<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[Dark C0d3rs - CVE Details]]></title>
		<link>https://darkcoders.wiki/</link>
		<description><![CDATA[Dark C0d3rs - https://darkcoders.wiki]]></description>
		<pubDate>Sat, 09 May 2026 11:55:09 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[CVE-2025-24071 - NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File]]></title>
			<link>https://darkcoders.wiki/Thread-CVE-2025-24071-NTLM-Hash-Leak-via-RAR-ZIP-Extraction-and-library-ms-File</link>
			<pubDate>Fri, 21 Mar 2025 16:49:31 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-CVE-2025-24071-NTLM-Hash-Leak-via-RAR-ZIP-Extraction-and-library-ms-File</guid>
			<description><![CDATA[Windows Explorer automatically initiates an SMB authentication request when a .library-ms file is extracted from a .rar archive, leading to NTLM hash disclosure. The user does not need to open or execute the file—simply extracting it is enough to trigger the leak.<br />
<br />
blog post:<br />
You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
<br />
POC: You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
<br />
&gt;&gt;python poc.py<br />
<br />
&gt;&gt;enter file name: your file name<br />
<br />
&gt;&gt;enter IP: attacker IP]]></description>
			<content:encoded><![CDATA[Windows Explorer automatically initiates an SMB authentication request when a .library-ms file is extracted from a .rar archive, leading to NTLM hash disclosure. The user does not need to open or execute the file—simply extracting it is enough to trigger the leak.<br />
<br />
blog post:<br />
You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
<br />
POC: You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
<br />
&gt;&gt;python poc.py<br />
<br />
&gt;&gt;enter file name: your file name<br />
<br />
&gt;&gt;enter IP: attacker IP]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Daily CVE Record Information - 2025-03-20]]></title>
			<link>https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-20</link>
			<pubDate>Thu, 20 Mar 2025 11:30:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-20</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-22228</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">BCryptPasswordEncoder.matches(CharSequence,String) will incorrectly return true for passwords larger than 72 characters as long as the first 72 characters are the same.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2505</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Age Gate plugin for WordPress is vulnerable to Local PHP File Inclusion in all versions up to, and including, 3.5.3 via the 'lang' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary PHP files on the server, allowing the execution of code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2108</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The 140+ Widgets | Xpro Addons For Elementor – FREE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘Site Title’ widget's 'title_tag' and 'html_tag' parameters in all versions up to, and including, 1.4.6.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1796</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability in langgenius/dify v0.10.1 allows an attacker to take over any account, including administrator accounts, by exploiting a weak pseudo-random number generator (PRNG) used for generating password reset codes. The application uses `random.randint` for this purpose, which is not suitable for cryptographic use and can be cracked. An attacker with access to workflow tools can extract the PRNG output and predict future password reset codes, leading to a complete compromise of the application.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1770</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Event Manager, Events Calendar, Tickets, Registrations – Eventin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.0.24 via the 'style' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1766</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Event Manager, Events Calendar, Tickets, Registrations – Eventin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'payment_complete' function in all versions up to, and including, 4.0.24. This makes it possible for unauthenticated attackers to update the status of ticket payments to 'completed', possibly resulting in financial loss.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1474</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In mlflow/mlflow version 2.18, an admin is able to create a new user account without setting a password. This vulnerability could lead to security risks, as accounts without passwords may be susceptible to unauthorized access. Additionally, this issue violates best practices for secure user account management. The issue is fixed in version 2.19.0.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">3.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1473</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A Cross-Site Request Forgery (CSRF) vulnerability exists in the Signup feature of mlflow/mlflow versions 2.17.0 to 2.20.1. This vulnerability allows an attacker to create a new account, which may be used to perform unauthorized actions on behalf of the malicious user.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1451</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability in parisneo/lollms-webui v13 arises from the server's handling of multipart boundaries in file uploads. The server does not limit or validate the length of the boundary or the characters appended to it, allowing an attacker to craft requests with excessively long boundaries, leading to resource exhaustion and eventual denial of service (DoS). Despite an attempted patch in commit 483431bb, which blocked hyphen characters from being appended to the multipart boundary, the fix is insufficient. The server remains vulnerable if other characters (e.g., '4', 'a') are used instead of hyphens. This allows attackers to exploit the vulnerability using different characters, causing resource exhaustion and service unavailability.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1385</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">When the library bridge feature is enabled, the clickhouse-library-bridge exposes an HTTP API on localhost. This allows clickhouse-server to dynamically load a library from a specified path and execute it in an isolated process. Combined with the ClickHouse table engine functionality that permits file uploads to specific directories, a misconfigured server can be exploited by an attacker with privilege to access to both table engines to execute arbitrary code on the ClickHouse server.<br />
<br />
You can check if your ClickHouse server is vulnerable to this vulnerability by inspecting the configuration file and confirming if the following setting is enabled:<br />
<br />
&lt;library_bridge&gt;<br />
   &lt;port&gt;9019&lt;/port&gt;<br />
&lt;/library_bridge&gt;</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1314</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Custom Twitter Feeds – A Tweets Widget or X Feed Widget plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.5. This is due to missing or incorrect nonce validation on the ctf_clear_cache_admin() function. This makes it possible for unauthenticated attackers to reset the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1040</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">AutoGPT versions 0.3.4 and earlier are vulnerable to a Server-Side Template Injection (SSTI) that could lead to Remote Code Execution (RCE). The vulnerability arises from the improper handling of user-supplied format strings in the `AgentOutputBlock` implementation, where malicious input is passed to the Jinja2 templating engine without adequate security measures. Attackers can exploit this flaw to execute arbitrary commands on the host system. The issue is fixed in version 0.4.0.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0655</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability in man-group/dtale versions 3.15.1 allows an attacker to override global state settings to enable the `enable_custom_filters` feature, which is typically restricted to trusted environments. Once enabled, the attacker can exploit the /test-filter endpoint to execute arbitrary system commands, leading to remote code execution (RCE). This issue is addressed in version 3.16.1.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0628</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">An improper authorization vulnerability exists in the main-latest version of BerriAI/litellm. When a user with the role 'internal_user_viewer' logs into the application, they are provided with an overly privileged API key. This key can be used to access all the admin functionality of the application, including endpoints such as '/users/list' and '/users/get_users'. This vulnerability allows for privilege escalation within the application, enabling any account to become a PROXY ADMIN.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0508</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability in the SageMaker Workflow component of aws/sagemaker-python-sdk allows for the possibility of MD5 hash collisions in all versions. This can lead to workflows being inadvertently replaced due to the reuse of results from different configurations that produce the same MD5 hash. This issue can cause integrity problems within the pipeline, potentially leading to erroneous processing outcomes.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.9</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0454</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A Server-Side Request Forgery (SSRF) vulnerability was identified in the Requests utility of significant-gravitas/autogpt versions prior to v0.4.0. The vulnerability arises due to a hostname confusion between the `urlparse` function from the `urllib.parse` library and the `requests` library. A malicious user can exploit this by submitting a specially crafted URL, such as `http://localhost:\@google.com/../`, to bypass the SSRF check and perform an SSRF attack.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0453</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In mlflow/mlflow version 2.17.2, the `/graphql` endpoint is vulnerable to a denial of service attack. An attacker can create large batches of queries that repeatedly request all runs from a given experiment. This can tie up all the workers allocated by MLFlow, rendering the application unable to respond to other requests. This vulnerability is due to uncontrolled resource consumption.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.9</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0452</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">eosphoros-ai/DB-GPT version latest is vulnerable to arbitrary file deletion on Windows systems via the '/v1/agent/hub/update' endpoint. The application fails to properly filter the '\' character, which is commonly used as a separator in Windows paths. This vulnerability allows attackers to delete any files on the host system by manipulating the 'plugin_repo_name' variable.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0330</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In berriai/litellm version v1.52.1, an issue in proxy_server.py causes the leakage of Langfuse API keys when an error occurs while parsing team settings. This vulnerability exposes sensitive information, including langfuse_secret and langfuse_public_key, which can provide full access to the Langfuse project storing all requests.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0317</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability in ollama/ollama versions &lt;=0.3.14 allows a malicious user to upload and create a customized GGUF model file on the Ollama server. This can lead to a division by zero error in the ggufPadding function, causing the server to crash and resulting in a Denial of Service (DoS) attack.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-22228</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">BCryptPasswordEncoder.matches(CharSequence,String) will incorrectly return true for passwords larger than 72 characters as long as the first 72 characters are the same.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2505</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Age Gate plugin for WordPress is vulnerable to Local PHP File Inclusion in all versions up to, and including, 3.5.3 via the 'lang' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary PHP files on the server, allowing the execution of code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2108</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The 140+ Widgets | Xpro Addons For Elementor – FREE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘Site Title’ widget's 'title_tag' and 'html_tag' parameters in all versions up to, and including, 1.4.6.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1796</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability in langgenius/dify v0.10.1 allows an attacker to take over any account, including administrator accounts, by exploiting a weak pseudo-random number generator (PRNG) used for generating password reset codes. The application uses `random.randint` for this purpose, which is not suitable for cryptographic use and can be cracked. An attacker with access to workflow tools can extract the PRNG output and predict future password reset codes, leading to a complete compromise of the application.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1770</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Event Manager, Events Calendar, Tickets, Registrations – Eventin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.0.24 via the 'style' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1766</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Event Manager, Events Calendar, Tickets, Registrations – Eventin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'payment_complete' function in all versions up to, and including, 4.0.24. This makes it possible for unauthenticated attackers to update the status of ticket payments to 'completed', possibly resulting in financial loss.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1474</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In mlflow/mlflow version 2.18, an admin is able to create a new user account without setting a password. This vulnerability could lead to security risks, as accounts without passwords may be susceptible to unauthorized access. Additionally, this issue violates best practices for secure user account management. The issue is fixed in version 2.19.0.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">3.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1473</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A Cross-Site Request Forgery (CSRF) vulnerability exists in the Signup feature of mlflow/mlflow versions 2.17.0 to 2.20.1. This vulnerability allows an attacker to create a new account, which may be used to perform unauthorized actions on behalf of the malicious user.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1451</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability in parisneo/lollms-webui v13 arises from the server's handling of multipart boundaries in file uploads. The server does not limit or validate the length of the boundary or the characters appended to it, allowing an attacker to craft requests with excessively long boundaries, leading to resource exhaustion and eventual denial of service (DoS). Despite an attempted patch in commit 483431bb, which blocked hyphen characters from being appended to the multipart boundary, the fix is insufficient. The server remains vulnerable if other characters (e.g., '4', 'a') are used instead of hyphens. This allows attackers to exploit the vulnerability using different characters, causing resource exhaustion and service unavailability.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1385</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">When the library bridge feature is enabled, the clickhouse-library-bridge exposes an HTTP API on localhost. This allows clickhouse-server to dynamically load a library from a specified path and execute it in an isolated process. Combined with the ClickHouse table engine functionality that permits file uploads to specific directories, a misconfigured server can be exploited by an attacker with privilege to access to both table engines to execute arbitrary code on the ClickHouse server.<br />
<br />
You can check if your ClickHouse server is vulnerable to this vulnerability by inspecting the configuration file and confirming if the following setting is enabled:<br />
<br />
&lt;library_bridge&gt;<br />
   &lt;port&gt;9019&lt;/port&gt;<br />
&lt;/library_bridge&gt;</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1314</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Custom Twitter Feeds – A Tweets Widget or X Feed Widget plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.5. This is due to missing or incorrect nonce validation on the ctf_clear_cache_admin() function. This makes it possible for unauthenticated attackers to reset the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1040</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">AutoGPT versions 0.3.4 and earlier are vulnerable to a Server-Side Template Injection (SSTI) that could lead to Remote Code Execution (RCE). The vulnerability arises from the improper handling of user-supplied format strings in the `AgentOutputBlock` implementation, where malicious input is passed to the Jinja2 templating engine without adequate security measures. Attackers can exploit this flaw to execute arbitrary commands on the host system. The issue is fixed in version 0.4.0.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0655</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability in man-group/dtale versions 3.15.1 allows an attacker to override global state settings to enable the `enable_custom_filters` feature, which is typically restricted to trusted environments. Once enabled, the attacker can exploit the /test-filter endpoint to execute arbitrary system commands, leading to remote code execution (RCE). This issue is addressed in version 3.16.1.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0628</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">An improper authorization vulnerability exists in the main-latest version of BerriAI/litellm. When a user with the role 'internal_user_viewer' logs into the application, they are provided with an overly privileged API key. This key can be used to access all the admin functionality of the application, including endpoints such as '/users/list' and '/users/get_users'. This vulnerability allows for privilege escalation within the application, enabling any account to become a PROXY ADMIN.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0508</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability in the SageMaker Workflow component of aws/sagemaker-python-sdk allows for the possibility of MD5 hash collisions in all versions. This can lead to workflows being inadvertently replaced due to the reuse of results from different configurations that produce the same MD5 hash. This issue can cause integrity problems within the pipeline, potentially leading to erroneous processing outcomes.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.9</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0454</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A Server-Side Request Forgery (SSRF) vulnerability was identified in the Requests utility of significant-gravitas/autogpt versions prior to v0.4.0. The vulnerability arises due to a hostname confusion between the `urlparse` function from the `urllib.parse` library and the `requests` library. A malicious user can exploit this by submitting a specially crafted URL, such as `http://localhost:\@google.com/../`, to bypass the SSRF check and perform an SSRF attack.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0453</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In mlflow/mlflow version 2.17.2, the `/graphql` endpoint is vulnerable to a denial of service attack. An attacker can create large batches of queries that repeatedly request all runs from a given experiment. This can tie up all the workers allocated by MLFlow, rendering the application unable to respond to other requests. This vulnerability is due to uncontrolled resource consumption.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.9</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0452</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">eosphoros-ai/DB-GPT version latest is vulnerable to arbitrary file deletion on Windows systems via the '/v1/agent/hub/update' endpoint. The application fails to properly filter the '\' character, which is commonly used as a separator in Windows paths. This vulnerability allows attackers to delete any files on the host system by manipulating the 'plugin_repo_name' variable.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0330</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In berriai/litellm version v1.52.1, an issue in proxy_server.py causes the leakage of Langfuse API keys when an error occurs while parsing team settings. This vulnerability exposes sensitive information, including langfuse_secret and langfuse_public_key, which can provide full access to the Langfuse project storing all requests.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0317</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability in ollama/ollama versions &lt;=0.3.14 allows a malicious user to upload and create a customized GGUF model file on the Ollama server. This can lead to a division by zero error in the ggufPadding function, causing the server to crash and resulting in a Denial of Service (DoS) attack.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Daily CVE Record Information - 2025-03-19]]></title>
			<link>https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-19</link>
			<pubDate>Wed, 19 Mar 2025 11:30:03 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-19</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-30236</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Shearwater SecurEnvoy SecurAccess Enrol before 9.4.515 allows authentication through only a six-digit TOTP code (skipping a password check) if an HTTP POST request contains a SESSION parameter.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.6</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-30235</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Shearwater SecurEnvoy SecurAccess Enrol before 9.4.515 is intended to disable accounts that have had more than 10 failed authentication attempts, but instead allows hundreds of failed authentication attempts, because concurrent attempts are mishandled.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">3.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-30234</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">SmartOS, as used in Triton Data Center and other products, has static host SSH keys in the 60f76fd2-143f-4f57-819b-1ae32684e81b image (a Debian 12 LX zone image from 2024-07-26).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27018</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Airflow MySQL Provider.<br />
<br />
When user triggered a DAG with dump_sql or load_sql functions they could pass a table parameter from a UI, that could cause SQL injection by running SQL that was not intended.<br />
It could lead to data corruption, modification and others.<br />
This issue affects Apache Airflow MySQL Provider: before 6.2.0.<br />
<br />
Users are recommended to upgrade to version 6.2.0, which fixes the issue.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2511</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The AHAthat Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the 'id' parameter in all versions up to, and including, 1.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.9</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2290</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The LifterLMS – WP LMS for eLearning, Online Courses, &amp; Quizzes plugin for WordPress is vulnerable to Unauthenticated Post Trashing due to a missing capability check on the delete_access_plan function and the related AJAX calls in all versions up to, and including, 8.0.1. This makes it possible for unauthenticated attackers to change status to "Trash" for every published post, therefore limiting the availability of the website's content.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1232</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Site Reviews WordPress plugin before 7.2.5 does not properly sanitise and escape some of its Review fields, which could allow unauthenticated users to perform Stored XSS attacks</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-50631</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in the system syncing daemon in Synology Drive Server before 3.0.4-12699, 3.2.1-23280, 3.5.0-26085 and 3.5.1-26102 allows remote attackers to inject SQL commands, limited to write operations, via unspecified vectors.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-50630</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Missing authentication for critical function vulnerability in the webapi component in Synology Drive Server before 3.0.4-12699, 3.2.1-23280, 3.5.0-26085 and 3.5.1-26102 allows remote attackers to obtain administrator credentials via unspecified vectors.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-50629</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Improper encoding or escaping of output vulnerability in the webapi component in Synology BeeStation Manager (BSM) before 1.1-65374, Synology DiskStation Manager (DSM) before 6.2.4-25556-8, 7.1.1-42962-7, 7.2-64570-4, 7.2.1-69057-6 and 7.2.2-72806-1 and Synology Unified Controller (DSMUC) before 3.1.4-23079 allows remote attackers to read limited files via unspecified vectors.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-45644</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">IBM Security ReaQta 3.12 allows a privileged user to upload or transfer files of dangerous types that can be automatically processed within the product's environment.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.7</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13933</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The FoodBakery | Delivery Restaurant Directory WordPress Theme theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.7. This is due to missing or incorrect nonce validation on the foodbakery_var_backup_file_delete, foodbakery_widget_file_delete, theme_option_save, export_widget_settings, ajax_import_widget_data, foodbakery_var_settings_backup_generate, foodbakery_var_backup_file_restore, and theme_option_rest_all functions. This makes it possible for unauthenticated attackers to delete arbitrary files, update theme options, export widget options, import widget options, generate backups, restore backups, and reset theme options via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13790</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The MinimogWP – The High Converting eCommerce WordPress Theme theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.7.0 via the 'template' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13442</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 5.0. This is due to the plugin not properly validating a user's identity prior to (1) performing a post-booking auto-login or (2) updating their profile details (e.g. password). This makes it possible for unauthenticated attackers to (1) login as an arbitrary user if their email address is known or (2) change an arbitrary user's password, including administrators, and leverage that to gain access to their account.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13412</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The CozyStay theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_handler function in all versions up to, and including, 1.7.0. This makes it possible for unauthenticated attackers to execute arbitrary actions.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13410</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The CozyStay and TinySalt plugins for WordPress are vulnerable to PHP Object Injection in all versions up to, and including, 1.7.0, and in all versions up to, and including 3.9.0, respectively, via deserialization of untrusted input in the 'ajax_handler' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-12922</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Altair theme for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check within functions.php in all versions up to, and including, 5.2.4. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-12920</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The FoodBakery | Delivery Restaurant Directory WordPress Theme theme for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the foodbakery_var_backup_file_delete, foodbakery_widget_file_delete, theme_option_save, export_widget_settings, ajax_import_widget_data, foodbakery_var_settings_backup_generate, foodbakery_var_backup_file_restore, and theme_option_rest_all functions in all versions up to, and including, 4.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files, update theme options, export widget options, import widget options, generate backups, restore backups, and reset theme options.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-12295</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The BoomBox Theme Extensions plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.8.0. This is due to the plugin not properly validating a user's identity prior to updating their password through the 'boombox_ajax_reset_password' function. This makes it possible for authenticated attackers, with subscriber-level privileges and above, to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-12137</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Authentication Bypass by Capture-replay vulnerability in Elfatek Elektronics ANKA JPD-00028 allows Session Hijacking.This issue affects ANKA JPD-00028: through 19.03.2025.<br />
<br />
<br />
NOTE: The vendor did not inform about the completion of the fixing process within the specified time. The CVE will be updated when new information becomes available.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.6</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-30236</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Shearwater SecurEnvoy SecurAccess Enrol before 9.4.515 allows authentication through only a six-digit TOTP code (skipping a password check) if an HTTP POST request contains a SESSION parameter.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.6</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-30235</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Shearwater SecurEnvoy SecurAccess Enrol before 9.4.515 is intended to disable accounts that have had more than 10 failed authentication attempts, but instead allows hundreds of failed authentication attempts, because concurrent attempts are mishandled.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">3.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-30234</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">SmartOS, as used in Triton Data Center and other products, has static host SSH keys in the 60f76fd2-143f-4f57-819b-1ae32684e81b image (a Debian 12 LX zone image from 2024-07-26).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27018</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Airflow MySQL Provider.<br />
