CVE Monitor
3.44K subscribers
33.3K links
Download Telegram
{
"Source": "CVE FEED",
"Title": "CVE-2024-53026 - Nokia IMS RTCP Packet Information Disclosure Vulnerability",
"Content": "CVE ID : CVE-2024-53026
Published : June 3, 2025, 6:15 a.m. | 18 minutes ago
Description : Information disclosure when an invalid RTCP packet is received during a VoLTE/VoWiFi IMS call.
Severity: 8.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2024-53019 - Cisco RTP Information Disclosure Vulnerability",
"Content": "CVE ID : CVE-2024-53019
Published : June 3, 2025, 6:15 a.m. | 18 minutes ago
Description : Information disclosure may occur while decoding the RTP packet with improper header length for number of contributing sources.
Severity: 8.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-21463 - Cisco Wireless EHT IE Beacon Frame Processing Denial of Service",
"Content": "CVE ID : CVE-2025-21463
Published : June 3, 2025, 6:15 a.m. | 18 minutes ago
Description : Transient DOS while processing the EHT operation IE in the received beacon frame.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2024-53013 - Google Android Audio Call Registration Buffer Overflow",
"Content": "CVE ID : CVE-2024-53013
Published : June 3, 2025, 6:15 a.m. | 18 minutes ago
Description : Memory corruption may occur while processing voice call registration with user.
Severity: 6.6 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2024-53015 - Apache VFS Filesystem Buffer Overflow",
"Content": "CVE ID : CVE-2024-53015
Published : June 3, 2025, 6:15 a.m. | 18 minutes ago
Description : Memory corruption while processing IOCTL command to handle buffers associated with a session.
Severity: 6.6 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2024-53016 - Canon Camera Off-Path Memory Corruption Vulnerability",
"Content": "CVE ID : CVE-2024-53016
Published : June 3, 2025, 6:15 a.m. | 18 minutes ago
Description : Memory corruption while processing I2C settings in Camera driver.
Severity: 6.6 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-46355 - PC Time Tracer Elevation of Privilege Vulnerability",
"Content": "CVE ID : CVE-2025-46355
Published : June 3, 2025, 8:15 a.m. | 20 minutes ago
Description : Incorrect default permissions issue in PC Time Tracer prior to 5.2. If exploited, arbitrary code may be executed with SYSTEM privilege on Windows system where the product is running by a local authenticated attacker.
Severity: 7.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-41428 - TimeWorks Path Traversal Vulnerability",
"Content": "CVE ID : CVE-2025-41428
Published : June 3, 2025, 8:15 a.m. | 20 minutes ago
Description : Improper limitation of a pathname to a restricted directory ('Path Traversal') issue exists in TimeWorks 10.0 to 10.3. If exploited, arbitrary JSON files on the server may be viewed by a remote unauthenticated attacker.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-21479 - NVIDIA GPU Unauthenticated Command Execution Vulnerability",
"Content": "CVE ID : CVE-2025-21479
Published : June 3, 2025, 7:15 a.m. | 1 hour, 20 minutes ago
Description : Memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-31359 - Parallels Desktop Directory Traversal Vulnerability",
"Content": "CVE ID : CVE-2025-31359
Published : June 3, 2025, 10:15 a.m. | 21 minutes ago
Description : A directory traversal vulnerability exists in the PVMP package unpacking functionality of Parallels Desktop for Mac version 20.2.2 (55879). This vulnerability can be exploited by an attacker to write to arbitrary files, potentially leading to privilege escalation.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2024-54189 - Parallels Desktop for Mac Root Privilege Escalation",
"Content": "CVE ID : CVE-2024-54189
Published : June 3, 2025, 10:15 a.m. | 21 minutes ago
Description : A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is taken, a root service writes to a file owned by a normal user. By using a hard link, an attacker can write to an arbitrary file, potentially leading to privilege escalation.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-4392 - WordPress Shared Files Frontend Stored Cross-Site Scripting",
"Content": "CVE ID : CVE-2025-4392
Published : June 3, 2025, 10:15 a.m. | 21 minutes ago
Description : The Shared Files โ€“ Frontend File Upload Form & Secure File Sharing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via html File uploads in all versions up to, and including, 1.7.48 due to insufficient input sanitization and output escaping within the sanitize_file() function. This makes it possible for unauthenticated attackers to bypass the pluginโ€™s MIME-only checks and inject arbitrary web scripts in pages that will execute whenever a user accesses the html file.
