CVE tracker
232 subscribers
3.14K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-5305 - Password Reset with Code < 0.0.17 - Insecure Password Reset Code Creation

CVE ID : CVE-2025-5305
Published : Sept. 18, 2025, 6:15 a.m. | 2 hours, 48 minutes ago
Description : The Password Reset with Code for WordPress REST API WordPress plugin before 0.0.17 does not use cryptographically sound algorithms to generate OTP codes, potentially leading to account takeovers.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-8942 - WP Hotel Booking < 2.2.3 - Subscriber+ Rating Manipulation

CVE ID : CVE-2025-8942
Published : Sept. 18, 2025, 6:15 a.m. | 2 hours, 48 minutes ago
Description : The WP Hotel Booking WordPress plugin before 2.2.3 lacks proper server-side validation for review ratings, allowing an attacker to manipulate the rating value (e.g., sending negative or out-of-range values) by intercepting and modifying requests.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-9083 - Ninja-forms < 3.11.1 - Unauthenticated PHP Objection

CVE ID : CVE-2025-9083
Published : Sept. 18, 2025, 6:15 a.m. | 2 hours, 48 minutes ago
Description : The Ninja Forms WordPress plugin before 3.11.1 unserializes user input via form field, which could allow Unauthenticated users to perform PHP Object Injection when a suitable gadget is present on the blog.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-10493 - Chained Quiz <= 1.3.5 - Unauthenticated Insecure Direct Object Reference via Cookie

CVE ID : CVE-2025-10493
Published : Sept. 18, 2025, 7:15 a.m. | 1 hour, 47 minutes ago
Description : The Chained Quiz plugin for WordPress is vulnerable to Insecure Direct Object Reference in version 1.3.4 and below via the quiz submission and completion mechanisms due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to hijack and modify other users' quiz attempts by manipulating the chained_completion_id cookie value, allowing them to alter quiz answers, scores, and results of any user. The vulnerability was partially patched in versions 1.3.4 and 1.3.5.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-6237 - Path Traversal and Arbitrary File Deletion in invoke-ai/invokeai

CVE ID : CVE-2025-6237
Published : Sept. 18, 2025, 8:34 a.m. | 29 minutes ago
Description : A vulnerability in invokeai version v6.0.0a1 and below allows attackers to perform path traversal and arbitrary file deletion via the GET /api/v1/images/download/{bulk_download_item_name} endpoint. By manipulating the filename arguments, attackers can read and delete any files on the server, including critical system files such as SSH keys, databases, and configuration files. This vulnerability results in high confidentiality, integrity, and availability impacts.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-0547 - XSS in Mikrogrup's Bizmu

CVE ID : CVE-2025-0547
Published : Sept. 18, 2025, 8:59 a.m. | 4 minutes ago
Description : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Paraşüt Software Bizmu allows Cross-Site Scripting (XSS).This issue affects Bizmu: from 2.27.0 through 20250212.
Severity: 4.7 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-30187 - Denial of service via crafted DoH exchange in PowerDNS DNSdist

CVE ID : CVE-2025-30187
Published : Sept. 18, 2025, 10:15 a.m. | 2 hours, 48 minutes ago
Description : In some circumstances, when DNSdist is configured to use the nghttp2 library to process incoming DNS over HTTPS queries, an attacker might be able to cause a denial of service by crafting a DoH exchange that triggers an unbounded I/O read loop, causing an unexpected consumption of CPU resources.
Severity: 3.7 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-8565 - Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages <= 3.4.3 - Missing Authorization to Authenticated (Contributor+) Arbitrary Plugin Installation

CVE ID : CVE-2025-8565
Published : Sept. 18, 2025, 10:15 a.m. | 2 hours, 48 minutes ago
Description : The Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages plugin for WordPress is vulnerable to unauthorized access of functionality due to a missing capability check on the wplp_gdpr_install_plugin_ajax_handler() function in all versions up to, and including, 3.4.3. This makes it possible for authenticated attackers, with Contributor-level access and above, to install arbitrary repository plugins.
Severity: 8.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-9992 - Ghost Kit <= 3.4.3 - Authenticated (Contributor+) Stored Cross-Site Scripting

CVE ID : CVE-2025-9992
Published : Sept. 18, 2025, 10:15 a.m. | 2 hours, 48 minutes ago
Description : The Ghost Kit – Page Builder Blocks, Motion Effects & Extensions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the custom JS field in all versions up to, and including, 3.4.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-10662 - SeaCMS admin_members.php sql injection

CVE ID : CVE-2025-10662
Published : Sept. 18, 2025, 11:15 a.m. | 1 hour, 48 minutes ago
Description : A vulnerability has been found in SeaCMS up to 13.3. The impacted element is an unknown function of the file /admin_members.php?ac=editsave. Such manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This affects another injection point than CVE-2025-25513.
Severity: 5.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-10663 - PHPGurukul Online Course Registration my-profile.php sql injection

