Internet Storm Center Spotlight


INTERNET STORM CENTER SPOTLIGHT

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. https://isc.sans.edu/about.html

It's 2025... so why are obviously malicious advertising URLs still going strong?

Published: 2025-04-21

Last Updated: 2025-04-21 08:48:44 UTC

by Jan Kopriva (Version: 1)

While the old adage stating that 'the human factor is the weakest link in the cyber security chain' will undoubtedly stay relevant in the near (and possibly far) future, the truth is that the tech industry could Ð and should Ð help alleviate the problem significantly more than it does today.

One clear example of this was provided by a phishing e-mail that was delivered to our mailbox here at the Internet Storm Center this morning.

For anyone aware of modern phishing techniques, the fact that the message was fraudulent would have been obvious at first glance, as you may see from the following pictureÉ In fact, it even used a 'standard' layout that has been commonly used in phishing campaigns for some time now ...

Read the full entry: https://isc.sans.edu/diary/Its+2025+so+why+are+obviously+malicious+advertising+URLs+still+going+strong/31880/

RedTail, Remnux and Malware Management [Guest Diary]

Published: 2025-04-16

Last Updated: 2025-04-17 01:05:49 UTC

by Guy Bruneau (Version: 1)

[This is a Guest Diary by Jacob Claycamp, an ISC intern as part of the SANS.edu BACS program]

Introduction

When I first saw malware being uploaded to my honeypot, I was lacking the requisite experience to reverse engineer it, and to understand what was happening with the code. Even though I could use any text editor to examine the associated scripts that were being uploaded with RedTail malware, I couldn't see what was happening with the RedTail malware itself. So, I decided to create a how-to on setting up a malware analysis program.

The malware analysis platform I chose to use, is Remnux which is a linux distribution, packaged with a variety of analysis tools originally created by Lenny Zeltser, a SANS instructor. My original intent for the Remnux environment was to set it up inside a docker, so it was completely isolated from my computer. This way if I accidentally detonated a malware sample, I could easily just wipe away the docker. I can also wipe away the docker, after I've finished analyzing a sample, and start with a fresh install each time I begin a new investigation.

For this how-to, I'll also make use of kasm workspaces which is a docker container streaming platform, and I'll deploy it inside of a free tier of AWS EC2 instance, this approach will make it easy to access your workspace, from a web browser ...

Read the full entry: https://isc.sans.edu/diary/RedTail+Remnux+and+Malware+Management+Guest+Diary/31868/

Internet Storm Center Entries


Honeypot Iptables Maintenance and DShield-SIEM Logging (2025.04.23)

https://isc.sans.edu/diary/Honeypot+Iptables+Maintenance+and+DShieldSIEM+Logging/31876/

xorsearch.py: "Ad Hoc YARA Rules" (2025.04.22)

https://isc.sans.edu/diary/xorsearchpy+Ad+Hoc+YARA+Rules/31856/

Wireshark 4.4.6 Released (2025.04.20)

https://isc.sans.edu/diary/Wireshark+446+Released/31872/

Recent CVEs


The list is assembled by pulling recent vulnerabilities from NIST NVD, Microsoft, Twitter mentions of vulnerabilities, ISC Diaries and Podcast, and the CISA list of known exploited vulnerabilities. There are also some unscored, but significant, vulnerabilities at the end. This includes vulnerabilities that have not been added to the NVD yet.

CVE-2025-31200 - tvOS, visionOS, iOS, iPadOS, and macOS Sequoia are vulnerable to memory corruption from processing a maliciously crafted media file, potentially leading to code execution, with reports suggesting this vulnerability may have been exploited in sophisticated attacks against certain targeted individuals on iOS.

Product: Apple macOS

CVSS Score: 7.5

** KEV since 2025-04-17 **

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-31200

NVD References:

-

https://support.apple.com/en-us/122282

-

https://support.apple.com/en-us/122400

-

https://support.apple.com/en-us/122401

-

https://support.apple.com/en-us/122402

CVE-2025-31201 - tvOS, visionOS, iOS, iPadOS, and macOS Sequoia versions 18.4.1 and 15.4.1 are vulnerable to an attack that may allow an attacker to bypass Pointer Authentication, potentially exploited in highly sophisticated attacks on specific individuals.

Product: Apple macOS

CVSS Score: 6.8

** KEV since 2025-04-17 **

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-31201

NVD References:

-

https://support.apple.com/en-us/122282

-

https://support.apple.com/en-us/122400

-

https://support.apple.com/en-us/122401

-

https://support.apple.com/en-us/122402

CVE-2025-24797 - Meshtastic is vulnerable to an attacker-controlled buffer overflow via invalid protobuf data in mesh packets, potentially leading to remote code execution without authentication or user interaction, fixed in version 2.6.2.

Product: Meshtastic

CVSS Score: 9.4

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-24797

NVD References:

https://github.com/meshtastic/firmware/security/advisories/GHSA-33hw-xhfh-944r

CVE-2025-28137 - The TOTOLINK A810R V4.1.2cu.5182_B20201026 router is vulnerable to a remote command execution flaw in the setNoticeCfg function.

