漏洞描述这是SmarterMain的一个未授权RCE漏洞,出现RCE的位置为ConnectToHub API method,具体的漏洞描述如下图所示:环境搭建这里我直接用的docker搭建的环境,命令如下:然后是.net的反编译工具,我使用的是Rider以及dotPeet,这个就凭个人喜好下载了。漏洞代码分析因为.Net的路由大部分都在MailService.dll,所以可以直接看到这个dll中
A vulnerability described as problematic has been identified in Notepad++ up to 8.8.8. Affected by this vulnerability is an unknown functionality of the component WinGUp updater. Such manipulation leads to download of code without integrity check.
This vulnerability is listed as CVE-2025-15556. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability marked as problematic has been reported in WP ULike Plugin up to 4.8.3.1 on WordPress. This vulnerability affects the function wp_ulike_delete_history_api. This manipulation of the argument ID causes improper control of resource identifiers.
This vulnerability appears as CVE-2026-0909. The attack may be initiated remotely. There is no available exploit.
A vulnerability was found in Kod8 Individual and SME Website up to 03022026 and classified as problematic. Affected by this vulnerability is an unknown functionality. Such manipulation leads to cross site scripting.
This vulnerability is referenced as CVE-2025-8456. It is possible to launch the attack remotely. No exploit is available.
A vulnerability marked as problematic has been reported in anthropics claude-code up to 1.0.110. Impacted is the function startsWith of the component WebFetch. This manipulation causes open redirect.
This vulnerability appears as CVE-2026-24052. The attack may be initiated remotely. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability has been found in Seres syWEB up to 03022026 and classified as problematic. Affected is an unknown function. This manipulation causes cross site scripting.
The identification of this vulnerability is CVE-2025-8461. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Autodesk 3ds Max up to 2026.3.1. Affected is an unknown function of the component GIF File Parser. The manipulation leads to out-of-bounds write.
This vulnerability is uniquely identified as CVE-2026-0536. The attack is possible to be carried out remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic was found in Espressif ESP-IDF 5.1.6/5.2.6/5.3.4/5.4.3/5.5.2. This impacts the function wpabuf_put_data. Executing a manipulation of the argument frag_len can lead to integer underflow.
This vulnerability is handled as CVE-2026-25532. The attack can only be done within the local network. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in Espressif ESP-IDF 5.1.6/5.2.6/5.3.4/5.4.3/5.5.2. This affects the function protocomm_ble of the component BLE Provisioning Transport. Performing a manipulation results in out-of-bounds read.
This vulnerability is known as CVE-2026-25508. Access to the local network is required for this attack. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in Espressif ESP-IDF 5.1.6/5.2.6/5.3.4/5.4.3/5.5.2. The impacted element is the function protocomm_ble of the component GATT Service. Such manipulation leads to use after free.
This vulnerability is traded as CVE-2026-25507. Access to the local network is required for this attack to succeed. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in n8n-io n8n up to 1.120.2. The affected element is an unknown function of the component Community Package Installation Handler. This manipulation causes os command injection.
This vulnerability appears as CVE-2026-21893. The attack may be initiated remotely. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability labeled as problematic has been found in RIOT-OS RIOT up to 2025.10. Impacted is the function sixlowpan_sfr_rfrag_t. The manipulation results in out-of-bounds read.
This vulnerability is reported as CVE-2026-25139. The attack can be launched remotely. No exploit exists.
A vulnerability identified as critical has been detected in Unstructured-IO unstructured up to 0.18.17. This issue affects the function partition_msg. The manipulation leads to path traversal.
This vulnerability is documented as CVE-2025-64712. The attack can be initiated remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability categorized as critical has been discovered in devcode-it openstamanager up to 2.9.8. This vulnerability affects the function get_sedi of the file ajax_complete.php. Executing a manipulation of the argument idanagrafica can lead to sql injection.
This vulnerability is registered as CVE-2025-69213. It is possible to launch the attack remotely. No exploit is available.
A vulnerability classified as problematic has been found in Wikimedia CheckUser. The affected element is an unknown function of the file src/Services/CheckUserUserInfoCardService.Php. The manipulation leads to information disclosure.
This vulnerability is documented as CVE-2025-61649. The attack can be initiated remotely. There is not any exploit available.
A vulnerability described as problematic has been identified in Wikimedia CheckUser up to 1.44.0. Affected by this issue is some unknown functionality of the file modules/ext.CheckUser.TempAccounts/components/ShowIPButton.Vue. Executing a manipulation can lead to cross site scripting.
The identification of this vulnerability is CVE-2025-61648. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is recommended.