π¨ CVE-2024-43789
Discourse is an open source platform for community discussion. A user can create a post with many replies, and then attempt to fetch them all at once. This can potentially reduce the availability of a Discourse instance. This problem has been patched in the latest version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.
π@cveNotify
Discourse is an open source platform for community discussion. A user can create a post with many replies, and then attempt to fetch them all at once. This can potentially reduce the availability of a Discourse instance. This problem has been patched in the latest version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.
π@cveNotify
GitHub
DoS by the absence of restrictions on replies to posts
### Impact
A user can create a post with many replies, and then attempt to fetch them all at once. This can potentially reduce the availability of a Discourse instance.
### Patches
The problem...
A user can create a post with many replies, and then attempt to fetch them all at once. This can potentially reduce the availability of a Discourse instance.
### Patches
The problem...
π¨ CVE-2024-45051
Discourse is an open source platform for community discussion. A maliciously crafted email address could allow an attacker to bypass domain-based restrictions and gain access to private sites, categories and/or groups. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.
π@cveNotify
Discourse is an open source platform for community discussion. A maliciously crafted email address could allow an attacker to bypass domain-based restrictions and gain access to private sites, categories and/or groups. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.
π@cveNotify
GitHub
Bypass of email address validation via encoded email addresses
### Impact
A maliciously crafted email address could allow an attacker to bypass domain-based restrictions and gain access to private sites, categories and/or groups.
### Patches
The issue is...
A maliciously crafted email address could allow an attacker to bypass domain-based restrictions and gain access to private sites, categories and/or groups.
### Patches
The issue is...
π¨ CVE-2024-45297
Discourse is an open source platform for community discussion. Users can see topics with a hidden tag if they know the label/name of that tag. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.
π@cveNotify
Discourse is an open source platform for community discussion. Users can see topics with a hidden tag if they know the label/name of that tag. This issue has been patched in the latest stable, beta and tests-passed version of Discourse. All users area are advised to upgrade. There are no known workarounds for this vulnerability.
π@cveNotify
GitHub
Prevent topic list filtering by hidden tags for unauthorized users
### Impact
Users can see topics with a hidden tag if they know the label/name of that tag.
### Patches
The issue is patched in the latest stable, beta and tests-passed version of Discourse. ...
Users can see topics with a hidden tag if they know the label/name of that tag.
### Patches
The issue is patched in the latest stable, beta and tests-passed version of Discourse. ...
π¨ CVE-2024-47772
Discourse is an open source platform for community discussion. An attacker can execute arbitrary JavaScript on users' browsers by sending a maliciously crafted chat message and replying to it. This issue only affects sites with CSP disabled. This problem is patched in the latest version of Discourse. All users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled on the forum. Users who do upgrade should also consider enabling a CSP as well as a proactive measure.
π@cveNotify
Discourse is an open source platform for community discussion. An attacker can execute arbitrary JavaScript on users' browsers by sending a maliciously crafted chat message and replying to it. This issue only affects sites with CSP disabled. This problem is patched in the latest version of Discourse. All users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled on the forum. Users who do upgrade should also consider enabling a CSP as well as a proactive measure.
π@cveNotify
MDN Web Docs
Content Security Policy (CSP) - HTTP | MDN
Content Security Policy (CSP) is a feature that helps to prevent or minimize the risk of certain types of security threats. It consists of a series of instructions from a website to a browser, which instruct the browser to place restrictions on the thingsβ¦
π¨ CVE-2025-22601
Discourse is an open source platform for community discussion. In affected versions an attacker can trick a target user to make changes to their own username via carefully crafted link using the `activate-account` route. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.
π@cveNotify
Discourse is an open source platform for community discussion. In affected versions an attacker can trick a target user to make changes to their own username via carefully crafted link using the `activate-account` route. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. There are no known workarounds for this vulnerability.
π@cveNotify
GitHub
Client Side Path Traversal using activate account route
### Impact
An attacker can trick a target user to make changes to their own username via carefully crafted link using the `activate-account` route.
### Patches
This problem is patched in the ...
An attacker can trick a target user to make changes to their own username via carefully crafted link using the `activate-account` route.
### Patches
This problem is patched in the ...
π¨ CVE-2024-53266
Discourse is an open source platform for community discussion. In affected versions with some combinations of plugins, and with CSP disabled, activity streams in the user's profile page may be vulnerable to XSS. This has been patched in the latest version of Discourse core. Users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled.
π@cveNotify
Discourse is an open source platform for community discussion. In affected versions with some combinations of plugins, and with CSP disabled, activity streams in the user's profile page may be vulnerable to XSS. This has been patched in the latest version of Discourse core. Users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled.
π@cveNotify
GitHub
XSS via topic titles when CSP disabled
### Impact
With some combinations of plugins, and with CSP disabled, activity streams in the user's profile page may be vulnerable to XSS.
### Patches
Patched in the latest version of Dis...
With some combinations of plugins, and with CSP disabled, activity streams in the user's profile page may be vulnerable to XSS.
### Patches
Patched in the latest version of Dis...
π¨ CVE-2023-31100
Improper Access Control in SMI handler vulnerability in Phoenix SecureCoreβ’ Technologyβ’ 4 allows SPI flash modification.
This issue affects SecureCoreβ’ Technologyβ’ 4:
* from 4.3.0.0 before 4.3.0.203
*
from
4.3.1.0 before 4.3.1.163
*
from
4.4.0.0 before 4.4.0.217
*
from
4.5.0.0 before 4.5.0.138
π@cveNotify
Improper Access Control in SMI handler vulnerability in Phoenix SecureCoreβ’ Technologyβ’ 4 allows SPI flash modification.
This issue affects SecureCoreβ’ Technologyβ’ 4:
* from 4.3.0.0 before 4.3.0.203
*
from
4.3.1.0 before 4.3.1.163
*
from
4.4.0.0 before 4.4.0.217
*
from
4.5.0.0 before 4.5.0.138
π@cveNotify
Phoenix Technologies - Leading PC Innovation since 1979 - Phoenix Technologies Website
Phoenix Technologies SPI SMM Driver Vulnerability - Phoenix Technologies - Leading PC Innovation since 1979
CVE-2023-31100 Phoenix Technologies has been notified by IOActive researchers of a security issue in its SecureCore Technology SPI SMM Driver that could allow unauthorized access to the SPI flash on some platforms.
π¨ CVE-2023-5058
Improper Input Validation in the processing of user-supplied splash screen during system boot in Phoenix SecureCoreβ’ Technologyβ’ 4 potentially allows denial-of-service attacks or arbitrary code execution.
π@cveNotify
Improper Input Validation in the processing of user-supplied splash screen during system boot in Phoenix SecureCoreβ’ Technologyβ’ 4 potentially allows denial-of-service attacks or arbitrary code execution.
π@cveNotify
Phoenix Technologies - Leading PC Innovation since 1979 - Phoenix Technologies Website
Phoenix Technologies LogoFAIL Vulnerability - Phoenix Technologies - Leading PC Innovation since 1979
CVE-2023-5058 Phoenix Technologies has been informed of a serious flaw in Phoenix SecureCoreβ’ Technologyβ’ 4, which is a BIOS firmware that provides advanced security features for various devices.
π¨ CVE-2024-0762
Potential buffer overflow
in unsafe UEFI variable handling
in Phoenix SecureCoreβ’ for select Intel platforms
This issue affects:
Phoenix
SecureCoreβ’ for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998;
Phoenix
SecureCoreβ’ for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562;
Phoenix
SecureCoreβ’ for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323;
Phoenix
SecureCoreβ’ for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287;
Phoenix
SecureCoreβ’ for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236;
Phoenix
SecureCoreβ’ for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184;
Phoenix
SecureCoreβ’ for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269;
Phoenix
SecureCoreβ’ for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218;
Phoenix
SecureCoreβ’ for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15.
π@cveNotify
Potential buffer overflow
in unsafe UEFI variable handling
in Phoenix SecureCoreβ’ for select Intel platforms
This issue affects:
Phoenix
SecureCoreβ’ for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998;
Phoenix
SecureCoreβ’ for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562;
Phoenix
SecureCoreβ’ for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323;
Phoenix
SecureCoreβ’ for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287;
Phoenix
SecureCoreβ’ for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236;
Phoenix
SecureCoreβ’ for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184;
Phoenix
SecureCoreβ’ for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269;
Phoenix
SecureCoreβ’ for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218;
Phoenix
SecureCoreβ’ for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15.