Product: TOTOLINK A810R

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-28137

NVD References:

-

https://github.com/Zerone0x00/CVE/blob/main/TOTOLINK/CVE-2025-28137.md

-

https://sudsy-eyeliner-a59.notion.site/RCE1-1ab72b8cd95f80d09eded269810f3756?pvs=4

-

https://sudsy-eyeliner-a59.notion.site/RCE1-1ab72b8cd95f80d09eded269810f3756

CVE-2025-22900 - TOTOLINK N600R v4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the macCloneMac parameter in the setWanConfig function.

Product: TOTOLINK N600R

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-22900

NVD References:

https://github.com/xyqer1/TOTOLINK-N600R-setWanConfig-StackOverflow

CVE-2025-29209 - TOTOLINK X18 v9.1.0cu.2024_B20220329 has an unauthorized arbitrary command execution in the enable parameter' of the sub_41105C function of cstecgi .cgi.

Product: TOTOLINK X18

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-29209

NVD References:

-

https://github.com/LZY0522/CVE/blob/main/X18-sub_41105c.md

-

https://github.com/LZY0522/CVE/blob/main/X18-sub_41105c.md

CVE-2025-28038 & CVE-2025-28039 - TOTOLINK EX1200T V4.1.2cu.5232_B20210713 is vulnerable to pre-auth remote command execution.

Product: TOTOLINK EX1200T

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-28038

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-28039

NVD References:

https://locrian-lightning-dc7.notion.site/RCE1-1ad8e5e2b1a28030a1c8febac89935a0

CVE-2025-32911 - Libsoup is vulnerable to a use-after-free memory issue in the soup_message_headers_get_content_disposition() function, allowing a malicious HTTP client to cause memory corruption in the server.

Product: libsoup soup_message_headers

CVSS Score: 9.0

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-32911

NVD References:

-

https://access.redhat.com/security/cve/CVE-2025-32911

-

https://bugzilla.redhat.com/show_bug.cgi?id=2359355

CVE-2021-27289 - The Ksix Zigbee smart home kit is vulnerable to replay attacks due to improper implementation of the Zigbee anti-replay mechanism, allowing attackers to send spoofed commands without authentication.

Product: Ksix Zigbee smart home kit

CVSS Score: 9.1

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2021-27289

NVD References:

https://github.com/TheMalwareGuardian/CVE-2021-27289

CVE-2025-28100 - dingfanzuCMS v.1.0 is vulnerable to SQL Injection via the "operateOrder.php" id parameter, allowing attackers to execute arbitrary code.Product: Geeeeeeeek Dingfanzu

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-28100

NVD References:

https://github.com/gh3-dk/vul/blob/main/sql%20injection/dingfanzu/dingfanzu-CMS%20operateOrder.php%20id%20SQL-inject.md

CVE-2025-25456 - Tenda AC10 V4.0si_V16.03.10.20 is vulnerable to Buffer Overflow in AdvSetMacMtuWan via mac2.

Product: Tenda AC10

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-25456

NVD References:

https://gist.github.com/xyqer1/ab1e6a2bd369aaada0666639c843aff0

CVE-2025-28399 - Erick xmall v.1.1 and before is vulnerable to remote privilege escalation through the updateAddress method of the Address Controller class.

Product: Erick xmall

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-28399

NVD References:

https://github.com/20210607/cve_public/blob/main/CVE-2025-28399.md

CVE-2025-2567 - ATG monitoring systems are at risk of being modified or disabled by attackers, impacting fuel monitoring and supply chain operations and potentially causing safety hazards in fuel storage and transportation.

Product: Veeder-Root Automatic Tank Gauge (ATG)

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-2567

NVD References:

https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-05

CVE-2025-30206 - Dpanel is a Docker visualization panel system with a hardcoded JWT secret, allowing attackers to generate valid tokens and compromise the host machine.

Product: Dpanel Docker visualization panel system

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-30206

NVD References:

https://github.com/donknap/dpanel/security/advisories/GHSA-j752-cjcj-w847

CVE-2025-32445 - Argo Events allows a user to gain privileged access to the host system and cluster by customizing EventSource and Sensor CRs, even without direct administrative privileges, making it fixed in v1.9.6.

Product: Argo Events

CVSS Score: 9.9

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-32445

NVD References:

-

https://github.com/argoproj/argo-events/commit/18412293a699f559848b00e6e459c9ce2de0d3e2

-

https://github.com/argoproj/argo-events/security/advisories/GHSA-hmp7-x699-cvhq

CVE-2025-30727 - The Oracle Scripting product in Oracle E-Business Suite (component: iSurvey Module) versions 12.2.3-12.2.14 is vulnerable to an easily exploitable attack allowing an unauthenticated attacker to potentially take over Oracle Scripting.

Product: Oracle E-Business Suite

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-30727

NVD References:

https://www.oracle.com/security-alerts/cpuapr2025.html

CVE-2025-24297 - Due to lack of server-side input validation, attackers can inject malicious JavaScript code into users personal spaces of the web portal.

Product: Growatt Cloud Portal versions 3.6.0 and prior

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-24297

NVD References:

https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04

CVE-2025-30510 - An attacker can upload an arbitrary file instead of a plant image.

