🚨 CVE-2025-68939
Gitea before 1.23.0 allows attackers to add attachments with forbidden file extensions by editing an attachment name via an attachment API.
🎖@cveNotify
Gitea before 1.23.0 allows attackers to add attachments with forbidden file extensions by editing an attachment name via an attachment API.
🎖@cveNotify
Gitea
Gitea 1.23.0(and 1.23.1) is released | Gitea Blog
We are thrilled to announce the latest release of Gitea v1.23.0.
🚨 CVE-2025-68940
In Gitea before 1.22.5, branch deletion permissions are not adequately enforced after merging a pull request.
🎖@cveNotify
In Gitea before 1.22.5, branch deletion permissions are not adequately enforced after merging a pull request.
🎖@cveNotify
Gitea
Gitea 1.22.5 is released | Gitea Blog
We are excited to announce the release of Gitea version 1.22.5.
🚨 CVE-2025-68941
Gitea before 1.22.3 mishandles access to a private resource upon receiving an API token with scope limited to public resources.
🎖@cveNotify
Gitea before 1.22.3 mishandles access to a private resource upon receiving an API token with scope limited to public resources.
🎖@cveNotify
Gitea
Gitea 1.22.3 is released | Gitea Blog
We are proud to present the release of Gitea version 1.22.3.
🚨 CVE-2025-68942
Gitea before 1.22.2 allows XSS because the search input box (for creating tags and branches) is v-html instead of v-text.
🎖@cveNotify
Gitea before 1.22.2 allows XSS because the search input box (for creating tags and branches) is v-html instead of v-text.
🎖@cveNotify
Gitea
Gitea 1.22.2 is released | Gitea Blog
We are proud to present the release of Gitea version 1.22.2.
🚨 CVE-2024-31211
WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected.
🎖@cveNotify
WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected.
🎖@cveNotify
GitHub
Remote Code Execution in `WP_HTML_Token`
### Impact
Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method.
### Patches
This issue was fixed in WordPress 6.4.2 on D...
Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method.
### Patches
This issue was fixed in WordPress 6.4.2 on D...
🚨 CVE-2024-24550
A security vulnerability has been identified in Bludit, allowing attackers with knowledge of the API token to upload arbitrary files through the File API which leads to arbitrary code execution on the server. This vulnerability arises from improper handling of file uploads, enabling malicious actors to upload and execute PHP files.
🎖@cveNotify
A security vulnerability has been identified in Bludit, allowing attackers with knowledge of the API token to upload arbitrary files through the File API which leads to arbitrary code execution on the server. This vulnerability arises from improper handling of file uploads, enabling malicious actors to upload and execute PHP files.
🎖@cveNotify
www.redguard.ch
Redguard AG - Security Advisory: Multiple Vulnerabilities in the Open Source CMS Bludit
In order to prepare for the OffSec Web Expert (OSWE) certification exam, I searched for open source web applications that I can analyze in a white box approach. I stumbled upon Bludit, an open source content management system for building websites and blogs.…
🚨 CVE-2024-24554
Bludit uses predictable methods in combination with the MD5 hashing algorithm to generate sensitive tokens such as the API token and the user token. This allows attackers to authenticate against the Bludit API.
🎖@cveNotify
Bludit uses predictable methods in combination with the MD5 hashing algorithm to generate sensitive tokens such as the API token and the user token. This allows attackers to authenticate against the Bludit API.
🎖@cveNotify
www.redguard.ch
Redguard AG - Security Advisory: Multiple Vulnerabilities in the Open Source CMS Bludit
In order to prepare for the OffSec Web Expert (OSWE) certification exam, I searched for open source web applications that I can analyze in a white box approach. I stumbled upon Bludit, an open source content management system for building websites and blogs.…
🚨 CVE-2024-2231
The allows any authenticated user to join a private group due to a missing authorization check on a function
🎖@cveNotify
The allows any authenticated user to join a private group due to a missing authorization check on a function
🎖@cveNotify
WPScan
Himer - Social Questions and Answers < 2.1.1 - Subscriber+ Private Group Joining via IDOR
See details on Himer - Social Questions and Answers < 2.1.1 - Subscriber+ Private Group Joining via IDOR CVE 2024-2231. View the latest Theme Vulnerabilities on WPScan.
🚨 CVE-2024-6717
HashiCorp Nomad and Nomad Enterprise 1.6.12 up to 1.7.9, and 1.8.1 archive unpacking during migration is vulnerable to path escaping of the allocation directory. This vulnerability, CVE-2024-6717, is fixed in Nomad 1.6.13, 1.7.10, and 1.8.2.