<br />
When user triggered a DAG with dump_sql or load_sql functions they could pass a table parameter from a UI, that could cause SQL injection by running SQL that was not intended.<br />
It could lead to data corruption, modification and others.<br />
This issue affects Apache Airflow MySQL Provider: before 6.2.0.<br />
<br />
Users are recommended to upgrade to version 6.2.0, which fixes the issue.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2511</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The AHAthat Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the 'id' parameter in all versions up to, and including, 1.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.9</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2290</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The LifterLMS – WP LMS for eLearning, Online Courses, &amp; Quizzes plugin for WordPress is vulnerable to Unauthenticated Post Trashing due to a missing capability check on the delete_access_plan function and the related AJAX calls in all versions up to, and including, 8.0.1. This makes it possible for unauthenticated attackers to change status to "Trash" for every published post, therefore limiting the availability of the website's content.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1232</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Site Reviews WordPress plugin before 7.2.5 does not properly sanitise and escape some of its Review fields, which could allow unauthenticated users to perform Stored XSS attacks</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-50631</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in the system syncing daemon in Synology Drive Server before 3.0.4-12699, 3.2.1-23280, 3.5.0-26085 and 3.5.1-26102 allows remote attackers to inject SQL commands, limited to write operations, via unspecified vectors.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-50630</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Missing authentication for critical function vulnerability in the webapi component in Synology Drive Server before 3.0.4-12699, 3.2.1-23280, 3.5.0-26085 and 3.5.1-26102 allows remote attackers to obtain administrator credentials via unspecified vectors.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-50629</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Improper encoding or escaping of output vulnerability in the webapi component in Synology BeeStation Manager (BSM) before 1.1-65374, Synology DiskStation Manager (DSM) before 6.2.4-25556-8, 7.1.1-42962-7, 7.2-64570-4, 7.2.1-69057-6 and 7.2.2-72806-1 and Synology Unified Controller (DSMUC) before 3.1.4-23079 allows remote attackers to read limited files via unspecified vectors.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-45644</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">IBM Security ReaQta 3.12 allows a privileged user to upload or transfer files of dangerous types that can be automatically processed within the product's environment.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.7</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13933</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The FoodBakery | Delivery Restaurant Directory WordPress Theme theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.7. This is due to missing or incorrect nonce validation on the foodbakery_var_backup_file_delete, foodbakery_widget_file_delete, theme_option_save, export_widget_settings, ajax_import_widget_data, foodbakery_var_settings_backup_generate, foodbakery_var_backup_file_restore, and theme_option_rest_all functions. This makes it possible for unauthenticated attackers to delete arbitrary files, update theme options, export widget options, import widget options, generate backups, restore backups, and reset theme options via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13790</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The MinimogWP – The High Converting eCommerce WordPress Theme theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.7.0 via the 'template' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13442</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 5.0. This is due to the plugin not properly validating a user's identity prior to (1) performing a post-booking auto-login or (2) updating their profile details (e.g. password). This makes it possible for unauthenticated attackers to (1) login as an arbitrary user if their email address is known or (2) change an arbitrary user's password, including administrators, and leverage that to gain access to their account.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13412</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The CozyStay theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_handler function in all versions up to, and including, 1.7.0. This makes it possible for unauthenticated attackers to execute arbitrary actions.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13410</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The CozyStay and TinySalt plugins for WordPress are vulnerable to PHP Object Injection in all versions up to, and including, 1.7.0, and in all versions up to, and including 3.9.0, respectively, via deserialization of untrusted input in the 'ajax_handler' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-12922</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Altair theme for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check within functions.php in all versions up to, and including, 5.2.4. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-12920</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The FoodBakery | Delivery Restaurant Directory WordPress Theme theme for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the foodbakery_var_backup_file_delete, foodbakery_widget_file_delete, theme_option_save, export_widget_settings, ajax_import_widget_data, foodbakery_var_settings_backup_generate, foodbakery_var_backup_file_restore, and theme_option_rest_all functions in all versions up to, and including, 4.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files, update theme options, export widget options, import widget options, generate backups, restore backups, and reset theme options.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-12295</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The BoomBox Theme Extensions plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.8.0. This is due to the plugin not properly validating a user's identity prior to updating their password through the 'boombox_ajax_reset_password' function. This makes it possible for authenticated attackers, with subscriber-level privileges and above, to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-12137</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Authentication Bypass by Capture-replay vulnerability in Elfatek Elektronics ANKA JPD-00028 allows Session Hijacking.This issue affects ANKA JPD-00028: through 19.03.2025.<br />
<br />
<br />
NOTE: The vendor did not inform about the completion of the fixing process within the specified time. The CVE will be updated when new information becomes available.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.6</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Daily CVE Record Information - 2025-03-18]]></title>
			<link>https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-18</link>
			<pubDate>Tue, 18 Mar 2025 11:30:03 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-18</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-25220</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in +F FS010M versions prior to V2.0.1_1101. If this vulnerability is exploited, an arbitrary OS command may be executed by a remote authenticated attacker.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-24306</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in +F FS010M versions prior to V2.0.0_1101. If this vulnerability is exploited, an arbitrary OS command may be executed by a remote authenticated attacker with an administrative privilege.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2473</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in PHPGurukul Company Visitor Management System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /index.php of the component Sign In. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2262</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The The Logo Slider – Logo Showcase, Logo Carousel, Logo Gallery and Client Logo Presentation plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.7.3. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0755</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The various bson_append functions in the MongoDB C driver library may be susceptible to buffer overflow when performing operations that could result in a final BSON document which exceeds the maximum allowable size (INT32_MAX), resulting in a segmentation fault and possible application crash. This issue affected libbson versions prior to 1.27.5, MongoDB Server v8.0 versions prior to 8.0.1 and MongoDB Server v7.0 versions prior to 7.0.16</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-25220</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in +F FS010M versions prior to V2.0.1_1101. If this vulnerability is exploited, an arbitrary OS command may be executed by a remote authenticated attacker.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-24306</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in +F FS010M versions prior to V2.0.0_1101. If this vulnerability is exploited, an arbitrary OS command may be executed by a remote authenticated attacker with an administrative privilege.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2473</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in PHPGurukul Company Visitor Management System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /index.php of the component Sign In. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2262</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The The Logo Slider – Logo Showcase, Logo Carousel, Logo Gallery and Client Logo Presentation plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.7.3. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0755</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The various bson_append functions in the MongoDB C driver library may be susceptible to buffer overflow when performing operations that could result in a final BSON document which exceeds the maximum allowable size (INT32_MAX), resulting in a segmentation fault and possible application crash. This issue affected libbson versions prior to 1.27.5, MongoDB Server v8.0 versions prior to 8.0.1 and MongoDB Server v7.0 versions prior to 7.0.16</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Daily CVE Record Information - 2025-03-17]]></title>
			<link>https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-17</link>
			<pubDate>Mon, 17 Mar 2025 11:30:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-17</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-30089</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">gurk (aka gurk-rs) through 0.6.3 mishandles ANSI escape sequences.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2396</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The U-Office Force from e-Excellence has an Arbitrary File Upload vulnerability, allowing remote attackers with regular privileges to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2395</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The U-Office Force from e-Excellence has an Improper Authentication vulnerability, allowing unauthenticated remote attackers to use a particular API and alter cookies to log in as an administrator.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2373</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as critical was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. This vulnerability affects unknown code of the file /check_availability.php. The manipulation of the argument mobnumber/employeeid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2372</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as critical has been found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. This affects an unknown part of the file /password-recovery.php of the component Password Recovery Page. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2371</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /registered-user-testing.php of the component Registered Mobile Number Search. The manipulation of the argument regmobilenumber leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2370</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in TOTOLINK EX1800T up to 9.1.0cu.2112_B20220316. It has been declared as critical. Affected by this vulnerability is the function setWiFiExtenderConfig of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument apcliSsid leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2369</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in TOTOLINK EX1800T up to 9.1.0cu.2112_B20220316. It has been classified as critical. Affected is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument admpass leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2368</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in WebAssembly wabt 1.0.36 and classified as critical. This issue affects the function wabt::interp:<img src="https://darkcoders.wiki/images/smilies/sad.png" alt="Sad" title="Sad" class="smilie smilie_8" />anonymous namespace)::BinaryReaderInterp::OnExport of the file wabt/src/interp/binary-reader-interp.cc of the component Malformed File Handler. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2367</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been found in Oiwtech OIW-2431APGN-HP 2.5.3-B20131128 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formScript of the component Personal Script Submenu. The manipulation leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2366</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability, which was classified as problematic, was found in gougucms 4.08.18. This affects the function add of the file /admin/department/add of the component Add Department Page. The manipulation of the argument title leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2365</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability, which was classified as problematic, has been found in crmeb_java up to 1.3.4. Affected by this issue is the function webHook of the file WeChatMessageController.java. The manipulation leads to xml external entity reference. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2364</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as problematic was found in lenve VBlog up to 1.0.0. Affected by this vulnerability is the function addNewArticle of the file blogserver/src/main/java/org/sang/service/ArticleService.java. The manipulation of the argument mdContent/htmlContent leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2363</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as critical has been found in lenve VBlog up to 1.0.0. Affected is the function uploadImg of the file blogserver/src/main/java/org/sang/controller/ArticleController.java. The manipulation of the argument filename leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2362</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in PHPGurukul Pre-School Enrollment System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/contact-us.php. The manipulation of the argument mobnum leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2361</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in Mercurial SCM 4.5.3/71.19.145.211. It has been declared as problematic. This vulnerability affects unknown code of the component Web Interface. The manipulation of the argument cmd leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2360</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as critical was found in D-Link DIR-823G 1.0.2B05_20181207. Affected by this vulnerability is the function SetUpnpSettings of the file /HNAP1/ of the component UPnP Service. The manipulation of the argument SOAPAction leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2359</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as critical has been found in D-Link DIR-823G 1.0.2B05_20181207. Affected is the function SetDDNSSettings of the file /HNAP1/ of the component DDNS Service. The manipulation of the argument SOAPAction leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2358</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in Shenzhen Mingyuan Cloud Technology Mingyuan Real Estate ERP System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /Kfxt/Service.asmx of the component HTTP Header Handler. The manipulation of the argument X-Forwarded-For leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2357</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in DCMTK 3.6.9. It has been declared as critical. This vulnerability affects unknown code of the component dcmjpls JPEG-LS Decoder. The manipulation leads to memory corruption. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 3239a7915. It is recommended to apply a patch to fix this issue.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-30089</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">gurk (aka gurk-rs) through 0.6.3 mishandles ANSI escape sequences.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2396</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The U-Office Force from e-Excellence has an Arbitrary File Upload vulnerability, allowing remote attackers with regular privileges to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2395</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The U-Office Force from e-Excellence has an Improper Authentication vulnerability, allowing unauthenticated remote attackers to use a particular API and alter cookies to log in as an administrator.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2373</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as critical was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. This vulnerability affects unknown code of the file /check_availability.php. The manipulation of the argument mobnumber/employeeid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2372</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as critical has been found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. This affects an unknown part of the file /password-recovery.php of the component Password Recovery Page. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2371</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /registered-user-testing.php of the component Registered Mobile Number Search. The manipulation of the argument regmobilenumber leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2370</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in TOTOLINK EX1800T up to 9.1.0cu.2112_B20220316. It has been declared as critical. Affected by this vulnerability is the function setWiFiExtenderConfig of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument apcliSsid leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2369</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in TOTOLINK EX1800T up to 9.1.0cu.2112_B20220316. It has been classified as critical. Affected is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument admpass leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2368</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in WebAssembly wabt 1.0.36 and classified as critical. This issue affects the function wabt::interp:<img src="https://darkcoders.wiki/images/smilies/sad.png" alt="Sad" title="Sad" class="smilie smilie_8" />anonymous namespace)::BinaryReaderInterp::OnExport of the file wabt/src/interp/binary-reader-interp.cc of the component Malformed File Handler. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2367</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been found in Oiwtech OIW-2431APGN-HP 2.5.3-B20131128 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formScript of the component Personal Script Submenu. The manipulation leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2366</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability, which was classified as problematic, was found in gougucms 4.08.18. This affects the function add of the file /admin/department/add of the component Add Department Page. The manipulation of the argument title leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2365</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability, which was classified as problematic, has been found in crmeb_java up to 1.3.4. Affected by this issue is the function webHook of the file WeChatMessageController.java. The manipulation leads to xml external entity reference. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2364</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as problematic was found in lenve VBlog up to 1.0.0. Affected by this vulnerability is the function addNewArticle of the file blogserver/src/main/java/org/sang/service/ArticleService.java. The manipulation of the argument mdContent/htmlContent leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2363</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as critical has been found in lenve VBlog up to 1.0.0. Affected is the function uploadImg of the file blogserver/src/main/java/org/sang/controller/ArticleController.java. The manipulation of the argument filename leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2362</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in PHPGurukul Pre-School Enrollment System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/contact-us.php. The manipulation of the argument mobnum leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2361</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in Mercurial SCM 4.5.3/71.19.145.211. It has been declared as problematic. This vulnerability affects unknown code of the component Web Interface. The manipulation of the argument cmd leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2360</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as critical was found in D-Link DIR-823G 1.0.2B05_20181207. Affected by this vulnerability is the function SetUpnpSettings of the file /HNAP1/ of the component UPnP Service. The manipulation of the argument SOAPAction leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2359</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as critical has been found in D-Link DIR-823G 1.0.2B05_20181207. Affected is the function SetDDNSSettings of the file /HNAP1/ of the component DDNS Service. The manipulation of the argument SOAPAction leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2358</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in Shenzhen Mingyuan Cloud Technology Mingyuan Real Estate ERP System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /Kfxt/Service.asmx of the component HTTP Header Handler. The manipulation of the argument X-Forwarded-For leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2357</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in DCMTK 3.6.9. It has been declared as critical. This vulnerability affects unknown code of the component dcmjpls JPEG-LS Decoder. The manipulation leads to memory corruption. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 3239a7915. It is recommended to apply a patch to fix this issue.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Daily CVE Record Information - 2025-03-16]]></title>
			<link>https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-16</link>
			<pubDate>Sun, 16 Mar 2025 11:30:03 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-16</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-30077</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Open Networking Foundation SD-RAN ONOS onos-lib-go 0.10.28 allows an index out-of-range panic in asn1/aper GetBitString via a zero value of numBits.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-30076</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Koha before 24.11.02 allows admins to execute arbitrary commands via shell metacharacters in the tools/scheduler.pl report parameter.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.7</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-30074</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Alludo Parallels Desktop before 19.4.2 and 20.x before 20.2.2 for macOS on Intel platforms allows privilege escalation to root via the VM creation routine.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-24856</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">An issue was discovered in the oidc (aka OpenID Connect Authentication) extension before 4.0.0 for TYPO3. The account linking logic allows a pre-hijacking attack, leading to Account Takeover. The attack can only be exploited if the following requirements are met: (1) an attacker can anticipate the e-mail address of the user, (2) an attacker can register a public frontend user account using that e-mail address before the user's first OIDC login, and (3) the IDP returns an email field containing the e-mail address of the user,</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2337</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability, which was classified as critical, has been found in tbeu matio 1.5.28. This issue affects the function Mat_VarPrint of the file src/mat.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2335</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as problematic was found in Drivin Soluções up to 20250226. This vulnerability affects unknown code of the file /api/school/registerSchool of the component API Handler. The manipulation of the argument message leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1624</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The GDPR Cookie Compliance  WordPress plugin before 4.15.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1623</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The GDPR Cookie Compliance  WordPress plugin before 4.15.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1622</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The GDPR Cookie Compliance  WordPress plugin before 4.15.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1621</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The GDPR Cookie Compliance  WordPress plugin before 4.15.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1620</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The GDPR Cookie Compliance  WordPress plugin before 4.15.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1619</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The GDPR Cookie Compliance  WordPress plugin before 4.15.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-58103</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Square Wire before 5.2.0 does not enforce a recursion limit on nested groups in ByteArrayProtoReader32.kt and ProtoReader.kt.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13602</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Poll Maker  WordPress plugin before 5.5.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13126</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Download Manager WordPress plugin before 3.3.07 doesn't prevent directory listing on web servers that don't use htaccess, allowing unauthorized access of files.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2022-49737</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In X.Org X server 20.11 through 21.1.16, when a client application uses easystroke for mouse gestures, the main thread modifies various data structures used by the input thread without acquiring a lock, aka a race condition. In particular, AttachDevice in dix/devices.c does not acquire an input lock.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.7</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-30077</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Open Networking Foundation SD-RAN ONOS onos-lib-go 0.10.28 allows an index out-of-range panic in asn1/aper GetBitString via a zero value of numBits.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-30076</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Koha before 24.11.02 allows admins to execute arbitrary commands via shell metacharacters in the tools/scheduler.pl report parameter.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.7</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-30074</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Alludo Parallels Desktop before 19.4.2 and 20.x before 20.2.2 for macOS on Intel platforms allows privilege escalation to root via the VM creation routine.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-24856</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">An issue was discovered in the oidc (aka OpenID Connect Authentication) extension before 4.0.0 for TYPO3. The account linking logic allows a pre-hijacking attack, leading to Account Takeover. The attack can only be exploited if the following requirements are met: (1) an attacker can anticipate the e-mail address of the user, (2) an attacker can register a public frontend user account using that e-mail address before the user's first OIDC login, and (3) the IDP returns an email field containing the e-mail address of the user,</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2337</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability, which was classified as critical, has been found in tbeu matio 1.5.28. This issue affects the function Mat_VarPrint of the file src/mat.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2335</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as problematic was found in Drivin Soluções up to 20250226. This vulnerability affects unknown code of the file /api/school/registerSchool of the component API Handler. The manipulation of the argument message leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1624</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The GDPR Cookie Compliance  WordPress plugin before 4.15.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1623</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The GDPR Cookie Compliance  WordPress plugin before 4.15.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1622</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The GDPR Cookie Compliance  WordPress plugin before 4.15.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1621</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The GDPR Cookie Compliance  WordPress plugin before 4.15.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1620</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The GDPR Cookie Compliance  WordPress plugin before 4.15.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1619</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The GDPR Cookie Compliance  WordPress plugin before 4.15.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-58103</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Square Wire before 5.2.0 does not enforce a recursion limit on nested groups in ByteArrayProtoReader32.kt and ProtoReader.kt.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13602</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Poll Maker  WordPress plugin before 5.5.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13126</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Download Manager WordPress plugin before 3.3.07 doesn't prevent directory listing on web servers that don't use htaccess, allowing unauthorized access of files.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2022-49737</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In X.Org X server 20.11 through 21.1.16, when a client application uses easystroke for mouse gestures, the main thread modifies various data structures used by the input thread without acquiring a lock, aka a race condition. In particular, AttachDevice in dix/devices.c does not acquire an input lock.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.7</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Daily CVE Record Information - 2025-03-15]]></title>
