CVE tracker
280 subscribers
3.63K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-23358 - NVIDIA NVApp Windows Path Injection Vulnerability

CVE ID : CVE-2025-23358
Published : Nov. 4, 2025, 7:47 p.m. | 20 minutes ago
Description : NVIDIA NVApp for Windows contains a vulnerability in the installer, where a local attacker can cause a search path element issue. A successful exploit of this vulnerability might lead to code execution and escalation of privileges.
Severity: 8.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-32786 - GLPI Inventory Plugin is Vulnerable to Unauthenticated SQL Injection

CVE ID : CVE-2025-32786
Published : Nov. 4, 2025, 9:15 p.m. | 2 hours, 53 minutes ago
Description : The GLPI Inventory Plugin handles network discovery, inventory, software deployment, and data collection for GLPI agents. Versions 1.5.0 and below are vulnerable to SQL Injection. This issue is fixed in version 1.5.1.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-47776 - MantisBT: Authentication bypass for some passwords due to PHP type juggling

CVE ID : CVE-2025-47776
Published : Nov. 4, 2025, 9:15 p.m. | 2 hours, 53 minutes ago
Description : Mantis Bug Tracker (MantisBT) is an open source issue tracker. Due to incorrect use of loose (==) instead of strict (===) comparison in the authentication code in versions 2.27.1 and below.PHP type juggling will cause certain MD5 hashes matching scientific notation to be interpreted as numbers. Instances using the MD5 login method allow an attacker who knows the victim's username and has access to an account with a password hash that evaluates to zero to log in without knowing the victim's actual password, by using any other password with a hash that also evaluates to zero This issue is fixed in version 2.27.2.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-48076 - Galette is vulnerable to Cross-site Scripting

CVE ID : CVE-2025-48076
Published : Nov. 4, 2025, 9:15 p.m. | 2 hours, 53 minutes ago
Description : Galette is a membership management web application for non profit organizations. Versions 1.1.5.2 and below allow a user to edit a group name and insert an XSS payload. This issue is fixed in version 1.2.0.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-48884 - Galette is vulnerable to XSS through Document Type

CVE ID : CVE-2025-48884
Published : Nov. 4, 2025, 9:15 p.m. | 2 hours, 53 minutes ago
Description : Galette is a membership management web application for non profit organizations. In versions 1.1.5.2 and below, Galette's Document Type is vulnerable to Cross-site Scripting. This issue is fixed in version 1.2.0.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52910 - Samsung Mobile Processor and Wearable Processor Exynos GPU Use-After-Free Privilege Escalation

CVE ID : CVE-2025-52910
Published : Nov. 4, 2025, 9:15 p.m. | 2 hours, 53 minutes ago
Description : An issue was discovered in the GPU in Samsung Mobile Processor and Wearable Processor Exynos 1280, 2200, 1330, 1380, 1480, 2400. A Use-After-Free leads to privilege escalation.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-54335 - Samsung Mobile Processor Exynos GPU Driver Use-After-Free Vulnerability

CVE ID : CVE-2025-54335
Published : Nov. 4, 2025, 9:15 p.m. | 2 hours, 53 minutes ago
Description : An issue was discovered in the GPU driver in Samsung Mobile Processor Exynos 1480, 2400, 1580, 2500. There is a use-after-free in the Xclipse GPU Driver.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-55155 - MantisBT: Authentication bypass for some passwords due to PHP type juggling

CVE ID : CVE-2025-55155
Published : Nov. 4, 2025, 9:15 p.m. | 2 hours, 53 minutes ago
Description : Mantis Bug Tracker (MantisBT) is an open source issue tracker. In versions 2.27.1 and below, when a user edits their profile to change their e-mail address, the system saves it without validating that it actually belongs to the user. This could result in storing an invalid email address, preventing the user from receiving system notifications. Notifications sent to another person's email address could lead to information disclosure. This issue is fixed in version 2.27.2.
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-54496 - Fuji Electric Monitouch V-SFT-6 Heap-based Buffer Overflow

CVE ID : CVE-2025-54496
Published : Nov. 4, 2025, 10:16 p.m. | 1 hour, 53 minutes ago
Description : A maliciously crafted project file may cause a heap-based buffer overflow in Fuji Electric Monitouch V-SFT-6, which may allow the attacker to execute arbitrary code.
Severity: 8.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-54526 - Fuji Electric Monitouch V-SFT-6 Stack-based Buffer Overflow

CVE ID : CVE-2025-54526
Published : Nov. 4, 2025, 10:16 p.m. | 1 hour, 53 minutes ago
Description : Fuji Electric Monitouch V-SFT-6 is vulnerable to a stack-based buffer overflow while processing a specially crafted project file, which may allow an attacker to execute arbitrary code.
Severity: 8.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-56230 - Tencent Docs Desktop SSL Certificate Validation Bypass

CVE ID : CVE-2025-56230
Published : Nov. 4, 2025, 10:16 p.m. | 1 hour, 53 minutes ago
Description : Tencent Docs Desktop 3.9.20 and earlier suffers from Missing SSL Certificate Validation in the update component.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62369 - Xibo CMS: Remote Code Execution through module templates

