{
"Source": "CVE FEED",
"Title": "CVE-2025-10535 - Firefox Cross-Site Scripting (XSS)",
"Content": "CVE ID : CVE-2025-10535
Published : Sept. 16, 2025, 12:26 p.m. | 28 minutes ago
Description : This vulnerability affects Firefox < 143.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-10535 - Firefox Cross-Site Scripting (XSS)",
"Content": "CVE ID : CVE-2025-10535
Published : Sept. 16, 2025, 12:26 p.m. | 28 minutes ago
Description : This vulnerability affects Firefox < 143.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-10537 - Mozilla Firefox/Mozilla Thunderbird Memory Corruption Vulnerability",
"Content": "CVE ID : CVE-2025-10537
Published : Sept. 16, 2025, 12:26 p.m. | 28 minutes ago
Description : Memory safety bugs present in Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 143 and Firefox ESR < 140.3.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-10537 - Mozilla Firefox/Mozilla Thunderbird Memory Corruption Vulnerability",
"Content": "CVE ID : CVE-2025-10537
Published : Sept. 16, 2025, 12:26 p.m. | 28 minutes ago
Description : Memory safety bugs present in Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 143 and Firefox ESR < 140.3.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-10530 - "Mozilla Firefox DNS Rebinding Vulnerability"",
"Content": "CVE ID : CVE-2025-10530
Published : Sept. 16, 2025, 12:26 p.m. | 28 minutes ago
Description : This vulnerability affects Firefox < 143.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-10530 - "Mozilla Firefox DNS Rebinding Vulnerability"",
"Content": "CVE ID : CVE-2025-10530
Published : Sept. 16, 2025, 12:26 p.m. | 28 minutes ago
Description : This vulnerability affects Firefox < 143.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-10532 - Mozilla Firefox Memory Corruption Vulnerability",
"Content": "CVE ID : CVE-2025-10532
Published : Sept. 16, 2025, 12:26 p.m. | 28 minutes ago
Description : This vulnerability affects Firefox < 143 and Firefox ESR < 140.3.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-10532 - Mozilla Firefox Memory Corruption Vulnerability",
"Content": "CVE ID : CVE-2025-10532
Published : Sept. 16, 2025, 12:26 p.m. | 28 minutes ago
Description : This vulnerability affects Firefox < 143 and Firefox ESR < 140.3.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-10536 - Firefox Memory Corruption Vulnerability",
"Content": "CVE ID : CVE-2025-10536
Published : Sept. 16, 2025, 12:26 p.m. | 28 minutes ago
Description : This vulnerability affects Firefox < 143 and Firefox ESR < 140.3.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-10536 - Firefox Memory Corruption Vulnerability",
"Content": "CVE ID : CVE-2025-10536
Published : Sept. 16, 2025, 12:26 p.m. | 28 minutes ago
Description : This vulnerability affects Firefox < 143 and Firefox ESR < 140.3.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-10527 - "Firefox Memory Corruption Vulnerability"",
"Content": "CVE ID : CVE-2025-10527
Published : Sept. 16, 2025, 12:26 p.m. | 28 minutes ago
Description : This vulnerability affects Firefox < 143 and Firefox ESR < 140.3.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-10527 - "Firefox Memory Corruption Vulnerability"",
"Content": "CVE ID : CVE-2025-10527
Published : Sept. 16, 2025, 12:26 p.m. | 28 minutes ago
Description : This vulnerability affects Firefox < 143 and Firefox ESR < 140.3.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-10528 - Firefox Memory Corruption Vulnerability",
"Content": "CVE ID : CVE-2025-10528
Published : Sept. 16, 2025, 12:26 p.m. | 28 minutes ago
Description : This vulnerability affects Firefox < 143 and Firefox ESR < 140.3.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-10528 - Firefox Memory Corruption Vulnerability",
"Content": "CVE ID : CVE-2025-10528
Published : Sept. 16, 2025, 12:26 p.m. | 28 minutes ago
Description : This vulnerability affects Firefox < 143 and Firefox ESR < 140.3.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-10529 - "Mozilla Firefox Memory Corruption Vulnerability"",
"Content": "CVE ID : CVE-2025-10529
Published : Sept. 16, 2025, 12:26 p.m. | 28 minutes ago
Description : This vulnerability affects Firefox < 143 and Firefox ESR < 140.3.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-10529 - "Mozilla Firefox Memory Corruption Vulnerability"",
"Content": "CVE ID : CVE-2025-10529
Published : Sept. 16, 2025, 12:26 p.m. | 28 minutes ago
Description : This vulnerability affects Firefox < 143 and Firefox ESR < 140.3.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-10533 - Mozilla Firefox Use-After-Free Vulnerability",
"Content": "CVE ID : CVE-2025-10533
Published : Sept. 16, 2025, 12:26 p.m. | 28 minutes ago
Description : This vulnerability affects Firefox < 143, Firefox ESR < 115.28, and Firefox ESR < 140.3.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-10533 - Mozilla Firefox Use-After-Free Vulnerability",
"Content": "CVE ID : CVE-2025-10533
Published : Sept. 16, 2025, 12:26 p.m. | 28 minutes ago
Description : This vulnerability affects Firefox < 143, Firefox ESR < 115.28, and Firefox ESR < 140.3.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-55118 - BMC Control-M/Agent memory corruption in SSL/TLS communication",
"Content": "CVE ID : CVE-2025-55118
Published : Sept. 16, 2025, 12:23 p.m. | 31 minutes ago
Description : Memory corruptions can be remotely triggered in the Control-M/Agent when SSL/TLS communication is configured.