Product: Growatt Cloud Portal versions 3.6.0 and prior

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-30510

NVD References:

https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04

CVE-2025-30215 - NATS-Server versions prior to 2.10.27 and 2.11.1 allow unauthorized users with JS management permissions to perform administrative actions on any JS asset in any account, potentially leading to data destruction.

Product: NATS-Server

CVSS Score: 9.6

NVD:

-

https://nvd.nist.gov/vuln/detail/CVE-2025-30215

-

https://advisories.nats.io/CVE/secnote-2025-01.txt

-

https://github.com/nats-io/nats-server/security/advisories/GHSA-fhg8-qxh5-7q3w

-

http://www.openwall.com/lists/oss-security/2025/04/08/5

CVE-2025-3495 - Delta Electronics COMMGR v1 and v2 is vulnerable to session ID brute force attacks, allowing an attacker to load and execute arbitrary code.

Product: Delta Electronics COMMGR v1 and v2

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-3495

NVD References:

-

https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00005_COMMGR%20-%20Insufficient%20Randomization%20Authentication%20Bypass_v1.pdf

-

https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-07

CVE-2024-22036 - Rancher is vulnerable to privilege escalation and escape from Docker containers leading to root access within the Rancher container itself.

Product: Rancher

CVSS Score: 9.1

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2024-22036

NVD References:

-

https://bugzilla.suse.com/show_bug.cgi?id=CVE-2024-22036

-

https://github.com/rancher/rancher/security/advisories/GHSA-h99m-6755-rgwc

CVE-2024-40071 - Multiple vulnerabilities in Sourcecodester Online ID Generator System 1.0.

Product: Oretnom23 Online ID Generator System

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2024-40071

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2024-40072

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2024-40073

NVD References:

-

https://github.com/DiliLearngent/BugReport/blob/main/php/Online-ID-Generator-System/bug2-File-upload-img.md

-

https://github.com/DiliLearngent/BugReport/blob/main/php/Online-ID-Generator-System/bug2-File-upload-img.md

-

https://github.com/DiliLearngent/BugReport/blob/main/php/Online-ID-Generator-System/bug3-SQL-Injection-id1.md

-

https://github.com/DiliLearngent/BugReport/blob/main/php/Online-ID-Generator-System/bug3-SQL-Injection-id1.md

-

https://github.com/DiliLearngent/BugReport/blob/main/php/Online-ID-Generator-System/bug4-SQL-Injection-template.md

-

https://github.com/DiliLearngent/BugReport/blob/main/php/Online-ID-Generator-System/bug4-SQL-Injection-template.md

CVE-2025-29708 & CVE-2025-29709 - SourceCodester Company Website CMS 1.0 contains a file upload vulnerabilities via the "Create Services" file /dashboard/Services.

Product: SourceCodester Company Website CMS

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-29708

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-29709

NVD References:

-

https://github.com/fupanc-w1n/fupanc/blob/main/php/CVE-2025-29708.md

-

https://github.com/fupanc-w1n/fupanc/blob/main/php/Company%20Website%20CMS1.md

-

https://github.com/fupanc-w1n/fupanc/blob/main/php/CVE-2025-29709.md

-

https://github.com/fupanc-w1n/fupanc/blob/main/php/Company%20Website%20CMS2.md

CVE-2025-27495, CVE-2025-27539, CVE-2025-27540 - Multiple SQL injection vulnerabilities in TeleControl Server Basic

Product: Siemens TeleControl Server Basic

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-27495

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-27539

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-27540

NVD References:

https://cert-portal.siemens.com/productcert/html/ssa-443402.html

CVE-2025-29651, CVE-2025-29652, CVE-2025-29653 - SQL injection vulnerabilities in TP-Link M7650, TP-Link M7000, and TP-Link M7450 4G LTE Mobile Wi-Fi Router Firmware

Product: TP-Link M7650, TP-Link M7000, TP-Link M7450

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-29651

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-29652

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-29653

NVD References:

-

https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29651

-

https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29652

-

https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29653

CVE-2024-55371 & CVE-2024-55372 - Wallos version 2.38.2 and below is vulnerable to file upload attacks.

Product: Wallos

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2024-55371

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2024-55372

NVD References:

https://www.datafarm.co.th/blog/CVE-2024-55371-and-CVE-2024-55372-Malicious-File-Upload-to-RCE-in-Wallos-Application

CVE-2025-32433 - Erlang/OTP versions prior to OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20 are vulnerable to unauthenticated remote code execution in the SSH server.

Product: Erlang OTP

CVSS Score: 10.0

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-32433

NVD References:

-

http://www.openwall.com/lists/oss-security/2025/04/16/2

-

http://www.openwall.com/lists/oss-security/2025/04/18/1

-

http://www.openwall.com/lists/oss-security/2025/04/18/2

-

http://www.openwall.com/lists/oss-security/2025/04/18/6

-

http://www.openwall.com/lists/oss-security/2025/04/19/1

CVE-2025-0756 - Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2 may allow attackers to gain access to sensitive data or system resources.

