CVE tracker
244 subscribers
3.24K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-33040 - Qsync Central

CVE ID : CVE-2025-33040
Published : Oct. 3, 2025, 6:15 p.m. | 1 hour, 13 minutes ago
Description : An allocation of resources without limits or throttling vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.1 ( 2025/07/09 ) and later
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-44006 - Qsync Central

CVE ID : CVE-2025-44006
Published : Oct. 3, 2025, 6:15 p.m. | 1 hour, 13 minutes ago
Description : An allocation of resources without limits or throttling vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.1 ( 2025/07/09 ) and later
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-44007 - Qsync Central

CVE ID : CVE-2025-44007
Published : Oct. 3, 2025, 6:15 p.m. | 1 hour, 13 minutes ago
Description : An allocation of resources without limits or throttling vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.1 ( 2025/07/09 ) and later
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-46817 - Lua library commands may lead to integer overflow and potential RCE

CVE ID : CVE-2025-46817
Published : Oct. 3, 2025, 6:15 p.m. | 1 hour, 13 minutes ago
Description : Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2.
Severity: 7.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52653 - Cross Site Scripting vulnerability in the web application

CVE ID : CVE-2025-52653
Published : Oct. 3, 2025, 6:15 p.m. | 1 hour, 13 minutes ago
Description : HCL MyXalytics product is affected by Cross Site Scripting vulnerability in the web application. This can allow the execution of unauthorized scripts, potentially resulting in unauthorized actions or access.
Severity: 7.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-61592 - Cursor CLI: Arbitrary Code Execution Possible through Permissive CLI Config

CVE ID : CVE-2025-61592
Published : Oct. 3, 2025, 6:15 p.m. | 1 hour, 13 minutes ago
Description : Cursor is a code editor built for programming with AI. In versions 1.7 and below, automatic loading of project-specific CLI configuration from the current working directory (/.cursor/cli.json) could override certain global configurations in Cursor CLI. This allowed users running the CLI inside a malicious repository to be vulnerable to Remote Code Execution through a combination of permissive configuration (allowing shell commands) and prompt injection delivered via project-specific Rules (/.cursor/rules/rule.mdc) or other mechanisms. The fix for this issue is currently available as a patch 2025.09.17-25b418f. As of October 3, 2025 there is no release version.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-61593 - Cursor CLI Agent: Sensitive File Overwrite Bypass

CVE ID : CVE-2025-61593
Published : Oct. 3, 2025, 6:15 p.m. | 1 hour, 13 minutes ago
Description : Cursor is a code editor built for programming with AI. In versions 1.7 and below, a vulnerability in the way Cursor CLI Agent protects its sensitive files (i.e. */.cursor/cli.json) allows attackers to modify the content of the files through prompt injection, thus achieving remote code execution. A prompt injection can lead to full RCE through modifying sensitive files on case-insensitive filesystems. This issue is fixed in a commit, 25b418f, but has yet to be released as of October 3, 2025.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52658 - HCL MyXalytics Use-After-Free Vulnerability

CVE ID : CVE-2025-52658
Published : Oct. 3, 2025, 6:16 p.m. | 1 hour, 12 minutes ago
Description : HCL MyXalytics  6.6.  product is affected by Use of Vulnerable/Outdated Versions Vulnerability
Severity: 3.5 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52656 - HCL MyXalytics product is affected by Mass Assignment vulnerability

CVE ID : CVE-2025-52656
Published : Oct. 3, 2025, 6:20 p.m. | 1 hour, 8 minutes ago
Description : HCL MyXalytics: 6.6.  is affected by Mass Assignment vulnerability. Mass Assignment occurs when user input is automatically bound to application objects without proper validation or access controls, potentially allowing unauthorized modification of sensitive fields.
Severity: 7.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-46818 - Redis: Authenticated users can execute LUA scripts as a different user

CVE ID : CVE-2025-46818
Published : Oct. 3, 2025, 6:38 p.m. | 49 minutes ago
Description : Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-46819 - Redis is vulnerable to DoS via specially crafted LUA scripts

CVE ID : CVE-2025-46819
Published : Oct. 3, 2025, 7:12 p.m. | 16 minutes ago
Description : Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-49844 - Redis Lua Use-After-Free may lead to remote code execution

CVE ID : CVE-2025-49844
Published : Oct. 3, 2025, 8:15 p.m. | 3 hours, 13 minutes ago
Description : Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
Severity: 9.9 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-53354 - NiceGUI is vulnerable to Reflected XSS attack