			<link>https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-15</link>
			<pubDate>Sat, 15 Mar 2025 11:30:03 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-15</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-30066</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">tj-actions changed-files through 45.0.7 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were not originally affected, but were modified by a threat actor to point at commit 0e58ed8, which contains the malicious updateFeatures code.)</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.6</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2325</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP Test Email plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Email Logs in all versions up to, and including, 1.1.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2267</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP01 plugin for WordPress is vulnerable to Arbitrary File Download in all versions up to, and including, 2.6.2 due to a missing capability check and insufficient restrictions on the make_archive() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download and read the contents of arbitrary files on the server, which can contain sensitive information.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2164</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The pixelstats plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'post_id' and 'sortby' parameters in all versions up to, and including, 0.8.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2163</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Zoorum Comments plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.9. This is due to missing or incorrect nonce validation on  the zoorum_set_options() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2157</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A flaw was found in Foreman/Red Hat Satellite. Improper file permissions allow low-privileged OS users to monitor and access temporary files under /var/tmp, exposing sensitive command outputs, such as /etc/shadow. This issue can lead to information disclosure and privilege escalation if exploited effectively.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">3.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1773</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Traveler theme for WordPress is vulnerable to Reflected Cross-Site Scripting via multiple parameters in all versions up to, and including, 3.1.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1771</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Traveler theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.1.8 via the 'hotel_alone_load_more_post' function 'style' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1670</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The School Management System – WPSchoolPress plugin for WordPress is vulnerable to SQL Injection via the 'cid' parameter in all versions up to, and including, 2.2.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Custom-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1669</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The School Management System – WPSchoolPress plugin for WordPress is vulnerable to SQL Injection via the 'addNotify' action in all versions up to, and including, 2.2.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with teacher-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1668</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The School Management System – WPSchoolPress plugin for WordPress is vulnerable to arbitrary user deletion due to a missing capability check on the wpsp_DeleteUser() function in all versions up to, and including, 2.2.16. This makes it possible for authenticated attackers, with teacher-level access and above, to delete arbitrary user accounts.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1667</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The School Management System – WPSchoolPress plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the wpsp_UpdateTeacher() function in all versions up to, and including, 2.2.16. This makes it possible for authenticated attackers, with teacher-level access and above, to update arbitrary user details including email which makes it possible to request a password reset and access arbitrary user accounts, including administrators.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1657</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Directory Listings WordPress plugin – uListing plugin for WordPress is vulnerable to unauthorized modification of data and PHP Object Injection due to a missing capability check on the stm_listing_ajax AJAX action in all versions up to, and including, 2.1.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to update post meta data and inject PHP Objects that may be unserialized.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1653</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Directory Listings WordPress plugin – uListing plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.7. This is due to the stm_listing_profile_edit AJAX action not having enough restriction on the user meta that can be updated. This makes it possible for authenticated attackers, with Subscriber-level access and above, to elevate their privileges to that of an administrator.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1057</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions store agent registration data as bytes, whereas the updated registrar expects str. This issue leads to an exception when processing agent registration requests, causing the agent to fail.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13847</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Portfolio and Projects plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.5.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.9</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13497</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WordPress form builder plugin for contact forms, surveys and quizzes – Tripetto plugin for WordPress is vulnerable to Stored Cross-Site Scripting via attachment uploads in all versions up to, and including, 8.0.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the uploaded file.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-12336</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WC Affiliate – A Complete WooCommerce Affiliate Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'export_all_data' function in all versions up to, and including, 2.5.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to expose sensitive affiliate data, including personally identifiable information (PII).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2019-25222</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Thumbnail carousel slider plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 1.0.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.9</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-30066</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">tj-actions changed-files through 45.0.7 allows remote attackers to discover secrets by reading actions logs. (The tags v1 through v45.0.7 were not originally affected, but were modified by a threat actor to point at commit 0e58ed8, which contains the malicious updateFeatures code.)</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.6</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2325</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP Test Email plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Email Logs in all versions up to, and including, 1.1.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2267</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP01 plugin for WordPress is vulnerable to Arbitrary File Download in all versions up to, and including, 2.6.2 due to a missing capability check and insufficient restrictions on the make_archive() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download and read the contents of arbitrary files on the server, which can contain sensitive information.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2164</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The pixelstats plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'post_id' and 'sortby' parameters in all versions up to, and including, 0.8.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2163</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Zoorum Comments plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.9. This is due to missing or incorrect nonce validation on  the zoorum_set_options() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2157</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A flaw was found in Foreman/Red Hat Satellite. Improper file permissions allow low-privileged OS users to monitor and access temporary files under /var/tmp, exposing sensitive command outputs, such as /etc/shadow. This issue can lead to information disclosure and privilege escalation if exploited effectively.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">3.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1773</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Traveler theme for WordPress is vulnerable to Reflected Cross-Site Scripting via multiple parameters in all versions up to, and including, 3.1.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1771</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Traveler theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.1.8 via the 'hotel_alone_load_more_post' function 'style' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1670</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The School Management System – WPSchoolPress plugin for WordPress is vulnerable to SQL Injection via the 'cid' parameter in all versions up to, and including, 2.2.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Custom-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1669</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The School Management System – WPSchoolPress plugin for WordPress is vulnerable to SQL Injection via the 'addNotify' action in all versions up to, and including, 2.2.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with teacher-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1668</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The School Management System – WPSchoolPress plugin for WordPress is vulnerable to arbitrary user deletion due to a missing capability check on the wpsp_DeleteUser() function in all versions up to, and including, 2.2.16. This makes it possible for authenticated attackers, with teacher-level access and above, to delete arbitrary user accounts.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1667</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The School Management System – WPSchoolPress plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the wpsp_UpdateTeacher() function in all versions up to, and including, 2.2.16. This makes it possible for authenticated attackers, with teacher-level access and above, to update arbitrary user details including email which makes it possible to request a password reset and access arbitrary user accounts, including administrators.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1657</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Directory Listings WordPress plugin – uListing plugin for WordPress is vulnerable to unauthorized modification of data and PHP Object Injection due to a missing capability check on the stm_listing_ajax AJAX action in all versions up to, and including, 2.1.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to update post meta data and inject PHP Objects that may be unserialized.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1653</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Directory Listings WordPress plugin – uListing plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.7. This is due to the stm_listing_profile_edit AJAX action not having enough restriction on the user meta that can be updated. This makes it possible for authenticated attackers, with Subscriber-level access and above, to elevate their privileges to that of an administrator.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1057</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions store agent registration data as bytes, whereas the updated registrar expects str. This issue leads to an exception when processing agent registration requests, causing the agent to fail.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13847</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Portfolio and Projects plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.5.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.9</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13497</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WordPress form builder plugin for contact forms, surveys and quizzes – Tripetto plugin for WordPress is vulnerable to Stored Cross-Site Scripting via attachment uploads in all versions up to, and including, 8.0.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the uploaded file.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-12336</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WC Affiliate – A Complete WooCommerce Affiliate Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'export_all_data' function in all versions up to, and including, 2.5.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to expose sensitive affiliate data, including personally identifiable information (PII).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2019-25222</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Thumbnail carousel slider plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 1.0.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.9</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Daily CVE Record Information - 2025-03-14]]></title>
			<link>https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-14</link>
			<pubDate>Fri, 14 Mar 2025 11:30:03 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-14</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-30022</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">CM Soluces Informatica Ltda Auto Atendimento 1.x.x was discovered to contain a SQL injection via the DATANASC parameter.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-26163</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">CM Soluces Informatica Ltda Auto Atendimento 1.x.x was discovered to contain a SQL injection via the CPF parameter.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-24855</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2289</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Zegen - Church WordPress Theme theme for WordPress is vulnerable to unauthorized access due to a missing capability check on several AJAX endpoints in all versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to import, export, and update theme options.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2221</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WPCOM Member plugin for WordPress is vulnerable to time-based SQL Injection via the ‘user_phone’ parameter in all versions up to, and including, 1.7.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2166</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The CM FAQ  – Simplify support with an intuitive FAQ management tool plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2103</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The SoundRise Music plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on theironMusic_ajax() function in all versions up to, and including, 1.6.11. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2056</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP Ghost (Hide My WP Ghost) – Security &amp; Firewall plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 5.4.01 via the showFile function. This makes it possible for unauthenticated attackers to read the contents of specific file types on the server, which can contain sensitive information.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1764</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The LoginPress | wp-login Custom Login Page Customizer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.3.1. This is due to missing or incorrect nonce validation on the 'custom_plugin_set_option' function. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. The 'WPBRIGADE_SDK__DEV_MODE' constant must be set to 'true' to exploit the vulnerability.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1528</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Search &amp; Filter Pro plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_meta_values' function in all versions up to, and including, 2.5.19. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the values of arbitrary post meta.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1526</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The DethemeKit for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the De Product Display Widget (countdown feature) in all versions up to, and including, 2.1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1507</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The ShareThis Dashboard for Google Analytics plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the handle_actions() function in all versions up to, and including, 3.2.1. This makes it possible for unauthenticated attackers to disable all features.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1285</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Resido - Real Estate WordPress Theme theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the delete_api_key and save_api_key AJAX actions in all versions up to, and including, 3.6. This makes it possible for unauthenticated attackers to issue requests to internal services and update API key details.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0955</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The VidoRev Extensions plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'vidorev_import_single_video' AJAX action in all versions up to, and including, 2.9.9.9.9.9.5. This makes it possible for unauthenticated attackers to import arbitrary youtube videos.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0952</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Eco Nature - Environment &amp; Ecology WordPress Theme theme for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'cmsmasters_hide_admin_notice' AJAX action in all versions up to, and including, 2.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to 'hide' on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values to true such as registration.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-55549</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-26006</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">An improper neutralization of input during web page Generation vulnerability [CWE-79] in FortiOS version 7.4.3 and below, version 7.2.7 and below, version 7.0.13 and below and FortiProxy version 7.4.3 and below, version 7.2.9 and below, version 7.0.16 and below web SSL VPN UI may allow a remote unauthenticated attacker to perform a Cross-Site Scripting attack via a malicious samba server.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13913</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The InstaWP Connect – 1-click WP Staging &amp; Migration plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.1.0.83. This is due to missing or incorrect nonce validation in the '/migrate/templates/main.php' file. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13824</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The CiyaShop - Multipurpose WooCommerce Theme theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.19.0 via deserialization of untrusted input in the 'add_ciyashop_wishlist' and 'ciyashop_get_compare' functions. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13407</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Omnipress plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.5.4 via the megamenu block due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-30022</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">CM Soluces Informatica Ltda Auto Atendimento 1.x.x was discovered to contain a SQL injection via the DATANASC parameter.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-26163</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">CM Soluces Informatica Ltda Auto Atendimento 1.x.x was discovered to contain a SQL injection via the CPF parameter.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-24855</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2289</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Zegen - Church WordPress Theme theme for WordPress is vulnerable to unauthorized access due to a missing capability check on several AJAX endpoints in all versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to import, export, and update theme options.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2221</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WPCOM Member plugin for WordPress is vulnerable to time-based SQL Injection via the ‘user_phone’ parameter in all versions up to, and including, 1.7.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2166</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The CM FAQ  – Simplify support with an intuitive FAQ management tool plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2103</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The SoundRise Music plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on theironMusic_ajax() function in all versions up to, and including, 1.6.11. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2056</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP Ghost (Hide My WP Ghost) – Security &amp; Firewall plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 5.4.01 via the showFile function. This makes it possible for unauthenticated attackers to read the contents of specific file types on the server, which can contain sensitive information.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1764</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The LoginPress | wp-login Custom Login Page Customizer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.3.1. This is due to missing or incorrect nonce validation on the 'custom_plugin_set_option' function. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. The 'WPBRIGADE_SDK__DEV_MODE' constant must be set to 'true' to exploit the vulnerability.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1528</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Search &amp; Filter Pro plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_meta_values' function in all versions up to, and including, 2.5.19. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the values of arbitrary post meta.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1526</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The DethemeKit for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the De Product Display Widget (countdown feature) in all versions up to, and including, 2.1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1507</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The ShareThis Dashboard for Google Analytics plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the handle_actions() function in all versions up to, and including, 3.2.1. This makes it possible for unauthenticated attackers to disable all features.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1285</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Resido - Real Estate WordPress Theme theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the delete_api_key and save_api_key AJAX actions in all versions up to, and including, 3.6. This makes it possible for unauthenticated attackers to issue requests to internal services and update API key details.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0955</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The VidoRev Extensions plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'vidorev_import_single_video' AJAX action in all versions up to, and including, 2.9.9.9.9.9.5. This makes it possible for unauthenticated attackers to import arbitrary youtube videos.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0952</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Eco Nature - Environment &amp; Ecology WordPress Theme theme for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'cmsmasters_hide_admin_notice' AJAX action in all versions up to, and including, 2.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to 'hide' on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values to true such as registration.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-55549</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-26006</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">An improper neutralization of input during web page Generation vulnerability [CWE-79] in FortiOS version 7.4.3 and below, version 7.2.7 and below, version 7.0.13 and below and FortiProxy version 7.4.3 and below, version 7.2.9 and below, version 7.0.16 and below web SSL VPN UI may allow a remote unauthenticated attacker to perform a Cross-Site Scripting attack via a malicious samba server.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13913</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The InstaWP Connect – 1-click WP Staging &amp; Migration plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.1.0.83. This is due to missing or incorrect nonce validation in the '/migrate/templates/main.php' file. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13824</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The CiyaShop - Multipurpose WooCommerce Theme theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.19.0 via deserialization of untrusted input in the 'add_ciyashop_wishlist' and 'ciyashop_get_compare' functions. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13407</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Omnipress plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.5.4 via the megamenu block due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Daily CVE Record Information - 2025-03-13]]></title>
			<link>https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-13</link>
			<pubDate>Thu, 13 Mar 2025 11:30:03 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-13</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-25175</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in Simcenter Femap V2401 (All versions &lt; V2401.0003), Simcenter Femap V2406 (All versions &lt; V2406.0002). The affected application contains a memory corruption vulnerability while  parsing specially crafted .NEU files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25443)</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2271</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability exists in Issuetrak v17.2.2 and prior that allows a low-privileged user to access audit results of other users by exploiting an Insecure Direct Object Reference (IDOR) vulnerability in the Issuetrak audit component. The vulnerability enables unauthorized access to sensitive information, including user details, network and hardware information, installed programs, running processes, drives, and printers. Due to improper access controls, an attacker can retrieve audit data belonging to other users, potentially leading to unauthorized data exposure, privacy violations, and security risks.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.7</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2250</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WordPress Report Brute Force Attacks and Login Protection ReportAttacks Plugins plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in all versions up to, and including, 2.32 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.9</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2107</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The ArielBrailovsky-ViralAd plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter of the printResultAndDie() function in all versions up to, and including, 1.0.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This only appears to be exploitable on very old versions of WordPress.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2106</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The ArielBrailovsky-ViralAd plugin for WordPress is vulnerable to SQL Injection via the 'text' and 'id' parameters of the limpia() function in all versions up to, and including, 1.0.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This only appears to be exploitable on very old versions of WordPress.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2104</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to unauthorized post publication due to insufficient validation on the pagelayer_save_content() function in all versions up to, and including, 1.9.8. This makes it possible for authenticated attackers, with Contributor-level access and above, to bypass post moderation and publish posts to the site.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1785</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Download Manager plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.3.08 via the 'wpdm_newfile' action. This makes it possible for authenticated attackers, with Author-level access and above, to overwrite select file types outside of the originally intended directory, which may cause a denial of service.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1561</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The AppPresser – Mobile App Framework plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title' parameter in all versions up to, and including, 4.4.10 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages when logging is enabled that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1559</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The CC-IMG-Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'img' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1503</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP Recipe Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Roundup Recipe Name field in all versions up to, and including, 9.8.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1487</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WoWPth WordPress plugin through 2.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1486</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WoWPth WordPress plugin through 2.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1436</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Limit Bio WordPress plugin through 1.0 does not have CSRF check when updating its settings, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1401</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP Click Info WordPress plugin through 2.7.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1257</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">An issue was discovered in GitLab EE affecting all versions starting with 12.3 before 17.7.7, 17.8 prior to 17.8.5, and 17.9 prior to 17.9.2. A vulnerability in certain GitLab instances could allow an attacker to cause a denial of service condition by manipulating specific API inputs.