Product: Hitachi Vantara Pentaho Data Integration & Analytics

CVSS Score: 9.1

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-0756

NVD References:

https://https://support.pentaho.com/hc/en-us/articles/35771876077709--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Improper-Control-of-Resource-Identifiers-Resource-Injection-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0756

CVE-2025-29040 through CVE-2025-29043 - D-Link DIR 832x 240802 is vulnerable to remote code execution via the target_addr key value and function 0x41737c.

Product: D-Link DIR 832x 240802

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-29040

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-29041

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-29042

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-29043

NVD References:

-

https://www.dlink.com/en/security-bulletin/

-

https://github.com/xyqer1/Dlink-dir-823x-diag_ping-target_addr-CommandInjection

-

https://github.com/xyqer1/Dlink-dir-823x-diag_nslookup-target_addr-CommandInjection

-

https://github.com/xyqer1/Dlink-dir-823x-set_prohibiting-macaddr-CommandInjection

-

https://github.com/xyqer1/Dlink-dir-823x-diag_traceroute-target_addr-CommandInjection

-

https://gist.github.com/xyqer1/b3bebe4967a3093951273738f0be45ce

-

https://gist.github.com/xyqer1/101b7308bdf8618d8be30bd1d09ddd38

-

https://gist.github.com/xyqer1/d5a5b18743b7a2fcbc0f93001d8e2ad9

-

https://gist.github.com/xyqer1/841e78a3c4029808dac8c439595a1358

-

https://www.dlink.com/en/security-bulletin/

CVE-2025-29044 - Netgear R61 router V1.0.1.28 is vulnerable to buffer overflow, enabling a remote attacker to execute arbitrary code via the QUERY_STRING key value.

Product: Netgear R6100

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-29044

NVD References:

-

https://gist.github.com/xyqer1/09fe6488a6655776c8c5d33e630a0f2a

-

https://github.com/xyqer1/Netgear-R6100-cgiMain-QUERY_STRING-StackOverflow?tab=readme-ov-file

-

https://gist.github.com/xyqer1/09fe6488a6655776c8c5d33e630a0f2a

-

https://github.com/xyqer1/Netgear-R6100-cgiMain-QUERY_STRING-StackOverflow?tab=readme-ov-file

CVE-2025-29045 - Buffer Overflow vulnerability in ALFA_CAMPRO-co-2.29 allows a remote attacker to execute arbitrary code via the newap_text_0 key value

Product: ALFA Wifi Camppro

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-29045

NVD References:

-

https://gist.github.com/xyqer1/16f6b44ef062374bc32c12952c7b81f8

-

https://github.com/xyqer1/ALFA-WiFi-CampPro-APSecurity-newap_text_0

CVE-2025-29046 - ALFA WiFi CampPro router ALFA_CAMPRO-co-2.29 is vulnerable to a buffer overflow allowing remote attackers to execute arbitrary code through the GAPSMinute3 key value.

Product: ALFA WiFi CampPro router

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-29046

NVD References:

-

https://gist.github.com/xyqer1/7f9970240aec0af412caee79271a5be5

-

https://github.com/xyqer1/ALFA-WiFi-CampPro-GreenAP-GAPSMinute3

CVE-2025-29047 - ALFA WiFi CampPro router ALFA_CAMPRO-co-2.29 is vulnerable to a remote attacker exploiting the hiddenIndex in the function StorageEditUser to execute arbitrary code.

Product: ALFA WiFi CampPro router

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-29047

NVD References:

-

https://gist.github.com/xyqer1/74adbc0249eeacf762fb4d33cf93a0f5

-

https://github.com/xyqer1/ALFA-WiFi-CampPro-StorageEditUser-hiddenIndex

CVE-2024-56518 - Hazelcast Management Center through 6.0 is vulnerable to remote code execution by uploading a malicious hazelcast-client XML document containing a JndiLoginModule user.provider.url at the /cluster-connections URI.

Product: Hazelcast Management Center

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2024-56518

NVD References:

-

https://docs.hazelcast.com/management-center/6.0-snapshot/getting-started/install

-

https://gist.github.com/azraelxuemo/c3d42739aa3306a41111ef603dc65b4c

CVE-2025-29662 - LandChat 3.25.12.18 has a RCE vulnerability that enables an unauthenticated attacker to execute system code remotely.

Product: LandChat core application

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-29662

NVD References:

https://github.com/landchat/LandChat/issues/5

CVE-2024-53924 - Pycel through 1.0b30 is vulnerable to code execution when processing untrusted spreadsheets with crafted formulas.

Product: Pycel

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2024-53924

NVD References:

-

https://gist.github.com/aelmosalamy/cb098e61939718d2bb248fd1cc94f287

-

https://github.com/dgorissen/pycel

-

https://github.com/stephenrauch/pycel

-

https://pypi.org/project/pycel/

CVE-2025-28009 - A SQL Injection vulnerability exists in the `u` parameter of the progress-body-weight.php endpoint of Dietiqa App v1.0.20.

Product: Dietiqa App

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-28009

NVD References:

https://github.com/beardenx/CVE-2025-28009

CVE-2025-1863 - The insecure default settings in Yokogawa Electric Corporation's recorder products allow unauthorized access and manipulation of important data.

