Overview CVE-2025-60633 describes a vulnerability found in Free5GC versions 4.0.0 and 4.0.1. This vulnerability allows a remote attacker to potentially trigger a denial-of-service (DoS) condition by exploiting the Nudm_SubscriberDataManagement API. While the CVSS score and severity are currently listed as N/A, understanding the potential impact and implementing preventative measures is crucial for maintaining the availability of Free5GC-based networks. Technical Details The specific details of how the Nudm_SubscriberDataManagement API is exploited to cause the denial of service are not fully documented in the CVE entry itself. However, the associated GitHub issues provide more context. Analyzing Issue #700, Issue #701, Issue #702,…
-
-
Published: 2025-11-24T16:15:49.893 Overview CVE-2025-60632 describes a denial-of-service (DoS) vulnerability found in Free5GC versions v4.0.0 and v4.0.1. This flaw allows a remote attacker to disrupt the service availability by sending specially crafted POST requests to the Npcf_BDTPolicyControl API. Technical Details The vulnerability stems from insufficient input validation within the Npcf_BDTPolicyControl API. A malicious actor can exploit this by crafting a POST request containing unexpected or excessively large data, potentially causing the service to crash or become unresponsive due to resource exhaustion. The specific details of the crafted request are outlined in Issue #705 on the Free5GC GitHub repository. CVSS Analysis Currently,…
-
Overview CVE-2025-56423 identifies a user enumeration vulnerability affecting Austrian Academy of Sciences (AW) Austrian Archaeological Institute’s OpenAtlas version 8.12.0. This vulnerability allows a remote attacker to potentially discover valid usernames by analyzing login error messages. The improper handling of authentication errors can reveal whether a given username exists within the system. Technical Details The vulnerability stems from the way OpenAtlas 8.12.0 handles incorrect login attempts. When a user tries to log in with an invalid username, the application’s response differs depending on whether the provided username exists in the database. An attacker can exploit this by systematically attempting to log…
-
Overview CVE-2025-56401 describes a SQL injection vulnerability found in ZIRA Group’s WBRM (likely a Web-Based Resource Management) version 7.0. The vulnerability resides within the referenceLookupsByTableNameAndColumnName function or module. This flaw could allow an attacker to potentially execute arbitrary SQL queries, leading to data breaches, data manipulation, or other malicious activities. This article provides a detailed analysis of the vulnerability, its potential impact, and steps for mitigation. Technical Details The SQL injection vulnerability exists within the referenceLookupsByTableNameAndColumnName function. It is likely that user-supplied input for the tableName or columnName parameters is not properly sanitized before being used in a SQL query.…
-
Overview CVE-2025-44018 is a high-severity vulnerability affecting the Over-The-Air (OTA) update functionality of GL-iNet GL-AXT1800 routers running firmware version 4.7.0. This vulnerability allows an attacker to perform a firmware downgrade by exploiting a weakness in the way the router handles .tar files during the update process. Successful exploitation of this vulnerability can lead to complete compromise of the device. Technical Details The vulnerability stems from insufficient validation of the firmware image during the OTA update process. An attacker can craft a malicious .tar file containing an older, potentially vulnerable firmware version. By intercepting the legitimate update process through a man-in-the-middle…
-
Overview CVE-2025-40213 identifies a recently resolved vulnerability within the Linux kernel’s Bluetooth management (MGMT) subsystem. The vulnerability involves issues in the set_mesh_sync and set_mesh_complete functions, potentially leading to a kernel crash. Specifically, a stack-out-of-bounds write and a double list deletion were identified and subsequently fixed. Technical Details The vulnerability manifests in two primary ways: Stack-Out-Of-Bounds Write in set_mesh_sync: A memcpy operation from a badly declared on-stack flexible array in the set_mesh_sync function caused a stack-out-of-bounds write. This occurs because the array was not properly defined, allowing the copy operation to write beyond the allocated memory, triggering a KASAN (Kernel Address…
-
Overview A high-severity stored Cross-site Scripting (XSS) vulnerability, identified as CVE-2025-10555, has been discovered in the Service Items Management module of DELMIA Service Process Engineer on the 3DEXPERIENCE R2025x platform. This vulnerability allows a remote attacker to inject malicious script code into the application’s database. When other users access the affected data, the injected script will execute within their browser sessions, potentially leading to unauthorized access, data theft, or other malicious activities. Technical Details The vulnerability resides in the Service Items Management functionality. An attacker can inject malicious JavaScript code through a specific input field (e.g., name, description, or other…
-
Modern web application development demands high performance, scalability, SEO readiness, and a streamlined developer experience. In this environment, React.js and Next.js have emerged as two of the most popular and influential technologies. While both belong to the same ecosystem, they serve different roles. React is a frontend UI library, whereas Next.js is a full-fledged framework that builds on React and adds advanced features for production-grade applications. This article provides a detailed and structured comparison of Next.js vs React.js to help developers, architects, and decision-makers select the right technology for their project requirements. 1. Overview 1.1 What is React.js? React.js is…
-
Overview CVE-2025-10554 is a high-severity stored Cross-site Scripting (XSS) vulnerability identified in the Requirements functionality of ENOVIA Product Manager, affecting versions from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x. This vulnerability allows a remote attacker to inject malicious scripts into the application’s database, which are then executed in the browsers of unsuspecting users. This can lead to serious security breaches, including session hijacking, data theft, and defacement of the application. Technical Details The vulnerability exists due to insufficient sanitization of user-supplied input within the “Requirements” section of ENOVIA Product Manager. An attacker can craft a malicious payload, embedding JavaScript code…
-
Overview CVE-2025-12978 describes a critical vulnerability found in the in_http, in_splunk, and in_elasticsearch input plugins of Fluent Bit. This flaw stems from a weakness in the tag_key validation logic, where the system fails to enforce strict key-length matching. This allows a malicious actor to manipulate tags using a crafted input, potentially redirecting logs to unintended destinations. This can significantly compromise the integrity and authenticity of ingested logs. Technical Details The vulnerability lies in how Fluent Bit’s input plugins validate the tag key against configured prefixes. Instead of requiring an exact match of the configured key, the validation logic incorrectly treats…