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1119</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.6.8.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0652</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">An issue has been discovered in GitLab EE/CE affecting all versions starting from 16.9 before 17.7.7, all versions starting from 17.8 before 17.8.5, all versions starting from 17.9 before 17.9.2 could allow unauthorized users to access confidential information intended for internal use only.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13891</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Schedule WordPress plugin through 1.0.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13887</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Business Directory Plugin – Easy Listing Directories for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.4.14 via the 'ajax_listing_submit_image_upload' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to add arbitrary images to listings.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13885</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP e-Customers Beta WordPress plugin through 0.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-25175</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in Simcenter Femap V2401 (All versions &lt; V2401.0003), Simcenter Femap V2406 (All versions &lt; V2406.0002). The affected application contains a memory corruption vulnerability while  parsing specially crafted .NEU files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-25443)</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2271</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability exists in Issuetrak v17.2.2 and prior that allows a low-privileged user to access audit results of other users by exploiting an Insecure Direct Object Reference (IDOR) vulnerability in the Issuetrak audit component. The vulnerability enables unauthorized access to sensitive information, including user details, network and hardware information, installed programs, running processes, drives, and printers. Due to improper access controls, an attacker can retrieve audit data belonging to other users, potentially leading to unauthorized data exposure, privacy violations, and security risks.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.7</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2250</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WordPress Report Brute Force Attacks and Login Protection ReportAttacks Plugins plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in all versions up to, and including, 2.32 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.9</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2107</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The ArielBrailovsky-ViralAd plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter of the printResultAndDie() function in all versions up to, and including, 1.0.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This only appears to be exploitable on very old versions of WordPress.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2106</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The ArielBrailovsky-ViralAd plugin for WordPress is vulnerable to SQL Injection via the 'text' and 'id' parameters of the limpia() function in all versions up to, and including, 1.0.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This only appears to be exploitable on very old versions of WordPress.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2104</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to unauthorized post publication due to insufficient validation on the pagelayer_save_content() function in all versions up to, and including, 1.9.8. This makes it possible for authenticated attackers, with Contributor-level access and above, to bypass post moderation and publish posts to the site.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1785</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Download Manager plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.3.08 via the 'wpdm_newfile' action. This makes it possible for authenticated attackers, with Author-level access and above, to overwrite select file types outside of the originally intended directory, which may cause a denial of service.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1561</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The AppPresser – Mobile App Framework plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title' parameter in all versions up to, and including, 4.4.10 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages when logging is enabled that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1559</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The CC-IMG-Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'img' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1503</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP Recipe Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Roundup Recipe Name field in all versions up to, and including, 9.8.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1487</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WoWPth WordPress plugin through 2.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1486</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WoWPth WordPress plugin through 2.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1436</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Limit Bio WordPress plugin through 1.0 does not have CSRF check when updating its settings, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1401</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP Click Info WordPress plugin through 2.7.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1257</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">An issue was discovered in GitLab EE affecting all versions starting with 12.3 before 17.7.7, 17.8 prior to 17.8.5, and 17.9 prior to 17.9.2. A vulnerability in certain GitLab instances could allow an attacker to cause a denial of service condition by manipulating specific API inputs.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1119</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.6.8.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0652</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">An issue has been discovered in GitLab EE/CE affecting all versions starting from 16.9 before 17.7.7, all versions starting from 17.8 before 17.8.5, all versions starting from 17.9 before 17.9.2 could allow unauthorized users to access confidential information intended for internal use only.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13891</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Schedule WordPress plugin through 1.0.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13887</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Business Directory Plugin – Easy Listing Directories for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.4.14 via the 'ajax_listing_submit_image_upload' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to add arbitrary images to listings.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13885</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP e-Customers Beta WordPress plugin through 0.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Daily CVE Record Information - 2025-03-12]]></title>
			<link>https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-12</link>
			<pubDate>Wed, 12 Mar 2025 11:30:03 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-12</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-24912</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">3.7</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21866</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC<br />
<br />
Erhard reported the following KASAN hit while booting his PowerMac G4<br />
with a KASAN-enabled kernel 6.13-rc6:<br />
<br />
  BUG: KASAN: vmalloc-out-of-bounds in copy_to_kernel_nofault+0xd8/0x1c8<br />
  Write of size 8 at addr f1000000 by task chronyd/1293<br />
<br />
  CPU: 0 UID: 123 PID: 1293 Comm: chronyd Tainted: G        W          6.13.0-rc6-PMacG4 #2<br />
  Tainted: [W]=WARN<br />
  Hardware name: PowerMac3,6 7455 0x80010303 PowerMac<br />
  Call Trace:<br />
  [c2437590] [c1631a84] dump_stack_lvl+0x70/0x8c (unreliable)<br />
  [c24375b0] [c0504998] print_report+0xdc/0x504<br />
  [c2437610] [c050475c] kasan_report+0xf8/0x108<br />
  [c2437690] [c0505a3c] kasan_check_range+0x24/0x18c<br />
  [c24376a0] [c03fb5e4] copy_to_kernel_nofault+0xd8/0x1c8<br />
  [c24376c0] [c004c014] patch_instructions+0x15c/0x16c<br />
  [c2437710] [c00731a8] bpf_arch_text_copy+0x60/0x7c<br />
  [c2437730] [c0281168] bpf_jit_binary_pack_finalize+0x50/0xac<br />
  [c2437750] [c0073cf4] bpf_int_jit_compile+0xb30/0xdec<br />
  [c2437880] [c0280394] bpf_prog_select_runtime+0x15c/0x478<br />
  [c24378d0] [c1263428] bpf_prepare_filter+0xbf8/0xc14<br />
  [c2437990] [c12677ec] bpf_prog_create_from_user+0x258/0x2b4<br />
  [c24379d0] [c027111c] do_seccomp+0x3dc/0x1890<br />
  [c2437ac0] [c001d8e0] system_call_exception+0x2dc/0x420<br />
  [c2437f30] [c00281ac] ret_from_syscall+0x0/0x2c<br />
  --- interrupt: c00 at 0x5a1274<br />
  NIP:  005a1274 LR: 006a3b3c CTR: 005296c8<br />
  REGS: c2437f40 TRAP: 0c00   Tainted: G        W           (6.13.0-rc6-PMacG4)<br />
  MSR:  0200f932 &lt;VEC,EE,PR,FP,ME,IR,DR,RI&gt;  CR: 24004422  XER: 00000000<br />
<br />
  GPR00: 00000166 af8f3fa0 a7ee3540 00000001 00000000 013b6500 005a5858 0200f932<br />
  GPR08: 00000000 00001fe9 013d5fc8 005296c8 2822244c 00b2fcd8 00000000 af8f4b57<br />
  GPR16: 00000000 00000001 00000000 00000000 00000000 00000001 00000000 00000002<br />
  GPR24: 00afdbb0 00000000 00000000 00000000 006e0004 013ce060 006e7c1c 00000001<br />
  NIP [005a1274] 0x5a1274<br />
  LR [006a3b3c] 0x6a3b3c<br />
  --- interrupt: c00<br />
<br />
  The buggy address belongs to the virtual mapping at<br />
   [f1000000, f1002000) created by:<br />
   text_area_cpu_up+0x20/0x190<br />
<br />
  The buggy address belongs to the physical page:<br />
  page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x76e30<br />
  flags: 0x80000000(zone=2)<br />
  raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001<br />
  raw: 00000000<br />
  page dumped because: kasan: bad access detected<br />
<br />
  Memory state around the buggy address:<br />
   f0ffff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<br />
   f0ffff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<br />
  &gt;f1000000: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8<br />
             ^<br />
   f1000080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8<br />
   f1000100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8<br />
  ==================================================================<br />
<br />
f8 corresponds to KASAN_VMALLOC_INVALID which means the area is not<br />
initialised hence not supposed to be used yet.<br />
<br />
Powerpc text patching infrastructure allocates a virtual memory area<br />
using get_vm_area() and flags it as VM_ALLOC. But that flag is meant<br />
to be used for vmalloc() and vmalloc() allocated memory is not<br />
supposed to be used before a call to __vmalloc_node_range() which is<br />
never called for that area.<br />
<br />
That went undetected until commit e4137f08816b ("mm, kasan, kmsan:<br />
instrument copy_from/to_kernel_nofault")<br />
<br />
The area allocated by text_area_cpu_up() is not vmalloc memory, it is<br />
mapped directly on demand when needed by map_kernel_page(). There is<br />
no VM flag corresponding to such usage, so just pass no flag. That way<br />
the area will be unpoisonned and usable immediately.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21865</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl().<br />
<br />
Brad Spengler reported the list_del() corruption splat in<br />
gtp_net_exit_batch_rtnl(). [0]<br />
<br />
Commit eb28fd76c0a0 ("gtp: Destroy device along with udp socket's netns<br />
dismantle.") added the for_each_netdev() loop in gtp_net_exit_batch_rtnl()<br />
to destroy devices in each netns as done in geneve and ip tunnels.<br />
<br />
However, this could trigger -&gt;dellink() twice for the same device during<br />
-&gt;exit_batch_rtnl().<br />
<br />
Say we have two netns A &amp; B and gtp device B that resides in netns B but<br />
whose UDP socket is in netns A.<br />
<br />
  1. cleanup_net() processes netns A and then B.<br />
<br />
  2. gtp_net_exit_batch_rtnl() finds the device B while iterating<br />
     netns A's gn-&gt;gtp_dev_list and calls -&gt;dellink().<br />
<br />
  [ device B is not yet unlinked from netns B<br />
    as unregister_netdevice_many() has not been called. ]<br />
<br />
  3. gtp_net_exit_batch_rtnl() finds the device B while iterating<br />
     netns B's for_each_netdev() and calls -&gt;dellink().<br />
<br />
gtp_dellink() cleans up the device's hash table, unlinks the dev from<br />
gn-&gt;gtp_dev_list, and calls unregister_netdevice_queue().<br />
<br />
Basically, calling gtp_dellink() multiple times is fine unless<br />
CONFIG_DEBUG_LIST is enabled.<br />
<br />
Let's remove for_each_netdev() in gtp_net_exit_batch_rtnl() and<br />
delegate the destruction to default_device_exit_batch() as done<br />
in bareudp.<br />
<br />
[0]:<br />
list_del corruption, ffff8880aaa62c00-&gt;next (autoslab_size_M_dev_P_net_core_dev_11127_8_1328_8_S_4096_A_64_n_139+0xc00/0x1000 [slab object]) is LIST_POISON1 (ffffffffffffff02) (prev is 0xffffffffffffff04)<br />
kernel BUG at lib/list_debug.c:58!<br />
Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN<br />
CPU: 1 UID: 0 PID: 1804 Comm: kworker/u8:7 Tainted: G                T   6.12.13-grsec-full-20250211091339 #1<br />
Tainted: [T]=RANDSTRUCT<br />
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014<br />
Workqueue: netns cleanup_net<br />
RIP: 0010:[&lt;ffffffff84947381&gt;] __list_del_entry_valid_or_report+0x141/0x200 lib/list_debug.c:58<br />
Code: c2 76 91 31 c0 e8 9f b1 f7 fc 0f 0b 4d 89 f0 48 c7 c1 02 ff ff ff 48 89 ea 48 89 ee 48 c7 c7 e0 c2 76 91 31 c0 e8 7f b1 f7 fc &lt;0f&gt; 0b 4d 89 e8 48 c7 c1 04 ff ff ff 48 89 ea 48 89 ee 48 c7 c7 60<br />
RSP: 0018:fffffe8040b4fbd0 EFLAGS: 00010283<br />
RAX: 00000000000000cc RBX: dffffc0000000000 RCX: ffffffff818c4054<br />
RDX: ffffffff84947381 RSI: ffffffff818d1512 RDI: 0000000000000000<br />
RBP: ffff8880aaa62c00 R08: 0000000000000001 R09: fffffbd008169f32<br />
R10: fffffe8040b4f997 R11: 0000000000000001 R12: a1988d84f24943e4<br />
R13: ffffffffffffff02 R14: ffffffffffffff04 R15: ffff8880aaa62c08<br />
RBX: kasan shadow of 0x0<br />
RCX: __wake_up_klogd.part.0+0x74/0xe0 kernel/printk/printk.c:4554<br />
RDX: __list_del_entry_valid_or_report+0x141/0x200 lib/list_debug.c:58<br />
RSI: vprintk+0x72/0x100 kernel/printk/printk_safe.c:71<br />
RBP: autoslab_size_M_dev_P_net_core_dev_11127_8_1328_8_S_4096_A_64_n_139+0xc00/0x1000 [slab object]<br />
RSP: process kstack fffffe8040b4fbd0+0x7bd0/0x8000 [kworker/u8:7+netns 1804 ]<br />
R09: kasan shadow of process kstack fffffe8040b4f990+0x7990/0x8000 [kworker/u8:7+netns 1804 ]<br />
R10: process kstack fffffe8040b4f997+0x7997/0x8000 [kworker/u8:7+netns 1804 ]<br />
R15: autoslab_size_M_dev_P_net_core_dev_11127_8_1328_8_S_4096_A_64_n_139+0xc08/0x1000 [slab object]<br />
FS:  0000000000000000(0000) GS:ffff888116000000(0000) knlGS:0000000000000000<br />
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
CR2: 0000748f5372c000 CR3: 0000000015408000 CR4: 00000000003406f0 shadow CR4: 00000000003406f0<br />
Stack:<br />
 0000000000000000 ffffffff8a0c35e7 ffffffff8a0c3603 ffff8880aaa62c00<br />
 ffff8880aaa62c00 0000000000000004 ffff88811145311c 0000000000000005<br />
 0000000000000001 ffff8880aaa62000 fffffe8040b4fd40 ffffffff8a0c360d<br />
Call Trace:<br />
 &lt;TASK&gt;<br />
 [&lt;ffffffff8a0c360d&gt;] __list_del_entry_valid include/linux/list.h:131 [inline] fffffe8040b4fc28<br />
 [&lt;ffffffff8a0c360d&gt;] __list_del_entry include/linux/list.h:248 [inline] fffffe8040b4fc28<br />
 [&lt;ffffffff8a0c360d&gt;] list_del include/linux/list.h:262 [inl<br />
---truncated---</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21864</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tcp: drop secpath at the same time as we currently drop dst<br />
<br />
Xiumei reported hitting the WARN in xfrm6_tunnel_net_exit while<br />
running tests that boil down to:<br />
 - create a pair of netns<br />
 - run a basic TCP test over ipcomp6<br />
 - delete the pair of netns<br />
<br />
The xfrm_state found on spi_byaddr was not deleted at the time we<br />
delete the netns, because we still have a reference on it. This<br />
lingering reference comes from a secpath (which holds a ref on the<br />
xfrm_state), which is still attached to an skb. This skb is not<br />
leaked, it ends up on sk_receive_queue and then gets defer-free'd by<br />
skb_attempt_defer_free.<br />
<br />
The problem happens when we defer freeing an skb (push it on one CPU's<br />
defer_list), and don't flush that list before the netns is deleted. In<br />
that case, we still have a reference on the xfrm_state that we don't<br />
expect at this point.<br />
<br />
We already drop the skb's dst in the TCP receive path when it's no<br />
longer needed, so let's also drop the secpath. At this point,<br />
tcp_filter has already called into the LSM hooks that may require the<br />
secpath, so it should not be needed anymore. However, in some of those<br />
places, the MPTCP extension has just been attached to the skb, so we<br />
cannot simply drop all extensions.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21863</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
io_uring: prevent opcode speculation<br />
<br />
sqe-&gt;opcode is used for different tables, make sure we santitise it<br />
against speculations.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21862</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drop_monitor: fix incorrect initialization order<br />
<br />
Syzkaller reports the following bug:<br />
<br />
BUG: spinlock bad magic on CPU#1, syz-executor.0/7995<br />
 lock: 0xffff88805303f3e0, .magic: 00000000, .owner: &lt;none&gt;/-1, .owner_cpu: 0<br />
CPU: 1 PID: 7995 Comm: syz-executor.0 Tainted: G            E     5.10.209+ #1<br />
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020<br />
Call Trace:<br />
 __dump_stack lib/dump_stack.c:77 [inline]<br />
 dump_stack+0x119/0x179 lib/dump_stack.c:118<br />
 debug_spin_lock_before kernel/locking/spinlock_debug.c:83 [inline]<br />
 do_raw_spin_lock+0x1f6/0x270 kernel/locking/spinlock_debug.c:112<br />
 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:117 [inline]<br />
 _raw_spin_lock_irqsave+0x50/0x70 kernel/locking/spinlock.c:159<br />
 reset_per_cpu_data+0xe6/0x240 [drop_monitor]<br />
 net_dm_cmd_trace+0x43d/0x17a0 [drop_monitor]<br />
 genl_family_rcv_msg_doit+0x22f/0x330 net/netlink/genetlink.c:739<br />
 genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]<br />
 genl_rcv_msg+0x341/0x5a0 net/netlink/genetlink.c:800<br />
 netlink_rcv_skb+0x14d/0x440 net/netlink/af_netlink.c:2497<br />
 genl_rcv+0x29/0x40 net/netlink/genetlink.c:811<br />
 netlink_unicast_kernel net/netlink/af_netlink.c:1322 [inline]<br />
 netlink_unicast+0x54b/0x800 net/netlink/af_netlink.c:1348<br />
 netlink_sendmsg+0x914/0xe00 net/netlink/af_netlink.c:1916<br />
 sock_sendmsg_nosec net/socket.c:651 [inline]<br />
 __sock_sendmsg+0x157/0x190 net/socket.c:663<br />
 ____sys_sendmsg+0x712/0x870 net/socket.c:2378<br />
 ___sys_sendmsg+0xf8/0x170 net/socket.c:2432<br />
 __sys_sendmsg+0xea/0x1b0 net/socket.c:2461<br />
 do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46<br />
 entry_SYSCALL_64_after_hwframe+0x62/0xc7<br />
RIP: 0033:0x7f3f9815aee9<br />
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48<br />
RSP: 002b:00007f3f972bf0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e<br />
RAX: ffffffffffffffda RBX: 00007f3f9826d050 RCX: 00007f3f9815aee9<br />
RDX: 0000000020000000 RSI: 0000000020001300 RDI: 0000000000000007<br />
RBP: 00007f3f981b63bd R08: 0000000000000000 R09: 0000000000000000<br />
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000<br />
R13: 000000000000006e R14: 00007f3f9826d050 R15: 00007ffe01ee6768<br />
<br />
If drop_monitor is built as a kernel module, syzkaller may have time<br />
to send a netlink NET_DM_CMD_START message during the module loading.<br />
This will call the net_dm_monitor_start() function that uses<br />
a spinlock that has not yet been initialized.<br />
<br />
To fix this, let's place resource initialization above the registration<br />
of a generic netlink family.<br />
<br />
Found by InfoTeCS on behalf of Linux Verification Center<br />
(linuxtesting.org) with Syzkaller.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21861</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize()<br />
<br />
If migration succeeded, we called<br />
folio_migrate_flags()-&gt;mem_cgroup_migrate() to migrate the memcg from the<br />
old to the new folio.  This will set memcg_data of the old folio to 0.<br />
<br />
Similarly, if migration failed, memcg_data of the dst folio is left unset.<br />
<br />
If we call folio_putback_lru() on such folios (memcg_data == 0), we will<br />
add the folio to be freed to the LRU, making memcg code unhappy.  Running<br />
the hmm selftests:<br />
<br />
  # ./hmm-tests<br />
  ...<br />
  #  RUN           hmm.hmm_device_private.migrate ...<br />
  [  102.078007][T14893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x7ff27d200 pfn:0x13cc00<br />
  [  102.079974][T14893] anon flags: 0x17ff00000020018(uptodate|dirty|swapbacked|node=0|zone=2|lastcpupid=0x7ff)<br />
  [  102.082037][T14893] raw: 017ff00000020018 dead000000000100 dead000000000122 ffff8881353896c9<br />
  [  102.083687][T14893] raw: 00000007ff27d200 0000000000000000 00000001ffffffff 0000000000000000<br />
  [  102.085331][T14893] page dumped because: VM_WARN_ON_ONCE_FOLIO(!memcg &amp;&amp; !mem_cgroup_disabled())<br />
  [  102.087230][T14893] ------------[ cut here ]------------<br />
  [  102.088279][T14893] WARNING: CPU: 0 PID: 14893 at ./include/linux/memcontrol.h:726 folio_lruvec_lock_irqsave+0x10e/0x170<br />
  [  102.090478][T14893] Modules linked in:<br />
  [  102.091244][T14893] CPU: 0 UID: 0 PID: 14893 Comm: hmm-tests Not tainted 6.13.0-09623-g6c216bc522fd #151<br />
  [  102.093089][T14893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014<br />
  [  102.094848][T14893] RIP: 0010:folio_lruvec_lock_irqsave+0x10e/0x170<br />
  [  102.096104][T14893] Code: ...<br />
  [  102.099908][T14893] RSP: 0018:ffffc900236c37b0 EFLAGS: 00010293<br />
  [  102.101152][T14893] RAX: 0000000000000000 RBX: ffffea0004f30000 RCX: ffffffff8183f426<br />
  [  102.102684][T14893] RDX: ffff8881063cb880 RSI: ffffffff81b8117f RDI: ffff8881063cb880<br />
  [  102.104227][T14893] RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000<br />
  [  102.105757][T14893] R10: 0000000000000001 R11: 0000000000000002 R12: ffffc900236c37d8<br />
  [  102.107296][T14893] R13: ffff888277a2bcb0 R14: 000000000000001f R15: 0000000000000000<br />
  [  102.108830][T14893] FS:  00007ff27dbdd740(0000) GS:ffff888277a00000(0000) knlGS:0000000000000000<br />
  [  102.110643][T14893] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
  [  102.111924][T14893] CR2: 00007ff27d400000 CR3: 000000010866e000 CR4: 0000000000750ef0<br />
  [  102.113478][T14893] PKRU: 55555554<br />
  [  102.114172][T14893] Call Trace:<br />
  [  102.114805][T14893]  &lt;TASK&gt;<br />
  [  102.115397][T14893]  ? folio_lruvec_lock_irqsave+0x10e/0x170<br />
  [  102.116547][T14893]  ? __warn.cold+0x110/0x210<br />
  [  102.117461][T14893]  ? folio_lruvec_lock_irqsave+0x10e/0x170<br />
  [  102.118667][T14893]  ? report_bug+0x1b9/0x320<br />
  [  102.119571][T14893]  ? handle_bug+0x54/0x90<br />
  [  102.120494][T14893]  ? exc_invalid_op+0x17/0x50<br />
  [  102.121433][T14893]  ? asm_exc_invalid_op+0x1a/0x20<br />
  [  102.122435][T14893]  ? __wake_up_klogd.part.0+0x76/0xd0<br />
  [  102.123506][T14893]  ? dump_page+0x4f/0x60<br />
  [  102.124352][T14893]  ? folio_lruvec_lock_irqsave+0x10e/0x170<br />
  [  102.125500][T14893]  folio_batch_move_lru+0xd4/0x200<br />
  [  102.126577][T14893]  ? __pfx_lru_add+0x10/0x10<br />
  [  102.127505][T14893]  __folio_batch_add_and_move+0x391/0x720<br />
  [  102.128633][T14893]  ? __pfx_lru_add+0x10/0x10<br />
  [  102.129550][T14893]  folio_putback_lru+0x16/0x80<br />
  [  102.130564][T14893]  migrate_device_finalize+0x9b/0x530<br />
  [  102.131640][T14893]  dmirror_migrate_to_device.constprop.0+0x7c5/0xad0<br />
  [  102.133047][T14893]  dmirror_fops_unlocked_ioctl+0x89b/0xc80<br />
<br />
Likely, nothing else goes wrong: putting the last folio reference will<br />
remove the folio from the LRU again.  So besides memcg complaining, adding<br />
the folio to be freed to the LRU is just an unnecessary step.<br />
<br />
The new flow resembles what we have in migrate_folio_move(): add the dst<br />
to the lru, rem<br />
---truncated---</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21860</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mm/zswap: fix inconsistency when zswap_store_page() fails<br />
<br />
Commit b7c0ccdfbafd ("mm: zswap: support large folios in zswap_store()")<br />
skips charging any zswap entries when it failed to zswap the entire folio.<br />
<br />
However, when some base pages are zswapped but it failed to zswap the<br />
entire folio, the zswap operation is rolled back.  When freeing zswap<br />
entries for those pages, zswap_entry_free() uncharges the zswap entries<br />
that were not previously charged, causing zswap charging to become<br />
inconsistent.<br />
<br />
This inconsistency triggers two warnings with following steps:<br />
  # On a machine with 64GiB of RAM and 36GiB of zswap<br />
  &#36; stress-ng --bigheap 2 # wait until the OOM-killer kills stress-ng<br />
  &#36; sudo reboot<br />
<br />
  The two warnings are:<br />
    in mm/memcontrol.c:163, function obj_cgroup_release():<br />
      WARN_ON_ONCE(nr_bytes &amp; (PAGE_SIZE - 1));<br />
<br />
    in mm/page_counter.c:60, function page_counter_cancel():<br />
      if (WARN_ONCE(new &lt; 0, "page_counter underflow: %ld nr_pages=%lu\n",<br />
	  new, nr_pages))<br />
<br />
zswap_stored_pages also becomes inconsistent in the same way.<br />
<br />
As suggested by Kanchana, increment zswap_stored_pages and charge zswap<br />
entries within zswap_store_page() when it succeeds.  This way,<br />
zswap_entry_free() will decrement the counter and uncharge the entries<br />
when it failed to zswap the entire folio.<br />
<br />
While this could potentially be optimized by batching objcg charging and<br />
incrementing the counter, let's focus on fixing the bug this time and<br />
leave the optimization for later after some evaluation.<br />
<br />
After resolving the inconsistency, the warnings disappear.<br />
<br />
[42.hyeyoo@gmail.com: refactor zswap_store_page()]<br />
  Link: You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21859</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
USB: gadget: f_midi: f_midi_complete to call queue_work<br />
<br />
When using USB MIDI, a lock is attempted to be acquired twice through a<br />
re-entrant call to f_midi_transmit, causing a deadlock.<br />
<br />
Fix it by using queue_work() to schedule the inner f_midi_transmit() via<br />
a high priority work queue from the completion handler.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21858</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
geneve: Fix use-after-free in geneve_find_dev().<br />
<br />
syzkaller reported a use-after-free in geneve_find_dev() [0]<br />
without repro.<br />
<br />
geneve_configure() links struct geneve_dev.next to<br />
net_generic(net, geneve_net_id)-&gt;geneve_list.<br />
<br />
The net here could differ from dev_net(dev) if IFLA_NET_NS_PID,<br />
IFLA_NET_NS_FD, or IFLA_TARGET_NETNSID is set.<br />
<br />
When dev_net(dev) is dismantled, geneve_exit_batch_rtnl() finally<br />
calls unregister_netdevice_queue() for each dev in the netns,<br />
and later the dev is freed.<br />
<br />
However, its geneve_dev.next is still linked to the backend UDP<br />
socket netns.<br />
<br />
Then, use-after-free will occur when another geneve dev is created<br />
in the netns.<br />
<br />
Let's call geneve_dellink() instead in geneve_destroy_tunnels().<br />
<br />
[0]:<br />
BUG: KASAN: slab-use-after-free in geneve_find_dev drivers/net/geneve.c:1295 [inline]<br />
BUG: KASAN: slab-use-after-free in geneve_configure+0x234/0x858 drivers/net/geneve.c:1343<br />
Read of size 2 at addr ffff000054d6ee24 by task syz.1.4029/13441<br />
<br />
CPU: 1 UID: 0 PID: 13441 Comm: syz.1.4029 Not tainted 6.13.0-g0ad9617c78ac #24 dc35ca22c79fb82e8e7bc5c9c9adafea898b1e3d<br />
Hardware name: linux,dummy-virt (DT)<br />
Call trace:<br />
 show_stack+0x38/0x50 arch/arm64/kernel/stacktrace.c:466 &copy;<br />
 __dump_stack lib/dump_stack.c:94 [inline]<br />
 dump_stack_lvl+0xbc/0x108 lib/dump_stack.c:120<br />
 print_address_description mm/kasan/report.c:378 [inline]<br />
 print_report+0x16c/0x6f0 mm/kasan/report.c:489<br />
 kasan_report+0xc0/0x120 mm/kasan/report.c:602<br />
 __asan_report_load2_noabort+0x20/0x30 mm/kasan/report_generic.c:379<br />
 geneve_find_dev drivers/net/geneve.c:1295 [inline]<br />
 geneve_configure+0x234/0x858 drivers/net/geneve.c:1343<br />
 geneve_newlink+0xb8/0x128 drivers/net/geneve.c:1634<br />
 rtnl_newlink_create+0x23c/0x868 net/core/rtnetlink.c:3795<br />
 __rtnl_newlink net/core/rtnetlink.c:3906 [inline]<br />
 rtnl_newlink+0x1054/0x1630 net/core/rtnetlink.c:4021<br />
 rtnetlink_rcv_msg+0x61c/0x918 net/core/rtnetlink.c:6911<br />
 netlink_rcv_skb+0x1dc/0x398 net/netlink/af_netlink.c:2543<br />
 rtnetlink_rcv+0x34/0x50 net/core/rtnetlink.c:6938<br />
 netlink_unicast_kernel net/netlink/af_netlink.c:1322 [inline]<br />
 netlink_unicast+0x618/0x838 net/netlink/af_netlink.c:1348<br />
 netlink_sendmsg+0x5fc/0x8b0 net/netlink/af_netlink.c:1892<br />
 sock_sendmsg_nosec net/socket.c:713 [inline]<br />
 __sock_sendmsg net/socket.c:728 [inline]<br />
 ____sys_sendmsg+0x410/0x6f8 net/socket.c:2568<br />
 ___sys_sendmsg+0x178/0x1d8 net/socket.c:2622<br />
 __sys_sendmsg net/socket.c:2654 [inline]<br />
 __do_sys_sendmsg net/socket.c:2659 [inline]<br />
 __se_sys_sendmsg net/socket.c:2657 [inline]<br />
 __arm64_sys_sendmsg+0x12c/0x1c8 net/socket.c:2657<br />
 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]<br />
 invoke_syscall+0x90/0x278 arch/arm64/kernel/syscall.c:49<br />
 el0_svc_common+0x13c/0x250 arch/arm64/kernel/syscall.c:132<br />
 do_el0_svc+0x54/0x70 arch/arm64/kernel/syscall.c:151<br />
 el0_svc+0x4c/0xa8 arch/arm64/kernel/entry-common.c:744<br />
 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:762<br />
 el0t_64_sync+0x198/0x1a0 arch/arm64/kernel/entry.S:600<br />
<br />
Allocated by task 13247:<br />
 kasan_save_stack mm/kasan/common.c:47 [inline]<br />
 kasan_save_track+0x30/0x68 mm/kasan/common.c:68<br />
 kasan_save_alloc_info+0x44/0x58 mm/kasan/generic.c:568<br />
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]<br />
 __kasan_kmalloc+0x84/0xa0 mm/kasan/common.c:394<br />
 kasan_kmalloc include/linux/kasan.h:260 [inline]<br />
 __do_kmalloc_node mm/slub.c:4298 [inline]<br />
 __kmalloc_node_noprof+0x2a0/0x560 mm/slub.c:4304<br />
 __kvmalloc_node_noprof+0x9c/0x230 mm/util.c:645<br />
 alloc_netdev_mqs+0xb8/0x11a0 net/core/dev.c:11470<br />
 rtnl_create_link+0x2b8/0xb50 net/core/rtnetlink.c:3604<br />
 rtnl_newlink_create+0x19c/0x868 net/core/rtnetlink.c:3780<br />
