CVE tracker
274 subscribers
3.56K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-2098 - Fast CAD Reader Dylib Hijacking Vulnerability

CVE ID : CVE-2025-2098
Published : March 26, 2025, 4:15 p.m. | 1 hour, 43 minutes ago
Description : Fast CAD Reader application on MacOS was found to be installed with incorrect file permissions (rwxrwxrwx). This is inconsistent with standard macOS security practices, where applications should have drwxr-xr-x permissions. Incorrect permissions allow for Dylib Hijacking. Guest account, other users and applications can exploit this vulnerability for privilege escalation. This issue affects Fast CAD Reader in possibly all versions since the vendor has not responded to our messages. The tested version was 4.1.5
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-2783 - Google Chrome Mojo Sandbox Escape Vulnerability

CVE ID : CVE-2025-2783
Published : March 26, 2025, 4:15 p.m. | 1 hour, 43 minutes ago
Description : Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)
Severity: 8.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-2825 - CrushFTP Unauthenticated Remote Access Vulnerability

CVE ID : CVE-2025-2825
Published : March 26, 2025, 4:15 p.m. | 1 hour, 43 minutes ago
Description : CrushFTP versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0 are affected by a vulnerability that may result in unauthenticated access. Remote and unauthenticated HTTP requests to CrushFTP may allow attackers to gain unauthorized access.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-27609 - Icinga Web 2 Cross-Site Scripting (XSS)

CVE ID : CVE-2025-27609
Published : March 26, 2025, 5:15 p.m. | 43 minutes ago
Description : Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. A vulnerability in versions prior to 2.11.5 and 2.12.13 allows an attacker to craft a request that, once transmitted to a victim's Icinga Web, allows to embed arbitrary Javascript into it and to act on behalf of that user. This issue has been resolved in versions 2.11.5 and 2.12.3 of Icinga Web 2. As a workaround, those who have Icinga Web 2.12.2 may enable a content security policy in the application settings. Any modern browser with a working CORS implementation also sufficiently guards against the vulnerability.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-30164 - Icinga Web 2 Cross-Site Request Forgery (CSRF) Vulnerability

CVE ID : CVE-2025-30164
Published : March 26, 2025, 5:15 p.m. | 43 minutes ago
Description : Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. A vulnerability in versions prior to 2.11.5 and 2.12.13 vulnerability allows an attacker to craft a URL that, once visited by an authenticated user (or one that is able to authenticate), allows to manipulate the backend to redirect the user to any location. This issue has been resolved in versions 2.11.5 and 2.12.3 of Icinga Web 2. No known workarounds are available.
Severity: 4.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-30217 - Frappe SQL Injection Vulnerability

CVE ID : CVE-2025-30217
Published : March 26, 2025, 5:15 p.m. | 43 minutes ago
Description : Frappe is a full-stack web application framework. Prior to versions 14.93.2 and 15.55.0, a SQL Injection vulnerability has been identified in Frappe Framework which could allow a malicious actor to access sensitive information. Versions 14.93.2 and 15.55.0 contain a patch for the issue. No known workarounds are available.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-30225 - Directus S3 Storage Driver Asset Unavailability Denial of Service

CVE ID : CVE-2025-30225
Published : March 26, 2025, 5:15 p.m. | 43 minutes ago
Description : Directus is a real-time API and App dashboard for managing SQL database content. The `@directus/storage-driver-s3` package starting in version 9.22.0 and prior to version 12.0.1, corresponding to Directus starting in version 9.22.0 and prior to 11.5.0, is vulnerable to asset unavailability after a burst of malformed transformations. When making many malformed transformation requests at once, at some point, all assets are served as 403. This causes denial of assets for all policies of Directus, including Admin and Public. Version 12.0.1 of the `@directus/storage-driver-s3` package, corresponding to version 11.5.0 of Directus, fixes the issue.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-30350 - Directus S3 Storage Driver HEAD Flood Denial of Assets

CVE ID : CVE-2025-30350
Published : March 26, 2025, 5:15 p.m. | 43 minutes ago
Description : Directus is a real-time API and App dashboard for managing SQL database content. The `@directus/storage-driver-s3` package starting in version 9.22.0 and prior to version 12.0.1, corresponding to Directus starting in version 9.22.0 and prior to 11.5.0, is vulnerable to asset unavailability after a burst of HEAD requests. Some tools use Directus to sync content and assets, and some of those tools use the HEAD method to check the existence of files. When making many HEAD requests at once, at some point, all assets are eventually served as 403. This causes denial of assets for all policies of Directus, including Admin and Public. Version 12.0.1 of the `@directus/storage-driver-s3` package, corresponding to version 11.5.0 of Directus, fixes the issue.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-2562 - Devolutions Remote Desktop Manager Inadequate Logging in Autotyping Feature

CVE ID : CVE-2025-2562
Published : March 26, 2025, 6:15 p.m. | 3 hours, 43 minutes ago
Description : Insufficient logging in the autotyping feature in Devolutions Remote Desktop Manager on Windows allows an authenticated user to use a stored password without generating a corresponding log event, via the use of the autotyping functionality. This issue affects Remote Desktop Manager versions from 2025.1.24 through 2025.1.25, and all versions up to 2024.3.29.
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-2600 - Devolutions Remote Desktop Manager Authorization Bypass