Severity: 7.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2024-52561 - Parallels Desktop for Mac Privilege Escalation Vulnerability",
"Content": "CVE ID : CVE-2024-52561
Published : June 3, 2025, 10:15 a.m. | 21 minutes ago
Description : A privilege escalation vulnerability exists in the Snapshot functionality of Parallels Desktop for Mac version 20.1.1 (build 55740). When a snapshot of a virtual machine is deleted, a root service verifies and modifies the ownership of the snapshot files. By using a symlink, an attacker can change the ownership of files owned by root to a lower-privilege user, potentially leading to privilege escalation.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2024-36486 - Parallels Desktop for Mac Privilege Escalation Vulnerability",
"Content": "CVE ID : CVE-2024-36486
Published : June 3, 2025, 10:15 a.m. | 21 minutes ago
Description : A privilege escalation vulnerability exists in the virtual machine archive restoration functionality of Parallels Desktop for Mac version 20.1.1 (55740). When an archived virtual machine is restored, the prl_vmarchiver tool decompresses the file and writes the content back to its original location using root privileges. An attacker can exploit this process by using a hard link to write to an arbitrary file, potentially resulting in privilege escalation.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-5116 - WordPress WP Plugin Info Card Stored Cross-Site Scripting",
"Content": "CVE ID : CVE-2025-5116
Published : June 3, 2025, 9:15 a.m. | 1 hour, 21 minutes ago
Description : The WP Plugin Info Card plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the โ€˜containeridโ€™ parameter in all versions up to, and including, 5.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This issue is due to an incomplete patch for CVE-2025-31835.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-1725 - WordPress Bit File Manager Stored Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-1725
Published : June 3, 2025, 9:15 a.m. | 1 hour, 21 minutes ago
Description : The Bit File Manager โ€“ 100% Free & Open Source File Manager and Code Editor for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-4420 - Vayu Blocks Stored Cross-Site Scripting (XSS) in WordPress",
"Content": "CVE ID : CVE-2025-4420
Published : June 3, 2025, 9:15 a.m. | 1 hour, 21 minutes ago
Description : The Vayu Blocks โ€“ Gutenberg Blocks for WordPress & WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the โ€˜containerWidthโ€™ parameter in all versions up to, and including, 1.3.1 due to a missing capability check on the vayu_blocks_option_panel_callback() function and insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-5103 - WooCommerce Ultimate Gift Cards SQL Injection Vulnerability",
"Content": "CVE ID : CVE-2025-5103
Published : June 3, 2025, 9:15 a.m. | 1 hour, 21 minutes ago
Description : The Ultimate Gift Cards for WooCommerce plugin for WordPress is vulnerable to boolean-based SQL Injection via the 'default_price' and 'product_id' parameters in all versions up to, and including, 3.1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Severity: 4.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-5340 - Elementor Music Player Stored Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-5340
Published : June 3, 2025, 12:15 p.m. | 23 minutes ago
Description : The Music Player for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the โ€˜album_buy_urlโ€™ parameter in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-4671 - WordPress Profile Builder Stored Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-4671
Published : June 3, 2025, 12:15 p.m. | 23 minutes ago
Description : The Profile Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's user_meta and compare shortcodes in all versions up to, and including, 3.13.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-4205 - WordPress Popup Maker Stored Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-4205
Published : June 3, 2025, 12:15 p.m. | 23 minutes ago
Description : The Popup Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the โ€˜popupID' parameter in all versions up to, and including, 1.20.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "03 Jun 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น