{
"Source": "CVE FEED",
"Title": "CVE-2025-40911 - Apache Net::CIDR::Set IP CIDR Leading Zero Vulnerability",
"Content": "CVE ID : CVE-2025-40911
Published : May 27, 2025, 10:15 p.m. | 1 hour, 37 minutes ago
Description : Net::CIDR::Set versions 0.10 through 0.13 for Perl does not properly handle leading zero characters in IP CIDR address strings, which could allow attackers to bypass access control that is based on IP addresses.
Leading zeros are used to indicate octal numbers, which can confuse users who are intentionally using octal notation, as well as users who believe they are using decimal notation.
Net::CIDR::Set used code from Net::CIDR::Lite, which had a similar vulnerability CVE-2021-47154.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-40911 - Apache Net::CIDR::Set IP CIDR Leading Zero Vulnerability",
"Content": "CVE ID : CVE-2025-40911
Published : May 27, 2025, 10:15 p.m. | 1 hour, 37 minutes ago
Description : Net::CIDR::Set versions 0.10 through 0.13 for Perl does not properly handle leading zero characters in IP CIDR address strings, which could allow attackers to bypass access control that is based on IP addresses.
Leading zeros are used to indicate octal numbers, which can confuse users who are intentionally using octal notation, as well as users who believe they are using decimal notation.
Net::CIDR::Set used code from Net::CIDR::Lite, which had a similar vulnerability CVE-2021-47154.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-32440 - NetAlertX Authentication Bypass Vulnerability",
"Content": "CVE ID : CVE-2025-32440
Published : May 27, 2025, 10:15 p.m. | 1 hour, 37 minutes ago
Description : NetAlertX is a network, presence scanner and alert framework. Prior to version 25.4.14, it is possible to bypass the authentication mechanism of NetAlertX to update settings without authentication. An attacker can trigger sensitive functions within util.php by sending crafted requests to /index.php. This issue has been patched in version 25.4.14.
Severity: 10.0 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-32440 - NetAlertX Authentication Bypass Vulnerability",
"Content": "CVE ID : CVE-2025-32440
Published : May 27, 2025, 10:15 p.m. | 1 hour, 37 minutes ago
Description : NetAlertX is a network, presence scanner and alert framework. Prior to version 25.4.14, it is possible to bypass the authentication mechanism of NetAlertX to update settings without authentication. An attacker can trigger sensitive functions within util.php by sending crafted requests to /index.php. This issue has been patched in version 25.4.14.
Severity: 10.0 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-25025 - IBM Security Guardium Information Disclosure Vulnerability",
"Content": "CVE ID : CVE-2025-25025
Published : May 28, 2025, 2:15 a.m. | 1 hour, 40 minutes ago
Description : IBM Security Guardium 12.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-25025 - IBM Security Guardium Information Disclosure Vulnerability",
"Content": "CVE ID : CVE-2025-25025
Published : May 28, 2025, 2:15 a.m. | 1 hour, 40 minutes ago
Description : IBM Security Guardium 12.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-25026 - IBM Security Guardium Authentication Bypass Vulnerability",
"Content": "CVE ID : CVE-2025-25026
Published : May 28, 2025, 2:15 a.m. | 1 hour, 40 minutes ago
Description : IBM Security Guardium 12.0 could allow an authenticated user to obtain sensitive information due to an incorrect authentication check.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-25026 - IBM Security Guardium Authentication Bypass Vulnerability",
"Content": "CVE ID : CVE-2025-25026
Published : May 28, 2025, 2:15 a.m. | 1 hour, 40 minutes ago
Description : IBM Security Guardium 12.0 could allow an authenticated user to obtain sensitive information due to an incorrect authentication check.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-25029 - IBM Security Guardium File Download Privilege Escalation",
"Content": "CVE ID : CVE-2025-25029
Published : May 28, 2025, 2:15 a.m. | 1 hour, 40 minutes ago
Description : IBM Security Guardium 12.0 could allow a privileged user to download any file on the system due to improper escaping of input.
Severity: 4.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-25029 - IBM Security Guardium File Download Privilege Escalation",
"Content": "CVE ID : CVE-2025-25029
Published : May 28, 2025, 2:15 a.m. | 1 hour, 40 minutes ago
Description : IBM Security Guardium 12.0 could allow a privileged user to download any file on the system due to improper escaping of input.