Product: Yokogawa Electric Corporation GX10 / GX20 / GP10 / GP20 Paperless Recorders

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-1863

NVD References:

https://web-material3.yokogawa.com/1/36974/files/YSAR-25-0001-E.pdf

CVE-2024-29643 - An issue in croogo v.3.0.2 allows an attacker to perform Host header injection via the feed.rss component.

Product: Croogo v.3.0.2

CVSS Score: 9.1

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2024-29643

NVD References:

https://medium.com/@christbowel6/cve-2024-29643-host-header-injection-in-croogo-v3-0-2-0aded525f574

CVE-2025-28229 - Orban OPTIMOD 5950 Firmware v1.0.0.2 and System v2.2.15 have incorrect access control, enabling attackers to bypass authentication and achieve Administrator privileges.

Product: Orban OPTIMOD 5950 Firmware

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-28229

NVD References:

https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28229

CVE-2025-28230 - Incorrect access control in JMBroadcast JMB0150 Firmware v1.0 allows attackers to access hardcoded administrator credentials.

Product: JMTek LLC JMBroadcast JMB0150 Firmware v1.0

CVSS Score: 9.1

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-28230

NVD References:

https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28230

CVE-2025-28232 - JMBroadcast JMB0150 Firmware v1.0 allows attackers to access the Admin panel without authentication.

Product: JMBroadcast JMB0150 Firmware

CVSS Score: 9.1

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-28232

NVD References:

https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28232

CVE-2025-28231 - Incorrect access control in Itel Electronics IP Stream v1.7.0.6 allows unauthorized attackers to execute arbitrary commands with Administrator privileges.

Product: Itel Electronics IP Stream

CVSS Score: 9.1

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-28231

NVD References:

https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28231

CVE-2025-28233 - BW Broadcast TX600, TX300, TX150, TX1000, TX30, and TX50 Hardware Version: 2, Software Version: 1.6.0, Control Version: 1.0, AIO Firmware Version: 1.7 have incorrect access control, enabling attackers to access log files and extract session identifiers for session hijacking.

Product: BW Broadcast TX600

CVSS Score: 9.1

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-28233

NVD References:

https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28233

CVE-2025-28236 - Nautel VX Series transmitters VX SW v6.4.0 and below are vulnerable to remote code execution via a crafted update package.

Product: Nautel VX Series transmitters

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-28236

NVD References:

https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28236

CVE-2025-28238 - Improper session management in Elber REBLE310 Firmware v5.5.1.R , Equipment Model: REBLE310/RX10/4ASI allows attackers to execute a session hijacking attack.

Product: Elber REBLE310 Firmware

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-28238

NVD References:

https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28238

CVE-2025-28242 - Improper session management in the /login_ok.htm endpoint of DAEnetIP4 METO v1.25 allows attackers to execute a session hijacking attack.

Product: DAEnetIP4 METO v1.25

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-28242

NVD References:

https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-28242

CVE-2025-28197 - Crawl4AI <=0.4.247 is vulnerable to SSRF in /crawl4ai/async_dispatcher.py.

Product: Crawl4AI

CVSS Score: 9.1

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-28197

NVD References:

https://gist.github.com/AndrewDzzz/f49e79b09ce0643ee1fc2a829e8875e0

CVE-2024-53591 - An issue in the login page of Seclore v3.27.5.0 allows attackers to bypass authentication via a brute force attack.

Product: Seclore v3.27.5.0

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2024-53591

NVD References:

https://github.com/aljoharasubaie/CVE-2024-53591

CVE-2025-29058 - An issue in Qimou CMS v.3.34.0 allows a remote attacker to execute arbitrary code via the upgrade.php component.

Product: Qimou CMS

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-29058

NVD References:

https://cdn.wjlin0.com/halo-img/74CMSv3.34.0%E5%AD%98%E5%9C%A8%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.zip

CVE-2025-29287 - MCMS v5.4.3 is vulnerable to arbitrary file upload in the ueditor component, allowing attackers to execute arbitrary code.

Product: MCMS ueditor

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-29287

NVD References:

-

http://cms.com

-

https://gist.github.com/erdan111/38dcb5150b523436fe01249b2542f02f#file-cve-2025-29287

-

https://gitee.com/mingSoft/MCMS/issues/IBOOTX

CVE-2025-29659 - Yi IOT XY-3820 6.0.24.10 is vulnerable to Remote Command Execution via the "cmd_listen" function located in the "cmd" binary.

Product: Yi IOT XY-3820

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-29659

NVD References:

-

https://github.com/Yasha-ops/RCE-YiIOT

-

https://github.com/Yasha-ops/vulnerability-research/tree/master/CVE-2025-29659

CVE-2025-29660 - The Yi IOT XY-3820 v6.0.24.10 is vulnerable to remote code execution due to a lack of input validation in its TCP service on port 6789.

Product: Yi IOT XY-3820

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-29660

NVD References:

-

https://github.com/Yasha-ops/RCE-YiIOT

-

https://github.com/Yasha-ops/vulnerability-research/tree/master/CVE-2025-29660

CVE-2025-32958 - AdeptLanguage is vulnerable to a token extraction attack due to the upload of the mac-standalone artifact with the run's GITHUB_TOKEN, allowing attackers to potentially push malicious code or rewrite release commits in the AdeptLanguage/Adept repository.

