CVE tracker
274 subscribers
3.5K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-2756 - "Assimp AC3D File Handler Heap-Based Buffer Overflow Vulnerability"

CVE ID : CVE-2025-2756
Published : March 25, 2025, 10:15 a.m. | 3 hours, 42 minutes ago
Description : A vulnerability classified as critical has been found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::AC3DImporter::ConvertObjectSection of the file code/AssetLib/AC/ACLoader.cpp of the component AC3D File Handler. The manipulation of the argument tmp leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-2757 - Assimp Heap-Based Buffer Overflow Vulnerability

CVE ID : CVE-2025-2757
Published : March 25, 2025, 10:15 a.m. | 3 hours, 42 minutes ago
Description : A vulnerability classified as critical was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function AI_MD5_PARSE_STRING_IN_QUOTATION of the file code/AssetLib/MD5/MD5Parser.cpp of the component MD5 File Handler. The manipulation of the argument data leads to heap-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-2109 - WordPress WP Compress SSRF

CVE ID : CVE-2025-2109
Published : March 25, 2025, 11:15 a.m. | 2 hours, 42 minutes ago
Description : The WP Compress – Instant Performance & Speed Optimization plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.30.15 via the init() function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query information from internal services.
Severity: 5.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2022-1804 - Apache Struts Unprivileged Configuration File Tampering

CVE ID : CVE-2022-1804
Published : March 25, 2025, 1:15 p.m. | 42 minutes ago
Description : accountsservice no longer drops permissions when writting .pam_environment
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-10037 - "RTU500 WebSocket Denial of Service Vulnerability"

CVE ID : CVE-2024-10037
Published : March 25, 2025, 1:15 p.m. | 42 minutes ago
Description : A vulnerability exists in the RTU500 web server component that can cause a denial of service to the RTU500 CMU application if a specially crafted message sequence is executed on a WebSocket connection. An attacker must be properly authenticated and the test mode function of RTU500 must be enabled to exploit this vulnerability. The affected CMU will automatically recover itself if an attacker successfully exploits this vulnerability.
Severity: 4.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-11499 - RTU500 IEC 60870-4-104 Certificate Update Restart Vulnerability

CVE ID : CVE-2024-11499
Published : March 25, 2025, 1:15 p.m. | 42 minutes ago
Description : A vulnerability exists in RTU500 IEC 60870-4-104 controlled station functionality, that allows an authenticated and authorized attacker to perform a CMU restart. The vulnerability can be triggered if certificates are updated while in use on active connections. The affected CMU will automatically recover itself if an attacker successfully exploits this vulnerability.
Severity: 4.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-12169 - "Cybersecure RTU500 CMU Restart Vulnerability"

CVE ID : CVE-2024-12169
Published : March 25, 2025, 1:15 p.m. | 42 minutes ago
Description : A vulnerability exists in RTU500 IEC 60870-5-104 controlled station functionality and IEC 61850 functionality, that allows an attacker performing a specific attack sequence to restart the affected CMU. This vulnerability only applies, if secure communication using IEC 62351-3 (TLS) is enabled.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-1445 - "RTU500 IEC61850 TLS Renegotiation Denial of Service"

CVE ID : CVE-2025-1445
Published : March 25, 2025, 1:15 p.m. | 42 minutes ago
Description : A vulnerability exists in RTU IEC 61850 client and server functionality that could impact the availability if renegotiation of an open IEC61850 TLS connection takes place in specific timing situations, when IEC61850 communication is active. Precondition is that IEC61850 as client or server are configured using TLS on RTU500 device. It affects the CMU the IEC61850 stack is configured on.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-27631 - "TRMTracker LDAP Injection Vulnerability"

CVE ID : CVE-2025-27631
Published : March 25, 2025, 1:15 p.m. | 42 minutes ago
Description : The TRMTracker web application is vulnerable to LDAP injection attack potentially allowing an attacker to inject code into a query and execute remote commands that can read and update data on the website.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-27632 - TRMTracker Host Header Injection Vulnerability

CVE ID : CVE-2025-27632
Published : March 25, 2025, 1:15 p.m. | 42 minutes ago
Description : A Host Header Injection vulnerability in TRMTracker application may allow an attacker by modifying the host header value in an HTTP request to leverage multiple attack vectors, including defacing the site content through web-cache poisoning.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-27633 - Apache TRMTracker Cross-site Scripting Vulnerability

