CVE Notify
17.9K subscribers
4 photos
155K links
Alert on the latest CVEs

Partner channel: @malwr
Download Telegram
🚨 CVE-2024-43789
Discourse is an open source platform for community discussion. A user can create a post with many replies, and then attempt to fetch them all at once. This can potentially reduce the availability of a Discourse instance. This problem has been patched in the latest version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.

πŸŽ–@cveNotify
🚨 CVE-2024-45051
Discourse is an open source platform for community discussion. A maliciously crafted email address could allow an attacker to bypass domain-based restrictions and gain access to private sites, categories and/or groups. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.

πŸŽ–@cveNotify
🚨 CVE-2024-45297
Discourse is an open source platform for community discussion. Users can see topics with a hidden tag if they know the label/name of that tag. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.

πŸŽ–@cveNotify
🚨 CVE-2024-47772
Discourse is an open source platform for community discussion. An attacker can execute arbitrary JavaScript on users' browsers by sending a maliciously crafted chat message and replying to it. This issue only affects sites with CSP disabled. This problem is patched in the latest version of Discourse. All users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled on the forum. Users who do upgrade should also consider enabling a CSP as well as a proactive measure.

πŸŽ–@cveNotify
🚨 CVE-2025-22601
Discourse is an open source platform for community discussion. In affected versions an attacker can trick a target user to make changes to their own username via carefully crafted link using the `activate-account` route. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.

πŸŽ–@cveNotify
🚨 CVE-2024-53266
Discourse is an open source platform for community discussion. In affected versions with some combinations of plugins, and with CSP disabled, activity streams in the user's profile page may be vulnerable to XSS. This has been patched in the latest version of Discourse core. Users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled.

πŸŽ–@cveNotify
🚨 CVE-2024-0762
Potential buffer overflow
in unsafe UEFI variable handling

in Phoenix SecureCoreβ„’ for select Intel platforms


This issue affects:


Phoenix

SecureCoreβ„’ for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998;


Phoenix

SecureCoreβ„’ for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562;


Phoenix

SecureCoreβ„’ for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323;


Phoenix

SecureCoreβ„’ for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287;


Phoenix

SecureCoreβ„’ for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236;


Phoenix

SecureCoreβ„’ for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184;


Phoenix

SecureCoreβ„’ for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269;


Phoenix

SecureCoreβ„’ for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218;


Phoenix

SecureCoreβ„’ for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15.

πŸŽ–@cveNotify
🚨 CVE-2024-29979
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCoreβ„’ for Intel Kaby Lake, Phoenix SecureCoreβ„’ for Intel Coffee Lake, Phoenix SecureCoreβ„’ for Intel Comet Lake, Phoenix SecureCoreβ„’ for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCoreβ„’ for Intel Kaby Lake: before 4.0.1.1012; SecureCoreβ„’ for Intel Coffee Lake: before 4.1.0.568; SecureCoreβ„’ for Intel Comet Lake: before 4.2.1.292; SecureCoreβ„’ for Intel Ice Lake: before 4.2.0.334.

πŸŽ–@cveNotify
🚨 CVE-2024-29980
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCoreβ„’ for Intel Kaby Lake, Phoenix SecureCoreβ„’ for Intel Coffee Lake, Phoenix SecureCoreβ„’ for Intel Comet Lake, Phoenix SecureCoreβ„’ for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCoreβ„’ for Intel Kaby Lake: before 4.0.1.1012; SecureCoreβ„’ for Intel Coffee Lake: before 4.1.0.568; SecureCoreβ„’ for Intel Comet Lake: before 4.2.1.292; SecureCoreβ„’ for Intel Ice Lake: before 4.2.0.334.

πŸŽ–@cveNotify
🚨 CVE-2025-10974
A vulnerability has been found in giantspatula SewKinect up to 7fd963ceb3385af3706af02b8a128a13399dffb1. This affects the function pickle.loads of the file /calculate of the component Endpoint. Such manipulation of the argument body_parts/point_cloud leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases.

πŸŽ–@cveNotify
🚨 CVE-2025-10975
A vulnerability was found in GuanxingLu vlarl up to 31abc0baf53ef8f5db666a1c882e1ea64def2997. This vulnerability affects the function experiments.robot.bridge.reasoning_server::run_reasoning_server of the file experiments/robot/bridge/reasoning_server.py of the component ZeroMQ. Performing manipulation of the argument Message results in deserialization. Remote exploitation of the attack is possible. The exploit has been made public and could be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided.

πŸŽ–@cveNotify
🚨 CVE-2025-10976
A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

πŸŽ–@cveNotify
🚨 CVE-2025-10977
A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

πŸŽ–@cveNotify
🚨 CVE-2025-10978
A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

πŸŽ–@cveNotify
🚨 CVE-2025-10979
A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

πŸŽ–@cveNotify
🚨 CVE-2025-56769
An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.

πŸŽ–@cveNotify
🚨 CVE-2025-10980
A security vulnerability has been detected in JeecgBoot up to 3.8.2. This affects an unknown function of the file /sys/position/exportXls. Such manipulation leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

πŸŽ–@cveNotify
🚨 CVE-2025-10981
A vulnerability was detected in JeecgBoot up to 3.8.2. This impacts an unknown function of the file /sys/tenant/exportXls. Performing manipulation results in improper authorization. The attack can be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

πŸŽ–@cveNotify