#OffSeq

Offensive Sequenceoffseq@infosec.exchange
2025-12-27

🔍 HIGH severity: MongoDB flaw (CVE-2025-14847) lets unauthenticated users read uninitialized memory via zlib. Affects v3.6–8.2.3. Patch now or disable zlib compression for mitigation. Full details: radar.offseq.com/threat/new-mo #OffSeq #MongoDB #Infosec #Vulnerability

High threat: New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory
Offensive Sequenceoffseq@infosec.exchange
2025-12-27

🚨 CRITICAL: LangChain Core (<1.2.5, <0.3.81) hit by serialization injection (no CVE yet). Exploit steals secrets & manipulates LLM outputs via prompt injection. Upgrade, disable secrets_from_env, restrict deserialization! radar.offseq.com/threat/critic #OffSeq #LangChain #AIsecurity

Critical threat: Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection
Offensive Sequenceoffseq@infosec.exchange
2025-12-27

🚨 CRITICAL: LangChain Core serialization injection flaw can leak sensitive secrets in AI workflows. No patch or CVE yet. Validate/sanitize serialized inputs & monitor deserialization events. High risk for EU orgs. Details: radar.offseq.com/threat/critic #OffSeq #LangChain #AIsecurity

Critical threat: Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection
Offensive Sequenceoffseq@infosec.exchange
2025-12-27

🚨 CRITICAL: CVE-2025-13915 in IBM API Connect (10.0.8.0–10.0.8.5, 10.0.11.0) enables remote auth bypass (CWE-305)! No patch yet. Restrict access, monitor logs, and prep for updates. More: radar.offseq.com/threat/cve-20 #OffSeq #IBM #Infosec #APIsecurity #CVE202513915

Critical threat: CVE-2025-13915: CWE-305 Authentication Bypass by Primary Weakness in IBM API Connect
Offensive Sequenceoffseq@infosec.exchange
2025-12-27

CRITICAL: CVE-2025-68952 in eigent-ai Eigent v0.0.60 enables unauthenticated RCE over the network. Patch to 0.0.61 now! Impact: full system compromise, data loss. 🛡️ radar.offseq.com/threat/cve-20 #OffSeq #CVE202568952 #infosec #vulnerability

Critical threat: CVE-2025-68952: CWE-94: Improper Control of Generation of Code ('Code Injection') in eigent-ai eigen
Offensive Sequenceoffseq@infosec.exchange
2025-12-27

🔥 CRITICAL: CVE-2025-13158 in apidoc-core (0.2.0+) enables remote prototype pollution via malformed input. Risks: DoS & unpredictable JS app behavior. Audit, sanitize, and isolate now — no patch yet! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #JavaScript #SupplyChain

Critical threat: CVE-2025-13158: CWE-1321 Improperly Controlled Modification of Object Prototype Attributes ('Prototy
Offensive Sequenceoffseq@infosec.exchange
2025-12-27

⚠️ CRITICAL: CVE-2025-68668 in n8n-io n8n (v1.0.0–<2.0.0) allows authenticated users to bypass the Python Code Node sandbox & run arbitrary commands. Patch to 2.0.0+ or disable the node for mitigation. Full details: radar.offseq.com/threat/cve-20 #OffSeq #n8n #CVE202568668 #infosec

Critical threat: CVE-2025-68668: CWE-693: Protection Mechanism Failure in n8n-io n8n
Offensive Sequenceoffseq@infosec.exchange
2025-12-27

🚨 CRITICAL: CVE-2025-66203 in lemon8866 StreamVault (<251126). RCE possible via OS command injection in /admin/api/saveConfig. Patch to 251126 ASAP! Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202566203 #infosec #vulnerability

Critical threat: CVE-2025-66203: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Comma
Offensive Sequenceoffseq@infosec.exchange
2025-12-26

🚨 HIGH severity (CVSS 8.6) in Eaton UPS Companion Software: CVE-2025-59887 allows local arbitrary code execution via insecure search path. Patch ASAP & restrict install rights. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Eaton #Cybersecurity

High threat: CVE-2025-59887: CWE-427 Uncontrolled Search Path Element in Eaton Eaton UPS Companion Software
Offensive Sequenceoffseq@infosec.exchange
2025-12-26

⚠️ CVE-2025-67450 (HIGH): Eaton UPS Companion software vulnerable to insecure library loading (CWE-427), enabling local arbitrary code execution. Patch urgently via Eaton’s download center. radar.offseq.com/threat/cve-20 #OffSeq #Eaton #Vuln #SysAdmin

