CVE tracker
281 subscribers
3.65K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-20749 - Huawei Charger Out-of-Bounds Write Vulnerability

CVE ID : CVE-2025-20749
Published : Nov. 4, 2025, 7:15 a.m. | 45 minutes ago
Description : In charger, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09915493; Issue ID: MSV-3800.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-11690 - IDOR vulnerability in the CFMOTO RIDE API

CVE ID : CVE-2025-11690
Published : 2025年11月4日 11:15 | 48 分钟 ago
Description : An Insecure Direct Object Reference (IDOR) vulnerability exists in the vehicleId parameter, allowing unauthorized access to sensitive information of other users’ vehicles. Exploiting this issue enables an attacker to retrieve data such as GPS coordinates, encryption keys, initialization vectors, model numbers, and fuel statistics belonging to other users, instead of being limited to their own vehicle data. This is a server-side authorization fix.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-12493 - ShopLentor <= 3.2.5 - Unauthenticated Local PHP File Inclusion via 'load_template'

CVE ID : CVE-2025-12493
Published : 2025年11月4日 11:19 | 45 分钟 ago
Description : The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.2.5 via the 'load_template' function. This makes it possible for unauthenticated attackers to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-12045 - Orbit Fox Companion <= 3.0.2 - Authenticated (Author+) Stored Cross-Site Scripting via Post Taxonomy

CVE ID : CVE-2025-12045
Published : 2025年11月4日 11:19 | 45 分钟 ago
Description : The Orbit Fox: Duplicate Page, Menu Icons, SVG Support, Cookie Notice, Custom Fonts & More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the category and tag 'name' parameters in all versions up to, and including, 3.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41111 - Missing Authorization vulnerability in CanalDenuncia.app

CVE ID : CVE-2025-41111
Published : Nov. 4, 2025, 1:15 p.m. | 2 hours, 51 minutes ago
Description : A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameter 'id_denuncia' in '/backend/api/buscarComentariosByDenuncia.php'.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41112 - Missing Authorization vulnerability in CanalDenuncia.app

CVE ID : CVE-2025-41112
Published : Nov. 4, 2025, 1:15 p.m. | 2 hours, 51 minutes ago
Description : A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameter 'web' in '/backend/api/buscarConfiguracionParametros2.php'.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41113 - Missing Authorization vulnerability in CanalDenuncia.app

CVE ID : CVE-2025-41113
Published : Nov. 4, 2025, 1:15 p.m. | 2 hours, 51 minutes ago
Description : A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameter 'id_denuncia' in '/backend/api/buscarDenunciaByPin.php'.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41114 - Missing Authorization vulnerability in CanalDenuncia.app

CVE ID : CVE-2025-41114
Published : Nov. 4, 2025, 1:15 p.m. | 2 hours, 51 minutes ago
Description : A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameters 'id_denuncia' and 'id_user' in '/backend/api/buscarDocumentosByIdDenunciaUsuario.php'.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-12682 - Easy Upload Files During Checkout <= 2.9.8 - Unauthenticated Arbitrary JavaScript File Upload

CVE ID : CVE-2025-12682
Published : Nov. 4, 2025, 2:15 p.m. | 1 hour, 51 minutes ago
Description : The Easy Upload Files During Checkout plugin for WordPress is vulnerable to arbitrary JavaScript file uploads due to missing file type validation in the 'file_during_checkout' function in all versions up to, and including, 2.9.8. This makes it possible for unauthenticated attackers to upload arbitrary JavaScript files on the affected site's server which may make remote code execution possible.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-12695 - Insecure configuration in DSPy lead to arbitrary file read when running untrusted code inside the sandbox

CVE ID : CVE-2025-12695
Published : Nov. 4, 2025, 2:15 p.m. | 1 hour, 51 minutes ago
Description : The overly permissive sandbox configuration in DSPy allows attackers to steal sensitive files in cases when users build an AI agent which consumes user input and uses the “PythonInterpreter” class.
Severity: 5.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41335 - Missing Authorization vulnerability in CanalDenuncia.app

CVE ID : CVE-2025-41335
Published : Nov. 4, 2025, 2:15 p.m. | 1 hour, 51 minutes ago
Description : A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameters 'id' and ' 'id_sociedad' in '/api/buscarEmpresaById.php'.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41336 - Missing Authorization vulnerability in CanalDenuncia.app

CVE ID : CVE-2025-41336
Published : Nov. 4, 2025, 2:15 p.m. | 1 hour, 51 minutes ago
Description : A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameter 'web' in '/backend/api/buscarConfiguracionParametros.php'.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41337 - Missing Authorization vulnerability in CanalDenuncia.app

CVE ID : CVE-2025-41337
Published : Nov. 4, 2025, 2:15 p.m. | 1 hour, 51 minutes ago
Description : A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameter 'web' in '/backend/api/buscarSSOParametros.php'.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41338 - Missing Authorization vulnerability in CanalDenuncia.app

CVE ID : CVE-2025-41338
Published : Nov. 4, 2025, 2:15 p.m. | 1 hour, 51 minutes ago
Description : A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameters 'id_denuncia' and 'id_user' in '/backend/api/buscarTestigoByIdDenunciaUsuario.php'.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41339 - Missing Authorization vulnerability in CanalDenuncia.app

CVE ID : CVE-2025-41339
Published : Nov. 4, 2025, 2:15 p.m. | 1 hour, 51 minutes ago
Description : A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameter 'id_sociedad' in '/backend/api/buscarTipoDenuncia.php'.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41340 - Missing Authorization vulnerability in CanalDenuncia.app

CVE ID : CVE-2025-41340
Published : Nov. 4, 2025, 2:15 p.m. | 1 hour, 51 minutes ago
Description : A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameters 'id_tp_denuncia' and 'id_sociedad' in '/backend/api/buscarTipoDenunciabyId.php'.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41341 - Missing Authorization vulnerability in CanalDenuncia.app

CVE ID : CVE-2025-41341
Published : Nov. 4, 2025, 2:15 p.m. | 1 hour, 51 minutes ago
Description : A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameters 'id_denuncia' and 'seguro' in '/backend/api/buscarUsuarioByDenuncia.php'.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41342 - Missing Authorization vulnerability in CanalDenuncia.app

CVE ID : CVE-2025-41342
Published : Nov. 4, 2025, 2:15 p.m. | 1 hour, 51 minutes ago
Description : A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameter 'id_user' in '/backend/api/buscarUsuarioId.php'.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41343 - Missing Authorization vulnerability in CanalDenuncia.app

CVE ID : CVE-2025-41343
Published : Nov. 4, 2025, 2:15 p.m. | 1 hour, 51 minutes ago
Description : A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameter 'email' in '/backend/api/users/searchUserByEmail.php'.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41344 - Missing Authorization vulnerability in CanalDenuncia.app

CVE ID : CVE-2025-41344
Published : Nov. 4, 2025, 2:15 p.m. | 1 hour, 51 minutes ago
Description : A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameter 'id_archivo' in '/backend/api/verArchivo.php'.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41345 - Missing Authorization vulnerability in CanalDenuncia.app

CVE ID : CVE-2025-41345
Published : Nov. 4, 2025, 2:15 p.m. | 1 hour, 51 minutes ago
Description : A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability allows an attacker to access other users' information by sending a POST through the parameters 'id_denuncia' and 'id_user' in '/backend/api/buscarDenunciasById.php'.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...