 __rtnl_newlink net/core/rtnetlink.c:3906 [inline]<br />
 rtnl_newlink+0x1054/0x1630 net/core/rtnetlink.c:4021<br />
 rtnetlink_rcv_msg+0x61c/0x918 net/core/rtnetlink.c:6911<br />
 netlink_rcv_skb+0x1dc/0x398 net/netlink/af_netlink.c:2543<br />
 rtnetlink_rcv+0x34/0x50 net/core/rtnetlink.c:6938<br />
 netlink_unicast_kernel net/netlink/af_n<br />
---truncated---</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21857</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/sched: cls_api: fix error handling causing NULL dereference<br />
<br />
tcf_exts_miss_cookie_base_alloc() calls xa_alloc_cyclic() which can<br />
return 1 if the allocation succeeded after wrapping. This was treated as<br />
an error, with value 1 returned to caller tcf_exts_init_ex() which sets<br />
exts-&gt;actions to NULL and returns 1 to caller fl_change().<br />
<br />
fl_change() treats err == 1 as success, calling tcf_exts_validate_ex()<br />
which calls tcf_action_init() with exts-&gt;actions as argument, where it<br />
is dereferenced.<br />
<br />
Example trace:<br />
<br />
BUG: kernel NULL pointer dereference, address: 0000000000000000<br />
CPU: 114 PID: 16151 Comm: handler114 Kdump: loaded Not tainted 5.14.0-503.16.1.el9_5.x86_64 #1<br />
RIP: 0010:tcf_action_init+0x1f8/0x2c0<br />
Call Trace:<br />
 tcf_action_init+0x1f8/0x2c0<br />
 tcf_exts_validate_ex+0x175/0x190<br />
 fl_change+0x537/0x1120 [cls_flower]</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21856</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
s390/ism: add release function for struct device<br />
<br />
According to device_release() in /drivers/base/core.c,<br />
a device without a release function is a broken device<br />
and must be fixed.<br />
<br />
The current code directly frees the device after calling device_add()<br />
without waiting for other kernel parts to release their references.<br />
Thus, a reference could still be held to a struct device,<br />
e.g., by sysfs, leading to potential use-after-free<br />
issues if a proper release function is not set.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21855</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ibmvnic: Don't reference skb after sending to VIOS<br />
<br />
Previously, after successfully flushing the xmit buffer to VIOS,<br />
the tx_bytes stat was incremented by the length of the skb.<br />
<br />
It is invalid to access the skb memory after sending the buffer to<br />
the VIOS because, at any point after sending, the VIOS can trigger<br />
an interrupt to free this memory. A race between reading skb-&gt;len<br />
and freeing the skb is possible (especially during LPM) and will<br />
result in use-after-free:<br />
 ==================================================================<br />
 BUG: KASAN: slab-use-after-free in ibmvnic_xmit+0x75c/0x1808 [ibmvnic]<br />
 Read of size 4 at addr c00000024eb48a70 by task hxecom/14495<br />
 &lt;...&gt;<br />
 Call Trace:<br />
 [c000000118f66cf0] [c0000000018cba6c] dump_stack_lvl+0x84/0xe8 (unreliable)<br />
 [c000000118f66d20] [c0000000006f0080] print_report+0x1a8/0x7f0<br />
 [c000000118f66df0] [c0000000006f08f0] kasan_report+0x128/0x1f8<br />
 [c000000118f66f00] [c0000000006f2868] __asan_load4+0xac/0xe0<br />
 [c000000118f66f20] [c0080000046eac84] ibmvnic_xmit+0x75c/0x1808 [ibmvnic]<br />
 [c000000118f67340] [c0000000014be168] dev_hard_start_xmit+0x150/0x358<br />
 &lt;...&gt;<br />
 Freed by task 0:<br />
 kasan_save_stack+0x34/0x68<br />
 kasan_save_track+0x2c/0x50<br />
 kasan_save_free_info+0x64/0x108<br />
 __kasan_mempool_poison_object+0x148/0x2d4<br />
 napi_skb_cache_put+0x5c/0x194<br />
 net_tx_action+0x154/0x5b8<br />
 handle_softirqs+0x20c/0x60c<br />
 do_softirq_own_stack+0x6c/0x88<br />
 &lt;...&gt;<br />
 The buggy address belongs to the object at c00000024eb48a00 which<br />
  belongs to the cache skbuff_head_cache of size 224<br />
==================================================================</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21854</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
sockmap, vsock: For connectible sockets allow only connected<br />
<br />
sockmap expects all vsocks to have a transport assigned, which is expressed<br />
in vsock_proto::psock_update_sk_prot(). However, there is an edge case<br />
where an unconnected (connectible) socket may lose its previously assigned<br />
transport. This is handled with a NULL check in the vsock/BPF recv path.<br />
<br />
Another design detail is that listening vsocks are not supposed to have any<br />
transport assigned at all. Which implies they are not supported by the<br />
sockmap. But this is complicated by the fact that a socket, before<br />
switching to TCP_LISTEN, may have had some transport assigned during a<br />
failed connect() attempt. Hence, we may end up with a listening vsock in a<br />
sockmap, which blows up quickly:<br />
<br />
KASAN: null-ptr-deref in range [0x0000000000000120-0x0000000000000127]<br />
CPU: 7 UID: 0 PID: 56 Comm: kworker/7:0 Not tainted 6.14.0-rc1+<br />
Workqueue: vsock-loopback vsock_loopback_work<br />
RIP: 0010:vsock_read_skb+0x4b/0x90<br />
Call Trace:<br />
 sk_psock_verdict_data_ready+0xa4/0x2e0<br />
 virtio_transport_recv_pkt+0x1ca8/0x2acc<br />
 vsock_loopback_work+0x27d/0x3f0<br />
 process_one_work+0x846/0x1420<br />
 worker_thread+0x5b3/0xf80<br />
 kthread+0x35a/0x700<br />
 ret_from_fork+0x2d/0x70<br />
 ret_from_fork_asm+0x1a/0x30<br />
<br />
For connectible sockets, instead of relying solely on the state of<br />
vsk-&gt;transport, tell sockmap to only allow those representing established<br />
connections. This aligns with the behaviour for AF_INET and AF_UNIX.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21853</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf: avoid holding freeze_mutex during mmap operation<br />
<br />
We use map-&gt;freeze_mutex to prevent races between map_freeze() and<br />
memory mapping BPF map contents with writable permissions. The way we<br />
naively do this means we'll hold freeze_mutex for entire duration of all<br />
the mm and VMA manipulations, which is completely unnecessary. This can<br />
potentially also lead to deadlocks, as reported by syzbot in [0].<br />
<br />
So, instead, hold freeze_mutex only during writeability checks, bump<br />
(proactively) "write active" count for the map, unlock the mutex and<br />
proceed with mmap logic. And only if something went wrong during mmap<br />
logic, then undo that "write active" counter increment.<br />
<br />
  [0] You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21852</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: Add rx_skb of kfree_skb to raw_tp_null_args[].<br />
<br />
Yan Zhai reported a BPF prog could trigger a null-ptr-deref [0]<br />
in trace_kfree_skb if the prog does not check if rx_sk is NULL.<br />
<br />
Commit c53795d48ee8 ("net: add rx_sk to trace_kfree_skb") added<br />
rx_sk to trace_kfree_skb, but rx_sk is optional and could be NULL.<br />
<br />
Let's add kfree_skb to raw_tp_null_args[] to let the BPF verifier<br />
validate such a prog and prevent the issue.<br />
<br />
Now we fail to load such a prog:<br />
<br />
  libbpf: prog 'drop': -- BEGIN PROG LOAD LOG --<br />
  0: R1=ctx() R10=fp0<br />
  ; int BPF_PROG(drop, struct sk_buff *skb, void *location, @ kfree_skb_sk_null.bpf.c:21<br />
  0: (79) r3 = *(u64 *)(r1 +24)<br />
  func 'kfree_skb' arg3 has btf_id 5253 type STRUCT 'sock'<br />
  1: R1=ctx() R3_w=trusted_ptr_or_null_sock(id=1)<br />
  ; bpf_printk("sk: %d, %d\n", sk, sk-&gt;__sk_common.skc_family); @ kfree_skb_sk_null.bpf.c:24<br />
  1: (69) r4 = *(u16 *)(r3 +16)<br />
  R3 invalid mem access 'trusted_ptr_or_null_'<br />
  processed 2 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0<br />
  -- END PROG LOAD LOG --<br />
<br />
Note this fix requires commit 838a10bd2ebf ("bpf: Augment raw_tp<br />
arguments with PTR_MAYBE_NULL").<br />
<br />
[0]:<br />
BUG: kernel NULL pointer dereference, address: 0000000000000010<br />
 PF: supervisor read access in kernel mode<br />
 PF: error_code(0x0000) - not-present page<br />
PGD 0 P4D 0<br />
PREEMPT SMP<br />
RIP: 0010:bpf_prog_5e21a6db8fcff1aa_drop+0x10/0x2d<br />
Call Trace:<br />
 &lt;TASK&gt;<br />
 ? __die+0x1f/0x60<br />
 ? page_fault_oops+0x148/0x420<br />
 ? search_bpf_extables+0x5b/0x70<br />
 ? fixup_exception+0x27/0x2c0<br />
 ? exc_page_fault+0x75/0x170<br />
 ? asm_exc_page_fault+0x22/0x30<br />
 ? bpf_prog_5e21a6db8fcff1aa_drop+0x10/0x2d<br />
 bpf_trace_run4+0x68/0xd0<br />
 ? unix_stream_connect+0x1f4/0x6f0<br />
 sk_skb_reason_drop+0x90/0x120<br />
 unix_stream_connect+0x1f4/0x6f0<br />
 __sys_connect+0x7f/0xb0<br />
 __x64_sys_connect+0x14/0x20<br />
 do_syscall_64+0x47/0xc30<br />
 entry_SYSCALL_64_after_hwframe+0x4b/0x53</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21851</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf: Fix softlockup in arena_map_free on 64k page kernel<br />
<br />
On an aarch64 kernel with CONFIG_PAGE_SIZE_64KB=y,<br />
arena_htab tests cause a segmentation fault and soft lockup.<br />
The same failure is not observed with 4k pages on aarch64.<br />
<br />
It turns out arena_map_free() is calling<br />
apply_to_existing_page_range() with the address returned by<br />
bpf_arena_get_kern_vm_start().  If this address is not page-aligned<br />
the code ends up calling apply_to_pte_range() with that unaligned<br />
address causing soft lockup.<br />
<br />
Fix it by round up GUARD_SZ to PAGE_SIZE &lt;&lt; 1 so that the<br />
division by 2 in bpf_arena_get_kern_vm_start() returns<br />
a page-aligned value.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21850</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
nvmet: Fix crash when a namespace is disabled<br />
<br />
The namespace percpu counter protects pending I/O, and we can<br />
only safely diable the namespace once the counter drop to zero.<br />
Otherwise we end up with a crash when running blktests/nvme/058<br />
(eg for loop transport):<br />
<br />
[ 2352.930426] [  T53909] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] PREEMPT SMP KASAN PTI<br />
[ 2352.930431] [  T53909] KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]<br />
[ 2352.930434] [  T53909] CPU: 3 UID: 0 PID: 53909 Comm: kworker/u16:5 Tainted: G        W          6.13.0-rc6 #232<br />
[ 2352.930438] [  T53909] Tainted: [W]=WARN<br />
[ 2352.930440] [  T53909] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014<br />
[ 2352.930443] [  T53909] Workqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]<br />
[ 2352.930449] [  T53909] RIP: 0010:blkcg_set_ioprio+0x44/0x180<br />
<br />
as the queue is already torn down when calling submit_bio();<br />
<br />
So we need to init the percpu counter in nvmet_ns_enable(), and<br />
wait for it to drop to zero in nvmet_ns_disable() to avoid having<br />
I/O pending after the namespace has been disabled.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21849</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/i915/gt: Use spin_lock_irqsave() in interruptible context<br />
<br />
spin_lock/unlock() functions used in interrupt contexts could<br />
result in a deadlock, as seen in GitLab issue #13399,<br />
which occurs when interrupt comes in while holding a lock.<br />
<br />
Try to remedy the problem by saving irq state before spin lock<br />
acquisition.<br />
<br />
v2: add irqs' state save/restore calls to all locks/unlocks in<br />
 signal_irq_work() execution (Maciej)<br />
<br />
v3: use with spin_lock_irqsave() in guc_lrc_desc_unpin() instead<br />
 of other lock/unlock calls and add Fixes and Cc tags (Tvrtko);<br />
 change title and commit message<br />
<br />
(cherry picked from commit c088387ddd6482b40f21ccf23db1125e8fa4af7e)</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21848</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()<br />
<br />
Add check for the return value of nfp_app_ctrl_msg_alloc() in<br />
nfp_bpf_cmsg_alloc() to prevent null pointer dereference.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-24912</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">3.7</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21866</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC<br />
<br />
Erhard reported the following KASAN hit while booting his PowerMac G4<br />
with a KASAN-enabled kernel 6.13-rc6:<br />
<br />
  BUG: KASAN: vmalloc-out-of-bounds in copy_to_kernel_nofault+0xd8/0x1c8<br />
  Write of size 8 at addr f1000000 by task chronyd/1293<br />
<br />
  CPU: 0 UID: 123 PID: 1293 Comm: chronyd Tainted: G        W          6.13.0-rc6-PMacG4 #2<br />
  Tainted: [W]=WARN<br />
  Hardware name: PowerMac3,6 7455 0x80010303 PowerMac<br />
  Call Trace:<br />
  [c2437590] [c1631a84] dump_stack_lvl+0x70/0x8c (unreliable)<br />
  [c24375b0] [c0504998] print_report+0xdc/0x504<br />
  [c2437610] [c050475c] kasan_report+0xf8/0x108<br />
  [c2437690] [c0505a3c] kasan_check_range+0x24/0x18c<br />
  [c24376a0] [c03fb5e4] copy_to_kernel_nofault+0xd8/0x1c8<br />
  [c24376c0] [c004c014] patch_instructions+0x15c/0x16c<br />
  [c2437710] [c00731a8] bpf_arch_text_copy+0x60/0x7c<br />
  [c2437730] [c0281168] bpf_jit_binary_pack_finalize+0x50/0xac<br />
  [c2437750] [c0073cf4] bpf_int_jit_compile+0xb30/0xdec<br />
  [c2437880] [c0280394] bpf_prog_select_runtime+0x15c/0x478<br />
  [c24378d0] [c1263428] bpf_prepare_filter+0xbf8/0xc14<br />
  [c2437990] [c12677ec] bpf_prog_create_from_user+0x258/0x2b4<br />
  [c24379d0] [c027111c] do_seccomp+0x3dc/0x1890<br />
  [c2437ac0] [c001d8e0] system_call_exception+0x2dc/0x420<br />
  [c2437f30] [c00281ac] ret_from_syscall+0x0/0x2c<br />
  --- interrupt: c00 at 0x5a1274<br />
  NIP:  005a1274 LR: 006a3b3c CTR: 005296c8<br />
  REGS: c2437f40 TRAP: 0c00   Tainted: G        W           (6.13.0-rc6-PMacG4)<br />
  MSR:  0200f932 &lt;VEC,EE,PR,FP,ME,IR,DR,RI&gt;  CR: 24004422  XER: 00000000<br />
<br />
  GPR00: 00000166 af8f3fa0 a7ee3540 00000001 00000000 013b6500 005a5858 0200f932<br />
  GPR08: 00000000 00001fe9 013d5fc8 005296c8 2822244c 00b2fcd8 00000000 af8f4b57<br />
  GPR16: 00000000 00000001 00000000 00000000 00000000 00000001 00000000 00000002<br />
  GPR24: 00afdbb0 00000000 00000000 00000000 006e0004 013ce060 006e7c1c 00000001<br />
  NIP [005a1274] 0x5a1274<br />
  LR [006a3b3c] 0x6a3b3c<br />
  --- interrupt: c00<br />
<br />
  The buggy address belongs to the virtual mapping at<br />
   [f1000000, f1002000) created by:<br />
   text_area_cpu_up+0x20/0x190<br />
<br />
  The buggy address belongs to the physical page:<br />
  page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x76e30<br />
  flags: 0x80000000(zone=2)<br />
  raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001<br />
  raw: 00000000<br />
  page dumped because: kasan: bad access detected<br />
<br />
  Memory state around the buggy address:<br />
   f0ffff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<br />
   f0ffff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<br />
  &gt;f1000000: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8<br />
             ^<br />
   f1000080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8<br />
   f1000100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8<br />
  ==================================================================<br />
<br />
f8 corresponds to KASAN_VMALLOC_INVALID which means the area is not<br />
initialised hence not supposed to be used yet.<br />
<br />
Powerpc text patching infrastructure allocates a virtual memory area<br />
using get_vm_area() and flags it as VM_ALLOC. But that flag is meant<br />
to be used for vmalloc() and vmalloc() allocated memory is not<br />
supposed to be used before a call to __vmalloc_node_range() which is<br />
never called for that area.<br />
<br />
That went undetected until commit e4137f08816b ("mm, kasan, kmsan:<br />
instrument copy_from/to_kernel_nofault")<br />
<br />
The area allocated by text_area_cpu_up() is not vmalloc memory, it is<br />
mapped directly on demand when needed by map_kernel_page(). There is<br />
no VM flag corresponding to such usage, so just pass no flag. That way<br />
the area will be unpoisonned and usable immediately.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21865</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl().<br />
<br />
Brad Spengler reported the list_del() corruption splat in<br />
gtp_net_exit_batch_rtnl(). [0]<br />
<br />
Commit eb28fd76c0a0 ("gtp: Destroy device along with udp socket's netns<br />
dismantle.") added the for_each_netdev() loop in gtp_net_exit_batch_rtnl()<br />
to destroy devices in each netns as done in geneve and ip tunnels.<br />
<br />
However, this could trigger -&gt;dellink() twice for the same device during<br />
-&gt;exit_batch_rtnl().<br />
<br />
Say we have two netns A &amp; B and gtp device B that resides in netns B but<br />
whose UDP socket is in netns A.<br />
<br />
  1. cleanup_net() processes netns A and then B.<br />
<br />
  2. gtp_net_exit_batch_rtnl() finds the device B while iterating<br />
     netns A's gn-&gt;gtp_dev_list and calls -&gt;dellink().<br />
<br />
  [ device B is not yet unlinked from netns B<br />
    as unregister_netdevice_many() has not been called. ]<br />
<br />
  3. gtp_net_exit_batch_rtnl() finds the device B while iterating<br />
     netns B's for_each_netdev() and calls -&gt;dellink().<br />
<br />
gtp_dellink() cleans up the device's hash table, unlinks the dev from<br />
gn-&gt;gtp_dev_list, and calls unregister_netdevice_queue().<br />
<br />
Basically, calling gtp_dellink() multiple times is fine unless<br />
CONFIG_DEBUG_LIST is enabled.<br />
<br />
Let's remove for_each_netdev() in gtp_net_exit_batch_rtnl() and<br />
delegate the destruction to default_device_exit_batch() as done<br />
in bareudp.<br />
<br />
[0]:<br />
list_del corruption, ffff8880aaa62c00-&gt;next (autoslab_size_M_dev_P_net_core_dev_11127_8_1328_8_S_4096_A_64_n_139+0xc00/0x1000 [slab object]) is LIST_POISON1 (ffffffffffffff02) (prev is 0xffffffffffffff04)<br />
kernel BUG at lib/list_debug.c:58!<br />
Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN<br />
CPU: 1 UID: 0 PID: 1804 Comm: kworker/u8:7 Tainted: G                T   6.12.13-grsec-full-20250211091339 #1<br />
Tainted: [T]=RANDSTRUCT<br />
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014<br />
Workqueue: netns cleanup_net<br />
RIP: 0010:[&lt;ffffffff84947381&gt;] __list_del_entry_valid_or_report+0x141/0x200 lib/list_debug.c:58<br />
Code: c2 76 91 31 c0 e8 9f b1 f7 fc 0f 0b 4d 89 f0 48 c7 c1 02 ff ff ff 48 89 ea 48 89 ee 48 c7 c7 e0 c2 76 91 31 c0 e8 7f b1 f7 fc &lt;0f&gt; 0b 4d 89 e8 48 c7 c1 04 ff ff ff 48 89 ea 48 89 ee 48 c7 c7 60<br />
RSP: 0018:fffffe8040b4fbd0 EFLAGS: 00010283<br />
RAX: 00000000000000cc RBX: dffffc0000000000 RCX: ffffffff818c4054<br />
RDX: ffffffff84947381 RSI: ffffffff818d1512 RDI: 0000000000000000<br />
RBP: ffff8880aaa62c00 R08: 0000000000000001 R09: fffffbd008169f32<br />
R10: fffffe8040b4f997 R11: 0000000000000001 R12: a1988d84f24943e4<br />
R13: ffffffffffffff02 R14: ffffffffffffff04 R15: ffff8880aaa62c08<br />
RBX: kasan shadow of 0x0<br />
RCX: __wake_up_klogd.part.0+0x74/0xe0 kernel/printk/printk.c:4554<br />
RDX: __list_del_entry_valid_or_report+0x141/0x200 lib/list_debug.c:58<br />
RSI: vprintk+0x72/0x100 kernel/printk/printk_safe.c:71<br />
RBP: autoslab_size_M_dev_P_net_core_dev_11127_8_1328_8_S_4096_A_64_n_139+0xc00/0x1000 [slab object]<br />
RSP: process kstack fffffe8040b4fbd0+0x7bd0/0x8000 [kworker/u8:7+netns 1804 ]<br />
R09: kasan shadow of process kstack fffffe8040b4f990+0x7990/0x8000 [kworker/u8:7+netns 1804 ]<br />
R10: process kstack fffffe8040b4f997+0x7997/0x8000 [kworker/u8:7+netns 1804 ]<br />
R15: autoslab_size_M_dev_P_net_core_dev_11127_8_1328_8_S_4096_A_64_n_139+0xc08/0x1000 [slab object]<br />
FS:  0000000000000000(0000) GS:ffff888116000000(0000) knlGS:0000000000000000<br />
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
CR2: 0000748f5372c000 CR3: 0000000015408000 CR4: 00000000003406f0 shadow CR4: 00000000003406f0<br />
Stack:<br />
 0000000000000000 ffffffff8a0c35e7 ffffffff8a0c3603 ffff8880aaa62c00<br />
 ffff8880aaa62c00 0000000000000004 ffff88811145311c 0000000000000005<br />
 0000000000000001 ffff8880aaa62000 fffffe8040b4fd40 ffffffff8a0c360d<br />
Call Trace:<br />
 &lt;TASK&gt;<br />
 [&lt;ffffffff8a0c360d&gt;] __list_del_entry_valid include/linux/list.h:131 [inline] fffffe8040b4fc28<br />
 [&lt;ffffffff8a0c360d&gt;] __list_del_entry include/linux/list.h:248 [inline] fffffe8040b4fc28<br />
 [&lt;ffffffff8a0c360d&gt;] list_del include/linux/list.h:262 [inl<br />
---truncated---</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21864</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tcp: drop secpath at the same time as we currently drop dst<br />
<br />
Xiumei reported hitting the WARN in xfrm6_tunnel_net_exit while<br />
running tests that boil down to:<br />
 - create a pair of netns<br />
 - run a basic TCP test over ipcomp6<br />
 - delete the pair of netns<br />
<br />
The xfrm_state found on spi_byaddr was not deleted at the time we<br />
delete the netns, because we still have a reference on it. This<br />
lingering reference comes from a secpath (which holds a ref on the<br />
xfrm_state), which is still attached to an skb. This skb is not<br />
leaked, it ends up on sk_receive_queue and then gets defer-free'd by<br />
skb_attempt_defer_free.<br />
<br />
The problem happens when we defer freeing an skb (push it on one CPU's<br />
defer_list), and don't flush that list before the netns is deleted. In<br />
that case, we still have a reference on the xfrm_state that we don't<br />
expect at this point.<br />
<br />
We already drop the skb's dst in the TCP receive path when it's no<br />
longer needed, so let's also drop the secpath. At this point,<br />
tcp_filter has already called into the LSM hooks that may require the<br />
secpath, so it should not be needed anymore. However, in some of those<br />
places, the MPTCP extension has just been attached to the skb, so we<br />
cannot simply drop all extensions.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21863</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
io_uring: prevent opcode speculation<br />
<br />
sqe-&gt;opcode is used for different tables, make sure we santitise it<br />
against speculations.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21862</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drop_monitor: fix incorrect initialization order<br />
<br />
Syzkaller reports the following bug:<br />
<br />
BUG: spinlock bad magic on CPU#1, syz-executor.0/7995<br />
 lock: 0xffff88805303f3e0, .magic: 00000000, .owner: &lt;none&gt;/-1, .owner_cpu: 0<br />
CPU: 1 PID: 7995 Comm: syz-executor.0 Tainted: G            E     5.10.209+ #1<br />
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020<br />
Call Trace:<br />
 __dump_stack lib/dump_stack.c:77 [inline]<br />
 dump_stack+0x119/0x179 lib/dump_stack.c:118<br />
 debug_spin_lock_before kernel/locking/spinlock_debug.c:83 [inline]<br />
 do_raw_spin_lock+0x1f6/0x270 kernel/locking/spinlock_debug.c:112<br />
 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:117 [inline]<br />
 _raw_spin_lock_irqsave+0x50/0x70 kernel/locking/spinlock.c:159<br />
 reset_per_cpu_data+0xe6/0x240 [drop_monitor]<br />
 net_dm_cmd_trace+0x43d/0x17a0 [drop_monitor]<br />
 genl_family_rcv_msg_doit+0x22f/0x330 net/netlink/genetlink.c:739<br />
 genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]<br />
 genl_rcv_msg+0x341/0x5a0 net/netlink/genetlink.c:800<br />
 netlink_rcv_skb+0x14d/0x440 net/netlink/af_netlink.c:2497<br />
 genl_rcv+0x29/0x40 net/netlink/genetlink.c:811<br />
 netlink_unicast_kernel net/netlink/af_netlink.c:1322 [inline]<br />
 netlink_unicast+0x54b/0x800 net/netlink/af_netlink.c:1348<br />
 netlink_sendmsg+0x914/0xe00 net/netlink/af_netlink.c:1916<br />
 sock_sendmsg_nosec net/socket.c:651 [inline]<br />
 __sock_sendmsg+0x157/0x190 net/socket.c:663<br />
 ____sys_sendmsg+0x712/0x870 net/socket.c:2378<br />
 ___sys_sendmsg+0xf8/0x170 net/socket.c:2432<br />
 __sys_sendmsg+0xea/0x1b0 net/socket.c:2461<br />
 do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46<br />
 entry_SYSCALL_64_after_hwframe+0x62/0xc7<br />
RIP: 0033:0x7f3f9815aee9<br />
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48<br />
RSP: 002b:00007f3f972bf0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e<br />
RAX: ffffffffffffffda RBX: 00007f3f9826d050 RCX: 00007f3f9815aee9<br />
RDX: 0000000020000000 RSI: 0000000020001300 RDI: 0000000000000007<br />
RBP: 00007f3f981b63bd R08: 0000000000000000 R09: 0000000000000000<br />
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000<br />
R13: 000000000000006e R14: 00007f3f9826d050 R15: 00007ffe01ee6768<br />
<br />
If drop_monitor is built as a kernel module, syzkaller may have time<br />
to send a netlink NET_DM_CMD_START message during the module loading.<br />
This will call the net_dm_monitor_start() function that uses<br />
a spinlock that has not yet been initialized.<br />
<br />
To fix this, let's place resource initialization above the registration<br />
of a generic netlink family.<br />
<br />
Found by InfoTeCS on behalf of Linux Verification Center<br />
(linuxtesting.org) with Syzkaller.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21861</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize()<br />
<br />
If migration succeeded, we called<br />
folio_migrate_flags()-&gt;mem_cgroup_migrate() to migrate the memcg from the<br />
old to the new folio.  This will set memcg_data of the old folio to 0.<br />
<br />
Similarly, if migration failed, memcg_data of the dst folio is left unset.<br />
<br />
If we call folio_putback_lru() on such folios (memcg_data == 0), we will<br />
add the folio to be freed to the LRU, making memcg code unhappy.  Running<br />
the hmm selftests:<br />
<br />
  # ./hmm-tests<br />
  ...<br />
  #  RUN           hmm.hmm_device_private.migrate ...<br />
  [  102.078007][T14893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x7ff27d200 pfn:0x13cc00<br />
  [  102.079974][T14893] anon flags: 0x17ff00000020018(uptodate|dirty|swapbacked|node=0|zone=2|lastcpupid=0x7ff)<br />
  [  102.082037][T14893] raw: 017ff00000020018 dead000000000100 dead000000000122 ffff8881353896c9<br />
  [  102.083687][T14893] raw: 00000007ff27d200 0000000000000000 00000001ffffffff 0000000000000000<br />
  [  102.085331][T14893] page dumped because: VM_WARN_ON_ONCE_FOLIO(!memcg &amp;&amp; !mem_cgroup_disabled())<br />
  [  102.087230][T14893] ------------[ cut here ]------------<br />
  [  102.088279][T14893] WARNING: CPU: 0 PID: 14893 at ./include/linux/memcontrol.h:726 folio_lruvec_lock_irqsave+0x10e/0x170<br />
  [  102.090478][T14893] Modules linked in:<br />
  [  102.091244][T14893] CPU: 0 UID: 0 PID: 14893 Comm: hmm-tests Not tainted 6.13.0-09623-g6c216bc522fd #151<br />
  [  102.093089][T14893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014<br />
  [  102.094848][T14893] RIP: 0010:folio_lruvec_lock_irqsave+0x10e/0x170<br />
  [  102.096104][T14893] Code: ...<br />
  [  102.099908][T14893] RSP: 0018:ffffc900236c37b0 EFLAGS: 00010293<br />
  [  102.101152][T14893] RAX: 0000000000000000 RBX: ffffea0004f30000 RCX: ffffffff8183f426<br />
  [  102.102684][T14893] RDX: ffff8881063cb880 RSI: ffffffff81b8117f RDI: ffff8881063cb880<br />
  [  102.104227][T14893] RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000<br />
  [  102.105757][T14893] R10: 0000000000000001 R11: 0000000000000002 R12: ffffc900236c37d8<br />
  [  102.107296][T14893] R13: ffff888277a2bcb0 R14: 000000000000001f R15: 0000000000000000<br />
  [  102.108830][T14893] FS:  00007ff27dbdd740(0000) GS:ffff888277a00000(0000) knlGS:0000000000000000<br />
  [  102.110643][T14893] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
  [  102.111924][T14893] CR2: 00007ff27d400000 CR3: 000000010866e000 CR4: 0000000000750ef0<br />
  [  102.113478][T14893] PKRU: 55555554<br />
  [  102.114172][T14893] Call Trace:<br />
  [  102.114805][T14893]  &lt;TASK&gt;<br />
  [  102.115397][T14893]  ? folio_lruvec_lock_irqsave+0x10e/0x170<br />
  [  102.116547][T14893]  ? __warn.cold+0x110/0x210<br />
  [  102.117461][T14893]  ? folio_lruvec_lock_irqsave+0x10e/0x170<br />
  [  102.118667][T14893]  ? report_bug+0x1b9/0x320<br />
  [  102.119571][T14893]  ? handle_bug+0x54/0x90<br />
  [  102.120494][T14893]  ? exc_invalid_op+0x17/0x50<br />
  [  102.121433][T14893]  ? asm_exc_invalid_op+0x1a/0x20<br />
  [  102.122435][T14893]  ? __wake_up_klogd.part.0+0x76/0xd0<br />
  [  102.123506][T14893]  ? dump_page+0x4f/0x60<br />
  [  102.124352][T14893]  ? folio_lruvec_lock_irqsave+0x10e/0x170<br />
  [  102.125500][T14893]  folio_batch_move_lru+0xd4/0x200<br />
  [  102.126577][T14893]  ? __pfx_lru_add+0x10/0x10<br />
  [  102.127505][T14893]  __folio_batch_add_and_move+0x391/0x720<br />
  [  102.128633][T14893]  ? __pfx_lru_add+0x10/0x10<br />
  [  102.129550][T14893]  folio_putback_lru+0x16/0x80<br />
  [  102.130564][T14893]  migrate_device_finalize+0x9b/0x530<br />
  [  102.131640][T14893]  dmirror_migrate_to_device.constprop.0+0x7c5/0xad0<br />
  [  102.133047][T14893]  dmirror_fops_unlocked_ioctl+0x89b/0xc80<br />
<br />
Likely, nothing else goes wrong: putting the last folio reference will<br />
remove the folio from the LRU again.  So besides memcg complaining, adding<br />
the folio to be freed to the LRU is just an unnecessary step.<br />
<br />
The new flow resembles what we have in migrate_folio_move(): add the dst<br />
to the lru, rem<br />
---truncated---</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21860</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mm/zswap: fix inconsistency when zswap_store_page() fails<br />
<br />
Commit b7c0ccdfbafd ("mm: zswap: support large folios in zswap_store()")<br />
skips charging any zswap entries when it failed to zswap the entire folio.<br />
<br />
However, when some base pages are zswapped but it failed to zswap the<br />
entire folio, the zswap operation is rolled back.  When freeing zswap<br />
entries for those pages, zswap_entry_free() uncharges the zswap entries<br />
that were not previously charged, causing zswap charging to become<br />
inconsistent.<br />
<br />
This inconsistency triggers two warnings with following steps:<br />
  # On a machine with 64GiB of RAM and 36GiB of zswap<br />
  &#36; stress-ng --bigheap 2 # wait until the OOM-killer kills stress-ng<br />
  &#36; sudo reboot<br />
<br />
  The two warnings are:<br />
    in mm/memcontrol.c:163, function obj_cgroup_release():<br />
      WARN_ON_ONCE(nr_bytes &amp; (PAGE_SIZE - 1));<br />
<br />
    in mm/page_counter.c:60, function page_counter_cancel():<br />
      if (WARN_ONCE(new &lt; 0, "page_counter underflow: %ld nr_pages=%lu\n",<br />
	  new, nr_pages))<br />
<br />
zswap_stored_pages also becomes inconsistent in the same way.<br />
<br />
As suggested by Kanchana, increment zswap_stored_pages and charge zswap<br />
entries within zswap_store_page() when it succeeds.  This way,<br />
zswap_entry_free() will decrement the counter and uncharge the entries<br />
when it failed to zswap the entire folio.<br />
<br />
While this could potentially be optimized by batching objcg charging and<br />
incrementing the counter, let's focus on fixing the bug this time and<br />
leave the optimization for later after some evaluation.<br />
<br />
After resolving the inconsistency, the warnings disappear.<br />
<br />
[42.hyeyoo@gmail.com: refactor zswap_store_page()]<br />
  Link: You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21859</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
USB: gadget: f_midi: f_midi_complete to call queue_work<br />
<br />
When using USB MIDI, a lock is attempted to be acquired twice through a<br />
re-entrant call to f_midi_transmit, causing a deadlock.<br />
<br />
