CVE tracker
276 subscribers
3.57K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2021-47903 - LiteSpeed Web Server Enterprise 5.4.11 - Command Injection

CVE ID : CVE-2021-47903
Published : Jan. 23, 2026, 5:16 p.m. | 2 hours, 6 minutes ago
Description : LiteSpeed Web Server Enterprise 5.4.11 contains an authenticated command injection vulnerability in the external app configuration interface. Authenticated administrators can inject shell commands through the 'Command' parameter in the server configuration, allowing remote code execution via path traversal and bash command injection.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2021-47904 - PhreeBooks 5.2.3 - Remote Code Execution

CVE ID : CVE-2021-47904
Published : Jan. 23, 2026, 5:16 p.m. | 2 hours, 6 minutes ago
Description : PhreeBooks 5.2.3 contains an authenticated file upload vulnerability in the Image Manager that allows remote code execution. Attackers can upload a malicious PHP web shell by exploiting unrestricted file type uploads to gain command execution on the server.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2021-47905 - MyBB Delete Account Plugin 1.4 - Cross-Site Scripting

CVE ID : CVE-2021-47905
Published : Jan. 23, 2026, 5:16 p.m. | 2 hours, 6 minutes ago
Description : MyBB Delete Account Plugin 1.4 contains a cross-site scripting vulnerability in the account deletion reason input field. Attackers can inject malicious scripts that will execute in the admin interface when viewing delete account reasons.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2021-47906 - BloofoxCMS 0.5.2.1 - 'text' Stored Cross Site Scripting

CVE ID : CVE-2021-47906
Published : Jan. 23, 2026, 5:16 p.m. | 2 hours, 6 minutes ago
Description : BloofoxCMS 0.5.2.1 contains a stored cross-site scripting vulnerability in the articles text parameter that allows authenticated attackers to inject malicious scripts. Attackers can insert malicious javascript payloads in the text field to execute scripts and potentially steal authenticated users' cookies.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2022-25369 - Dynamicweb Unauthenticated Remote Command Execution

CVE ID : CVE-2022-25369
Published : Jan. 23, 2026, 5:16 p.m. | 2 hours, 6 minutes ago
Description : An issue was discovered in Dynamicweb before 9.12.8. An attacker can add a new administrator user without authentication. This flaw exists due to a logic issue when determining if the setup phases of the product can be run again. Once an attacker is authenticated as the new admin user they have added, it is possible to upload an executable file and achieve command execution. This is fixed in 9.5.9, 9.6.16, 9.7.8, 9.8.11, 9.9.8, 9.10.18, 9.12.8, and 9.13.0 (and later).
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-67229 - ToDesktop Builder SSL/TLS Certificate Validation Bypass

CVE ID : CVE-2025-67229
Published : Jan. 23, 2026, 5:16 p.m. | 2 hours, 6 minutes ago
Description : An improper certificate validation vulnerability exists in ToDesktop Builder v0.32.1 This vulnerability allows an unauthenticated, on-path attacker to spoof backend responses by exploiting insufficient certificate validation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-67230 - ToDesktop Builder Renderer Context Protocol Handler Privilege Escalation

CVE ID : CVE-2025-67230
Published : Jan. 23, 2026, 5:16 p.m. | 2 hours, 6 minutes ago
Description : Improper permissions in the handler for the Custom URL Scheme in ToDesktop Builder v0.33.0 allows attackers with renderer-context access to invoke external protocol handlers without sufficient validation.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-67231 - ToDesktop Builder Reflected Cross-Site Scripting Vulnerability

CVE ID : CVE-2025-67231
Published : Jan. 23, 2026, 5:16 p.m. | 2 hours, 6 minutes ago
Description : A reflected cross-site scripting (XSS) vulnerability in ToDesktop Builder v0.33.1 allows attackers to execute arbitrary code in the context of a user's browser via a crafted payload.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-71177 - LavaLite CMS <= 10.1.0 Stored XSS via Package Creation and Search

CVE ID : CVE-2025-71177
Published : Jan. 23, 2026, 5:16 p.m. | 2 hours, 6 minutes ago
Description : LavaLite CMS versions up to and including 10.1.0 contain a stored cross-site scripting vulnerability in the package creation and search functionality. Authenticated users can supply crafted HTML or JavaScript in the package Name or Description fields that is stored and later rendered without proper output encoding in package search results. When other users view search results that include the malicious package, the injected script executes in their browsers, potentially enabling session hijacking, credential theft, and unauthorized actions in the context of the victim.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1299 - email BytesGenerator header injection due to unquoted newlines

CVE ID : CVE-2026-1299
Published : Jan. 23, 2026, 5:16 p.m. | 2 hours, 6 minutes ago
Description : The email module, specifically the "BytesGenerator" class, didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized. This is only applicable if using "LiteralHeader" writing headers that don't respect email folding rules, the new behavior will reject the incorrectly folded headers in "BytesGenerator".
Severity: 6.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-24423 - SmarterTools SmarterMail < Build 9511 Unauthenticated RCE via ConnectToHub API

