CVE tracker
252 subscribers
3.31K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-12547 - LogicalDOC Community Edition Admin Login login.jsp excessive authentication

CVE ID : CVE-2025-12547
Published : Oct. 31, 2025, 7:15 p.m. | 2 hours, 10 minutes ago
Description : A vulnerability was identified in LogicalDOC Community Edition up to 9.2.1. This vulnerability affects unknown code of the file /login.jsp of the component Admin Login Page. Such manipulation leads to improper restriction of excessive authentication attempts. The attack can be executed remotely. This attack is characterized by high complexity. It is stated that the exploitability is difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62267 - Liferay Portal/Liferay DXP Cross-Site Scripting (XSS) Vulnerability

CVE ID : CVE-2025-62267
Published : Oct. 31, 2025, 7:15 p.m. | 2 hours, 10 minutes ago
Description : Multiple cross-site scripting (XSS) vulnerabilities in web content template’s select structure page in Liferay Portal 7.4.3.35 through 7.4.3.111, and Liferay DXP 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 update 35 through update 92 allow remote attackers to inject arbitrary web script or HTML via a crafted payload injected into a user’s (1) First Name, (2) Middle Name, or (3) Last Name text field.
Severity: 4.6 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62618 - ELOG file upload stored XSS

CVE ID : CVE-2025-62618
Published : Oct. 31, 2025, 7:15 p.m. | 2 hours, 10 minutes ago
Description : ELOG allows an authenticated user to upload arbitrary HTML files. The HTML content is executed in the context of other users when they open the file. Because ELOG includes usernames and password hashes in certain HTTP requests, an attacker can obtain the target's credentials and replay them or crack the password hash offline. In ELOG 3.1.5-20251014 release, HTML files are rendered as plain text.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-63454 - Tenda AX-3 Stack Overflow Denial of Service

CVE ID : CVE-2025-63454
Published : Oct. 31, 2025, 7:15 p.m. | 2 hours, 10 minutes ago
Description : Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow via the deviceId parameter in the get_parentControl_list_Info function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-63458 - Tenda AX-1803 Stack Overflow Denial of Service

CVE ID : CVE-2025-63458
Published : Oct. 31, 2025, 7:15 p.m. | 2 hours, 10 minutes ago
Description : Tenda AX-1803 v1.0.0.1 was discovered to contain a stack overflow via the timeZone parameter in the form_fast_setting_wifi_set function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted request.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-64348 - ELOG configuration file authorization bypass

CVE ID : CVE-2025-64348
Published : Oct. 31, 2025, 7:15 p.m. | 2 hours, 10 minutes ago
Description : ELOG allows an authenticated user to modify or overwrite the configuration file, resulting in denial of service. If the execute facility is specifically enabled with the "-x" command line flag, attackers could execute OS commands on the host machine. By default, ELOG is not configured to allow shell commands or self-registration.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-64349 - ELOG user profile missing authorization

CVE ID : CVE-2025-64349
Published : Oct. 31, 2025, 7:15 p.m. | 2 hours, 10 minutes ago
Description : ELOG allows an authenticated user to modify another user's profile. An attacker can edit a target user's email address, then request a password reset, and take control of the target account. By default, ELOG is not configured to allow self-registration.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-10693 - Silicon Labs Z-Wave PIR Sensor Joins Network as Non-Secure

CVE ID : CVE-2025-10693
Published : Oct. 31, 2025, 8:15 p.m. | 1 hour, 10 minutes ago
Description : When SmartStart Inclusion fails during the onboarding of a Z-Wave PIR sensor, the sensor will join the network as a non-secure device. This vulnerability exists in Silicon Labs' Z-Wave PIR Sensor Reference design delivered as part of SiSDK v2025.6.0 and v2025.6.1.
Severity: 7.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-60711 - Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability

CVE ID : CVE-2025-60711
Published : Oct. 31, 2025, 8:15 p.m. | 1 hour, 10 minutes ago
Description : Protection mechanism failure in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-63561 - Summer Pearl Group Vacation Rental Management Platform HTTP Slowloris DoS Vulnerability

CVE ID : CVE-2025-63561
Published : Oct. 31, 2025, 8:15 p.m. | 1 hour, 10 minutes ago
Description : Summer Pearl Group Vacation Rental Management Platform prior to 1.0.2 is susceptible to a Slowloris-style Denial-of-Service (DoS) condition in the HTTP connection handling layer, where an attacker that opens and maintains many slow or partially-completed HTTP connections can exhaust the server’s connection pool and worker capacity, preventing legitimate users and APIs from accessing the service.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-63562 - Summer Pearl Group Vacation Rental Management Platform Server-Side Authorization Bypass

CVE ID : CVE-2025-63562
Published : Oct. 31, 2025, 8:15 p.m. | 1 hour, 10 minutes ago
Description : Summer Pearl Group Vacation Rental Management Platform prior to v1.0.2 suffers from insufficient server-side authorization. Authenticated attackers can call several endpoints and perform create/update/delete actions on resources owned by arbitrary users by manipulating request parameters (e.g., owner or resource id).
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-63563 - Summer Pearl Group Vacation Rental Management Platform Session Fixation Vulnerability

