{
"Source": "CVE FEED",
"Title": "CVE-2025-36905 - Apache GIS Local Privilege Escalation Vulnerability",
"Content": "CVE ID : CVE-2025-36905
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In gxp_mapping_create of gxp_mapping.c, there is a possible privilege escalation due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36905 - Apache GIS Local Privilege Escalation Vulnerability",
"Content": "CVE ID : CVE-2025-36905
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In gxp_mapping_create of gxp_mapping.c, there is a possible privilege escalation due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36895 - Citrix NetScaler XML External Entity (XXE) Information Disclosure",
"Content": "CVE ID : CVE-2025-36895
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Information disclosure
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36895 - Citrix NetScaler XML External Entity (XXE) Information Disclosure",
"Content": "CVE ID : CVE-2025-36895
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Information disclosure
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36900 - "Logitech Wi-Fi Smart Code Vulnerability - Integer Overflow"",
"Content": "CVE ID : CVE-2025-36900
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In lwis_test_register_io of lwis_device_test.c, there is a possible OOB Write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36900 - "Logitech Wi-Fi Smart Code Vulnerability - Integer Overflow"",
"Content": "CVE ID : CVE-2025-36900
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In lwis_test_register_io of lwis_device_test.c, there is a possible OOB Write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36904 - Apache Tomcat Remote Code Execution",
"Content": "CVE ID : CVE-2025-36904
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : N/A
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36904 - Apache Tomcat Remote Code Execution",
"Content": "CVE ID : CVE-2025-36904
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : N/A
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36892 - Apache HTTP Server HTTP/2 Server Header Injection",
"Content": "CVE ID : CVE-2025-36892
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Denial of service
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36892 - Apache HTTP Server HTTP/2 Server Header Injection",
"Content": "CVE ID : CVE-2025-36892
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Denial of service
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36909 - Apache Struts SSRF",
"Content": "CVE ID : CVE-2025-36909
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Information disclosure
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36909 - Apache Struts SSRF",
"Content": "CVE ID : CVE-2025-36909
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Information disclosure
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36906 - Darwinn MLIR Converter AIDL Heap Buffer Overflow (EoP)",
"Content": "CVE ID : CVE-2025-36906
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In ConvertReductionOp of darwinn_mlir_converter_aidl.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36906 - Darwinn MLIR Converter AIDL Heap Buffer Overflow (EoP)",
"Content": "CVE ID : CVE-2025-36906
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In ConvertReductionOp of darwinn_mlir_converter_aidl.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36896 - Apache Struts Deserialization RCE",
"Content": "CVE ID : CVE-2025-36896
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : N/A
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36896 - Apache Struts Deserialization RCE",
"Content": "CVE ID : CVE-2025-36896
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : N/A
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36891 - Apache HTTP Server Local File Inclusion",
"Content": "CVE ID : CVE-2025-36891
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Elevation of privilege
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36891 - Apache HTTP Server Local File Inclusion",
"Content": "CVE ID : CVE-2025-36891
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Elevation of privilege
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36893 - Apache ReadTachyonCommands Uninitialized Data Information Leak",
"Content": "CVE ID : CVE-2025-36893
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In ReadTachyonCommands of gxp_main_actor.cc, there is a possible information leak due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36893 - Apache ReadTachyonCommands Uninitialized Data Information Leak",
"Content": "CVE ID : CVE-2025-36893
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In ReadTachyonCommands of gxp_main_actor.cc, there is a possible information leak due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36907 - Qualcomm ABL Android Heap Buffer Overflow",
"Content": "CVE ID : CVE-2025-36907
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In draw_surface_image() of abl/android/lib/draw/draw.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege via USB fastboot, after a bootloader unlock, with no additional execution privileges needed. User interaction is needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36907 - Qualcomm ABL Android Heap Buffer Overflow",
"Content": "CVE ID : CVE-2025-36907
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In draw_surface_image() of abl/android/lib/draw/draw.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege via USB fastboot, after a bootloader unlock, with no additional execution privileges needed. User interaction is needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36899 - Apache HTTP Server Privilege Escalation Vulnerability",
"Content": "CVE ID : CVE-2025-36899
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : There is a possible escalation of privilege due to test/debugging code left in a production build. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36899 - Apache HTTP Server Privilege Escalation Vulnerability",
"Content": "CVE ID : CVE-2025-36899
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : There is a possible escalation of privilege due to test/debugging code left in a production build. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36897 - Apache cd_CnMsgCodec Remote Code Execution Vulnerability",
"Content": "CVE ID : CVE-2025-36897
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In unknown of cd_CnMsgCodecUserApi.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36897 - Apache cd_CnMsgCodec Remote Code Execution Vulnerability",
"Content": "CVE ID : CVE-2025-36897
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In unknown of cd_CnMsgCodecUserApi.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-9516 - Atec Debug Plugin Arbitrary File Read Vulnerability in WordPress",
"Content": "CVE ID : CVE-2025-9516
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : The atec Debug plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 1.2.22 via the 'custom_log' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to view the contents of files outside of the originally intended directory.
