CVE Monitor
3.54K subscribers
34.8K links
Download Telegram
{
"Source": "CVE FEED",
"Title": "CVE-2025-15094 - sunkaifei FlyCMS User Login UserController.java userLogin cross site scripting",
"Content": "CVE ID : CVE-2025-15094
Published : Dec. 26, 2025, 1:32 a.m. | 53 minutes ago
Description : A weakness has been identified in sunkaifei FlyCMS up to abbaa5a8daefb146ad4d61027035026b052cb414. The impacted element is the function userLogin of the file src/main/java/com/flycms/web/front/UserController.java of the component User Login. Executing manipulation of the argument redirectUrl can lead to cross site scripting. The attack can be launched remotely. The exploit has been made available to the public and could be exploited. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The project was informed of the problem early through an issue report but has not responded yet.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-68938 - Gitea Authorization Bypass Vulnerability",
"Content": "CVE ID : CVE-2025-68938
Published : Dec. 26, 2025, 1:19 a.m. | 1 hour, 5 minutes ago
Description : Gitea before 1.25.2 mishandles authorization for deletion of releases.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-15092 - UTT 进取 512W ConfigExceptMSN strcpy buffer overflow",
"Content": "CVE ID : CVE-2025-15092
Published : Dec. 26, 2025, 1:15 a.m. | 1 hour, 9 minutes ago
Description : A vulnerability was identified in UTT 进取 512W up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/ConfigExceptMSN. Such manipulation of the argument remark leads to buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-15093 - sunkaifei FlyCMS Admin Login IndexAdminController.java cross site scripting",
"Content": "CVE ID : CVE-2025-15093
Published : Dec. 26, 2025, 1:15 a.m. | 1 hour, 9 minutes ago
Description : A security flaw has been discovered in sunkaifei FlyCMS up to abbaa5a8daefb146ad4d61027035026b052cb414. The affected element is an unknown function of the file src/main/java/com/flycms/web/system/IndexAdminController.java of the component Admin Login. Performing manipulation of the argument redirectUrl results in cross site scripting. The attack can be initiated remotely. The exploit has been released to the public and may be exploited. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-15099 - simstudioai sim CRON Secret internal.ts improper authentication",
"Content": "CVE ID : CVE-2025-15099
Published : Dec. 26, 2025, 4:02 a.m. | 24 minutes ago
Description : A vulnerability was identified in simstudioai sim up to 0.5.27. This vulnerability affects unknown code of the file apps/sim/lib/auth/internal.ts of the component CRON Secret Handler. The manipulation of the argument INTERNAL_API_SECRET leads to improper authentication. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The identifier of the patch is e359dc2946b12ed5e45a0ec9c95ecf91bd18502a. Applying a patch is the recommended action to fix this issue.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-68945 - Gitea Project Information Disclosure Vulnerability",
"Content": "CVE ID : CVE-2025-68945
Published : Dec. 26, 2025, 3:58 a.m. | 27 minutes ago
Description : In Gitea before 1.21.2, an anonymous user can visit a private user's project.
Severity: 5.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-68944 - Gitea Token Scope Mishandle Vulnerability",
"Content": "CVE ID : CVE-2025-68944
Published : Dec. 26, 2025, 3:37 a.m. | 49 minutes ago
Description : Gitea before 1.22.2 sometimes mishandles the propagation of token scope for access control within one of its own package registries.
Severity: 5.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-68943 - Gitea Information Disclosure Vulnerability",
"Content": "CVE ID : CVE-2025-68943
Published : Dec. 26, 2025, 3:19 a.m. | 1 hour, 6 minutes ago
Description : Gitea before 1.21.8 inadvertently discloses users' login times by allowing (for example) the lastlogintime explore/users sort order.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-68942 - Gitea Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-68942
Published : Dec. 26, 2025, 3:15 a.m. | 1 hour, 10 minutes ago
Description : Gitea before 1.22.2 allows XSS because the search input box (for creating tags and branches) is v-html instead of v-text.
