CVE tracker
303 subscribers
4.3K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-59144 - debug@4.4.2 contains malware after npm account takeover

CVE ID : CVE-2025-59144
Published : Sept. 15, 2025, 8:15 p.m. | 43 minutes ago
Description : debug is a JavaScript debugging utility. On 8 September 2025, the npm publishing account for debug was taken over after a phishing attack. Version 4.4.2 was published, functionally identical to the previous patch version, but with a malware payload added attempting to redirect cryptocurrency transactions to the attacker's own addresses from within browser environments. Local environments, server environments, command line applications, etc. are not affected. If the package was used in a browser context (e.g. a direct
CVE-2025-59154 - Openfire allows potential identity spoofing via unsafe CN parsing

CVE ID : CVE-2025-59154
Published : Sept. 15, 2025, 8:15 p.m. | 43 minutes ago
Description : Openfire is an XMPP server licensed under the Open Source Apache License. Openfire’s SASL EXTERNAL mechanism for client TLS authentication contains a vulnerability in how it extracts user identities from X.509 certificates. Instead of parsing the structured ASN.1 data, the code calls X509Certificate.getSubjectDN().getName() and applies a regex to look for CN=. This method produces a provider-dependent string that does not escape special characters. In SunJSSE (sun.security.x509.X500Name), for example, commas and equals signs inside attribute values are not escaped. As a result, a malicious certificate can embed CN= inside another attribute value (e.g. OU="CN=admin,"). The regex will incorrectly interpret this as a legitimate Common Name and extract admin. If SASL EXTERNAL is enabled and configured to map CNs to user accounts, this allows the attacker to impersonate another user. The fix is included in Openfire 5.0.2 and 5.1.0.
Severity: 5.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59162 - color-convert@3.1.1 contains malware after npm account takeover

CVE ID : CVE-2025-59162
Published : Sept. 15, 2025, 8:15 p.m. | 43 minutes ago
Description : color-convert provides plain color conversion functions in JavaScript. On 8 September 2025, the npm publishing account for color-convert was taken over after a phishing attack. Version 3.1.1 was published, functionally identical to the previous patch version, but with a malware payload added attempting to redirect cryptocurrency transactions to the attacker's own addresses from within browser environments. Local environments, server environments, command line applications, etc. are not affected. If the package was used in a browser context (e.g. a direct
CVE-2025-59330 - error-ex@1.3.3 contains malware after npm account takeover

CVE ID : CVE-2025-59330
Published : Sept. 15, 2025, 8:15 p.m. | 43 minutes ago
Description : error-ex allows error subclassing and stack customization. On 8 September 2025, an npm publishing account for error-ex was taken over after a phishing attack. Version 1.3.3 was published, functionally identical to the previous patch version, but with a malware payload added attempting to redirect cryptocurrency transactions to the attacker's own addresses from within browser environments. Local environments, server environments, command line applications, etc. are not affected. If the package was used in a browser context (e.g. a direct
CVE-2025-59331 - is-arrayish@0.3.3 contains malware after npm account takeover

CVE ID : CVE-2025-59331
Published : Sept. 15, 2025, 8:15 p.m. | 43 minutes ago
Description : is-arrayish checks if an object can be used like an Array. On 8 September 2025, an npm publishing account for is-arrayish was taken over after a phishing attack. Version 0.3.3 was published, functionally identical to the previous patch version, but with a malware payload added attempting to redirect cryptocurrency transactions to the attacker's own addresses from within browser environments. Local environments, server environments, command line applications, etc. are not affected. If the package was used in a browser context (e.g. a direct
CVE-2025-59332 - 3DAlloy allows stored XSS through attributes provided to the 3d parser tag/function

CVE ID : CVE-2025-59332
Published : Sept. 15, 2025, 8:15 p.m. | 43 minutes ago
Description : 3DAlloy is a lightWeight 3D-viewer for MediaWiki. From 1.0 through 1.8, the <3d> parser tag and the {{#3d}} parser function allow users to provide custom attributes that are then appended to the canvas HTML element that is being output by the extension. The attributes are not sanitized, which means that arbitrary JavaScript can be inserted and executed.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-43799 - Liferay Portal Unauthenticated API Access Vulnerability

CVE ID : CVE-2025-43799
Published : Sept. 15, 2025, 8:19 p.m. | 39 minutes ago
Description : Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92 and 7.3 GA through update 35, and older unsupported versions does not limit access to APIs before a user has changed their initial password, which allows remote users to access and edit content via the API.
Severity: 6.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-10477 - kidaze CourseSelectionSystem eligibility.php sql injection

CVE ID : CVE-2025-10477
Published : Sept. 15, 2025, 8:32 p.m. | 26 minutes ago
Description : A vulnerability was identified in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. The affected element is an unknown function of the file /Profilers/PriProfile/eligibility.php. Such manipulation of the argument Branch leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59145 - color-name@2.0.1 contains malware after npm account takeover

