CVE Monitor
3.44K subscribers
33.2K links
Download Telegram
{
"Source": "CVE FEED",
"Title": "CVE-2025-67734 - Frappe Authenticated Users can Execute JavaScript through its Job Form",
"Content": "CVE ID : CVE-2025-67734
Published : Dec. 12, 2025, 7:48 p.m. | 18 minutes ago
Description : Frappe Learning Management System (LMS) is a learning system that helps users structure their content. Versions prior to 2.42.0 allowed authenticated attackers to enter JavaScript through the Company Website field of the Job Form, exposing users to an XSS attack. The script could then be executed in the browsers of users who opened the malicious job posting. This issue is fixed in version 2.42.0.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14572 - UTT 进取 512W formWebAuthGlobalConfig memory corruption",
"Content": "CVE ID : CVE-2025-14572
Published : Dec. 12, 2025, 7:32 p.m. | 35 minutes ago
Description : A vulnerability was found in UTT 进取 512W up to 1.7.7-171114. This affects an unknown part of the file /goform/formWebAuthGlobalConfig. Performing manipulation of the argument hidcontact results in memory corruption. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-8083 - Vuetify Prototype Pollution via Preset options",
"Content": "CVE ID : CVE-2025-8083
Published : Dec. 12, 2025, 7:29 p.m. | 38 minutes ago
Description : The Preset configuration  feature of Vuetify is vulnerable to Prototype Pollution  due to the internal 'mergeDeep' utility function used to merge options with defaults. Using a specially-crafted, malicious preset can result in polluting all JavaScript objects with arbitrary properties, which can further negatively affect all aspects of the application's behavior. This can lead to a wide range of security issues, including resource exhaustion/denial of service or unauthorized access to data.

If the application utilizes Server-Side Rendering (SSR), this vulnerability could affect the whole server process.

This issue affects Vuetify versions greater than or equal to 2.2.0-beta.2 and less than 3.0.0-alpha.10.

Note:
Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here .
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14372 - Google Chrome Password Manager Use After Free Vulnerability",
"Content": "CVE ID : CVE-2025-14372
Published : Dec. 12, 2025, 7:20 p.m. | 47 minutes ago
Description : Use after free in Password Manager in Google Chrome prior to 143.0.7499.110 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14373 - Google Chrome Android Domain Spoofing Vulnerability",
"Content": "CVE ID : CVE-2025-14373
Published : Dec. 12, 2025, 7:20 p.m. | 47 minutes ago
Description : Inappropriate implementation in Toolbar in Google Chrome on Android prior to 143.0.7499.110 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14174 - Google Chrome ANGLE Out-of-Bounds Memory Access Vulnerability",
"Content": "CVE ID : CVE-2025-14174
Published : Dec. 12, 2025, 7:20 p.m. | 47 minutes ago
Description : Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-8082 - Vuetify XSS via unsanitized 'titleDateFormat' in 'VDatePicker'",
"Content": "CVE ID : CVE-2025-8082
Published : Dec. 12, 2025, 7:16 p.m. | 51 minutes ago
Description : Improper neutralization of the title date in the 'VDatePicker' component in Vuetify, allows unsanitized HTML to be inserted into the page. This can lead to a Cross-Site Scripting (XSS)  attack. The vulnerability occurs because the 'title-date-format' property of the 'VDatePicker' can accept a user created function and assign its output to the 'innerHTML' property of the title element without sanitization.

This issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0.

