CVE Monitor
3.44K subscribers
33.3K links
Download Telegram
{
"Source": "CVE FEED",
"Title": "CVE-2025-56683 - A cross-site scripting (XSS) vulnerability in the",
"Content": "CVE ID : CVE-2025-56683
Published : Oct. 9, 2025, 3:16 p.m. | 56 minutes ago
Description : A cross-site scripting (XSS) vulnerability in the component /app/marketplace.html of Logseq v0.10.9 allows attackers to execute arbitrary code via injecting arbitrary Javascript into a crafted README.md file.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-32919 - Privilege Escalation in Windows License plugin for Checkmk Windows Agent",
"Content": "CVE ID : CVE-2025-32919
Published : Oct. 9, 2025, 3:16 p.m. | 56 minutes ago
Description : Use of an insecure temporary directory in the Windows License plugin for the Checkmk Windows Agent allows Privilege Escalation. This issue affects Checkmk: from 2.4.0 before 2.4.0p13, from 2.3.0 before 2.3.0p38, from 2.2.0 before 2.2.0p46, and all versions of 2.1.0 (EOL).
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-39664 - Path-Traversal in report scheduler",
"Content": "CVE ID : CVE-2025-39664
Published : Oct. 9, 2025, 3:16 p.m. | 56 minutes ago
Description : Insufficient escaping in the report scheduler within Checkmk <2.4.0p13,<2.3.0p38,<2.2.0p46
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-45095 - Ad-Aware WebCompanion Unquoted Service Path Vulnerability",
"Content": "CVE ID : CVE-2025-45095
Published : Oct. 9, 2025, 3:16 p.m. | 56 minutes ago
Description : Lavasoft Web Companion (also known as Ad-Aware WebCompanion) versions 8.9.0.1091 through 12.1.3.1037 installs the DCIService.exe service with an unquoted service path vulnerability. An attacker with write access to the file system could potentially execute arbitrary code with elevated privileges by placing a malicious executable in the unquoted path.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-32916 - Sensitive form data in URL query parameters",
"Content": "CVE ID : CVE-2025-32916
Published : Oct. 9, 2025, 3:16 p.m. | 56 minutes ago
Description : Potential use of sensitive information in GET requests in Checkmk GmbH's Checkmk versions <2.4.0p13,<2.3.0p38,<2.2.0p46,
Severity: 1.0 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36171 - IBM Aspera Faspex denial of service",
"Content": "CVE ID : CVE-2025-36171
Published : Oct. 9, 2025, 2:15 p.m. | 1 hour, 56 minutes ago
Description : IBM Aspera Faspex 5.0.0 through 5.0.13.1 could allow a privileged user to cause a denial of service from improperly validated API input due to excessive resource consumption.
Severity: 4.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-11551 - code-projects Student Result Manager Database.java sql injection",
"Content": "CVE ID : CVE-2025-11551
Published : Oct. 9, 2025, 6:02 p.m. | 21 minutes ago
Description : A vulnerability was determined in code-projects Student Result Manager 1.0. This affects an unknown function of the file src/students/Database.java. This manipulation of the argument roll/name/gpa causes sql injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-11550 - Tenda W12 HTTP Request modules wifiScheduledSet null pointer dereference",
"Content": "CVE ID : CVE-2025-11550
Published : Oct. 9, 2025, 6:02 p.m. | 21 minutes ago
Description : A vulnerability was found in Tenda W12 3.0.0.6(3948). The impacted element is the function wifiScheduledSet of the file /goform/modules of the component HTTP Request Handler. The manipulation of the argument wifiScheduledSet results in null pointer dereference. The attack may be performed from remote. The exploit has been made public and could be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-11573 - Denial of Service issue in Amazon.IonDotnet",
"Content": "CVE ID : CVE-2025-11573
Published : Oct. 9, 2025, 5:48 p.m. | 35 minutes ago
Description : An infinite loop issue in Amazon.IonDotnet library versions Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-60009 - Junos Space: CLI Configlet page is vulnerable to reflected cross-site script injection",
"Content": "CVE ID : CVE-2025-60009
Published : Oct. 9, 2025, 5:16 p.m. | 1 hour, 7 minutes ago
Description : An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the

CLI Configlet

page that, when visited by another user, enables the attacker to execute commands with the target's permissions, including an administrator.

This issue affects all versions of Junos Space before 24.1R4.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-60010 - Junos OS and Junos OS Evolved: Device allows login for user with expired password",
"Content": "CVE ID : CVE-2025-60010
Published : Oct. 9, 2025, 5:16 p.m. | 1 hour, 7 minutes ago
Description : A password aging vulnerability in the RADIUS client of Juniper Networks Junos OS and Junos OS Evolved allows an authenticated, network-based attacker to access the device without enforcing the required password change.

Affected devices allow logins by users for whom the RADIUS server has responded with a reject and required the user to change the password as their password was expired. Therefore the policy mandating the password change is not enforced.
This does not allow users to login with a wrong password, but only with the correct but expired one.




