Post

2025-06-11 Daily Vulns

NEW:

CVEvendor-productdescriptionmetricReferenceurltitleGithubURL 
CVE-2018-8373Microsoft - Internet Explorer 9Microsoft - Internet Explorer 11Microsoft - Internet Explorer 10A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka “Scripting Engine Memory Corruption Vulnerability.” This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390.CNA n/a CVSS3.1: 7.5 - HIGH0 1 2Exploitation: activeAutomatable: noTechnical Impact: totalundefinedgithub
CVE-2022-39799SAP SE - SAP NetWeaver AS ABAP (SAP GUI for HTML within the Fiori Launchpad)An attacker with no prior authentication could craft and send malicious script to SAP GUI for HTML within Fiori Launchpad, resulting in reflected cross-site scripting attack. This could lead to stealing session information and impersonating the affected user.CNA n/a CVSS3.1: 6.1 - MEDIUM0 1Exploitation: noneAutomatable: noTechnical Impact: partialundefinedgithub
CVE-2013-6954n/a - n/aThe png_do_expand_palette function in libpng before 1.6.8 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via (1) a PLTE chunk of zero bytes or (2) a NULL palette, related to pngrtran.c and pngset.c.CNA n/a CVSS3.1: 6.5 - MEDIUM0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26Exploitation: noneAutomatable: noTechnical Impact: partialundefinedgithub
CVE-2025-40656Dmacroweb - DM Corporative CMSA SQL injection vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to retrieve, create, update and delete databases through the cod parameter in /administer/node-selection/data.asp.CVSS4.0: 9.3 - CRITICAL0Exploitation: noneAutomatable: yesTechnical Impact: totalSQL injection vulnerability in DM Corporative CMSgithub
This post is licensed under CC BY 4.0 by the author.