CVE tracker
237 subscribers
3.21K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-15213 - code-projects Student File Management System File Download download.php improper authorization

CVE ID : CVE-2025-15213
Published : Dec. 30, 2025, 1:15 a.m. | 46 minutes ago
Description : A vulnerability has been found in code-projects Student File Management System 1.0. The affected element is an unknown function of the file /download.php of the component File Download Handler. The manipulation of the argument store_id leads to improper authorization. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-69217 - Coturn has unsafe nonce and relay port randomization due to weak random number generation.

CVE ID : CVE-2025-69217
Published : Dec. 30, 2025, 1:15 a.m. | 46 minutes ago
Description : coturn is a free open source implementation of TURN and STUN Server. Versions 4.6.2r5 through 4.7.0-r4 have a bad random number generator for nonces and port randomization after refactoring. Additionally, random numbers aren't generated with openssl's RAND_bytes but libc's random() (if it's not running on Windows). When fetching about 50 sequential nonces (i.e., through sending 50 unauthenticated allocations requests) it is possible to completely reconstruct the current state of the random number generator, thereby predicting the next nonce. This allows authentication while spoofing IPs. An attacker can send authenticated messages without ever receiving the responses, including the nonce (requires knowledge of the credentials, which is e.g., often the case in IoT settings). Since the port randomization is deterministic given the pseudorandom seed, an attacker can exactly reconstruct the ports and, hence predict the randomization of the ports. If an attacker allocates a relay port, they know the current port, and they are able to predict the next relay port (at least if it is not used before). Commit 11fc465f4bba70bb0ad8aae17d6c4a63a29917d9 contains a fix.
Severity: 7.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-69234 - Whale Browser Sandbox Escape Vulnerability

CVE ID : CVE-2025-69234
Published : Dec. 30, 2025, 1:18 a.m. | 44 minutes ago
Description : Whale browser before 4.35.351.12 allows an attacker to escape the iframe sandbox in a sidebar environment.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-69235 - Whale Browser Same-Origin Policy Bypass Vulnerability

CVE ID : CVE-2025-69235
Published : Dec. 30, 2025, 1:22 a.m. | 39 minutes ago
Description : Whale browser before 4.35.351.12 allows an attacker to bypass the Same-Origin Policy in a sidebar environment.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15214 - Campcodes Park Ticketing System admin_class.php save_pricing cross site scripting

CVE ID : CVE-2025-15214
Published : Dec. 30, 2025, 1:32 a.m. | 30 minutes ago
Description : A vulnerability was found in Campcodes Park Ticketing System 1.0. The impacted element is the function save_pricing of the file admin_class.php. The manipulation of the argument Name results in cross site scripting. The attack may be performed from remote. The exploit has been made public and could be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15215 - Tenda AC10U HTTP POST Request setPptpUserList formSetPPTPUserList buffer overflow

CVE ID : CVE-2025-15215
Published : Dec. 30, 2025, 3:15 a.m. | 2 hours, 47 minutes ago
Description : A vulnerability was determined in Tenda AC10U 15.03.06.48/15.03.06.49. This affects the function formSetPPTPUserList of the file /goform/setPptpUserList of the component HTTP POST Request Handler. This manipulation of the argument list causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15216 - Tenda AC23 SetIpMacBind fromSetIpMacBind stack-based overflow

CVE ID : CVE-2025-15216
Published : Dec. 30, 2025, 3:15 a.m. | 2 hours, 47 minutes ago
Description : A vulnerability was identified in Tenda AC23 16.03.07.52. This impacts the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument bindnum leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15217 - Tenda AC23 HTTP POST Request formSetPPTPUserList buffer overflow

CVE ID : CVE-2025-15217
Published : Dec. 30, 2025, 3:15 a.m. | 2 hours, 47 minutes ago
Description : A security flaw has been discovered in Tenda AC23 16.03.07.52. Affected is the function formSetPPTPUserList of the component HTTP POST Request Handler. Performing manipulation of the argument list results in buffer overflow. The attack can be initiated remotely.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15218 - Tenda AC10U POST Request Parameter AdvSetLanip fromadvsetlanip buffer overflow

CVE ID : CVE-2025-15218
Published : Dec. 30, 2025, 4:15 a.m. | 1 hour, 47 minutes ago
Description : A weakness has been identified in Tenda AC10U 15.03.06.48/15.03.06.49. Affected by this vulnerability is the function fromadvsetlanip of the file /goform/AdvSetLanip of the component POST Request Parameter Handler. Executing manipulation of the argument lanMask can lead to buffer overflow. The attack can be launched remotely. The exploit has been made available to the public and could be exploited.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15219 - SohuTV CacheCloud MachineManageController.java doPodList cross site scripting

