CVE tracker
280 subscribers
3.79K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-53121 - OpenMNS Horizon Stored XSS Vulnerability

CVE ID : CVE-2025-53121
Published : June 26, 2025, 7:15 p.m. | 1 hour, 2 minutes ago
Description : Multiple stored XSS were found on different nodes with unsanitized parameters in OpenMNS Horizon 33.0.8 and versions earlier than 33.1.6 on multiple platforms that allow an attacker to store on database and then inject HTML and/or Javascript on the page. The solution is to upgrade to Horizon 33.1.6, 33.1.7 or Meridian 2024.2.6, 2024.2.7 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet. OpenNMS thanks Fábio Tomé for reporting this issue.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2013-1424 - Matplotlib Buffer Overflow Vulnerability

CVE ID : CVE-2013-1424
Published : June 26, 2025, 8:15 p.m. | 4 hours, 2 minutes ago
Description : Buffer overflow vulnerability in matplotlib.This issue affects matplotlib: before upstream commit ba4016014cb4fb4927e36ce8ea429fed47dcb787.
Severity: 5.6 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-49592 - n8n Open Redirect Vulnerability

CVE ID : CVE-2025-49592
Published : June 26, 2025, 8:15 p.m. | 4 hours, 2 minutes ago
Description : n8n is a workflow automation platform. Versions prior to 1.98.0 have an Open Redirect vulnerability in the login flow. Authenticated users can be redirected to untrusted, attacker-controlled domains after logging in, by crafting malicious URLs with a misleading redirect query parameter. This may lead to phishing attacks by impersonating the n8n UI on lookalike domains (e.g., n8n.local.evil.com), credential or 2FA theft if users are tricked into re-entering sensitive information, and/or reputation risk due to the visual similarity between attacker-controlled domains and trusted ones. The vulnerability affects anyone hosting n8n and exposing the `/signin` endpoint to users. The issue has been patched in version 1.98.0. All users should upgrade to this version or later. The fix introduces strict origin validation for redirect URLs, ensuring only same-origin or relative paths are allowed after login.
Severity: 4.6 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-53122 - OpenNMS Horizon and Meridian SQL Injection Vulnerability

CVE ID : CVE-2025-53122
Published : June 26, 2025, 8:15 p.m. | 4 hours, 1 minute ago
Description : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in OpenNMS Horizon and Meridian applications allows SQL Injection.  Users should upgrade to Meridian 2024.2.6 or newer, or Horizon 33.16 or newer. Meridian and Horizon installation instructions state that they are intended for installation within an organization's private networks and should not be directly accessible from the Internet.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-5995 - Canon EOS Webcam Utility Pro MAC OS Directory Permissions Vulnerability

CVE ID : CVE-2025-5995
Published : June 26, 2025, 8:15 p.m. | 4 hours, 1 minute ago
Description : Canon EOS Webcam Utility Pro for MAC OS version 2.3d (2.3.29) and earlier contains an improper directory permissions vulnerability. Exploitation of this vulnerability requires administrator access by a malicious user. An attacker could modify the directory, potentially resulting in code execution and ultimately leading to privilege escalation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2013-1440 - CVE-2022-26237: Microsoft Windows DNS Server Remote Code Execution Vulnerability

CVE ID : CVE-2013-1440
Published : June 26, 2025, 9:15 p.m. | 3 hours, 2 minutes ago
Description : Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2014-0468 - FusionForge Apache Script Execution Vulnerability

CVE ID : CVE-2014-0468
Published : June 26, 2025, 9:15 p.m. | 3 hours, 2 minutes ago
Description : Vulnerability in fusionforge in the shipped Apache configuration, where the web server may execute scripts that the users would have uploaded in their raw SCM repositories (SVN, Git, Bzr...). This issue affects fusionforge: before 5.3+20140506.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2014-6274 - Git-Annex AWS S3 and Glacier Unencrypted Credentials Storage Vulnerability

CVE ID : CVE-2014-6274
Published : June 26, 2025, 9:15 p.m. | 3 hours, 2 minutes ago
Description : git-annex had a bug in the S3 and Glacier remotes where if embedcreds=yes was set, and the remote used encryption=pubkey or encryption=hybrid, the embedded AWS credentials were stored in the git repository in (effectively) plaintext, not encrypted as they were supposed to be. This issue affects git-annex: from 3.20121126 before 5.20140919.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2014-7210 - Debian pdns MySQL Privilege Escalation

CVE ID : CVE-2014-7210
Published : June 26, 2025, 9:15 p.m. | 3 hours, 2 minutes ago
Description : pdns specific as packaged in Debian in version before 3.3.1-1 creates a too privileged MySQL user. It was discovered that the maintainer scripts of pdns-backend-mysql grant too wide database permissions for the pdns user. Other backends are not affected.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52555 - Ceph File System Root Privilege Escalation

CVE ID : CVE-2025-52555
Published : June 26, 2025, 9:15 p.m. | 3 hours, 2 minutes ago
Description : Ceph is a distributed object, block, and file storage platform. In versions 17.2.7, 18.2.1 through 18.2.4, and 19.0.0 through 19.2.2, an unprivileged user can escalate to root privileges in a ceph-fuse mounted CephFS by chmod 777 a directory owned by root to gain access. The result of this is that a user could read, write and execute to any directory owned by root as long as they chmod 777 it. This impacts confidentiality, integrity, and availability. It is patched in versions 17.2.8, 18.2.5, and 19.2.3.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2015-0842 - Yubiserver SQL Injection Vulnerability

