{
"Source": "CVE FEED",
"Title": "CVE-2025-47870 - Mattermost Team Invite ID Disclosure",
"Content": "CVE ID : CVE-2025-47870
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost versions 10.8.x <=<=<=<=
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-47870 - Mattermost Team Invite ID Disclosure",
"Content": "CVE ID : CVE-2025-47870
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost versions 10.8.x <=<=<=<=
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-49222 - Mattermost File Type Validation Bypass",
"Content": "CVE ID : CVE-2025-49222
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost versions 10.8.x <=<=<=<=<=
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-49222 - Mattermost File Type Validation Bypass",
"Content": "CVE ID : CVE-2025-49222
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost versions 10.8.x <=<=<=<=<=
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-49810 - Mattermost Information Disclosure",
"Content": "CVE ID : CVE-2025-49810
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost versions 10.5.x <=
Severity: 3.5 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-49810 - Mattermost Information Disclosure",
"Content": "CVE ID : CVE-2025-49810
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost versions 10.5.x <=
Severity: 3.5 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-53971 - Mattermost Authorization Bypass Vulnerability",
"Content": "CVE ID : CVE-2025-53971
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost versions 10.5.x <=<=
Severity: 3.8 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-53971 - Mattermost Authorization Bypass Vulnerability",
"Content": "CVE ID : CVE-2025-53971
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost versions 10.5.x <=<=
Severity: 3.8 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-8023 - Mattermost Path Traversal Vulnerability",
"Content": "CVE ID : CVE-2025-8023
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost versions 10.8.x <=<=<=<=
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-8023 - Mattermost Path Traversal Vulnerability",
"Content": "CVE ID : CVE-2025-8023
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost versions 10.8.x <=<=<=<=
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-8895 - WordPress Webhooks Plugin Unauthenticated Arbitrary File Copy Vulnerability",
"Content": "CVE ID : CVE-2025-8895
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : The WP Webhooks plugin for WordPress is vulnerable to arbitrary file copy due to missing validation of user-supplied input in all versions up to, and including, 3.3.5. This makes it possible for unauthenticated attackers to copy arbitrary files on the affected site's server to arbitrary locations. This can be used to copy the contents of wp-config.php into a text file which can then be accessed in a browser to reveal database credentials.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-8895 - WordPress Webhooks Plugin Unauthenticated Arbitrary File Copy Vulnerability",
"Content": "CVE ID : CVE-2025-8895
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : The WP Webhooks plugin for WordPress is vulnerable to arbitrary file copy due to missing validation of user-supplied input in all versions up to, and including, 3.3.5. This makes it possible for unauthenticated attackers to copy arbitrary files on the affected site's server to arbitrary locations. This can be used to copy the contents of wp-config.php into a text file which can then be accessed in a browser to reveal database credentials.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-47700 - Mattermost Server Open Redirect",
"Content": "CVE ID : CVE-2025-47700
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost Server versions 10.5.x <=
Severity: 3.5 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-47700 - Mattermost Server Open Redirect",
"Content": "CVE ID : CVE-2025-47700
Published : 21 Aug 2025, 8:15 a.m. | 1 hour, 54 minutes ago
Description : Mattermost Server versions 10.5.x <=
Severity: 3.5 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-8064 - WordPress Bible SuperSearch Stored Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-8064
Published : 21 Aug 2025, 10:15 a.m. | 1 hour, 58 minutes ago
Description : The Bible SuperSearch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the โselector_heightโ parameter in all versions up to, and including, 6.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-8064 - WordPress Bible SuperSearch Stored Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-8064
Published : 21 Aug 2025, 10:15 a.m. | 1 hour, 58 minutes ago
Description : The Bible SuperSearch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the โselector_heightโ parameter in all versions up to, and including, 6.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-9297 - Tenda i22 Remote Stack-Based Buffer Overflow Vulnerability",
"Content": "CVE ID : CVE-2025-9297
Published : Aug. 21, 2025, 1:15 p.m. | 1 hour, 2 minutes ago
Description : A vulnerability was detected in Tenda i22 1.0.0.3(4687). This impacts the function formWeixinAuthInfoGet of the file /goform/wxportalauth. Performing manipulation of the argument Type results in stack-based buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-9297 - Tenda i22 Remote Stack-Based Buffer Overflow Vulnerability",
"Content": "CVE ID : CVE-2025-9297
Published : Aug. 21, 2025, 1:15 p.m. | 1 hour, 2 minutes ago
Description : A vulnerability was detected in Tenda i22 1.0.0.3(4687). This impacts the function formWeixinAuthInfoGet of the file /goform/wxportalauth. Performing manipulation of the argument Type results in stack-based buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-9298 - Tenda M3 Stack-Based Buffer Overflow Vulnerability",
