CVE tracker
242 subscribers
3.23K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-61600 - Unbounded Memory Allocation in Stalwart IMAP parser

CVE ID : CVE-2025-61600
Published : Oct. 2, 2025, 10:15 p.m. | 1 hour, 10 minutes ago
Description : Stalwart is a mail and collaboration server. Versions 0.13.3 and below contain an unbounded memory allocation vulnerability in the IMAP protocol parser which allows remote attackers to exhaust server memory, potentially triggering the system's out-of-memory (OOM) killer and causing a denial of service. The CommandParser implementation enforces size limits on its dynamic buffer in most parsing states, but several state handlers omit these validation checks. This issue is fixed in version 0.13.4. A workaround for this issue is to implement rate limiting and connection monitoring at the network level, however this does not provide complete protection.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-61666 - Traccar Unauthenticated Local File Inclusion on Windows - Leakage of Traccar Config File

CVE ID : CVE-2025-61666
Published : Oct. 2, 2025, 10:15 p.m. | 1 hour, 10 minutes ago
Description : Traccar is an open source GPS tracking system. Default installs of Traccar on Windows between versions 6.1- 6.8.1 and non default installs between versions 5.8 - 6.0 are vulnerable to unauthenticated local file inclusion attacks which can lead to leakage of passwords or any file on the file system including the Traccar configuration file. Versions 5.8 - 6.0 are only vulnerable if ./override is set in the configuration file. Versions 6.1 - 6.8.1 are vulnerable by default as the web override is enabled by default. The vulnerable code is removed in version 6.9.0.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-61668 - @plone/volto vulnerable to potential DoS by invoking specific URL by anonymous user

CVE ID : CVE-2025-61668
Published : Oct. 2, 2025, 10:15 p.m. | 1 hour, 10 minutes ago
Description : Volto is a ReactJS-based frontend for the Plone Content Management System. Versions 16.34.0 and below, 17.0.0 through 17.22.1, 18.0.0 through 18.27.1, and 19.0.0-alpha.1 through 19.0.0-alpha.5, an anonymous user could cause the NodeJS server part of Volto to quit with an error when visiting a specific URL. This issue is fixed in versions 16.34.1, 17.22.2, 18.27.2 and 19.0.0-alpha.6.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-10895 - Rejected reason: This CVE ID has been rejected or

CVE ID : CVE-2025-10895
Published : Oct. 2, 2025, 11:15 p.m. | 4 hours, 12 minutes ago
Description : Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-11241 - Yoast SEO Premium 25.7-25.9 - Authenticated (Contributor+) Stored Cross-Site Scripting

CVE ID : CVE-2025-11241
Published : Oct. 3, 2025, 2:15 a.m. | 1 hour, 12 minutes ago
Description : The Yoast SEO Premium plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions 25.7 to 25.9 due to a flawed regex used to remove an attribute in post content, which can be abused to inject arbitrary HTML attributes, including JavaScript event handlers. This vulnerability allows a user with Contributor access or higher to create a post containing a malicious JavaScript payload.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59297 - File Parsing Out-Of-Bounds Write Vulnerability in DIAScreen

CVE ID : CVE-2025-59297
Published : Oct. 3, 2025, 2:21 a.m. | 1 hour, 6 minutes ago
Description : Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59298 - File Parsing Out-Of-Bounds Write Vulnerability in DIAScreen

CVE ID : CVE-2025-59298
Published : Oct. 3, 2025, 2:22 a.m. | 1 hour, 5 minutes ago
Description : Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59299 - File Parsing Out-Of-Bounds Write Vulnerability in DIAScreen

CVE ID : CVE-2025-59299
Published : Oct. 3, 2025, 2:24 a.m. | 1 hour, 3 minutes ago
Description : Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59300 - File Parsing Out-Of-Bounds Write Vulnerability in DIAScreen

CVE ID : CVE-2025-59300
Published : Oct. 3, 2025, 2:24 a.m. | 1 hour, 3 minutes ago
Description : Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-61847 - Apple Safari Cross-Site Request Forgery

CVE ID : CVE-2025-61847
Published : Oct. 3, 2025, 3:15 a.m. | 4 hours, 12 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-61597 - Emlog Pro is vulnerable to stored XSS attack through HTML template injection

CVE ID : CVE-2025-61597
Published : Oct. 3, 2025, 6:16 a.m. | 1 hour, 12 minutes ago
Description : Emlog is an open source website building system. In versions 2.5.21 and below, an HTML template injection allows stored cross‑site scripting (XSS) via the mail template settings. Once a malicious payload is saved, any subsequent visit to the settings page in an authenticated admin context will execute attacker‑controlled JavaScript, enabling session/token theft and full admin account takeover. This issue is fixed in version 2.5.22.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-61599 - Emlog is Vulnerable to Stored Cross-Site Scripting (XSS) in "Twitter" Feature via Markdown Input

