CVE Notify
17.9K subscribers
4 photos
154K links
Alert on the latest CVEs

Partner channel: @malwr
Download Telegram
๐Ÿšจ CVE-2024-48885
A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiRecorder versions 7.2.0 through 7.2.1, 7.0.0 through 7.0.4, FortiWeb versions 7.6.0, 7.4.0 through 7.4.4, 7.2.0 through 7.2.10, 7.0.0 through 7.0.10, 6.4.0 through 6.4.3, FortiVoice versions 7.0.0 through 7.0.4, 6.4.0 through 6.4.9, 6.0.0 through 6.0.12 allows attacker to escalate privilege via specially crafted packets.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-50563
A weak authentication in Fortinet FortiManager Cloud, FortiAnalyzer versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3 allows attacker to execute unauthorized code or commands via a brute-force attack.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-30006
Xorcom CompletePBX is vulnerable to a reflected cross-site scripting (XSS) in the administrative control panel.




This issue affects CompletePBX: all versions up to and prior to 5.2.35

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-31125
Vite is a frontend tooling framework for javascript. Vite exposes content of non-allowed files using ?inline&import or ?raw?import. Only apps explicitly exposing the Vite dev server to the network (using --host or server.host config option) are affected. This vulnerability is fixed in 6.2.4, 6.1.3, 6.0.13, 5.4.16, and 4.5.11.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-3084
When run on commands with certain arguments set, explain may fail to validate these arguments before using them. This can lead to crashes in router servers. This affects MongoDB Server v5.0 prior to 5.0.31, MongoDB Server v6.0 prior to 6.0.20, MongoDB Server v7.0 prior to 7.0.16 and MongoDB Server v8.0 prior to 8.0.4

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-3085
A MongoDB server under specific conditions running on Linux with TLS and CRL revocation status checking enabled, fails to check the revocation status of the intermediate certificates in the peer's certificate chain. In cases of MONGODB-X509, which is not enabled by default, this may lead to improper authentication. This issue may also affect intra-cluster authentication. This issue affects MongoDB Server v5.0 versions prior to 5.0.31, MongoDB Server v6.0 versions prior to 6.0.20, MongoDB Server v7.0 versions prior to 7.0.16 and MongoDB Server v8.0 versions prior to 8.0.4.
Required Configuration : MongoDB Server must be running on Linux Operating Systems and CRL revocation status checking must be enabled

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-34184
Ilevia EVE X1 Server version โ‰ค 4.7.18.0.eden contains an unauthenticated OS command injection vulnerability in the /ajax/php/login.php script. Remote attackers can execute arbitrary system commands by injecting payloads into the 'passwd' HTTP POST parameter, leading to full system compromise or denial of service.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-34185
Ilevia EVE X1 Server version โ‰ค 4.7.18.0.eden contains a pre-authentication file disclosure vulnerability via the 'db_log' POST parameter. Remote attackers can retrieve arbitrary files from the server, exposing sensitive system information and credentials.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-34186
Ilevia EVE X1/X5 Server version โ‰ค 4.7.18.0.eden contains a vulnerability in its authentication mechanism. Unsanitized input is passed to a system() call for authentication, allowing attackers to inject special characters and manipulate command parsing. Due to the binary's interpretation of non-zero exit codes as successful authentication, remote attackers can bypass authentication and gain full access to the system.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-10360
In Puppet Enterprise versions 2025.4.0 and 2025.5, the encryption key used for encrypting content in the Infra Assistant database was not excluded from the files gathered by Puppet backup. The key is only present on the system if the user has a Puppet Enterprise Advanced license and has enabled the Infra Assistant feature. The key is used for encrypting one particular bit of data in the Infra Assistant database: the API key for their AI provider account. This has been fixed in Puppet Enterprise version 2025.6, and release notes for 2025.6 have remediation steps for users of affected versions who can't update to the latest version.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-21476
Memory corruption when passing parameters to the Trusted Virtual Machine during the handshake.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-21481
Memory corruption while performing private key encryption in trusted application.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-21482
Cryptographic issue while performing RSA PKCS padding decoding.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-21483
Memory corruption when the UE receives an RTP packet from the network, during the reassembly of NALUs.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-21484
Information disclosure when UE receives the RTP packet from the network, while decoding and reassembling the fragments from RTP packet.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-21487
Information disclosure while decoding RTP packet received by UE from the network, when payload length mentioned is greater than the available buffer length.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-21488
Information disclosure while decoding this RTP packet headers received by UE from the network when the padding bit is set.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-27030
information disclosure while invoking calibration data from user space to update firmware size.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-27032
memory corruption while loading a PIL authenticated VM, when authenticated VM image is loaded without maintaining cache coherency.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-27033
Information disclosure while running video usecase having rogue firmware.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2025-27034
Memory corruption while selecting the PLMN from SOR failed list.

๐ŸŽ–@cveNotify