CVE tracker
289 subscribers
3.92K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-41076 - Multiple vulnerabilities in Limesurvey

CVE ID : CVE-2025-41076
Published : Nov. 20, 2025, 3:17 p.m. | 1 hour, 11 minutes ago
Description : In version 6.13.0 of LimeSurvey, any external user can cause a 500 error in the survey system by sending a malformed session cookie. Instead of displaying a generic error message, the system exposes internal backend information, including the use of the Yii framework, the MySQL/MariaDB database engine, the table name 'lime_sessions', primary keys, and fragments of the content that caused the conflict. This information can simplify the collection of data about the internal architecture of the application by an attacker.
Severity: 6.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-60794 - Couch-auth Unsecured In-Memory Storage of Session Tokens and Passwords

CVE ID : CVE-2025-60794
Published : Nov. 20, 2025, 3:17 p.m. | 1 hour, 11 minutes ago
Description : Session tokens and passwords in couch-auth 0.21.2 are stored in JavaScript objects and remain in memory without explicit clearing in src/user.ts lines 700-707. This creates a window of opportunity for sensitive data extraction through memory dumps, debugging tools, or other memory access techniques, potentially leading to session hijacking.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-60796 - phpPgAdmin Cross-Site Scripting Vulnerability

CVE ID : CVE-2025-60796
Published : Nov. 20, 2025, 3:17 p.m. | 1 hour, 11 minutes ago
Description : phpPgAdmin 7.13.0 and earlier contains multiple cross-site scripting (XSS) vulnerabilities across various components. User-supplied input from $_REQUEST parameters is reflected in HTML output without proper encoding or sanitization in multiple locations including sequences.php, indexes.php, admin.php, and other unspecified files. An attacker can exploit these vulnerabilities to execute arbitrary JavaScript in victims' browsers, potentially leading to session hijacking, credential theft, or other malicious actions.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-60797 - phpPgAdmin SQL Injection Vulnerability

CVE ID : CVE-2025-60797
Published : Nov. 20, 2025, 3:17 p.m. | 1 hour, 11 minutes ago
Description : phpPgAdmin 7.13.0 and earlier contains a SQL injection vulnerability in dataexport.php at line 118. The application directly executes user-supplied SQL queries from the $_REQUEST['query'] parameter without any sanitization or parameterization via $data->conn->Execute($_REQUEST['query']). An authenticated attacker can exploit this vulnerability to execute arbitrary SQL commands, potentially leading to complete database compromise, data theft, or privilege escalation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-60798 - phpPgAdmin SQL Injection Vulnerability

CVE ID : CVE-2025-60798
Published : Nov. 20, 2025, 3:17 p.m. | 1 hour, 11 minutes ago
Description : phpPgAdmin 7.13.0 and earlier contains a SQL injection vulnerability in display.php at line 396. The application passes user-controlled input from $_REQUEST['query'] directly to the browseQuery function without proper sanitization. An authenticated attacker can exploit this vulnerability to execute arbitrary SQL commands through malicious query manipulation, potentially leading to complete database compromise.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-60799 - phpPgAdmin Incorrect Access Control Session Manipulation Vulnerability

CVE ID : CVE-2025-60799
Published : Nov. 20, 2025, 3:17 p.m. | 1 hour, 11 minutes ago
Description : phpPgAdmin 7.13.0 and earlier contains an incorrect access control vulnerability in sql.php at lines 68-76. The application allows unauthorized manipulation of session variables by accepting user-controlled parameters ('subject', 'server', 'database', 'queryid') without proper validation or access control checks. Attackers can exploit this to store arbitrary SQL queries in $_SESSION['sqlquery'] by manipulating these parameters, potentially leading to session poisoning, stored cross-site scripting, or unauthorized access to sensitive session data.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-65220 - Tenda AC21 Buffer Overflow Vulnerability

CVE ID : CVE-2025-65220
Published : Nov. 20, 2025, 3:17 p.m. | 1 hour, 11 minutes ago
Description : Tenda AC21 V16.03.08.16 is vulnerable to Buffer Overflow in: /goform/SetVirtualServerCfg via the list parameter.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-65221 - Tenda PPTP Buffer Overflow Vulnerability

CVE ID : CVE-2025-65221
Published : Nov. 20, 2025, 3:17 p.m. | 1 hour, 11 minutes ago
Description : Tenda AC21 V16.03.08.16 is vulnerable to Buffer Overflow via the list parameter of /goform/setPptpUserList.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-65222 - Tenda AC21 Buffer Overflow Vulnerability

CVE ID : CVE-2025-65222
Published : Nov. 20, 2025, 3:17 p.m. | 1 hour, 11 minutes ago
Description : Tenda AC21 V16.03.08.16 is vulnerable to Buffer Overflow via the rebootTime parameter of /goform/SetSysAutoRebbotCfg.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-65223 - Tenda AC21 Buffer Overflow