Fix it by using queue_work() to schedule the inner f_midi_transmit() via<br />
a high priority work queue from the completion handler.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21858</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
geneve: Fix use-after-free in geneve_find_dev().<br />
<br />
syzkaller reported a use-after-free in geneve_find_dev() [0]<br />
without repro.<br />
<br />
geneve_configure() links struct geneve_dev.next to<br />
net_generic(net, geneve_net_id)-&gt;geneve_list.<br />
<br />
The net here could differ from dev_net(dev) if IFLA_NET_NS_PID,<br />
IFLA_NET_NS_FD, or IFLA_TARGET_NETNSID is set.<br />
<br />
When dev_net(dev) is dismantled, geneve_exit_batch_rtnl() finally<br />
calls unregister_netdevice_queue() for each dev in the netns,<br />
and later the dev is freed.<br />
<br />
However, its geneve_dev.next is still linked to the backend UDP<br />
socket netns.<br />
<br />
Then, use-after-free will occur when another geneve dev is created<br />
in the netns.<br />
<br />
Let's call geneve_dellink() instead in geneve_destroy_tunnels().<br />
<br />
[0]:<br />
BUG: KASAN: slab-use-after-free in geneve_find_dev drivers/net/geneve.c:1295 [inline]<br />
BUG: KASAN: slab-use-after-free in geneve_configure+0x234/0x858 drivers/net/geneve.c:1343<br />
Read of size 2 at addr ffff000054d6ee24 by task syz.1.4029/13441<br />
<br />
CPU: 1 UID: 0 PID: 13441 Comm: syz.1.4029 Not tainted 6.13.0-g0ad9617c78ac #24 dc35ca22c79fb82e8e7bc5c9c9adafea898b1e3d<br />
Hardware name: linux,dummy-virt (DT)<br />
Call trace:<br />
 show_stack+0x38/0x50 arch/arm64/kernel/stacktrace.c:466 &copy;<br />
 __dump_stack lib/dump_stack.c:94 [inline]<br />
 dump_stack_lvl+0xbc/0x108 lib/dump_stack.c:120<br />
 print_address_description mm/kasan/report.c:378 [inline]<br />
 print_report+0x16c/0x6f0 mm/kasan/report.c:489<br />
 kasan_report+0xc0/0x120 mm/kasan/report.c:602<br />
 __asan_report_load2_noabort+0x20/0x30 mm/kasan/report_generic.c:379<br />
 geneve_find_dev drivers/net/geneve.c:1295 [inline]<br />
 geneve_configure+0x234/0x858 drivers/net/geneve.c:1343<br />
 geneve_newlink+0xb8/0x128 drivers/net/geneve.c:1634<br />
 rtnl_newlink_create+0x23c/0x868 net/core/rtnetlink.c:3795<br />
 __rtnl_newlink net/core/rtnetlink.c:3906 [inline]<br />
 rtnl_newlink+0x1054/0x1630 net/core/rtnetlink.c:4021<br />
 rtnetlink_rcv_msg+0x61c/0x918 net/core/rtnetlink.c:6911<br />
 netlink_rcv_skb+0x1dc/0x398 net/netlink/af_netlink.c:2543<br />
 rtnetlink_rcv+0x34/0x50 net/core/rtnetlink.c:6938<br />
 netlink_unicast_kernel net/netlink/af_netlink.c:1322 [inline]<br />
 netlink_unicast+0x618/0x838 net/netlink/af_netlink.c:1348<br />
 netlink_sendmsg+0x5fc/0x8b0 net/netlink/af_netlink.c:1892<br />
 sock_sendmsg_nosec net/socket.c:713 [inline]<br />
 __sock_sendmsg net/socket.c:728 [inline]<br />
 ____sys_sendmsg+0x410/0x6f8 net/socket.c:2568<br />
 ___sys_sendmsg+0x178/0x1d8 net/socket.c:2622<br />
 __sys_sendmsg net/socket.c:2654 [inline]<br />
 __do_sys_sendmsg net/socket.c:2659 [inline]<br />
 __se_sys_sendmsg net/socket.c:2657 [inline]<br />
 __arm64_sys_sendmsg+0x12c/0x1c8 net/socket.c:2657<br />
 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]<br />
 invoke_syscall+0x90/0x278 arch/arm64/kernel/syscall.c:49<br />
 el0_svc_common+0x13c/0x250 arch/arm64/kernel/syscall.c:132<br />
 do_el0_svc+0x54/0x70 arch/arm64/kernel/syscall.c:151<br />
 el0_svc+0x4c/0xa8 arch/arm64/kernel/entry-common.c:744<br />
 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:762<br />
 el0t_64_sync+0x198/0x1a0 arch/arm64/kernel/entry.S:600<br />
<br />
Allocated by task 13247:<br />
 kasan_save_stack mm/kasan/common.c:47 [inline]<br />
 kasan_save_track+0x30/0x68 mm/kasan/common.c:68<br />
 kasan_save_alloc_info+0x44/0x58 mm/kasan/generic.c:568<br />
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]<br />
 __kasan_kmalloc+0x84/0xa0 mm/kasan/common.c:394<br />
 kasan_kmalloc include/linux/kasan.h:260 [inline]<br />
 __do_kmalloc_node mm/slub.c:4298 [inline]<br />
 __kmalloc_node_noprof+0x2a0/0x560 mm/slub.c:4304<br />
 __kvmalloc_node_noprof+0x9c/0x230 mm/util.c:645<br />
 alloc_netdev_mqs+0xb8/0x11a0 net/core/dev.c:11470<br />
 rtnl_create_link+0x2b8/0xb50 net/core/rtnetlink.c:3604<br />
 rtnl_newlink_create+0x19c/0x868 net/core/rtnetlink.c:3780<br />
 __rtnl_newlink net/core/rtnetlink.c:3906 [inline]<br />
 rtnl_newlink+0x1054/0x1630 net/core/rtnetlink.c:4021<br />
 rtnetlink_rcv_msg+0x61c/0x918 net/core/rtnetlink.c:6911<br />
 netlink_rcv_skb+0x1dc/0x398 net/netlink/af_netlink.c:2543<br />
 rtnetlink_rcv+0x34/0x50 net/core/rtnetlink.c:6938<br />
 netlink_unicast_kernel net/netlink/af_n<br />
---truncated---</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21857</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/sched: cls_api: fix error handling causing NULL dereference<br />
<br />
tcf_exts_miss_cookie_base_alloc() calls xa_alloc_cyclic() which can<br />
return 1 if the allocation succeeded after wrapping. This was treated as<br />
an error, with value 1 returned to caller tcf_exts_init_ex() which sets<br />
exts-&gt;actions to NULL and returns 1 to caller fl_change().<br />
<br />
fl_change() treats err == 1 as success, calling tcf_exts_validate_ex()<br />
which calls tcf_action_init() with exts-&gt;actions as argument, where it<br />
is dereferenced.<br />
<br />
Example trace:<br />
<br />
BUG: kernel NULL pointer dereference, address: 0000000000000000<br />
CPU: 114 PID: 16151 Comm: handler114 Kdump: loaded Not tainted 5.14.0-503.16.1.el9_5.x86_64 #1<br />
RIP: 0010:tcf_action_init+0x1f8/0x2c0<br />
Call Trace:<br />
 tcf_action_init+0x1f8/0x2c0<br />
 tcf_exts_validate_ex+0x175/0x190<br />
 fl_change+0x537/0x1120 [cls_flower]</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21856</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
s390/ism: add release function for struct device<br />
<br />
According to device_release() in /drivers/base/core.c,<br />
a device without a release function is a broken device<br />
and must be fixed.<br />
<br />
The current code directly frees the device after calling device_add()<br />
without waiting for other kernel parts to release their references.<br />
Thus, a reference could still be held to a struct device,<br />
e.g., by sysfs, leading to potential use-after-free<br />
issues if a proper release function is not set.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21855</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ibmvnic: Don't reference skb after sending to VIOS<br />
<br />
Previously, after successfully flushing the xmit buffer to VIOS,<br />
the tx_bytes stat was incremented by the length of the skb.<br />
<br />
It is invalid to access the skb memory after sending the buffer to<br />
the VIOS because, at any point after sending, the VIOS can trigger<br />
an interrupt to free this memory. A race between reading skb-&gt;len<br />
and freeing the skb is possible (especially during LPM) and will<br />
result in use-after-free:<br />
 ==================================================================<br />
 BUG: KASAN: slab-use-after-free in ibmvnic_xmit+0x75c/0x1808 [ibmvnic]<br />
 Read of size 4 at addr c00000024eb48a70 by task hxecom/14495<br />
 &lt;...&gt;<br />
 Call Trace:<br />
 [c000000118f66cf0] [c0000000018cba6c] dump_stack_lvl+0x84/0xe8 (unreliable)<br />
 [c000000118f66d20] [c0000000006f0080] print_report+0x1a8/0x7f0<br />
 [c000000118f66df0] [c0000000006f08f0] kasan_report+0x128/0x1f8<br />
 [c000000118f66f00] [c0000000006f2868] __asan_load4+0xac/0xe0<br />
 [c000000118f66f20] [c0080000046eac84] ibmvnic_xmit+0x75c/0x1808 [ibmvnic]<br />
 [c000000118f67340] [c0000000014be168] dev_hard_start_xmit+0x150/0x358<br />
 &lt;...&gt;<br />
 Freed by task 0:<br />
 kasan_save_stack+0x34/0x68<br />
 kasan_save_track+0x2c/0x50<br />
 kasan_save_free_info+0x64/0x108<br />
 __kasan_mempool_poison_object+0x148/0x2d4<br />
 napi_skb_cache_put+0x5c/0x194<br />
 net_tx_action+0x154/0x5b8<br />
 handle_softirqs+0x20c/0x60c<br />
 do_softirq_own_stack+0x6c/0x88<br />
 &lt;...&gt;<br />
 The buggy address belongs to the object at c00000024eb48a00 which<br />
  belongs to the cache skbuff_head_cache of size 224<br />
==================================================================</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21854</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
sockmap, vsock: For connectible sockets allow only connected<br />
<br />
sockmap expects all vsocks to have a transport assigned, which is expressed<br />
in vsock_proto::psock_update_sk_prot(). However, there is an edge case<br />
where an unconnected (connectible) socket may lose its previously assigned<br />
transport. This is handled with a NULL check in the vsock/BPF recv path.<br />
<br />
Another design detail is that listening vsocks are not supposed to have any<br />
transport assigned at all. Which implies they are not supported by the<br />
sockmap. But this is complicated by the fact that a socket, before<br />
switching to TCP_LISTEN, may have had some transport assigned during a<br />
failed connect() attempt. Hence, we may end up with a listening vsock in a<br />
sockmap, which blows up quickly:<br />
<br />
KASAN: null-ptr-deref in range [0x0000000000000120-0x0000000000000127]<br />
CPU: 7 UID: 0 PID: 56 Comm: kworker/7:0 Not tainted 6.14.0-rc1+<br />
Workqueue: vsock-loopback vsock_loopback_work<br />
RIP: 0010:vsock_read_skb+0x4b/0x90<br />
Call Trace:<br />
 sk_psock_verdict_data_ready+0xa4/0x2e0<br />
 virtio_transport_recv_pkt+0x1ca8/0x2acc<br />
 vsock_loopback_work+0x27d/0x3f0<br />
 process_one_work+0x846/0x1420<br />
 worker_thread+0x5b3/0xf80<br />
 kthread+0x35a/0x700<br />
 ret_from_fork+0x2d/0x70<br />
 ret_from_fork_asm+0x1a/0x30<br />
<br />
For connectible sockets, instead of relying solely on the state of<br />
vsk-&gt;transport, tell sockmap to only allow those representing established<br />
connections. This aligns with the behaviour for AF_INET and AF_UNIX.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21853</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf: avoid holding freeze_mutex during mmap operation<br />
<br />
We use map-&gt;freeze_mutex to prevent races between map_freeze() and<br />
memory mapping BPF map contents with writable permissions. The way we<br />
naively do this means we'll hold freeze_mutex for entire duration of all<br />
the mm and VMA manipulations, which is completely unnecessary. This can<br />
potentially also lead to deadlocks, as reported by syzbot in [0].<br />
<br />
So, instead, hold freeze_mutex only during writeability checks, bump<br />
(proactively) "write active" count for the map, unlock the mutex and<br />
proceed with mmap logic. And only if something went wrong during mmap<br />
logic, then undo that "write active" counter increment.<br />
<br />
  [0] You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21852</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: Add rx_skb of kfree_skb to raw_tp_null_args[].<br />
<br />
Yan Zhai reported a BPF prog could trigger a null-ptr-deref [0]<br />
in trace_kfree_skb if the prog does not check if rx_sk is NULL.<br />
<br />
Commit c53795d48ee8 ("net: add rx_sk to trace_kfree_skb") added<br />
rx_sk to trace_kfree_skb, but rx_sk is optional and could be NULL.<br />
<br />
Let's add kfree_skb to raw_tp_null_args[] to let the BPF verifier<br />
validate such a prog and prevent the issue.<br />
<br />
Now we fail to load such a prog:<br />
<br />
  libbpf: prog 'drop': -- BEGIN PROG LOAD LOG --<br />
  0: R1=ctx() R10=fp0<br />
  ; int BPF_PROG(drop, struct sk_buff *skb, void *location, @ kfree_skb_sk_null.bpf.c:21<br />
  0: (79) r3 = *(u64 *)(r1 +24)<br />
  func 'kfree_skb' arg3 has btf_id 5253 type STRUCT 'sock'<br />
  1: R1=ctx() R3_w=trusted_ptr_or_null_sock(id=1)<br />
  ; bpf_printk("sk: %d, %d\n", sk, sk-&gt;__sk_common.skc_family); @ kfree_skb_sk_null.bpf.c:24<br />
  1: (69) r4 = *(u16 *)(r3 +16)<br />
  R3 invalid mem access 'trusted_ptr_or_null_'<br />
  processed 2 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0<br />
  -- END PROG LOAD LOG --<br />
<br />
Note this fix requires commit 838a10bd2ebf ("bpf: Augment raw_tp<br />
arguments with PTR_MAYBE_NULL").<br />
<br />
[0]:<br />
BUG: kernel NULL pointer dereference, address: 0000000000000010<br />
 PF: supervisor read access in kernel mode<br />
 PF: error_code(0x0000) - not-present page<br />
PGD 0 P4D 0<br />
PREEMPT SMP<br />
RIP: 0010:bpf_prog_5e21a6db8fcff1aa_drop+0x10/0x2d<br />
Call Trace:<br />
 &lt;TASK&gt;<br />
 ? __die+0x1f/0x60<br />
 ? page_fault_oops+0x148/0x420<br />
 ? search_bpf_extables+0x5b/0x70<br />
 ? fixup_exception+0x27/0x2c0<br />
 ? exc_page_fault+0x75/0x170<br />
 ? asm_exc_page_fault+0x22/0x30<br />
 ? bpf_prog_5e21a6db8fcff1aa_drop+0x10/0x2d<br />
 bpf_trace_run4+0x68/0xd0<br />
 ? unix_stream_connect+0x1f4/0x6f0<br />
 sk_skb_reason_drop+0x90/0x120<br />
 unix_stream_connect+0x1f4/0x6f0<br />
 __sys_connect+0x7f/0xb0<br />
 __x64_sys_connect+0x14/0x20<br />
 do_syscall_64+0x47/0xc30<br />
 entry_SYSCALL_64_after_hwframe+0x4b/0x53</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21851</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf: Fix softlockup in arena_map_free on 64k page kernel<br />
<br />
On an aarch64 kernel with CONFIG_PAGE_SIZE_64KB=y,<br />
arena_htab tests cause a segmentation fault and soft lockup.<br />
The same failure is not observed with 4k pages on aarch64.<br />
<br />
It turns out arena_map_free() is calling<br />
apply_to_existing_page_range() with the address returned by<br />
bpf_arena_get_kern_vm_start().  If this address is not page-aligned<br />
the code ends up calling apply_to_pte_range() with that unaligned<br />
address causing soft lockup.<br />
<br />
Fix it by round up GUARD_SZ to PAGE_SIZE &lt;&lt; 1 so that the<br />
division by 2 in bpf_arena_get_kern_vm_start() returns<br />
a page-aligned value.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21850</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
nvmet: Fix crash when a namespace is disabled<br />
<br />
The namespace percpu counter protects pending I/O, and we can<br />
only safely diable the namespace once the counter drop to zero.<br />
Otherwise we end up with a crash when running blktests/nvme/058<br />
(eg for loop transport):<br />
<br />
[ 2352.930426] [  T53909] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] PREEMPT SMP KASAN PTI<br />
[ 2352.930431] [  T53909] KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]<br />
[ 2352.930434] [  T53909] CPU: 3 UID: 0 PID: 53909 Comm: kworker/u16:5 Tainted: G        W          6.13.0-rc6 #232<br />
[ 2352.930438] [  T53909] Tainted: [W]=WARN<br />
[ 2352.930440] [  T53909] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014<br />
[ 2352.930443] [  T53909] Workqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]<br />
[ 2352.930449] [  T53909] RIP: 0010:blkcg_set_ioprio+0x44/0x180<br />
<br />
as the queue is already torn down when calling submit_bio();<br />
<br />
So we need to init the percpu counter in nvmet_ns_enable(), and<br />
wait for it to drop to zero in nvmet_ns_disable() to avoid having<br />
I/O pending after the namespace has been disabled.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21849</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/i915/gt: Use spin_lock_irqsave() in interruptible context<br />
<br />
spin_lock/unlock() functions used in interrupt contexts could<br />
result in a deadlock, as seen in GitLab issue #13399,<br />
which occurs when interrupt comes in while holding a lock.<br />
<br />
Try to remedy the problem by saving irq state before spin lock<br />
acquisition.<br />
<br />
v2: add irqs' state save/restore calls to all locks/unlocks in<br />
 signal_irq_work() execution (Maciej)<br />
<br />
v3: use with spin_lock_irqsave() in guc_lrc_desc_unpin() instead<br />
 of other lock/unlock calls and add Fixes and Cc tags (Tvrtko);<br />
 change title and commit message<br />
<br />
(cherry picked from commit c088387ddd6482b40f21ccf23db1125e8fa4af7e)</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21848</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()<br />
<br />
Add check for the return value of nfp_app_ctrl_msg_alloc() in<br />
nfp_bpf_cmsg_alloc() to prevent null pointer dereference.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Daily CVE Record Information - 2025-03-11]]></title>
			<link>https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-11</link>
			<pubDate>Tue, 11 Mar 2025 11:30:18 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-11</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27912</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">An issue was discovered in Datalust Seq before 2024.3.13545. Missing Content-Type validation can lead to CSRF when (1) Entra ID or OpenID Connect authentication is in use and a user visits a compromised/malicious site, or (2) when username/password or Active Directory authentication is in use and a user visits a compromised/malicious site under the same effective top-level domain as the Seq server. Exploitation of the vulnerability allows the attacker to conduct impersonation attacks and perform actions in Seq on behalf of the targeted user.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27911</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">An issue was discovered in Datalust Seq before 2024.3.13545. Expansion of identifiers in message templates can be used to bypass the system "Event body limit bytes" setting, leading to increased resource consumption. With sufficiently large events, there can be disk space exhaustion (if saved to disk) or a termination of the server process with an out-of-memory error.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27893</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In Archer Platform 6 through 6.14.00202.10024, an authenticated user with record creation privileges can manipulate immutable fields, such as the creation date, by intercepting and modifying a Copy request via a GenericContent/Record.aspx?id= URI. This enables unauthorized modification of system-generated metadata, compromising data integrity and potentially impacting auditing, compliance, and security controls.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">1.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27494</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions &lt; V6.4.9), SiPass integrated ACC-AP (All versions &lt; V6.4.9). Affected devices improperly sanitize input for the pubkey endpoint of the REST API. This could allow an authenticated remote administrator to escalate privileges by injecting arbitrary commands that are executed with root privileges.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27493</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions &lt; V6.4.9), SiPass integrated ACC-AP (All versions &lt; V6.4.9). Affected devices improperly sanitize user input for specific commands on the telnet command line interface. This could allow an authenticated local administrator to escalate privileges by injecting arbitrary commands that are executed with root privileges.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27438</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions &lt; V14.3.0.13), Teamcenter Visualization V2312 (All versions &lt; V2312.0009), Teamcenter Visualization V2406 (All versions &lt; V2406.0007), Teamcenter Visualization V2412 (All versions &lt; V2412.0002), Tecnomatix Plant Simulation V2302 (All versions &lt; V2302.0021), Tecnomatix Plant Simulation V2404 (All versions &lt; V2404.0010). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files.<br />
This could allow an attacker to execute code in the context of the current process.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27436</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Manage Bank Statements in SAP S/4HANA does not perform required access control checks for an authenticated user to confirm whether a request to interact with a resource is legitimate, allowing the attacker to delete the attachment of a posted bank statement. This leads to a low impact on integrity, with no impact on the confidentiality of the data or the availability of the application.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27434</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Due to insufficient input validation, SAP Commerce (Swagger UI) allows an unauthenticated attacker to inject the malicious code from remote sources, which can be leveraged by an attacker to execute a cross-site scripting (XSS) attack. This could lead to a high impact on the confidentiality, integrity, and availability of data in SAP Commerce.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27433</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Manage Bank Statements in SAP S/4HANA allows authenticated attacker to bypass certain functionality restrictions of the application and upload files to a reversed bank statement. This vulnerability has a low impact on the application's integrity, with no effect on confidentiality and availability of the application.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27432</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The eDocument Cockpit (Inbound NF-e) in SAP Electronic Invoicing for Brazil allows an authenticated attacker with certain privileges to gain unauthorized access to each transaction. By executing the specific ABAP method within the ABAP system, an unauthorized attacker could call each transaction and view the inbound delivery details. This vulnerability has a low impact on the confidentiality with no effect on the integrity and the availability of the application.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">2.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27431</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">User management functionality in SAP NetWeaver Application Server Java is vulnerable to Stored Cross-Site Scripting (XSS). This could enable an attacker to inject malicious payload that gets stored and executed when a user accesses the functionality, hence leading to information disclosure or unauthorized data modifications within the scope of victim�s browser. There is no impact on availability.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27430</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Under certain conditions, an SSRF vulnerability in SAP CRM and SAP S/4HANA (Interaction Center) allows an attacker with low privileges to access restricted information. This flaw enables the attacker to send requests to internal network resources, thereby compromising the application's confidentiality. There is no impact on integrity or availability</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">3.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27398</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly neutralize special characters when interpreting user controlled log paths.<br />
This could allow an authenticated highly-privileged remote attacker to execute a limited set of binaries that are already present on the filesystem.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">2.7</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27397</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly limit user controlled paths to which logs are written and from where they are read.<br />
This could allow an authenticated highly-privileged remote attacker to read and write arbitrary files in the filesystem, if and only if the malicious path ends with 'log' .</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27396</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly limit the elevation of privileges required to perform certain valid functionality.<br />
This could allow an authenticated lowly-privileged remote attacker to escalate their privileges.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27395</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly limit the scope of files accessible through and the privileges of the SFTP functionality.<br />
This could allow an authenticated highly-privileged remote attacker to read and write arbitrary files.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.6</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27394</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly sanitize user input when creating new SNMP users.<br />
This could allow an authenticated highly-privileged remote attacker to execute arbitrary code on the device.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.6</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27393</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly sanitize user input when creating new users.<br />
This could allow an authenticated highly-privileged remote attacker to execute arbitrary code on the device.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.6</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27392</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly sanitize user input when creating new VXLAN configurations.<br />
This could allow an authenticated highly-privileged remote attacker to execute arbitrary code on the device.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.6</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-26707</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Improper Privilege Management vulnerability in ZTE GoldenDB allows Privilege Escalation.This issue affects GoldenDB: from 6.1.03 through 6.1.03.05.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27912</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">An issue was discovered in Datalust Seq before 2024.3.13545. Missing Content-Type validation can lead to CSRF when (1) Entra ID or OpenID Connect authentication is in use and a user visits a compromised/malicious site, or (2) when username/password or Active Directory authentication is in use and a user visits a compromised/malicious site under the same effective top-level domain as the Seq server. Exploitation of the vulnerability allows the attacker to conduct impersonation attacks and perform actions in Seq on behalf of the targeted user.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27911</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">An issue was discovered in Datalust Seq before 2024.3.13545. Expansion of identifiers in message templates can be used to bypass the system "Event body limit bytes" setting, leading to increased resource consumption. With sufficiently large events, there can be disk space exhaustion (if saved to disk) or a termination of the server process with an out-of-memory error.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27893</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In Archer Platform 6 through 6.14.00202.10024, an authenticated user with record creation privileges can manipulate immutable fields, such as the creation date, by intercepting and modifying a Copy request via a GenericContent/Record.aspx?id= URI. This enables unauthorized modification of system-generated metadata, compromising data integrity and potentially impacting auditing, compliance, and security controls.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">1.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27494</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions &lt; V6.4.9), SiPass integrated ACC-AP (All versions &lt; V6.4.9). Affected devices improperly sanitize input for the pubkey endpoint of the REST API. This could allow an authenticated remote administrator to escalate privileges by injecting arbitrary commands that are executed with root privileges.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27493</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions &lt; V6.4.9), SiPass integrated ACC-AP (All versions &lt; V6.4.9). Affected devices improperly sanitize user input for specific commands on the telnet command line interface. This could allow an authenticated local administrator to escalate privileges by injecting arbitrary commands that are executed with root privileges.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27438</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in Teamcenter Visualization V14.3 (All versions &lt; V14.3.0.13), Teamcenter Visualization V2312 (All versions &lt; V2312.0009), Teamcenter Visualization V2406 (All versions &lt; V2406.0007), Teamcenter Visualization V2412 (All versions &lt; V2412.0002), Tecnomatix Plant Simulation V2302 (All versions &lt; V2302.0021), Tecnomatix Plant Simulation V2404 (All versions &lt; V2404.0010). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted WRL files.<br />
This could allow an attacker to execute code in the context of the current process.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27436</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Manage Bank Statements in SAP S/4HANA does not perform required access control checks for an authenticated user to confirm whether a request to interact with a resource is legitimate, allowing the attacker to delete the attachment of a posted bank statement. This leads to a low impact on integrity, with no impact on the confidentiality of the data or the availability of the application.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27434</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Due to insufficient input validation, SAP Commerce (Swagger UI) allows an unauthenticated attacker to inject the malicious code from remote sources, which can be leveraged by an attacker to execute a cross-site scripting (XSS) attack. This could lead to a high impact on the confidentiality, integrity, and availability of data in SAP Commerce.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27433</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Manage Bank Statements in SAP S/4HANA allows authenticated attacker to bypass certain functionality restrictions of the application and upload files to a reversed bank statement. This vulnerability has a low impact on the application's integrity, with no effect on confidentiality and availability of the application.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27432</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The eDocument Cockpit (Inbound NF-e) in SAP Electronic Invoicing for Brazil allows an authenticated attacker with certain privileges to gain unauthorized access to each transaction. By executing the specific ABAP method within the ABAP system, an unauthorized attacker could call each transaction and view the inbound delivery details. This vulnerability has a low impact on the confidentiality with no effect on the integrity and the availability of the application.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">2.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27431</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">User management functionality in SAP NetWeaver Application Server Java is vulnerable to Stored Cross-Site Scripting (XSS). This could enable an attacker to inject malicious payload that gets stored and executed when a user accesses the functionality, hence leading to information disclosure or unauthorized data modifications within the scope of victim�s browser. There is no impact on availability.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27430</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Under certain conditions, an SSRF vulnerability in SAP CRM and SAP S/4HANA (Interaction Center) allows an attacker with low privileges to access restricted information. This flaw enables the attacker to send requests to internal network resources, thereby compromising the application's confidentiality. There is no impact on integrity or availability</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">3.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27398</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly neutralize special characters when interpreting user controlled log paths.<br />