This issue affects:

Junos OS: 



* all versions before 22.4R3-S8,
* 23.2 versions before 23.2R2-S4,
* 23.4 versions before 23.4R2-S5,
* 24.2 versions before 24.2R2-S1,
* 24.4 versions before 24.4R1-S3, 24.4R2;




Junos OS Evolved:



* all versions before 22.4R3-S8-EVO,
* 23.2 versions before 23.2R2-S4-EVO,
* 23.4 versions before 23.4R2-S5-EVO,
* 24.2 versions before 24.2R2-S1-EVO,
* 24.4 versions before 24.4R1-S3-EVO, 24.4R2-EVO.
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-60266 - XCKK SQL Injection Vulnerability",
"Content": "CVE ID : CVE-2025-60266
Published : Oct. 9, 2025, 5:16 p.m. | 1 hour, 7 minutes ago
Description : In xckk v9.6, there is a SQL injection vulnerability in which the orderBy parameter in address/list is not securely filtered, resulting in a SQL injection vulnerability.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-60304 - code-projects Simple Scheduling System 1.0 is vuln",
"Content": "CVE ID : CVE-2025-60304
Published : Oct. 9, 2025, 5:16 p.m. | 1 hour, 7 minutes ago
Description : code-projects Simple Scheduling System 1.0 is vulnerable to Cross Site Scripting (XSS) via the Subject Description field.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-60000 - Junos Space: Generate Report page is vulnerable to reflected cross-site script injection",
"Content": "CVE ID : CVE-2025-60000
Published : Oct. 9, 2025, 5:16 p.m. | 1 hour, 7 minutes ago
Description : An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the Generate Report page that, when visited by another user, enables the attacker to execute commands with the target's permissions, including an administrator.
This issue affects all versions of Junos Space before 24.1R4.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-60001 - Junos Space: Create Quick Template page is vulnerable to reflected cross-site script injection",
"Content": "CVE ID : CVE-2025-60001
Published : Oct. 9, 2025, 5:16 p.m. | 1 hour, 7 minutes ago
Description : An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the Generate Report page that, when visited by another user, enables the attacker to execute commands with the target's permissions, including an administrator.
This issue affects all versions of Junos Space before 24.1R4.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-60002 - Junos Space: Template Definitions page is vulnerable to reflected cross-site script injection",
"Content": "CVE ID : CVE-2025-60002
Published : Oct. 9, 2025, 5:16 p.m. | 1 hour, 7 minutes ago
Description : An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the Template Definitions page that, when visited by another user, enables the attacker to execute commands with the target's permissions, including an administrator.
This issue affects all versions of Junos Space before 24.1R4.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-60004 - Junos OS and Junos OS Evolved: Specific BGP EVPN update message causes rpd crash",
"Content": "CVE ID : CVE-2025-60004
Published : Oct. 9, 2025, 5:16 p.m. | 1 hour, 7 minutes ago
Description : An Improper Check for Unusual or Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-Of-Service (DoS).

When an affected system receives a specific BGP EVPN update message over an established BGP session, this causes an rpd crash and restart.

A BGP EVPN configuration is not necessary to be vulnerable. If peers are not configured to send BGP EVPN updates to a vulnerable device, then this issue can't occur.

This issue affects iBGP and eBGP, over IPv4 and IPv6.


This issue affects:
Junos OS:
* 23.4 versions from

23.4R2-S3 before 23.4R2-S5,
* 24.2 versions from

24.2R2

before 24.2R2-S1,
* 24.4 versions before 24.4R1-S3, 24.4R2;



Junos OS Evolved:
* 23.4-EVO versions from 23.4R2-S2-EVO before 23.4R2-S5-EVO,
* 24.2-EVO versions from 24.2R2-EVO before 24.2R2-S1-EVO,
* 24.4-EVO versions before 24.4R1-S3-EVO, 24.4R2-EVO.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-60006 - Junos OS Evolved: OS command injection vulnerabilities fixed",
"Content": "CVE ID : CVE-2025-60006
Published : Oct. 9, 2025, 5:16 p.m. | 1 hour, 7 minutes ago
Description : Multiple instances of an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

vulnerability in the CLI of Juniper Networks Junos OS Evolved could be used to elevate privileges and/or execute unauthorized commands.

When an attacker executes crafted CLI commands, the options are processed via a script in some cases. These scripts are not hardened so injected commands might be executed via the shell, which allows an attacker to perform operations, which they should not be able to do according to their assigned permissions.

This issue affects Junos OS Evolved:



* 24.2 versions before 24.2R2-S2-EVO,
* 24.4 versions before 24.4R2-EVO.




This issue does not affect Junos OS Evolved versions earlier than 24.2R1-EVO.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-59996 - Junos Space: Configuration View page is vulnerable to reflected cross-site script injection",
"Content": "CVE ID : CVE-2025-59996
Published : Oct. 9, 2025, 5:16 p.m. | 1 hour, 7 minutes ago
Description : An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the Configuration View page that, when visited by another user, enables the attacker to execute commands with the target's permissions, including an administrator.
This issue affects all versions of Junos Space before 24.1R4.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-59997 - Junos Space: Fields in the CLI Configlets are vulnerable to reflected cross-site script injection",
"Content": "CVE ID : CVE-2025-59997
Published : Oct. 9, 2025, 5:16 p.m. | 1 hour, 7 minutes ago
Description : An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the CLI Configlets pages that, when visited by another user, enable the attacker to execute commands with the target's permissions, including an administrator.
This issue affects all versions of Junos Space before 24.1R4.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-59998 - Junos Space: Archive Logs screen is vulnerable to reflected cross-site script injection",
"Content": "CVE ID : CVE-2025-59998
Published : Oct. 9, 2025, 5:16 p.m. | 1 hour, 7 minutes ago
Description : An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Juniper Networks Junos Space allows an attacker to inject script tags in the Archive Log screen that, when visited by another user, enables the attacker to execute commands with the target's permissions, including an administrator.
This issue affects all versions of Junos Space before 24.1R4.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "09 Oct 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