Product: AdeptLanguage

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-32958

NVD References:

-

https://github.com/AdeptLanguage/Adept/commit/a1a41b72cdf1bebfc0cf6d7b3a8350e6406b2220

-

https://github.com/AdeptLanguage/Adept/security/advisories/GHSA-8c7v-vccv-cx4q

CVE-2024-58250 - The passprompt plugin in pppd in ppp before 2.5.2 mishandles privileges.

Product: ppp pppd

CVSS Score: 9.3

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2024-58250

NVD References:

-

https://github.com/ppp-project/ppp/commit/0a66ad22e54c72690ec2a29a019767c55c5281fc

-

https://github.com/ppp-project/ppp/compare/v2.5.1...v2.5.2

-

https://ppp.samba.org

CVE-2025-1950 - IBM Hardware Management Console - Power Systems V10.2.1030.0 and V10.3.1050.0 could allow a local user to execute commands due to improper library validation.

Product: IBM Hardware Management Console - Power Systems

CVSS Score: 9.3

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-1950

NVD References:

https://www.ibm.com/support/pages/node/7231507

CVE-2025-34028 - Commvault Command Center Innovation Release 11.38 allows an unauthenticated actor to upload malicious ZIP files, leading to Remote Code Execution.

Product: Commvault Command Center Innovation Release

CVSS Score: 10.0

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-34028

NVD References:

https://documentation.commvault.com/securityadvisories/CV_2025_04_1.html

CVE-2025-3278 - The UrbanGo Membership plugin for WordPress is vulnerable to privilege escalation in versions up to 1.0.4, allowing unauthenticated attackers to gain elevated privileges by setting their own role during registration.

Product: UrbanGo Membership plugin for WordPress

Active Installations: Update to version 1.1, or a newer patched version

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-3278

NVD References:

-

https://themeforest.net/item/urbango-directory-and-listing-wordpress-theme/22712624

-

https://www.wordfence.com/threat-intel/vulnerabilities/id/913ffe0c-c8f8-4cda-be9a-96c056d4c4a8?source=cve

CVE-2025-1093 - The AIHub theme for WordPress is vulnerable to arbitrary file uploads, allowing unauthenticated attackers to potentially execute remote code.

Product: WordPress AIHub theme

Active Installations: Update to version 1.3.8, or a newer patched version

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-1093

NVD References:

-

https://themeforest.net/item/ai-hub-startup-technology-wordpress-theme/47473638

-

https://www.wordfence.com/threat-intel/vulnerabilities/id/09adfe7e-f154-4143-827f-957ded3ffc8f?source=cve

CVE-2021-4455 - The Wordpress Plugin Smart Product Review plugin is vulnerable to arbitrary file uploads up to version 1.0.4, allowing unauthenticated attackers to potentially execute remote code.

Product: Wordpress Smart Product Review plugin

Active Installations: Update to version 1.0.5, or a newer patched version

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2021-4455

NVD References:

https://www.wordfence.com/threat-intel/vulnerabilities/id/1de9183c-95b9-4500-85e2-08dcee956360?source=cve

CVE-2025-30985 - Deserialization of Untrusted Data vulnerability in GNUCommerce allows Object Injection. This issue affects GNUCommerce: from n/a through 1.5.4.

Product: GNUCommerce

Active Installations: This plugin has been closed as of February 4, 2025 and is not available for download. Reason: Security Issue.

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-30985

NVD References:

https://patchstack.com/database/wordpress/plugin/gnucommerce/vulnerability/wordpress-gnucommerce-plugin-1-5-4-php-object-injection-vulnerability?_s_id=cve

CVE-2025-26927 - EPC AI Hub allows malicious upload of web shells to a web server.

Product: EPC AI Hub

Active Installations: unknown

CVSS Score: 10.0

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-26927

NVD References:

https://patchstack.com/database/wordpress/theme/aihub/vulnerability/wordpress-ai-hub-plugin-1-3-3-arbitrary-file-upload-vulnerability?_s_id=cve

CVE-2025-30967 - WPJobBoard is susceptible to a CSRF vulnerability that allows attackers to upload a web shell to a web server, impacting versions from n/a through n/a.

Product: WPJobBoard

Active Installations: 1,000+

CVSS Score: 9.6

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-30967

NVD References:

https://patchstack.com/database/wordpress/plugin/wpjobboard/vulnerability/wordpress-wpjobboard-plugin-5-11-1-csrf-to-remote-code-execution-rce-vulnerability?_s_id=cve

CVE-2025-39557 - Kadence WooCommerce Email Designer allows for unrestricted upload of dangerous file types, enabling potential web server takeover.

Product: Ben Ritner Kadence WooCommerce Email Designer

Active Installations: 100,000+

CVSS Score: 9.1

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-39557

NVD References:

https://patchstack.com/database/wordpress/plugin/kadence-woocommerce-email-designer/vulnerability/wordpress-kadence-woocommerce-email-designer-plugin-1-5-14-arbitrary-file-upload-vulnerability?_s_id=cve

CVE-2025-39601 - WPFactory Custom CSS, JS & PHP is vulnerable to CSRF, allowing remote code inclusion in versions up to 2.4.1.

