CVE tracker
275 subscribers
3.57K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2021-47906 - BloofoxCMS 0.5.2.1 - 'text' Stored Cross Site Scripting

CVE ID : CVE-2021-47906
Published : Jan. 23, 2026, 5:16 p.m. | 2 hours, 6 minutes ago
Description : BloofoxCMS 0.5.2.1 contains a stored cross-site scripting vulnerability in the articles text parameter that allows authenticated attackers to inject malicious scripts. Attackers can insert malicious javascript payloads in the text field to execute scripts and potentially steal authenticated users' cookies.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2022-25369 - Dynamicweb Unauthenticated Remote Command Execution

CVE ID : CVE-2022-25369
Published : Jan. 23, 2026, 5:16 p.m. | 2 hours, 6 minutes ago
Description : An issue was discovered in Dynamicweb before 9.12.8. An attacker can add a new administrator user without authentication. This flaw exists due to a logic issue when determining if the setup phases of the product can be run again. Once an attacker is authenticated as the new admin user they have added, it is possible to upload an executable file and achieve command execution. This is fixed in 9.5.9, 9.6.16, 9.7.8, 9.8.11, 9.9.8, 9.10.18, 9.12.8, and 9.13.0 (and later).
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-67229 - ToDesktop Builder SSL/TLS Certificate Validation Bypass

CVE ID : CVE-2025-67229
Published : Jan. 23, 2026, 5:16 p.m. | 2 hours, 6 minutes ago
Description : An improper certificate validation vulnerability exists in ToDesktop Builder v0.32.1 This vulnerability allows an unauthenticated, on-path attacker to spoof backend responses by exploiting insufficient certificate validation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-67230 - ToDesktop Builder Renderer Context Protocol Handler Privilege Escalation

CVE ID : CVE-2025-67230
Published : Jan. 23, 2026, 5:16 p.m. | 2 hours, 6 minutes ago
Description : Improper permissions in the handler for the Custom URL Scheme in ToDesktop Builder v0.33.0 allows attackers with renderer-context access to invoke external protocol handlers without sufficient validation.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-67231 - ToDesktop Builder Reflected Cross-Site Scripting Vulnerability

CVE ID : CVE-2025-67231
Published : Jan. 23, 2026, 5:16 p.m. | 2 hours, 6 minutes ago
Description : A reflected cross-site scripting (XSS) vulnerability in ToDesktop Builder v0.33.1 allows attackers to execute arbitrary code in the context of a user's browser via a crafted payload.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-71177 - LavaLite CMS <= 10.1.0 Stored XSS via Package Creation and Search

CVE ID : CVE-2025-71177
Published : Jan. 23, 2026, 5:16 p.m. | 2 hours, 6 minutes ago
Description : LavaLite CMS versions up to and including 10.1.0 contain a stored cross-site scripting vulnerability in the package creation and search functionality. Authenticated users can supply crafted HTML or JavaScript in the package Name or Description fields that is stored and later rendered without proper output encoding in package search results. When other users view search results that include the malicious package, the injected script executes in their browsers, potentially enabling session hijacking, credential theft, and unauthorized actions in the context of the victim.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1299 - email BytesGenerator header injection due to unquoted newlines

CVE ID : CVE-2026-1299
Published : Jan. 23, 2026, 5:16 p.m. | 2 hours, 6 minutes ago
Description : The email module, specifically the "BytesGenerator" class, didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized. This is only applicable if using "LiteralHeader" writing headers that don't respect email folding rules, the new behavior will reject the incorrectly folded headers in "BytesGenerator".
Severity: 6.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-24423 - SmarterTools SmarterMail < Build 9511 Unauthenticated RCE via ConnectToHub API

CVE ID : CVE-2026-24423
Published : Jan. 23, 2026, 5:16 p.m. | 2 hours, 6 minutes ago
Description : SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-14947 - All-in-One Video Gallery <= 4.6.4 - Missing Authorization to Unauthenticated Bunny Stream Video Creation/Deletion

CVE ID : CVE-2025-14947
Published : Jan. 23, 2026, 6:16 p.m. | 1 hour, 6 minutes ago
Description : The All-in-One Video Gallery plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `ajax_callback_create_bunny_stream_video`, `ajax_callback_get_bunny_stream_video`, and `ajax_callback_delete_bunny_stream_video` functions in all versions up to, and including, 4.6.4. This makes it possible for unauthenticated attackers to create and delete videos on the Bunny Stream CDN associated with the victim's account, provided they can obtain a valid nonce which is exposed in public player templates.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-70983 - SpringBlade Authentication Privilege Escalation Vulnerability

CVE ID : CVE-2025-70983
Published : Jan. 23, 2026, 7:15 p.m. | 4 hours, 6 minutes ago
Description : Incorrect access control in the authRoutes function of SpringBlade v4.5.0 allows attackers with low-level privileges to escalate privileges.
Severity: 9.9 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-70985 - RuoYi Arbitrary Data Modification Vulnerability

