CVE tracker
285 subscribers
3.9K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-13576 - code-projects Blog Site admin.php improper authorization

CVE ID : CVE-2025-13576
Published : Nov. 24, 2025, 1:15 a.m. | 1 hour, 32 minutes ago
Description : A vulnerability was detected in code-projects Blog Site 1.0. The affected element is an unknown function of the file /admin.php. Performing manipulation results in improper authorization. It is possible to initiate the attack remotely. The exploit is now public and may be used. Multiple endpoints are affected.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13578 - code-projects Library System Login index.php sql injection

CVE ID : CVE-2025-13578
Published : Nov. 24, 2025, 2:02 a.m. | 46 minutes ago
Description : A vulnerability has been found in code-projects Library System 1.0. This affects an unknown function of the file /index.php of the component Login. The manipulation of the argument Username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13577 - PHPGurukul Hostel Management System register-complaint.php cross site scripting

CVE ID : CVE-2025-13577
Published : Nov. 24, 2025, 2:15 a.m. | 32 minutes ago
Description : A flaw has been found in PHPGurukul Hostel Management System 2.1. The impacted element is an unknown function of the file /register-complaint.php. Executing manipulation of the argument cdetails can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been published and may be used.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13579 - code-projects Library System return.php sql injection

CVE ID : CVE-2025-13579
Published : Nov. 24, 2025, 3:16 a.m. | 3 hours, 33 minutes ago
Description : A vulnerability was found in code-projects Library System 1.0. This impacts an unknown function of the file /return.php. The manipulation of the argument ID results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13580 - code-projects Library System mail.php sql injection

CVE ID : CVE-2025-13580
Published : Nov. 24, 2025, 3:16 a.m. | 3 hours, 33 minutes ago
Description : A vulnerability was determined in code-projects Library System 1.0. Affected is an unknown function of the file /mail.php. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13581 - itsourcecode Student Information System schedule_edit1.php sql injection

CVE ID : CVE-2025-13581
Published : Nov. 24, 2025, 4:15 a.m. | 2 hours, 33 minutes ago
Description : A vulnerability was identified in itsourcecode Student Information System 1.0. Affected by this vulnerability is an unknown functionality of the file /schedule_edit1.php. Such manipulation of the argument schedule_id leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13582 - code-projects Jonnys Liquor GET Parameter detail.php sql injection

CVE ID : CVE-2025-13582
Published : Nov. 24, 2025, 4:15 a.m. | 2 hours, 33 minutes ago
Description : A security flaw has been discovered in code-projects Jonnys Liquor 1.0. Affected by this issue is some unknown functionality of the file /detail.php of the component GET Parameter Handler. Performing manipulation of the argument Product results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13589 - Otsuka Information Technology|FMS - Reflected Cross-site Scripting

CVE ID : CVE-2025-13589
Published : Nov. 24, 2025, 4:15 a.m. | 2 hours, 33 minutes ago
Description : FMS developed by Otsuka Information Technology has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13583 - code-projects Question Paper Generator POST Parameter signupscript.php sql injection

CVE ID : CVE-2025-13583
Published : Nov. 24, 2025, 5:15 a.m. | 1 hour, 33 minutes ago
Description : A weakness has been identified in code-projects Question Paper Generator 1.0. This affects an unknown part of the file /signupscript.php of the component POST Parameter Handler. Executing manipulation of the argument Fname can lead to sql injection. The attack can be executed remotely. The exploit has been made available to the public and could be exploited.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13584 - Eigenfocus Description cross site scripting

CVE ID : CVE-2025-13584
Published : Nov. 24, 2025, 5:16 a.m. | 1 hour, 33 minutes ago
Description : A security vulnerability has been detected in Eigenfocus up to 1.4.0. This vulnerability affects unknown code of the component Description Handler. The manipulation of the argument entry.description/time_entry.description leads to cross site scripting. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 1.4.1 is able to resolve this issue. The identifier of the patch is 7dec94c9d1f3e513e0ee38ba68caaba628e08582. Upgrading the affected component is advised.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-7402 - Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager <= 4.95 - Unauthenticated SQL Injection via site_id

CVE ID : CVE-2025-7402
Published : Nov. 24, 2025, 5:16 a.m. | 1 hour, 33 minutes ago
Description : The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to time-based SQL Injection via the ‘site_id’ parameter in all versions up to, and including, 4.95 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13586 - SourceCodester Online Student Clearance System changepassword.php sql injection

CVE ID : CVE-2025-13586
Published : Nov. 24, 2025, 6:02 a.m. | 47 minutes ago
Description : A flaw has been found in SourceCodester Online Student Clearance System 1.0. Impacted is an unknown function of the file /Admin/changepassword.php. This manipulation of the argument txtconfirm_password causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-14015 - Studiocart <= 2.9.0 - Reflected XSS

CVE ID : CVE-2024-14015
Published : Nov. 24, 2025, 6:15 a.m. | 34 minutes ago
Description : The WordPress eCommerce Plugin WordPress plugin through 2.9.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-12394 - Backup Migration < 2.0.0 - Unauthenticated Backup Download

CVE ID : CVE-2025-12394
Published : Nov. 24, 2025, 6:15 a.m. | 34 minutes ago
Description : The Backup Migration WordPress plugin before 2.0.0 does not properly generate its backup path in certain server configurations, allowing unauthenticated users to fetch a log that discloses the backup filename. The backup archive is then downloadable without authentication.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-12569 - WP Front User Submit < 5.0.0 - Open Redirect

CVE ID : CVE-2025-12569
Published : Nov. 24, 2025, 6:15 a.m. | 34 minutes ago
Description : The Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.0 does not validate a parameter before redirecting the user to its value, leading to an Open Redirect issue
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-12629 - Broken Link Manager <= 0.6.5 - Reflected XSS

CVE ID : CVE-2025-12629
Published : Nov. 24, 2025, 6:15 a.m. | 34 minutes ago
Description : The Broken Link Manager WordPress plugin through 0.6.5 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13585 - code-projects COVID Tracking System login.php sql injection

CVE ID : CVE-2025-13585
Published : Nov. 24, 2025, 6:15 a.m. | 34 minutes ago
Description : A vulnerability was detected in code-projects COVID Tracking System 1.0. This issue affects some unknown processing of the file /login.php. The manipulation of the argument code results in sql injection. The attack may be performed from remote. The exploit is now public and may be used.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13588 - lKinderBueno Streamity Xtream IPTV Player proxy.php server-side request forgery

CVE ID : CVE-2025-13588
Published : Nov. 24, 2025, 7:16 a.m. | 3 hours, 34 minutes ago
Description : A vulnerability was found in lKinderBueno Streamity Xtream IPTV Player up to 2.8. The impacted element is an unknown function of the file public/proxy.php. Performing manipulation results in server-side request forgery. The attack can be initiated remotely. The exploit has been made public and could be used. Upgrading to version 2.8.1 is sufficient to resolve this issue. The patch is named c70bfb8d36b47bfd64c5ec73917e1d9ddb97af92. It is suggested to upgrade the affected component.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13596 - Improper Error Handling Leading to Sensitive Information Disclosure in CIGES ≤ 2.15.6

CVE ID : CVE-2025-13596
Published : Nov. 24, 2025, 8:16 a.m. | 2 hours, 34 minutes ago
Description : A sensitive information disclosure vulnerability exists in the error handling component of ATISoluciones CIGES Application version 2.15.6 and earlier. When certain unexpected conditions trigger unhandled exceptions, the application returns detailed error messages and stack traces to the client. This may expose internal filesystem paths, SQL queries, database connection details, or environment configuration data to remote unauthenticated attackers. This issue allows information gathering and reconnaissance but does not enable direct system compromise.
Severity: 2.7 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-12739 - Cross-Site Scripting (XSS) in Looker's Extension Loader leading to Admin Account Compromise

CVE ID : CVE-2025-12739
Published : Nov. 24, 2025, 10:15 a.m. | 34 minutes ago
Description : An attacker with viewer permissions in Looker could craft a malicious URL that, when opened by a Looker admin, would execute an attacker-supplied script. Exploitation required at least one Looker extension installed on the instance. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 24.18.201+ * 25.0.79+ * 25.6.66+ * 25.12.7+ * 25.16.0+ * 25.18.0+ * 25.20.0+
Severity: 7.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-12740 - Remote Command Execution in Looker via IBM DB2 JDBC drive

CVE ID : CVE-2025-12740
Published : Nov. 24, 2025, 12:15 p.m. | 2 hours, 35 minutes ago
Description : A Looker user with a Developer role could create a database connection using IBM DB2 driver and, by manipulating LookML, cause Looker to execute a malicious command, due to inadequate filtering of the driver's parameters. Looker-hosted and Self-hosted were found to be vulnerable. This issue has already been mitigated for Looker-hosted instances. No user action is required for these. Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted. The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ : * 25.0.93+ * 25.6.84+ * 25.12.42+ * 25.14.50+ * 25.16.44+
Severity: 7.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...