{
"Source": "CVE FEED",
"Title": "CVE-2025-58358 - Markdownify Command Injection Vulnerability",
"Content": "CVE ID : CVE-2025-58358
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : Markdownify is a Model Context Protocol server for converting almost anything to Markdown. Versions below 0.0.2 contain a command injection vulnerability, caused by the unsanitized use of input parameters within a call to child_process.exec, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process's privileges. The server constructs and executes shell commands using unvalidated user input directly within command-line strings. This introduces the possibility of shell metacharacter injection (|, >, &&, etc.). This issue is fixed in version 0.0.2.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-58358 - Markdownify Command Injection Vulnerability",
"Content": "CVE ID : CVE-2025-58358
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : Markdownify is a Model Context Protocol server for converting almost anything to Markdown. Versions below 0.0.2 contain a command injection vulnerability, caused by the unsanitized use of input parameters within a call to child_process.exec, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process's privileges. The server constructs and executes shell commands using unvalidated user input directly within command-line strings. This introduces the possibility of shell metacharacter injection (|, >, &&, etc.). This issue is fixed in version 0.0.2.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-9929 - "Code-Projects Responsive Blog Site Cross Site Scripting Vulnerability"",
"Content": "CVE ID : CVE-2025-9929
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A weakness has been identified in code-projects Responsive Blog Site 1.0. This affects an unknown function of the file blogs_view.php. Executing manipulation of the argument product_code/gen_name/product_name/supplier can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-9929 - "Code-Projects Responsive Blog Site Cross Site Scripting Vulnerability"",
"Content": "CVE ID : CVE-2025-9929
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A weakness has been identified in code-projects Responsive Blog Site 1.0. This affects an unknown function of the file blogs_view.php. Executing manipulation of the argument product_code/gen_name/product_name/supplier can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-58357 - 5ire Cross-Platform Desktop AI Assistant Content Injection Vulnerability",
"Content": "CVE ID : CVE-2025-58357
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : 5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Version 0.13.2 contains a vulnerability in the chat page's script gadgets that enables content injection attacks through multiple vectors: malicious prompt injection pages, compromised MCP servers, and exploited tool integrations. This is fixed in version 0.14.0.
Severity: 9.6 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-58357 - 5ire Cross-Platform Desktop AI Assistant Content Injection Vulnerability",
"Content": "CVE ID : CVE-2025-58357
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : 5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Version 0.13.2 contains a vulnerability in the chat page's script gadgets that enables content injection attacks through multiple vectors: malicious prompt injection pages, compromised MCP servers, and exploited tool integrations. This is fixed in version 0.14.0.
Severity: 9.6 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-9939 - CodeAstro Real Estate Management System Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-9939
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A security vulnerability has been detected in CodeAstro Real Estate Management System 1.0. The impacted element is an unknown function of the file /propertyview.php. Such manipulation of the argument msg leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-9939 - CodeAstro Real Estate Management System Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-9939
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A security vulnerability has been detected in CodeAstro Real Estate Management System 1.0. The impacted element is an unknown function of the file /propertyview.php. Such manipulation of the argument msg leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-9940 - CodeAstro Real Estate Management System Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-9940
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A vulnerability was detected in CodeAstro Real Estate Management System 1.0. This affects an unknown function of the file /feature.php. Performing manipulation of the argument msg results in cross site scripting. The attack can be initiated remotely. The exploit is now public and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-9940 - CodeAstro Real Estate Management System Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-9940
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A vulnerability was detected in CodeAstro Real Estate Management System 1.0. This affects an unknown function of the file /feature.php. Performing manipulation of the argument msg results in cross site scripting. The attack can be initiated remotely. The exploit is now public and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-9942 - CodeAstro Real Estate Management System Unrestricted File Upload Vulnerability",
"Content": "CVE ID : CVE-2025-9942
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A vulnerability has been found in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /submitproperty.php. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-9942 - CodeAstro Real Estate Management System Unrestricted File Upload Vulnerability",
"Content": "CVE ID : CVE-2025-9942
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A vulnerability has been found in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /submitproperty.php. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-43772 - Liferay Portal Liferay DXP DoS Memory Consumption Vulnerability",
"Content": "CVE ID : CVE-2025-43772
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Kaleo Forms Admin in Liferay Portal 7.0.0 through 7.4.3.4, and Liferay DXP 7.4 GA, 7.3 GA through update 27, and older unsupported versions does not restrict the saving of request parameters in the portlet session, which allows remote attackers to consume system memory leading to denial-of-service (DoS) conditions via crafted HTTP request.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-43772 - Liferay Portal Liferay DXP DoS Memory Consumption Vulnerability",
"Content": "CVE ID : CVE-2025-43772
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Kaleo Forms Admin in Liferay Portal 7.0.0 through 7.4.3.4, and Liferay DXP 7.4 GA, 7.3 GA through update 27, and older unsupported versions does not restrict the saving of request parameters in the portlet session, which allows remote attackers to consume system memory leading to denial-of-service (DoS) conditions via crafted HTTP request.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36905 - Apache GIS Local Privilege Escalation Vulnerability",
"Content": "CVE ID : CVE-2025-36905
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In gxp_mapping_create of gxp_mapping.c, there is a possible privilege escalation due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36905 - Apache GIS Local Privilege Escalation Vulnerability",
"Content": "CVE ID : CVE-2025-36905
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In gxp_mapping_create of gxp_mapping.c, there is a possible privilege escalation due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36895 - Citrix NetScaler XML External Entity (XXE) Information Disclosure",
"Content": "CVE ID : CVE-2025-36895
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Information disclosure
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36895 - Citrix NetScaler XML External Entity (XXE) Information Disclosure",
"Content": "CVE ID : CVE-2025-36895
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Information disclosure
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36900 - "Logitech Wi-Fi Smart Code Vulnerability - Integer Overflow"",
"Content": "CVE ID : CVE-2025-36900
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In lwis_test_register_io of lwis_device_test.c, there is a possible OOB Write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36900 - "Logitech Wi-Fi Smart Code Vulnerability - Integer Overflow"",
"Content": "CVE ID : CVE-2025-36900
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In lwis_test_register_io of lwis_device_test.c, there is a possible OOB Write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36904 - Apache Tomcat Remote Code Execution",
"Content": "CVE ID : CVE-2025-36904
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : N/A
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36904 - Apache Tomcat Remote Code Execution",
"Content": "CVE ID : CVE-2025-36904
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : N/A
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36892 - Apache HTTP Server HTTP/2 Server Header Injection",
"Content": "CVE ID : CVE-2025-36892
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Denial of service
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36892 - Apache HTTP Server HTTP/2 Server Header Injection",
"Content": "CVE ID : CVE-2025-36892
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Denial of service
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36909 - Apache Struts SSRF",
"Content": "CVE ID : CVE-2025-36909
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Information disclosure
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36909 - Apache Struts SSRF",
"Content": "CVE ID : CVE-2025-36909
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Information disclosure
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36906 - Darwinn MLIR Converter AIDL Heap Buffer Overflow (EoP)",
"Content": "CVE ID : CVE-2025-36906
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In ConvertReductionOp of darwinn_mlir_converter_aidl.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36906 - Darwinn MLIR Converter AIDL Heap Buffer Overflow (EoP)",
"Content": "CVE ID : CVE-2025-36906
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In ConvertReductionOp of darwinn_mlir_converter_aidl.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36896 - Apache Struts Deserialization RCE",
"Content": "CVE ID : CVE-2025-36896
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : N/A
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36896 - Apache Struts Deserialization RCE",
"Content": "CVE ID : CVE-2025-36896
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : N/A
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36891 - Apache HTTP Server Local File Inclusion",
"Content": "CVE ID : CVE-2025-36891
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Elevation of privilege
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36891 - Apache HTTP Server Local File Inclusion",
"Content": "CVE ID : CVE-2025-36891
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Elevation of privilege
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36893 - Apache ReadTachyonCommands Uninitialized Data Information Leak",
"Content": "CVE ID : CVE-2025-36893
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In ReadTachyonCommands of gxp_main_actor.cc, there is a possible information leak due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36893 - Apache ReadTachyonCommands Uninitialized Data Information Leak",
"Content": "CVE ID : CVE-2025-36893
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In ReadTachyonCommands of gxp_main_actor.cc, there is a possible information leak due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36907 - Qualcomm ABL Android Heap Buffer Overflow",
"Content": "CVE ID : CVE-2025-36907
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In draw_surface_image() of abl/android/lib/draw/draw.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege via USB fastboot, after a bootloader unlock, with no additional execution privileges needed. User interaction is needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36907 - Qualcomm ABL Android Heap Buffer Overflow",
"Content": "CVE ID : CVE-2025-36907
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In draw_surface_image() of abl/android/lib/draw/draw.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege via USB fastboot, after a bootloader unlock, with no additional execution privileges needed. User interaction is needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36899 - Apache HTTP Server Privilege Escalation Vulnerability",
"Content": "CVE ID : CVE-2025-36899
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : There is a possible escalation of privilege due to test/debugging code left in a production build. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36899 - Apache HTTP Server Privilege Escalation Vulnerability",
"Content": "CVE ID : CVE-2025-36899
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : There is a possible escalation of privilege due to test/debugging code left in a production build. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36897 - Apache cd_CnMsgCodec Remote Code Execution Vulnerability",
"Content": "CVE ID : CVE-2025-36897
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In unknown of cd_CnMsgCodecUserApi.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36897 - Apache cd_CnMsgCodec Remote Code Execution Vulnerability",
"Content": "CVE ID : CVE-2025-36897
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In unknown of cd_CnMsgCodecUserApi.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-9516 - Atec Debug Plugin Arbitrary File Read Vulnerability in WordPress",
"Content": "CVE ID : CVE-2025-9516
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : The atec Debug plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 1.2.22 via the 'custom_log' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to view the contents of files outside of the originally intended directory.
Severity: 4.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-9516 - Atec Debug Plugin Arbitrary File Read Vulnerability in WordPress",
"Content": "CVE ID : CVE-2025-9516
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : The atec Debug plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 1.2.22 via the 'custom_log' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to view the contents of files outside of the originally intended directory.
Severity: 4.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