"Content": "CVE ID : CVE-2025-9298
Published : Aug. 21, 2025, 1:15 p.m. | 1 hour, 2 minutes ago
Description : A flaw has been found in Tenda M3 1.0.0.12. Affected is the function formQuickIndex of the file /goform/QuickIndex. Executing manipulation of the argument PPPOEPassword can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-9298 - Tenda M3 Stack-Based Buffer Overflow Vulnerability",
"Content": "CVE ID : CVE-2025-9298
Published : Aug. 21, 2025, 1:15 p.m. | 1 hour, 2 minutes ago
Description : A flaw has been found in Tenda M3 1.0.0.12. Affected is the function formQuickIndex of the file /goform/QuickIndex. Executing manipulation of the argument PPPOEPassword can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-9299 - Tenda M3 Stack-Based Buffer Overflow Vulnerability",
"Content": "CVE ID : CVE-2025-9299
Published : Aug. 21, 2025, 1:15 p.m. | 1 hour, 2 minutes ago
Description : A vulnerability has been found in Tenda M3 1.0.0.12. Affected by this vulnerability is the function formGetMasterPassengerAnalyseData of the file /goform/getMasterPassengerAnalyseData. The manipulation of the argument Time leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-9299 - Tenda M3 Stack-Based Buffer Overflow Vulnerability",
"Content": "CVE ID : CVE-2025-9299
Published : Aug. 21, 2025, 1:15 p.m. | 1 hour, 2 minutes ago
Description : A vulnerability has been found in Tenda M3 1.0.0.12. Affected by this vulnerability is the function formGetMasterPassengerAnalyseData of the file /goform/getMasterPassengerAnalyseData. The manipulation of the argument Time leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-9300 - Saitoha Libsixel Local Stack-Based Buffer Overflow",
"Content": "CVE ID : CVE-2025-9300
Published : Aug. 21, 2025, 1:15 p.m. | 1 hour, 2 minutes ago
Description : A vulnerability was found in saitoha libsixel up to 1.10.3. Affected by this issue is the function sixel_debug_print_palette of the file src/encoder.c of the component img2sixel. The manipulation results in stack-based buffer overflow. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is identified as 316c086e79d66b62c0c4bc66229ee894e4fdb7d1. Applying a patch is advised to resolve this issue.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-9300 - Saitoha Libsixel Local Stack-Based Buffer Overflow",
"Content": "CVE ID : CVE-2025-9300
Published : Aug. 21, 2025, 1:15 p.m. | 1 hour, 2 minutes ago
Description : A vulnerability was found in saitoha libsixel up to 1.10.3. Affected by this issue is the function sixel_debug_print_palette of the file src/encoder.c of the component img2sixel. The manipulation results in stack-based buffer overflow. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is identified as 316c086e79d66b62c0c4bc66229ee894e4fdb7d1. Applying a patch is advised to resolve this issue.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-47184 - Exagid EX10 XXE Injection Vulnerability",
"Content": "CVE ID : CVE-2025-47184
Published : Aug. 21, 2025, 1:15 p.m. | 1 hour, 2 minutes ago
Description : An XML external entities (XXE) injection vulnerability in the /init API endpoint in Exagid EX10 7.0.1p02 allows an authenticated, unprivileged attacker to achieve information disclosure and privilege escalation via a crafted ISys XML message.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-47184 - Exagid EX10 XXE Injection Vulnerability",
"Content": "CVE ID : CVE-2025-47184
Published : Aug. 21, 2025, 1:15 p.m. | 1 hour, 2 minutes ago
Description : An XML external entities (XXE) injection vulnerability in the /init API endpoint in Exagid EX10 7.0.1p02 allows an authenticated, unprivileged attacker to achieve information disclosure and privilege escalation via a crafted ISys XML message.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-9296 - Emlog Pro Unrestricted File Upload Vulnerability",
"Content": "CVE ID : CVE-2025-9296
Published : Aug. 21, 2025, 12:15 p.m. | 2 hours, 2 minutes ago
Description : A security vulnerability has been detected in Emlog Pro up to 2.5.18. This affects an unknown function of the file /admin/blogger.php?action=update_avatar. Such manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 5.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-9296 - Emlog Pro Unrestricted File Upload Vulnerability",
"Content": "CVE ID : CVE-2025-9296
Published : Aug. 21, 2025, 12:15 p.m. | 2 hours, 2 minutes ago
Description : A security vulnerability has been detected in Emlog Pro up to 2.5.18. This affects an unknown function of the file /admin/blogger.php?action=update_avatar. Such manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 5.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-9303 - TOTOLINK A720R Buffer Overflow in setParentalRules",
"Content": "CVE ID : CVE-2025-9303
Published : Aug. 21, 2025, 3:15 p.m. | 1 hour, 5 minutes ago
Description : A security flaw has been discovered in TOTOLINK A720R 4.1.5cu.630_B20250509. This issue affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. Performing manipulation of the argument desc results in buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-9303 - TOTOLINK A720R Buffer Overflow in setParentalRules",
"Content": "CVE ID : CVE-2025-9303
Published : Aug. 21, 2025, 3:15 p.m. | 1 hour, 5 minutes ago
Description : A security flaw has been discovered in TOTOLINK A720R 4.1.5cu.630_B20250509. This issue affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. Performing manipulation of the argument desc results in buffer overflow. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-9304 - SourceCodester Online Bank Management System SQL Injection Vulnerability",
