veganism.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Veganism Social is a welcoming space on the internet for vegans to connect and engage with the broader decentralized social media community.

Administered by:

Server stats:

208
active users

#activeexploit

3 posts2 participants0 posts today

Craft CMS zero-Day vulnerabilities actively exploited

Orange Cyberdefense reports an attack targeting Craft CMS installations that exploits two critical vulnerabilities: CVE-2025-32432 (RCE, CVSS 10.0) and CVE-2024-58136. The flaws enable attackers to execute malicious code remotely, deploy backdoors, and exfiltrate data. Approximately 13,000 instances worldwide are suspected to be vulnerable.

**Update all your Craft CMS installations to the patched versions (3.9.15, 4.14.15, or 5.6.17) immediately. If you can't follow the mitigation measures, although they are not really a long term fix. Review the advisory for the indicators of compromise to check your server. You can't ignore this patch, your server is exposed on the internet by design.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

BeyondMachinesCraft CMS zero-Day vulnerabilities actively exploitedOrange Cyberdefense reports an attack targeting Craft CMS installations that exploits two critical vulnerabilities: CVE-2025-32432 (RCE, CVSS 10.0) and CVE-2024-58136. The flaws enable attackers to execute malicious code remotely, deploy backdoors, and exfiltrate data. Approximately 13,000 instances worldwide are suspected to be vulnerable.

Critical SAP NetWeaver vulnerability under active exploitation

A critical vulnerability in SAP NetWeaver Visual Composer (CVE-2025-31324, CVSS 10) is being actively exploited, allowing unauthenticated attackers to upload malicious files to the `/developmentserver/metadatauploader` endpoint, deploy JSP webshells, and achieve complete system compromise. Security firms have confirmed active exploitation.

**Update all your SAP NetWeaver systems immediately with the emergency patch for CVE-2025-31324 vulnerability - even if you've already applied the regular April 2025 updates. If you can't patch immediately, restrict access to the /developmentserver/metadatauploader endpoint and scan your environment for unauthorized files that could indicate you've already been hacked.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

Active! Mail remote code execution flaw actively exploited

Japanese web-based email client Active! Mail contains a critical stack-based buffer overflow vulnerability (CVE-2025-42599, CVSS 9.8) that allows unauthenticated attackers to execute arbitrary code remotely. The flaw is currently being actively exploited against Japanese organizations impacting approximately 11 million accounts, prompting Qualitia to release version 6.60.06008562 as an urgent security patch.

**If you are running Active! Mail webmail based service, disable it immediately and start patching. Because hackers are actively attacking it. You can try to mitigate the issue by blocking multipart/form-data headers, but that's not really a fix. Better to disable it fully, patch, then reactivate the service.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

BeyondMachinesActive! Mail remote code execution flaw actively exploitedJapanese web-based email client Active! Mail contains a critical stack-based buffer overflow vulnerability (CVE-2025-42599, CVSS 9.8) that allows unauthenticated attackers to execute arbitrary code remotely. The flaw is currently being actively exploited against Japanese organizations impacting approximately 11 million accounts, prompting Qualitia to release version 6.60.06008562 as an urgent security patch.