CVE ID : CVE-2025-63563
Published : Oct. 31, 2025, 9:15 p.m. | 2 hours, 13 minutes ago
Description : Summer Pearl Group Vacation Rental Management Platform prior to v1.0.2 does not properly invalidate active user sessions after a password change. This allows an attacker with a valid session token to maintain access to the account even after the legitimate user changes their password.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-12464 - Qemu-kvm: stack buffer overflow in e1000 device via short frames in loopback mode

CVE ID : CVE-2025-12464
Published : Oct. 31, 2025, 10:15 p.m. | 1 hour, 14 minutes ago
Description : A stack-based buffer overflow was found in the QEMU e1000 network device. The code for padding short frames was dropped from individual network devices and moved to the net core code. The issue stems from the device's receive code still being able to process a short frame in loopback mode. This could lead to a buffer overrun in the e1000_receive_iov() function via the loopback code path. A malicious guest user could use this vulnerability to crash the QEMU process on the host, resulting in a denial of service.
Severity: 6.2 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62276 - Liferay Portal Browser Cache File Access Vulnerability

CVE ID : CVE-2025-62276
Published : Nov. 1, 2025, 12:15 a.m. | 3 hours, 15 minutes ago
Description : The Document Library and the Adaptive Media modules in Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, and older unsupported versions uses an incorrect cache-control header, which allows local users to obtain access to downloaded files via the browser's cache.
Severity: 4.6 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-11174 - Document Library Lite <= 1.1.6 - Missing Authorization to Sensitive Information Exposure

CVE ID : CVE-2025-11174
Published : Nov. 1, 2025, 2:15 a.m. | 1 hour, 15 minutes ago
Description : The Document Library Lite plugin for WordPress is vulnerable to Improper Authorization in all versions up to, and including, 1.1.6. This is due to the plugin exposing an unauthenticated AJAX action dll_load_posts which returns a JSON table of document data without performing nonce or capability checks. The handler accepts an attacker-controlled args array where the status option explicitly allows draft, pending, future, and any. This makes it possible for unauthenticated attackers to retrieve unpublished document titles and content via the AJAX endpoint.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-11816 - Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages <= 3.5.1 - Missing Authorization to Unauthenticated API Disconnect

CVE ID : CVE-2025-11816
Published : Nov. 1, 2025, 2:15 a.m. | 1 hour, 15 minutes ago
Description : The Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WP Legal Pages plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the disconnect_account_request() function in all versions up to, and including, 3.5.1. This makes it possible for unauthenticated attackers to disconnect the site from its API plan.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-11920 - WPCOM Member <= 1.7.14 - Authenticated (Contributor+) Local File Inclusion via Shortcode

CVE ID : CVE-2025-11920
Published : Nov. 1, 2025, 2:15 a.m. | 1 hour, 15 minutes ago
Description : The WPCOM Member plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.7.14 via the action parameter in one of its shortcodes. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-11922 - Inactive Logout <= 3.5.5 - Authenticated (Subscriber+) Stored Cross-Site Scripting

CVE ID : CVE-2025-11922
Published : Nov. 1, 2025, 2:15 a.m. | 1 hour, 15 minutes ago
Description : The Inactive Logout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ina_redirect_page_individual_user' parameter in all versions up to, and including, 3.5.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62275 - Liferay Portal Information Disclosure

CVE ID : CVE-2025-62275
Published : Nov. 1, 2025, 3:15 a.m. | 15 minutes ago
Description : Blogs in Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.10, 2023.Q3.1 through 2023.Q3.10, 7.4 GA through update 92, and older unsupported versions does not check permission of images in a blog entry, which allows remote attackers to view the images in a blog entry via crafted URL.
Severity: 6.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-11833 - Post SMTP – Complete SMTP Solution with Logs, Alerts, Backup SMTP & Mobile App <= 3.6.0 - Missing Authorization to Account Takeover via Unauthenticated Email Log Disclosure

CVE ID : CVE-2025-11833
Published : Nov. 1, 2025, 4:15 a.m. | 3 hours, 19 minutes ago
Description : The Post SMTP – Complete SMTP Solution with Logs, Alerts, Backup SMTP & Mobile App plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the __construct function in all versions up to, and including, 3.6.0. This makes it possible for unauthenticated attackers to read arbitrary logged emails sent through the Post SMTP plugin, including password reset emails containing password reset links, which can lead to account takeover.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-11928 - CSS & JavaScript Toolbox <= 12.0.5 - Authenticated (Admin+) Stored Cross-Site Scripting

CVE ID : CVE-2025-11928
Published : Nov. 1, 2025, 4:16 a.m. | 3 hours, 19 minutes ago
Description : The CSS & JavaScript Toolbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 12.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Severity: 4.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...