CVE ID : CVE-2015-0842
Published : June 26, 2025, 10:15 p.m. | 2 hours, 2 minutes ago
Description : yubiserver before 0.6 is prone to SQL injection issues, potentially leading to an authentication bypass.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2015-0843 - Yubiserver sprintf Buffer Overflow

CVE ID : CVE-2015-0843
Published : June 26, 2025, 10:15 p.m. | 2 hours, 2 minutes ago
Description : yubiserver before 0.6 is to buffer overflows due to misuse of sprintf.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2015-0849 - Pycode-Browser File Predictability Vulnerability

CVE ID : CVE-2015-0849
Published : June 26, 2025, 10:15 p.m. | 2 hours, 2 minutes ago
Description : pycode-browser before version 1.0 is prone to a predictable temporary file vulnerability.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-5731 - Infinispan CLI Plaintext Password Disclosure Vulnerability

CVE ID : CVE-2025-5731
Published : June 26, 2025, 10:15 p.m. | 2 hours, 2 minutes ago
Description : A flaw was found in Infinispan CLI. A sensitive password, decoded from a Base64-encoded Kubernetes secret, is processed in plaintext and included in a command string that may expose the data in an error message when a command is not found.
Severity: 6.2 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-6731 - "yzcheng90 X-SpringBoot Remote Path Traversal Vulnerability"

CVE ID : CVE-2025-6731
Published : June 26, 2025, 10:15 p.m. | 2 hours, 2 minutes ago
Description : A vulnerability was found in yzcheng90 X-SpringBoot up to 5.0 and classified as critical. Affected by this issue is the function uploadApk of the file /sys/oss/upload/apk of the component APK File Handler. The manipulation of the argument File leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-6732 - UTT HiPER 840G strcpy Buffer Overflow Remote Code Execution

CVE ID : CVE-2025-6732
Published : June 26, 2025, 10:15 p.m. | 2 hours, 2 minutes ago
Description : A vulnerability was found in UTT HiPER 840G up to 3.1.1-190328. It has been classified as critical. This affects the function strcpy of the file /goform/setSysAdm of the component API. The manipulation of the argument passwd1 leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-3699 - Mitsubishi Electric Corporation G-Series Missing Authentication Bypass Vulnerability

CVE ID : CVE-2025-3699
Published : June 26, 2025, 11:15 p.m. | 1 hour, 2 minutes ago
Description : Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation G-50 Version 3.37 and prior, G-50-W Version 3.37 and prior, G-50A Version 3.37 and prior, GB-50 Version 3.37 and prior, GB-50A Version 3.37 and prior, GB-24A Version 9.12 and prior, G-150AD Version 3.21 and prior, AG-150A-A Version 3.21 and prior, AG-150A-J Version 3.21 and prior, GB-50AD Version 3.21 and prior, GB-50ADA-A Version 3.21 and prior, GB-50ADA-J Version 3.21 and prior, EB-50GU-A Version 7.11 and prior, EB-50GU-J Version 7.11 and prior, AE-200J Version 8.01 and prior, AE-200A Version 8.01 and prior, AE-200E Version 8.01 and prior, AE-50J Version 8.01 and prior, AE-50A Version 8.01 and prior, AE-50E Version 8.01 and prior, EW-50J Version 8.01 and prior, EW-50A Version 8.01 and prior, EW-50E Version 8.01 and prior, TE-200A Version 8.01 and prior, TE-50A Version 8.01 and prior, TW-50A Version 8.01 and prior, and CMS-RMD-J Version 1.40 and prior allows a remote unauthenticated attacker to bypass authentication and then control the air conditioning systems illegally, or disclose information in them by exploiting this vulnerability. In addition, the attacker may tamper with firmware for them using the disclosed information.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-6733 - UTT HiPER 840G API Buffer Overflow Vulnerability

CVE ID : CVE-2025-6733
Published : June 26, 2025, 11:15 p.m. | 1 hour, 2 minutes ago
Description : A vulnerability was found in UTT HiPER 840G up to 3.1.1-190328. It has been declared as critical. This vulnerability affects the function sub_416928 of the file /goform/formConfigDnsFilterGlobal of the component API. The manipulation of the argument GroupName leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-6734 - UTT HiPER 840G API Buffer Overflow Vulnerability

CVE ID : CVE-2025-6734
Published : June 26, 2025, 11:15 p.m. | 1 hour, 2 minutes ago
Description : A vulnerability was found in UTT HiPER 840G up to 3.1.1-190328. It has been rated as critical. This issue affects the function sub_484E40 of the file /goform/formP2PLimitConfig of the component API. The manipulation of the argument except leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-6735 - Juzaweb CMS Remote Improper Authorization Vulnerability

CVE ID : CVE-2025-6735
Published : June 27, 2025, 12:15 a.m. | 4 hours, 1 minute ago
Description : A vulnerability classified as critical has been found in juzaweb CMS 3.4.2. Affected is an unknown function of the file /admin-cp/imports of the component Import Page. The manipulation leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-6736 - Juzaweb CMS Remote Authorization Bypass Vulnerability

CVE ID : CVE-2025-6736
Published : June 27, 2025, 12:15 a.m. | 4 hours, 1 minute ago
Description : A vulnerability classified as critical was found in juzaweb CMS 3.4.2. Affected by this vulnerability is an unknown functionality of the file /admin-cp/theme/install of the component Add New Themes Page. The manipulation leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...