CVE-2009-20008 – Green Dam Youth Escort Stack-Based Buffer Overflow Vulnerability

Green Dam Youth Escort version 3.17 is vulnerable to a stack-based buffer overflow when processing overly long URLs. The flaw resides in the URL filtering component, which fails to properly validate input length before copying user-supplied data into a fixed-size buffer. A remote attacker can exploit this vulnerability by enticing a user to visit a […]

CVE-2008-20001 – ActivePDF WebGrabber Stack-Based Buffer Overflow Vulnerability

activePDF WebGrabber version 3.8.2.0 contains a stack-based buffer overflow vulnerability in the GetStatus() method of the APWebGrb.ocx ActiveX control. By passing an overly long string to this method, a remote attacker can execute arbitrary code in the context of the vulnerable process. Although the control is not marked safe for scripting, exploitation is possible via […]

CVE-2005-10004 – Cacti Remote Command Execution Vulnerability

Cacti versions prior to 0.8.6-d contain a remote command execution vulnerability in the graph_view.php script. An authenticated user can inject arbitrary shell commands via the graph_start GET parameter, which is improperly handled during graph rendering. This flaw allows attackers to execute commands on the underlying operating system with the privileges of the web server process, […]

Hackers Exploit CrushFTP Zero-Day to Take Over Servers

Hackers Exploit CrushFTP Zero-Day to Take Over Servers WatchTowr Labs uncovers a zero-day exploit (CVE-2025-54309) in CrushFTP. The vulnerability lets hackers gain admin access via the web interface. Update to v10.8.5 or v11.3.4. A zero-day vulnerability … Read more Published Date: Aug 30, 2025 (13 hours, 53 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2025-54309 […]

CVE-2025-9685 – Portabilis i-Educar SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-9685 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Aug. 30, 2025 Action […]