Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      A Week In The Life Of An AI-Augmented Designer

      August 22, 2025

      This week in AI updates: Gemini Code Assist Agent Mode, GitHub’s Agents panel, and more (August 22, 2025)

      August 22, 2025

      Microsoft adds Copilot-powered debugging features for .NET in Visual Studio

      August 21, 2025

      Blackstone portfolio company R Systems Acquires Novigo Solutions, Strengthening its Product Engineering and Full-Stack Agentic-AI Capabilities

      August 21, 2025

      I found the ultimate MacBook Air alternative for Windows users – and it’s priced well

      August 23, 2025

      Outdated IT help desks are holding businesses back – but there is a solution

      August 23, 2025

      Android’s latest update can force apps into dark mode – how to see it now

      August 23, 2025

      I tried the Google Pixel Watch 4 – and these key features made it feel indispensable

      August 23, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Building Cross-Platform Alerts with Laravel’s Notification Framework

      August 23, 2025
      Recent

      Building Cross-Platform Alerts with Laravel’s Notification Framework

      August 23, 2025

      Add Notes Functionality to Eloquent Models With the Notable Package

      August 23, 2025

      How to install OpenPlatform — IoT platform

      August 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Basics of Digital Forensics

      August 22, 2025
      Recent

      Basics of Digital Forensics

      August 22, 2025

      Top Linux Server Automation Tools: Simplifying System Administration

      August 22, 2025

      Rising from the Ashes: How AlmaLinux and Rocky Linux Redefined the Post-CentOS Landscape

      August 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-48207 – TYPO3 Reint Download Manager Insecure Direct Object Reference (IDOR)

    CVE-2025-48207 – TYPO3 Reint Download Manager Insecure Direct Object Reference (IDOR)

    May 21, 2025

    CVE ID : CVE-2025-48207

    Published : May 21, 2025, 4:15 p.m. | 28 minutes ago

    Description : The reint_downloadmanager extension through 5.0.0 for TYPO3 allows Insecure Direct Object Reference.

    Severity: 8.6 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-4524 – Madara WordPress Theme Local File Inclusion Vulnerability
    Next Article CVE-2025-48200 – TYPO3 sr_feuser_register Remote Code Execution

    Related Posts

    Development

    “What happens online stays online” and other cyberbullying myths, debunked

    August 22, 2025
    Development

    The need for speed: Why organizations are turning to rapid, trustworthy MDR

    August 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-48877 – Discourse Codepen Unintended JS Execution Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-27954 – Apache Clinical Collaboration Platform Cross-Site Scripting (XSS) and Remote Code Execution

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-48187 – RAGFlow Authentication Bypass

    Common Vulnerabilities and Exposures (CVEs)

    Forza Motorsport’s Future in Jeopardy: Fans Demand Clarity from Microsoft

    News & Updates

    Highlights

    CVE-2025-37834 – Linux Kernel: Dirty Swapcache Page Reclamation Vulnerability

    May 8, 2025

    CVE ID : CVE-2025-37834

    Published : May 8, 2025, 7:15 a.m. | 58 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    mm/vmscan: don’t try to reclaim hwpoison folio

    Syzkaller reports a bug as follows:

    Injecting memory failure for pfn 0x18b00e at process virtual address 0x20ffd000
    Memory failure: 0x18b00e: dirty swapcache page still referenced by 2 users
    Memory failure: 0x18b00e: recovery action for dirty swapcache page: Failed
    page: refcount:2 mapcount:0 mapping:0000000000000000 index:0x20ffd pfn:0x18b00e
    memcg:ffff0000dd6d9000
    anon flags: 0x5ffffe00482011(locked|dirty|arch_1|swapbacked|hwpoison|node=0|zone=2|lastcpupid=0xfffff)
    raw: 005ffffe00482011 dead000000000100 dead000000000122 ffff0000e232a7c9
    raw: 0000000000020ffd 0000000000000000 00000002ffffffff ffff0000dd6d9000
    page dumped because: VM_BUG_ON_FOLIO(!folio_test_uptodate(folio))
    ————[ cut here ]————
    kernel BUG at mm/swap_state.c:184!
    Internal error: Oops – BUG: 00000000f2000800 [#1] SMP
    Modules linked in:
    CPU: 0 PID: 60 Comm: kswapd0 Not tainted 6.6.0-gcb097e7de84e #3
    Hardware name: linux,dummy-virt (DT)
    pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=–)
    pc : add_to_swap+0xbc/0x158
    lr : add_to_swap+0xbc/0x158
    sp : ffff800087f37340
    x29: ffff800087f37340 x28: fffffc00052c0380 x27: ffff800087f37780
    x26: ffff800087f37490 x25: ffff800087f37c78 x24: ffff800087f377a0
    x23: ffff800087f37c50 x22: 0000000000000000 x21: fffffc00052c03b4
    x20: 0000000000000000 x19: fffffc00052c0380 x18: 0000000000000000
    x17: 296f696c6f662865 x16: 7461646f7470755f x15: 747365745f6f696c
    x14: 6f6621284f494c4f x13: 0000000000000001 x12: ffff600036d8b97b
    x11: 1fffe00036d8b97a x10: ffff600036d8b97a x9 : dfff800000000000
    x8 : 00009fffc9274686 x7 : ffff0001b6c5cbd3 x6 : 0000000000000001
    x5 : ffff0000c25896c0 x4 : 0000000000000000 x3 : 0000000000000000
    x2 : 0000000000000000 x1 : ffff0000c25896c0 x0 : 0000000000000000
    Call trace:
    add_to_swap+0xbc/0x158
    shrink_folio_list+0x12ac/0x2648
    shrink_inactive_list+0x318/0x948
    shrink_lruvec+0x450/0x720
    shrink_node_memcgs+0x280/0x4a8
    shrink_node+0x128/0x978
    balance_pgdat+0x4f0/0xb20
    kswapd+0x228/0x438
    kthread+0x214/0x230
    ret_from_fork+0x10/0x20

    I can reproduce this issue with the following steps:

    1) When a dirty swapcache page is isolated by reclaim process and the
    page isn’t locked, inject memory failure for the page.
    me_swapcache_dirty() clears uptodate flag and tries to delete from lru,
    but fails. Reclaim process will put the hwpoisoned page back to lru.

    2) The process that maps the hwpoisoned page exits, the page is deleted
    the page will never be freed and will be in the lru forever.

    3) If we trigger a reclaim again and tries to reclaim the page,
    add_to_swap() will trigger VM_BUG_ON_FOLIO due to the uptodate flag is
    cleared.

    To fix it, skip the hwpoisoned page in shrink_folio_list(). Besides, the
    hwpoison folio may not be unmapped by hwpoison_user_mappings() yet, unmap
    it in shrink_folio_list(), otherwise the folio will fail to be unmaped by
    hwpoison_user_mappings() since the folio isn’t in lru list.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-4230 – Palo Alto Networks PAN-OS Command Injection Vulnerability

    June 12, 2025

    Will your next iPhone be ‘Made in America’? Let’s do the math

    April 28, 2025

    CodeSOD: Would a Function by Any Other Name Still be WTF?

    May 12, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.