CVE Monitor
3.44K subscribers
33.2K links
Download Telegram
{
"Source": "CVE FEED",
"Title": "CVE-2025-67344 - jshERP Stored XSS Vulnerability",
"Content": "CVE ID : CVE-2025-67344
Published : Dec. 12, 2025, 4:15 p.m. | 1 hour, 44 minutes ago
Description : jshERP v3.5 and earlier is affected by a stored Cross Site Scripting (XSS) vulnerability via the /msg/add endpoint.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-65530 - CloudLinux ai-bolit Remote File Overwrite Vulnerability",
"Content": "CVE ID : CVE-2025-65530
Published : Dec. 12, 2025, 4:15 p.m. | 1 hour, 44 minutes ago
Description : An eval injection in the malware de-obfuscation routines of CloudLinux ai-bolit before v32.7.4 allows attackers to overwrite arbitrary files as root via scanning a crafted file.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-65854 - MineAdmin Command Injection Vulnerability",
"Content": "CVE ID : CVE-2025-65854
Published : Dec. 12, 2025, 4:15 p.m. | 1 hour, 44 minutes ago
Description : Insecure permissions in the scheduled tasks feature of MineAdmin v3.x allows attackers to execute arbitrary commands and execute a full account takeover.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-66430 - "Plesk Authentication Bypass"",
"Content": "CVE ID : CVE-2025-66430
Published : Dec. 12, 2025, 4:15 p.m. | 1 hour, 44 minutes ago
Description : Plesk 18.0 has Incorrect Access Control.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14567 - haxxorsid Stock-Management-System employees missing authentication",
"Content": "CVE ID : CVE-2025-14567
Published : Dec. 12, 2025, 4:15 p.m. | 1 hour, 44 minutes ago
Description : A weakness has been identified in haxxorsid Stock-Management-System up to fbbbf213e9c93b87183a3891f77e3cc7095f22b0. This affects an unknown function of the file /api/employees. Executing manipulation can lead to missing authentication. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-13733 - BuhoNTFS 1.3.2 - Local Privilege Escalation",
"Content": "CVE ID : CVE-2025-13733
Published : Dec. 12, 2025, 4:15 p.m. | 1 hour, 44 minutes ago
Description : BuhoNTFS contains an insecure XPC service that allows local, unprivileged users to escalate their privileges to root via insecure functions.This issue affects BuhoNTFS: 1.3.2.
Severity: 8.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2024-58314 - Atcom 2.7.x.x Authenticated Command Injection via Web Configuration CGI",
"Content": "CVE ID : CVE-2024-58314
Published : Dec. 12, 2025, 7:57 p.m. | 10 minutes ago
Description : Atcom 100M IP Phones firmware version 2.7.x.x contains an authenticated command injection vulnerability in the web configuration CGI script that allows attackers to execute arbitrary system commands. Attackers can inject shell commands through the 'cmd' parameter in web_cgi_main.cgi, enabling remote code execution with administrative credentials.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2024-58311 - Dormakaba Saflok System 6000 Key Generation Cryptographic Weakness",
"Content": "CVE ID : CVE-2024-58311
Published : Dec. 12, 2025, 7:57 p.m. | 10 minutes ago
Description : Dormakaba Saflok System 6000 contains a predictable key generation algorithm that allows attackers to derive card access keys from a 32-bit unique identifier. Attackers can exploit the deterministic key generation process by calculating valid access keys using a simple mathematical transformation of the card's unique identifier.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2024-58305 - WonderCMS 4.3.2 Cross-Site Scripting Remote Code Execution via Module Installation",
"Content": "CVE ID : CVE-2024-58305
Published : Dec. 12, 2025, 7:56 p.m. | 11 minutes ago
Description : WonderCMS 4.3.2 contains a cross-site scripting vulnerability that allows attackers to inject malicious JavaScript through the module installation endpoint. Attackers can craft a specially designed XSS payload to install a reverse shell module and execute remote commands by tricking an authenticated administrator into accessing a malicious link.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2024-58299 - PCMan FTP Server 2.0 Remote Buffer Overflow via 'pwd' Command",
"Content": "CVE ID : CVE-2024-58299
Published : Dec. 12, 2025, 7:56 p.m. | 11 minutes ago
Description : PCMan FTP Server 2.0 contains a buffer overflow vulnerability in the 'pwd' command that allows remote attackers to execute arbitrary code. Attackers can send a specially crafted payload during the FTP login process to overwrite memory and potentially gain system access.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2024-14010 - Typora 1.7.4 OS Command Injection via Export PDF Preferences",
"Content": "CVE ID : CVE-2024-14010
Published : Dec. 12, 2025, 7:55 p.m. | 12 minutes ago
Description : Typora 1.7.4 contains a command injection vulnerability in the PDF export preferences that allows attackers to execute arbitrary system commands. Attackers can inject malicious commands into the 'run command' input field during PDF export to achieve remote code execution.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-67734 - Frappe Authenticated Users can Execute JavaScript through its Job Form",
"Content": "CVE ID : CVE-2025-67734
Published : Dec. 12, 2025, 7:48 p.m. | 18 minutes ago
Description : Frappe Learning Management System (LMS) is a learning system that helps users structure their content. Versions prior to 2.42.0 allowed authenticated attackers to enter JavaScript through the Company Website field of the Job Form, exposing users to an XSS attack. The script could then be executed in the browsers of users who opened the malicious job posting. This issue is fixed in version 2.42.0.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14572 - UTT 进取 512W formWebAuthGlobalConfig memory corruption",
"Content": "CVE ID : CVE-2025-14572
Published : Dec. 12, 2025, 7:32 p.m. | 35 minutes ago
Description : A vulnerability was found in UTT 进取 512W up to 1.7.7-171114. This affects an unknown part of the file /goform/formWebAuthGlobalConfig. Performing manipulation of the argument hidcontact results in memory corruption. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-8083 - Vuetify Prototype Pollution via Preset options",
"Content": "CVE ID : CVE-2025-8083
Published : Dec. 12, 2025, 7:29 p.m. | 38 minutes ago
Description : The Preset configuration  feature of Vuetify is vulnerable to Prototype Pollution  due to the internal 'mergeDeep' utility function used to merge options with defaults. Using a specially-crafted, malicious preset can result in polluting all JavaScript objects with arbitrary properties, which can further negatively affect all aspects of the application's behavior. This can lead to a wide range of security issues, including resource exhaustion/denial of service or unauthorized access to data.

