Post

2025-08-21 Daily Vulns

NEW:

CVEvendor-productdescriptionmetricReferenceurltitleGithubURL 
CVE-2009-10005ContentKeeper Technologies - Web ApplianceContentKeeper Web Appliance (now maintained by Impero Software) versions prior to 125.10 expose the mimencode binary via a CGI endpoint, allowing unauthenticated attackers to retrieve arbitrary files from the filesystem. By crafting a POST request to /cgi-bin/ck/mimencode with traversal and output parameters, attackers can read sensitive files such as /etc/passwd outside the webroot.CVSS4.0: 8.7 - HIGH0 1 2 3 4Exploitation: pocAutomatable: yesTechnical Impact: partialContentKeeper Web Appliance < 125.10 Arbitrary File Access via mimencodegithub
CVE-2010-20010Foxit Software - Foxit PDF ReaderFoxit PDF Reader before 4.2.0.0928 does not properly bound-check the /Title entry in the PDF Info dictionary. A specially crafted PDF with an overlong Title string can overflow a fixed-size stack buffer, corrupt the Structured Exception Handler (SEH) chain, and lead to arbitrary code execution in the context of the user who opens the file.CVSS4.0: 8.4 - HIGH0 1 2 3 4 5Exploitation: noneAutomatable: noTechnical Impact: partialFoxit PDF Reader < 4.2.0.0928 Title Stack Buffer Overflowgithub
CVE-2011-10022SPlayer Project - SPlayerSPlayer version 3.7 and earlier is vulnerable to a stack-based buffer overflow when processing HTTP responses containing an overly long Content-Type header. The vulnerability occurs due to improper bounds checking on the header value, allowing an attacker to overwrite the Structured Exception Handler (SEH) and execute arbitrary code. Exploitation requires the victim to open a media file that triggers an HTTP request to a malicious server, which responds with a crafted Content-Type header.CVSS4.0: 8.6 - HIGH0 1 2 3 4Exploitation: noneAutomatable: noTechnical Impact: partialSPlayer 3.7 Content-Type Header Buffer Overflowgithub
CVE-2025-46932Adobe - Adobe Experience ManagerAdobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.CVSS3.1: 5.4 - MEDIUM0Exploitation: noneAutomatable: noTechnical Impact: partialAdobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)github
CVE-2024-12223Nutanix - Prism CentralPrism Central versions prior to 2024.3.1 are vulnerable to a stored cross-site scripting attack via the Events component, allowing an attacker to hijack a victim user’s session and perform actions in their security context.CVSS4.0: 9.3 - CRITICAL0Exploitation: noneAutomatable: yesTechnical Impact: totalStored Cross-site Scripting (XSS) in Nutanix Prism Centralgithub
CVE-2025-1142IBM - Edge Application ManagerIBM Edge Application Manager 4.5 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.CVSS3.1: 5.4 - MEDIUM0Exploitation: noneAutomatable: noTechnical Impact: partialIBM Edge Application Manager server-side request forgerygithub
CVE-2024-39954Apache Software Foundation - Apache EventMesh RuntimeCWE-918 Server-Side Request Forgery (SSRF) in eventmesh-runtime module in WebhookUtil.java on windows\linux\mac os e.g. allows the attacker can abuse functionality on the server to read or update internal resources. Users are recommended to upgrade to version 1.12.0 or use the master branch , which fixes this issue.CVSS3.1: 6.3 - MEDIUM0Exploitation: noneAutomatable: noTechnical Impact: partialApache EventMesh Runtime: SSRFgithub
This post is licensed under CC BY 4.0 by the author.