Note:
Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here .
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14571 - projectworlds Advanced Library Management System borrow_book.php sql injection",
"Content": "CVE ID : CVE-2025-14571
Published : Dec. 12, 2025, 7:16 p.m. | 51 minutes ago
Description : A vulnerability has been found in projectworlds Advanced Library Management System 1.0. Affected by this issue is some unknown functionality of the file /borrow_book.php. Such manipulation of the argument roll_number leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14568 - haxxorsid Stock-Management-System User.php sql injection",
"Content": "CVE ID : CVE-2025-14568
Published : Dec. 12, 2025, 7:16 p.m. | 51 minutes ago
Description : A security vulnerability has been detected in haxxorsid Stock-Management-System up to fbbbf213e9c93b87183a3891f77e3cc7095f22b0. This impacts an unknown function of the file model/User.php. The manipulation of the argument employee_id/id/admin leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14569 - ggml-org whisper.cpp common-whisper.cpp read_audio_data use after free",
"Content": "CVE ID : CVE-2025-14569
Published : Dec. 12, 2025, 7:16 p.m. | 51 minutes ago
Description : A vulnerability was detected in ggml-org whisper.cpp up to 1.8.2. Affected is the function read_audio_data of the file /whisper.cpp/examples/common-whisper.cpp. The manipulation results in use after free. The attack requires a local approach. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14570 - projectworlds Advanced Library Management System view_admin.php sql injection",
"Content": "CVE ID : CVE-2025-14570
Published : Dec. 12, 2025, 7:16 p.m. | 51 minutes ago
Description : A flaw has been found in projectworlds Advanced Library Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /view_admin.php. This manipulation of the argument admin_id causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-67750 - Lightning Flow Scanner is Vulnerable to Code Injection via Unsafe Use of new Function() in APIVersion Rule",
"Content": "CVE ID : CVE-2025-67750
Published : Dec. 12, 2025, 9:15 p.m. | 52 minutes ago
Description : Lightning Flow Scanner provides a A CLI plugin, VS Code Extension and GitHub Action for analysis and optimization of Salesforce Flows. Versions 6.10.5 and below allow a maliciously crafted flow metadata file to cause arbitrary JavaScript execution during scanning. The APIVersion rule uses new Function() to evaluate expression strings, enabling an attacker to supply a malicious expression within rule configuration or crafted flow metadata. This could compromise developer machines, CI runners, or editor environments. This issue is fixed in version 6.10.6.
Severity: 8.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-67634 - Software Acquisition Guide Supplier Response Web Tool XSS",
"Content": "CVE ID : CVE-2025-67634
Published : Dec. 12, 2025, 9:15 p.m. | 52 minutes ago
Description : The CISA Software Acquisition Guide Supplier Response Web Tool before 2025-12-11 was vulnerable to cross-site scripting via text fields. If an attacker could convince a user to import a specially-crafted JSON file, the Tool would load JavaScript from the file into the page. The JavaScript would execute in the context of the user's browser when the user submits the page (clicks 'Next').
Severity: 4.6 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-46289 - Apple macOS Protected User Data Access Vulnerability",
"Content": "CVE ID : CVE-2025-46289
Published : Dec. 12, 2025, 9:15 p.m. | 52 minutes ago
Description : A logic issue was addressed with improved file handling. This issue is fixed in macOS Sonoma 14.8.3, macOS Sequoia 15.7.3. An app may be able to access protected user data.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-43527 - "macOS Sequoia Privilege Escalation"",
"Content": "CVE ID : CVE-2025-43527
Published : Dec. 12, 2025, 9:15 p.m. | 52 minutes ago
Description : A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.7.3. An app may be able to gain root privileges.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-43530 - "Apple macOS App Sensitive Data Access Vulnerability"",
"Content": "CVE ID : CVE-2025-43530
Published : Dec. 12, 2025, 9:15 p.m. | 52 minutes ago
Description : This issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.8.3, macOS Sequoia 15.7.3. An app may be able to access sensitive user data.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-43532 - Apple macOS Memory Corruption Vulnerability",
"Content": "CVE ID : CVE-2025-43532
Published : Dec. 12, 2025, 9:15 p.m. | 52 minutes ago
Description : A memory corruption issue was addressed with improved bounds checking. This issue is fixed in macOS Sonoma 14.8.3, macOS Sequoia 15.7.3. Processing malicious data may lead to unexpected app termination.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-43538 - Apple macOS Sonoma Logging Information Disclosure",
"Content": "CVE ID : CVE-2025-43538
Published : Dec. 12, 2025, 9:15 p.m. | 52 minutes ago
Description : A logging issue was addressed with improved data redaction. This issue is fixed in macOS Sonoma 14.8.3. An app may be able to access sensitive user data.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-43539 - Apple macOS Processing File Memory Corruption Vulnerability",
"Content": "CVE ID : CVE-2025-43539
Published : Dec. 12, 2025, 9:15 p.m. | 52 minutes ago
Description : The issue was addressed with improved bounds checks. This issue is fixed in macOS Sonoma 14.8.3, macOS Sequoia 15.7.3. Processing a file may lead to memory corruption.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-43542 - Apple FaceTime Password Disclosure Vulnerability",
"Content": "CVE ID : CVE-2025-43542
Published : Dec. 12, 2025, 9:15 p.m. | 52 minutes ago
Description : This issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.7.3. Password fields may be unintentionally revealed when remotely controlling a device over FaceTime.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-46276 - Apple macOS App Sensitive User Data Disclosure",
"Content": "CVE ID : CVE-2025-46276
Published : Dec. 12, 2025, 9:15 p.m. | 52 minutes ago
Description : An information disclosure issue was addressed with improved privacy controls. This issue is fixed in macOS Sonoma 14.8.3, macOS Sequoia 15.7.3. An app may be able to access sensitive user data.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή