CVE Monitor
3.44K subscribers
33.2K links
Download Telegram
{
"Source": "CVE FEED",
"Title": "CVE-2012-10059 - Dolibarr ERP/CRM OS Command Injection Vulnerability",
"Content": "CVE ID : CVE-2012-10059
Published : Aug. 13, 2025, 9:15 p.m. | 1 hour, 56 minutes ago
Description : Dolibarr ERP/CRM versions <=<=
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2012-10060 - Sysax Multi Server SSH Stack Buffer Overflow",
"Content": "CVE ID : CVE-2012-10060
Published : Aug. 13, 2025, 9:15 p.m. | 1 hour, 56 minutes ago
Description : Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without proper bounds checking. This allows remote code execution under the context of the service.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2011-10018 - MyBB Unauthorized Remote Code Execution Backdoor",
"Content": "CVE ID : CVE-2011-10018
Published : Aug. 13, 2025, 9:15 p.m. | 1 hour, 56 minutes ago
Description : myBB version 1.6.4 was distributed with an unauthorized backdoor embedded in the source code. The backdoor allowed remote attackers to execute arbitrary PHP code by injecting payloads into a specially crafted collapsed cookie. This vulnerability was introduced during packaging and was not part of the intended application logic. Exploitation requires no authentication and results in full compromise of the web server under the context of the web application.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2011-10019 - Spreecommerce Remote Command Execution Vulnerability",
"Content": "CVE ID : CVE-2011-10019
Published : Aug. 13, 2025, 9:15 p.m. | 1 hour, 56 minutes ago
Description : Spreecommerce versions prior to 0.60.2 contains a remote command execution vulnerability in its search functionality. The application fails to properly sanitize input passed via the search[send][] parameter, which is dynamically invoked using Rubyโ€™s send method. This allows attackers to execute arbitrary shell commands on the server without authentication.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2012-10054 - Umbraco CMS Remote Code Execution Vulnerability",
"Content": "CVE ID : CVE-2012-10054
Published : Aug. 13, 2025, 9:15 p.m. | 1 hour, 56 minutes ago
Description : Umbraco CMS versions prior to 4.7.1 are vulnerable to unauthenticated remote code execution via the codeEditorSave.asmx SOAP endpoint, which exposes a SaveDLRScript operation that permits arbitrary file uploads without authentication. By exploiting a path traversal flaw in the fileName parameter, attackers can write malicious ASPX scripts directly into the web-accessible /umbraco/ directory and execute them remotely.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2012-10055 - F-Secure ComSndFTP Format String Vulnerability",
"Content": "CVE ID : CVE-2012-10055
Published : Aug. 13, 2025, 9:15 p.m. | 1 hour, 56 minutes ago
Description : ComSndFTP FTP Server version 1.3.7 Beta contains a format string vulnerability in its handling of the USER command. By sending a specially crafted username containing format specifiers, a remote attacker can overwrite a hardcoded function pointer in memory (specifically WSACleanup from Ws2_32.dll). This allows the attacker to redirect execution flow and bypass DEP protections using a ROP chain, ultimately leading to arbitrary code execution. The vulnerability is exploitable without authentication and affects default configurations.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2012-10056 - Apache Volunteer Management System Remote File Upload Vulnerability",
"Content": "CVE ID : CVE-2012-10056
Published : Aug. 13, 2025, 9:15 p.m. | 1 hour, 56 minutes ago
Description : PHP Volunteer Management System v1.0.2 contains an arbitrary file upload vulnerability in its document upload functionality. Authenticated users can upload files to the mods/documents/uploads/ directory without any restriction on file type or extension. Because this directory is publicly accessible and lacks execution controls, attackers can upload a malicious PHP payload and execute it remotely. The application ships with default credentials, making exploitation trivial. Once authenticated, the attacker can upload a PHP shell and trigger it via a direct GET request.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2011-10016 - RealNetworks Netzip Classic Stack-Based Buffer Overflow Vulnerability",
"Content": "CVE ID : CVE-2011-10016
Published : Aug. 13, 2025, 9:15 p.m. | 1 hour, 56 minutes ago
Description : Real Networks Netzip Classic version 7.5.1.86 is vulnerable to a stack-based buffer overflow when parsing a specially crafted ZIP archive. The vulnerability is triggered when the application attempts to process a file name within the archive that exceeds the expected buffer size. Exploitation allows arbitrary code execution under the context of the victim user when the ZIP file is opened.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2011-10017 - Snort Nmap PHP Remote Command Execution Vulnerability",
"Content": "CVE ID : CVE-2011-10017
Published : Aug. 13, 2025, 9:15 p.m. | 1 hour, 56 minutes ago
Description : Snort Report versions < 1.3.2 contains a remote command execution vulnerability in the nmap.php and nbtscan.php scripts. These scripts fail to properly sanitize user input passed via the target GET parameter, allowing attackers to inject arbitrary shell commands. Exploitation requires no authentication and can result in full compromise of the underlying system.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2011-10010 - QuickShare File Server FTP Path Traversal Vulnerability",
"Content": "CVE ID : CVE-2011-10010
Published : Aug. 13, 2025, 9:15 p.m. | 1 hour, 56 minutes ago
Description : QuickShare File Server 1.2.1 contains a path traversal vulnerability in its FTP service due to improper sanitation of user-supplied file paths. Authenticated users can exploit this flaw by submitting crafted sequences to access or write files outside the intended virtual directory. When the "Writable" option is enabled (default during account creation), this allows attackers to upload arbitrary files to privileged locations such as system32, enabling remote code execution via MOF injection or executable placement.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2011-10011 - WeBid Remote Code Injection Vulnerability",
"Content": "CVE ID : CVE-2011-10011
Published : Aug. 13, 2025, 9:15 p.m. | 1 hour, 56 minutes ago
Description : WeBid 1.0.2 contains a remote code injection vulnerability in the converter.php script, where unsanitized input in the to parameter of a POST request is written directly into includes/currencies.php. This allows unauthenticated attackers to inject arbitrary PHP code, resulting in persistent remote code execution when the modified script is accessed or included by the application.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2011-10012 - Impero Software NetOp Stack-Based Buffer Overflow Vulnerability",
"Content": "CVE ID : CVE-2011-10012
Published : Aug. 13, 2025, 9:15 p.m. | 1 hour, 56 minutes ago
Description : NetOp (now part of Impero Software) Remote Control Client v9.5 is vulnerable to a stack-based buffer overflow when processing .dws configuration files. If a .dws file contains a string longer than 520 bytes, the application fails to perform proper bounds checking, allowing an attacker to execute arbitrary code when the file is opened.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2011-10013 - Traq Remote Code Execution Vulnerability",
"Content": "CVE ID : CVE-2011-10013
Published : Aug. 13, 2025, 9:15 p.m. | 1 hour, 56 minutes ago
Description : Traq versions 2.0 through 2.3 contain a remote code execution vulnerability in the admincp/common.php script. The flawed authorization logic fails to halt execution after a failed access check, allowing unauthenticated users to reach admin-only functionality. This can be exploited via plugins.php to inject and execute arbitrary PHP code.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2011-10014 - GTA San Andreas Multiplayer (SA-MP) Stack-Based Buffer Overflow Vulnerability",
"Content": "CVE ID : CVE-2011-10014
Published : Aug. 13, 2025, 9:15 p.m. | 1 hour, 56 minutes ago
Description : GTA San Andreas Multiplayer (SA-MP) server version 0.3.1.1 is vulnerable to a stack-based buffer overflow triggered by parsing a malformed server.cfg configuration file. The vulnerability allows local attackers to execute arbitrary code when the server binary (samp-server.exe) processes a crafted echo directive containing excessive input. The original 'sa-mp.com' site is defunct, but the community maintains mirrors and forks that may be vulnerable.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2011-10015 - Cytel Studio Buffer Overflow Vulnerability",
"Content": "CVE ID : CVE-2011-10015
Published : Aug. 13, 2025, 9:15 p.m. | 1 hour, 56 minutes ago
Description : Cytel Studio version 9.0 and earlier is vulnerable to a stack-based buffer overflow triggered by parsing a malformed .CY3 file. The vulnerability occurs when the application copies user-controlled strings into a fixed-size stack buffer (256 bytes) without proper bounds checking. Exploitation allows arbitrary code execution when the crafted file is opened.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-55199 - Helm Denial of Service (DoS) Vulnerability",
