CVE tracker
249 subscribers
3.29K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-34283 - Nagios XI < 2024R1.4.2 API Key Disclosure via Neptune Themes

CVE ID : CVE-2025-34283
Published : Oct. 30, 2025, 10:15 p.m. | 3 hours, 1 minute ago
Description : Nagios XI versions prior to 2024R1.4.2 revealed API keys to users who were not authorized for API access when using Neptune themes. An authenticated user without API privileges could view another user's or their own API key value.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-34284 - Nagios XI < 2024R2 Authenticated Command Injection via WinRM Plugin

CVE ID : CVE-2025-34284
Published : Oct. 30, 2025, 10:15 p.m. | 3 hours, 1 minute ago
Description : Nagios XI versions prior to 2024R2 contain a command injection vulnerability in the WinRM plugin. Insufficient validation of user-supplied parameters allows an authenticated administrator to inject shell metacharacters that are incorporated into backend command invocations. Successful exploitation enables arbitrary command execution with the privileges of the Nagios XI web application user and can be leveraged to modify configuration, exfiltrate data, disrupt monitoring operations, or execute commands on the underlying host operating system.
Severity: 9.4 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-34286 - Nagios XI < 2026R1 RCE via Run Check Command in CCM

CVE ID : CVE-2025-34286
Published : Oct. 30, 2025, 10:15 p.m. | 3 hours, 1 minute ago
Description : Nagios XI versions prior to 2026R1 contain a remote code execution vulnerability in the Core Config Manager (CCM) Run Check command. Insufficient validation/escaping of parameters used to build backend command lines allows an authenticated administrator to inject shell metacharacters that are executed on the server. Successful exploitation results in arbitrary command execution with the privileges of the Nagios XI web application user and can be leveraged to gain control of the underlying host operating system.
Severity: 9.4 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-34287 - Nagios XI < 2024R2 Privilege Escalation via process_perfdata.pl

CVE ID : CVE-2025-34287
Published : Oct. 30, 2025, 10:15 p.m. | 3 hours, 1 minute ago
Description : Nagios XI versions prior to 2024R2 contain an improperly owned script, process_perfdata.pl, which is executed periodically as the nagios user but owned by www-data. Because the file was writable by www-data, an attacker with web server privileges could modify its contents, leading to arbitrary code execution as the nagios user when the script is next run. This improper ownership and permission configuration enables local privilege escalation.
Severity: 8.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-34298 - Nagios Log Server < 2024R1.3.2 Set Email Privilege Escalation

CVE ID : CVE-2025-34298
Published : Oct. 30, 2025, 10:15 p.m. | 3 hours, 1 minute ago
Description : Nagios Log Server versions prior to 2024R1.3.2 contain a privilege escalation vulnerability in the account email-change workflow. A user could set their own email to an invalid value and, due to insufficient validation and authorization checks tied to email identity state, trigger inconsistent account state that granted elevated privileges or bypassed intended access controls.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-27208 - Revive Adserver Reflected Cross-Site Scripting (XSS)

CVE ID : CVE-2025-27208
Published : Oct. 31, 2025, 12:15 a.m. | 1 hour, 1 minute ago
Description : A reflected Cross-Site Scripting (XSS) vulnerability has been identified in Revive Adserver version 5.5.2. An attacker could trick a user with access to the user interface of a Revive Adserver instance into clicking on a specifically crafted URL and execute injected JavaScript code in the context of the victim's browser. The session cookie cannot be accessed, but a number of other operations could be performed. The vulnerability is present in the admin-search.php file and can be exploited via the compact parameter.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-48980 - Brave Browser SameSite Cookie Insecure Navigation

CVE ID : CVE-2025-48980
Published : Oct. 31, 2025, 12:15 a.m. | 1 hour, 1 minute ago
Description : In Brave Browser Desktop versions prior to 1.83.10 that have the split view feature enabled, the "Open Link in Split View" context menu item did not respect the SameSite cookie attribute. Therefore SameSite=Strict cookies would be sent on a cross-site navigation using this method.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-48982 - Veeam Agent for Microsoft Windows Local Privilege Escalation

CVE ID : CVE-2025-48982
Published : Oct. 31, 2025, 12:15 a.m. | 1 hour, 1 minute ago
Description : This vulnerability in Veeam Agent for Microsoft Windows allows for Local Privilege Escalation if a system administrator is tricked into restoring a malicious file.
Severity: 7.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-48983 - Veeam Backup & Replication Mount Service Authenticated RCE Vulnerability

CVE ID : CVE-2025-48983
Published : Oct. 31, 2025, 12:15 a.m. | 1 hour, 1 minute ago
Description : A vulnerability in the Mount service of Veeam Backup & Replication, which allows for remote code execution (RCE) on the Backup infrastructure hosts by an authenticated domain user.
Severity: 9.9 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-48984 - VMware vSphere Backup Server Remote Code Execution Vulnerability

CVE ID : CVE-2025-48984
Published : Oct. 31, 2025, 12:15 a.m. | 1 hour, 1 minute ago
Description : A vulnerability allowing remote code execution (RCE) on the Backup Server by an authenticated domain user.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52663 - Ubiquiti UniFi Talk Debugging Functionality Unintentional Enablement

