CVE tracker
285 subscribers
3.92K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-0005 - Apache Xerces Integer Overflow Vulnerability

CVE ID : CVE-2025-0005
Published : Nov. 24, 2025, 8:15 p.m. | 2 hours, 36 minutes ago
Description : Improper input validation within the XOCL driver may allow a local attacker to generate an integer overflow condition, potentially resulting in crash or denial of service.
Severity: 7.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52539 - Xilinx Run Time Environment Buffer Overflow Vulnerability

CVE ID : CVE-2025-52539
Published : Nov. 24, 2025, 8:15 p.m. | 2 hours, 36 minutes ago
Description : A buffer overflow with Xilinx Run Time Environment may allow a local attacker to read or corrupt data from the advanced extensible interface (AXI), potentially resulting in loss of confidentiality, integrity, and/or availability.
Severity: 7.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-56400 - Tuya Smart OAuth CSRF Vulnerability

CVE ID : CVE-2025-56400
Published : Nov. 24, 2025, 8:15 p.m. | 2 hours, 36 minutes ago
Description : Cross-Site Request Forgery (CSRF) vulnerability in the OAuth implementation of the Tuya SDK 6.5.0 for Android and iOS, affects the Tuya Smart and Smartlife mobile applications, as well as other third-party applications that integrate the SDK, allows an attacker to link their own Amazon Alexa account to a victim's Tuya account. The applications fail to validate the OAuth state parameter during the account linking flow, enabling a cross-site request forgery (CSRF)-like attack. By tricking the victim into clicking a crafted authorization link, an attacker can complete the OAuth flow on the victim's behalf, resulting in unauthorized Alexa access to the victim's Tuya-connected devices. This affects users regardless of prior Alexa linkage and does not require the Tuya application to be active at the time. Successful exploitation may allow remote control of devices such as cameras, doorbells, door locks, or alarms.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-63914 - Cinnamon Kotaemon ZIP Bomb Denial of Service (DoS)

CVE ID : CVE-2025-63914
Published : Nov. 24, 2025, 8:15 p.m. | 2 hours, 36 minutes ago
Description : An issue was discovered in Cinnamon kotaemon 0.11.0. The _may_extract_zip function in the \libs\ktem\ktem\index\file\ui.py file does not check the contents of uploaded ZIP files. Although the contents are extracted into a temporary folder that is cleared before each extraction, successfully uploading a ZIP bomb could still cause the server to consume excessive resources during decompression. Moreover, if no further files are uploaded afterward, the extracted data could occupy disk space and potentially render the system unavailable. Anyone with permission to upload files can carry out this attack.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-64047 - OpenRapid RapidCMS Cross Site Scripting (XSS)

CVE ID : CVE-2025-64047
Published : Nov. 24, 2025, 8:15 p.m. | 2 hours, 36 minutes ago
Description : OpenRapid RapidCMS 1.3.1 is vulnerable to Cross Site Scripting (XSS) in /user/user-move.php.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-64048 - YCCMS Stored XSS Vulnerability

CVE ID : CVE-2025-64048
Published : Nov. 24, 2025, 8:15 p.m. | 2 hours, 36 minutes ago
Description : YCCMS 3.4 contains a stored cross-site scripting (XSS) vulnerability in the article management functionality. The vulnerability exists in the add() and getPost() functions within the ArticleAction.class.php file due to improper neutralization of user input in the article title field.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2018-25126 - TVT NVMS-9000 Hard-coded API Credentials & Command Injection

CVE ID : CVE-2018-25126
Published : Nov. 24, 2025, 9:16 p.m. | 1 hour, 36 minutes ago
Description : Shenzhen TVT Digital Technology Co., Ltd. NVMS-9000 firmware (used by many white-labeled DVR/NVR/IPC products) contains hardcoded API credentials and an OS command injection flaw in its configuration services. The web/API interface accepts HTTP/XML requests authenticated with a fixed vendor credential string and passes user-controlled fields into shell execution contexts without proper argument sanitization. An unauthenticated remote attacker can leverage the hard-coded credential to access endpoints such as /editBlackAndWhiteList and inject shell metacharacters inside XML parameters, resulting in arbitrary command execution as root. The same vulnerable backend is also reachable in some models through a proprietary TCP service on port 4567 that accepts a magic GUID preface and base64-encoded XML, enabling the same command injection sink. Firmware releases from mid-February 2018 and later are reported to have addressed this issue. Exploitation evidence was observed by the Shadowserver Foundation on 2025-01-28 UTC.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2023-7330 - Ruijie Networks NBR Routers Unauthenticated Arbitrary File Upload via fileupload.php

CVE ID : CVE-2023-7330
Published : Nov. 24, 2025, 9:16 p.m. | 1 hour, 36 minutes ago
Description : Ruijie NBR series routers contain an unauthenticated arbitrary file upload vulnerability via /ddi/server/fileupload.php. The endpoint accepts attacker-supplied values in the name and uploadDir parameters and saves the provided multipart file content without adequate validation or sanitization of file type, path, or extension. A remote attacker can upload a crafted PHP file and then access it from the web root, resulting in arbitrary code execution in the context of the web service. Exploitation evidence was observed by the Shadowserver Foundation on 2025-01-14 UTC.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-14007 - TVT NVMS-9000 < 1.3.4 Unauthenticated Administrative Queries & Information Disclosure