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-15095 - postmanlabs httpbin core.py cross site scripting",
"Content": "CVE ID : CVE-2025-15095
Published : Dec. 26, 2025, 3:15 a.m. | 1 hour, 10 minutes ago
Description : A security vulnerability has been detected in postmanlabs httpbin up to 0.6.1. This affects an unknown function of the file httpbin-master/httpbin/core.py. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-15097 - Alteryx Server status improper authentication",
"Content": "CVE ID : CVE-2025-15097
Published : Dec. 26, 2025, 3:15 a.m. | 1 hour, 10 minutes ago
Description : A vulnerability was found in Alteryx Server. Affected by this issue is some unknown functionality of the file /gallery/api/status/. Performing manipulation results in improper authentication. The attack is possible to be carried out remotely. The exploit has been made public and could be used. Upgrading to version 2023.1.1.13.486, 2023.2.1.10.293, 2024.1.1.9.236, 2024.2.1.6.125 and 2025.1.1.1.31 can resolve this issue. Upgrading the affected component is recommended.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-15098 - YunaiV yudao-cloud Business Process Management BpmSyncHttpRequestTrigger server-side request forgery",
"Content": "CVE ID : CVE-2025-15098
Published : Dec. 26, 2025, 3:15 a.m. | 1 hour, 10 minutes ago
Description : A vulnerability was determined in YunaiV yudao-cloud up to 2025.11. This affects the function BpmHttpCallbackTrigger/BpmSyncHttpRequestTrigger of the component Business Process Management. Executing manipulation of the argument url/header/body can lead to server-side request forgery. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-68939 - Gitea File Extension Bypass Vulnerability",
"Content": "CVE ID : CVE-2025-68939
Published : Dec. 26, 2025, 3:15 a.m. | 1 hour, 10 minutes ago
Description : Gitea before 1.23.0 allows attackers to add attachments with forbidden file extensions by editing an attachment name via an attachment API.
Severity: 8.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-68940 - Gitea Branch Deletion Permission Bypass Vulnerability",
"Content": "CVE ID : CVE-2025-68940
Published : Dec. 26, 2025, 3:15 a.m. | 1 hour, 10 minutes ago
Description : In Gitea before 1.22.5, branch deletion permissions are not adequately enforced after merging a pull request.
Severity: 3.1 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-68941 - Gitea Privilege Escalation Vulnerability",
"Content": "CVE ID : CVE-2025-68941
Published : Dec. 26, 2025, 3:15 a.m. | 1 hour, 10 minutes ago
Description : Gitea before 1.22.3 mishandles access to a private resource upon receiving an API token with scope limited to public resources.
Severity: 4.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-62578 - DVP-12SE - Modbus/TCP Cleartext Transmission of Sensitive Information",
"Content": "CVE ID : CVE-2025-62578
Published : Dec. 26, 2025, 6:05 a.m. | 21 minutes ago
Description : DVP-12SE - Modbus/TCP Cleartext Transmission of Sensitive Information
Severity: 7.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-8075 - Improper Input Validation",
"Content": "CVE ID : CVE-2025-8075
Published : Dec. 26, 2025, 5:16 a.m. | 1 hour, 10 minutes ago
Description : Cybersecurity Nozomi Networks Labs, a specialized security company focused on Industrial Control Systems (ICS) and OT/IoT security, has discovered that validation of incoming XML format request messages is inadequate. This vulnerability could allow an attacker to XSS on the user's browser. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.
Severity: 5.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-52599 - Inadequate account permissions management",
"Content": "CVE ID : CVE-2025-52599
Published : Dec. 26, 2025, 5:16 a.m. | 1 hour, 10 minutes ago
Description : Cybersecurity Nozomi Networks Labs, a specialized security company focused on Industrial Control Systems (ICS) and OT/IoT security, has discovered Inadequate of permission management for camera guest account. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-52600 - Improper Input Validation",
"Content": "CVE ID : CVE-2025-52600
Published : Dec. 26, 2025, 5:16 a.m. | 1 hour, 10 minutes ago
Description : Cybersecurity Nozomi Networks Labs, a specialized security company focused on Industrial Control Systems (ICS) and OT/IoT security, has discovered a vulnerability in camera video analytics that Improper input validation. This vulnerability could allow an attacker to execute specific commands on the user's host PC.The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.
Severity: 5.2 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-52601 - Hardcoding sensitive information",
"Content": "CVE ID : CVE-2025-52601
Published : Dec. 26, 2025, 5:16 a.m. | 1 hour, 10 minutes ago
Description : Cybersecurity Nozomi Networks Labs, a specialized security company focused on Industrial Control Systems (ICS) and OT/IoT security, has discovered a vulnerability in Device Manager that a hardcoded encryption key for sensitive information. An attacker can use key to decrypt sensitive information. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-68946 - Gitea JavaScript URL Scheme XSS Vulnerability",
"Content": "CVE ID : CVE-2025-68946
Published : Dec. 26, 2025, 5:16 a.m. | 1 hour, 10 minutes ago
Description : In Gitea before 1.20.1, a forbidden URL scheme such as javascript: can be used for a link, aka XSS.
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "26 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή