CVE tracker
237 subscribers
3.18K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-34440 - AVideo < 20.0 Open Redirect via siteRedirectUri Parameter

CVE ID : CVE-2025-34440
Published : Dec. 17, 2025, 7:48 p.m. | 16 minutes ago
Description : AVideo versions prior to 20.0 contain an open redirect vulnerability caused by insufficient validation of the siteRedirectUri parameter during user registration. Attackers can redirect users to external sites, facilitating phishing attacks.
Severity: 4.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-34439 - AVideo < 20.0 Open Redirect via cancelUri Parameter

CVE ID : CVE-2025-34439
Published : Dec. 17, 2025, 7:49 p.m. | 15 minutes ago
Description : AVideo versions prior to 20.0 are vulnerable to an open redirect flaw due to missing validation of the cancelUri parameter during user login. An attacker can craft a link to redirect users to arbitrary external sites, enabling phishing attacks.
Severity: 4.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-34434 - AVideo < 20.0 ImageGallery Plugin Unauthenticated File Upload and Deletion

CVE ID : CVE-2025-34434
Published : Dec. 17, 2025, 7:49 p.m. | 15 minutes ago
Description : AVideo versions prior to 20.0 with the ImageGallery plugin enabled is vulnerable to unauthenticated file upload and deletion. Plugin endpoints responsible for managing gallery images fail to enforce authentication checks and do not validate ownership, allowing unauthenticated attackers to upload or delete images associated with any image-based video.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-34436 - AVideo < 20.0 IDOR Arbitrary File Upload

CVE ID : CVE-2025-34436
Published : Dec. 17, 2025, 7:50 p.m. | 14 minutes ago
Description : AVideo versions prior to 20.0 allow any authenticated user to upload files into directories belonging to other users due to an insecure direct object reference. The upload functionality verifies authentication but does not enforce ownership checks.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-34435 - AVideo < 20.0 IDOR Arbitrary File Deletion

CVE ID : CVE-2025-34435
Published : Dec. 17, 2025, 7:50 p.m. | 14 minutes ago
Description : AVideo versions prior to 20.0 are vulnerable to an insecure direct object reference (IDOR) that allows any authenticated user to delete media files belonging to other users. The affected endpoint validates authentication but fails to verify ownership or edit permissions for the targeted video.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-34437 - AVideo < 20.0 IDOR Arbitrary Comment Image Upload

CVE ID : CVE-2025-34437
Published : Dec. 17, 2025, 7:50 p.m. | 14 minutes ago
Description : AVideo versions prior to 20.0 permit any authenticated user to upload comment images to videos owned by other users. The endpoint validates authentication but omits ownership checks, allowing attackers to perform unauthorized uploads to arbitrary video objects.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-34438 - AVideo < 20.0 IDOR Arbitrary Video Rotation

CVE ID : CVE-2025-34438
Published : Dec. 17, 2025, 7:51 p.m. | 13 minutes ago
Description : AVideo versions prior to 20.0 contain an insecure direct object reference vulnerability allowing users with upload permissions to modify the rotation metadata of any video. The endpoint verifies upload capability but fails to enforce ownership or management rights for the targeted video.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2023-53926 - PHPJabbers Simple CMS 5.0 SQL Injection via Column Parameter

CVE ID : CVE-2023-53926
Published : Dec. 17, 2025, 11:15 p.m. | 53 minutes ago
Description : PHPJabbers Simple CMS 5.0 contains a SQL injection vulnerability in the 'column' parameter that allows remote attackers to manipulate database queries. Attackers can inject crafted SQL payloads through the 'column' parameter in the index.php endpoint to potentially extract or modify database information.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2023-53927 - PHPJabbers Simple CMS 5.0 Stored Cross-Site Scripting via Section Creation

CVE ID : CVE-2023-53927
Published : Dec. 17, 2025, 11:15 p.m. | 53 minutes ago
Description : PHPJabbers Simple CMS 5.0 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts through section name parameters. Attackers can create sections with embedded JavaScript payloads that will execute when administrators view the sections, potentially enabling client-side code execution.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2023-53928 - PHPFusion 9.10.30 Stored Cross-Site Scripting via File Manager Upload

CVE ID : CVE-2023-53928
Published : Dec. 17, 2025, 11:15 p.m. | 53 minutes ago
Description : PHPFusion 9.10.30 contains a stored cross-site scripting vulnerability in the file manager that allows attackers to upload malicious SVG files with embedded JavaScript. Attackers can upload SVG files with script tags that execute arbitrary JavaScript when viewed, potentially stealing user session information or performing client-side attacks.
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2023-53929 - phpMyFAQ 3.1.12 CSV Injection via User Profile Export

