CVE tracker
246 subscribers
3.26K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-64991 - Command Injection in 1E-PatchInsights-Deploy Instruction

CVE ID : CVE-2025-64991
Published : Dec. 11, 2025, 12:16 p.m. | 1 hour, 7 minutes ago
Description : A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-PatchInsights-Deploy instruction prior V15. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-64992 - Command Injection in 1E-Nomad-PauseNomadJobQueue Instruction

CVE ID : CVE-2025-64992
Published : Dec. 11, 2025, 12:16 p.m. | 1 hour, 7 minutes ago
Description : A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-PauseNomadJobQueue instruction prior V25. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-64993 - Command Injection in 1E-ConfigMgrConsoleExtensions Instructions

CVE ID : CVE-2025-64993
Published : Dec. 11, 2025, 12:16 p.m. | 1 hour, 7 minutes ago
Description : A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-ConfigMgrConsoleExtensions instructions. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-64994 - Privilege Escalation via Uncontrolled Search Path in 1E-Nomad-SetWorkRate instruction

CVE ID : CVE-2025-64994
Published : Dec. 11, 2025, 12:16 p.m. | 1 hour, 7 minutes ago
Description : A privilege escalation vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-SetWorkRate instruction prior V17.1. The improper handling of executable search paths could allow local attackers with write access to a PATH directory on a device to escalate privileges and execute arbitrary code as SYSTEM.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-64995 - Privilege Escalation via Process Hijacking in 1E-Exchange-NomadClientHealth-ConfigureGeneralSetting instruction

CVE ID : CVE-2025-64995
Published : Dec. 11, 2025, 12:16 p.m. | 1 hour, 7 minutes ago
Description : A privilege escalation vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Exchange-NomadClientHealth-ConfigureGeneralSetting instruction prior V3.4. Improper protection of the execution path on the local device allows attackers, with local access to the device during execution, to hijack the process and execute arbitrary code with SYSTEM privileges.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-14523 - Libsoup: libsoup: duplicate host header handling causes host-parsing discrepancy (first- vs last-value wins)

CVE ID : CVE-2025-14523
Published : Dec. 11, 2025, 12:30 p.m. | 52 minutes ago
Description : A flaw in libsoup’s HTTP header handling allows multiple Host: headers in a request and returns the last occurrence for server-side processing. Common front proxies often honor the first Host: header, so this mismatch can cause vhost confusion where a proxy routes a request to one backend but the backend interprets it as destined for another host. This discrepancy enables request-smuggling style attacks, cache poisoning, or bypassing host-based access controls when an attacker supplies duplicate Host headers.
Severity: 8.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-14522 - baowzh hfly upload_json.php unrestricted upload

CVE ID : CVE-2025-14522
Published : Dec. 11, 2025, 4:16 p.m. | 1 hour, 7 minutes ago
Description : A vulnerability was detected in baowzh hfly up to 638ff9abe9078bc977c132b37acbe1900b63491c. The impacted element is an unknown function of the file /Public/Kindeditor/php/upload_json.php. Performing manipulation of the argument imgFile results in unrestricted upload. It is possible to initiate the attack remotely. The exploit is now public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-55307 - Foxit PDF and Editor Out-of-Bounds Read Vulnerability

CVE ID : CVE-2025-55307
Published : Dec. 11, 2025, 4:16 p.m. | 1 hour, 7 minutes ago
Description : An issue was discovered in Foxit PDF and Editor for Windows before 13.2 and 2025 before 2025.2. Opening a malicious PDF containing a crafted JavaScript call to search.query() with a crafted cDIPath parameter (e.g., "/") may cause an out-of-bounds read in internal path-parsing logic, potentially leading to information disclosure or memory corruption.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-55308 - Foxit PDF and Editor Use-After-Free Information Disclosure Vulnerability

CVE ID : CVE-2025-55308
Published : Dec. 11, 2025, 4:16 p.m. | 1 hour, 7 minutes ago
Description : An issue was discovered in Foxit PDF and Editor for Windows before 13.2 and 2025 before 2025.2. A crafted PDF containing JavaScript that calls closeDoc() while internal objects are still in use can cause premature release of these objects. This use-after-free vulnerability may lead to memory corruption, potentially resulting in information disclosure when the PDF is opened.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-55309 - Foxit PDF and Editor Use-After-Free Vulnerability

CVE ID : CVE-2025-55309
Published : Dec. 11, 2025, 4:16 p.m. | 1 hour, 7 minutes ago
Description : An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13.2 and 2025 before 2025.2. A crafted PDF can contain JavaScript that attaches an OnBlur action on a form field that destroys an annotation. During user right-click interaction, the program's internal focus change handling prematurely releases the annotation object, resulting in a use-after-free vulnerability that may cause memory corruption or application crashes.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-55310 - Foxit PDF and Editor Cross-Site Scripting (XSS) Vulnerability

CVE ID : CVE-2025-55310
Published : Dec. 11, 2025, 4:16 p.m. | 1 hour, 7 minutes ago
Description : An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13.2 and 2025 before 2025.2. An attacker able to alter or replace the static HTML files used by the StartPage feature can cause the application to load malicious or compromised content upon startup. This may result in information disclosure, unauthorized data access, or other security impacts.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-55311 - Foxit PDF and Editor Annotation Content Manipulation Vulnerability