CVE ID : CVE-2025-59145
Published : Sept. 15, 2025, 8:32 p.m. | 26 minutes ago
Description : color-name is a JSON with CSS color names. On 8 September 2025, an npm publishing account for color-name was taken over after a phishing attack. Version 2.0.1 was published, functionally identical to the previous patch version, but with a malware payload added attempting to redirect cryptocurrency transactions to the attacker's own addresses from within browser environments. Local environments, server environments, command line applications, etc. are not affected. If the package was used in a browser context (e.g. a direct
CVE-2025-43337 - Apple macOS Tahoe Sandbox Escalation

CVE ID : CVE-2025-43337
Published : Sept. 15, 2025, 11:15 p.m. | 1 hour, 43 minutes ago
Description : An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Tahoe 26. An app may be able to access sensitive user data.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-43340 - Apple macOS Tahoe Sandbox Escalation

CVE ID : CVE-2025-43340
Published : Sept. 15, 2025, 11:15 p.m. | 1 hour, 43 minutes ago
Description : A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Tahoe 26. An app may be able to break out of its sandbox.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-43341 - MacOS Root Privilege Escalation Vulnerability

CVE ID : CVE-2025-43341
Published : Sept. 15, 2025, 11:15 p.m. | 1 hour, 43 minutes ago
Description : A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to gain root privileges.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-43342 - Apple Safari Web Content Crash

CVE ID : CVE-2025-43342
Published : Sept. 15, 2025, 11:15 p.m. | 1 hour, 43 minutes ago
Description : A correctness issue was addressed with improved checks. This issue is fixed in tvOS 26, Safari 26, iOS 18.7 and iPadOS 18.7, visionOS 26, watchOS 26, macOS Tahoe 26, iOS 26 and iPadOS 26. Processing maliciously crafted web content may lead to an unexpected process crash.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-43343 - Apple Safari Web Content Processing Crash

CVE ID : CVE-2025-43343
Published : Sept. 15, 2025, 11:15 p.m. | 1 hour, 43 minutes ago
Description : The issue was addressed with improved memory handling. This issue is fixed in tvOS 26, Safari 26, visionOS 26, watchOS 26, macOS Tahoe 26, iOS 26 and iPadOS 26. Processing maliciously crafted web content may lead to an unexpected process crash.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-43344 - Apple tvOS/WatchOS/macOS/iOS/iPadOS Out-of-Bounds Access Vulnerability

CVE ID : CVE-2025-43344
Published : Sept. 15, 2025, 11:15 p.m. | 1 hour, 43 minutes ago
Description : An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in tvOS 26, watchOS 26, visionOS 26, macOS Tahoe 26, iOS 26 and iPadOS 26. An app may be able to cause unexpected system termination.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-43346 - Apple Media File Out-of-Bounds Access Vulnerability

CVE ID : CVE-2025-43346
Published : Sept. 15, 2025, 11:15 p.m. | 1 hour, 43 minutes ago
Description : An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in tvOS 26, watchOS 26, iOS 18.7 and iPadOS 18.7, visionOS 26, macOS Tahoe 26, iOS 26 and iPadOS 26. Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-43347 - Apple tvOS Validation Bypass

CVE ID : CVE-2025-43347
Published : Sept. 15, 2025, 11:15 p.m. | 1 hour, 43 minutes ago
Description : This issue was addressed by removing the vulnerable code. This issue is fixed in tvOS 26, watchOS 26, visionOS 26, macOS Tahoe 26, iOS 26 and iPadOS 26. An input validation issue was addressed.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-43349 - Apple Video File Processing Out-of-Bounds Write

CVE ID : CVE-2025-43349
Published : Sept. 15, 2025, 11:15 p.m. | 1 hour, 43 minutes ago
Description : An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in tvOS 26, macOS Sonoma 14.8, macOS Sequoia 15.7, iOS 18.7 and iPadOS 18.7, visionOS 26, watchOS 26, macOS Tahoe 26, iOS 26 and iPadOS 26. Processing a maliciously crafted video file may lead to unexpected app termination.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-43353 - Apple macOS Heap Corruption Vulnerability

CVE ID : CVE-2025-43353
Published : Sept. 15, 2025, 11:15 p.m. | 1 hour, 43 minutes ago
Description : The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. Processing a maliciously crafted string may lead to heap corruption.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-43354 - Apple tvOS/WatchOS/macOS/iOS/iPadOS Sensitive Data Exposure

CVE ID : CVE-2025-43354
Published : Sept. 15, 2025, 11:15 p.m. | 1 hour, 43 minutes ago
Description : A logging issue was addressed with improved data redaction. This issue is fixed in tvOS 26, watchOS 26, visionOS 26, macOS Tahoe 26, iOS 26 and iPadOS 26. An app may be able to access sensitive user data.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-43355 - Apple TVOS WatchOS Denial-of-Service Type Confusion

CVE ID : CVE-2025-43355
Published : Sept. 15, 2025, 11:15 p.m. | 1 hour, 43 minutes ago
Description : A type confusion issue was addressed with improved memory handling. This issue is fixed in tvOS 26, macOS Sonoma 14.8, macOS Sequoia 15.7, iOS 18.7 and iPadOS 18.7, visionOS 26, watchOS 26, macOS Tahoe 26, iOS 26 and iPadOS 26. An app may be able to cause a denial-of-service.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...