CVE ID : CVE-2023-53929
Published : Dec. 17, 2025, 11:15 p.m. | 53 minutes ago
Description : phpMyFAQ 3.1.12 contains a CSV injection vulnerability that allows authenticated users to inject malicious formulas into their profile names. Attackers can modify their user profile name with a payload like 'calc|a!z|' to trigger code execution when an administrator exports user data as a CSV file.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2023-53930 - ProjectSend r1605 Insecure Direct Object Reference File Download Vulnerability

CVE ID : CVE-2023-53930
Published : Dec. 17, 2025, 11:15 p.m. | 53 minutes ago
Description : ProjectSend r1605 contains an insecure direct object reference vulnerability that allows unauthenticated attackers to download private files by manipulating the download ID parameter. Attackers can access any user's private files by changing the 'id' parameter in the download request to process.php.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2023-53931 - Revive Adserver 5.4.1 Cross-Site Scripting via Banner Advanced Settings

CVE ID : CVE-2023-53931
Published : Dec. 17, 2025, 11:15 p.m. | 53 minutes ago
Description : Revive Adserver 5.4.1 contains a cross-site scripting vulnerability in the banner advanced configuration page that allows attackers to inject malicious scripts. Attackers can craft a malicious link to the banner-advanced.php endpoint with XSS payloads in prepend and append parameters to execute arbitrary JavaScript when an admin views the page.
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2023-53932 - Serendipity 2.4.0 Stored Cross-Site Scripting via Admin Entry Creation

CVE ID : CVE-2023-53932
Published : Dec. 17, 2025, 11:15 p.m. | 53 minutes ago
Description : Serendipity 2.4.0 contains a stored cross-site scripting vulnerability that allows authenticated users to inject malicious scripts through blog entry creation. Attackers can craft entries with JavaScript payloads that will execute when other users view the compromised blog post.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2023-53933 - Serendipity 2.4.0 Authenticated Remote Code Execution via File Upload

CVE ID : CVE-2023-53933
Published : Dec. 17, 2025, 11:15 p.m. | 53 minutes ago
Description : Serendipity 2.4.0 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files with .phar extension. Attackers can upload files with system command payloads to the media upload endpoint and execute arbitrary commands on the server.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-14268 - Apache Struts Remote Code Execution

CVE ID : CVE-2025-14268
Published : Dec. 17, 2025, 11:15 p.m. | 53 minutes ago
Description : Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-14319 - Here is the title: Apache HTTP Server NULL Pointer Dereference Vulnerability

CVE ID : CVE-2025-14319
Published : Dec. 17, 2025, 11:15 p.m. | 53 minutes ago
Description : Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-14833 - code-projects Online Appointment Booking System deletemanagerclinic.php sql injection

CVE ID : CVE-2025-14833
Published : Dec. 17, 2025, 11:15 p.m. | 53 minutes ago
Description : A security flaw has been discovered in code-projects Online Appointment Booking System 1.0. The impacted element is an unknown function of the file /admin/deletemanagerclinic.php. Performing manipulation of the argument clinic results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be exploited.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-14834 - code-projects Simple Stock System checkuser.php sql injection

CVE ID : CVE-2025-14834
Published : Dec. 17, 2025, 11:15 p.m. | 53 minutes ago
Description : A weakness has been identified in code-projects Simple Stock System 1.0. This affects an unknown function of the file /checkuser.php. Executing manipulation of the argument Username can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be exploited.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-14836 - ZZCMS User Data Storage user_save.php cleartext storage in a file or on disk

CVE ID : CVE-2025-14836
Published : Dec. 17, 2025, 11:15 p.m. | 53 minutes ago
Description : A flaw has been found in ZZCMS 2025. Affected by this vulnerability is an unknown functionality of the file /reg/user_save.php of the component User Data Storage Module. This manipulation causes cleartext storage in a file or on disk. Remote exploitation of the attack is possible. The exploit has been published and may be used.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-66029 - Open OnDemand affected by Apache proxy passing sensitive headers

CVE ID : CVE-2025-66029
Published : Dec. 17, 2025, 11:16 p.m. | 53 minutes ago
Description : Open OnDemand provides remote web access to supercomputers. In versions 4.0.8 and prior, the Apache proxy allows sensitive headers to be passed to origin servers. This means malicious users can create an origin server on a compute node that record these headers when unsuspecting users connect to it. Maintainers anticipate a patch in a 4.1 release. Workarounds exist for 4.0.x versions. Using `custom_location_directives` in `ood_portal.yml` in version 4.0.x (not available for versions below 4.0) centers can unset and or edit these headers. Note that `OIDCPassClaimsAs both` is the default and centers can set `OIDCPassClaimsAs ` to `none` or `environment` to stop passing these headers to the client. Centers that have an OIDC provider with the `OIDCPassClaimsAs` with `none` or `environment` settings can adjust the settings using guidance provided in GHSA-2cwp-8g29-9q32 to unset the mod_auth_openidc_session cookies.
Severity: 7.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...