Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Automating Design Systems: Tips And Resources For Getting Started

      August 6, 2025

      OpenAI releases two open weight reasoning models

      August 6, 2025

      Accelerate tool adoption with a developer experimentation framework

      August 6, 2025

      UX Job Interview Helpers

      August 5, 2025

      Yes, you can edit video like a pro on Linux – here are my 4 go-to apps

      August 6, 2025

      I tried Perplexity’s new reservation feature, and it surprised me with new dining spots to try

      August 6, 2025

      Your Samsung TV is getting a huge feature upgrade – 3 AI tools launching right now

      August 6, 2025

      This multi-card reader is one of the best investments I’ve made for my creative workflow

      August 6, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Fluent Object Operations with Laravel’s Enhanced Helper Utilities

      August 6, 2025
      Recent

      Fluent Object Operations with Laravel’s Enhanced Helper Utilities

      August 6, 2025

      Record and Replay Requests With Laravel ChronoTrace

      August 6, 2025

      How to Write Media Queries in Optimizely Configured Commerce (Spire)

      August 6, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Battlefield 6 Developers Confirm AI Bots Will Auto-fill Servers If Player Count Drops

      August 6, 2025
      Recent

      Battlefield 6 Developers Confirm AI Bots Will Auto-fill Servers If Player Count Drops

      August 6, 2025

      Canon imageFORMULA R40 Driver for Windows 11, 10 (Download)

      August 6, 2025

      Microsoft to End Support for Visual Studio 2015 This October

      August 6, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-6264 – Velociraptor Unauthorized Artifact Collection and Execution Vulnerability

    CVE-2025-6264 – Velociraptor Unauthorized Artifact Collection and Execution Vulnerability

    June 20, 2025

    CVE ID : CVE-2025-6264

    Published : June 20, 2025, 3:15 a.m. | 3 hours, 26 minutes ago

    Description : Velociraptor allows collection of VQL queries packaged into Artifacts from endpoints. These artifacts can be used to do anything and usually run with elevated permissions.  To limit access to some dangerous artifact, Velociraptor allows for those to require high permissions like EXECVE to launch.

    The Admin.Client.UpdateClientConfig is an artifact used to update the client’s configuration. This artifact did not enforce an additional required permission, allowing users with COLLECT_CLIENT permissions (normally given by the “Investigator” role) to collect it from endpoints and update the configuration.

    This can lead to arbitrary command execution and endpoint takeover.

    To successfully exploit this vulnerability the user must already have access to collect artifacts from the endpoint (i.e. have the COLLECT_CLIENT given typically by the “Investigator’ role).

    Severity: 4.7 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-6302 – TOTOLINK EX1200T Stack-Based Buffer Overflow Vulnerability
    Next Article Microsoft 365 Boosts Security: Legacy File Access Protocols RPS & FrontPage RPC Phased Out July 2025

    Related Posts

    Development

    ESET Threat Report H1 2025: ClickFix, infostealer disruptions, and ransomware deathmatch

    August 6, 2025
    Development

    CISA Adds 3 D-Link Vulnerabilities to KEV Catalog Amid Active Exploitation Evidence

    August 6, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-5901 – TOTOLINK T10 Buffer Overflow in POST Request Handler

    Common Vulnerabilities and Exposures (CVEs)

    AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals

    Development

    Ghibli AI Image Generator

    Development

    Last Week in AI #307 – GPT 4.1, o3, o4-mini, Gemini 2.5 Flash, Veo 2

    Artificial Intelligence

    Highlights

    Development

    An “Inconceivable” Conversation With Dr. Pete Cornwell on Simple vs. Agentic AI

    June 11, 2025

    Dr. Pete Cornwell, Director of Contact Center, offers a fresh perspective on customer care and…

    Windows 10 vs Windows 11 RAM Usage: Which One Uses Less Memory?

    July 3, 2025

    CVE-2025-4189 – WordPress Audio Comments Plugin CSRF

    May 17, 2025

    How to Access Oracle Fusion Cloud Apps Data from Snowflake

    April 16, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.