"Content": "CVE ID : CVE-2025-9304
Published : Aug. 21, 2025, 3:15 p.m. | 1 hour, 5 minutes ago
Description : A weakness has been identified in SourceCodester Online Bank Management System 1.0. Impacted is an unknown function of the file /bank/show.php. Executing manipulation of the argument ID can lead to sql injection. The attack may be performed from a remote location. The exploit has been made available to the public and could be exploited.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-9304 - SourceCodester Online Bank Management System SQL Injection Vulnerability",
"Content": "CVE ID : CVE-2025-9304
Published : Aug. 21, 2025, 3:15 p.m. | 1 hour, 5 minutes ago
Description : A weakness has been identified in SourceCodester Online Bank Management System 1.0. Impacted is an unknown function of the file /bank/show.php. Executing manipulation of the argument ID can lead to sql injection. The attack may be performed from a remote location. The exploit has been made available to the public and could be exploited.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-9305 - SourceCodester Online Bank Management System SQL Injection",
"Content": "CVE ID : CVE-2025-9305
Published : Aug. 21, 2025, 3:15 p.m. | 1 hour, 5 minutes ago
Description : A security vulnerability has been detected in SourceCodester Online Bank Management System 1.0. The affected element is an unknown function of the file /bank/mnotice.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-9305 - SourceCodester Online Bank Management System SQL Injection",
"Content": "CVE ID : CVE-2025-9305
Published : Aug. 21, 2025, 3:15 p.m. | 1 hour, 5 minutes ago
Description : A security vulnerability has been detected in SourceCodester Online Bank Management System 1.0. The affected element is an unknown function of the file /bank/mnotice.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-55371 - jshERP Insecure Direct Object Reference (IDOR)",
"Content": "CVE ID : CVE-2025-55371
Published : Aug. 21, 2025, 3:15 p.m. | 1 hour, 5 minutes ago
Description : Incorrect access control in the component /controller/PersonController.java of jshERP v3.5 allows unauthorized attackers to obtain all the information of the handler by executing the getAllList method.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-55371 - jshERP Insecure Direct Object Reference (IDOR)",
"Content": "CVE ID : CVE-2025-55371
Published : Aug. 21, 2025, 3:15 p.m. | 1 hour, 5 minutes ago
Description : Incorrect access control in the component /controller/PersonController.java of jshERP v3.5 allows unauthorized attackers to obtain all the information of the handler by executing the getAllList method.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-55383 - Moss File Upload Vulnerability",
"Content": "CVE ID : CVE-2025-55383
Published : Aug. 21, 2025, 3:15 p.m. | 1 hour, 5 minutes ago
Description : Moss before v0.15 has a file upload vulnerability. The "upload" function configuration allows attackers to upload files of any extension to any location on the target server.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-55383 - Moss File Upload Vulnerability",
"Content": "CVE ID : CVE-2025-55383
Published : Aug. 21, 2025, 3:15 p.m. | 1 hour, 5 minutes ago
Description : Moss before v0.15 has a file upload vulnerability. The "upload" function configuration allows attackers to upload files of any extension to any location on the target server.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-52194 - Libsndfile IRCAM Audio File Buffer Overflow Vulnerability",
"Content": "CVE ID : CVE-2025-52194
Published : Aug. 21, 2025, 3:15 p.m. | 1 hour, 5 minutes ago
Description : A buffer overflow vulnerability exists in libsndfile version 1.2.2 and potentially earlier versions when processing malformed IRCAM audio files. The vulnerability occurs in the ircam_read_header function at src/ircam.c:164 during sample rate processing, leading to memory corruption and potential code execution.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-52194 - Libsndfile IRCAM Audio File Buffer Overflow Vulnerability",
"Content": "CVE ID : CVE-2025-52194
Published : Aug. 21, 2025, 3:15 p.m. | 1 hour, 5 minutes ago
Description : A buffer overflow vulnerability exists in libsndfile version 1.2.2 and potentially earlier versions when processing malformed IRCAM audio files. The vulnerability occurs in the ircam_read_header function at src/ircam.c:164 during sample rate processing, leading to memory corruption and potential code execution.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
{
"Source": "CVE FEED",
"Title": "CVE-2025-53251 - An-Themes Pin WP RCE File Upload Vulnerability",
"Content": "CVE ID : CVE-2025-53251
Published : Aug. 21, 2025, 3:15 p.m. | 1 hour, 5 minutes ago
Description : Unrestricted Upload of File with Dangerous Type vulnerability in An-Themes Pin WP allows Upload a Web Shell to a Web Server.This issue affects Pin WP: from n/a through 6.9.
Severity: 9.9 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น
"Source": "CVE FEED",
"Title": "CVE-2025-53251 - An-Themes Pin WP RCE File Upload Vulnerability",
"Content": "CVE ID : CVE-2025-53251
Published : Aug. 21, 2025, 3:15 p.m. | 1 hour, 5 minutes ago
Description : Unrestricted Upload of File with Dangerous Type vulnerability in An-Themes Pin WP allows Upload a Web Shell to a Web Server.This issue affects Pin WP: from n/a through 6.9.
Severity: 9.9 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "21 Aug 2025",
"Type": "Vulnerability"
}
๐น t.me/cvedetector ๐น