Posts
205
Following
Hidden
Followers
62
AttackerKB bot (Unofficial)
New assessment for topic: CVE-2020-2555

Topic description: "Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Caching,CacheStore,Invocation) ..."

"Organizations can detect exploitation attempts by monitoring for: ..."

Link: https://attackerkb.com/assessments/88b29a33-35df-4ca0-85de-db9eb9ca956e
0
0
0
New assessment for topic: CVE-2025-61757

Topic description: "Vulnerability in the Identity Manager product of Oracle Fusion Middleware (component: REST WebServices) ..."

"**Status:** *Confirmed exploitable (controlled environment only)* ..."

Link: https://attackerkb.com/assessments/caf8f704-eb4b-4101-9ac1-879de0c331e7
0
0
0
New assessment for topic: CVE-2025-58034

Topic description: "An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.5, FortiWeb 7.4.0 through 7.4.10, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an authenticated attacker to execute unauthorized code on the underlying system via crafted HTTP requests or CLI commands. ..."

"This README accompanies a **LAB‑SAFE**, **non‑harmful**, **sanitized** PoC designed exclusively for: ..."

Link: https://attackerkb.com/assessments/250f9ee0-9dde-4922-b731-e35b03ab311c
0
0
0
New assessment for topic: CVE-2025-58034

Topic description: "An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.5, FortiWeb 7.4.0 through 7.4.10, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an authenticated attacker to execute unauthorized code on the underlying system via crafted HTTP requests or CLI commands. ..."

"Based on writing the [Rapid7 Analysis](https://attackerkb.com/topics/zClpINmLCh/cve-2025-58034/rapid7-analysis), I have rated the exploitability as `Very High`, as exploitation is trivial and reliable ..."

Link: https://attackerkb.com/assessments/c67a510c-5ac5-43a7-affd-7b7655c4b62f
0
1
1
New Rapid7 Analysis on AttackerKB topic: CVE-2025-58034

"On November 18, 2025, Fortinet published an [advisory](https://fortiguard.fortinet.com/psirt/FG-IR-25-513) for CVE-2025-58034 ..."

Link: https://attackerkb.com/topics/60513c92-9536-4151-a6a5-1fc343b09e3c
0
0
0
New assessment for topic: CVE-2025-10158

Topic description: "A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index ..."

"_Note: The following analysis was written by the original finder, Calum Hutton._ ..."

Link: https://attackerkb.com/assessments/fbacb2a6-d1cd-4011-bb3a-f06b1c8306b1
0
0
0
New assessment for topic: CVE-2025-25257

Topic description: "An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] in Fortinet FortiWeb version 7.6.0 through 7.6.3, 7.4.0 through 7.4.7, 7.2.0 through 7.2.10 and below 7.0.10 allows an unauthenticated attacker to execute unauthorized SQL code or commands via crafted HTTP or HTTPs requests. ..."

"In one of our honeypots we observed the following payload being executed: ..."

Link: https://attackerkb.com/assessments/ccb5097e-52f5-411c-b4f6-951b36b166d7
0
1
1
New assessment for topic: CVE-2025-64446

Topic description: "A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests. ..."

"# CVE-2025-64446 – Fortinet FortiWeb Critical Path Traversal Vulnerability ..."

Link: https://attackerkb.com/assessments/99da1ce6-0081-41e8-8a62-4ecf729a6586
0
0
0
New assessment for topic: CVE-2025-64446

Topic description: "A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests. ..."

"FortiWeb is a Web Application Firewall (WAF) product that is designed to detect and block malicious traffic to web applications ..."

Link: https://attackerkb.com/assessments/de356c9b-4b40-4354-894b-f4427f7061fb
0
0
0
New assessment for topic: CVE-2025-12480

Topic description: "Triofox versions prior to 16.7.10368.56560, are vulnerable to an Improper Access Control flaw that allows access to initial setup pages even after setup is complete. ..."

"Based on writing the [Rapid7 Analysis](https://attackerkb.com/topics/5C4wRy6hY7/cve-2025-12480#rapid7-analysis), I have rated both the Exploitability and Attacker Value as `Very High`, as the target product is a file sharing solution, and is vulnerable to unauthenticated remote code execution in a default configuration. ..."