CVE ID : CVE-2025-53354
Published : Oct. 3, 2025, 8:15 p.m. | 3 hours, 13 minutes ago
Description : NiceGUI is a Python-based UI framework. Versions 2.24.2 and below are at risk for Cross-Site Scripting (XSS) when developers render unescaped user input into the DOM using ui.html(). NiceGUI did not enforce HTML or JavaScript sanitization, so applications that directly combine components like ui.input() with ui.html() or ui.chat_message with HTML content without escaping may allow attackers to execute arbitrary JavaScript in the user’s browser. Applications that do not pass untrusted input into ui.html() are not affected. This issue is fixed in version 3.0.0.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-54374 - Eidos: One-click Remote Code Execution through Custom URL Handling

CVE ID : CVE-2025-54374
Published : Oct. 3, 2025, 8:15 p.m. | 3 hours, 13 minutes ago
Description : Eidos is an extensible framework for Personal Data Management. Versions 0.21.0 and below contain a one-click remote code execution vulnerability. An attacker can exploit this vulnerability by embedding a specially crafted eidos: URL on any website, including a malicious one they control. When a victim visits such a site or clicks on the link, the browser triggers the app’s custom URL handler (eidos:), causing the Eidos application to launch and process the URL, leading to remote code execution on the victim’s machine. This issue does not have a fix as of October 3, 2025
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59829 - Claude Code: Permission deny bypass is possible through symlink

CVE ID : CVE-2025-59829
Published : Oct. 3, 2025, 8:15 p.m. | 3 hours, 13 minutes ago
Description : Claude Code is an agentic coding tool. Versions below 1.0.120 failed to account for symlinks when checking permission deny rules. If a user explicitly denied Claude Code access to a file and Claude Code had access to a symlink pointing to that file, it was possible for Claude Code to access the file. Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised to update to the latest version. This issue is fixed in version 1.0.120.
Severity: 2.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-10692 - OpenSupports 4.11.0 — SQL Injection

CVE ID : CVE-2025-10692
Published : Oct. 3, 2025, 9:15 p.m. | 2 hours, 13 minutes ago
Description : The endpoint POST /api/staff/get-new-tickets concatenates the user-controlled parameter departmentId directly into the SQL WHERE clause without parameter binding. As a result, an authenticated staff user (level ≥ 1) can inject SQL to alter the filter logic, effectively bypassing department scoping and disclosing tickets beyond their intended access.This issue affects OpenSupports: 4.11.0.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-10695 - OpenSupports 4.11.0 — SSRF via test imap and smtp endpoints

CVE ID : CVE-2025-10695
Published : Oct. 3, 2025, 9:15 p.m. | 2 hours, 13 minutes ago
Description : Two unauthenticated diagnostic endpoints allow arbitrary backend-initiated network connections to an attacker‑supplied destination. Both endpoints are exposed with permission => 'any', enabling unauthenticated SSRF for internal network scanning and service interaction. This issue affects OpenSupports: 4.11.0.
Severity: 6.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-10696 - OpenSupports 4.11.0 — Insecure Direct Object Reference in supervised list

CVE ID : CVE-2025-10696
Published : Oct. 3, 2025, 9:15 p.m. | 2 hours, 13 minutes ago
Description : OpenSupports exposes an endpoint that allows the list of 'supervised users' for any account to be edited, but it does not validate whether the actor is the owner of that list. A Level 1 staff member can modify the supervision relationship of a third party (the target user), who can then view the tickets of the added 'supervised' users. This breaks the authorization model and filters the content of other users' tickets.This issue affects OpenSupports: 4.11.0.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59943 - phpMyFAQ duplicate email registration allows multiple accounts with the same email

CVE ID : CVE-2025-59943
Published : Oct. 3, 2025, 9:15 p.m. | 2 hours, 13 minutes ago
Description : phpMyFAQ is an open source FAQ web application. Versions 4.0-nightly-2025-10-03 and below do not enforce uniqueness of email addresses during user registration. This allows multiple distinct accounts to be created with the same email. Because email is often used as an identifier for password resets, notifications, and administrative actions, this flaw can cause account ambiguity and, in certain configurations, may lead to privilege escalation or account takeover. This issue is fixed in version 4.0.13.
Severity: 8.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59944 - Cursor IDE: Sensitive File Overwrite Bypass is Possible

CVE ID : CVE-2025-59944
Published : Oct. 3, 2025, 9:15 p.m. | 2 hours, 13 minutes ago
Description : Cursor is a code editor built for programming with AI. Versions 1.6.23 and below contain case-sensitive checks in the way Cursor IDE protects its sensitive files (e.g., */.cursor/mcp.json), which allows attackers to modify the content of these files through prompt injection and achieve remote code execution. A prompt injection can lead to full RCE through modifying sensitive files on case-insensitive fileystems. This issue is fixed in version 1.7.
Severity: 8.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-61585 - Apache Felix Unvalidated User Input

CVE ID : CVE-2025-61585
Published : Oct. 3, 2025, 9:15 p.m. | 2 hours, 13 minutes ago
Description : Rejected reason: Further research determined the issue is not an independent vulnerability as it originates from Apache Felix.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...