CVE ID : CVE-2025-62369
Published : Nov. 4, 2025, 10:16 p.m. | 1 hour, 52 minutes ago
Description : Xibo is an open source digital signage platform with a web content management system (CMS). Versions 4.3.0 and below contain a Remote Code Execution vulnerability in the CMS Developer menu's Module Templating functionality, allowing authenticated users with "System -> Add/Edit custom modules and templates" permissions to manipulate Twig filters and execute arbitrary server-side functions as the web server user. This issue is fixed in version 4.3.1. To workaround this issue, use the 4.1 and 4.2 patch commits.
Severity: 7.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62507 - Redis: Bug in XACKDEL may lead to stack overflow and potential RCE

CVE ID : CVE-2025-62507
Published : Nov. 4, 2025, 10:16 p.m. | 1 hour, 52 minutes ago
Description : Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command.
Severity: 7.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62520 - MantisBT unauthorized disclosure of private project column configuration

CVE ID : CVE-2025-62520
Published : Nov. 4, 2025, 10:16 p.m. | 1 hour, 52 minutes ago
Description : Mantis Bug Tracker (MantisBT) is an open source issue tracker. In versions 2.27.1 and below, due to insufficient access-level checks, any non-admin user with access to manage_config_columns_page.php can use the Copy From action to retrieve the columns configuration from a private project they have no access to. This issue is fixed in version 2.27.2.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62715 - ClipBucket v5: Stored XSS via Collection Tags

CVE ID : CVE-2025-62715
Published : Nov. 4, 2025, 10:16 p.m. | 1 hour, 52 minutes ago
Description : ClipBucket v5 is an open source video sharing platform. Versions 5.5.2-#147 and below contain a stored Cross-Site Scripting (XSS) vulnerability in ClipBucket’s Collection tags feature. An authenticated normal user can create a tag containing HTML or JavaScript, which is later rendered unescaped in collection detail and tag-list pages. As a result, arbitrary JavaScript executes in the browsers of all users who view the affected pages. This issue is fixed in version 5.5.2-#152.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62719 - LinkAce: Limited Server-Side Request Forgery (SSRF) in Keyword Fetching Functionality

CVE ID : CVE-2025-62719
Published : Nov. 4, 2025, 10:16 p.m. | 1 hour, 52 minutes ago
Description : LinkAce is a self-hosted archive to collect website links. In versions 2.3.0 and below, the htmlKeywordsFromUrl function in the FetchController class accepts user-provided URLs and makes HTTP requests to them without validating that the destination is not an internal or private network resource. This Server-Side Request Forgery (SSRF) vulnerability allows authenticated attackers to use the application server to perform port scanning and service discovery on internal networks. Practical impact is very limited because the function only extracts content from HTML meta keywords tags, which prevents meaningful data exfiltration from databases, APIs, or cloud metadata endpoints. This issue is fixed in version 2.4.0.
Severity: 2.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62720 - LinkAce: Data Exfiltration via Export Functions Allow Access to All Users' Private Links

CVE ID : CVE-2025-62720
Published : Nov. 4, 2025, 10:16 p.m. | 1 hour, 52 minutes ago
Description : LinkAce is a self-hosted archive to collect website links. Versions 2.3.1 and below allow any authenticated user to export the entire database of links from all users in the system, including private links that should only be accessible to their owners. The HTML and CSV export functions in the ExportController class retrieve all links without applying any ownership or visibility filtering, effectively bypassing all access controls implemented elsewhere in the application. This issue is fixed in version 2.4.0.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62721 - LinkAce: Authorization Bypass Allows Unauthorized Access to All Private Links, Lists, and Tags

CVE ID : CVE-2025-62721
Published : Nov. 4, 2025, 10:16 p.m. | 1 hour, 52 minutes ago
Description : LinkAce is a self-hosted archive to collect website links. In versions 2.3.1 and below, authenticated RSS feed endpoints in the FeedController class fail to implement proper authorization checks, allowing any authenticated user to access all links, lists, and tags from all users in the system, regardless of their ownership or visibility settings. This issue is fixed in version 2.4.0.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-64109 - Cursor CLI Beta: Command Injection via Untrusted MCP Configuration

CVE ID : CVE-2025-64109
Published : Nov. 4, 2025, 11:09 p.m. | 59 minutes ago
Description : Cursor is a code editor built for programming with AI. In versions and below, a vulnerability in the Cursor CLI Beta allowed an attacker to achieve remote code execution through the MCP (Model Context Protocol) server mechanism by uploading a malicious MCP configuration in .cursor/mcp.json file in a GitHub repository. Once a victim clones the project and opens it using Cursor CLI, the command to run the malicious MCP server is immediately executed without any warning, leading to potential code execution as soon as the command runs. This issue is fixed in version 2025.09.17-25b418f.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59595 - Fortinet Secure Access Denial of Service

CVE ID : CVE-2025-59595
Published : Nov. 4, 2025, 11:15 p.m. | 53 minutes ago
Description : CVE-2025-59595 is an internally discovered denial of service vulnerability in versions of Secure Access prior to 14.12. An attacker can send a specially crafted packet to a server in a non-default configuration and cause the server to crash.
Severity: 8.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59596 - Secure Access Windows Denial-of-Service

CVE ID : CVE-2025-59596
Published : Nov. 4, 2025, 11:15 p.m. | 53 minutes ago
Description : CVE-2025-59596 is a denial-of-service vulnerability in Secure Access Windows client versions 12.0 to 14.10 that is addressed in version 14.12. If a local networking policy is active, attackers on an adjacent network may be able to send a crafted packet and cause the client system to crash.
Severity: 6.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...