Link: https://attackerkb.com/assessments/872fea17-4584-4f94-b9dc-3875a890a332
0
0
0
New Rapid7 Analysis on AttackerKB topic: CVE-2025-12480

"On November 10, 2025, Mandiant Threat Defense published a [report](https://cloud.google.com/blog/topics/threat-intelligence/triofox-vulnerability-cve-2025-12480) detailing exploitation in-the-wild, observed circa August 2025, of a previously undisclosed vulnerability affecting the file sharing platform, Gladinet [Triofox](https://www.triofox.com/). ..."

Link: https://attackerkb.com/topics/5f913695-734c-41e6-89e2-d317c3ebc06a
0
0
0
New assessment for topic: CVE-2025-5946

Topic description: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Centreon Infra Monitoring (Poller reload setup in the configuration modules) allows OS Command Injection. ..."

"Centreon is a platform designed to monitor your cloud and on-premises infrastructure. ..."

Link: https://attackerkb.com/assessments/3ae5b43c-a33d-47c0-b4f3-07ae353c1609
0
0
0
New assessment for topic: CVE-2020-5902 — TMUI RCE vulnerability

Topic description: "In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages. ..."

"[metadata only] ..."

Link: https://attackerkb.com/assessments/a51ed820-f8e9-48cc-9d26-a77f78eacbdb
0
0
0
New assessment for topic: CVE-2025-2783

Topic description: "Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file ..."

"Kaspersky Labs discovered this 0-day in Chrome Browser and reported it to Google ..."

Link: https://attackerkb.com/assessments/eb9d84e4-ac80-431b-8b5b-08b4975744b3
0
0
0
New assessment for topic: CVE-2025-54236

Topic description: "Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2.4.5-p14, 2.4.4-p15 and earlier are affected by an Improper Input Validation vulnerability ..."

"[metadata only] ..."

Link: https://attackerkb.com/assessments/85091c37-0bbd-4d19-980b-5acc68a9fc7a
0
0
0
New assessment for topic: CVE-2025-61882

Topic description: "Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business Suite (component: BI Publisher Integration) ..."

"The exploit for this was leaked, and has been available on VirusTotal since 3 Oct 2025 (both [exp.py](https://www.virustotal.com/gui/file/aa0d3859d6633b62bccfb69017d33a8979a3be1f3f0a5a4bf6960d6c73d41121/details) and [server.py](https://www.virustotal.com/gui/file/6fd538e4a8e3493dda6f9fcdc96e814bdd14f3e2ef8aa46f0143bff34b882c1b/details)) ..."

Link: https://attackerkb.com/assessments/a5a4a6ba-7379-4404-9a90-2a9a0345575e
0
0
0
New Rapid7 Analysis on AttackerKB topic: CVE-2025-20362

"On September 25, 2025, Cisco published advisories for two new vulnerabilities, CVE-2025-20362, and CVE-2025-20333, which are known to be exploited in-the-wild as a zero-day, by an as-yet unknown threat actor in what appears to be a highly targeted attack. ..."

Link: https://attackerkb.com/topics/1098c71a-ab65-493f-8ac0-f6c770f6f3c5
0
0
0
New assessment for topic: CVE-2025-41244

Topic description: "VMware Aria Operations and VMware Tools contain a local privilege escalation vulnerability. A malicious local actor with non-administrative privileges having access to a VM with VMware Tools installed and managed by Aria Operations with SDMP enabled may exploit this vulnerability to escalate privileges to root on the same VM. ..."

"A local privilege escalation in VMware guest service discovery (open-vm-tools / VMware Aria Operations SDMP) ..."

Link: https://attackerkb.com/assessments/32dc9ce8-8cb7-46d4-90fb-d47e97fbf84f
0
0
0
New assessment for topic: CVE-2025-32463

Topic description: "Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option. ..."

"On June 30, 2025, a privilege escalation vulnerability in the popular `sudo` command was published ..."

Link: https://attackerkb.com/assessments/5e35a669-7931-45cc-a25b-7eff64a03bed
0
0
0
New assessment for topic: CVE-2025-20362

Topic description: "A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints without authentication that should otherwise be inaccessible without authentication ..."

"This is an authentication bypass affecting Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) appliances ..."

Link: https://attackerkb.com/assessments/8c7829c3-f04c-425b-8853-97fc96b5d416
0
0
1
Show older