Severity: 4.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-48846 - VMware Remote Code Execution",
"Content": "CVE ID : CVE-2025-48846
Published : May 28, 2025, 4:15 a.m. | 1 hour, 41 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-48846 - VMware Remote Code Execution",
"Content": "CVE ID : CVE-2025-48846
Published : May 28, 2025, 4:15 a.m. | 1 hour, 41 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-48847 - Dropbox Unvalidated Redirect",
"Content": "CVE ID : CVE-2025-48847
Published : May 28, 2025, 4:15 a.m. | 1 hour, 41 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-48847 - Dropbox Unvalidated Redirect",
"Content": "CVE ID : CVE-2025-48847
Published : May 28, 2025, 4:15 a.m. | 1 hour, 41 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-48848 - Citrix NetScaler HTTP Request Smuggling",
"Content": "CVE ID : CVE-2025-48848
Published : May 28, 2025, 4:15 a.m. | 1 hour, 41 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-48848 - Citrix NetScaler HTTP Request Smuggling",
"Content": "CVE ID : CVE-2025-48848
Published : May 28, 2025, 4:15 a.m. | 1 hour, 41 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-48843 - Apache Struts Deserialization Vulnerability",
"Content": "CVE ID : CVE-2025-48843
Published : May 28, 2025, 4:15 a.m. | 1 hour, 41 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-48843 - Apache Struts Deserialization Vulnerability",
"Content": "CVE ID : CVE-2025-48843
Published : May 28, 2025, 4:15 a.m. | 1 hour, 41 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-48844 - QNAP NAS Denial of Service",
"Content": "CVE ID : CVE-2025-48844
Published : May 28, 2025, 4:15 a.m. | 1 hour, 41 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-48844 - QNAP NAS Denial of Service",
"Content": "CVE ID : CVE-2025-48844
Published : May 28, 2025, 4:15 a.m. | 1 hour, 41 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-48845 - Apache HTTP Server Authentication Bypass",
"Content": "CVE ID : CVE-2025-48845
Published : May 28, 2025, 4:15 a.m. | 1 hour, 41 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-48845 - Apache HTTP Server Authentication Bypass",
"Content": "CVE ID : CVE-2025-48845
Published : May 28, 2025, 4:15 a.m. | 1 hour, 41 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-48842 - Apache HTTP Server Cross-Site Request Forgery",
"Content": "CVE ID : CVE-2025-48842
Published : May 28, 2025, 4:15 a.m. | 1 hour, 41 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-48842 - Apache HTTP Server Cross-Site Request Forgery",
"Content": "CVE ID : CVE-2025-48842
Published : May 28, 2025, 4:15 a.m. | 1 hour, 41 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-48841 - Apache HTTP Server Authentication Bypass",
"Content": "CVE ID : CVE-2025-48841
Published : May 28, 2025, 4:15 a.m. | 1 hour, 41 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-48841 - Apache HTTP Server Authentication Bypass",
"Content": "CVE ID : CVE-2025-48841
Published : May 28, 2025, 4:15 a.m. | 1 hour, 41 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2023-41839 - Apache Struts Unvalidated Redirect to Malicious Site",
"Content": "CVE ID : CVE-2023-41839
Published : May 28, 2025, 4:15 a.m. | 1 hour, 41 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2023-41839 - Apache Struts Unvalidated Redirect to Malicious Site",
"Content": "CVE ID : CVE-2023-41839
Published : May 28, 2025, 4:15 a.m. | 1 hour, 41 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-4009 - Evertz SVDN 3080ipx-10G PHP Web Management Interface Command Injection and Authentication Bypass",
"Content": "CVE ID : CVE-2025-4009
Published : May 28, 2025, 7:15 a.m. | 44 minutes ago
Description : The Evertz SVDN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Video Application. This device exposes a web management interface on port 80. This web management interface can be used by administrators to control product
features, setup network switching, and register license among other features. The application has been developed in PHP with the webEASY SDK, also named โewbโ by Evertz.
This web interface has two endpoints that are vulnerable to arbitrary command injection and the authentication mechanism has a flaw leading to authentication bypass.
Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.
This level of access could lead to serious business impact such as the interruption of media streaming, modification of media being streamed, alteration of closed captions being generated, among others.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-4009 - Evertz SVDN 3080ipx-10G PHP Web Management Interface Command Injection and Authentication Bypass",
"Content": "CVE ID : CVE-2025-4009
Published : May 28, 2025, 7:15 a.m. | 44 minutes ago
Description : The Evertz SVDN 3080ipx-10G is a High Bandwidth Ethernet Switching Fabric for Video Application. This device exposes a web management interface on port 80. This web management interface can be used by administrators to control product
features, setup network switching, and register license among other features. The application has been developed in PHP with the webEASY SDK, also named โewbโ by Evertz.
This web interface has two endpoints that are vulnerable to arbitrary command injection and the authentication mechanism has a flaw leading to authentication bypass.
Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.
