CVE tracker
289 subscribers
3.92K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-62297 - Stored XSS in SOPlanning

CVE ID : CVE-2025-62297
Published : Nov. 20, 2025, 3:43 p.m. | 44 minutes ago
Description : SOPlanning is vulnerable to Stored XSS in /projets endpoint. Malicious attacker with medium privileges can inject arbitrary HTML and JS into website, which will be rendered/executed when opening edited page. This issue was fixed in version 1.54.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62729 - Stored XSS in SOPlanning

CVE ID : CVE-2025-62729
Published : Nov. 20, 2025, 3:43 p.m. | 44 minutes ago
Description : SOPlanning is vulnerable to Stored XSS in /status endpoint. Malicious attacker with an account can inject arbitrary HTML and JS into website, which will be rendered/executed when opening multiple pages. This issue was fixed in version 1.54.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62730 - Privilege Escalation via Incorrect Authorization in SOPlanning

CVE ID : CVE-2025-62730
Published : Nov. 20, 2025, 3:44 p.m. | 44 minutes ago
Description : SOPlanning is vulnerable to Privilege Escalation in user management tab. Users with user_manage_team role are allowed to modify permissions of users. However, they are able to assign administrative permissions to any user including themselves. This allow a malicious authenticated attacker with this role to escalate to admin privileges. This issue affects both Bulk Update functionality and regular edition of user's right and privileges. This issue was fixed in version 1.54.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62731 - Stored XSS in SOPlanning

CVE ID : CVE-2025-62731
Published : Nov. 20, 2025, 3:44 p.m. | 44 minutes ago
Description : SOPlanning is vulnerable to Stored XSS in /feries endpoint. Malicious attacker with access to public holidays feature is able to inject arbitrary HTML and JS into website, which will be rendered/executed when opening multiple pages. By default only administrators and users with special privileges are able to access this endpoint. This issue was fixed in version 1.54.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62709 - ClipBucket v5 is vulnerable to password reset link manipulation

CVE ID : CVE-2025-62709
Published : Nov. 20, 2025, 5:15 p.m. | 3 hours, 13 minutes ago
Description : ClipBucket v5 is an open source video sharing platform. In ClipBucket version 5.5.2, a change to network.class.php causes the application to dynamically build the server URL from the incoming HTTP Host header when the configuration base_url is not set. Because Host is a client-controlled header, an attacker can supply an arbitrary Host value. This allows an attacker to cause password-reset links (sent by forget.php) to be generated with the attacker’s domain. If a victim follows that link and enters their activation code on the attacker-controlled domain, the attacker can capture the code and use it to reset the victim’s password and take over the account. This issue has been patched in version 5.5.2#162.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62724 - Open OnDemand allowlist bypass using symlinks in directory downloads (TOCTOU)

CVE ID : CVE-2025-62724
Published : Nov. 20, 2025, 5:15 p.m. | 3 hours, 13 minutes ago
Description : Open OnDemand is an open-source HPC portal. Prior to versions 4.0.8 and 3.1.16, users can craft a "Time of Check to Time of Use" (TOCTOU) attack when downloading zip files to access files outside of the OOD_ALLOWLIST. This vulnerability impacts sites that use the file browser allowlists in all current versions of OOD. However, files accessed are still protected by the UNIX permissions. Open OnDemand versions 4.0.8 and 3.1.16 have been patched for this vulnerability.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-63848 - SWISH Prolog Stored XSS Vulnerability

CVE ID : CVE-2025-63848
Published : Nov. 20, 2025, 5:15 p.m. | 3 hours, 13 minutes ago
Description : Stored cross site scripting (xss) vulnerability in SWISH prolog thru 2.2.0 allowing attackers to execute arbitrary code via crafted web IDE notebook.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-64027 - Snipe-IT Reflected Cross-Site Scripting Vulnerability

CVE ID : CVE-2025-64027
Published : Nov. 20, 2025, 5:15 p.m. | 3 hours, 13 minutes ago
Description : Snipe-IT v8.3.4 (build 20218) contains a reflected cross-site scripting (XSS) vulnerability in the CSV Import workflow. When an invalid CSV file is uploaded, the application returns a progress_message value that is rendered as raw HTML in the admin interface. An attacker can intercept and modify the POST /livewire/update request to inject arbitrary HTML or JavaScript into the progress_message. Because the server accepts the modified input without sanitization and reflects it back to the user, arbitrary JavaScript executes in the browser of any authenticated admin who views the import page.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-64185 - Open OnDemand RPM packages create world writable locations

CVE ID : CVE-2025-64185
Published : Nov. 20, 2025, 5:15 p.m. | 3 hours, 13 minutes ago
Description : Open OnDemand is an open-source HPC portal. Prior to versions 4.0.8 and 3.1.16, Open OnDemand packages create world writable locations in the GEM_PATH. Open OnDemand versions 4.0.8 and 3.1.16 have been patched for this vulnerability.
Severity: 6.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-64428 - DataEase DB2 JNDI Vulnerability