CVE ID : CVE-2025-52663
Published : Oct. 31, 2025, 12:15 a.m. | 1 hour, 1 minute ago
Description : A vulnerability was identified in certain UniFi Talk devices where internal debugging functionality remained unintentionally enabled. This issue could allow an attacker with access to the UniFi Talk management network to invoke internal debug operations through the device API. Affected Products: UniFi Talk Touch (Version 1.21.16 and earlier) UniFi Talk Touch Max (Version 2.21.22 and earlier) UniFi Talk G3 Phones (Version 3.21.26 and earlier) Mitigation: Update the UniFi Talk Touch to Version 1.21.17 or later. Update the UniFi Talk Touch Max to Version 2.21.23 or later. Update the UniFi Talk G3 Phones to Version 3.21.27 or later.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52664 - Revive Adserver SQL Injection Vulnerability

CVE ID : CVE-2025-52664
Published : Oct. 31, 2025, 12:15 a.m. | 1 hour, 1 minute ago
Description : SQL injection in Revive Adserver 6.0.0 causes potential disruption or information access when specifically crafted payloads are sent by logged in users
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52665 - "Ubiquiti UniFi Access Unauthenticated API Exposure"

CVE ID : CVE-2025-52665
Published : Oct. 31, 2025, 12:15 a.m. | 1 hour, 1 minute ago
Description : A malicious actor with access to the management network could exploit a misconfiguration in UniFi’s door access application, UniFi Access, that exposed a management API without proper authentication. This vulnerability was introduced in Version 3.3.22 and was fixed in Version 4.0.21 and later.  Affected Products: UniFi Access Application (Version 3.3.22 through 3.4.31). Mitigation: Update your UniFi Access Application to Version 4.0.21 or later.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-6176 - Brotli decompression bomb DoS in scrapy/scrapy

CVE ID : CVE-2025-6176
Published : Oct. 31, 2025, 12:15 a.m. | 1 hour, 1 minute ago
Description : Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-8849 - Denial of Service in danny-avila/librechat

CVE ID : CVE-2025-8849
Published : Oct. 31, 2025, 12:15 a.m. | 1 hour, 1 minute ago
Description : LibreChat version 0.7.9 is vulnerable to a Denial of Service (DoS) attack due to unbounded parameter values in the `/api/memories` endpoint. The `key` and `value` parameters accept arbitrarily large inputs without proper validation, leading to a null pointer error in the Rust-based backend when excessively large values are submitted. This results in the inability to create new memories, impacting the stability of the service.
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-23050 - Qt QLowEnergyController Bluetooth ATT Command Handling Vulnerability

CVE ID : CVE-2025-23050
Published : Oct. 31, 2025, 2:15 a.m. | 3 hours, 3 minutes ago
Description : QLowEnergyController in Qt before 6.8.2 mishandles malformed Bluetooth ATT commands, leading to an out-of-bounds read (or division by zero). This is fixed in 5.15.19, 6.5.9, and 6.8.2.
Severity: 3.1 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-11806 - Qzzr Shortcode Plugin <= 1.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

CVE ID : CVE-2025-11806
Published : Oct. 31, 2025, 3:15 a.m. | 2 hours, 3 minutes ago
Description : The Qzzr Shortcode Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'qzzr' shortcode in all versions up to, and including, 1.0.1. This is due to insufficient input sanitization and output escaping on the 'quiz' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-11975 - FuseWP – WordPress User Sync to Email List & Marketing Automation (Mailchimp, Constant Contact, ActiveCampaign etc.) <= 1.1.23.0 - Missing Authorization to Authenticated (Subscriber+) Sync Rule Creation

CVE ID : CVE-2025-11975
Published : Oct. 31, 2025, 3:15 a.m. | 2 hours, 3 minutes ago
Description : The FuseWP – WordPress User Sync to Email List & Marketing Automation (Mailchimp, Constant Contact, ActiveCampaign etc.) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_changes() function in all versions up to, and including, 1.1.23.0. This makes it possible for unauthenticated attackers to add and edit sync rules.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-11191 - RealPress < 1.1.0 - Unauthenticated Content Creation/Email Sending via REST

CVE ID : CVE-2025-11191
Published : Oct. 31, 2025, 6:15 a.m. | 3 hours, 4 minutes ago
Description : The RealPress WordPress plugin before 1.1.0 registers the REST routes without proper permission checks, allowing the creation of pages and sending of emails from the site.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-54763 - "Century Systems Co., Ltd. FutureNet MA and IP-K series OS Command Injection Vulnerability"

CVE ID : CVE-2025-54763
Published : Oct. 31, 2025, 6:15 a.m. | 3 hours, 4 minutes ago
Description : FutureNet MA and IP-K series provided by Century Systems Co., Ltd. contain an OS command Injection vulnerability. A user who logs in to the Web UI of the product may execute an arbitrary OS command.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-58152 - Century Systems Co., Ltd. FutureNet MA and IP-K series Information Disclosure

CVE ID : CVE-2025-58152
Published : Oct. 31, 2025, 6:15 a.m. | 3 hours, 4 minutes ago
Description : FutureNet MA and IP-K series provided by Century Systems Co., Ltd. put the firmware version and the garbage collection information on the internal web page. With some crafted HTTP request, they can be accessed without authentication.
Severity: 6.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...