CVE ID : CVE-2025-70985
Published : Jan. 23, 2026, 7:15 p.m. | 4 hours, 6 minutes ago
Description : Incorrect access control in the update function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily modify data outside of their scope.
Severity: 9.1 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-70986 - RuoYi Department Data Access Control Bypass

CVE ID : CVE-2025-70986
Published : Jan. 23, 2026, 7:15 p.m. | 4 hours, 6 minutes ago
Description : Incorrect access control in the selectDept function of RuoYi v4.8.2 allows unauthorized attackers to arbitrarily access sensitive department data.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-21867 - Apache Web Server Remote Code Execution

CVE ID : CVE-2026-21867
Published : Jan. 23, 2026, 7:15 p.m. | 4 hours, 6 minutes ago
Description : Rejected reason: Reason: This candidate was issued in error.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-67264 - Doogee Note59/Pro/Pro+ OS Command Injection Vulnerability

CVE ID : CVE-2025-67264
Published : Jan. 23, 2026, 8:15 p.m. | 3 hours, 6 minutes ago
Description : An OS command injection vulnerability in the com.sprd.engineermode component in Doogee Note59, Note59 Pro, and Note59 Pro+ allows a local attacker to execute arbitrary code and escalate privileges via the EngineerMode ADB shell, due to incomplete patching of CVE-2025-31710
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52022 - Gemsloyalty PHP Information Exposure Vulnerability

CVE ID : CVE-2025-52022
Published : Jan. 23, 2026, 9:15 p.m. | 2 hours, 6 minutes ago
Description : A vulnerability in the PHP backend of gemsloyalty.aptsys.com.sg thru 2025-05-28 allows unauthenticated remote attackers to trigger detailed error messages that disclose internal file paths, code snippets, and stack traces. This occurs when specially crafted HTTP GET/POST requests are sent to public API endpoints, exposing potentially sensitive information useful for further exploitation. This issue is classified under CWE-209: Information Exposure Through an Error Message.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52023 - Gemscms PHP Information Exposure Vulnerability

CVE ID : CVE-2025-52023
Published : Jan. 23, 2026, 9:15 p.m. | 2 hours, 6 minutes ago
Description : A vulnerability in the PHP backend of gemscms.aptsys.com.sg thru 2025-05-28 allows unauthenticated remote attackers to trigger detailed error messages that disclose internal file paths, code snippets, and stack traces. This occurs when specially crafted HTTP GET/POST requests are sent to public API endpoints, exposing potentially sensitive information useful for further exploitation. This issue is classified under CWE-209: Information Exposure Through an Error Message.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52024 - Aptsys POS Platform Web Services Unauthenticated API Testing Tool Exposure

CVE ID : CVE-2025-52024
Published : Jan. 23, 2026, 9:15 p.m. | 2 hours, 6 minutes ago
Description : A vulnerability exists in the Aptsys POS Platform Web Services module thru 2025-05-28, which exposes internal API testing tools to unauthenticated users. By accessing specific URLs, an attacker is presented with a directory-style index listing all available backend services and POS web services, each with an HTML form for submitting test input. These panels are intended for developer use, but are accessible in production environments with no authentication or session validation. This grants any external actor the ability to discover, test, and execute API endpoints that perform critical functions including but not limited to user transaction retrieval, credit adjustments, POS actions, and internal data queries.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52025 - Aptsys Gemscms POS Platform SQL Injection

CVE ID : CVE-2025-52025
Published : Jan. 23, 2026, 9:15 p.m. | 2 hours, 6 minutes ago
Description : An SQL Injection vulnerability exists in the GetServiceByRestaurantID endpoint of the Aptsys gemscms POS Platform backend thru 2025-05-28. The vulnerability arises because user input is directly inserted into a dynamic SQL query syntax without proper sanitization or parameterization. This allows an attacker to inject and execute arbitrary SQL code by submitting crafted input in the id parameter, leading to unauthorized data access or modification.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52026 - Aptsys gemscms MD5 Password Hash Disclosure

CVE ID : CVE-2025-52026
Published : Jan. 23, 2026, 9:15 p.m. | 2 hours, 6 minutes ago
Description : An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1386 - Arbitrary Host File Overwrite via Symlink in Firecracker Jailer

CVE ID : CVE-2026-1386
Published : Jan. 23, 2026, 9:15 p.m. | 2 hours, 6 minutes ago
Description : A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.
Severity: 6.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-70457 - Sourcecodester Modern Image Gallery App PHP RCE Vulnerability

CVE ID : CVE-2025-70457
Published : Jan. 23, 2026, 10:16 p.m. | 1 hour, 6 minutes ago
Description : A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...