The issue occurs in the following cases:
* Control-M/Agent 9.0.20: SSL/TLS configuration is set to the non-default setting "use_openssl=n";
* Control-M/Agent 9.0.21 and 9.0.22: Agent router configuration uses the non-default settings "JAVA_AR=N" and "use_openssl=n".
Severity: 8.9 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-55118 - BMC Control-M/Agent memory corruption in SSL/TLS communication",
"Content": "CVE ID : CVE-2025-55118
Published : Sept. 16, 2025, 12:23 p.m. | 31 minutes ago
Description : Memory corruptions can be remotely triggered in the Control-M/Agent when SSL/TLS communication is configured.
The issue occurs in the following cases:
* Control-M/Agent 9.0.20: SSL/TLS configuration is set to the non-default setting "use_openssl=n";
* Control-M/Agent 9.0.21 and 9.0.22: Agent router configuration uses the non-default settings "JAVA_AR=N" and "use_openssl=n".
Severity: 8.9 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-55117 - BMC Control-M/Agent buffer overflow in SSL/TLS communication",
"Content": "CVE ID : CVE-2025-55117
Published : Sept. 16, 2025, 12:22 p.m. | 32 minutes ago
Description : A stack-based buffer overflow can be remotely triggered when formatting an error message in the Control-M/Agent when SSL/TLS communication is configured.
The issue occurs in the following cases:
* Control-M/Agent 9.0.20: SSL/TLS configuration is set to the non-default setting "use_openssl=n";
* Control-M/Agent 9.0.21 and 9.0.22: Agent router configuration uses the non-default settings "JAVA_AR=N" and "use_openssl=n".
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-55117 - BMC Control-M/Agent buffer overflow in SSL/TLS communication",
"Content": "CVE ID : CVE-2025-55117
Published : Sept. 16, 2025, 12:22 p.m. | 32 minutes ago
Description : A stack-based buffer overflow can be remotely triggered when formatting an error message in the Control-M/Agent when SSL/TLS communication is configured.
The issue occurs in the following cases:
* Control-M/Agent 9.0.20: SSL/TLS configuration is set to the non-default setting "use_openssl=n";
* Control-M/Agent 9.0.21 and 9.0.22: Agent router configuration uses the non-default settings "JAVA_AR=N" and "use_openssl=n".
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-55116 - BMC Control-M/Agent buffer overflow local privilege escalation",
"Content": "CVE ID : CVE-2025-55116
Published : Sept. 16, 2025, 12:22 p.m. | 33 minutes ago
Description : A buffer overflow in the Control-M/Agent can lead to a local privilege escalation when an attacker has access to the system running the Agent.
This vulnerability impacts the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-55116 - BMC Control-M/Agent buffer overflow local privilege escalation",
"Content": "CVE ID : CVE-2025-55116
Published : Sept. 16, 2025, 12:22 p.m. | 33 minutes ago
Description : A buffer overflow in the Control-M/Agent can lead to a local privilege escalation when an attacker has access to the system running the Agent.