This could allow an authenticated highly-privileged remote attacker to execute a limited set of binaries that are already present on the filesystem.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">2.7</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27397</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly limit user controlled paths to which logs are written and from where they are read.<br />
This could allow an authenticated highly-privileged remote attacker to read and write arbitrary files in the filesystem, if and only if the malicious path ends with 'log' .</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27396</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly limit the elevation of privileges required to perform certain valid functionality.<br />
This could allow an authenticated lowly-privileged remote attacker to escalate their privileges.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27395</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly limit the scope of files accessible through and the privileges of the SFTP functionality.<br />
This could allow an authenticated highly-privileged remote attacker to read and write arbitrary files.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.6</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27394</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly sanitize user input when creating new SNMP users.<br />
This could allow an authenticated highly-privileged remote attacker to execute arbitrary code on the device.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.6</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27393</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly sanitize user input when creating new users.<br />
This could allow an authenticated highly-privileged remote attacker to execute arbitrary code on the device.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.6</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27392</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions &lt; V4.0). Affected devices do not properly sanitize user input when creating new VXLAN configurations.<br />
This could allow an authenticated highly-privileged remote attacker to execute arbitrary code on the device.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.6</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-26707</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Improper Privilege Management vulnerability in ZTE GoldenDB allows Privilege Escalation.This issue affects GoldenDB: from 6.1.03 through 6.1.03.05.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Daily CVE Record Information - 2025-03-10]]></title>
			<link>https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-10</link>
			<pubDate>Mon, 10 Mar 2025 11:30:32 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-10</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27257</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Insufficient Verification of Data Authenticity vulnerability in GE Vernova UR IED family devices allows an authenticated user to install a modified firmware.<br />
The firmware signature verification is enforced only on the client-side dedicated software Enervista UR Setup, allowing the integration check to be bypassed.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27256</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Missing Authentication for Critical Function vulnerability in GE Vernova Enervista UR Setup application allows Authentication Bypass due to a missing SSH server authentication. Since the client connection is not authenticated, an attacker may perform a man-in-the-middle attack on the network.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27255</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Use of Hard-coded Credentials vulnerability in GE Vernova EnerVista UR Setup allows Privilege Escalation. The local user database is encrypted using an hardcoded password retrievable by an attacker analyzing the application code.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27254</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Improper Authentication vulnerability in GE Vernova EnerVista UR Setup allows Authentication Bypass. <br />
The software's startup authentication can be disabled by altering a Windows registry setting that any user can modify.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27253</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">An improper input validation in GE Vernova UR IED family devices from version 7.0 up to 8.60 allows an attacker to provide input that enstablishes a TCP connection through a port forwarding. The lack of the IP address and port validation may allow the attacker to bypass firewall rules or to send malicious traffic in the network</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-24387</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability in OTRS Application Server allows session hijacking due to missing attributes for sensitive <br />
cookie settings in HTTPS sessions. A request to an OTRS endpoint from a possible malicious web site, would send the authentication cookie, performing an unwanted read operation.<br />
 <br />
<br />
This issue affects:<br />
<br />
  *  OTRS 7.0.X<br />
  *  OTRS 8.0.X<br />
  *  OTRS 2023.X<br />
  *  OTRS 2024.X<br />
  *  OTRS 2025.x</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2150</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The C&amp;Cm@il from HGiga has a Stored Cross-Site Scripting (XSS) vulnerability, allowing remote attackers with regular privileges to send emails containing malicious JavaScript code, which will be executed in the recipient's browser when they view the email.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2147</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in Beijing Zhide Intelligent Internet Technology Modern Farm Digital Integrated Management System 1.0. It has been classified as problematic. Affected is an unknown function. The manipulation leads to files or directories accessible. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Multiple endpoints are affected. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.9</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1926</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.9.8. This is due to missing or incorrect nonce validation on the pagelayer_save_post function. This makes it possible for unauthenticated attackers to modify post contents via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-43107</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Improper Certificate Validation (CWE-295) in the Gallagher Milestone Integration Plugin (MIP) permits unauthenticated messages (e.g. alarm events) to be sent to the Plugin.<br />
This issue effects Gallagher MIPS Plugin v4.0 prior to v4.0.32, all versions of v3.0 and prior.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-41724</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Improper Certificate Validation (CWE-295) in the Gallagher Command Centre SALTO integration allowed an attacker to spoof the SALTO server. <br />
<br />
<br />
<br />
<br />
This issue affects all versions of Gallagher Command Centre prior to 9.20.1043.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.7</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13919</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Laravel framework versions between 11.9.0 and 11.35.1 are susceptible to reflected cross-site scripting due to an improper encoding of route parameters in the debug-mode error page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13918</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Laravel framework versions between 11.9.0 and 11.35.1 are susceptible to reflected cross-site scripting due to an improper encoding of request parameters in the debug-mode error page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-11638</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Gtbabel WordPress plugin before 6.6.9 does not ensure that the URL to perform code analysis upon belongs to the blog which could allow unauthenticated attackers to retrieve a logged in user (such as admin) cookies by making them open a crafted URL as the request made to analysed the URL contains such cookies.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27257</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Insufficient Verification of Data Authenticity vulnerability in GE Vernova UR IED family devices allows an authenticated user to install a modified firmware.<br />
The firmware signature verification is enforced only on the client-side dedicated software Enervista UR Setup, allowing the integration check to be bypassed.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27256</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Missing Authentication for Critical Function vulnerability in GE Vernova Enervista UR Setup application allows Authentication Bypass due to a missing SSH server authentication. Since the client connection is not authenticated, an attacker may perform a man-in-the-middle attack on the network.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27255</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Use of Hard-coded Credentials vulnerability in GE Vernova EnerVista UR Setup allows Privilege Escalation. The local user database is encrypted using an hardcoded password retrievable by an attacker analyzing the application code.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27254</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Improper Authentication vulnerability in GE Vernova EnerVista UR Setup allows Authentication Bypass. <br />
The software's startup authentication can be disabled by altering a Windows registry setting that any user can modify.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27253</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">An improper input validation in GE Vernova UR IED family devices from version 7.0 up to 8.60 allows an attacker to provide input that enstablishes a TCP connection through a port forwarding. The lack of the IP address and port validation may allow the attacker to bypass firewall rules or to send malicious traffic in the network</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.1</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-24387</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability in OTRS Application Server allows session hijacking due to missing attributes for sensitive <br />
cookie settings in HTTPS sessions. A request to an OTRS endpoint from a possible malicious web site, would send the authentication cookie, performing an unwanted read operation.<br />
 <br />
<br />
This issue affects:<br />
<br />
  *  OTRS 7.0.X<br />
  *  OTRS 8.0.X<br />
  *  OTRS 2023.X<br />
  *  OTRS 2024.X<br />
  *  OTRS 2025.x</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2150</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The C&amp;Cm@il from HGiga has a Stored Cross-Site Scripting (XSS) vulnerability, allowing remote attackers with regular privileges to send emails containing malicious JavaScript code, which will be executed in the recipient's browser when they view the email.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2147</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in Beijing Zhide Intelligent Internet Technology Modern Farm Digital Integrated Management System 1.0. It has been classified as problematic. Affected is an unknown function. The manipulation leads to files or directories accessible. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Multiple endpoints are affected. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.9</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1926</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.9.8. This is due to missing or incorrect nonce validation on the pagelayer_save_post function. This makes it possible for unauthenticated attackers to modify post contents via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-43107</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Improper Certificate Validation (CWE-295) in the Gallagher Milestone Integration Plugin (MIP) permits unauthenticated messages (e.g. alarm events) to be sent to the Plugin.<br />
This issue effects Gallagher MIPS Plugin v4.0 prior to v4.0.32, all versions of v3.0 and prior.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-41724</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Improper Certificate Validation (CWE-295) in the Gallagher Command Centre SALTO integration allowed an attacker to spoof the SALTO server. <br />
<br />
<br />
<br />
<br />
This issue affects all versions of Gallagher Command Centre prior to 9.20.1043.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.7</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13919</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Laravel framework versions between 11.9.0 and 11.35.1 are susceptible to reflected cross-site scripting due to an improper encoding of route parameters in the debug-mode error page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13918</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Laravel framework versions between 11.9.0 and 11.35.1 are susceptible to reflected cross-site scripting due to an improper encoding of request parameters in the debug-mode error page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-11638</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Gtbabel WordPress plugin before 6.6.9 does not ensure that the URL to perform code analysis upon belongs to the blog which could allow unauthenticated attackers to retrieve a logged in user (such as admin) cookies by making them open a crafted URL as the request made to analysed the URL contains such cookies.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Daily CVE Record Information - 2025-03-09]]></title>
			<link>https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-09</link>
			<pubDate>Sun, 09 Mar 2025 11:30:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-09</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2121</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as critical has been found in Thinkware Car Dashcam F800 Pro up to 20250226. Affected is an unknown function of the component File Storage. The manipulation leads to improper access controls. The attack can only be done within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2120</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in Thinkware Car Dashcam F800 Pro up to 20250226. It has been rated as problematic. This issue affects some unknown processing of the file /tmp/hostapd.conf of the component Configuration File Handler. The manipulation leads to cleartext storage in a file or on disk. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">2.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2119</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in Thinkware Car Dashcam F800 Pro up to 20250226. It has been declared as problematic. This vulnerability affects unknown code of the component Device Registration Handler. The manipulation leads to use of default credentials. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">2.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2118</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in Quantico Tecnologia PRMV 6.48. It has been classified as critical. This affects an unknown part of the file /admin/login.php of the component Login Endpoint. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2117</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in Beijing Founder Electronics Founder Enjoys All-Media Acquisition and Editing System 3.0 and classified as critical. Affected by this issue is the function electricDocList of the file /newsedit/report/reportCenter.do. The manipulation of the argument fvID/catID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2116</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been found in Beijing Founder Electronics Founder Enjoys All-Media Acquisition and Editing System 3.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /newsedit/newsedit/xy/imageProxy.do of the component File Protocol Handler. The manipulation of the argument xyImgUrl leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2115</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability, which was classified as critical, was found in zzskzy Warehouse Refinement Management System 3.1. Affected is the function ProcessRequest of the file /AcceptZip.ashx. The manipulation of the argument file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2114</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability, which was classified as problematic, has been found in Shenzhen Sixun Software Sixun Shanghui Group Business Management System 7. This issue affects some unknown processing of the file /WebPages/Adm/OperatorStop.asp of the component Reset Password Interface. The manipulation of the argument OperId leads to improper authorization. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2113</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in AT Software Solutions ATSVD up to 3.4.1. It has been rated as critical. Affected by this issue is some unknown functionality of the component Esqueceu a senha. The manipulation of the argument txtCPF leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.4.2 is able to address this issue. It is recommended to upgrade the affected component.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1382</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Contact Us By Lord Linus WordPress plugin through 2.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1363</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The URL Shortener | Conversion Tracking  | AB Testing  | WooCommerce WordPress plugin through 9.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1362</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The URL Shortener | Conversion Tracking  | AB Testing  | WooCommerce WordPress plugin through 9.0.2 does not have CSRF checks in some bulk actions, which could allow attackers to make logged in admins perform unwanted actions, such as deleting customers via CSRF attacks</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2121</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as critical has been found in Thinkware Car Dashcam F800 Pro up to 20250226. Affected is an unknown function of the component File Storage. The manipulation leads to improper access controls. The attack can only be done within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2120</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in Thinkware Car Dashcam F800 Pro up to 20250226. It has been rated as problematic. This issue affects some unknown processing of the file /tmp/hostapd.conf of the component Configuration File Handler. The manipulation leads to cleartext storage in a file or on disk. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">2.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2119</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in Thinkware Car Dashcam F800 Pro up to 20250226. It has been declared as problematic. This vulnerability affects unknown code of the component Device Registration Handler. The manipulation leads to use of default credentials. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #ffcb0d;" class="mycode_color">2.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2118</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in Quantico Tecnologia PRMV 6.48. It has been classified as critical. This affects an unknown part of the file /admin/login.php of the component Login Endpoint. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2117</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in Beijing Founder Electronics Founder Enjoys All-Media Acquisition and Editing System 3.0 and classified as critical. Affected by this issue is the function electricDocList of the file /newsedit/report/reportCenter.do. The manipulation of the argument fvID/catID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2116</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been found in Beijing Founder Electronics Founder Enjoys All-Media Acquisition and Editing System 3.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /newsedit/newsedit/xy/imageProxy.do of the component File Protocol Handler. The manipulation of the argument xyImgUrl leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2115</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability, which was classified as critical, was found in zzskzy Warehouse Refinement Management System 3.1. Affected is the function ProcessRequest of the file /AcceptZip.ashx. The manipulation of the argument file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2114</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability, which was classified as problematic, has been found in Shenzhen Sixun Software Sixun Shanghui Group Business Management System 7. This issue affects some unknown processing of the file /WebPages/Adm/OperatorStop.asp of the component Reset Password Interface. The manipulation of the argument OperId leads to improper authorization. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2113</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in AT Software Solutions ATSVD up to 3.4.1. It has been rated as critical. Affected by this issue is some unknown functionality of the component Esqueceu a senha. The manipulation of the argument txtCPF leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.4.2 is able to address this issue. It is recommended to upgrade the affected component.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1382</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Contact Us By Lord Linus WordPress plugin through 2.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1363</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The URL Shortener | Conversion Tracking  | AB Testing  | WooCommerce WordPress plugin through 9.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1362</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The URL Shortener | Conversion Tracking  | AB Testing  | WooCommerce WordPress plugin through 9.0.2 does not have CSRF checks in some bulk actions, which could allow attackers to make logged in admins perform unwanted actions, such as deleting customers via CSRF attacks</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Daily CVE Record Information - 2025-03-08]]></title>
			<link>https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-08</link>
			<pubDate>Sat, 08 Mar 2025 11:30:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-08</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1783</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Gallery Styles plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Gallery Block in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1664</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Essential Blocks – Page Builder Gutenberg Blocks, Patterns &amp; Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Parallax slider in all versions up to, and including, 5.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1504</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Post Lockdown plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.0.2 via the 'pl_autocomplete' AJAX action due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1481</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Shortcode Cleaner Lite plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the download_backup() function in all versions up to, and including, 1.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to export arbitrary options.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1325</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP-Recall – Registration, Profile, Commerce &amp; More plugin for WordPress is vulnerable to arbitrary shortcode execution due to a missing capability check on the 'rcl_preview_post' AJAX endpoint in all versions up to, and including, 16.26.10. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1324</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP-Recall – Registration, Profile, Commerce &amp; More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'public-form' shortcode in all versions up to, and including, 16.26.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1323</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP-Recall – Registration, Profile, Commerce &amp; More plugin for WordPress is vulnerable to SQL Injection via the 'databeat' parameter in all versions up to, and including, 16.26.10 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1322</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP-Recall – Registration, Profile, Commerce &amp; More plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 16.26.10 via the 'feed' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for unauthenticated attackers to view data from password protected, private, or draft posts that they should not have access to.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1287</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Countdown, Syntax Highlighter, and Page Scroll widgets in all versions up to, and including, 6.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1261</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the plugin's Countdown widget in all versions up to, and including, 2.8.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: This vulnerability exists due to an incomplete fix for CVE-2024-3307.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0177</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Javo Core plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.0.0.080. This is due to the plugin allowing users who are registering new accounts to set their own role. This makes it possible for unauthenticated attackers to gain elevated privileges by creating an account with the administrator role.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13908</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The SMTP by BestWebSoft plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'save_options' function in all versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13895</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The The Code Snippets CPT plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.1.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13890</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Allow PHP Execute plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 1.0. This is due to allowing PHP code to be entered by all users for whom unfiltered HTML is allowed. This makes it possible for authenticated attackers, with Editor-level access and above, to inject PHP code into posts and pages.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13882</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Aiomatic - Automatic AI Content Writer &amp; Editor, GPT-3 &amp; GPT-4, ChatGPT ChatBot &amp; AI Toolkit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'aiomatic_generate_featured_image' function in all versions up to, and including, 2.3.8. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13844</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Post SMTP plugin for WordPress is vulnerable to generic SQL Injection via the ‘columns’ parameter in all versions up to, and including, 3.1.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.9</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13835</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Post Meta Data Manager plugin for WordPress is vulnerable to multisite privilege escalation in all versions up to, and including, 1.4.3. This is due to the plugin not properly verifying the existence of a multisite installation prior to allowing user meta to be added/modified. This makes it possible for authenticated attackers, with Administrator-level access and above, to gain elevated privileges on subsites that would otherwise be inaccessible.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13826</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Email Keep WordPress plugin through 1.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13825</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Email Keep WordPress plugin through 1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13816</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Aiomatic - Automatic AI Content Writer &amp; Editor, GPT-3 &amp; GPT-4, ChatGPT ChatBot &amp; AI Toolkit plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability checks on multiple functions in all versions up to, and including, 2.3.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update and delete posts, list and delete batches, list assistant uploaded files, delete personas, delete forms, delete templates, and clear logs. The vulnerability was partially patched in version 2.3.5.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1783</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Gallery Styles plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Gallery Block in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1664</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Essential Blocks – Page Builder Gutenberg Blocks, Patterns &amp; Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Parallax slider in all versions up to, and including, 5.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1504</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Post Lockdown plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.0.2 via the 'pl_autocomplete' AJAX action due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1481</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Shortcode Cleaner Lite plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the download_backup() function in all versions up to, and including, 1.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to export arbitrary options.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1325</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP-Recall – Registration, Profile, Commerce &amp; More plugin for WordPress is vulnerable to arbitrary shortcode execution due to a missing capability check on the 'rcl_preview_post' AJAX endpoint in all versions up to, and including, 16.26.10. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1324</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP-Recall – Registration, Profile, Commerce &amp; More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'public-form' shortcode in all versions up to, and including, 16.26.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1323</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP-Recall – Registration, Profile, Commerce &amp; More plugin for WordPress is vulnerable to SQL Injection via the 'databeat' parameter in all versions up to, and including, 16.26.10 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1322</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The WP-Recall – Registration, Profile, Commerce &amp; More plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 16.26.10 via the 'feed' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for unauthenticated attackers to view data from password protected, private, or draft posts that they should not have access to.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1287</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Countdown, Syntax Highlighter, and Page Scroll widgets in all versions up to, and including, 6.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-1261</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the plugin's Countdown widget in all versions up to, and including, 2.8.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: This vulnerability exists due to an incomplete fix for CVE-2024-3307.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">6.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-0177</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Javo Core plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.0.0.080. This is due to the plugin allowing users who are registering new accounts to set their own role. This makes it possible for unauthenticated attackers to gain elevated privileges by creating an account with the administrator role.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13908</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The SMTP by BestWebSoft plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'save_options' function in all versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13895</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The The Code Snippets CPT plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.1.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13890</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Allow PHP Execute plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 1.0. This is due to allowing PHP code to be entered by all users for whom unfiltered HTML is allowed. This makes it possible for authenticated attackers, with Editor-level access and above, to inject PHP code into posts and pages.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13882</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Aiomatic - Automatic AI Content Writer &amp; Editor, GPT-3 &amp; GPT-4, ChatGPT ChatBot &amp; AI Toolkit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'aiomatic_generate_featured_image' function in all versions up to, and including, 2.3.8. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">8.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13844</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Post SMTP plugin for WordPress is vulnerable to generic SQL Injection via the ‘columns’ parameter in all versions up to, and including, 3.1.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.9</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13835</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Post Meta Data Manager plugin for WordPress is vulnerable to multisite privilege escalation in all versions up to, and including, 1.4.3. This is due to the plugin not properly verifying the existence of a multisite installation prior to allowing user meta to be added/modified. This makes it possible for authenticated attackers, with Administrator-level access and above, to gain elevated privileges on subsites that would otherwise be inaccessible.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13826</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Email Keep WordPress plugin through 1.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13825</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Email Keep WordPress plugin through 1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2024-13816</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">The Aiomatic - Automatic AI Content Writer &amp; Editor, GPT-3 &amp; GPT-4, ChatGPT ChatBot &amp; AI Toolkit plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability checks on multiple functions in all versions up to, and including, 2.3.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update and delete posts, list and delete batches, list assistant uploaded files, delete personas, delete forms, delete templates, and clear logs. The vulnerability was partially patched in version 2.3.5.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">5.4</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Daily CVE Record Information - 2025-03-07]]></title>