CVE ID : CVE-2025-64428
Published : Nov. 20, 2025, 5:15 p.m. | 3 hours, 13 minutes ago
Description : Dataease is an open source data visualization analysis tool. Versions prior to 2.10.17 are vulnerable to JNDI injection. A blacklist was added in the patch for version 2.10.14. However, JNDI injection remains possible via the iiop, corbaname, and iiopname schemes. The vulnerability has been fixed in version 2.10.17.
Severity: 8.9 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-63888 - ThinkPHP File Template Driver Remote Code Execution Vulnerability

CVE ID : CVE-2025-63888
Published : Nov. 20, 2025, 6:15 p.m. | 2 hours, 13 minutes ago
Description : The read function in file thinkphp\library\think\template\driver\File.php in ThinkPHP 5.0.24 contains a remote code execution vulnerability.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-63889 - ThinkPHP Template Path Traversal Vulnerability

CVE ID : CVE-2025-63889
Published : Nov. 20, 2025, 6:15 p.m. | 2 hours, 13 minutes ago
Description : The fetch function in file thinkphp\library\think\Template.php in ThinkPHP 5.0.24 allows attackers to read arbitrary files via crafted file path in a template value.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-64524 - CUPS rastertopclx Filter Vulnerable to Heap Buffer Overflow Leading to Potential Arbitrary Code Execution

CVE ID : CVE-2025-64524
Published : Nov. 20, 2025, 6:15 p.m. | 2 hours, 13 minutes ago
Description : cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In versions 2.0.1 and prior, a heap-buffer-overflow vulnerability in the rastertopclx filter causes the program to crash with a segmentation fault when processing maliciously crafted input data. This issue can be exploited to trigger memory corruption, potentially leading to arbitrary code execution. This issue has been patched via commit 956283c.
Severity: 3.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52667 - Revive Adserver Stored XSS Vulnerability

CVE ID : CVE-2025-52667
Published : Nov. 20, 2025, 7:10 p.m. | 1 hour, 19 minutes ago
Description : Missing JSON Content-Type header in a script in Revive Adserver 6.0.1 and 5.5.2 and earlier versions causes a stored XSS attack to be possible for a logged in manager user.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52670 - Revive Adserver Unauthenticated Remote Code Execution

CVE ID : CVE-2025-52670
Published : Nov. 20, 2025, 7:10 p.m. | 1 hour, 19 minutes ago
Description : Missing authorization check in Revive Adserver 5.5.2 and 6.0.1 and earlier versions causes users on the system to delete banners owned by other accounts
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-55124 - Revive Adserver Reflected Cross-Site Scripting Vulnerability

CVE ID : CVE-2025-55124
Published : Nov. 20, 2025, 7:10 p.m. | 1 hour, 19 minutes ago
Description : Improper neutralisation of input in Revive Adserver 6.0.0+ causes a reflected XSS attack in the banner-zone.php script.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52669 - Revive Adserver User Information Disclosure Vulnerability

CVE ID : CVE-2025-52669
Published : Nov. 20, 2025, 7:10 p.m. | 1 hour, 19 minutes ago
Description : Insecure design policies in the user management system of Revive Adserver 5.5.2 and 6.0.1 and earlier versions causes non-admin users to have access to the contact name and email address of other users on the system.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52666 - Revive Adserver Format String Vulnerability

CVE ID : CVE-2025-52666
Published : Nov. 20, 2025, 7:10 p.m. | 1 hour, 19 minutes ago
Description : Improper neutralisation of format characters in the settings of Revive Adserver 5.5.2 and 6.0.1 and earlier versions causes an administrator user to disable the admin user console due to a fatal PHP error.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52671 - Revive Adserver SQL Error Message Debug Information Disclosure

CVE ID : CVE-2025-52671
Published : Nov. 20, 2025, 7:10 p.m. | 1 hour, 19 minutes ago
Description : Debug information disclosure in the SQL error message to in Revive Adserver 5.5.2 and 6.0.1 and earlier versions causes non-admin users to acquire information about the software, PHP and database versions currently in use.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-55123 - Revive Adserver Cross-Site Scripting (XSS)

CVE ID : CVE-2025-55123
Published : Nov. 20, 2025, 7:10 p.m. | 1 hour, 19 minutes ago
Description : Improper neutralization of input in Revive Adserver 5.5.2 and 6.0.1 and earlier versions causes manager accounts to be able to craft XSS attacks to their own advertiser users.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-48987 - Revive Adserver Reflected Cross-Site Scripting Vulnerability

CVE ID : CVE-2025-48987
Published : Nov. 20, 2025, 7:11 p.m. | 1 hour, 17 minutes ago
Description : Improper Neutralization of Input in Revive Adserver 5.5.2 and 6.0.1 and earlier versions causes a potential reflected XSS attack.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...