Product: WPFactory Custom CSS, JS & PHP

Active Installations: 400+

CVSS Score: 9.6

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-39601

NVD References:

https://patchstack.com/database/wordpress/plugin/custom-css/vulnerability/wordpress-custom-css-js-php-plugin-2-4-1-csrf-to-rce-vulnerability?_s_id=cve

CVE-2025-22655 - Caio Web Dev CWD - Stealth Links is vulnerable to SQL Injection from n/a through 1.3.

Product: Caio CWD Ð Stealth Links

Active Installations: This plugin has been closed as of February 7, 2025 and is not available for download. Reason: Security Issue.

CVSS Score: 9.3

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-22655

NVD References:

https://patchstack.com/database/wordpress/plugin/cwd-stealth-links/vulnerability/wordpress-cwd-stealth-links-plugin-1-3-sql-injection-vulnerability?_s_id=cve

CVE-2025-27282 - Theme File Duplicator allows for the unrestricted upload of dangerous files, leaving it vulnerable to malicious attacks.

Product: rockgod100 Theme File Duplicator

Active Installations: This plugin has been closed as of February 18, 2025 and is not available for download. Reason: Security Issue.

CVSS Score: 9.9

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-27282

NVD References:

https://patchstack.com/database/wordpress/plugin/theme-file-duplicator/vulnerability/wordpress-theme-file-duplicator-plugin-1-3-arbitrary-file-upload-vulnerability?_s_id=cve

CVE-2025-27286 - Saoshyant Slider is vulnerable to Object Injection through Deserialization of Untrusted Data from n/a through version 3.0.

Product: saoshyant1994 Saoshyant Slider

Active Installations: unknown

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-27286

NVD References:

https://patchstack.com/database/wordpress/plugin/saoshyant-slider/vulnerability/wordpress-saoshyant-slider-plugin-3-0-php-object-injection-vulnerability?_s_id=cve

CVE-2025-32572 - Climax Themes Kata Plus is vulnerable to object injection through deserialization of untrusted data from versions n/a to 1.5.2.

Product: Climax Themes Kata Plus

Active Installations: 600+

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-32572

NVD References:

https://patchstack.com/database/wordpress/plugin/kata-plus/vulnerability/wordpress-kata-plus-addons-for-elementor-widgets-extensions-and-templates-plugin-1-5-0-php-object-injection-vulnerability?_s_id=cve

CVE-2025-32583 - Termel PDF 2 Post allows remote code inclusion due to improper control of code generation.

Product: Termel PDF 2 Post

Active Installations: 100+

CVSS Score: 9.9

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-32583

NVD References:

https://patchstack.com/database/wordpress/plugin/pdf2post/vulnerability/wordpress-pdf-2-post-plugin-2-4-0-remote-code-execution-rce-vulnerability?_s_id=cve

CVE-2025-32626 - JS Job Manager version n/a through 2.0.2 is vulnerable to SQL Injection due to improper neutralization of special elements.

Product: JoomSky JS Job Manager

Active Installations: 800+

CVSS Score: 9.3

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-32626

NVD References:

https://patchstack.com/database/wordpress/plugin/js-jobs/vulnerability/wordpress-js-job-manager-plugin-2-0-2-sql-injection-vulnerability?_s_id=cve

CVE-2025-32660 - JS Job Manager is vulnerable to allowing the unrestricted upload of dangerous file types, enabling the potential upload of a web shell to a web server.

Product: JoomSky JS Job Manager

Active Installations: 800+

CVSS Score: 10.0

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-32660

NVD References:

https://patchstack.com/database/wordpress/plugin/js-jobs/vulnerability/wordpress-js-job-manager-plugin-2-0-2-arbitrary-file-upload-vulnerability?_s_id=cve

CVE-2025-32636 - Local Magic is vulnerable to SQL Injection from version n/a through 2.6.0.

Product: matthewrubin Local Magic

Active Installations: 100+

CVSS Score: 9.3

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-32636

NVD References:

https://patchstack.com/database/wordpress/plugin/local-magic/vulnerability/wordpress-local-magic-plugin-2-6-0-sql-injection-vulnerability?_s_id=cve

CVE-2025-32648 - Incorrect Privilege Assignment vulnerability in Projectopia Projectopia allows Privilege Escalation. This issue affects Projectopia: from n/a through 5.1.16.

Product: Projectopia

Active Installations: 300+

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-32648

NVD References:

https://patchstack.com/database/wordpress/plugin/projectopia-core/vulnerability/wordpress-projectopia-project-magement-plugin-5-1-15-privilege-escalation-vulnerability?_s_id=cve

CVE-2025-32652 - Solace Extra in solacewp allows the upload of dangerous files, posing a security risk from version n/a through 1.3.1.

