Aggregator
CVE-2025-9288 | browserify sha.js up to 2.4.11 input validation (GHSA-95m3-7q98-8xr5)
1 hour 2 minutes ago
A vulnerability marked as problematic has been reported in browserify sha.js up to 2.4.11. Affected is an unknown function. The manipulation leads to improper input validation.
This vulnerability is documented as CVE-2025-9288. The attack can be initiated remotely. There is not any exploit available.
To fix this issue, it is recommended to deploy a patch.
vuldb.com
Honeypot-ловушка поймала взломщиков FreePBX «на горячем». Каждое их действие записано — защитники знают всё
1 hour 5 minutes ago
Массовые взломы стартовали 21 августа, однако полная картина происходящего стала доступна только сейчас.
CVE-2025-9262 | wong2 mcp-cli 1.13.0 oAuth /src/oauth/provider.js redirectToAuthorization os command injection
1 hour 17 minutes ago
A vulnerability was found in wong2 mcp-cli 1.13.0. It has been rated as critical. Affected is the function redirectToAuthorization of the file /src/oauth/provider.js of the component oAuth Handler. This manipulation causes os command injection.
This vulnerability appears as CVE-2025-9262. The attack may be initiated remotely. In addition, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2025-10318 | JeecgBoot up to 3.8.2 WebSocket Message sendWebSocketMsg userIds improper authorization
1 hour 24 minutes ago
A vulnerability was found in JeecgBoot up to 3.8.2. It has been classified as critical. Affected by this vulnerability is an unknown functionality of the file /api/system/sendWebSocketMsg of the component WebSocket Message Handler. The manipulation of the argument userIds leads to improper authorization.
This vulnerability is documented as CVE-2025-10318. The attack can be initiated remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2025-9296 | Emlog Pro up to 2.5.18 blogger.php?action=update_avatar image unrestricted upload (EUVD-2025-25414)
1 hour 24 minutes ago
A vulnerability was found in Emlog Pro up to 2.5.18. It has been declared as critical. This affects an unknown function of the file /admin/blogger.php?action=update_avatar. Such manipulation of the argument image leads to unrestricted upload.
This vulnerability is referenced as CVE-2025-9296. It is possible to launch the attack remotely. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2025-9300 | saitoha libsixel up to 1.10.3 img2sixel src/encoder.c sixel_debug_print_palette stack-based overflow (Issue 200 / Nessus ID 260187)
1 hour 24 minutes ago
A vulnerability labeled as critical has been found in saitoha libsixel up to 1.10.3. Affected by this issue is the function sixel_debug_print_palette of the file src/encoder.c of the component img2sixel. The manipulation results in stack-based buffer overflow.
This vulnerability is cataloged as CVE-2025-9300. The attack must be initiated from a local position. Furthermore, there is an exploit available.
Applying a patch is advised to resolve this issue.
vuldb.com
CVE-2004-1945 | Kinesphere eXchange POP3 4.0 Mail From memory corruption (EDB-24028 / XFDB-15922)
1 hour 30 minutes ago
A vulnerability identified as critical has been detected in Kinesphere eXchange POP3 4.0. Affected is an unknown function of the component Mail From Handler. The manipulation leads to memory corruption.
This vulnerability is traded as CVE-2004-1945. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2004-2501 | MailEnable Professional Edition/Enterprise Edition IMAP Service memory corruption (EDB-658 / Nessus ID 15852)
1 hour 30 minutes ago
A vulnerability was found in MailEnable Professional Edition and Enterprise Edition and classified as critical. This impacts an unknown function of the component IMAP Service. Such manipulation leads to memory corruption.
This vulnerability is traded as CVE-2004-2501. The attack may be launched remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2004-1908 | McAfee Freescan ActiveX Object mcfreescan.comcfreescan.1 getspecialfolderlocation information disclosure (EDB-23926 / XFDB-15782)
1 hour 30 minutes ago
A vulnerability, which was classified as problematic, was found in McAfee Freescan. Impacted is the function getspecialfolderlocation of the file mcfreescan.comcfreescan.1 of the component ActiveX Object. The manipulation results in information disclosure.
This vulnerability is reported as CVE-2004-1908. The attack can be launched remotely. Moreover, an exploit is present.
vuldb.com
CVE-2004-0292 | Karjasoft Sami HTTP Server 1.0.4 HTTP GET Request memory corruption (EDB-23714 / Nessus ID 12073)
1 hour 30 minutes ago
A vulnerability was found in Karjasoft Sami HTTP Server 1.0.4. It has been rated as critical. The affected element is an unknown function of the component HTTP GET Request Handler. This manipulation causes memory corruption.
