is pending. #CVE

prakhar0x01's tweet image. Just got 3 CVEs assigned for 0-days i discovered in a major LMS (30 Million+ users):

1.  CVE-2025-59541 : CSRF (High 🟠)

2. CVE-2025-59542 : Account Takeover (Critical🔴)

3. CVE-2025-59543 : Account Takeover (Critical🔴)

Can’t disclose much, public release is pending.
#CVE
prakhar0x01's tweet image. Just got 3 CVEs assigned for 0-days i discovered in a major LMS (30 Million+ users):

1.  CVE-2025-59541 : CSRF (High 🟠)

2. CVE-2025-59542 : Account Takeover (Critical🔴)

3. CVE-2025-59543 : Account Takeover (Critical🔴)

Can’t disclose much, public release is pending.
#CVE
prakhar0x01's tweet image. Just got 3 CVEs assigned for 0-days i discovered in a major LMS (30 Million+ users):

1.  CVE-2025-59541 : CSRF (High 🟠)

2. CVE-2025-59542 : Account Takeover (Critical🔴)

3. CVE-2025-59543 : Account Takeover (Critical🔴)

Can’t disclose much, public release is pending.
#CVE


I propose to force people adding their own identity to each #CVE request the do. Someone have to be responsible, someone have to pay

kmkz_security's tweet image. I propose to force people adding their own identity to each #CVE request the do.
Someone have to be responsible, someone have to pay

New 𝗙𝗿𝗲𝗲𝗕𝗦𝗗 𝗝𝗮𝗶𝗹𝘀 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 (𝘃𝗲𝗿𝘀𝘂𝘀 𝗣𝗼𝗱𝗺𝗮𝗻) [FreeBSD Jails Security (versus Podman)] article on the blog. vermaden.wordpress.com/2025/04/11/fre… #verblog #containers #CVE #docker #freebsd #jail #jails #linux #podman #security #server #vnet

vermaden's tweet image. New 𝗙𝗿𝗲𝗲𝗕𝗦𝗗 𝗝𝗮𝗶𝗹𝘀 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 (𝘃𝗲𝗿𝘀𝘂𝘀 𝗣𝗼𝗱𝗺𝗮𝗻) [FreeBSD Jails Security (versus Podman)] article on the blog.

vermaden.wordpress.com/2025/04/11/fre…

#verblog #containers #CVE #docker #freebsd #jail #jails #linux #podman #security #server #vnet

Loading...

Something went wrong.


Something went wrong.


United States Trends