CVE ID : CVE-2025-10663
Published : Sept. 18, 2025, 11:15 a.m. | 1 hour, 48 minutes ago
Description : A vulnerability was found in PHPGurukul Online Course Registration 3.1. This affects an unknown function of the file /my-profile.php. Performing manipulation of the argument cgpa results in sql injection. The attack may be initiated remotely. The exploit has been made public and could be used.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-13151 - SQLi in Logo Software's Retail Sales Management

CVE ID : CVE-2024-13151
Published : Sept. 18, 2025, 12:15 p.m. | 48 minutes ago
Description : Authorization Bypass Through User-Controlled SQL Primary Key, CWE - 89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Logo Software Retail Sales Management allows SQL Injection, CAPEC - 7 - Blind SQL Injection.This issue affects Retail Sales Management: through 20250918.  NOTE: The vendor did not inform about the completion of the fixing process within the specified time. The CVE will be updated when new information becomes available.
Severity: 10.0 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-25011 - Ericsson Catalog Manager and Ericsson Order Care - Exposure of Sensitive Information Vulnerability

CVE ID : CVE-2024-25011
Published : Sept. 18, 2025, 12:15 p.m. | 48 minutes ago
Description : Ericsson Catalog Manager and Ericsson Order Care APIs do not have authentication enabled by default. Authentication checks can be configured to remediate the information disclosure issue.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-48851 - Remote Code Execution

CVE ID : CVE-2024-48851
Published : Sept. 18, 2025, 12:15 p.m. | 48 minutes ago
Description : Improper Validation of Specified Type of Input vulnerability in ABB FLXEON.A remote code execution is possible due to an improper input validation. This issue affects FLXEON: through 9.3.5.
Severity: 8.9 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-10207 - Authenticated File Disclosure/Delete

CVE ID : CVE-2025-10207
Published : Sept. 18, 2025, 12:15 p.m. | 48 minutes ago
Description : Improper Validation of Specified Type of Input vulnerability in ABB FLXEON.This issue affects FLXEON: through 9.3.5.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-10664 - PHPGurukul Small CRM create-ticket.php sql injection

CVE ID : CVE-2025-10664
Published : Sept. 18, 2025, 12:15 p.m. | 48 minutes ago
Description : A vulnerability was determined in PHPGurukul Small CRM 4.0. This impacts an unknown function of the file /create-ticket.php. Executing manipulation of the argument subject can lead to sql injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-10665 - kidaze CourseSelectionSystem COUNT3s3.php sql injection

CVE ID : CVE-2025-10665
Published : Sept. 18, 2025, 12:15 p.m. | 48 minutes ago
Description : A vulnerability was identified in kidaze CourseSelectionSystem up to 42cd892b40a18d50bd4ed1905fa89f939173a464. Affected is an unknown function of the file /Profilers/PProfile/COUNT3s3.php. The manipulation of the argument csem leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-40677 - SQL injection vulnerability in Summar Software´s Portal del Empleado

CVE ID : CVE-2025-40677
Published : Sept. 18, 2025, 12:15 p.m. | 48 minutes ago
Description : SQL injection vulnerability in Summar Software´s Portal del Empleado. This vulnerability allows an attacker to retrieve, create, update, and delete the database by sending a POST request using the parameter “ctl00$ContentPlaceHolder1$filtroNombre” in “/MemberPages/quienesquien.aspx”.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-40678 - Unrestricted upload vulnerability for dangerous file types on Summar Software´s Portal del Empleado

CVE ID : CVE-2025-40678
Published : Sept. 18, 2025, 12:15 p.m. | 48 minutes ago
Description : Unrestricted upload vulnerability for dangerous file types on Summar Software´s Portal del Empleado. This vulnerability allows an attacker to upload a dangerous file type by sending a POST request using the parameter “cctl00$ContentPlaceHolder1$fuAdjunto” in “/MemberPages/ntf_absentismo.aspx”.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2023-53431 - scsi: ses: Don't attach if enclosure has no components

CVE ID : CVE-2023-53431
Published : Sept. 18, 2025, 4:15 p.m. | 48 minutes ago
Description : In the Linux kernel, the following vulnerability has been resolved: scsi: ses: Don't attach if enclosure has no components An enclosure with no components can't usefully be operated by the driver (since effectively it has nothing to manage), so report the problem and don't attach. Not attaching also fixes an oops which could occur if the driver tries to manage a zero component enclosure. [mkp: Switched to KERN_WARNING since this scenario is common]
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2023-53432 - firewire: net: fix use after free in fwnet_finish_incoming_packet()

CVE ID : CVE-2023-53432
Published : Sept. 18, 2025, 4:15 p.m. | 48 minutes ago
Description : In the Linux kernel, the following vulnerability has been resolved: firewire: net: fix use after free in fwnet_finish_incoming_packet() The netif_rx() function frees the skb so we can't dereference it to save the skb->len.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...