2025-06-17 Daily Vulns
NEW:
CVE | vendor-product | description | metric | Referenceurl | title | GithubURL | |
---|---|---|---|---|---|---|---|
CVE-2021-43584 | n/a - n/a | DOM-based Cross Site Scripting (XSS vulnerability in ‘Tail Event Logs’ functionality in Nagios Nagios Cross-Platform Agent (NCPA) before 2.4.0 allows attackers to run arbitrary code via the name element when filtering for a log. | CNA n/a CVSS3.1: 4.8 - MEDIUM | 0 | Exploitation: noneAutomatable: noTechnical Impact: total | undefined | github |
CVE-2022-4961 | Weitong - Mall | A vulnerability was found in Weitong Mall 1.0.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file platform-shop\src\main\resources\com\platform\dao\OrderDao.xml. The manipulation of the argument sidx/order leads to sql injection. The associated identifier of this vulnerability is VDB-250243.In Weitong Mall 1.0.0 wurde eine kritische Schwachstelle ausgemacht. Dabei geht es um eine nicht genauer bekannte Funktion der Datei platform-shop\src\main\resources\com\platform\dao\OrderDao.xml. Durch Manipulation des Arguments sidx/order mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. | CVSS3.1: 5.5 - MEDIUM | 0 1 2 | Exploitation: noneAutomatable: yesTechnical Impact: total | Weitong Mall OrderDao.xml sql injection | github |
CVE-2015-10126 | n/a - Easy2Map Photos Plugin | A vulnerability classified as critical was found in Easy2Map Photos Plugin 1.0.1 on WordPress. This vulnerability affects unknown code. The manipulation leads to sql injection. The attack can be initiated remotely. Upgrading to version 1.1.0 is able to address this issue. The patch is identified as 503d9ee2482d27c065f78d9546f076a406189908. It is recommended to upgrade the affected component. VDB-241318 is the identifier assigned to this vulnerability.In Easy2Map Photos Plugin 1.0.1 für WordPress wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Dabei geht es um eine nicht genauer bekannte Funktion. Dank der Manipulation mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Ein Aktualisieren auf die Version 1.1.0 vermag dieses Problem zu lösen. Der Patch wird als 503d9ee2482d27c065f78d9546f076a406189908 bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen. | CVSS3.1: 6.3 - MEDIUM | 0 1 2 | Exploitation: noneAutomatable: yesTechnical Impact: total | Easy2Map Photos Plugin sql injection | github |
CVE-2025-24311 | Broadcom - BCM5820XDell - ControlVault3Dell - ControlVault3 Plus | An out-of-bounds read vulnerability exists in the cv_send_blockdata functionality of Dell ControlVault3 prior to 5.15.10.14 and Dell ControlVault3 Plus prior to 6.2.26.36. A specially crafted ControlVault API call can lead to an information leak. An attacker can issue an API call to trigger this vulnerability. | CVSS3.1: 8.4 - HIGH | 0 | Exploitation: noneAutomatable: noTechnical Impact: partial | Dell ControlVault3/ControlVault3 Plus cv_send_blockdata out-of-bounds read vulnerability | github |
CVE-2025-24388 | OTRS AG - OTRSOTRS AG - ((OTRS)) Community Edition | A vulnerability in the OTRS Admin Interface and Agent Interface (versions before OTRS 8) allow parameter injection due to for an autheniticated agent or admin user. This issue affects: * OTRS 7.0.X * OTRS 8.0.X * OTRS 2023.X * OTRS 2024.X * OTRS 2025.X * ((OTRS)) Community Edition: 6.0.x Products based on the ((OTRS)) Community Edition also very likely to be affected | CVSS3.1: 3.8 - LOW | 0 | Exploitation: noneAutomatable: noTechnical Impact: partial | Unsafe handling of AJAX calls | github |
CVE-2025-1411 | IBM - Security Verify Directory | IBM Security Verify Directory Container 10.0.0.0 through 10.0.3.1 could allow a local user to execute commands as root due to execution with unnecessary privileges. | CVSS3.1: 7.8 - HIGH | 0 | Exploitation: noneAutomatable: noTechnical Impact: total | IBM Security Verify Directory Container command execution | github |
This post is licensed under CC BY 4.0 by the author.