This vulnerability impacts the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-55115 - BMC Control-M/Agent path traversal local privilege escalation",
"Content": "CVE ID : CVE-2025-55115
Published : Sept. 16, 2025, 12:21 p.m. | 33 minutes ago
Description : A path traversal in the Control-M/Agent can lead to a local privilege escalation when an attacker has access to the system running the Agent. This vulnerability impacts the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions. This vulnerability was fixed in 9.0.20.100 and above.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-55115 - BMC Control-M/Agent path traversal local privilege escalation",
"Content": "CVE ID : CVE-2025-55115
Published : Sept. 16, 2025, 12:21 p.m. | 33 minutes ago
Description : A path traversal in the Control-M/Agent can lead to a local privilege escalation when an attacker has access to the system running the Agent. This vulnerability impacts the out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions. This vulnerability was fixed in 9.0.20.100 and above.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-55114 - BMC Control-M/Agent improper IP address filtering order",
"Content": "CVE ID : CVE-2025-55114
Published : Sept. 16, 2025, 12:20 p.m. | 34 minutes ago
Description : The improper order of AUTHORIZED_CTM_IP validation in the Control-M/Agent, where the Control-M/Server IP address is validated only after the SSL/TLS handshake is completed, exposes the Control-M/Agent to vulnerabilities in the SSL/TLS implementation under certain non-default conditions (e.g. CVE-2025-55117 or CVE-2025-55118) or potentially to resource exhaustion.
Severity: 6.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-55114 - BMC Control-M/Agent improper IP address filtering order",
"Content": "CVE ID : CVE-2025-55114
Published : Sept. 16, 2025, 12:20 p.m. | 34 minutes ago
Description : The improper order of AUTHORIZED_CTM_IP validation in the Control-M/Agent, where the Control-M/Server IP address is validated only after the SSL/TLS handshake is completed, exposes the Control-M/Agent to vulnerabilities in the SSL/TLS implementation under certain non-default conditions (e.g. CVE-2025-55117 or CVE-2025-55118) or potentially to resource exhaustion.
Severity: 6.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-55113 - BMC Control-M/Agent unescaped NULL byte in access control list checks",
"Content": "CVE ID : CVE-2025-55113
Published : Sept. 16, 2025, 12:20 p.m. | 35 minutes ago
Description : If the Access Control List is enforced by the Control-M/Agent and the C router is in use (default in Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions; non-default but configurable using the JAVA_AR setting in newer versions), the verification stops at the first NULL byte encountered in the email address referenced in the client certificate. An attacker could bypass configured ACLs by using a specially crafted certificate.
Severity: 9.5 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-55113 - BMC Control-M/Agent unescaped NULL byte in access control list checks",
"Content": "CVE ID : CVE-2025-55113
Published : Sept. 16, 2025, 12:20 p.m. | 35 minutes ago
Description : If the Access Control List is enforced by the Control-M/Agent and the C router is in use (default in Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 and potentially earlier unsupported versions; non-default but configurable using the JAVA_AR setting in newer versions), the verification stops at the first NULL byte encountered in the email address referenced in the client certificate. An attacker could bypass configured ACLs by using a specially crafted certificate.
Severity: 9.5 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-55112 - BMC Control-M/Agent hardcoded Blowfish keys",
"Content": "CVE ID : CVE-2025-55112
Published : Sept. 16, 2025, 12:19 p.m. | 36 minutes ago
Description : Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 (and potentially earlier unsupported versions) that are configured to use the non-default Blowfish cryptography algorithm use a hardcoded key. An attacker with access to network traffic and to this key could decrypt network traffic between the Control-M/Agent and Server.
Severity: 7.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-55112 - BMC Control-M/Agent hardcoded Blowfish keys",
"Content": "CVE ID : CVE-2025-55112
Published : Sept. 16, 2025, 12:19 p.m. | 36 minutes ago
Description : Out-of-support Control-M/Agent versions 9.0.18 to 9.0.20 (and potentially earlier unsupported versions) that are configured to use the non-default Blowfish cryptography algorithm use a hardcoded key. An attacker with access to network traffic and to this key could decrypt network traffic between the Control-M/Agent and Server.