			<link>https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-07</link>
			<pubDate>Fri, 07 Mar 2025 11:30:03 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-Daily-CVE-Record-Information-2025-03-07</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27816</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was discovered in the Arctera InfoScale 7.0 through 8.0.2 where a .NET remoting endpoint can be exploited due to the insecure deserialization of potentially untrusted messages. The vulnerability is present in the Windows Plugin_Host service, which runs on all the servers where InfoScale is installed. The service is used only when applications are configured for Disaster Recovery (DR) using the DR wizard. Disabling the Plugin_Host service manually will eliminate the vulnerability.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27796</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">WPG in GraphicsMagick before 1.3.46 mishandles palette buffer allocation.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27795</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">JXL in GraphicsMagick before 1.3.46 lacks image dimension resource limits.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-26708</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">There is a configuration defect vulnerability in ZTELink 5.4.9 for iOS. This vulnerability is caused by a flaw in the WiFi parameter configuration of the ZTELink. An attacker can obtain unauthorized access to the WiFi service.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-26331</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Dell ThinOS 2411 and prior, contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21843</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/panthor: avoid garbage value in panthor_ioctl_dev_query()<br />
<br />
'priorities_info' is uninitialized, and the uninitialized value is copied<br />
to user object when calling PANTHOR_UOBJ_SET(). Using memset to initialize<br />
'priorities_info' to avoid this garbage value problem.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21842</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
amdkfd: properly free gang_ctx_bo when failed to init user queue<br />
<br />
The destructor of a gtt bo is declared as<br />
void amdgpu_amdkfd_free_gtt_mem(struct amdgpu_device *adev, void **mem_obj);<br />
Which takes void** as the second parameter.<br />
<br />
GCC allows passing void* to the function because void* can be implicitly<br />
casted to any other types, so it can pass compiling.<br />
<br />
However, passing this void* parameter into the function's<br />
execution process(which expects void** and dereferencing void**)<br />
will result in errors.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21841</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
cpufreq/amd-pstate: Fix cpufreq_policy ref counting<br />
<br />
amd_pstate_update_limits() takes a cpufreq_policy reference but doesn't<br />
decrement the refcount in one of the exit paths, fix that.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21840</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
thermal/netlink: Prevent userspace segmentation fault by adjusting UAPI header<br />
<br />
The intel-lpmd tool [1], which uses the THERMAL_GENL_ATTR_CPU_CAPABILITY<br />
attribute to receive HFI events from kernel space, encounters a<br />
segmentation fault after commit 1773572863c4 ("thermal: netlink: Add the<br />
commands and the events for the thresholds").<br />
<br />
The issue arises because the THERMAL_GENL_ATTR_CPU_CAPABILITY raw value<br />
was changed while intel_lpmd still uses the old value.<br />
<br />
Although intel_lpmd can be updated to check the THERMAL_GENL_VERSION and<br />
use the appropriate THERMAL_GENL_ATTR_CPU_CAPABILITY value, the commit<br />
itself is questionable.<br />
<br />
The commit introduced a new element in the middle of enum thermal_genl_attr,<br />
which affects many existing attributes and introduces potential risks<br />
and unnecessary maintenance burdens for userspace thermal netlink event<br />
users.<br />
<br />
Solve the issue by moving the newly introduced<br />
THERMAL_GENL_ATTR_TZ_PREV_TEMP attribute to the end of the<br />
enum thermal_genl_attr. This ensures that all existing thermal generic<br />
netlink attributes remain unaffected.<br />
<br />
[ rjw: Subject edits ]</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21839</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop<br />
<br />
Move the conditional loading of hardware DR6 with the guest's DR6 value<br />
out of the core .vcpu_run() loop to fix a bug where KVM can load hardware<br />
with a stale vcpu-&gt;arch.dr6.<br />
<br />
When the guest accesses a DR and host userspace isn't debugging the guest,<br />
KVM disables DR interception and loads the guest's values into hardware on<br />
VM-Enter and saves them on VM-Exit.  This allows the guest to access DRs<br />
at will, e.g. so that a sequence of DR accesses to configure a breakpoint<br />
only generates one VM-Exit.<br />
<br />
For DR0-DR3, the logic/behavior is identical between VMX and SVM, and also<br />
identical between KVM_DEBUGREG_BP_ENABLED (userspace debugging the guest)<br />
and KVM_DEBUGREG_WONT_EXIT (guest using DRs), and so KVM handles loading<br />
DR0-DR3 in common code, _outside_ of the core kvm_x86_ops.vcpu_run() loop.<br />
<br />
But for DR6, the guest's value doesn't need to be loaded into hardware for<br />
KVM_DEBUGREG_BP_ENABLED, and SVM provides a dedicated VMCB field whereas<br />
VMX requires software to manually load the guest value, and so loading the<br />
guest's value into DR6 is handled by {svm,vmx}_vcpu_run(), i.e. is done<br />
_inside_ the core run loop.<br />
<br />
Unfortunately, saving the guest values on VM-Exit is initiated by common<br />
x86, again outside of the core run loop.  If the guest modifies DR6 (in<br />
hardware, when DR interception is disabled), and then the next VM-Exit is<br />
a fastpath VM-Exit, KVM will reload hardware DR6 with vcpu-&gt;arch.dr6 and<br />
clobber the guest's actual value.<br />
<br />
The bug shows up primarily with nested VMX because KVM handles the VMX<br />
preemption timer in the fastpath, and the window between hardware DR6<br />
being modified (in guest context) and DR6 being read by guest software is<br />
orders of magnitude larger in a nested setup.  E.g. in non-nested, the<br />
VMX preemption timer would need to fire precisely between #DB injection<br />
and the #DB handler's read of DR6, whereas with a KVM-on-KVM setup, the<br />
window where hardware DR6 is "dirty" extends all the way from L1 writing<br />
DR6 to VMRESUME (in L1).<br />
<br />
    L1's view:<br />
    ==========<br />
    &lt;L1 disables DR interception&gt;<br />
           CPU 0/KVM-7289    [023] d....  2925.640961: kvm_entry: vcpu 0<br />
 A:  L1 Writes DR6<br />
           CPU 0/KVM-7289    [023] d....  2925.640963: &lt;hack&gt;: Set DRs, DR6 = 0xffff0ff1<br />
<br />
 B:        CPU 0/KVM-7289    [023] d....  2925.640967: kvm_exit: vcpu 0 reason EXTERNAL_INTERRUPT intr_info 0x800000ec<br />
<br />
 D: L1 reads DR6, arch.dr6 = 0<br />
           CPU 0/KVM-7289    [023] d....  2925.640969: &lt;hack&gt;: Sync DRs, DR6 = 0xffff0ff0<br />
<br />
           CPU 0/KVM-7289    [023] d....  2925.640976: kvm_entry: vcpu 0<br />
    L2 reads DR6, L1 disables DR interception<br />
           CPU 0/KVM-7289    [023] d....  2925.640980: kvm_exit: vcpu 0 reason DR_ACCESS info1 0x0000000000000216<br />
           CPU 0/KVM-7289    [023] d....  2925.640983: kvm_entry: vcpu 0<br />
<br />
           CPU 0/KVM-7289    [023] d....  2925.640983: &lt;hack&gt;: Set DRs, DR6 = 0xffff0ff0<br />
<br />
    L2 detects failure<br />
           CPU 0/KVM-7289    [023] d....  2925.640987: kvm_exit: vcpu 0 reason HLT<br />
    L1 reads DR6 (confirms failure)<br />
           CPU 0/KVM-7289    [023] d....  2925.640990: &lt;hack&gt;: Sync DRs, DR6 = 0xffff0ff0<br />
<br />
    L0's view:<br />
    ==========<br />
    L2 reads DR6, arch.dr6 = 0<br />
          CPU 23/KVM-5046    [001] d....  3410.005610: kvm_exit: vcpu 23 reason DR_ACCESS info1 0x0000000000000216<br />
          CPU 23/KVM-5046    [001] .....  3410.005610: kvm_nested_vmexit: vcpu 23 reason DR_ACCESS info1 0x0000000000000216<br />
<br />
    L2 =&gt; L1 nested VM-Exit<br />
          CPU 23/KVM-5046    [001] .....  3410.005610: kvm_nested_vmexit_inject: reason: DR_ACCESS ext_inf1: 0x0000000000000216<br />
<br />
          CPU 23/KVM-5046    [001] d....  3410.005610: kvm_entry: vcpu 23<br />
          CPU 23/KVM-5046    [001] d....  3410.005611: kvm_exit: vcpu 23 reason VMREAD<br />
          CPU 23/KVM-5046    [001] d....  3410.005611: kvm_entry: vcpu 23<br />
          CPU 23/KVM-5046    [001] d....  3410.<br />
---truncated---</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21838</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
usb: gadget: core: flush gadget workqueue after device removal<br />
<br />
device_del() can lead to new work being scheduled in gadget-&gt;work<br />
workqueue. This is observed, for example, with the dwc3 driver with the<br />
following call stack:<br />
  device_del()<br />
    gadget_unbind_driver()<br />
      usb_gadget_disconnect_locked()<br />
        dwc3_gadget_pullup()<br />
	  dwc3_gadget_soft_disconnect()<br />
	    usb_gadget_set_state()<br />
	      schedule_work(&amp;gadget-&gt;work)<br />
<br />
Move flush_work() after device_del() to ensure the workqueue is cleaned<br />
up.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21837</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
io_uring/uring_cmd: unconditionally copy SQEs at prep time<br />
<br />
This isn't generally necessary, but conditions have been observed where<br />
SQE data is accessed from the original SQE after prep has been done and<br />
outside of the initial issue. Opcode prep handlers must ensure that any<br />
SQE related data is stable beyond the prep phase, but uring_cmd is a bit<br />
special in how it handles the SQE which makes it susceptible to reading<br />
stale data. If the application has reused the SQE before the original<br />
completes, then that can lead to data corruption.<br />
<br />
Down the line we can relax this again once uring_cmd has been sanitized<br />
a bit, and avoid unnecessarily copying the SQE.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21836</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
io_uring/kbuf: reallocate buf lists on upgrade<br />
<br />
IORING_REGISTER_PBUF_RING can reuse an old struct io_buffer_list if it<br />
was created for legacy selected buffer and has been emptied. It violates<br />
the requirement that most of the field should stay stable after publish.<br />
Always reallocate it instead.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21835</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
usb: gadget: f_midi: fix MIDI Streaming descriptor lengths<br />
<br />
While the MIDI jacks are configured correctly, and the MIDIStreaming<br />
endpoint descriptors are filled with the correct information,<br />
bNumEmbMIDIJack and bLength are set incorrectly in these descriptors.<br />
<br />
This does not matter when the numbers of in and out ports are equal, but<br />
when they differ the host will receive broken descriptors with<br />
uninitialized stack memory leaking into the descriptor for whichever<br />
value is smaller.<br />
<br />
The precise meaning of "in" and "out" in the port counts is not clearly<br />
defined and can be confusing.  But elsewhere the driver consistently<br />
uses this to match the USB meaning of IN and OUT viewed from the host,<br />
so that "in" ports send data to the host and "out" ports receive data<br />
from it.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2067</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in projectworlds Life Insurance Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /search.php. The manipulation of the argument key leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2066</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been found in projectworlds Life Insurance Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /updateAgent.php. The manipulation of the argument agent_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2065</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability, which was classified as critical, was found in projectworlds Life Insurance Management System 1.0. This affects an unknown part of the file /editAgent.php. The manipulation of the argument agent_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2064</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability, which was classified as critical, has been found in projectworlds Life Insurance Management System 1.0. Affected by this issue is some unknown functionality of the file /deletePayment.php. The manipulation of the argument recipt_no leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2063</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as critical was found in projectworlds Life Insurance Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /deleteNominee.php. The manipulation of the argument nominee_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2062</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as critical has been found in projectworlds Life Insurance Management System 1.0. Affected is an unknown function of the file /clientStatus.php. The manipulation of the argument client_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27816</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was discovered in the Arctera InfoScale 7.0 through 8.0.2 where a .NET remoting endpoint can be exploited due to the insecure deserialization of potentially untrusted messages. The vulnerability is present in the Windows Plugin_Host service, which runs on all the servers where InfoScale is installed. The service is used only when applications are configured for Disaster Recovery (DR) using the DR wizard. Disabling the Plugin_Host service manually will eliminate the vulnerability.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #cc0500;" class="mycode_color">9.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27796</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">WPG in GraphicsMagick before 1.3.46 mishandles palette buffer allocation.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-27795</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">JXL in GraphicsMagick before 1.3.46 lacks image dimension resource limits.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.3</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-26708</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">There is a configuration defect vulnerability in ZTELink 5.4.9 for iOS. This vulnerability is caused by a flaw in the WiFi parameter configuration of the ZTELink. An attacker can obtain unauthorized access to the WiFi service.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #f9a009;" class="mycode_color">4.2</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-26331</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">Dell ThinOS 2411 and prior, contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.8</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21843</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/panthor: avoid garbage value in panthor_ioctl_dev_query()<br />
<br />
'priorities_info' is uninitialized, and the uninitialized value is copied<br />
to user object when calling PANTHOR_UOBJ_SET(). Using memset to initialize<br />
'priorities_info' to avoid this garbage value problem.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21842</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
amdkfd: properly free gang_ctx_bo when failed to init user queue<br />
<br />
The destructor of a gtt bo is declared as<br />
void amdgpu_amdkfd_free_gtt_mem(struct amdgpu_device *adev, void **mem_obj);<br />
Which takes void** as the second parameter.<br />
<br />
GCC allows passing void* to the function because void* can be implicitly<br />
casted to any other types, so it can pass compiling.<br />
<br />
However, passing this void* parameter into the function's<br />
execution process(which expects void** and dereferencing void**)<br />
will result in errors.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21841</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
cpufreq/amd-pstate: Fix cpufreq_policy ref counting<br />
<br />
amd_pstate_update_limits() takes a cpufreq_policy reference but doesn't<br />
decrement the refcount in one of the exit paths, fix that.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21840</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
thermal/netlink: Prevent userspace segmentation fault by adjusting UAPI header<br />
<br />
The intel-lpmd tool [1], which uses the THERMAL_GENL_ATTR_CPU_CAPABILITY<br />
attribute to receive HFI events from kernel space, encounters a<br />
segmentation fault after commit 1773572863c4 ("thermal: netlink: Add the<br />
commands and the events for the thresholds").<br />
<br />
The issue arises because the THERMAL_GENL_ATTR_CPU_CAPABILITY raw value<br />
was changed while intel_lpmd still uses the old value.<br />
<br />
Although intel_lpmd can be updated to check the THERMAL_GENL_VERSION and<br />
use the appropriate THERMAL_GENL_ATTR_CPU_CAPABILITY value, the commit<br />
itself is questionable.<br />
<br />
The commit introduced a new element in the middle of enum thermal_genl_attr,<br />
which affects many existing attributes and introduces potential risks<br />
and unnecessary maintenance burdens for userspace thermal netlink event<br />
users.<br />
<br />
Solve the issue by moving the newly introduced<br />
THERMAL_GENL_ATTR_TZ_PREV_TEMP attribute to the end of the<br />
enum thermal_genl_attr. This ensures that all existing thermal generic<br />
netlink attributes remain unaffected.<br />
<br />
[ rjw: Subject edits ]</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21839</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop<br />
<br />
Move the conditional loading of hardware DR6 with the guest's DR6 value<br />
out of the core .vcpu_run() loop to fix a bug where KVM can load hardware<br />
with a stale vcpu-&gt;arch.dr6.<br />
<br />
When the guest accesses a DR and host userspace isn't debugging the guest,<br />
KVM disables DR interception and loads the guest's values into hardware on<br />
VM-Enter and saves them on VM-Exit.  This allows the guest to access DRs<br />
at will, e.g. so that a sequence of DR accesses to configure a breakpoint<br />
only generates one VM-Exit.<br />
<br />
For DR0-DR3, the logic/behavior is identical between VMX and SVM, and also<br />
identical between KVM_DEBUGREG_BP_ENABLED (userspace debugging the guest)<br />
and KVM_DEBUGREG_WONT_EXIT (guest using DRs), and so KVM handles loading<br />
DR0-DR3 in common code, _outside_ of the core kvm_x86_ops.vcpu_run() loop.<br />
<br />
But for DR6, the guest's value doesn't need to be loaded into hardware for<br />
KVM_DEBUGREG_BP_ENABLED, and SVM provides a dedicated VMCB field whereas<br />
VMX requires software to manually load the guest value, and so loading the<br />
guest's value into DR6 is handled by {svm,vmx}_vcpu_run(), i.e. is done<br />
_inside_ the core run loop.<br />
<br />
Unfortunately, saving the guest values on VM-Exit is initiated by common<br />
x86, again outside of the core run loop.  If the guest modifies DR6 (in<br />
hardware, when DR interception is disabled), and then the next VM-Exit is<br />
a fastpath VM-Exit, KVM will reload hardware DR6 with vcpu-&gt;arch.dr6 and<br />
clobber the guest's actual value.<br />
<br />
The bug shows up primarily with nested VMX because KVM handles the VMX<br />
preemption timer in the fastpath, and the window between hardware DR6<br />
being modified (in guest context) and DR6 being read by guest software is<br />
orders of magnitude larger in a nested setup.  E.g. in non-nested, the<br />
VMX preemption timer would need to fire precisely between #DB injection<br />
and the #DB handler's read of DR6, whereas with a KVM-on-KVM setup, the<br />
window where hardware DR6 is "dirty" extends all the way from L1 writing<br />
DR6 to VMRESUME (in L1).<br />
<br />
    L1's view:<br />
    ==========<br />
    &lt;L1 disables DR interception&gt;<br />
           CPU 0/KVM-7289    [023] d....  2925.640961: kvm_entry: vcpu 0<br />
 A:  L1 Writes DR6<br />
           CPU 0/KVM-7289    [023] d....  2925.640963: &lt;hack&gt;: Set DRs, DR6 = 0xffff0ff1<br />
<br />
 B:        CPU 0/KVM-7289    [023] d....  2925.640967: kvm_exit: vcpu 0 reason EXTERNAL_INTERRUPT intr_info 0x800000ec<br />
<br />
 D: L1 reads DR6, arch.dr6 = 0<br />
           CPU 0/KVM-7289    [023] d....  2925.640969: &lt;hack&gt;: Sync DRs, DR6 = 0xffff0ff0<br />
<br />
           CPU 0/KVM-7289    [023] d....  2925.640976: kvm_entry: vcpu 0<br />
    L2 reads DR6, L1 disables DR interception<br />
           CPU 0/KVM-7289    [023] d....  2925.640980: kvm_exit: vcpu 0 reason DR_ACCESS info1 0x0000000000000216<br />
           CPU 0/KVM-7289    [023] d....  2925.640983: kvm_entry: vcpu 0<br />
<br />
           CPU 0/KVM-7289    [023] d....  2925.640983: &lt;hack&gt;: Set DRs, DR6 = 0xffff0ff0<br />
<br />
    L2 detects failure<br />
           CPU 0/KVM-7289    [023] d....  2925.640987: kvm_exit: vcpu 0 reason HLT<br />
    L1 reads DR6 (confirms failure)<br />
           CPU 0/KVM-7289    [023] d....  2925.640990: &lt;hack&gt;: Sync DRs, DR6 = 0xffff0ff0<br />
<br />
    L0's view:<br />
    ==========<br />
    L2 reads DR6, arch.dr6 = 0<br />
          CPU 23/KVM-5046    [001] d....  3410.005610: kvm_exit: vcpu 23 reason DR_ACCESS info1 0x0000000000000216<br />
          CPU 23/KVM-5046    [001] .....  3410.005610: kvm_nested_vmexit: vcpu 23 reason DR_ACCESS info1 0x0000000000000216<br />
<br />
    L2 =&gt; L1 nested VM-Exit<br />
          CPU 23/KVM-5046    [001] .....  3410.005610: kvm_nested_vmexit_inject: reason: DR_ACCESS ext_inf1: 0x0000000000000216<br />
<br />
          CPU 23/KVM-5046    [001] d....  3410.005610: kvm_entry: vcpu 23<br />
          CPU 23/KVM-5046    [001] d....  3410.005611: kvm_exit: vcpu 23 reason VMREAD<br />
          CPU 23/KVM-5046    [001] d....  3410.005611: kvm_entry: vcpu 23<br />
          CPU 23/KVM-5046    [001] d....  3410.<br />
---truncated---</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21838</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
usb: gadget: core: flush gadget workqueue after device removal<br />
<br />
device_del() can lead to new work being scheduled in gadget-&gt;work<br />
workqueue. This is observed, for example, with the dwc3 driver with the<br />
following call stack:<br />
  device_del()<br />
    gadget_unbind_driver()<br />
      usb_gadget_disconnect_locked()<br />
        dwc3_gadget_pullup()<br />
	  dwc3_gadget_soft_disconnect()<br />
	    usb_gadget_set_state()<br />
	      schedule_work(&amp;gadget-&gt;work)<br />
<br />
Move flush_work() after device_del() to ensure the workqueue is cleaned<br />
up.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21837</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
io_uring/uring_cmd: unconditionally copy SQEs at prep time<br />
<br />
This isn't generally necessary, but conditions have been observed where<br />
SQE data is accessed from the original SQE after prep has been done and<br />
outside of the initial issue. Opcode prep handlers must ensure that any<br />
SQE related data is stable beyond the prep phase, but uring_cmd is a bit<br />
special in how it handles the SQE which makes it susceptible to reading<br />
stale data. If the application has reused the SQE before the original<br />
completes, then that can lead to data corruption.<br />
<br />
Down the line we can relax this again once uring_cmd has been sanitized<br />
a bit, and avoid unnecessarily copying the SQE.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21836</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
io_uring/kbuf: reallocate buf lists on upgrade<br />
<br />
IORING_REGISTER_PBUF_RING can reuse an old struct io_buffer_list if it<br />
was created for legacy selected buffer and has been emptied. It violates<br />
the requirement that most of the field should stay stable after publish.<br />
Always reallocate it instead.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-21835</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
usb: gadget: f_midi: fix MIDI Streaming descriptor lengths<br />
<br />
While the MIDI jacks are configured correctly, and the MIDIStreaming<br />
endpoint descriptors are filled with the correct information,<br />
bNumEmbMIDIJack and bLength are set incorrectly in these descriptors.<br />
<br />
This does not matter when the numbers of in and out ports are equal, but<br />
when they differ the host will receive broken descriptors with<br />
uninitialized stack memory leaking into the descriptor for whichever<br />
value is smaller.<br />
<br />
The precise meaning of "in" and "out" in the port counts is not clearly<br />
defined and can be confusing.  But elsewhere the driver consistently<br />
uses this to match the USB meaning of IN and OUT viewed from the host,<br />
so that "in" ports send data to the host and "out" ports receive data<br />
from it.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #53aa33;" class="mycode_color">0.0</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2067</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability was found in projectworlds Life Insurance Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /search.php. The manipulation of the argument key leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2066</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability has been found in projectworlds Life Insurance Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /updateAgent.php. The manipulation of the argument agent_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2065</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability, which was classified as critical, was found in projectworlds Life Insurance Management System 1.0. This affects an unknown part of the file /editAgent.php. The manipulation of the argument agent_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2064</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability, which was classified as critical, has been found in projectworlds Life Insurance Management System 1.0. Affected by this issue is some unknown functionality of the file /deletePayment.php. The manipulation of the argument recipt_no leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2063</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as critical was found in projectworlds Life Insurance Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /deleteNominee.php. The manipulation of the argument nominee_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Comic Sans MS;" class="mycode_font"><span style="font-size: large;" class="mycode_size">CVE-2025-2062</span></span></span></span><br />
<br />
<div style="text-align: justify;" class="mycode_align">A vulnerability classified as critical has been found in projectworlds Life Insurance Management System 1.0. Affected is an unknown function of the file /clientStatus.php. The manipulation of the argument client_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.</div>
<br />
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Maximum CVSS Score :</span></span> <span style="color: #df3d03;" class="mycode_color">7.5</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Exploit Availability:</span> </span><span style="color: #e82a1f;" class="mycode_color">Not available</span></div>
<div style="text-align: right;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-family: Comic Sans MS;" class="mycode_font">Reference:</span></span> You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.</div>
<hr class="mycode_hr" />]]></content:encoded>
		</item>
	</channel>
</rss>