"Content": "CVE ID : CVE-2025-55199
Published : Aug. 14, 2025, 12:15 a.m. | 58 minutes ago
Description : Helm is a package manager for Charts for Kubernetes. Prior to version 3.18.5, it is possible to craft a JSON Schema file in a manner which could cause Helm to use all available memory and have an out of memory (OOM) termination. This issue has been resolved in Helm 3.18.5. A workaround involves ensuring all Helm charts that are being loaded into Helm do not have any reference of $ref pointing to /dev/zero.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-55198 - Helm Chart YAML Parsing Type Error Denial of Service",
"Content": "CVE ID : CVE-2025-55198
Published : Aug. 14, 2025, 12:15 a.m. | 58 minutes ago
Description : Helm is a package manager for Charts for Kubernetes. Prior to version 3.18.5, when parsing Chart.yaml and index.yaml files, an improper validation of type error can lead to a panic. This issue has been resolved in Helm 3.18.5. A workaround involves ensuring YAML files are formatted as Helm expects prior to processing them with Helm.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-55194 - Part-DB Persistent File Extension Denial of Service",
"Content": "CVE ID : CVE-2025-55194
Published : Aug. 13, 2025, 11:15 p.m. | 1 hour, 58 minutes ago
Description : Part-DB is an open source inventory management system for electronic components. Prior to version 1.17.3, any authenticated user can upload a profile picture with a misleading file extension (e.g., .jpg.txt), resulting in a persistent 500 Internal Server Error when attempting to view or edit that userโ€™s profile. This makes the profile permanently inaccessible via the UI for both users and administrators, constituting a Denial of Service (DoS) within the user management interface. This issue has been patched in version 1.17.3.
Severity: 5.7 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-55196 - Kubernetes External Secrets Operator Namespace Bypass Vulnerability",
"Content": "CVE ID : CVE-2025-55196
Published : Aug. 13, 2025, 11:15 p.m. | 1 hour, 58 minutes ago
Description : External Secrets Operator is a Kubernetes operator that integrates external secret management systems. From version 0.15.0 to before 0.19.2, a vulnerability was discovered where the List() calls for Kubernetes Secret and SecretStore resources performed by the PushSecret controller did not apply a namespace selector. This flaw allowed an attacker to use label selectors to list and read secrets/secret-stores across the cluster, bypassing intended namespace restrictions. An attacker with the ability to create or update PushSecret resources and control SecretStore configurations could exploit this vulnerability to exfiltrate sensitive data from arbitrary namespaces. This could lead to full disclosure of Kubernetes secrets, including credentials, tokens, and other sensitive information stored in the cluster. This vulnerability has been patched in version 0.19.2. A workaround for this issue includes auditing and restricting RBAC permissions so that only trusted service accounts can create or update PushSecret and SecretStore resources.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-55197 - PyPDF FlateDecode Filter Exhaustion Denial of Service",
"Content": "CVE ID : CVE-2025-55197
Published : Aug. 13, 2025, 11:15 p.m. | 1 hour, 58 minutes ago
Description : pypdf is a free and open-source pure-python PDF library. Prior to version 6.0.0, an attacker can craft a PDF which leads to the RAM being exhausted. This requires just reading the file if a series of FlateDecode filters is used on a malicious cross-reference stream. Other content streams are affected on explicit access. This issue has been fixed in 6.0.0. If an update is not possible, a workaround involves including the fixed code from pypdf.filters.decompress into the existing filters file.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-55193 - Ruby on Rails ANSI Sequence Injection Vulnerability",
"Content": "CVE ID : CVE-2025-55193
Published : Aug. 13, 2025, 11:15 p.m. | 1 hour, 58 minutes ago
Description : Active Record connects classes to relational database tables. Prior to versions 7.1.5.2, 7.2.2.2, and 8.0.2.1, the ID passed to find or similar methods may be logged without escaping. If this is directly to the terminal it may include unescaped ANSI sequences. This issue has been patched in versions 7.1.5.2, 7.2.2.2, and 8.0.2.1.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "14 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น