cyberdudebivash

5 exploits Active since Dec 2025
CVE-2026-23550 NOMISEC CRITICAL SCANNER
Modular DS - Privilege Escalation
Incorrect Privilege Assignment vulnerability in Modular DS Modular DS modular-connector allows Privilege Escalation.This issue affects Modular DS: from n/a through <= 2.5.1.
1 stars
CVSS 9.8
CVE-2025-64155 NOMISEC CRITICAL SCANNER
Fortinet Fortisiem < 7.1.9 - OS Command Injection
An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSIEM 7.4.0, FortiSIEM 7.3.0 through 7.3.4, FortiSIEM 7.1.0 through 7.1.8, FortiSIEM 7.0.0 through 7.0.4, FortiSIEM 6.7.0 through 6.7.10 may allow an attacker to execute unauthorized code or commands via crafted TCP requests.
1 stars
CVSS 9.8
CVE-2026-0622 NOMISEC MEDIUM SUSPICIOUS
Open5gs < 2.7.6 - Hard-coded Credentials
Open 5GS WebUI uses a hard-coded JWT signing key (change-me) whenever the environment variable JWT_SECRET_KEY is unset
CVSS 6.5
CVE-2025-12420 NOMISEC CRITICAL SCANNER
ServiceNow AI Platform - Privilege Escalation
A vulnerability has been identified in the ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform. ServiceNow has addressed this vulnerability by deploying a relevant security update to  hosted instances in October 2025. Security updates have also been provided to ServiceNow self-hosted customers, partners, and hosted customers with unique configurations. Additionally, the vulnerability is addressed in the listed Store App versions. We recommend that customers promptly apply an appropriate security update or upgrade if they have not already done so.
CVSS 9.8
CVE-2025-20393 NOMISEC CRITICAL SCANNER
Cisco AsyncOS - RCE
A vulnerability in the Spam Quarantine feature of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager could allow an unauthenticated, remote attacker to execute arbitrary system commands on an affected device with root privileges. This vulnerability is due to insufficient validation of HTTP requests by the Spam Quarantine feature. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with&nbsp;root privileges.
CVSS 10.0