CVE ID : CVE-2024-14007
Published : Nov. 24, 2025, 9:16 p.m. | 1 hour, 36 minutes ago
Description : Shenzhen TVT Digital Technology Co., Ltd. NVMS-9000 firmware (used by many white-labeled DVR/NVR/IPC products) versions prior to 1.3.4 contain an authentication bypass in the NVMS-9000 control protocol. By sending a single crafted TCP payload to an exposed NVMS-9000 control port, an unauthenticated remote attacker can invoke privileged administrative query commands without valid credentials. Successful exploitation discloses sensitive information including administrator usernames and passwords in cleartext, network and service configuration, and other device details via commands such as queryBasicCfg, queryUserList, queryEmailCfg, queryPPPoECfg, and queryFTPCfg.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-0003 - Xilinx Run Time Use-After-Free Vulnerability

CVE ID : CVE-2025-0003
Published : Nov. 24, 2025, 9:16 p.m. | 1 hour, 36 minutes ago
Description : Inadequate lock protection within Xilinx Run time may allow a local attacker to trigger a Use-After-Free condition potentially resulting in loss of confidentiality or availability
Severity: 7.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-0007 - Xilinx Run Time Privilege Escalation Vulnerability

CVE ID : CVE-2025-0007
Published : Nov. 24, 2025, 9:16 p.m. | 1 hour, 36 minutes ago
Description : Insufficient validation within Xilinx Run Time framework could allow a local attacker to escalate privileges from user space to kernel space, potentially compromising confidentiality, integrity, and/or availability.
Severity: 5.7 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-29933 - AMD uProf Out-of-Bounds Write Vulnerability

CVE ID : CVE-2025-29933
Published : Nov. 24, 2025, 9:16 p.m. | 1 hour, 36 minutes ago
Description : Improper input validation within AMD uProf can allow a local attacker to write out of bounds, potentially resulting in a crash or denial of service
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-36150 - IBM Concert Information Disclosure

CVE ID : CVE-2025-36150
Published : Nov. 24, 2025, 9:16 p.m. | 1 hour, 36 minutes ago
Description : IBM Concert 1.0.0 through 2.0.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
Severity: 5.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-48510 - AMD uProf Return Value Bypass Vulnerability

CVE ID : CVE-2025-48510
Published : Nov. 24, 2025, 9:16 p.m. | 1 hour, 36 minutes ago
Description : Improper return value within AMD uProf can allow a local attacker to bypass KSLR, potentially resulting in loss of confidentiality or availability.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-48511 - AMD Uprof Use-After-Free Memory Corruption Vulnerability

CVE ID : CVE-2025-48511
Published : Nov. 24, 2025, 9:16 p.m. | 1 hour, 36 minutes ago
Description : Improper input validation within AMD uprof can allow a local attacker to write to an arbitrary physical address, potentially resulting in crash or denial of service.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52538 - Apache Xerces Integer Overflow Vulnerability

CVE ID : CVE-2025-52538
Published : Nov. 24, 2025, 9:16 p.m. | 1 hour, 36 minutes ago
Description : Improper input validation within the XOCL driver may allow a local attacker to generate an integer overflow condition, potentially resulting in loss of confidentiality or availability.
Severity: 8.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-63498 - Alinto SOGo Cross Site Scripting (XSS)

CVE ID : CVE-2025-63498
Published : Nov. 24, 2025, 9:16 p.m. | 1 hour, 36 minutes ago
Description : alinto SOGo 5.12.3 is vulnerable to Cross Site Scripting (XSS) via the "userName" parameter.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-47856 - RSA Authentication Agent Path Traversal Vulnerability

CVE ID : CVE-2024-47856
Published : Nov. 24, 2025, 10:15 p.m. | 36 minutes ago
Description : In RSA Authentication Agent before 7.4.7, service paths and shortcut paths may be vulnerable to path interception if the path has one or more spaces and is not surrounded by quotation marks. An adversary can place an executable in a higher-level directory of the path, and Windows will resolve that executable instead of the intended executable.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-54338 - Desktop Alert PingAlert Incorrect Access Control Hash Disclosure

CVE ID : CVE-2025-54338
Published : Nov. 24, 2025, 10:15 p.m. | 36 minutes ago
Description : An Incorrect Access Control vulnerability was found in the Application Server of Desktop Alert PingAlert version 6.1.0.11 to 6.1.1.2 which allows an attacker to disclose user hashes.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-54341 - Desktop Alert PingAlert Hardcoded Configuration Values Vulnerability

CVE ID : CVE-2025-54341
Published : Nov. 24, 2025, 10:15 p.m. | 36 minutes ago
Description : A vulnerability was found in the Application Server of Desktop Alert PingAlert version 6.1.0.11 to 6.1.1.2. There are Hard-coded configuration values.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-54347 - Desktop Alert PingAlert Directory Traversal Vulnerability

CVE ID : CVE-2025-54347
Published : Nov. 24, 2025, 10:15 p.m. | 36 minutes ago
Description : A Directory Traversal vulnerability was found in the Application Server of Desktop Alert PingAlert version 6.1.0.11 to 6.1.1.2 which allows an attacker to write arbitrary files under certain conditions.
Severity: 9.9 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...