CVE ID : CVE-2025-65223
Published : Nov. 20, 2025, 3:17 p.m. | 1 hour, 11 minutes ago
Description : Tenda AC21 V16.03.08.16 is vulnerable to Buffer Overflow via the urls parameter of /goform/saveParentControlInfo.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-65226 - Tenda AC21 Buffer Overflow Vulnerability

CVE ID : CVE-2025-65226
Published : Nov. 20, 2025, 3:17 p.m. | 1 hour, 11 minutes ago
Description : Tenda AC21 V16.03.08.16 is vulnerable to Buffer Overflow via the deviceId parameter in /goform/saveParentControlInfo.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-36161 - IBM Concert Software Information Disclosure

CVE ID : CVE-2025-36161
Published : Nov. 20, 2025, 3:26 p.m. | 1 hour, 2 minutes ago
Description : IBM Concert 1.0.0 through 2.0.0 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict-Transport-Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.
Severity: 5.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13425 - Denial of Service in OSV-SCALIBR

CVE ID : CVE-2025-13425
Published : Nov. 20, 2025, 3:30 p.m. | 58 minutes ago
Description : A bug in the filesystem traversal fallback path causes fs/diriterate/diriterate.go:Next() to overindex an empty slice when ReadDir returns nil for an empty directory, resulting in a panic (index out of range) and an application crash (denial of service) in OSV-SCALIBR.
Severity: 1.9 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-34320 - BASIS BBj < 25.00 Unauthenticated Arbitrary File Read RCE

CVE ID : CVE-2025-34320
Published : Nov. 20, 2025, 3:31 p.m. | 57 minutes ago
Description : BASIS BBj versions prior to 25.00 contain a Jetty-served web endpoint that fails to properly validate or canonicalize input path segments. This allows unauthenticated directory traversal sequences to cause the server to read arbitrary system files accessible to the account running the service. Retrieved configuration artifacts may contain account credentials used for BBj Enterprise Manager; possession of these credentials enables administrative access and use of legitimate management functionality that can result in execution of system commands under the service account. Depending on the operating system and the privileges of the BBj service account, this issue may also allow access to other sensitive files on the host, including operating system or application data, potentially exposing additional confidential information.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62293 - Broken Access Control in SOPlanning

CVE ID : CVE-2025-62293
Published : Nov. 20, 2025, 3:43 p.m. | 45 minutes ago
Description : SOPlanning is vulnerable to Broken Access Control in /status endpoint. Due to lack of permission checks in Project Status functionality an authenticated attacker is able to add, edit and delete any status. This issue was fixed in version 1.54.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62294 - Predictable Generation of Password Recovery Token

CVE ID : CVE-2025-62294
Published : Nov. 20, 2025, 3:43 p.m. | 45 minutes ago
Description : SOPlanning is vulnerable to Predictable Generation of Password Recovery Token. Due to weak mechanism of generating recovery tokens, a malicious attacker is able to brute-force all possible values and takeover any account in reasonable amount of time. This issue was fixed in version 1.54.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62295 - Stored XSS in SOPlanning

CVE ID : CVE-2025-62295
Published : Nov. 20, 2025, 3:43 p.m. | 44 minutes ago
Description : SOPlanning is vulnerable to Stored XSS in /groupe_form endpoint. Malicious attacker with medium privileges can inject arbitrary HTML and JS into website, which will be rendered/executed when opening editor. This issue was fixed in version 1.54.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62296 - Stored XSS in SOPlanning

CVE ID : CVE-2025-62296
Published : Nov. 20, 2025, 3:43 p.m. | 44 minutes ago
Description : SOPlanning is vulnerable to Stored XSS in /taches endpoint. Malicious attacker with medium privileges can inject arbitrary HTML and JS into website, which will be rendered/executed when opening editor. This issue was fixed in version 1.54.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62297 - Stored XSS in SOPlanning

CVE ID : CVE-2025-62297
Published : Nov. 20, 2025, 3:43 p.m. | 44 minutes ago
Description : SOPlanning is vulnerable to Stored XSS in /projets endpoint. Malicious attacker with medium privileges can inject arbitrary HTML and JS into website, which will be rendered/executed when opening edited page. This issue was fixed in version 1.54.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62729 - Stored XSS in SOPlanning

CVE ID : CVE-2025-62729
Published : Nov. 20, 2025, 3:43 p.m. | 44 minutes ago
Description : SOPlanning is vulnerable to Stored XSS in /status endpoint. Malicious attacker with an account can inject arbitrary HTML and JS into website, which will be rendered/executed when opening multiple pages. This issue was fixed in version 1.54.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62730 - Privilege Escalation via Incorrect Authorization in SOPlanning

CVE ID : CVE-2025-62730
Published : Nov. 20, 2025, 3:44 p.m. | 44 minutes ago
Description : SOPlanning is vulnerable to Privilege Escalation in user management tab. Users with user_manage_team role are allowed to modify permissions of users. However, they are able to assign administrative permissions to any user including themselves. This allow a malicious authenticated attacker with this role to escalate to admin privileges. This issue affects both Bulk Update functionality and regular edition of user's right and privileges. This issue was fixed in version 1.54.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...