🎖@cveNotify
HashiCorp Nomad and Nomad Enterprise 1.6.12 up to 1.7.9, and 1.8.1 archive unpacking during migration is vulnerable to path escaping of the allocation directory. This vulnerability, CVE-2024-6717, is fixed in Nomad 1.6.13, 1.7.10, and 1.8.2.
🎖@cveNotify
HashiCorp Discuss
HCSEC-2024-15 - Nomad Vulnerable to Allocation Directory Path Escape Through Archive Unpacking
Bulletin ID: HCSEC-2024-15 Affected Products / Versions: Nomad and Nomad Enterprise 1.6.12 up to 1.7.9, and 1.8.1; fixed in Nomad Enterprise 1.6.13, 1.7.10, 1.8.2. Publication Date: July 22, 2024 Summary HashiCorp Nomad and Nomad Enterprise 1.6.12 up…
🚨 CVE-2024-40495
A vulnerability was discovered in Linksys Router E2500 with firmware 2.0.00, allows authenticated attackers to execute arbitrary code via the hnd_parentalctrl_unblock function.
🎖@cveNotify
A vulnerability was discovered in Linksys Router E2500 with firmware 2.0.00, allows authenticated attackers to execute arbitrary code via the hnd_parentalctrl_unblock function.
🎖@cveNotify
E2500
色欲aⅴ国产日韩欧美视频_国产清纯白嫩初高生在线观看视频_美乳丧服未亡人在线观看_人妻少妇精品无码专区二区色伊
色欲aⅴ国产日韩欧美视频_国产清纯白嫩初高生在线观看视频_美乳丧服未亡人在线观看_人妻少妇精品无码专区二区色伊,亚洲春色无码永久在线观看,精品一区二区三区无码免费嫩草,91成人精品国语在线,国产无码亚洲天堂韩日,国产浪潮AV免费无码,亚洲A∨性无码国产精品
🚨 CVE-2024-24551
A security vulnerability has been identified in Bludit, allowing authenticated attackers to execute arbitrary code through the Image API. This vulnerability arises from improper handling of file uploads, enabling malicious actors to upload and execute PHP files.
🎖@cveNotify
A security vulnerability has been identified in Bludit, allowing authenticated attackers to execute arbitrary code through the Image API. This vulnerability arises from improper handling of file uploads, enabling malicious actors to upload and execute PHP files.
🎖@cveNotify
www.redguard.ch
Redguard AG - Security Advisory: Multiple Vulnerabilities in the Open Source CMS Bludit
In order to prepare for the OffSec Web Expert (OSWE) certification exam, I searched for open source web applications that I can analyze in a white box approach. I stumbled upon Bludit, an open source content management system for building websites and blogs.…
🚨 CVE-2024-24552
A session fixation vulnerability in Bludit allows an attacker to bypass the server's authentication if they can trick an administrator or any other user into authorizing a session ID of their choosing.
🎖@cveNotify
A session fixation vulnerability in Bludit allows an attacker to bypass the server's authentication if they can trick an administrator or any other user into authorizing a session ID of their choosing.
🎖@cveNotify
www.redguard.ch
Redguard AG - Security Advisory: Multiple Vulnerabilities in the Open Source CMS Bludit
In order to prepare for the OffSec Web Expert (OSWE) certification exam, I searched for open source web applications that I can analyze in a white box approach. I stumbled upon Bludit, an open source content management system for building websites and blogs.…
🚨 CVE-2024-24553
Bludit uses the SHA-1 hashing algorithm to compute password hashes. Thus, attackers could determine cleartext passwords with brute-force attacks due to the inherent speed of SHA-1. In addition, the salt that is computed by Bludit is generated with a non-cryptographically secure function.
🎖@cveNotify
Bludit uses the SHA-1 hashing algorithm to compute password hashes. Thus, attackers could determine cleartext passwords with brute-force attacks due to the inherent speed of SHA-1. In addition, the salt that is computed by Bludit is generated with a non-cryptographically secure function.
🎖@cveNotify
www.redguard.ch
Redguard AG - Security Advisory: Multiple Vulnerabilities in the Open Source CMS Bludit
In order to prepare for the OffSec Web Expert (OSWE) certification exam, I searched for open source web applications that I can analyze in a white box approach. I stumbled upon Bludit, an open source content management system for building websites and blogs.…
🚨 CVE-2025-35030
Medical Informatics Engineering Enterprise Health has a cross site request forgery vulnerability that allows an unauthenticated attacker to trick administrative users into clicking a crafted URL and perform actions on behalf of that administrative user. This issue is fixed as of 2025-04-08.
