CVE tracker
303 subscribers
4.3K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2026-1549 - jishenghua jshERP PluginController uploadPluginConfigFile path traversal

CVE ID : CVE-2026-1549
Published : Jan. 28, 2026, 11:15 p.m. | 1 hour, 3 minutes ago
Description : A vulnerability was identified in jishenghua jshERP up to 3.6. Affected by this vulnerability is an unknown functionality of the file /jshERP-boot/plugin/uploadPluginConfigFile of the component PluginController. Such manipulation of the argument configFile leads to path traversal. The attack may be launched remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1550 - PHPGurukul Hospital Management System Admin Dashboard adminviews.py improper authorization

CVE ID : CVE-2026-1550
Published : Jan. 28, 2026, 11:15 p.m. | 1 hour, 3 minutes ago
Description : A security flaw has been discovered in PHPGurukul Hospital Management System 1.0. Affected by this issue is some unknown functionality of the file /hms/hospital/docappsystem/adminviews.py of the component Admin Dashboard Page. Performing a manipulation results in improper authorization. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-24897 - Authenticated Remote Code Execution via Arbitrary File Upload

CVE ID : CVE-2026-24897
Published : Jan. 28, 2026, 11:15 p.m. | 1 hour, 3 minutes ago
Description : Erugo is a self-hosted file-sharing platform. In versions up to and including 0.2.14, an authenticated low-privileged user can upload arbitrary files to any specified location due to insufficient validation of user‑supplied paths when creating shares. By specifying a writable path within the public web root, an attacker can upload and execute arbitrary code on the server, resulting in remote code execution (RCE). This vulnerability allows a low-privileged user to fully compromise the affected Erugo instance. Version 0.2.15 fixes the issue.
Severity: 10.0 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1551 - itsourcecode School Management System controller.php sql injection

CVE ID : CVE-2026-1551
Published : Jan. 28, 2026, 11:32 p.m. | 47 minutes ago
Description : A weakness has been identified in itsourcecode School Management System 1.0. This affects an unknown part of the file /ramonsys/course/controller.php. Executing a manipulation of the argument ID can lead to sql injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15344 - Tanium addressed a SQL injection vulnerability in Asset.

CVE ID : CVE-2025-15344
Published : Jan. 28, 2026, 11:46 p.m. | 32 minutes ago
Description : Tanium addressed a SQL injection vulnerability in Asset.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1552 - SEMCMS SEMCMS_Info.php sql injection

CVE ID : CVE-2026-1552
Published : Jan. 29, 2026, 1:16 a.m. | 3 hours, 4 minutes ago
Description : A security vulnerability has been detected in SEMCMS 5.0. This vulnerability affects unknown code of the file /SEMCMS_Info.php. The manipulation of the argument searchml leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-53869 - Brother MFP SSL/TLS Certificate Validation Vulnerability

CVE ID : CVE-2025-53869
Published : Jan. 29, 2026, 2:40 a.m. | 1 hour, 39 minutes ago
Description : Multiple MFPs provided by Brother Industries, Ltd. does not properly validate server certificates, which may allow a man-in-the-middle attacker to replace the set of root certificates used by the product with a set of arbitrary certificates.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-55704 - Brother Industries, Ltd. Multi-Function Printer (MFP) Log Disclosure Vulnerability

CVE ID : CVE-2025-55704
Published : Jan. 29, 2026, 2:41 a.m. | 1 hour, 38 minutes ago
Description : Hidden functionality issue exists in multiple MFPs provided by Brother Industries, Ltd., which may allow an attacker to obtain the logs of the affected product and obtain sensitive information within the logs.
Severity: 6.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-25067 - SmarterTools SmarterMail < Build 9518 Unauthenticated background-of-the-day Path Coercion

CVE ID : CVE-2026-25067
Published : Jan. 29, 2026, 5:16 a.m. | 3 hours, 4 minutes ago
Description : SmarterTools SmarterMail versions prior to build 9518 contain an unauthenticated path coercion vulnerability in the background-of-the-day preview endpoint. The application base64-decodes attacker-supplied input and uses it as a filesystem path without validation. On Windows systems, this allows UNC paths to be resolved, causing the SmarterMail service to initiate outbound SMB authentication attempts to attacker-controlled hosts. This can be abused for credential coercion, NTLM relay attacks, and unauthorized network authentication.
Severity: 6.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-14975 - Custom Login Page Customizer < 2.5.4 - Unauthenticated Arbitrary Password Reset

CVE ID : CVE-2025-14975
Published : Jan. 29, 2026, 6:15 a.m. | 2 hours, 5 minutes ago
Description : The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and therefore gain access to their account
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1188 - Eclipse OMR Buffer Overflow Vulnerability