If the application utilizes Server-Side Rendering (SSR), this vulnerability could affect the whole server process.

This issue affects Vuetify versions greater than or equal to 2.2.0-beta.2 and less than 3.0.0-alpha.10.

Note:
Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here .
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14372 - Google Chrome Password Manager Use After Free Vulnerability",
"Content": "CVE ID : CVE-2025-14372
Published : Dec. 12, 2025, 7:20 p.m. | 47 minutes ago
Description : Use after free in Password Manager in Google Chrome prior to 143.0.7499.110 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14373 - Google Chrome Android Domain Spoofing Vulnerability",
"Content": "CVE ID : CVE-2025-14373
Published : Dec. 12, 2025, 7:20 p.m. | 47 minutes ago
Description : Inappropriate implementation in Toolbar in Google Chrome on Android prior to 143.0.7499.110 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14174 - Google Chrome ANGLE Out-of-Bounds Memory Access Vulnerability",
"Content": "CVE ID : CVE-2025-14174
Published : Dec. 12, 2025, 7:20 p.m. | 47 minutes ago
Description : Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-8082 - Vuetify XSS via unsanitized 'titleDateFormat' in 'VDatePicker'",
"Content": "CVE ID : CVE-2025-8082
Published : Dec. 12, 2025, 7:16 p.m. | 51 minutes ago
Description : Improper neutralization of the title date in the 'VDatePicker' component in Vuetify, allows unsanitized HTML to be inserted into the page. This can lead to a Cross-Site Scripting (XSS)  attack. The vulnerability occurs because the 'title-date-format' property of the 'VDatePicker' can accept a user created function and assign its output to the 'innerHTML' property of the title element without sanitization.

This issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0.

Note:
Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here .
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14571 - projectworlds Advanced Library Management System borrow_book.php sql injection",
"Content": "CVE ID : CVE-2025-14571
Published : Dec. 12, 2025, 7:16 p.m. | 51 minutes ago
Description : A vulnerability has been found in projectworlds Advanced Library Management System 1.0. Affected by this issue is some unknown functionality of the file /borrow_book.php. Such manipulation of the argument roll_number leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14568 - haxxorsid Stock-Management-System User.php sql injection",
"Content": "CVE ID : CVE-2025-14568
Published : Dec. 12, 2025, 7:16 p.m. | 51 minutes ago
Description : A security vulnerability has been detected in haxxorsid Stock-Management-System up to fbbbf213e9c93b87183a3891f77e3cc7095f22b0. This impacts an unknown function of the file model/User.php. The manipulation of the argument employee_id/id/admin leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14569 - ggml-org whisper.cpp common-whisper.cpp read_audio_data use after free",
"Content": "CVE ID : CVE-2025-14569
Published : Dec. 12, 2025, 7:16 p.m. | 51 minutes ago
Description : A vulnerability was detected in ggml-org whisper.cpp up to 1.8.2. Affected is the function read_audio_data of the file /whisper.cpp/examples/common-whisper.cpp. The manipulation results in use after free. The attack requires a local approach. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή