CVE tracker
286 subscribers
3.89K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-61610 - NR Modem Denial of Service Vulnerability

CVE ID : CVE-2025-61610
Published : Dec. 1, 2025, 8:15 a.m. | 1 hour, 15 minutes ago
Description : In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-61617 - "NR Modem Denial of Service Vulnerability"

CVE ID : CVE-2025-61617
Published : Dec. 1, 2025, 8:15 a.m. | 1 hour, 15 minutes ago
Description : In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-61618 - NR Modem Denial of Service

CVE ID : CVE-2025-61618
Published : Dec. 1, 2025, 8:15 a.m. | 1 hour, 15 minutes ago
Description : In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-61619 - "NR Modem Denial of Service Vulnerability"

CVE ID : CVE-2025-61619
Published : Dec. 1, 2025, 8:15 a.m. | 1 hour, 15 minutes ago
Description : In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13815 - moxi159753 Mogu Blog v2 pictures unrestricted upload

CVE ID : CVE-2025-13815
Published : Dec. 1, 2025, 9:16 a.m. | 14 minutes ago
Description : A weakness has been identified in moxi159753 Mogu Blog v2 up to 5.2. The affected element is an unknown function of the file /file/pictures. This manipulation of the argument filedatas causes unrestricted upload. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13816 - moxi159753 Mogu Blog v2 ZIP File unzipFile FileOperation.unzip path traversal

CVE ID : CVE-2025-13816
Published : Dec. 1, 2025, 9:16 a.m. | 14 minutes ago
Description : A security vulnerability has been detected in moxi159753 Mogu Blog v2 up to 5.2. The impacted element is the function FileOperation.unzip of the file /networkDisk/unzipFile of the component ZIP File Handler. Such manipulation of the argument fileUrl leads to path traversal. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13819 - Open redirect in web server of MiR robots and MiR fleet

CVE ID : CVE-2025-13819
Published : Dec. 1, 2025, 10:15 a.m. | 3 hours, 16 minutes ago
Description : Open redirect in the web server component of MiR Robot and Fleet software allows a remote attacker to redirect users to arbitrary external websites via a crafted parameter, facilitating phishing or social engineering attacks.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41700 - CODESYS Development System - Deserialization of Untrusted Data

CVE ID : CVE-2025-41700
Published : Dec. 1, 2025, 10:16 a.m. | 3 hours, 16 minutes ago
Description : An unauthenticated attacker can trick a local user into executing arbitrary code by opening a deliberately manipulated CODESYS project file with a CODESYS development system. This arbitrary code is executed in the user context.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41738 - CODESYS Control - Invalid type usage in visualization

CVE ID : CVE-2025-41738
Published : Dec. 1, 2025, 10:16 a.m. | 3 hours, 16 minutes ago
Description : An unauthenticated remote attacker may cause the visualisation server of the CODESYS Control runtime system to access a resource with a pointer of wrong type, potentially leading to a denial-of-service (DoS) condition.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41739 - CODESYS Control - Linux/QNX SysSocket flaw

CVE ID : CVE-2025-41739
Published : Dec. 1, 2025, 10:16 a.m. | 3 hours, 16 minutes ago
Description : An unauthenticated remote attacker, who beats a race condition, can exploit a flaw in the communication servers of the CODESYS Control runtime system on Linux and QNX to trigger an out-of-bounds read via crafted socket communication, potentially causing a denial of service.
Severity: 5.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-2879 - Mali GPU Kernel Driver allows improper GPU processing operations

CVE ID : CVE-2025-2879
Published : Dec. 1, 2025, 11:15 a.m. | 2 hours, 16 minutes ago
Description : Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform improper GPU processing operations to expose sensitive data.This issue affects Valhall GPU Kernel Driver: from r29p0 through r49p4, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r49p4, from r50p0 through r54p0.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41070 - Reflected Cross-site Scripting (XSS) in Sanoma's Clickedu

CVE ID : CVE-2025-41070
Published : Dec. 1, 2025, 11:15 a.m. | 2 hours, 16 minutes ago
Description : Reflected Cross-site Scripting (XSS) vulnerability in Sanoma's Clickedu. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL in '/students/carpetes_varies.php'. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.
Severity: 4.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59789 - Apache bRPC: Stack Exhaustion via Unbounded Recursion in JSON Parser