Severity: 7.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-10546 - Cross-Site Scripting (XSS) Vulnerability in PPC XPON ONT Wi-Fi Router",
"Content": "CVE ID : CVE-2025-10546
Published : Sept. 16, 2025, 12:18 p.m. | 36 minutes ago
Description : This vulnerability exist in PPC 2K15X Router, due to improper input validation for the Common Gateway Interface (CGI) parameters at its web management portal. A remote attacker could exploit this vulnerability by injecting malicious JavaScript into the vulnerable parameter, leading to a reflected Cross-Site Scripting (XSS) attack on the targeted system.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-10546 - Cross-Site Scripting (XSS) Vulnerability in PPC XPON ONT Wi-Fi Router",
"Content": "CVE ID : CVE-2025-10546
Published : Sept. 16, 2025, 12:18 p.m. | 36 minutes ago
Description : This vulnerability exist in PPC 2K15X Router, due to improper input validation for the Common Gateway Interface (CGI) parameters at its web management portal. A remote attacker could exploit this vulnerability by injecting malicious JavaScript into the vulnerable parameter, leading to a reflected Cross-Site Scripting (XSS) attack on the targeted system.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2009-20007 - Talkative IRC v0.4.4.16 Response Buffer Overflow",
"Content": "CVE ID : CVE-2009-20007
Published : Sept. 16, 2025, 2:34 p.m. | 22 minutes ago
Description : Talkative IRC v0.4.4.16 is vulnerable to a stack-based buffer overflow when processing specially crafted response strings sent to a connected client. An attacker can exploit this flaw by sending an overly long message that overflows a fixed-length buffer, potentially leading to arbitrary code execution in the context of the vulnerable process. This vulnerability is exploitable remotely and does not require authentication.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2009-20007 - Talkative IRC v0.4.4.16 Response Buffer Overflow",
"Content": "CVE ID : CVE-2009-20007
Published : Sept. 16, 2025, 2:34 p.m. | 22 minutes ago
Description : Talkative IRC v0.4.4.16 is vulnerable to a stack-based buffer overflow when processing specially crafted response strings sent to a connected client. An attacker can exploit this flaw by sending an overly long message that overflows a fixed-length buffer, potentially leading to arbitrary code execution in the context of the vulnerable process. This vulnerability is exploitable remotely and does not require authentication.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2009-20006 - osCommerce <= 2.2 admin file manager arbitrary php code execution",
"Content": "CVE ID : CVE-2009-20006
Published : Sept. 16, 2025, 2:33 p.m. | 22 minutes ago
Description : osCommerce versions up to and including 2.2 RC2a contain a vulnerability in its administrative file manager utility (admin/file_manager.php). The interface allows file uploads and edits without sufficient input validation or access control. An unauthenticated attacker can craft a POST request to upload a .php file containing arbitrary code, which is then executed by the server.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2009-20006 - osCommerce <= 2.2 admin file manager arbitrary php code execution",
"Content": "CVE ID : CVE-2009-20006
Published : Sept. 16, 2025, 2:33 p.m. | 22 minutes ago
Description : osCommerce versions up to and including 2.2 RC2a contain a vulnerability in its administrative file manager utility (admin/file_manager.php). The interface allows file uploads and edits without sufficient input validation or access control. An unauthenticated attacker can craft a POST request to upload a .php file containing arbitrary code, which is then executed by the server.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2009-20005 - InterSystems Caché UtilConfigHome.csp Stack Buffer Overflow",
"Content": "CVE ID : CVE-2009-20005
Published : Sept. 16, 2025, 2:32 p.m. | 24 minutes ago
Description : A stack-based buffer overflow exists in the UtilConfigHome.csp endpoint of InterSystems Caché 2009.1. The vulnerability is triggered by sending a specially crafted HTTP GET request containing an oversized argument to the .csp handler. Due to insufficient bounds checking, the input overflows a stack buffer, allowing an attacker to overwrite control structures and execute arbitrary code. It is unknown if this vulnerability was patched and an affected version range remains undefined.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2009-20005 - InterSystems Caché UtilConfigHome.csp Stack Buffer Overflow",
"Content": "CVE ID : CVE-2009-20005
Published : Sept. 16, 2025, 2:32 p.m. | 24 minutes ago
Description : A stack-based buffer overflow exists in the UtilConfigHome.csp endpoint of InterSystems Caché 2009.1. The vulnerability is triggered by sending a specially crafted HTTP GET request containing an oversized argument to the .csp handler. Due to insufficient bounds checking, the input overflows a stack buffer, allowing an attacker to overwrite control structures and execute arbitrary code. It is unknown if this vulnerability was patched and an affected version range remains undefined.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2024-13174 - SQLi in E1 Informatics' Web Application",
"Content": "CVE ID : CVE-2024-13174
Published : Sept. 16, 2025, 2:28 p.m. | 28 minutes ago
Description : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in E1 Informatics Web Application allows SQL Injection.This issue affects Web Application: through 20250916.
NOTE: The vendor did not inform about the completion of the fixing process within the specified time. The CVE will be updated when new information becomes available.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2024-13174 - SQLi in E1 Informatics' Web Application",
"Content": "CVE ID : CVE-2024-13174
Published : Sept. 16, 2025, 2:28 p.m. | 28 minutes ago
Description : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in E1 Informatics Web Application allows SQL Injection.This issue affects Web Application: through 20250916.
NOTE: The vendor did not inform about the completion of the fixing process within the specified time. The CVE will be updated when new information becomes available.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "16 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