Product: solacewp Solace Extra

Active Installations: 3,000+

CVSS Score: 9.9

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-32652

NVD References:

https://patchstack.com/database/wordpress/plugin/solace-extra/vulnerability/wordpress-solace-extra-plugin-1-3-1-arbitrary-file-upload-vulnerability?_s_id=cve

CVE-2025-32658 - Deserialization of Untrusted Data vulnerability in wpWax HelpGent allows Object Injection. This issue affects HelpGent: from n/a through 2.2.4.

Product: wpWax HelpGent

Active Installations: 100+

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-32658

NVD References:

https://patchstack.com/database/wordpress/plugin/helpgent/vulnerability/wordpress-helpgent-plugin-2-2-4-php-object-injection-vulnerability?_s_id=cve

CVE-2025-32682 - MapSVG Lite allows for an unrestricted upload of dangerous file types, potentially enabling attackers to upload a web shell to a web server, impacting versions from n/a through 8.5.34.

Product: RomanCode MapSVG Lite

Active Installations: 700+

CVSS Score: 9.9

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-32682

NVD References:

https://patchstack.com/database/wordpress/plugin/mapsvg-lite-interactive-vector-maps/vulnerability/wordpress-mapsvg-lite-plugin-8-5-32-arbitrary-file-upload-vulnerability?_s_id=cve

CVE-2025-39436 - Aidraw I Draw allows the unrestricted upload of dangerous file types, potentially enabling the use of malicious files, affecting versions from n/a through 1.0.

Product: aidraw I Draw

Active Installations: This plugin has been closed as of April 16, 2025 and is not available for download. This closure is temporary, pending a full review.

CVSS Score: 9.1

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-39436

NVD References:

https://patchstack.com/database/wordpress/plugin/idraw/vulnerability/wordpress-i-draw-1-0-arbitrary-file-upload-vulnerability?_s_id=cve

CVE-2025-39550 - Deserialization of Untrusted Data vulnerability in Shahjahan Jewel FluentCommunity allows Object Injection. This issue affects FluentCommunity: from n/a through 1.2.15.

Product: Shahjahan Jewel FluentCommunity

Active Installations: 4,000+

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-39550

NVD References:

https://patchstack.com/database/wordpress/plugin/fluent-community/vulnerability/wordpress-fluentcommunity-1-2-15-php-object-injection-vulnerability?_s_id=cve

CVE-2025-39551 - FluentBoards is vulnerable to Object Injection through Deserialization of Untrusted Data from version n/a to 1.47.

Product: Mahmudul Hasan Arif FluentBoards

Active Installations: 4,000+

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-39551

NVD References:

https://patchstack.com/database/wordpress/plugin/fluent-boards/vulnerability/wordpress-fluentboards-1-47-php-object-injection-vulnerability?_s_id=cve

CVE-2025-39587 - Cost Calculator Builder from n/a through 3.2.65 is vulnerable to SQL Injection attacks due to improper neutralization of special elements in SQL commands.

Product: Stylemix Cost Calculator Builder

Active Installations: 30,000+

CVSS Score: 9.3

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-39587

NVD References:

https://patchstack.com/database/wordpress/plugin/cost-calculator-builder/vulnerability/wordpress-cost-calculator-builder-3-2-65-sql-injection-vulnerability?_s_id=cve

CVE-2025-39588 - Ultimate Store Kit Elementor Addons is vulnerable to Object Injection through the deserialization of untrusted data, impacting versions from n/a to 2.4.0.

Product: bdthemes Ultimate Store Kit Elementor Addons

Active Installations: 1,000+

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-39588

NVD References:

https://patchstack.com/database/wordpress/plugin/ultimate-store-kit/vulnerability/wordpress-ultimate-store-kit-elementor-addons-2-4-0-deserialization-of-untrusted-data-vulnerability?_s_id=cve

CVE-2025-39595 - Quentn WP is susceptible to SQL Injection through version 1.2.8, allowing attackers to execute malicious SQL commands on Quentn.com GmbH Quentn WP.

Product: Quentn.com GmbH Quentn WP

Active Installations: 500+

CVSS Score: 9.3

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-39595

NVD References:

https://patchstack.com/database/wordpress/plugin/quentn-wp/vulnerability/wordpress-quentn-wp-1-2-8-sql-injection-vulnerability?_s_id=cve

CVE-2025-39596 - Weak Authentication vulnerability in Quentn.com GmbH Quentn WP allows Privilege Escalation. This issue affects Quentn WP: from n/a through 1.2.8.

Product: Quentn.com GmbH Quentn WP

Active Installations: 500+

CVSS Score: 9.8

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-39596

NVD References:

https://patchstack.com/database/wordpress/plugin/quentn-wp/vulnerability/wordpress-quentn-wp-1-2-8-privilege-escalation-vulnerability?_s_id=cve

CVE-2025-39471 - Pantherius Modal Survey allows SQL Injection attacks from versions n/a through 2.0.2.0.1.

Product: Pantherius Modal Survey

Active Installations: unknown

CVSS Score: 9.3

NVD:

https://nvd.nist.gov/vuln/detail/CVE-2025-39471

NVD References:

https://patchstack.com/database/wordpress/plugin/modal-survey/vulnerability/wordpress-modal-survey-plugin-2-0-2-0-1-sql-injection-vulnerability?_s_id=cve