CVE ID : CVE-2025-61599
Published : Oct. 3, 2025, 6:27 a.m. | 1 hour ago
Description : Emlog is an open source website building system. A stored Cross-Site Scripting (XSS) vulnerability exists in the "Twitter"feature of EMLOG Pro 2.5.21 and below. An authenticated user with privileges to post a "Twitter" message can inject arbitrary JavaScript code. The malicious script is stored on the server and gets executed in the browser of any user, including administrators, when they click on the malicious post to view it. This issue does not currently have a fix.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59536 - Claude Code's startup trust dialog could lead to Command Execution attack

CVE ID : CVE-2025-59536
Published : Oct. 3, 2025, 6:34 a.m. | 53 minutes ago
Description : Claude Code is an agentic coding tool. Versions before 1.0.111 were vulnerable to Code Injection due to a bug in the startup trust dialog implementation. Claude Code could be tricked to execute code contained in a project before the user accepted the startup trust dialog. Exploiting this requires a user to start Claude Code in an untrusted directory. Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised to update to the latest version. This issue is fixed in version 1.0.111.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-61589 - Cursor: Potential Information Leakage via Mermaid Diagram

CVE ID : CVE-2025-61589
Published : Oct. 3, 2025, 7:15 a.m. | 4 hours, 12 minutes ago
Description : Cursor is a code editor built for programming with AI. In versions 1.6 and below, Mermaid (a to render diagrams) allows embedding images which then get rendered by Cursor in the chat box. An attacker can use this to exfiltrate sensitive information to a third-party attacker controlled server through an image fetch after successfully performing a prompt injection. A malicious model (or hallucination/backdoor) might also trigger this exploit at will. This issue requires prompt injection from malicious data (web, image upload, source code) in order to exploit. In that case, it can send sensitive information to an attacker-controlled external server. Some additional bypasses not covered in the initial fix to this issue were discovered, see GHSA-43wj-mwcc-x93p. This issue is fixed in version 1.7.
Severity: 5.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-61671 - Rejected reason: Further research determined the i

CVE ID : CVE-2025-61671
Published : Oct. 3, 2025, 7:15 a.m. | 4 hours, 12 minutes ago
Description : Rejected reason: Further research determined the issue is not an open source vulnerability.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-0616 - SQLi in Teknolojik Center Telecommunication's B2B - Netsis Panel

CVE ID : CVE-2025-0616
Published : Oct. 3, 2025, 8:15 a.m. | 3 hours, 13 minutes ago
Description : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Teknolojik Center Telecommunication Industry Trade Co. Ltd. B2B - Netsis Panel allows SQL Injection.This issue affects B2B - Netsis Panel: through 20251003.
Severity: 8.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-11223 - Panasonic AutoDownloader DLL Loading Vulnerability

CVE ID : CVE-2025-11223
Published : Oct. 3, 2025, 8:15 a.m. | 3 hours, 13 minutes ago
Description : Installer of Panasonic AutoDownloader version 1.2.8 contains an issue with the DLL search path, which may lead to loading a crafted DLL file in the same directory.
Severity: 8.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-6388 - Spirit Framework <= 1.2.14 - Authentication Bypass to Account Takeover and Privilege Escalation

CVE ID : CVE-2025-6388
Published : Oct. 3, 2025, 9:15 a.m. | 2 hours, 12 minutes ago
Description : The Spirit Framework plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.2.14. This is due to the custom_actions() function not properly validating a user's identity prior to authenticating them to the site. This makes it possible for unauthenticated attackers to log in as any user, including administrators, granted they have access to the administrator's username.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-11234 - Qemu-kvm: vnc websocket handshake use-after-free

CVE ID : CVE-2025-11234
Published : Oct. 3, 2025, 10:30 a.m. | 58 minutes ago
Description : A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abused by a malicious client with network access to the VNC WebSocket port to cause a denial of service during the WebSocket handshake prior to the VNC client authentication.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-9854 - A Simple Multilanguage Plugin <= 1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting

CVE ID : CVE-2025-9854
Published : Oct. 3, 2025, 12:15 p.m. | 3 hours, 12 minutes ago
Description : The A Simple Multilanguage Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'asmp-switcher' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-9858 - Auto Bulb Finder for WordPress <= 2.8.0 - Authenticated (Contributor+) Stored Cross-Site Scripting

CVE ID : CVE-2025-9858
Published : Oct. 3, 2025, 12:15 p.m. | 3 hours, 12 minutes ago
Description : The Auto Bulb Finder for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'abf_vehicle' shortcode in all versions up to, and including, 2.8.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...