Aggregator
光棍节开放注册微信抽奖活动,先送20个账号注册码或300论坛币,周四下午两点开奖,详见:【开放注册公告】吾爱破解论坛2025年11月11日光棍节开放注册公告。
3 months 1 week ago
PHP Cryptomining Campaign: October/November 2025
3 months 1 week ago
From Aug–Oct 2025, GreyNoise observed a surge in exploitation attempts against PHP and PHP-based frameworks as attackers deployed cryptominers—driven by rising Bitcoin prices and higher mining payoffs.
光棍节开放注册微信抽奖活动,先送20个账号注册码或300论坛币,周四下午两点开奖,详见:【开放注册公告】吾爱破解论坛2025年11月11日光棍节开放注册公告。
3 months 1 week ago
嗯,用户让我帮忙总结一篇文章的内容,控制在100字以内,而且不需要特定的开头。首先,我得仔细阅读用户提供的文章内容。看起来文章主要讲的是环境异常,完成验证后才能继续访问,并且有一个“去验证”的链接。
接下来,我要分析用户的需求。用户可能是在遇到环境异常的情况下,需要快速了解问题所在。所以总结的时候要简洁明了,突出关键点:环境异常、验证、继续访问。
然后,我需要考虑如何用最简练的语言表达这些信息。可能的结构是先说明问题,再指出解决方法和结果。比如:“当前环境异常,需完成验证后方可继续访问。”
最后,检查字数是否在限制内,并确保没有使用任何不需要的开头词。这样就能满足用户的需求了。
当前环境异常,需完成验证后方可继续访问。
CVE-2010-4756 | GNU C Library resource management (Nessus ID 83594 / ID 165966)
3 months 1 week ago
A vulnerability was found in GNU C Library. It has been declared as problematic. The affected element is an unknown function. Such manipulation leads to improper resource management.
This vulnerability is listed as CVE-2010-4756. The attack may be performed from remote. There is no available exploit.
vuldb.com
CVE-2017-5950 | yaml-cpp 0.5.3 YAML File HandleNode memory corruption (ID 459 / Nessus ID 107214)
3 months 1 week ago
A vulnerability classified as problematic was found in yaml-cpp 0.5.3. This issue affects the function SingleDocParser::HandleNode of the component YAML File Handler. The manipulation results in memory corruption.
This vulnerability is identified as CVE-2017-5950. The attack is only possible with local access. There is not any exploit available.
Upgrading the affected component is advised.
vuldb.com
CVE-2018-20573 | yaml-cpp 0.6.2 EnsureTokensInQueue memory corruption (Issue 655)
3 months 1 week ago
A vulnerability, which was classified as problematic, has been found in yaml-cpp 0.6.2. Affected by this vulnerability is the function Scanner::EnsureTokensInQueue. Performing manipulation results in memory corruption.
This vulnerability is known as CVE-2018-20573. Remote exploitation of the attack is possible. No exploit is available.
vuldb.com
CVE-2018-20574 | yaml-cpp 0.6.2 YAML File HandleFlowMap memory corruption (Issue 654)
3 months 1 week ago
A vulnerability, which was classified as problematic, was found in yaml-cpp 0.6.2. Affected by this issue is the function SingleDocParser::HandleFlowMap of the component YAML File Handler. Executing manipulation can lead to memory corruption.
This vulnerability is handled as CVE-2018-20574. The attack can be executed remotely. There is not any exploit available.
vuldb.com
CVE-2019-6285 | yaml-cpp 0.6.2 YAML File HandleFlowSequence memory corruption (Issue 660)
3 months 1 week ago
A vulnerability labeled as problematic has been found in yaml-cpp 0.6.2. This impacts the function SingleDocParser::HandleFlowSequence of the component YAML File Handler. Executing manipulation can lead to memory corruption.
This vulnerability is registered as CVE-2019-6285. It is possible to launch the attack remotely. No exploit is available.
vuldb.com
CVE-2020-4429 | IBM Data Risk Manager up to 2.0.6 hard-coded password (XFDB-180534)
3 months 1 week ago
A vulnerability was found in IBM Data Risk Manager up to 2.0.6. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation results in use of hard-coded password.
This vulnerability is reported as CVE-2020-4429. The attack can be launched remotely. No exploit exists.
vuldb.com
CVE-2020-29651 | python-py up to 1.9.0 incorrect regex (Nessus ID 211850)
3 months 1 week ago
A vulnerability labeled as critical has been found in python-py up to 1.9.0. Affected by this vulnerability is an unknown functionality. The manipulation results in incorrect regular expression.
This vulnerability is cataloged as CVE-2020-29651. The attack must originate from the local network. There is no exploit available.
It is advisable to implement a patch to correct this issue.
vuldb.com
CVE-2020-11987 | Oracle FLEXCUBE Universal Banking up to 14.4.0 Apache Batik input validation (Nessus ID 242417)
3 months 1 week ago
A vulnerability described as critical has been identified in Oracle FLEXCUBE Universal Banking up to 14.4.0. This vulnerability affects unknown code of the component Apache Batik. Such manipulation leads to improper input validation.
This vulnerability is uniquely identified as CVE-2020-11987. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is recommended.
vuldb.com
CVE-2020-11987 | Oracle Enterprise Repository 11.1.1.7.0 Apache Batik input validation (Nessus ID 242417)
3 months 1 week ago
A vulnerability was found in Oracle Enterprise Repository 11.1.1.7.0. It has been rated as critical. Affected is an unknown function of the component Apache Batik. The manipulation leads to improper input validation.
This vulnerability is listed as CVE-2020-11987. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is advised.
vuldb.com
CVE-2020-11987 | Oracle Fusion Middleware MapViewer 12.2.1.4.0 Apache Batik input validation (Nessus ID 242417)
3 months 1 week ago
A vulnerability categorized as critical has been discovered in Oracle Fusion Middleware MapViewer 12.2.1.4.0. Affected by this vulnerability is an unknown functionality of the component Apache Batik. The manipulation results in improper input validation.
This vulnerability is cataloged as CVE-2020-11987. The attack may be launched remotely. There is no exploit available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2020-14931 | DMitry 1.3a Whois nic_format_buff Response out-of-bounds write (Nessus ID 209532)
3 months 1 week ago
A vulnerability, which was classified as critical, has been found in DMitry 1.3a. This impacts the function nic_format_buff of the component Whois Handler. The manipulation as part of Response leads to out-of-bounds write.
This vulnerability is uniquely identified as CVE-2020-14931. The attack is possible to be carried out remotely. No exploit exists.
vuldb.com
CVE-2025-6204 | Dassault Systèmes DELMIA Apriso up to 2025 code injection (EUVD-2025-23494 / Nessus ID 272202)
3 months 1 week ago
A vulnerability was found in Dassault Systèmes DELMIA Apriso up to 2025. It has been rated as critical. This affects an unknown part. This manipulation causes code injection.
This vulnerability is handled as CVE-2025-6204. The attack can be initiated remotely. Additionally, an exploit exists.
vuldb.com
CVE-2025-8734 | GNU Bison up to 3.8.2 src/scan-code.c code_free double free (Issue 115 / EUVD-2025-24007)
3 months 1 week ago
This issue seems to be a false positive. Please check the referenced sources and consider omitting this entry entirely. The issue could not be reproduced from a GNU Bison 3.8.2 tarball run in a Fedora 42 container.
vuldb.com
CVE-2025-8733 | GNU Bison up to 3.8.2 obprintf.c __obstack_vprintf_internal assertion (113/114 / EUVD-2025-24010)
3 months 1 week ago
Further analysis revealed that this issues is a false-positive. Please take a look at the sources mentioned and consider not using this entry at all. The issue could not be reproduced from a GNU Bison 3.8.2 tarball run in a Fedora 42 container.
vuldb.com
CVE-2025-12207 | Kamailio 5.5 Grammar Rule src/core/cfg.y yyerror_at null pointer dereference (EUVD-2025-36068 / Nessus ID 271828)
3 months 1 week ago
A vulnerability categorized as problematic has been discovered in Kamailio 5.5. This affects the function yyerror_at of the file src/core/cfg.y of the component Grammar Rule Handler. Such manipulation leads to null pointer dereference.
This vulnerability is documented as CVE-2025-12207. The attack needs to be performed locally. Additionally, an exploit exists.
The actual existence of this vulnerability is currently in question.
This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2025-12206 | Kamailio 5.5 src/core/rvalue.c rve_is_constant null pointer dereference (EUVD-2025-36070 / Nessus ID 271818)
3 months 1 week ago
A vulnerability was found in Kamailio 5.5. It has been rated as problematic. The impacted element is the function rve_is_constant of the file src/core/rvalue.c. This manipulation causes null pointer dereference.
This vulnerability is registered as CVE-2025-12206. The attack needs to be launched locally. Furthermore, an exploit is available.
It is still unclear if this vulnerability genuinely exists.
This attack requires manipulating config files which might not be a realistic scenario in many cases. The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com