CVE tracker
279 subscribers
3.61K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-9675 - Voice Changer App AndroidManifest.xml Component Export Vulnerability

CVE ID : CVE-2025-9675
Published : Aug. 29, 2025, 9:15 p.m. | 1 hour, 32 minutes ago
Description : A vulnerability was determined in Voice Changer App up to 1.1.0. This issue affects some unknown processing of the file AndroidManifest.xml of the component com.tuyangkeji.changevoice. Executing manipulation can lead to improper export of android application components. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-9676 - NCSOFT Universe App Android Application Component Export Vulnerability

CVE ID : CVE-2025-9676
Published : Aug. 29, 2025, 9:15 p.m. | 1 hour, 32 minutes ago
Description : A vulnerability was identified in NCSOFT Universe App up to 1.3.0. Impacted is an unknown function of the file AndroidManifest.xml of the component com.ncsoft.universeapp. The manipulation leads to improper export of android application components. Local access is required to approach this attack. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-9677 - Modo Legend of the Phoenix Android Application Component Export Vulnerability

CVE ID : CVE-2025-9677
Published : Aug. 29, 2025, 9:15 p.m. | 1 hour, 32 minutes ago
Description : A security flaw has been discovered in Modo Legend of the Phoenix up to 1.0.5. The affected element is an unknown function of the file AndroidManifest.xml of the component com.duige.hzw.multilingual. The manipulation results in improper export of android application components. The attack needs to be approached locally. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-55173 - Next.js Image Optimization File Download Content Injection Vulnerability

CVE ID : CVE-2025-55173
Published : Aug. 29, 2025, 10:15 p.m. | 32 minutes ago
Description : Next.js is a React framework for building full-stack web applications. In versions before 14.2.31 and from 15.0.0 to before 15.4.5, Next.js Image Optimization is vulnerable to content injection. The issue allowed attacker-controlled external image sources to trigger file downloads with arbitrary content and filenames under specific configurations. This behavior could be abused for phishing or malicious file delivery. This vulnerability has been fixed in Next.js versions 14.2.31 and 15.4.5.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-57752 - Next.js Image Optimization API Cache Key Confusion Vulnerability

CVE ID : CVE-2025-57752
Published : Aug. 29, 2025, 10:15 p.m. | 32 minutes ago
Description : Next.js is a React framework for building full-stack web applications. In versions before 14.2.31 and from 15.0.0 to before 15.4.5, Next.js Image Optimization API routes are affected by cache key confusion. When images returned from API routes vary based on request headers (such as Cookie or Authorization), these responses could be incorrectly cached and served to unauthorized users due to a cache key confusion bug. This vulnerability has been fixed in Next.js versions 14.2.31 and 15.4.5. All users are encouraged to upgrade if they use API routes to serve images that depend on request headers and have image optimization enabled.
Severity: 6.2 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-57822 - Next.js SSRF Vulnerability

CVE ID : CVE-2025-57822
Published : Aug. 29, 2025, 10:15 p.m. | 32 minutes ago
Description : Next.js is a React framework for building full-stack web applications. Prior to versions 14.2.32 and 15.4.7, when next() was used without explicitly passing the request object, it could lead to SSRF in self-hosted applications that incorrectly forwarded user-supplied headers. This vulnerability has been fixed in Next.js versions 14.2.32 and 15.4.7. All users implementing custom middleware logic in self-hosted environments are strongly encouraged to upgrade and verify correct usage of the next() function.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-58068 - Eventlet HTTP Request Smuggling Vulnerability

CVE ID : CVE-2025-58068
Published : Aug. 29, 2025, 10:15 p.m. | 32 minutes ago
Description : Eventlet is a concurrent networking library for Python. Prior to version 0.40.3, the Eventlet WSGI parser is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer sections. This vulnerability could enable attackers to, bypass front-end security controls, launch targeted attacks against active site users, and poison web caches. This problem has been patched in Eventlet 0.40.3 by dropping trailers which is a breaking change if a backend behind eventlet.wsgi proxy requires trailers. A workaround involves not using eventlet.wsgi facing untrusted clients.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-58156 - Centurion ERP Information Disclosure Vulnerability

CVE ID : CVE-2025-58156
Published : Aug. 29, 2025, 10:15 p.m. | 32 minutes ago
Description : Centurion ERP is an ERP with a focus on ITSM and automation. In versions starting from 1.12.0 to before 1.21.0, an authenticated user can view all authentication token details within the database. This includes the actual token, although only the hashed token. This does not include any un-hashed authentication token as viewable. This issue has been patched in version 1.21.0. A workaround for this is not deemed viable as it would involve disabling token authentication. Users are encouraged to remove any authentication token that was created by one of the effected versions of Centurion ERP. Webmasters can ensure this occurs by removing all authentication tokens from the database.
Severity: 1.9 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-58157 - Gnark Fake-GLV Algorithm Denial of Service Vulnerability

CVE ID : CVE-2025-58157
Published : Aug. 29, 2025, 10:15 p.m. | 32 minutes ago
Description : gnark is a zero-knowledge proof system framework. In version 0.12.0, there is a potential denial of service vulnerability when computing scalar multiplication is using the fake-GLV algorithm. This is because the algorithm didn't converge quickly enough for some of the inputs. This issue has been patched in version 0.13.0.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-58160 - Tracing-Subscriber ANSI Escape Sequence Injection

