![]() |
CVE-Vulns - Printable Version +- I Red Team DEV (https://ired.dev) +-- Forum: Offensive Security (https://ired.dev/forumdisplay.php?fid=3) +--- Forum: Hot Topics (https://ired.dev/forumdisplay.php?fid=5) +--- Thread: CVE-Vulns (/showthread.php?tid=35) |
CVE-Vulns - Unix_Root - 07-06-2025 #exploit 1⃣ CVE-2025-48703: (https://fenrisk.com/rce-centos-webpanel) RCE in CentOS Web Panel 2⃣ CVE-2025-31200: (https://blog.noahhw.dev/posts/cve-2025-31200) Zero-click RCE vulnerability in Apple's iOS 18.x 3⃣ CVE-2025-32463: (https://github.com/pr0v3rbs/CVE-2025-32463_chwoot) Escalation of Privilege to the root through sudo binary with chroot option 4⃣ CVE-2025-49113: (https://github.com/fearsoff-org/CVE-2025-49113) Roundcube ≤ 1.6.10 Post-Auth RCE via PHP Object Deserialization 5⃣ CVE-2025-32433: (https://github.com/ProDefense/CVE-2025-32433) Unauth RCE in Erlang/OTP SSH |