CVE ID : CVE-2025-2600
Published : March 26, 2025, 6:15 p.m. | 3 hours, 43 minutes ago
Description : Improper authorization in the variable component in Devolutions Remote Desktop Manager on Windows allows an authenticated password to use the ELEVATED_PASSWORD variable even though not allowed by the "Allow password in variable policy". This issue affects Remote Desktop Manager versions from 2025.1.24 through 2025.1.25, and all versions up to 2024.3.29.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-30351 - Directus Session Token Abuse

CVE ID : CVE-2025-30351
Published : March 26, 2025, 6:15 p.m. | 3 hours, 43 minutes ago
Description : Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 10.10.0 and prior to version 11.5.0, a suspended user can use the token generated in session auth mode to access the API despite their status. This happens because there is a check missing in `verifySessionJWT` to verify that a user is actually still active and allowed to access the API. One can extract the session token obtained by, e.g. login in to the app while still active and then, after the user has been suspended continue to use that token until it expires. Version 11.5.0 patches the issue.
Severity: 3.5 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-30352 - Directus Unrestricted Field Enumerability

CVE ID : CVE-2025-30352
Published : March 26, 2025, 6:15 p.m. | 3 hours, 43 minutes ago
Description : Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.0.0-alpha.4 and prior to version 11.5.0, the `search` query parameter allows users with access to a collection to filter items based on fields they do not have permission to view. This allows the enumeration of unknown field contents. The searchable columns (numbers & strings) are not checked against permissions when injecting the `where` clauses for applying the search query. This leads to the possibility of enumerating those un-permitted fields. Version 11.5.0 fixes the issue.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-30353 - Directus Information Disclosure Vulnerability

CVE ID : CVE-2025-30353
Published : March 26, 2025, 6:15 p.m. | 3 hours, 43 minutes ago
Description : Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.12.0 and prior to version 11.5.0, when a Flow with the "Webhook" trigger and the "Data of Last Operation" response body encounters a ValidationError thrown by a failed condition operation, the API response includes sensitive data. This includes environmental variables, sensitive API keys, user accountability information, and operational data. This issue poses a significant security risk, as any unintended exposure of this data could lead to potential misuse. Version 11.5.0 fixes the issue.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-25535 - SCRIPT CASE HTTP Response Manipulation Privilege Escalation

CVE ID : CVE-2025-25535
Published : March 26, 2025, 7:15 p.m. | 2 hours, 43 minutes ago
Description : HTTP Response Manipulation in SCRIPT CASE v.1.0.002 Build7 allows a remote attacker to escalate privileges via a crafted request.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-26001 - Telesquare TLR-2005KSH Authentication Information Disclosure

CVE ID : CVE-2025-26001
Published : March 26, 2025, 7:15 p.m. | 2 hours, 43 minutes ago
Description : Telesquare TLR-2005KSH 1.1.4 is vulnerable to Information Disclosure via the parameter getUserNamePassword.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-26002 - Telesquare TLR-2005KSH Stack Overflow Vulnerability

CVE ID : CVE-2025-26002
Published : March 26, 2025, 7:15 p.m. | 2 hours, 43 minutes ago
Description : Telesquare TLR-2005KSH 1.1.4 is affected by an unauthorized stack overflow vulnerability when requesting the admin.cgi parameter with setSyncTimeHost.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-26003 - Telesquare TLR-2005KSH Command Injection Vulnerability

CVE ID : CVE-2025-26003
Published : March 26, 2025, 7:15 p.m. | 2 hours, 43 minutes ago
Description : Telesquare TLR-2005KSH 1.1.4 is affected by an unauthorized command execution vulnerability when requesting the admin.cgi parameter with setAutorest.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-26004 - Telesquare TLR-2005KSH Stack Buffer Overflow

CVE ID : CVE-2025-26004
Published : March 26, 2025, 7:15 p.m. | 2 hours, 43 minutes ago
Description : Telesquare TLR-2005KSH 1.1.4 is vulnerable to unauthorized stack buffer overflow vulnerability when requesting admin.cgi parameter with setDdns.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-29322 - ScriptCase XSS

CVE ID : CVE-2025-29322
Published : March 26, 2025, 7:15 p.m. | 2 hours, 43 minutes ago
Description : A cross-site scripting (XSS) vulnerability in ScriptCase before v1.0.003 - Build 3 allows attackers to execute arbitrary code via a crafted payload to the "Connection Name" in the New Connection and Rename Connection pages.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-55963 - Appsmith DoS: Unauthorized Server Restart

CVE ID : CVE-2024-55963
Published : March 26, 2025, 8:15 p.m. | 1 hour, 43 minutes ago
Description : An issue was discovered in Appsmith before 1.51. A user on Appsmith that doesn't have admin permissions can trigger the restart API on Appsmith, causing a server restart. This is still within the Appsmith container, and the impact is limited to Appsmith's own server only, but there is a denial of service because it can be continually restarted. This is due to incorrect access control checks, which should check for super user permissions on the incoming request.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-55964 - Appsmith PostgreSQL Command Execution Vulnerability

CVE ID : CVE-2024-55964
Published : March 26, 2025, 8:15 p.m. | 1 hour, 43 minutes ago
Description : An issue was discovered in Appsmith before 1.52. An incorrectly configured PostgreSQL instance in the Appsmith image leads to remote command execution inside the Appsmith Docker container. The attacker must be able to access Appsmith, login to it, create a datasource, create a query against that datasource, and execute that query.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...