Severity: 4.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-9516 - Atec Debug Plugin Arbitrary File Read Vulnerability in WordPress",
"Content": "CVE ID : CVE-2025-9516
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : The atec Debug plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 1.2.22 via the 'custom_log' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to view the contents of files outside of the originally intended directory.
Severity: 4.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36901 - Apache Struts Remote Code Execution",
"Content": "CVE ID : CVE-2025-36901
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : N/A
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36901 - Apache Struts Remote Code Execution",
"Content": "CVE ID : CVE-2025-36901
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : N/A
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36894 - Apache TBD HTTP Denial of Service",
"Content": "CVE ID : CVE-2025-36894
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In TBD of TBD, there is a possible DoS due to a missing null check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36894 - Apache TBD HTTP Denial of Service",
"Content": "CVE ID : CVE-2025-36894
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In TBD of TBD, there is a possible DoS due to a missing null check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-9517 - Atlassian Confluence Debug Plugin Remote Code Execution Vulnerability",
"Content": "CVE ID : CVE-2025-9517
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : The atec Debug plugin for WordPress is vulnerable to remote code execution in all versions up to, and including, 1.2.22 via the 'custom_log' parameter. This is due to insufficient sanitization when saving the custom log path. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
Severity: 7.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-9517 - Atlassian Confluence Debug Plugin Remote Code Execution Vulnerability",
"Content": "CVE ID : CVE-2025-9517
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : The atec Debug plugin for WordPress is vulnerable to remote code execution in all versions up to, and including, 1.2.22 via the 'custom_log' parameter. This is due to insufficient sanitization when saving the custom log path. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
Severity: 7.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36903 - Lwis Buffer Write OOB Read/Write Vulnerability",
"Content": "CVE ID : CVE-2025-36903
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In lwis_io_buffer_write, there is a possible OOB read/write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36903 - Lwis Buffer Write OOB Read/Write Vulnerability",
"Content": "CVE ID : CVE-2025-36903
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In lwis_io_buffer_write, there is a possible OOB read/write due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36902 - Syna TCM2 Heap Buffer Overflow Vulnerability",
"Content": "CVE ID : CVE-2025-36902
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In syna_cdev_ioctl_store_pid() of syna_tcm2_sysfs.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36902 - Syna TCM2 Heap Buffer Overflow Vulnerability",
"Content": "CVE ID : CVE-2025-36902
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In syna_cdev_ioctl_store_pid() of syna_tcm2_sysfs.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2024-13071 - Akinsoft e-Mutabakat Cross-Site Scripting (XSS) Vulnerability",
"Content": "CVE ID : CVE-2024-13071
Published : 4. September 2025 09:15 | 2 Stunden, 14 Minuten ago
Description : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Akinsoft e-Mutabakat allows Cross-Site Scripting (XSS).This issue affects e-Mutabakat: from 2.02.05 before v2.02.06.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2024-13071 - Akinsoft e-Mutabakat Cross-Site Scripting (XSS) Vulnerability",
"Content": "CVE ID : CVE-2024-13071
Published : 4. September 2025 09:15 | 2 Stunden, 14 Minuten ago
Description : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Akinsoft e-Mutabakat allows Cross-Site Scripting (XSS).This issue affects e-Mutabakat: from 2.02.05 before v2.02.06.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-9467 - Vaadin Upload Flow Bypass Vulnerability",
"Content": "CVE ID : CVE-2025-9467
Published : 4. September 2025 09:15 | 2 Stunden, 14 Minuten ago
Description : When the Vaadin Upload's start listener is used to validate metadata about an incoming upload, it is possible to bypass the upload validation.
