
The Apache Software Foundation disclosed a significant security vulnerability in Apache Tomcat that could allow attackers.

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!
Enjoy!
🚨 April 2025 Vulnerability Report is out! 🚨
🚨 April 2025 Vulnerability Report is out! 🚨
👉 https://www.vulnerability-lookup.org/2025/05/01/vulnerability-report-april-2025/
The most prominent vulnerabilities affect the following products:
- Ivanti / ConnectSecure
- Erlang / OTP
- SAP / SAP NetWeaver
The Continuous Exploitation section highlights several resurgent vulnerabilities (recently exploited at a high rate), including:
- CVE-2017-17215 (Huawei router)
- CVE-2015-2051 (D-Link)
Check out the report for more details.
A huge thank you to all contributors and data sources that make this possible! 🙌
Want to help shape the next report? Join us: 👉 https://vulnerability.circl.lu/user/signup
đź’» NISDUC Conference
Vulnerability-Lookup will be presented during the fourth NISDUC conference.
The Apache Software Foundation disclosed a significant security vulnerability in Apache Tomcat that could allow attackers.
What are You Working on Wednesday
Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.
Mentorship Monday - Discussions for career and learning!
Weekly thread for any and all career, learning and general guidance questions. Thinking of taking a training or going for a cert? Wondering how to level up your career? Wondering what NOT to do? Got other questions? This is the time and place to ask!
A Python client for the Global CVE Allocation System.
A Python client for the Global CVE Allocation System. - gcve-eu/gcve
The Global CVE (GCVE) allocation system is a new, decentralized approach to vulnerability identification and numbering, designed to improve flexibility, scalability, and autonomy for participating entities.
This client can be integrated into software such as Vulnerability-Lookup to provide core GCVE functionalities by adhering to the Best Current Practices.
It can also be used as a standalone command-line tool.Examples of usage
As a command line tool
First install the gcve client:
bash$ python -m pip install --user pipx $ python -m pipx ensurepath $ pipx install gcve installed package gcve 0.6.0, installed us
Chinese hackers undertaking global infiltration campaign across 12 countries and 20 industries
In late March, TeamT5 detected that the China-nexus APT group exploited the critical vulnerability in Ivanti Connect Secure VPN appliances to infiltrate multiple entities around the globe. The victims include nearly twenty different industries across twelve countries. We believe that the actor still...
cross-posted from: https://scribe.disroot.org/post/2539529
Here is also a report.
China-nexus APT exploits Ivanti Connect Secure VPN vulnerability to infiltrate multiple entities, according to Cyber Security firm TeamT5.
- The campaign, active since late March 2025, exploits the CVE-2025-0282 and CVE-2025-22457 vulnerabilities' stack-based buffer overflow flaws, which have maximum CVSS (Common Vulnerability Scoring System) scores of 9.0, to deploy the SPAWNCHIMERA malware suite and establish network access.
- The victim countries include Austria, Australia, France, Spain, Japan, South Korea, Netherlands, Singapore, Taiwan, the United Arab Emirates, the United
America's cyber defenses are being dismantled from the inside
Opinion: The CVE system nearly dying shows that someone has lost the plot
What are You Working on Wednesday
Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.
: Erlang? Er, man, no problem. ChatGPT, Claude to go from flaw disclosure to actual attack code in hours
Mentorship Monday - Discussions for career and learning!
Weekly thread for any and all career, learning and general guidance questions. Thinking of taking a training or going for a cert? Wondering how to level up your career? Wondering what NOT to do? Got other questions? This is the time and place to ask!
What are your methods to harden *nix servers?
I have been looking at hardening *nix servers for my lab and maybe carry some of that over to work. CIS benchmarks are something I like doing but that's barely scratching the surface. What do you do for your servers?
I have Lynis, systemd-analyze, Kernel self protection in mind but I'd love to hear your thoughts. Bonus points for the most paranoid setups!
Off-Topic Friday
Wanna chat about something non-infosec amongst those of us who frequent /c/cybersecurity? Here’s your chance! (Keep things civil & respectful please)
GCVE: Global CVE Allocation System
The Global CVE (GCVE) allocation system is a new, decentralized approach to vulnerability identification and numbering, designed to improve flexibility, scalability, and autonomy for participating entities.
While remaining compatible with the traditional CVE system, GCVE introduces GCVE Numbering Authorities (GNAs). GNAs are independent entities that can allocate identifiers without relying on a centralised block distribution system or rigid policy enforcement.
ActiveX blocked by default in Microsoft 365 because remote code execution is bad, OK?
: Stopping users shooting themselves in the foot with last century's tech
Prompt injections are the Achilles’ heel of AI assistants. Google offers a potential fix.
What are You Working on Wednesday
Weekly thread to discuss whatever you’re working on, big or small, at work or in your free time.
CVEs are used by Microsoft, Apple, Intel, and many others.
MITRE funding for the Common Vulnerabilities and Exposures (CVE) program will expire on April 16th
Attached: 1 image I boosted several posts about this already, but since people keep asking if I've seen it.... MITRE has announced that its funding for the Common Vulnerabilities and Exposures (CVE) program and related programs, including the Common Weakness Enumeration Program, will expire on Apr...
: 800K? Make that double, and we'll need a double, too, for the pain
Hackers claim to have obtained 4chan's code, emails of moderators, and internal communications.
The notorious imageboard 4chan is down following what appears to be a major hack of its backend. The hackers claim to have exposed code for the site, the emails of moderators, and a list of mod communications. This happened, it seems, as part of a five year long, inter-image board beef between users of 4chan and Soyjak, another image board that splintered off of 4chan.
It’s still unclear what the fallout of the hack will be, but the notorious image board remains down and a huge amount of data appears to have been leaked.
Users struggled to load 4chan on the evening of April 14, 2025, according to posts on other imageboards and forums. A few hours before that, the banned board /qa/ reappeared on the site and someone using the hiroyuki account, named after 4chan’s owner Hiroyuki Nishimura, posted “FUCKING LMAO” and “U GOT HACKED XD.
The hiroyuki account was flagged in bold red as an admin, suggesting the person posting the messages had control over a real admin account. /qa/ was a “qu