CVE ID : CVE-2026-1188
Published : Jan. 29, 2026, 9:16 a.m. | 3 hours, 6 minutes ago
Description : In the Eclipse OMR port library component since release 0.2.0, an API function to return the textual names of all supported processor features was not accounting for the separator inserted between processor features. If the output buffer supplied to this function was incorrectly sized, failing to account for the separator when determining when a write to the buffer was safe could lead to a buffer overflow. This issue is fixed in Eclipse OMR version 0.8.0.
Severity: 6.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-23563 - Privilege escalation in TeamViewer DEX via DeleteFileByPath instruction

CVE ID : CVE-2026-23563
Published : Jan. 29, 2026, 9:16 a.m. | 3 hours, 6 minutes ago
Description : Improper Link Resolution Before File Access (invoked by 1E‑Explorer‑TachyonCore‑DeleteFileByPath instruction) in TeamViewer DEX - 1E Client before version 26.1 on Windows allows a low‑privileged local attacker to delete protected system files via a crafted RPC control junction or symlink that is followed when the delete instruction executes.
Severity: 5.7 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-23564 - Transmission of Unencrypted Data in Content Distribution Service

CVE ID : CVE-2026-23564
Published : Jan. 29, 2026, 9:16 a.m. | 3 hours, 5 minutes ago
Description : A vulnerability in TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to cause normally encrypted UDP traffic to be sent in cleartext. This can result in disclosure of sensitive information.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-23565 - Denial-of-Service in Content Distribution Service

CVE ID : CVE-2026-23565
Published : Jan. 29, 2026, 9:16 a.m. | 3 hours, 5 minutes ago
Description : A vulnerability in TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to cause the NomadBranch.exe process to terminate via crafted requests. This can result in a denial-of-service condition of the Content Distribution Service.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-23566 - Log Injection in Content Distribution Service UDP Handler

CVE ID : CVE-2026-23566
Published : Jan. 29, 2026, 9:16 a.m. | 3 hours, 5 minutes ago
Description : A vulnerability in TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to inject, tamper with, or forge log entries in \Nomad Branch.log via crafted data sent to the UDP network handler. This can impact log integrity and nonrepudiation.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-23567 - Integer underflow in Content Distribution Service UDP handler

CVE ID : CVE-2026-23567
Published : Jan. 29, 2026, 9:16 a.m. | 3 hours, 5 minutes ago
Description : An integer underflow in the UDP command handler of the TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an adjacent network attacker to trigger a heap-based buffer overflow and cause a denial-of-service (service crash) via specially crafted UDP packets.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-23568 - Out-of-bounds read vulnerability in Content Distribution Service

CVE ID : CVE-2026-23568
Published : Jan. 29, 2026, 9:16 a.m. | 3 hours, 5 minutes ago
Description : An out-of-bounds read vulnerability in the TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to cause information disclosure or denial-of-service via a special crafted packet. The leaked memory could be used to bypass ASLR and facilitate further exploitation.
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-23569 - Out-of-bounds read vulnerability in Content Distribution Service

CVE ID : CVE-2026-23569
Published : Jan. 29, 2026, 9:16 a.m. | 3 hours, 5 minutes ago
Description : An out-of-bounds read vulnerability in the TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows a remote attacker to leak stack memory and cause a denial of service via a crafted request. The leaked stack memory could be used to bypass ASLR remotely and facilitate exploitation of other vulnerabilities on the affected system.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-23570 - Log timestamp tampering vulnerability in Content Distribution Service

CVE ID : CVE-2026-23570
Published : Jan. 29, 2026, 9:16 a.m. | 3 hours, 5 minutes ago
Description : A missing validation of a user-controlled value in the TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an adjacent network attacker to tamper with log timestamps via crafted UDP Sync command. This could result in forged or nonsensical datetime prefixes and compromising log integrity and forensic correlation.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-23571 - Command Injection in 1E-Nomad-RunPkgStatusRequest Instruction in TeamViewer DEX

CVE ID : CVE-2026-23571
Published : Jan. 29, 2026, 9:16 a.m. | 3 hours, 5 minutes ago
Description : A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-RunPkgStatusRequest instruction. Improper input validation allows authenticated attackers with actioner privilege to run elevated arbitrary commands on connected hosts via malicious commands injected into the instruction’s input field. Users of 1E Client version 24.5 or higher are not affected.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22764 - Dell OpenManage Network Integration Improper Authentication Information Exposure

CVE ID : CVE-2026-22764
Published : Jan. 29, 2026, 11:15 a.m. | 1 hour, 6 minutes ago
Description : Dell OpenManage Network Integration, versions prior to 3.9, contains an Improper Authentication vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...