CVE ID : CVE-2025-27633
Published : March 25, 2025, 1:15 p.m. | 42 minutes ago
Description : The TRMTracker web application is vulnerable to reflected Cross-site scripting attack. The application allows client-side code injection that might be used to compromise the confidentiality and integrity of the system.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-29932 - JetBrains GoLand XXE Vulnerability

CVE ID : CVE-2025-29932
Published : March 25, 2025, 1:15 p.m. | 42 minutes ago
Description : In JetBrains GoLand before 2025.1 an XXE during debugging was possible
Severity: 4.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-42533 - Convivance StandVoice SQL Injection

CVE ID : CVE-2024-42533
Published : March 25, 2025, 2:15 p.m. | 3 hours, 42 minutes ago
Description : SQL injection vulnerability in the authentication module in Convivance StandVoice 4.5 through 6.2 allows remote attackers to execute arbitrary code via the GEST_LOGIN parameter.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-22230 - VMware Tools for Windows Authentication Bypass Vulnerability

CVE ID : CVE-2025-22230
Published : March 25, 2025, 2:15 p.m. | 3 hours, 42 minutes ago
Description : VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control. A malicious actor with non-administrative privileges on a guest VM may gain ability to perform certain high privilege operations within that VM.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-29635 - D-Link DIR-823X Command Injection Vulnerability

CVE ID : CVE-2025-29635
Published : March 25, 2025, 2:15 p.m. | 3 hours, 42 minutes ago
Description : A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function, triggering remote command execution.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-30091 - MoxieManager Remote Code Execution Vulnerability

CVE ID : CVE-2025-30091
Published : March 25, 2025, 2:15 p.m. | 3 hours, 42 minutes ago
Description : In Tiny MoxieManager PHP before 4.0.0, remote code execution can occur in the installer command. This vulnerability allows unauthenticated attackers to inject and execute arbitrary code. Attacker-controlled data to InstallCommand can be inserted into config.php, and InstallCommand is available after an installation has completed.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-55604 - Appsmith Information Disclosure Vulnerability

CVE ID : CVE-2024-55604
Published : March 25, 2025, 3:15 p.m. | 2 hours, 42 minutes ago
Description : Appsmith is a platform to build admin panels, internal tools, and dashboards. Users invited as "App Viewer" should not have access to development information of a workspace. Datasources are such a component in a workspace. Yet, in versions of Appsmith prior to 1.51, app viewers are able to get a list of datasources in a workspace they're a member of. This information disclosure does NOT expose sensitive data in the datasources, such as database passwords and API Keys. The attacker needs to have been invited to a workspace as a "viewer", by someone in that workspace with access to invite. The attacker then needs to be able to signup/login to that Appsmith instance. The issue is patched in version 1.51. No known workarounds are available.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-26742 - GhozyLab Gallery for Social Photo Stored Cross-site Scripting Vulnerability

CVE ID : CVE-2025-26742
Published : March 25, 2025, 3:15 p.m. | 2 hours, 42 minutes ago
Description : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GhozyLab Gallery for Social Photo allows Stored XSS.This issue affects Gallery for Social Photo: from n/a through 1.0.0.35.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-27147 - GLPI Inventory Plugin Unauthenticated Remote Code Execution

CVE ID : CVE-2025-27147
Published : March 25, 2025, 3:15 p.m. | 2 hours, 42 minutes ago
Description : The GLPI Inventory Plugin handles various types of tasks for GLPI agents, including network discovery and inventory (SNMP), software deployment, VMWare ESX host remote inventory, and data collection (files, Windows registry, WMI). Versions prior to 1.5.0 have an improper access control vulnerability. Version 1.5.0 fixes the vulnerability.
Severity: 8.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-2530 - Luxion KeyShot DAE File Parsing Remote Code Execution Vulnerability

CVE ID : CVE-2025-2530
Published : March 25, 2025, 3:15 p.m. | 2 hours, 42 minutes ago
Description : Luxion KeyShot DAE File Parsing Access of Uninitialized Pointer Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of dae files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23698.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-2531 - Luxion KeyShot DAE File Parsing Heap-based Buffer Overflow Remote Code Execution

CVE ID : CVE-2025-2531
Published : March 25, 2025, 3:15 p.m. | 2 hours, 42 minutes ago
Description : Luxion KeyShot DAE File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of dae files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23704.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...