CVE Notify
17.7K subscribers
4 photos
151K links
Alert on the latest CVEs

Partner channel: @malwr
Download Telegram
🚨 CVE-2023-30805
The Sangfor Next-Gen Application Firewall version NGAF8.0.17 is vulnerable to an operating system command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary commands by sending a crafted HTTP POST request to the /LogInOut.php endpoint. This is due to mishandling of shell meta-characters in the "un" parameter.

πŸŽ–@cveNotify
🚨 CVE-2024-21908
TinyMCE versions before 5.9.0 are affected by a stored cross-site scripting vulnerability. An unauthenticated and remote attacker could insert crafted HTML into the editor resulting in arbitrary JavaScript execution in another user's browser.

πŸŽ–@cveNotify
🚨 CVE-2024-21910
TinyMCE versions before 5.10.0 are affected by a cross-site scripting vulnerability. A remote and unauthenticated attacker could introduce crafted image or link URLs that would result in the execution of arbitrary JavaScript in an editing user's browser.

πŸŽ–@cveNotify
🚨 CVE-2024-53021
Information disclosure may occur while processing goodbye RTCP packet from network.

πŸŽ–@cveNotify
🚨 CVE-2024-53026
Information disclosure when an invalid RTCP packet is received during a VoLTE/VoWiFi IMS call.

πŸŽ–@cveNotify
🚨 CVE-2025-21463
Transient DOS while processing the EHT operation IE in the received beacon frame.

πŸŽ–@cveNotify
🚨 CVE-2025-21464
Information disclosure while reading data from an image using specified offset and size parameters.

πŸŽ–@cveNotify
🚨 CVE-2025-21465
Information disclosure while processing the hash segment in an MBN file.

πŸŽ–@cveNotify
🚨 CVE-2025-21487
Information disclosure while decoding RTP packet received by UE from the network, when payload length mentioned is greater than the available buffer length.

πŸŽ–@cveNotify
🚨 CVE-2025-47318
Transient DOS while parsing the EPTM test control message to get the test pattern.

πŸŽ–@cveNotify
🚨 CVE-2025-56423
An issue in Austrian Academy of Sciences (AW) Austrian Archaeological Institute OpenAtlas v.8.12.0 allows a remote attacker to obtain sensitive information via the login error messages

πŸŽ–@cveNotify
🚨 CVE-2025-60914
Incorrect access control in Austrian Archaeological Institute Openatlas before v8.12.0 allows attackers to access sensitive information via sending a crafted GET request to the /display_logo endpoint.

πŸŽ–@cveNotify
🚨 CVE-2025-60915
An issue in the size query parameter (/views/file.py) of Austrian Archaeological Institute Openatlas before v8.12.0 allows attackers to execute a path traversal via a crafted request.

πŸŽ–@cveNotify
🚨 CVE-2024-53010
Memory corruption may occur while attaching VM when the HLOS retains access to VM.

πŸŽ–@cveNotify
🚨 CVE-2024-53015
Memory corruption while processing IOCTL command to handle buffers associated with a session.

πŸŽ–@cveNotify
🚨 CVE-2024-53020
Information disclosure may occur while decoding the RTP packet with invalid header extension from network.

πŸŽ–@cveNotify
🚨 CVE-2025-41392
In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share versions prior to 12.6.1204.204, the affected applications lack proper validation of user-supplied data when parsing AR files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.

πŸŽ–@cveNotify
🚨 CVE-2025-53705
In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share versions prior to 12.6.1204.204, the affected applications lack proper validation of user-supplied data when parsing CO files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.

πŸŽ–@cveNotify
🚨 CVE-2025-46269
In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share versions prior to 12.6.1204.204, the affected applications lack proper validation of user-supplied data when parsing VC6 files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.

πŸŽ–@cveNotify
🚨 CVE-2018-11802
In Apache Solr, the cluster can be partitioned into multiple collections and only a subset of nodes actually host any given collection. However, if a node receives a request for a collection it does not host, it proxies the request to a relevant node and serves the request. Solr bypasses all authorization settings for such requests. This affects all Solr versions prior to 7.7 that use the default authorization mechanism of Solr (RuleBasedAuthorizationPlugin).

πŸŽ–@cveNotify