CVE ID : CVE-2025-55311
Published : Dec. 11, 2025, 4:16 p.m. | 1 hour, 7 minutes ago
Description : An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13.2 and 2025 before 2025.2. A crafted PDF can use JavaScript to alter annotation content and subsequently clear the file's modification status via JavaScript interfaces. This circumvents digital signature verification by hiding document modifications, allowing an attacker to mislead users about the document's integrity and compromise the trustworthiness of signed PDFs.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-55312 - Foxit PDF and Editor Memory Corruption Vulnerability

CVE ID : CVE-2025-55312
Published : Dec. 11, 2025, 4:16 p.m. | 1 hour, 7 minutes ago
Description : An issue was discovered in Foxit PDF and Editor for Windows before 13.2 and 2025 before 2025.2. When pages in a PDF are deleted via JavaScript, the application may fail to properly update internal states. Subsequent annotation management operations assume these states are valid, causing dereference of invalid or released memory. This can lead to memory corruption, application crashes, and potentially allow an attacker to execute arbitrary code.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-55313 - Foxit PDF and Editor Arbitrary Code Execution Vulnerability

CVE ID : CVE-2025-55313
Published : Dec. 11, 2025, 4:16 p.m. | 1 hour, 7 minutes ago
Description : An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13.2 and 2025 before 2025.2. They allow potential arbitrary code execution when processing crafted PDF files. The vulnerability stems from insufficient handling of memory allocation failures after assigning an extremely large value to a form field's charLimit property via JavaScript. This can result in memory corruption and may allow an attacker to execute arbitrary code by persuading a user to open a malicious file.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-55314 - Foxit PDF and Editor Memory Corruption Vulnerability

CVE ID : CVE-2025-55314
Published : Dec. 11, 2025, 4:16 p.m. | 1 hour, 7 minutes ago
Description : An issue was discovered in Foxit PDF and Editor for Windows and macOS before 13.2 and 2025 before 2025.2. When pages in a PDF are deleted via JavaScript, the application may fail to properly update internal states. Subsequent annotation management operations assume these states are valid, causing dereference of invalid or released memory. This can lead to memory corruption, application crashes, and potentially allow an attacker to execute arbitrary code.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59802 - Foxit PDF Signature Spoofing via OCG

CVE ID : CVE-2025-59802
Published : Dec. 11, 2025, 4:16 p.m. | 1 hour, 7 minutes ago
Description : Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via OCG. When Optional Content Groups (OCG) are supported, the state property of an OCG is runtime-only and not included in the digital signature computation buffer. An attacker can leverage JavaScript or PDF triggers to dynamically change the visibility of OCG content after signing (Post-Sign), allowing the visual content of a signed PDF to be modified without invalidating the signature. This may result in a mismatch between the signed content and what the signer or verifier sees, undermining the trustworthiness of the digital signature. The fixed versions are 2025.2.1, 14.0.1, and 13.2.1.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-59803 - Foxit PDF Editor and Reader Signature Spoofing Vulnerability

CVE ID : CVE-2025-59803
Published : Dec. 11, 2025, 4:16 p.m. | 1 hour, 7 minutes ago
Description : Foxit PDF Editor and Reader before 2025.2.1 allow signature spoofing via triggers. An attacker can embed triggers (e.g., JavaScript) in a PDF document that execute during the signing process. When a signer reviews the document, the content appears normal. However, once the signature is applied, the triggers modify content on other pages or optional content layers without explicit warning. This can cause the signed PDF to differ from what the signer saw, undermining the trustworthiness of the digital signature. The fixed versions are 2025.2.1, 14.0.1, and 13.2.1.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-67739 - JetBrains TeamCity Unvalidated Repository URL Disclosure

CVE ID : CVE-2025-67739
Published : Dec. 11, 2025, 4:16 p.m. | 1 hour, 7 minutes ago
Description : In JetBrains TeamCity before 2025.11.2 improper repository URL validation could lead to local paths disclosure
Severity: 3.1 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-67740 - JetBrains TeamCity GitHub App Token Metadata Access Control Vulnerability

CVE ID : CVE-2025-67740
Published : Dec. 11, 2025, 4:16 p.m. | 1 hour, 7 minutes ago
Description : In JetBrains TeamCity before 2025.11 improper access control could expose GitHub App token's metadata
Severity: 2.7 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-67741 - JetBrains TeamCity Stored XSS Vulnerability

CVE ID : CVE-2025-67741
Published : Dec. 11, 2025, 4:16 p.m. | 1 hour, 7 minutes ago
Description : In JetBrains TeamCity before 2025.11 stored XSS was possible via session attribute
Severity: 4.6 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-67742 - JetBrains TeamCity Arbitrary File Access Vulnerability

CVE ID : CVE-2025-67742
Published : Dec. 11, 2025, 4:16 p.m. | 1 hour, 7 minutes ago
Description : In JetBrains TeamCity before 2025.11 path traversal was possible via file upload
Severity: 3.8 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...