This level of access could lead to serious business impact such as the interruption of media streaming, modification of media being streamed, alteration of closed captions being generated, among others.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-4947 - libcurl QUIC Certificate Verification Bypass",
"Content": "CVE ID : CVE-2025-4947
Published : May 28, 2025, 7:15 a.m. | 44 minutes ago
Description : libcurl accidentally skips the certificate verification for QUIC connections when connecting to a host specified as an IP address in the URL. Therefore, it does not detect impostors or man-in-the-middle attacks.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-4947 - libcurl QUIC Certificate Verification Bypass",
"Content": "CVE ID : CVE-2025-4947
Published : May 28, 2025, 7:15 a.m. | 44 minutes ago
Description : libcurl accidentally skips the certificate verification for QUIC connections when connecting to a host specified as an IP address in the URL. Therefore, it does not detect impostors or man-in-the-middle attacks.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-5025 - libcurl wolfSSL QUIC Certificate Pinning Bypass",
"Content": "CVE ID : CVE-2025-5025
Published : May 28, 2025, 7:15 a.m. | 44 minutes ago
Description : libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-5025 - libcurl wolfSSL QUIC Certificate Pinning Bypass",
"Content": "CVE ID : CVE-2025-5025
Published : May 28, 2025, 7:15 a.m. | 44 minutes ago
Description : libcurl supports *pinning* of the server certificate public key for HTTPS transfers. Due to an omission, this check is not performed when connecting with QUIC for HTTP/3, when the TLS backend is wolfSSL. Documentation says the option works with wolfSSL, failing to specify that it does not for QUIC and HTTP/3. Since pinning makes the transfer succeed if the pin is fine, users could unwittingly connect to an impostor server without noticing.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-4800 - WordPress MasterStudy LMS Pro Arbitrary File Upload Vulnerability",
"Content": "CVE ID : CVE-2025-4800
Published : May 28, 2025, 6:15 a.m. | 1 hour, 44 minutes ago
Description : The MasterStudy LMS Pro plugin for WordPress is vulnerable to arbitrary file uploads due to a missing file type validation in the stm_lms_add_assignment_attachment function in all versions up to, and including, 4.7.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server, which may make remote code execution possible.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-4800 - WordPress MasterStudy LMS Pro Arbitrary File Upload Vulnerability",
"Content": "CVE ID : CVE-2025-4800
Published : May 28, 2025, 6:15 a.m. | 1 hour, 44 minutes ago
Description : The MasterStudy LMS Pro plugin for WordPress is vulnerable to arbitrary file uploads due to a missing file type validation in the stm_lms_add_assignment_attachment function in all versions up to, and including, 4.7.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server, which may make remote code execution possible.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-5287 - WordPress Likes and Dislikes Plugin SQL Injection",
"Content": "CVE ID : CVE-2025-5287
Published : May 28, 2025, 9:15 a.m. | 44 minutes ago
Description : The Likes and Dislikes Plugin plugin for WordPress is vulnerable to SQL Injection via the 'post' parameter in all versions up to, and including, 1.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-5287 - WordPress Likes and Dislikes Plugin SQL Injection",
"Content": "CVE ID : CVE-2025-5287
Published : May 28, 2025, 9:15 a.m. | 44 minutes ago
Description : The Likes and Dislikes Plugin plugin for WordPress is vulnerable to SQL Injection via the 'post' parameter in all versions up to, and including, 1.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-5082 - "WordPress WP Attachments Reflected Cross-Site Scripting Vulnerability"",
"Content": "CVE ID : CVE-2025-5082
Published : May 28, 2025, 8:15 a.m. | 1 hour, 44 minutes ago
Description : The WP Attachments plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the โattachment_idโ parameter in all versions up to, and including, 5.0.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-5082 - "WordPress WP Attachments Reflected Cross-Site Scripting Vulnerability"",
"Content": "CVE ID : CVE-2025-5082
Published : May 28, 2025, 8:15 a.m. | 1 hour, 44 minutes ago
Description : The WP Attachments plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the โattachment_idโ parameter in all versions up to, and including, 5.0.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-46777 - Fortinet FortiPortal Information Disclosure Vulnerability",
"Content": "CVE ID : CVE-2025-46777
Published : May 28, 2025, 8:15 a.m. | 1 hour, 44 minutes ago
Description : A insertion of sensitive information into log file in Fortinet FortiPortal versions 7.4.0, versions 7.2.0 through 7.2.5, and versions 7.0.0 through 7.0.9 may allow an authenticated attacker with at least read-only admin permissions to view encrypted secrets via the FortiPortal System Log.
Severity: 2.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-46777 - Fortinet FortiPortal Information Disclosure Vulnerability",
"Content": "CVE ID : CVE-2025-46777
Published : May 28, 2025, 8:15 a.m. | 1 hour, 44 minutes ago
Description : A insertion of sensitive information into log file in Fortinet FortiPortal versions 7.4.0, versions 7.2.0 through 7.2.5, and versions 7.0.0 through 7.0.9 may allow an authenticated attacker with at least read-only admin permissions to view encrypted secrets via the FortiPortal System Log.
Severity: 2.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "28 May 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น