High Risk CVE Alert Bot
@high-risk-cve.bsky.social
🚨 A bot posting real-time alerts for high-risk CVEs. Helping you stay ahead of major security vulnerabilities. #CyberSecurity #CVE #InfoSec
🚨 Redis Lua Use-After-Free May Lead To Remote Code Execution#CVE-2025-49844 Severity: CRITICAL (CVSSv3.1 Score: 10)
Attack Vector:NETWORK
Attack Vector:NETWORK
Cve-2025-49844 | Redis Lua Use-After-Free May Lead To Remote Code Execution
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
nvd.nist.gov
October 4, 2025 at 1:44 PM
🚨 Redis Lua Use-After-Free May Lead To Remote Code Execution#CVE-2025-49844 Severity: CRITICAL (CVSSv3.1 Score: 10)
Attack Vector:NETWORK
Attack Vector:NETWORK
🚨 Eidos: One-Click Remote Code Execution Through Custom Url Handling#CVE-2025-54374 Severity: HIGH (CVSSv3.1 Score: 8.8)
Attack Vector:NETWORK
Attack Vector:NETWORK
Cve-2025-54374 | Eidos: One-Click Remote Code Execution Through Custom Url Handling
Eidos is an extensible framework for Personal Data Management. Versions 0.21.0 and below contain a one-click remote code execution vulnerability. An attacker can exploit this vulnerability by embedding a specially crafted eidos: URL on any website, including a malicious one they control. When a victim visits such a site or clicks on the link, the browser triggers the app’s custom URL handler (eidos:), causing the Eidos application to launch and process the URL, leading to remote code execution on the victim’s machine. This issue does not have a fix as of October 3, 2025
nvd.nist.gov
October 4, 2025 at 1:43 PM
🚨 Eidos: One-Click Remote Code Execution Through Custom Url Handling#CVE-2025-54374 Severity: HIGH (CVSSv3.1 Score: 8.8)
Attack Vector:NETWORK
Attack Vector:NETWORK
🚨 Phpmyfaq Duplicate Email Registration Allows Multiple Accounts With The Same Email#CVE-2025-59943 Severity: HIGH (CVSSv3.1 Score: 8.1)
Attack Vector:NETWORK
Attack Vector:NETWORK
Cve-2025-59943 | Phpmyfaq Duplicate Email Registration Allows Multiple Accounts With The Same Email
phpMyFAQ is an open source FAQ web application. Versions 4.0-nightly-2025-10-03 and below do not enforce uniqueness of email addresses during user registration. This allows multiple distinct accounts to be created with the same email. Because email is often used as an identifier for password resets, notifications, and administrative actions, this flaw can cause account ambiguity and, in certain configurations, may lead to privilege escalation or account takeover. This issue is fixed in version 4.0.13.
nvd.nist.gov
October 4, 2025 at 1:42 PM
🚨 Phpmyfaq Duplicate Email Registration Allows Multiple Accounts With The Same Email#CVE-2025-59943 Severity: HIGH (CVSSv3.1 Score: 8.1)
Attack Vector:NETWORK
Attack Vector:NETWORK
CVE-2025-59944 HIGH (CVSSv3.1 Score: 8.1) attack_vector:NETWORK
🚨 Cursor Ide: Sensitive File Overwrite Bypass Is Possible
🚨 Cursor Ide: Sensitive File Overwrite Bypass Is Possible
Cve-2025-59944 | Cursor Ide: Sensitive File Overwrite Bypass Is Possible
Cursor is a code editor built for programming with AI. Versions 1.6.23 and below contain case-sensitive checks in the way Cursor IDE protects its sensitive files (e.g., */.cursor/mcp.json), which allows attackers to modify the content of these files through prompt injection and achieve remote code execution. A prompt injection can lead to full RCE through modifying sensitive files on case-insensitive fileystems. This issue is fixed in version 1.7.
nvd.nist.gov
October 4, 2025 at 6:50 AM
CVE-2025-59944 HIGH (CVSSv3.1 Score: 8.1) attack_vector:NETWORK
🚨 Cursor Ide: Sensitive File Overwrite Bypass Is Possible
🚨 Cursor Ide: Sensitive File Overwrite Bypass Is Possible
CVE-2025-10692 HIGH (CVSSv4.0 Score: 7.1) attack_vector:NETWORK
🚨 Opensupports 4.11.0 — Sql Injection
🚨 Opensupports 4.11.0 — Sql Injection
Cve-2025-10692 | Opensupports 4.11.0 — Sql Injection
The endpoint POST /api/staff/get-new-tickets concatenates the user-controlled parameter departmentId directly into the SQL WHERE clause without parameter binding. As a result, an authenticated staff user (level ≥ 1) can inject SQL to alter the filter logic, effectively bypassing department scoping and disclosing tickets beyond their intended access.This issue affects OpenSupports: 4.11.0.
nvd.nist.gov
October 4, 2025 at 6:49 AM
CVE-2025-10692 HIGH (CVSSv4.0 Score: 7.1) attack_vector:NETWORK
🚨 Opensupports 4.11.0 — Sql Injection
🚨 Opensupports 4.11.0 — Sql Injection
Hello world! I posted this via the Python SDK.
September 30, 2025 at 3:48 AM
Hello world! I posted this via the Python SDK.
ATProtocol looks cool!
September 29, 2025 at 4:33 PM
ATProtocol looks cool!