CVE ID : CVE-2025-59789
Published : Dec. 1, 2025, 11:15 a.m. | 2 hours, 16 minutes ago
Description : Uncontrolled recursion in the json2pb component in Apache bRPC (version < 1.15.0) on all platforms allows remote attackers to make the server crash via sending deep recursive json data. Root Cause: The bRPC json2pb component uses rapidjson to parse json data from the network. The rapidjson parser uses a recursive parsing method by default. If the input json has a large depth of recursive structure, the parser function may run into stack overflow. Affected Scenarios: Use bRPC server with protobuf message to serve http+json requests from untrusted network. Or directly use JsonToProtoMessage to convert json from untrusted input. How to Fix: (Choose one of the following options)  1. Upgrade bRPC to version 1.15.0, which fixes this issue. 2. Apply this patch: https://github.com/apache/brpc/pull/3099 Note: No matter which option you choose, you should know that the fix introduces a recursion depth limit with default value 100. It affects these functions:  ProtoMessageToJson, ProtoMessageToProtoJson, JsonToProtoMessage, and ProtoJsonToProtoMessage. If your requests contain json or protobuf messages that have a depth exceeding the limit, the request will be failed after applying the fix. You can modify the gflag json2pb_max_recursion_depth to change the limit.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-6349 - Mali GPU Kernel Driver allows improper GPU memory processing operations

CVE ID : CVE-2025-6349
Published : Dec. 1, 2025, 11:15 a.m. | 2 hours, 16 minutes ago
Description : Use After Free vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform improper GPU memory processing operations to gain access to already freed memory.This issue affects Valhall GPU Kernel Driver: from r53p0 through r54p1; Arm 5th Gen GPU Architecture Kernel Driver: from r53p0 through r54p1.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-8045 - Mali GPU Kernel Driver allows improper GPU processing operations

CVE ID : CVE-2025-8045
Published : Dec. 1, 2025, 11:15 a.m. | 2 hours, 16 minutes ago
Description : Use After Free vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform improper GPU processing operations to gain access to already freed memory.This issue affects Valhall GPU Kernel Driver: from r53p0 through r54p1; Arm 5th Gen GPU Architecture Kernel Driver: from r53p0 through r54p1.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13296 - CSRF in Tekrom Technology's T-Soft E-Commerce

CVE ID : CVE-2025-13296
Published : Dec. 1, 2025, 12:15 p.m. | 1 hour, 16 minutes ago
Description : Cross-Site Request Forgery (CSRF) vulnerability in Tekrom Technology Inc. T-Soft E-Commerce allows Cross Site Request Forgery.This issue affects T-Soft E-Commerce: through 28112025.
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-58408 - GPU DDK - KASAN Read UAF in the PVRSRVBridgeRGXSubmitTransfer2 due to improper error handling code

CVE ID : CVE-2025-58408
Published : Dec. 1, 2025, 12:15 p.m. | 1 hour, 16 minutes ago
Description : Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger reads of stale data that can lead to kernel exceptions and write use-after-free. The Use After Free common weakness enumeration was chosen as the stale data can include handles to resources in which the reference counts can become unbalanced. This can lead to the premature destruction of a resource while in use.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-49642 - Agent builds for AIX vulnerable to library loading hijacking

CVE ID : CVE-2025-49642
Published : Dec. 1, 2025, 1:03 p.m. | 29 minutes ago
Description : Library loading on AIX Zabbix Agent builds can be hijacked by local users with write access to the /home/cecuser directory.
Severity: 5.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-49643 - Frontend DoS vulnerability due to asymmetric resource consumption

CVE ID : CVE-2025-49643
Published : Dec. 1, 2025, 1:05 p.m. | 27 minutes ago
Description : An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.
Severity: 6.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-12106 - OpenVPN Heap Buffer Over-Read Vulnerability

CVE ID : CVE-2025-12106
Published : Dec. 1, 2025, 1:16 p.m. | 16 minutes ago
Description : Insufficient argument validation in OpenVPN 2.7_alpha1 through 2.7_rc1 allows an attacker to trigger a heap buffer over-read when parsing IP addresses
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-27232 - Frontend arbitrary file read in oauth.authorize action

CVE ID : CVE-2025-27232
Published : Dec. 1, 2025, 1:16 p.m. | 16 minutes ago
Description : An authenticated Zabbix Super Admin can exploit the oauth.authorize action to read arbitrary files from the webserver leading to potential confidentiality loss.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...