π@cveNotify
Eclypsium | Supply Chain Security for the Modern Enterprise
UEFIcanhazbufferoverflow: Widespread Impact from Vulnerability in Popular PC and Server Firmware
Summary Eclypsium Automata, our automated binary analysis system, has identified a high impact vulnerability (CVE-2024-0762 with a reported CVSS of 7.5) in the Phoenix SecureCore UEFI firmware that runs on multiple families of Intel Core desktop and mobileβ¦
π¨ CVE-2024-1598
Potential buffer overflow
in unsafe UEFI variable handling
in Phoenix SecureCoreβ’ for Intel Gemini Lake.This issue affects:
SecureCoreβ’ for Intel Gemini Lake: from 4.1.0.1 before 4.1.0.567.
π@cveNotify
Potential buffer overflow
in unsafe UEFI variable handling
in Phoenix SecureCoreβ’ for Intel Gemini Lake.This issue affects:
SecureCoreβ’ for Intel Gemini Lake: from 4.1.0.1 before 4.1.0.567.
π@cveNotify
Phoenix Technologies - Leading PC Innovation since 1979 - Phoenix Technologies Website
Phoenix Technologies Buffer Overflow Vulnerability on GeminiLake - Phoenix Technologies - Leading PC Innovation since 1979
Phoenix was notified about a vulnerability in UEFI variable interfaces in Phoenix SCT firmware code on some platforms potentially leading to a buffer overflow.
π¨ CVE-2024-29979
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCoreβ’ for Intel Kaby Lake, Phoenix SecureCoreβ’ for Intel Coffee Lake, Phoenix SecureCoreβ’ for Intel Comet Lake, Phoenix SecureCoreβ’ for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCoreβ’ for Intel Kaby Lake: before 4.0.1.1012; SecureCoreβ’ for Intel Coffee Lake: before 4.1.0.568; SecureCoreβ’ for Intel Comet Lake: before 4.2.1.292; SecureCoreβ’ for Intel Ice Lake: before 4.2.0.334.
π@cveNotify
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCoreβ’ for Intel Kaby Lake, Phoenix SecureCoreβ’ for Intel Coffee Lake, Phoenix SecureCoreβ’ for Intel Comet Lake, Phoenix SecureCoreβ’ for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCoreβ’ for Intel Kaby Lake: before 4.0.1.1012; SecureCoreβ’ for Intel Coffee Lake: before 4.1.0.568; SecureCoreβ’ for Intel Comet Lake: before 4.2.1.292; SecureCoreβ’ for Intel Ice Lake: before 4.2.0.334.
π@cveNotify
Phoenix Technologies - Leading PC Innovation since 1979 - Phoenix Technologies Website
Unsafe Handling of Phoenix UEFI Variables - Phoenix Technologies - Leading PC Innovation since 1979
CVE-2024-29979 Phoenix has identified a potential vulnerability that involves unsafe UEFI variable handling in Phoenix SCT Firmware, potentially leading to unsafe memory access that could cause temporary denial of service.
π¨ CVE-2024-29980
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCoreβ’ for Intel Kaby Lake, Phoenix SecureCoreβ’ for Intel Coffee Lake, Phoenix SecureCoreβ’ for Intel Comet Lake, Phoenix SecureCoreβ’ for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCoreβ’ for Intel Kaby Lake: before 4.0.1.1012; SecureCoreβ’ for Intel Coffee Lake: before 4.1.0.568; SecureCoreβ’ for Intel Comet Lake: before 4.2.1.292; SecureCoreβ’ for Intel Ice Lake: before 4.2.0.334.
π@cveNotify
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCoreβ’ for Intel Kaby Lake, Phoenix SecureCoreβ’ for Intel Coffee Lake, Phoenix SecureCoreβ’ for Intel Comet Lake, Phoenix SecureCoreβ’ for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCoreβ’ for Intel Kaby Lake: before 4.0.1.1012; SecureCoreβ’ for Intel Coffee Lake: before 4.1.0.568; SecureCoreβ’ for Intel Comet Lake: before 4.2.1.292; SecureCoreβ’ for Intel Ice Lake: before 4.2.0.334.
π@cveNotify
Phoenix Technologies - Leading PC Innovation since 1979 - Phoenix Technologies Website
Unsafe Handling of IHV UEFI Variables - Phoenix Technologies - Leading PC Innovation since 1979
CVE-2024-29980 Phoenix has identified a potential vulnerability that involves unsafe UEFI variable handling in Phoenix SCT Firmware, potentially leading to unsafe memory access that could cause temporary denial of service.
π¨ CVE-2025-10974
A vulnerability has been found in giantspatula SewKinect up to 7fd963ceb3385af3706af02b8a128a13399dffb1. This affects the function pickle.loads of the file /calculate of the component Endpoint. Such manipulation of the argument body_parts/point_cloud leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases.
π@cveNotify
A vulnerability has been found in giantspatula SewKinect up to 7fd963ceb3385af3706af02b8a128a13399dffb1. This affects the function pickle.loads of the file /calculate of the component Endpoint. Such manipulation of the argument body_parts/point_cloud leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases.
π@cveNotify
GitHub
Security Report: Remote Code Execution Vulnerability in `/calculate` Endpoint Β· Issue #3 Β· giantspatula/SewKinect
Summary The /calculate endpoint in the application is vulnerable to Remote Code Execution (RCE) due to unsafe deserialization using Python's pickle.loads on user-supplied data. Details The endp...
π¨ CVE-2025-10975
A vulnerability was found in GuanxingLu vlarl up to 31abc0baf53ef8f5db666a1c882e1ea64def2997. This vulnerability affects the function experiments.robot.bridge.reasoning_server::run_reasoning_server of the file experiments/robot/bridge/reasoning_server.py of the component ZeroMQ. Performing manipulation of the argument Message results in deserialization. Remote exploitation of the attack is possible. The exploit has been made public and could be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided.
π@cveNotify
A vulnerability was found in GuanxingLu vlarl up to 31abc0baf53ef8f5db666a1c882e1ea64def2997. This vulnerability affects the function experiments.robot.bridge.reasoning_server::run_reasoning_server of the file experiments/robot/bridge/reasoning_server.py of the component ZeroMQ. Performing manipulation of the argument Message results in deserialization. Remote exploitation of the attack is possible. The exploit has been made public and could be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided.
π@cveNotify
GitHub
Security Report: Remote Code Execution Vulnerability in `experiments.robot.bridge.reasoning_server::run_reasoning_server` Β· Issueβ¦
Summary A critical Remote Code Execution (RCE) vulnerability exists in experiments.robot.bridge.reasoning_server::run_reasoning_server. The server accepts incoming messages and deserializes them us...
π¨ CVE-2025-10976
A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
π@cveNotify
A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
π@cveNotify
π¨ CVE-2025-10977
A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
π@cveNotify
A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
π@cveNotify
π¨ CVE-2025-10978
A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
π@cveNotify
A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
π@cveNotify
π¨ CVE-2025-10979
A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
π@cveNotify
A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
π@cveNotify
π¨ CVE-2025-56769
An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.
π@cveNotify
An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.
π@cveNotify
GitHub
Remote Code Execution (RCE) vulnerability disclosure in hutool Β· Issue #3994 Β· chinabugotech/hutool
Summary The QLExpressEngine is one of the expression engines used in Hutool. However, Hutool uses it to evaluate expressions without sufficient security protections. As a result, attackers can craf...
π¨ CVE-2025-10980
A security vulnerability has been detected in JeecgBoot up to 3.8.2. This affects an unknown function of the file /sys/position/exportXls. Such manipulation leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
π@cveNotify
A security vulnerability has been detected in JeecgBoot up to 3.8.2. This affects an unknown function of the file /sys/position/exportXls. Such manipulation leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
π@cveNotify
π¨ CVE-2025-10981
A vulnerability was detected in JeecgBoot up to 3.8.2. This impacts an unknown function of the file /sys/tenant/exportXls. Performing manipulation results in improper authorization. The attack can be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
π@cveNotify
A vulnerability was detected in JeecgBoot up to 3.8.2. This impacts an unknown function of the file /sys/tenant/exportXls. Performing manipulation results in improper authorization. The attack can be initiated remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
π@cveNotify