This vulnerability is registered as CVE-2004-0292. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
vuldb.com
CVE-2004-1883 | IPSwitch WS FTP Server 4.0.2 memory corruption (EDB-165 / Nessus ID 14598)
1 hour 30 minutes ago
A vulnerability marked as problematic has been reported in IPSwitch WS FTP Server 4.0.2. This affects an unknown function. The manipulation leads to memory corruption.
This vulnerability is listed as CVE-2004-1883. The attack must be carried out locally. In addition, an exploit is available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2004-2114 | Internetnow Proxynow 2.6/2.75 Proxy stack-based overflow (EDB-23608 / XFDB-14955)
1 hour 30 minutes ago
A vulnerability identified as critical has been detected in Internetnow Proxynow 2.6/2.75. Impacted is an unknown function of the component Proxy. The manipulation leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2004-2114. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
vuldb.com
Читеры помогают бороться с читерами. Разработчики CoD препарируют их для улучшения защиты
1 hour 35 minutes ago
Из костей нарушителей строят неприступную крепость честной игры.
CVE-2025-39744 | Linux Kernel up to 6.6.102/6.12.42/6.15.10/6.16.1 rcu_read_unlock state issue (WID-SEC-2025-2040)
1 hour 37 minutes ago
A vulnerability labeled as critical has been found in Linux Kernel up to 6.6.102/6.12.42/6.15.10/6.16.1. This impacts the function rcu_read_unlock. Executing manipulation can lead to state issue.
This vulnerability is tracked as CVE-2025-39744. The attack is only possible within the local network. No exploit exists.
The affected component should be upgraded.
vuldb.com
CVE-2025-39745 | Linux Kernel up to 6.15.10/6.16.1 rcu kernel/rcu/rcutorture.c rcutorture_one_extend_check privilege escalation (WID-SEC-2025-2040)
1 hour 37 minutes ago
A vulnerability has been found in Linux Kernel up to 6.15.10/6.16.1 and classified as problematic. Impacted is the function rcutorture_one_extend_check of the file kernel/rcu/rcutorture.c of the component rcu Handler. The manipulation leads to privilege escalation.
This vulnerability is traded as CVE-2025-39745. Access to the local network is required for this attack to succeed. There is no exploit available.
The affected component should be upgraded.
vuldb.com
CVE-2025-39742 | Linux Kernel up to 6.16.1 RDMA find_hw_thread_mask divide by zero (WID-SEC-2025-2040)
1 hour 37 minutes ago
A vulnerability was found in Linux Kernel up to 6.16.1. It has been rated as critical. The affected element is the function find_hw_thread_mask of the component RDMA. This manipulation causes divide by zero.
The identification of this vulnerability is CVE-2025-39742. The attack needs to be done within the local network. There is no exploit available.
Upgrading the affected component is advised.
vuldb.com
CVE-2025-39743 | Linux Kernel up to 6.16.1 jfs clear_inode fileset privilege escalation (WID-SEC-2025-2040)
1 hour 37 minutes ago
A vulnerability identified as critical has been detected in Linux Kernel up to 6.16.1. This affects the function clear_inode of the component jfs. Performing manipulation of the argument fileset results in privilege escalation.
This vulnerability is identified as CVE-2025-39743. The attack can only be performed from the local network. There is not any exploit available.
You should upgrade the affected component.
vuldb.com
CVE-2025-27234 | Zabbix Agent 2 smartctl Plugin up to 5.0.46 Parameter smart.disk.get os command injection (WID-SEC-2025-2042)
1 hour 37 minutes ago
A vulnerability, which was classified as critical, has been found in Zabbix Agent 2 smartctl Plugin up to 5.0.46. This affects an unknown part of the file smart.disk.get of the component Parameter Handler. The manipulation leads to os command injection.
This vulnerability is referenced as CVE-2025-27234. The attack needs to be initiated within the local network. No exploit is available.
vuldb.com
CVE-2025-27233 | Zabbix Agent 2 smartctl Plugin up to 6.0.39/7.0.10/7.2.4 Parameter smart.disk.get command injection (WID-SEC-2025-2042)
1 hour 37 minutes ago
A vulnerability, which was classified as critical, was found in Zabbix Agent 2 smartctl Plugin up to 6.0.39/7.0.10/7.2.4. This vulnerability affects unknown code of the component Parameter Handler. The manipulation of the argument smart.disk.get results in command injection.
This vulnerability is identified as CVE-2025-27233. The attack can only be performed from the local network. There is not any exploit available.
vuldb.com