CVE ID : CVE-2025-58160
Published : Aug. 29, 2025, 10:15 p.m. | 32 minutes ago
Description : tracing is a framework for instrumenting Rust programs to collect structured, event-based diagnostic information. Prior to version 0.3.20, tracing-subscriber was vulnerable to ANSI escape sequence injection attacks. Untrusted user input containing ANSI escape sequences could be injected into terminal output when logged, potentially allowing attackers to manipulate terminal title bars, clear screens or modify terminal display, and potentially mislead users through terminal manipulation. tracing-subscriber version 0.3.20 fixes this vulnerability by escaping ANSI control characters when writing events to destinations that may be printed to the terminal. A workaround involves avoiding printing logs to terminal emulators without escaping ANSI control sequences.
Severity: 2.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-9678 - Campcodes Online Loan Management System SQL Injection Vulnerability

CVE ID : CVE-2025-9678
Published : Aug. 29, 2025, 10:15 p.m. | 32 minutes ago
Description : A weakness has been identified in Campcodes Online Loan Management System 1.0. The impacted element is an unknown function of the file /ajax.php?action=delete_borrower. This manipulation of the argument ID causes sql injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-58159 - WeGIA Web Manager Remote Code Execution Vulnerability

CVE ID : CVE-2025-58159
Published : Aug. 29, 2025, 11:15 p.m. | 3 hours, 32 minutes ago
Description : WeGIA is a Web manager for charitable institutions. Prior to version 3.4.11, a remote code execution vulnerability was identified, caused by improper validation of uploaded files. The application allows an attacker to upload files with arbitrary filenames, including those with a .php extension. Because the uploaded file is written directly to disk without adequate sanitization or extension restrictions, a spreadsheet file followed by PHP code can be uploaded and executed on the server, leading to arbitrary code execution. This is due to insufficient mitigation of CVE-2025-22133. This issue has been patched in version 3.4.11.
Severity: 9.9 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-34164 - NetSupport Manager Heap-Based Buffer Overflow Vulnerability

CVE ID : CVE-2025-34164
Published : Aug. 30, 2025, 12:15 a.m. | 2 hours, 32 minutes ago
Description : A heap-based buffer overflow vulnerability in NetSupport Manager 14.x versions prior to 14.12.0000 allows a remote, unauthenticated attacker to cause a denial of service (DoS) or potentially result in arbitrary code execution.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-34165 - NetSupport Manager Denial of Service and Information Leak Buffer Overflow

CVE ID : CVE-2025-34165
Published : Aug. 30, 2025, 12:15 a.m. | 2 hours, 32 minutes ago
Description : A stack-based buffer overflow vulnerability in NetSupport Manager 14.x versions prior to 14.12.0000 allows a remote, unauthenticated attacker to cause a denial of service (DoS) or potentially leak a limited amount of memory.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-4956 - AA-Team Pro Bulk Watermark Plugin for WordPress Path Traversal Vulnerability

CVE ID : CVE-2025-4956
Published : Aug. 30, 2025, 2:15 a.m. | 4 hours, 33 minutes ago
Description : Path Traversal: '.../...//' vulnerability in AA-Team Pro Bulk Watermark Plugin for WordPress allows Path Traversal.This issue affects Pro Bulk Watermark Plugin for WordPress: from n/a through 2.0.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-9618 - WordPress Related Posts Lite CSRF

CVE ID : CVE-2025-9618
Published : Aug. 30, 2025, 2:15 a.m. | 4 hours, 33 minutes ago
Description : The Related Posts Lite plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.12. This is due to missing or incorrect nonce validation on the settings update functionality. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-54942 - SUNNET Corporate Training Management System Authentication Bypass

CVE ID : CVE-2025-54942
Published : Aug. 30, 2025, 4:15 a.m. | 4 hours, 33 minutes ago
Description : A missing authentication for critical function vulnerability in SUNNET Corporate Training Management System before 10.11 allows remote attackers to access deployment functionality without prior authentication.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-54943 - SUNNET Corporate Training Management System Authentication Bypass

CVE ID : CVE-2025-54943
Published : Aug. 30, 2025, 4:15 a.m. | 4 hours, 33 minutes ago
Description : A missing authorization vulnerability in SUNNET Corporate Training Management System before 10.11 allows remote attackers to perform unauthorized application deployment due to the absence of proper access control checks.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-54944 - SUNNET Corporate Training Management System File Upload Code Execution Vulnerability

CVE ID : CVE-2025-54944
Published : Aug. 30, 2025, 4:15 a.m. | 4 hours, 33 minutes ago
Description : An unrestricted upload of file with dangerous type vulnerability in SUNNET Corporate Training Management System before 10.11 allows remote attackers to write malicious code in a specific file, which may lead to arbitrary code execution.
Severity: 6.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-54945 - SUNNET Corporate Training Management System Command Injection Vulnerability

CVE ID : CVE-2025-54945
Published : Aug. 30, 2025, 4:15 a.m. | 4 hours, 33 minutes ago
Description : An external control of file name or path vulnerability in SUNNET Corporate Training Management System before 10.11 allows remote attackers to execute arbitrary system commands via a malicious file by controlling the destination file path.
Severity: 10.0 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-54946 - SUNNET Corporate Training Management System SQL Injection Vulnerability

CVE ID : CVE-2025-54946
Published : Aug. 30, 2025, 4:15 a.m. | 4 hours, 33 minutes ago
Description : A SQL injection vulnerability in SUNNET Corporate Training Management System before 10.11 allows remote attackers to execute arbitrary SQL commands.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...