CVE ID : CVE-2026-24423
Published : Jan. 23, 2026, 5:16 p.m. | 2 hours, 6 minutes ago
Description : SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-14947 - All-in-One Video Gallery <= 4.6.4 - Missing Authorization to Unauthenticated Bunny Stream Video Creation/Deletion

CVE ID : CVE-2025-14947
Published : Jan. 23, 2026, 6:16 p.m. | 1 hour, 6 minutes ago
Description : The All-in-One Video Gallery plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `ajax_callback_create_bunny_stream_video`, `ajax_callback_get_bunny_stream_video`, and `ajax_callback_delete_bunny_stream_video` functions in all versions up to, and including, 4.6.4. This makes it possible for unauthenticated attackers to create and delete videos on the Bunny Stream CDN associated with the victim's account, provided they can obtain a valid nonce which is exposed in public player templates.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-70983 - SpringBlade Authentication Privilege Escalation Vulnerability

CVE ID : CVE-2025-70983
Published : Jan. 23, 2026, 7:15 p.m. | 4 hours, 6 minutes ago
Description : Incorrect access control in the authRoutes function of SpringBlade v4.5.0 allows attackers with low-level privileges to escalate privileges.
Severity: 9.9 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-70985 - RuoYi Arbitrary Data Modification Vulnerability

CVE ID : CVE-2025-70985
Published : Jan. 23, 2026, 7:15 p.m. | 4 hours, 6 minutes ago
Description : Incorrect access control in the update function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily modify data outside of their scope.
Severity: 9.1 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-70986 - RuoYi Department Data Access Control Bypass

CVE ID : CVE-2025-70986
Published : Jan. 23, 2026, 7:15 p.m. | 4 hours, 6 minutes ago
Description : Incorrect access control in the selectDept function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily access sensitive department data.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-21867 - Apache Web Server Remote Code Execution

CVE ID : CVE-2026-21867
Published : Jan. 23, 2026, 7:15 p.m. | 4 hours, 6 minutes ago
Description : Rejected reason: Reason: This candidate was issued in error.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-67264 - Doogee Note59/Pro/Pro+ OS Command Injection Vulnerability

CVE ID : CVE-2025-67264
Published : Jan. 23, 2026, 8:15 p.m. | 3 hours, 6 minutes ago
Description : An OS command injection vulnerability in the com.sprd.engineermode component in Doogee Note59, Note59 Pro, and Note59 Pro+ allows a local attacker to execute arbitrary code and escalate privileges via the EngineerMode ADB shell, due to incomplete patching of CVE-2025-31710
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52022 - Gemsloyalty PHP Information Exposure Vulnerability

CVE ID : CVE-2025-52022
Published : Jan. 23, 2026, 9:15 p.m. | 2 hours, 6 minutes ago
Description : A vulnerability in the PHP backend of gemsloyalty.aptsys.com.sg thru 2025-05-28 allows unauthenticated remote attackers to trigger detailed error messages that disclose internal file paths, code snippets, and stack traces. This occurs when specially crafted HTTP GET/POST requests are sent to public API endpoints, exposing potentially sensitive information useful for further exploitation. This issue is classified under CWE-209: Information Exposure Through an Error Message.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52023 - Gemscms PHP Information Exposure Vulnerability

CVE ID : CVE-2025-52023
Published : Jan. 23, 2026, 9:15 p.m. | 2 hours, 6 minutes ago
Description : A vulnerability in the PHP backend of gemscms.aptsys.com.sg thru 2025-05-28 allows unauthenticated remote attackers to trigger detailed error messages that disclose internal file paths, code snippets, and stack traces. This occurs when specially crafted HTTP GET/POST requests are sent to public API endpoints, exposing potentially sensitive information useful for further exploitation. This issue is classified under CWE-209: Information Exposure Through an Error Message.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52024 - Aptsys POS Platform Web Services Unauthenticated API Testing Tool Exposure

CVE ID : CVE-2025-52024
Published : Jan. 23, 2026, 9:15 p.m. | 2 hours, 6 minutes ago
Description : A vulnerability exists in the Aptsys POS Platform Web Services module thru 2025-05-28, which exposes internal API testing tools to unauthenticated users. By accessing specific URLs, an attacker is presented with a directory-style index listing all available backend services and POS web services, each with an HTML form for submitting test input. These panels are intended for developer use, but are accessible in production environments with no authentication or session validation. This grants any external actor the ability to discover, test, and execute API endpoints that perform critical functions including but not limited to user transaction retrieval, credit adjustments, POS actions, and internal data queries.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52025 - Aptsys Gemscms POS Platform SQL Injection

CVE ID : CVE-2025-52025
Published : Jan. 23, 2026, 9:15 p.m. | 2 hours, 6 minutes ago
Description : An SQL Injection vulnerability exists in the GetServiceByRestaurantID endpoint of the Aptsys gemscms POS Platform backend thru 2025-05-28. The vulnerability arises because user input is directly inserted into a dynamic SQL query syntax without proper sanitization or parameterization. This allows an attacker to inject and execute arbitrary SQL code by submitting crafted input in the id parameter, leading to unauthorized data access or modification.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...