High threat: CVE-2025-67450: CWE-427 Uncontrolled Search Path Element in Eaton UPS Companion software
Offensive Sequenceoffseq@infosec.exchange
2025-12-26

🔒 CVE-2025-62578 (HIGH): Delta Electronics DVP-12SE PLCs transmit Modbus/TCP data in cleartext—risking MITM & command manipulation. No patch yet. Segment networks, restrict Modbus traffic, and monitor closely! radar.offseq.com/threat/cve-20 #OffSeq #ICS #PLC #CyberSecurity

High threat: CVE-2025-62578: CWE-319 Cleartext Transmission of Sensitive Information in Delta Electronics DVP-12S
Offensive Sequenceoffseq@infosec.exchange
2025-12-26

⚠️ CVE-2025-15089: HIGH severity buffer overflow in UTT 进取 512W (≤1.7.7-171114). Remote attackers can exploit wepkey1 in /goform/APSecurity for code execution. Public exploit code is out! Patch or segment devices immediately. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #UTT #Security

High threat: CVE-2025-15089: Buffer Overflow in UTT 进取 512W
Offensive Sequenceoffseq@infosec.exchange
2025-12-26

🔎 CVE-2025-15090: HIGH-severity buffer overflow in UTT 进取 512W (v1.7.7-171114) enables remote code execution—no user interaction needed. PoC exploit code is available. Isolate, monitor, and patch! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #CyberAlert

High threat: CVE-2025-15090: Buffer Overflow in UTT 进取 512W
Offensive Sequenceoffseq@infosec.exchange
2025-12-26

🛡️ CVE-2025-15091: HIGH severity buffer overflow in UTT 进取 512W (≤1.7.7-171114). Remote, unauthenticated RCE possible via /goform/formPictureUrl. Public exploit disclosed, no patch yet—segment, monitor, deploy IDS/IPS! radar.offseq.com/threat/cve-20 #OffSeq #Vuln #IoTSecurity

High threat: CVE-2025-15091: Buffer Overflow in UTT 进取 512W
Offensive Sequenceoffseq@infosec.exchange
2025-12-26

⚠️ HIGH risk: CVE-2025-15092 in UTT 进取 512W (≤1.7.7-171114) — buffer overflow in /goform/ConfigExceptMSN allows remote code execution. Public exploit exists. Isolate devices & monitor traffic! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #UTT #CVE202515092

High threat: CVE-2025-15092: Buffer Overflow in UTT 进取 512W
Offensive Sequenceoffseq@infosec.exchange
2025-12-26

🛑 Critical RCE in FreeBSD rtsold 15.x: Improper DNSSL handling lets attackers exploit IPv6 router ads for full system compromise. No patch yet—disable rtsold if not needed, segment networks, and monitor traffic. radar.offseq.com/threat/freebs #OffSeq #FreeBSD #Security

Critical threat: FreeBSD rtsold 15.x - Remote Code Execution via DNSSL
Offensive Sequenceoffseq@infosec.exchange
2025-12-25

🚨 Critical RCE in Digiever DS-2105 Pro NVRs (CVE-2023-52163) is actively exploited for Mirai/ShadowV2 botnets. No patch—remove from internet, update creds, segment networks. End-of-life device. Details: radar.offseq.com/threat/cisa-f #OffSeq #IoT #RCE #Infosec #CISA

Critical threat: CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution
Offensive Sequenceoffseq@infosec.exchange
2025-12-25

🔒 CVE-2025-68565: CRITICAL missing authorization in JayBee Twitch Player (<=2.1.3) lets attackers bypass access controls on embedded Twitch streams. Audit usage, restrict access, and monitor for patches. No active exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #CVE202568565 #Infosec

Critical threat: CVE-2025-68565: Missing Authorization in JayBee Twitch Player
Offensive Sequenceoffseq@infosec.exchange
2025-12-25

🛑 CRITICAL: CVE-2025-68570 in Captivate Sync (≤3.2.2)—blind SQL Injection with no auth needed. Risk of data theft or loss. Audit, validate inputs, restrict DB rights, monitor for patches. Details: radar.offseq.com/threat/cve-20 #OffSeq #SQLi #Vulnerability #CVE202568570

Critical threat: CVE-2025-68570: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Offensive Sequenceoffseq@infosec.exchange
2025-12-25

🚨 CRITICAL: CVE-2025-68590—Blind SQL Injection in CRM Perks Integration for Contact Form 7 HubSpot (<=1.4.2). No auth needed; high risk of data breach & compliance impact. Audit, patch, and enable WAF now! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #SQLInjection #InfoSec

Critical threat: CVE-2025-68590: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst