<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									Hack The Forum - Recent Topics				            </title>
            <link>https://www.hacktheforum.com/</link>
            <description>Hack The Forum Discussion Board</description>
            <language>en</language>
            <lastBuildDate>Fri, 03 Apr 2026 19:39:39 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>CVE-2025-0509</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0509/</link>
                        <pubDate>Sat, 21 Feb 2026 17:05:46 +0000</pubDate>
                        <description><![CDATA[Description
A security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkle’s (Ed)DSA signing checks.
...]]></description>
                        <content:encoded><![CDATA[<h3 id="vulnDescriptionTitle" data-testid="vuln-description-title">Description</h3>
<p data-testid="vuln-description">A security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkle’s (Ed)DSA signing checks.</p>
<h3>References</h3>
<p>https://github.com/sparkle-project/Sparkle/pull/2550</p>
<p>https://security.netapp.com/advisory/ntap-20250124-0008/</p>
<p>https://sparkle-project.org/documentation/security-and-reliability/</p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/"></category>                        <dc:creator>kajal</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0509/</guid>
                    </item>
				                    <item>
                        <title>CVE-2025-0508</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0508/</link>
                        <pubDate>Sat, 21 Feb 2026 17:03:09 +0000</pubDate>
                        <description><![CDATA[Description
A vulnerability in the SageMaker Workflow component of aws/sagemaker-python-sdk allows for the possibility of MD5 hash collisions in all versions. This can lead to workflows bei...]]></description>
                        <content:encoded><![CDATA[<h3 id="vulnDescriptionTitle" data-testid="vuln-description-title">Description</h3>
<p data-testid="vuln-description">A vulnerability in the SageMaker Workflow component of aws/sagemaker-python-sdk allows for the possibility of MD5 hash collisions in all versions. This can lead to workflows being inadvertently replaced due to the reuse of results from different configurations that produce the same MD5 hash. This issue can cause integrity problems within the pipeline, potentially leading to erroneous processing outcomes.</p>
<h3>References</h3>
<p>https://github.com/aws/sagemaker-python-sdk/commit/dcdd99f911e8b1a05d19cf1ad939b0fefae47864</p>
<p>https://huntr.com/bounties/eb056818-5b81-466f-81ee-916058d34af2</p>
<p>https://nvd.nist.gov/vuln/detail/CVE-2025-0508</p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/"></category>                        <dc:creator>kajal</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0508/</guid>
                    </item>
				                    <item>
                        <title>CVE-2025-0507</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0507/</link>
                        <pubDate>Fri, 20 Feb 2026 23:38:33 +0000</pubDate>
                        <description><![CDATA[Description
The Ticketmeo – Sell Tickets – Event Ticketing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin&#039;s shortcodes in all versions up to, and including...]]></description>
                        <content:encoded><![CDATA[<h3 id="vulnDescriptionTitle" data-testid="vuln-description-title">Description</h3>
<p data-testid="vuln-description">The Ticketmeo – Sell Tickets – Event Ticketing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 2.3.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</p>
<h3>References</h3>
<p>https://plugins.trac.wordpress.org/browser/ploxel/tags/2.2.0/ploxel.php#L49</p>
<p>https://plugins.trac.wordpress.org/changeset/3231203/</p>
<p>https://www.wordfence.com/threat-intel/vulnerabilities/id/149edbdf-4a27-4d79-8dd1-b5b3efbf648b?source=cve</p>
<p> </p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/"></category>                        <dc:creator>kajal</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0507/</guid>
                    </item>
				                    <item>
                        <title>CVE-2025-0506</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0506/</link>
                        <pubDate>Fri, 20 Feb 2026 23:36:34 +0000</pubDate>
                        <description><![CDATA[Description
The Rise Blocks – A Complete Gutenberg Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the titleTag parameter in all versions up to, and inclu...]]></description>
                        <content:encoded><![CDATA[<p>Description</p>
<p data-testid="vuln-description">The Rise Blocks – A Complete Gutenberg Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the titleTag parameter in all versions up to, and including, 3.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</p>
<p data-testid="vuln-description">References</p>
<p data-testid="vuln-description">https://plugins.trac.wordpress.org/browser/rise-blocks/tags/3.6/classes/blocks/site-identity.php#L375</p>
<p data-testid="vuln-description">https://www.wordfence.com/threat-intel/vulnerabilities/id/2ec012e7-b997-466e-8676-8e9467473eae?source=cve</p>
<p data-testid="vuln-description">https://nvd.nist.gov/vuln/detail/CVE-2025-0506</p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/"></category>                        <dc:creator>kajal</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0506/</guid>
                    </item>
				                    <item>
                        <title>CVE-2025-0505</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0505/</link>
                        <pubDate>Fri, 20 Feb 2026 22:55:45 +0000</pubDate>
                        <description><![CDATA[Description
On Arista CloudVision systems (virtual or physical on-premise deployments), Zero Touch Provisioning can be used to gain admin privileges on the CloudVision system, with more per...]]></description>
                        <content:encoded><![CDATA[<h3 id="vulnDescriptionTitle" data-testid="vuln-description-title">Description</h3>
<p data-testid="vuln-description">On Arista CloudVision systems (virtual or physical on-premise deployments), Zero Touch Provisioning can be used to gain admin privileges on the CloudVision system, with more permissions than necessary, which can be used to query or manipulate system state for devices under management. Note that CloudVision as-a-Service is not affected.</p>
<h4>Affected Software</h4>
<div><strong>CloudVision Portal Versions</strong></div>
<ul>
<li>2024.2.0 and 2024.2.1</li>
<li>2024.3.0</li>
</ul>
<p> </p>
<h4>Affected Platforms</h4>
<div>The following products<span> </span><strong>are</strong><span> </span>affected by this vulnerability:</div>
<ul>
<li>CloudVision Portal, virtual appliance or physical appliance</li>
<li>CloudVision CUE, virtual appliance or physical appliance</li>
</ul>
<h3>Mitigation</h3>
<p><span>The ZTP component on CloudVision (on-premise) can be disabled by running the following on any of the nodes of the CloudVision deployment.</span></p>
<blockquote>
<pre contenteditable="false">cvpi disable ztp
cvpi stop ztp</pre>
</blockquote>
<p data-testid="vuln-description"><span>The following command can be used to verify that the component is stopped:</span></p>
<pre contenteditable="false">cvpi status ztp
 
Executing command. This may take some time...
Completed 1/1 discovered actions
primary  components total:1 running:0 disabled:1</pre>
<h3> </h3>
<h3 id="pageLink-1">Resolution</h3>
<p>The recommended resolution is to upgrade to a remediated software version at your earliest convenience. </p>
<div class="clear10"> </div>
<div>CVE-2025-0505 has been fixed in the following releases:</div>
<ul>
<li style="list-style-type: none">
<ul>
<li style="list-style-type: none">
<ul>
<li>2024.2.2 and later releases in the 2024.2.x train</li>
<li>2024.3.1 and later releases in the 2024.3.x train</li>
</ul>
</li>
</ul>
</li>
</ul>
<h3>References</h3>
<p>https://www.arista.com/en/support/advisories-notices/security-advisory/21315-security-advisory-0115</p>
<p>https://nvd.nist.gov/vuln/detail/CVE-2025-0505</p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/"></category>                        <dc:creator>kajal</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0505/</guid>
                    </item>
				                    <item>
                        <title>CVE-2025-0504</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0504/</link>
                        <pubDate>Fri, 20 Feb 2026 22:50:18 +0000</pubDate>
                        <description><![CDATA[Description
Black Duck SCA versions prior to 2025.10.0 had user role permissions configured in an overly broad manner. Users with the scoped Project Manager user role with the Global User R...]]></description>
                        <content:encoded><![CDATA[<h3 id="vulnDescriptionTitle" data-testid="vuln-description-title">Description</h3>
<p data-testid="vuln-description">Black Duck SCA versions prior to 2025.10.0 had user role permissions configured in an overly broad manner. Users with the scoped Project Manager user role with the Global User Read access permission enabled access to certain Project Administrator functionalities which should have be inaccessible. Exploitation does not grant full system control, but it may enable unauthorized changes to project configurations or access to system sensitive information.</p>
<h3>References</h3>
<p>https://community.blackduck.com/s/article/Black-Duck-Product-Security-Advisory-CVE-2025-0504</p>
<p>https://nvd.nist.gov/vuln/detail/CVE-2025-0504</p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/"></category>                        <dc:creator>kajal</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0504/</guid>
                    </item>
				                    <item>
                        <title>CVE-2025-0503</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0503/</link>
                        <pubDate>Fri, 20 Feb 2026 22:48:58 +0000</pubDate>
                        <description><![CDATA[Description
Mattermost versions 9.11.x &lt;= 9.11.6 fail to filter out DMs from the deleted channels endpoint which allows an attacker to infer user IDs and other metadata from deleted DMs ...]]></description>
                        <content:encoded><![CDATA[<h3 id="vulnDescriptionTitle" data-testid="vuln-description-title">Description</h3>
<p data-testid="vuln-description">Mattermost versions 9.11.x &lt;= 9.11.6 fail to filter out DMs from the deleted channels endpoint which allows an attacker to infer user IDs and other metadata from deleted DMs if someone had manually marked DMs as deleted in the database.</p>
<h3>References</h3>
<p>https://mattermost.com/security-updates</p>
<p>https://nvd.nist.gov/vuln/detail/CVE-2025-05035</p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/"></category>                        <dc:creator>kajal</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0503/</guid>
                    </item>
				                    <item>
                        <title>CVE-2025-0502</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0502/</link>
                        <pubDate>Fri, 20 Feb 2026 22:47:41 +0000</pubDate>
                        <description><![CDATA[Description
Transmission of Private Resources into a New Sphere (&#039;Resource Leak&#039;) vulnerability in CrafterCMS Engine on Linux, MacOS, x86, Windows, 64 bit, ARM allows Directory Indexing, Re...]]></description>
                        <content:encoded><![CDATA[<h3 id="vulnDescriptionTitle" data-testid="vuln-description-title">Description</h3>
<p data-testid="vuln-description">Transmission of Private Resources into a New Sphere ('Resource Leak') vulnerability in CrafterCMS Engine on Linux, MacOS, x86, Windows, 64 bit, ARM allows Directory Indexing, Resource Leak Exposure.This issue affects CrafterCMS: from 4.0.0 before 4.0.8, from 4.1.0 before 4.1.6.</p>
<h3>References</h3>
<p>https://craftercms.com/docs/current/security/advisory.html#cv-2025011501</p>
<p>https://nvd.nist.gov/vuln/detail/CVE-2025-0502</p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/"></category>                        <dc:creator>kajal</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0502/</guid>
                    </item>
				                    <item>
                        <title>CVE-2025-0501</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0501/</link>
                        <pubDate>Fri, 20 Feb 2026 22:45:59 +0000</pubDate>
                        <description><![CDATA[Description
An issue in the native clients for Amazon WorkSpaces (when running PCoIP protocol) may allow an attacker to access remote sessions via man-in-the-middle.
References]]></description>
                        <content:encoded><![CDATA[<h3 id="vulnDescriptionTitle" data-testid="vuln-description-title">Description</h3>
<p data-testid="vuln-description">An issue in the native clients for Amazon WorkSpaces (when running PCoIP protocol) may allow an attacker to access remote sessions via man-in-the-middle.</p>
<h3>References</h3>
<p>https://aws.amazon.com/security/security-bulletins/AWS-2025-001/</p>
<p>https://docs.aws.amazon.com/workspaces/latest/userguide/amazon-workspaces-android-client.html#android-release-notes</p>
<p>https://docs.aws.amazon.com/workspaces/latest/userguide/amazon-workspaces-linux-client.html#linux-release-notes</p>
<p>https://docs.aws.amazon.com/workspaces/latest/userguide/amazon-workspaces-osx-client.html#osx-release-notes</p>
<p>https://docs.aws.amazon.com/workspaces/latest/userguide/amazon-workspaces-windows-client.html#windows-release-notes</p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/"></category>                        <dc:creator>kajal</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0501/</guid>
                    </item>
				                    <item>
                        <title>CVE-2025-0500</title>
                        <link>https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0500/</link>
                        <pubDate>Fri, 20 Feb 2026 22:43:59 +0000</pubDate>
                        <description><![CDATA[Description
An issue in the native clients for Amazon WorkSpaces (when running Amazon DCV protocol), Amazon AppStream 2.0, and Amazon DCV Clients may allow an attacker to access remote sess...]]></description>
                        <content:encoded><![CDATA[<h3 id="vulnDescriptionTitle" data-testid="vuln-description-title">Description</h3>
<p data-testid="vuln-description">An issue in the native clients for Amazon WorkSpaces (when running Amazon DCV protocol), Amazon AppStream 2.0, and Amazon DCV Clients may allow an attacker to access remote sessions via man-in-the-middle.</p>
<h3>References</h3>
<p>https://aws.amazon.com/security/security-bulletins/AWS-2025-001/</p>
<p>https://docs.aws.amazon.com/appstream2/latest/developerguide/client-release-versions.html</p>
<p>https://docs.aws.amazon.com/dcv/latest/adminguide/doc-history-release-notes.html#dcv-2023-1-16388jul</p>
<p>https://docs.aws.amazon.com/workspaces/latest/userguide/amazon-workspaces-linux-client.html#linux-release-notes</p>
<p>https://docs.aws.amazon.com/workspaces/latest/userguide/amazon-workspaces-osx-client.html#osx-release-notes</p>
<p>https://docs.aws.amazon.com/workspaces/latest/userguide/amazon-workspaces-windows-client.html#windows-release-notes</p>
<p> </p>]]></content:encoded>
						                            <category domain="https://www.hacktheforum.com/"></category>                        <dc:creator>kajal</dc:creator>
                        <guid isPermaLink="true">https://www.hacktheforum.com/common-vulnerabilities-and-exposures/cve-2025-0500/</guid>
                    </item>
							        </channel>
        </rss>
		