CVE Monitor
3.44K subscribers
33.3K links
Download Telegram
{
"Source": "CVE FEED",
"Title": "CVE-2025-5231 - PHPGurukul Company Visitor Management System SQL Injection Vulnerability",
"Content": "CVE ID : CVE-2025-5231
Published : May 27, 2025, 5:15 a.m. | 21 minutes ago
Description : A vulnerability classified as critical was found in PHPGurukul Company Visitor Management System 1.0. This vulnerability affects unknown code of the file /forgot-password.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity: 7.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-5232 - PHPGurukul Student Study Center Management System SQL Injection Vulnerability",
"Content": "CVE ID : CVE-2025-5232
Published : May 27, 2025, 5:15 a.m. | 21 minutes ago
Description : A vulnerability, which was classified as critical, has been found in PHPGurukul Student Study Center Management System 1.0. This issue affects some unknown processing of the file /admin/report.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity: 4.7 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-48054 - Radashi Prototype Pollution Vulnerability",
"Content": "CVE ID : CVE-2025-48054
Published : May 27, 2025, 5:15 a.m. | 21 minutes ago
Description : Radashi is a TypeScript utility toolkit. Prior to version 12.5.1, the set function within the Radashi library is vulnerable to prototype pollution. If an attacker can control parts of the path argument to the set function, they could potentially modify the prototype of all objects in the JavaScript runtime, leading to unexpected behavior, denial of service, or even remote code execution in some specific scenarios. This issue has been patched in version 12.5.1. A workaround for this issue involves sanitizing the path argument provided to the set function to ensure that no part of the path string is __proto__, prototype, or constructor.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-5230 - PHPGurukul Online Nurse Hiring System SQL Injection Vulnerability",
"Content": "CVE ID : CVE-2025-5230
Published : May 27, 2025, 4:15 a.m. | 1 hour, 21 minutes ago
Description : A vulnerability classified as critical has been found in PHPGurukul Online Nurse Hiring System 1.0. This affects an unknown part of the file /admin/bwdates-report-details.php. The manipulation of the argument fromdate/todate leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Severity: 7.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-5229 - Campcodes Online Hospital Management System SQL Injection Vulnerability",
"Content": "CVE ID : CVE-2025-5229
Published : May 27, 2025, 4:15 a.m. | 1 hour, 21 minutes ago
Description : A vulnerability was found in Campcodes Online Hospital Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/view-patient.php. The manipulation of the argument viewid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Severity: 7.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-5228 - D-Link DI-8100 HTTPd Get Parm Stack-Based Buffer Overflow",
"Content": "CVE ID : CVE-2025-5228
Published : May 27, 2025, 4:15 a.m. | 1 hour, 21 minutes ago
Description : A vulnerability was found in D-Link DI-8100 up to 20250523. It has been classified as critical. Affected is the function httpd_get_parm of the file /login.cgi of the component jhttpd. The manipulation of the argument notify leads to stack-based buffer overflow. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-5227 - PHPGurukul Small CRM SQL Injection Vulnerability",
"Content": "CVE ID : CVE-2025-5227
Published : May 27, 2025, 4:15 a.m. | 1 hour, 21 minutes ago
Description : A vulnerability was found in PHPGurukul Small CRM 3.0 and classified as critical. This issue affects some unknown processing of the file /admin/manage-tickets.php. The manipulation of the argument aremark leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
Severity: 7.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-48828 - vBulletin PHP Code Execution Vulnerability",
"Content": "CVE ID : CVE-2025-48828
Published : May 27, 2025, 4:15 a.m. | 1 hour, 21 minutes ago
Description : Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the "var_dump"("test") syntax, attackers can bypass security checks and execute arbitrary PHP code.
Severity: 9.0 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-48793 - Fortinet SSL/TLS Implementation Vulnerability",
"Content": "CVE ID : CVE-2025-48793
Published : May 27, 2025, 4:15 a.m. | 1 hour, 21 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-48794 - Adobe Flash Remote Code Execution",
"Content": "CVE ID : CVE-2025-48794
Published : May 27, 2025, 4:15 a.m. | 1 hour, 21 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-48827 - vBulletin Unauthenticated API Controller Method Invocation Vulnerability",
"Content": "CVE ID : CVE-2025-48827
Published : May 27, 2025, 4:15 a.m. | 1 hour, 21 minutes ago
Description : vBulletin 5.0.0 through 5.7.5 and 6.0.0 through 6.0.3 allows unauthenticated users to invoke protected API controllers' methods when running on PHP 8.1 or later, as demonstrated by the /api.php?method=protectedMethod pattern.
Severity: 10.0 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-48792 - Oracle WebLogic Server Unvalidated Redirect",
"Content": "CVE ID : CVE-2025-48792
Published : May 27, 2025, 4:15 a.m. | 1 hour, 21 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-48791 - Apache Struts Deserialization Vulnerability",
"Content": "CVE ID : CVE-2025-48791
Published : May 27, 2025, 4:15 a.m. | 1 hour, 21 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-48790 - Apache Struts SQL Injection",
"Content": "CVE ID : CVE-2025-48790
Published : May 27, 2025, 4:15 a.m. | 1 hour, 21 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-48786 - Apache HTTP Server Cross-Site Request Forgery",
"Content": "CVE ID : CVE-2025-48786
Published : May 27, 2025, 4:15 a.m. | 1 hour, 21 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-48787 - Cisco Router Unvalidated User Input",
"Content": "CVE ID : CVE-2025-48787
Published : May 27, 2025, 4:15 a.m. | 1 hour, 21 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-48788 - Apache HTTP Server Credentials Disclosure",
"Content": "CVE ID : CVE-2025-48788
Published : May 27, 2025, 4:15 a.m. | 1 hour, 21 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-48789 - Apache Struts Command Injection",
"Content": "CVE ID : CVE-2025-48789
Published : May 27, 2025, 4:15 a.m. | 1 hour, 21 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-48742 - SIGB PMB Remote Code Execution Vulnerability",
"Content": "CVE ID : CVE-2025-48742
Published : May 27, 2025, 4:15 a.m. | 1 hour, 21 minutes ago
Description : The installer in SIGB PMB before 8.0.1.2 allows remote code execution.
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2024-47090 - Nagvis Unvalidated JavaScript Input Vulnerability",
"Content": "CVE ID : CVE-2024-47090
Published : May 27, 2025, 7:15 a.m. | 21 minutes ago
Description : Improper neutralization of input in Nagvis before version 1.9.47 which can lead to XSS
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2024-38866 - Nagvis Livestatus Injection Vulnerability",
"Content": "CVE ID : CVE-2024-38866
Published : May 27, 2025, 7:15 a.m. | 21 minutes ago
Description : Improper neutralization of input in Nagvis before version 1.9.47 which can lead to livestatus injection
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "27 May 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