Overview CVE-2025-64063 identifies a significant security vulnerability in Primakon Pi Portal version 1.0.18. This flaw allows standard users to bypass UI restrictions and directly interact with administrative API endpoints. By crafting direct HTTP requests, attackers can manipulate data beyond their authorized scope, leading to unauthorized account modification, confidential data access, and ultimately, privilege escalation. Technical Details The core of the vulnerability lies in the insufficient authorization checks within the Pi Portal’s API. A standard user can send direct HTTP requests to administrative endpoints, effectively circumventing the intended user interface controls. Specific attack vectors include: Unauthorized Account Modification: Attackers can modify…
-
-
Overview CVE-2025-61168 describes a critical security vulnerability affecting SIGB PMB (Professional Management of Bibliographic records) version 8.0.1.14. Specifically, an issue exists in the cms_rest.php component that allows unauthenticated attackers to execute arbitrary code by unserializing a malicious file. This vulnerability stems from the lack of proper input validation and sanitization during the unserialization process. Technical Details The vulnerability resides within the cms_rest.php file. The application processes user-supplied data through the unserialize() function without adequate validation. An attacker can craft a serialized PHP object containing malicious code, which, when unserialized by the application, results in arbitrary code execution on the server.…
-
Overview CVE-2025-61167 details critical SQL injection vulnerabilities identified in SIGB PMB (Public Mediatheque Benchmark) version 8.0.1.14. These vulnerabilities reside in the /opac_css/ajax_selector.php component and can be exploited via the id and datas parameters. Successful exploitation could allow attackers to execute arbitrary SQL queries, potentially leading to data breaches, modification of sensitive information, or even complete system compromise. This article provides a technical analysis, potential impact assessment, and recommended mitigation strategies. Technical Details The vulnerability exists due to insufficient sanitization of user-supplied input passed to the id and datas parameters in the /opac_css/ajax_selector.php file. An attacker can inject malicious SQL code…
-
Overview A critical security vulnerability, identified as CVE-2025-34350, has been discovered in UnForm Server versions prior to 10.1.15. This vulnerability allows unauthenticated attackers to read arbitrary files on the server and potentially coerce the server into initiating outbound SMB authentication. Exploitation of this flaw can lead to sensitive information disclosure and, in some environments, facilitate lateral movement within the network. Immediate action is recommended to mitigate this risk. Technical Details The vulnerability resides within the ‘arc’ endpoint of the Doc Flow feature. The Doc Flow module uses this endpoint to retrieve and render resources based on the user-supplied ‘pp’ parameter.…
-
Overview CVE-2025-65085 describes a heap-based buffer overflow vulnerability found in several Ashlar-Vellum products, including Cobalt, Xenon, Argon, Lithium, and Cobalt Share. The vulnerability affects versions 12.6.1204.207 and prior. Successful exploitation of this vulnerability could allow an attacker to potentially disclose sensitive information or execute arbitrary code on the affected system. Technical Details The root cause of CVE-2025-65085 is a heap-based buffer overflow. This occurs when a program attempts to write data beyond the allocated boundaries of a heap-allocated buffer. By carefully crafting input, an attacker can overwrite adjacent memory locations on the heap. This could lead to: Information Disclosure: Overwriting…
-
Overview An Out-of-Bounds Write vulnerability, identified as CVE-2025-65084, has been discovered in multiple Ashlar-Vellum products, specifically Cobalt, Xenon, Argon, Lithium, and Cobalt Share. The affected versions include 12.6.1204.207 and all prior releases. This vulnerability poses a significant risk as it could allow a malicious actor to potentially disclose sensitive information or, more severely, execute arbitrary code on the affected system. This blog post details the vulnerability, its impact, and recommended mitigation strategies. Technical Details The vulnerability stems from an Out-of-Bounds Write error within the affected Ashlar-Vellum products. Out-of-Bounds Write vulnerabilities occur when a program writes data beyond the allocated buffer.…
-
Overview A critical security vulnerability, identified as CVE-2025-64066, has been discovered in Primakon Pi Portal version 1.0.18. This vulnerability stems from a Broken Access Control issue within the REST API, specifically affecting the /api/v2/user/register endpoint. This allows unauthenticated attackers to register new user accounts directly in the application’s local database, bypassing the intended security mechanisms. Technical Details The /api/v2/user/register endpoint in Primakon Pi Portal 1.0.18 lacks proper authorization checks. Normally, user registration is designed to rely on an external Identity Provider. This vulnerability allows an attacker to bypass this intended flow and create user accounts without any authentication. A simple…
-
Overview CVE-2025-64062 is a critical vulnerability discovered in Primakon Pi Portal version 1.0.18. This vulnerability allows an attacker to escalate privileges and gain full access to other user accounts, including the administrator, due to improper server-side validation in the /api/V2/pp_users?email endpoint. Technical Details The /api/V2/pp_users?email endpoint is intended to filter user data based on the provided email address. However, the application lacks sufficient server-side validation to verify that the authenticated session corresponds to the user whose data is being requested. By manipulating the email parameter, an attacker can effectively bypass authentication and impersonate other users. For example, setting the email…
-
Overview CVE-2025-33205 is a high-severity vulnerability affecting the NVIDIA NeMo framework. This vulnerability stems from the insecure use of a predefined variable, allowing an attacker to potentially inject functionality from an untrusted source. Successful exploitation could lead to arbitrary code execution within the context of the NeMo framework. Technical Details The vulnerability resides in how the NVIDIA NeMo framework handles predefined variables. Specifically, an attacker can manipulate a predefined variable in a way that causes the framework to include code or functionality from an external and potentially malicious source. The lack of proper validation and sanitization of these predefined variables…
-
Overview A high-severity vulnerability, identified as CVE-2025-33204, has been discovered in the NVIDIA NeMo Framework. This flaw resides within the NLP (Natural Language Processing) and LLM (Large Language Model) components of the framework, affecting all platforms. Maliciously crafted data provided by an attacker can trigger code injection, potentially leading to severe consequences. Technical Details CVE-2025-33204 stems from insufficient input validation within the NeMo Framework’s NLP and LLM processing modules. An attacker can leverage this vulnerability by crafting specific input data that, when processed by the framework, results in the execution of arbitrary code. This code injection can occur due to…