Users of affected versions should apply the following mitigation or upgrade. Releases that have fixed this issue include:
Product version
Vaadin 7.0.0 - 7.7.47
Vaadin 8.0.0 - 8.28.1
Vaadin 14.0.0 - 14.13.0
Vaadin 23.0.0 - 23.6.1
Vaadin 24.0.0 - 24.7.6
Mitigation
Upgrade to 7.7.48
Upgrade to 8.28.2
Upgrade to 14.13.1
Upgrade to 23.6.2
Upgrade to 24.7.7 or newer
Please note that Vaadin versions 10-13 and 15-22 are no longer supported and you should update either to the latest 14, 23, 24 version.
Artifacts Maven coordinatesVulnerable versionsFixed versioncom.vaadin:vaadin-server
7.0.0 - 7.7.47
≥7.7.48
com.vaadin:vaadin-server
8.0.0 - 8.28.1
≥8.28.2
com.vaadin:vaadin
14.0.0 - 14.13.0
≥14.13.1
com.vaadin:vaadin23.0.0 - 23.6.1
≥23.6.2
com.vaadin:vaadin24.0.0 - 24.7.6
≥24.7.7com.vaadin:vaadin-upload-flow
2.0.0 - 14.13.0
≥14.13.1
com.vaadin:vaadin-upload-flow
23.0.0 - 23.6.1
≥23.6.2
com.vaadin:vaadin-upload-flow
24.0.0 - 24.7.6
≥24.7.7
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-9467 - Vaadin Upload Flow Bypass Vulnerability",
"Content": "CVE ID : CVE-2025-9467
Published : 4. September 2025 09:15 | 2 Stunden, 14 Minuten ago
Description : When the Vaadin Upload's start listener is used to validate metadata about an incoming upload, it is possible to bypass the upload validation.
Users of affected versions should apply the following mitigation or upgrade. Releases that have fixed this issue include:
Product version
Vaadin 7.0.0 - 7.7.47
Vaadin 8.0.0 - 8.28.1
Vaadin 14.0.0 - 14.13.0
Vaadin 23.0.0 - 23.6.1
Vaadin 24.0.0 - 24.7.6
Mitigation
Upgrade to 7.7.48
Upgrade to 8.28.2
Upgrade to 14.13.1
Upgrade to 23.6.2
Upgrade to 24.7.7 or newer
Please note that Vaadin versions 10-13 and 15-22 are no longer supported and you should update either to the latest 14, 23, 24 version.
Artifacts Maven coordinatesVulnerable versionsFixed versioncom.vaadin:vaadin-server
7.0.0 - 7.7.47
≥7.7.48
com.vaadin:vaadin-server
8.0.0 - 8.28.1
≥8.28.2
com.vaadin:vaadin
14.0.0 - 14.13.0
≥14.13.1
com.vaadin:vaadin23.0.0 - 23.6.1
≥23.6.2
com.vaadin:vaadin24.0.0 - 24.7.6
≥24.7.7com.vaadin:vaadin-upload-flow
2.0.0 - 14.13.0
≥14.13.1
com.vaadin:vaadin-upload-flow
23.0.0 - 23.6.1
≥23.6.2
com.vaadin:vaadin-upload-flow
24.0.0 - 24.7.6
≥24.7.7
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