🎖@cveNotify
Medical Informatics Engineering Enterprise Health has a cross site request forgery vulnerability that allows an unauthenticated attacker to trick administrative users into clicking a crafted URL and perform actions on behalf of that administrative user. This issue is fixed as of 2025-04-08.
🎖@cveNotify
🚨 CVE-2025-35031
Medical Informatics Engineering Enterprise Health includes the user's current session token in debug output. An attacker could convince a user to send this output to the attacker, thus allowing the attacker to impersonate that user. This issue is fixed as of 2025-04-08.
🎖@cveNotify
Medical Informatics Engineering Enterprise Health includes the user's current session token in debug output. An attacker could convince a user to send this output to the attacker, thus allowing the attacker to impersonate that user. This issue is fixed as of 2025-04-08.
🎖@cveNotify
🚨 CVE-2025-35032
Medical Informatics Engineering Enterprise Health allows authenticated users to upload arbitrary files. The impact of this behavior depends on how files are accessed. This issue is fixed as of 2025-04-08.
🎖@cveNotify
Medical Informatics Engineering Enterprise Health allows authenticated users to upload arbitrary files. The impact of this behavior depends on how files are accessed. This issue is fixed as of 2025-04-08.
🎖@cveNotify
🚨 CVE-2024-6797
The DL Robots.txt WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
🎖@cveNotify
The DL Robots.txt WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
🎖@cveNotify
WPScan
DL Robots.txt <= 1.2 - Admin+ Stored XSS
See details on DL Robots.txt <= 1.2 - Admin+ Stored XSS CVE 2024-6797. View the latest Plugin Vulnerabilities on WPScan.
🚨 CVE-2025-4302
The Stop User Enumeration WordPress plugin before version 1.7.3 blocks REST API /wp-json/wp/v2/users/ requests for non-authorized users. However, this can be bypassed by URL-encoding the API path.
🎖@cveNotify
The Stop User Enumeration WordPress plugin before version 1.7.3 blocks REST API /wp-json/wp/v2/users/ requests for non-authorized users. However, this can be bypassed by URL-encoding the API path.
🎖@cveNotify
WPScan
Stop User Enumeration < 1.7.3 - Protection Bypass
See details on Stop User Enumeration < 1.7.3 - Protection Bypass CVE 2025-4302. View the latest Plugin Vulnerabilities on WPScan.
🚨 CVE-2025-44652
In Netgear RAX30 V1.0.10.94_3, the USERLIMIT_GLOBAL option is set to 0 in multiple bftpd-related configuration files. This can cause DoS attacks when unlimited users are connected.
🎖@cveNotify
In Netgear RAX30 V1.0.10.94_3, the USERLIMIT_GLOBAL option is set to 0 in multiple bftpd-related configuration files. This can cause DoS attacks when unlimited users are connected.
🎖@cveNotify
🚨 CVE-2025-44654
In Linksys E2500 3.0.04.002, the chroot_local_user option is enabled in the vsftpd configuration file. This could lead to unauthorized access to system files, privilege escalation, or use of the compromised server as a pivot point for internal network attacks.
🎖@cveNotify
In Linksys E2500 3.0.04.002, the chroot_local_user option is enabled in the vsftpd configuration file. This could lead to unauthorized access to system files, privilege escalation, or use of the compromised server as a pivot point for internal network attacks.
🎖@cveNotify
E2500
色欲aⅴ国产日韩欧美视频_国产清纯白嫩初高生在线观看视频_美乳丧服未亡人在线观看_人妻少妇精品无码专区二区色伊
色欲aⅴ国产日韩欧美视频_国产清纯白嫩初高生在线观看视频_美乳丧服未亡人在线观看_人妻少妇精品无码专区二区色伊,亚洲春色无码永久在线观看,精品一区二区三区无码免费嫩草,91成人精品国语在线,国产无码亚洲天堂韩日,国产浪潮AV免费无码,亚洲A∨性无码国产精品
🚨 CVE-2015-10140
The Ajax Load More plugin before 2.8.1.2 does not have authorisation in some of its AJAX actions, allowing any authenticated users, such as subscriber, to upload and delete arbitrary files.
🎖@cveNotify
The Ajax Load More plugin before 2.8.1.2 does not have authorisation in some of its AJAX actions, allowing any authenticated users, such as subscriber, to upload and delete arbitrary files.
🎖@cveNotify
WPScan
Ajax Load More < 2.8.1.2 - Subscriber+ File Upload & Deletion
See details on Ajax Load More < 2.8.1.2 - Subscriber+ File Upload & Deletion CVE 2015-10140. View the latest Plugin Vulnerabilities on WPScan.