2025-08-28 Daily Vulns
NEW:
CVE | vendor-product | description | metric | Referenceurl | title | GithubURL | |
---|---|---|---|---|---|---|---|
CVE-2024-37777 | n/a - n/a | O2OA v9.0.3 was discovered to contain a remote code execution (RCE) vulnerability via the mainOutput() function. | CNA n/a CVSS3.1: 8.8 - HIGH | 0 | Exploitation: pocAutomatable: noTechnical Impact: total | undefined | github |
CVE-1999-0159 | n/a - n/a | Attackers can crash a Cisco IOS router or device, provided they can get to an interactive prompt (such as a login). This applies to some IOS 9.x, 10.x, and 11.x releases. | CNA n/a CVSS3.1: 3.5 - LOW | 0 | Exploitation: noneAutomatable: noTechnical Impact: partial | undefined | github |
CVE-2025-20294 | Cisco - Cisco Unified Computing System (Managed) | Multiple vulnerabilities in the CLI and web-based management interface of Cisco UCS Manager Software could allow an authenticated, remote attacker with administrative privileges to perform command injection attacks on an affected system and elevate privileges to root. These vulnerabilities are due to insufficient input validation of command arguments supplied by the user. An attacker could exploit these vulnerabilities by authenticating to a device and submitting crafted input to the affected commands. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of the affected device with root-level privileges. | CVSS3.1: 6.5 - MEDIUM | 0 | Exploitation: noneAutomatable: noTechnical Impact: total | Cisco UCS Manager Software Command Injection Vulnerability | github |
CVE-2023-21125 | Google - Android | In btif_hh_hsdata_rpt_copy_cb of bta_hh.cc, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. | CNA n/a CVSS3.1: 7.8 - HIGH | 0 1 | Exploitation: noneAutomatable: noTechnical Impact: total | undefined | github |
This post is licensed under CC BY 4.0 by the author.