CVE Monitor
3.44K subscribers
33.3K links
Download Telegram
{
"Source": "CVE FEED",
"Title": "CVE-2025-36530 - Mattermost Plugin Path Traversal Vulnerability",
"Content": "CVE ID : CVE-2025-36530
Published : Aug. 21, 2025, 7:15 a.m. | 49 minutes ago
Description : Mattermost versions 10.9.x <=<=<=<=
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-8607 - FunnelKit SlingBlocks Stored Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-8607
Published : Aug. 21, 2025, 6:15 a.m. | 1 hour, 49 minutes ago
Description : The SlingBlocks โ€“ Gutenberg Blocks by FunnelKit (Formerly WooFunnels) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Countdown block's attributes in all versions up to, and including, 1.6.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-7390 - "OPC.HTTPS Client Certificate Trust Bypass"",
"Content": "CVE ID : CVE-2025-7390
Published : Aug. 21, 2025, 6:15 a.m. | 1 hour, 49 minutes ago
Description : A malicious client can bypass the client certificate trust check of an opc.https server when the server endpoint is configured to allow only secure communication.
Severity: 9.1 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-8592 - WordPress Inspiro CSRF Plugin Installation",
"Content": "CVE ID : CVE-2025-8592
Published : Aug. 21, 2025, 6:15 a.m. | 1 hour, 49 minutes ago
Description : The Inspiro theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.2. This is due to missing or incorrect nonce validation on the inspiro_install_plugin() function. This makes it possible for unauthenticated attackers to install plugins from the repository via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Severity: 8.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-7221 - GiveWP โ€“ Donation Plugin and Fundraising Platform Unauthenticated Payment Status Modification Vulnerability",
"Content": "CVE ID : CVE-2025-7221
Published : Aug. 21, 2025, 6:15 a.m. | 1 hour, 49 minutes ago
Description : The GiveWP โ€“ Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the give_update_payment_status() function in all versions up to, and including, 4.5.0. This makes it possible for authenticated attackers, with GiveWP Worker-level access and above, to update donations statuses. This ability is not present in the user interface.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-47870 - Mattermost Team Invite ID Disclosure",
"Content": "CVE ID : CVE-2025-47870
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost versions 10.8.x <=<=<=<=
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-49222 - Mattermost File Type Validation Bypass",
"Content": "CVE ID : CVE-2025-49222
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost versions 10.8.x <=<=<=<=<=
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-49810 - Mattermost Information Disclosure",
"Content": "CVE ID : CVE-2025-49810
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost versions 10.5.x <=
Severity: 3.5 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-53971 - Mattermost Authorization Bypass Vulnerability",
"Content": "CVE ID : CVE-2025-53971
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost versions 10.5.x <=<=
Severity: 3.8 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-8023 - Mattermost Path Traversal Vulnerability",
"Content": "CVE ID : CVE-2025-8023
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost versions 10.8.x <=<=<=<=
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-8895 - WordPress Webhooks Plugin Unauthenticated Arbitrary File Copy Vulnerability",
"Content": "CVE ID : CVE-2025-8895
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : The WP Webhooks plugin for WordPress is vulnerable to arbitrary file copy due to missing validation of user-supplied input in all versions up to, and including, 3.3.5. This makes it possible for unauthenticated attackers to copy arbitrary files on the affected site's server to arbitrary locations. This can be used to copy the contents of wp-config.php into a text file which can then be accessed in a browser to reveal database credentials.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-47700 - Mattermost Server Open Redirect",
"Content": "CVE ID : CVE-2025-47700
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost Server versions 10.5.x <=
Severity: 3.5 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-8064 - WordPress Bible SuperSearch Stored Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-8064
Published : 21 Aug 2025, 10:15 a.m. | 1 hour, 58 minutes ago
Description : The Bible SuperSearch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the โ€˜selector_heightโ€™ parameter in all versions up to, and including, 6.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-9297 - Tenda i22 Remote Stack-Based Buffer Overflow Vulnerability",
"Content": "CVE ID : CVE-2025-9297
Published : Aug. 21, 2025, 1:15 p.m. | 1 hour, 2 minutes ago
Description : A vulnerability was detected in Tenda i22 1.0.0.3(4687). This impacts the function formWeixinAuthInfoGet of the file /goform/wxportalauth. Performing manipulation of the argument Type results in stack-based buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-9298 - Tenda M3 Stack-Based Buffer Overflow Vulnerability",
"Content": "CVE ID : CVE-2025-9298
Published : Aug. 21, 2025, 1:15 p.m. | 1 hour, 2 minutes ago
Description : A flaw has been found in Tenda M3 1.0.0.12. Affected is the function formQuickIndex of the file /goform/QuickIndex. Executing manipulation of the argument PPPOEPassword can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-9299 - Tenda M3 Stack-Based Buffer Overflow Vulnerability",
"Content": "CVE ID : CVE-2025-9299
Published : Aug. 21, 2025, 1:15 p.m. | 1 hour, 2 minutes ago
Description : A vulnerability has been found in Tenda M3 1.0.0.12. Affected by this vulnerability is the function formGetMasterPassengerAnalyseData of the file /goform/getMasterPassengerAnalyseData. The manipulation of the argument Time leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-9300 - Saitoha Libsixel Local Stack-Based Buffer Overflow",
"Content": "CVE ID : CVE-2025-9300
Published : Aug. 21, 2025, 1:15 p.m. | 1 hour, 2 minutes ago
Description : A vulnerability was found in saitoha libsixel up to 1.10.3. Affected by this issue is the function sixel_debug_print_palette of the file src/encoder.c of the component img2sixel. The manipulation results in stack-based buffer overflow. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is identified as 316c086e79d66b62c0c4bc66229ee894e4fdb7d1. Applying a patch is advised to resolve this issue.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-47184 - Exagid EX10 XXE Injection Vulnerability",
"Content": "CVE ID : CVE-2025-47184
Published : Aug. 21, 2025, 1:15 p.m. | 1 hour, 2 minutes ago
Description : An XML external entities (XXE) injection vulnerability in the /init API endpoint in Exagid EX10 7.0.1p02 allows an authenticated, unprivileged attacker to achieve information disclosure and privilege escalation via a crafted ISys XML message.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-9296 - Emlog Pro Unrestricted File Upload Vulnerability",
"Content": "CVE ID : CVE-2025-9296
Published : Aug. 21, 2025, 12:15 p.m. | 2 hours, 2 minutes ago
Description : A security vulnerability has been detected in Emlog Pro up to 2.5.18. This affects an unknown function of the file /admin/blogger.php?action=update_avatar. Such manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 5.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-9303 - TOTOLINK A720R Buffer Overflow in setParentalRules",
"Content": "CVE ID : CVE-2025-9303
Published : Aug. 21, 2025, 3:15 p.m. | 1 hour, 5 minutes ago
Description : A security flaw has been discovered in TOTOLINK A720R 4.1.5cu.630_B20250509. This issue affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. Performing manipulation of the argument desc results in buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น
{
"Source": "CVE FEED",
"Title": "CVE-2025-9304 - SourceCodester Online Bank Management System SQL Injection Vulnerability",
"Content": "CVE ID : CVE-2025-9304
Published : Aug. 21, 2025, 3:15 p.m. | 1 hour, 5 minutes ago
Description : A weakness has been identified in SourceCodester Online Bank Management System 1.0. Impacted is an unknown function of the file /bank/show.php. Executing manipulation of the argument ID can lead to sql injection. The attack may be performed from a remote location. The exploit has been made available to the public and could be exploited.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐Ÿ”น t.me/cvedetector ๐Ÿ”น