CVE ID : CVE-2025-15219
Published : Dec. 30, 2025, 4:15 a.m. | 1 hour, 47 minutes ago
Description : A security vulnerability has been detected in SohuTV CacheCloud up to 3.2.0. Affected by this issue is the function doMachineList/doPodList of the file src/main/java/com/sohu/cache/web/controller/MachineManageController.java. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15220 - SohuTV CacheCloud LoginController.java init cross site scripting

CVE ID : CVE-2025-15220
Published : Dec. 30, 2025, 5:16 a.m. | 47 minutes ago
Description : A vulnerability was detected in SohuTV CacheCloud up to 3.2.0. This affects the function init of the file src/main/java/com/sohu/cache/web/controller/LoginController.java. The manipulation results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15221 - SohuTV CacheCloud AppDataMigrateController.java index cross site scripting

CVE ID : CVE-2025-15221
Published : Dec. 30, 2025, 5:16 a.m. | 47 minutes ago
Description : A flaw has been found in SohuTV CacheCloud up to 3.2.0. This vulnerability affects the function index of the file src/main/java/com/sohu/cache/web/controller/AppDataMigrateController.java. This manipulation causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15222 - Dromara Sa-Token SaSerializerTemplateForJdkUseBase64.java ObjectInputStream.readObject deserialization

CVE ID : CVE-2025-15222
Published : Dec. 30, 2025, 5:32 a.m. | 31 minutes ago
Description : A vulnerability has been found in Dromara Sa-Token up to 1.44.0. This issue affects the function ObjectInputStream.readObject of the file SaSerializerTemplateForJdkUseBase64.java. Such manipulation leads to deserialization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-14312 - Advance WP Query Search Filter <= 1.0.10 - Reflected XSS via counter

CVE ID : CVE-2025-14312
Published : Dec. 30, 2025, 6:15 a.m. | 3 hours, 48 minutes ago
Description : The Advance WP Query Search Filter WordPress plugin through 1.0.10 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-14313 - Advance WP Query Search Filter <= 1.0.10 - Reflected XSS via taxo_ajax

CVE ID : CVE-2025-14313
Published : Dec. 30, 2025, 6:15 a.m. | 3 hours, 48 minutes ago
Description : The Advance WP Query Search Filter WordPress plugin through 1.0.10 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15229 - Tenda CH22 DhcpListClient fromDhcpListClient denial of service

CVE ID : CVE-2025-15229
Published : Dec. 30, 2025, 6:15 a.m. | 3 hours, 48 minutes ago
Description : A vulnerability has been found in Tenda CH22 up to 1.0.0.1. Affected by this vulnerability is the function fromDhcpListClient of the file /goform/DhcpListClient. Such manipulation of the argument LISTLEN leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15230 - Tenda M3 setVlanPolicyData formSetVlanPolicy heap-based overflow

CVE ID : CVE-2025-15230
Published : Dec. 30, 2025, 7:15 a.m. | 2 hours, 48 minutes ago
Description : A vulnerability was found in Tenda M3 1.0.0.13(4903). Affected by this issue is the function formSetVlanPolicy of the file /goform/setVlanPolicyData. Performing manipulation of the argument qvlan_truck_port results in heap-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15231 - Tenda M3 setVlanInfo formSetRemoteVlanInfo stack-based overflow

CVE ID : CVE-2025-15231
Published : Dec. 30, 2025, 7:15 a.m. | 2 hours, 48 minutes ago
Description : A vulnerability was determined in Tenda M3 1.0.0.13(4903). This affects the function formSetRemoteVlanInfo of the file /goform/setVlanInfo. Executing manipulation of the argument ID/vlan/port can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15232 - Tenda M3 setAdPushInfo formSetAdPushInfo stack-based overflow

CVE ID : CVE-2025-15232
Published : Dec. 30, 2025, 8:15 a.m. | 1 hour, 48 minutes ago
Description : A vulnerability was identified in Tenda M3 1.0.0.13(4903). This vulnerability affects the function formSetAdPushInfo of the file /goform/setAdPushInfo. The manipulation of the argument mac/terminal leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15233 - Tenda M3 setAdInfoDetail formSetAdInfoDetails heap-based overflow

CVE ID : CVE-2025-15233
Published : Dec. 30, 2025, 8:15 a.m. | 1 hour, 48 minutes ago
Description : A security flaw has been discovered in Tenda M3 1.0.0.13(4903). This issue affects the function formSetAdInfoDetails of the file /goform/setAdInfoDetail. The manipulation of the argument adName/smsPassword/smsAccount/weixinAccount/weixinName/smsSignature/adRedirectUrl/adCopyRight/smsContent/adItemUID results in heap-based buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be exploited.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15355 - NetVision Information|ISOinsight - Reflected Cross-site Scripting

CVE ID : CVE-2025-15355
Published : Dec. 30, 2025, 8:15 a.m. | 1 hour, 48 minutes ago
Description : ISOinsight developed by NetVision Information has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...