CVE tracker
303 subscribers
4.3K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2020-37016 - BarcodeOCR 19.3.6 - 'BarcodeOCR' Unquoted Service Path

CVE ID : CVE-2020-37016
Published : Jan. 29, 2026, 3:16 p.m. | 1 hour, 6 minutes ago
Description : BarcodeOCR 19.3.6 contains an unquoted service path vulnerability that allows local attackers to execute code with elevated privileges during system startup. Attackers can exploit the unquoted path in the service configuration to inject malicious executables that will run with LocalSystem privileges.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37017 - CodeMeter 6.60 - 'CodeMeter.exe' Unquoted Service Path

CVE ID : CVE-2020-37017
Published : Jan. 29, 2026, 3:16 p.m. | 1 hour, 6 minutes ago
Description : CodeMeter 6.60 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted binary path in the CodeMeter Runtime Server service to inject malicious code that would execute with LocalSystem permissions.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37018 - GOautodial 4.0 - Persistent Cross-Site Scripting

CVE ID : CVE-2020-37018
Published : Jan. 29, 2026, 3:16 p.m. | 1 hour, 6 minutes ago
Description : GOautodial 4.0 contains a persistent cross-site scripting vulnerability that allows authenticated agents to inject malicious scripts through message subjects. Attackers can craft messages with embedded JavaScript that will execute when an administrator reads the message, potentially stealing session cookies or executing client-side attacks.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37020 - SonarQube 8.3.1 - Unquoted Service Path

CVE ID : CVE-2020-37020
Published : Jan. 29, 2026, 3:16 p.m. | 1 hour, 6 minutes ago
Description : SonarQube 8.3.1 contains an unquoted service path vulnerability that allows local attackers to gain SYSTEM privileges by exploiting the service executable path. Attackers can replace the wrapper.exe in the service path with a malicious executable to execute code with highest system privileges during service restart.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2020-37021 - Bandwidth Monitor 3.9 - 'Svc10StrikeBandMontitor' Unquoted Service Path

CVE ID : CVE-2020-37021
Published : Jan. 29, 2026, 3:16 p.m. | 1 hour, 6 minutes ago
Description : 10-Strike Bandwidth Monitor 3.9 contains an unquoted service path vulnerability in multiple services that allows local attackers to escalate privileges. Attackers can place a malicious executable in specific file path locations to achieve privilege escalation to SYSTEM during service startup.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-71008 - OneFlow Denial of Service (DoS) Vulnerability

CVE ID : CVE-2025-71008
Published : Jan. 29, 2026, 3:16 p.m. | 1 hour, 6 minutes ago
Description : A segmentation violation in the oneflow._oneflow_internal.autograd.Function.FunctionCtx.mark_non_differentiable component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-71009 - OneFlow Flow.scatter/flow.scatter_add Input Validation Denial of Service

CVE ID : CVE-2025-71009
Published : Jan. 29, 2026, 3:16 p.m. | 1 hour, 6 minutes ago
Description : An input validation vulnerability in the flow.scatter/flow.scatter_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted indices.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-7713 - Reflected XSS in Global Medya's PHP CMS

CVE ID : CVE-2025-7713
Published : Jan. 29, 2026, 3:16 p.m. | 1 hour, 6 minutes ago
Description : Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Global Interactive Design Media Software Inc. Content Management System (CMS) allows XSS Through HTTP Headers.This issue affects Content Management System (CMS): through 21072025.
Severity: 8.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-7714 - Time Based SQLi in Global Medya's PHP CMS

CVE ID : CVE-2025-7714
Published : Jan. 29, 2026, 3:16 p.m. | 1 hour, 6 minutes ago
Description : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Global Interactive Design Media Software Inc. Content Management System (CMS) allows Command Line Execution through SQL Injection.This issue affects Content Management System (CMS): through 21072025.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1589 - itsourcecode School Management System index.php sql injection

CVE ID : CVE-2026-1589
Published : Jan. 29, 2026, 3:16 p.m. | 1 hour, 6 minutes ago
Description : A vulnerability was determined in itsourcecode School Management System 1.0. This affects an unknown function of the file /ramonsys/inquiry/index.php. This manipulation of the argument txtsearch causes sql injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1590 - itsourcecode School Management System index.php sql injection

CVE ID : CVE-2026-1590
Published : Jan. 29, 2026, 3:16 p.m. | 1 hour, 6 minutes ago
Description : A vulnerability was identified in itsourcecode School Management System 1.0. This impacts an unknown function of the file /ramonsys/faculty/index.php. Such manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1593 - itsourcecode Society Management System edit_expenses_query.php sql injection

CVE ID : CVE-2026-1593
Published : Jan. 29, 2026, 3:16 p.m. | 1 hour, 6 minutes ago
Description : A weakness has been identified in itsourcecode Society Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/edit_expenses_query.php. Executing a manipulation of the argument detail can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1594 - itsourcecode Society Management System add_expenses.php sql injection

CVE ID : CVE-2026-1594
Published : Jan. 29, 2026, 3:16 p.m. | 1 hour, 6 minutes ago
Description : A security vulnerability has been detected in itsourcecode Society Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/add_expenses.php. The manipulation of the argument detail leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-13905 - Apache Service Privilege Escalation Vulnerability

CVE ID : CVE-2025-13905
Published : Jan. 29, 2026, 3:20 p.m. | 1 hour, 2 minutes ago
Description : CWE-276: Incorrect Default Permissions vulnerability exists that could cause privilege escalation through the reverse shell when one or more executable service binaries are modified in the installation folder by a local user with normal privilege upon service restart.
Severity: 7.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0936 - Insertion of Sensitive Information into Logfile

CVE ID : CVE-2026-0936
Published : Jan. 29, 2026, 3:30 p.m. | 51 minutes ago
Description : An Insertion of Sensitive Information into Log File vulnerability in B&R PVI client versions prior to 6.5 may be abused by an authenticated local attacker to gather credential information which is processed by the PVI client application. The logging function of the PVI client application is disabled by default and must be explicitly enabled by the user.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1595 - itsourcecode Society Management System edit_student_query.php sql injection

CVE ID : CVE-2026-1595
Published : Jan. 29, 2026, 3:32 p.m. | 50 minutes ago
Description : A vulnerability was detected in itsourcecode Society Management System 1.0. This affects an unknown part of the file /admin/edit_student_query.php. The manipulation of the argument student_id results in sql injection. The attack can be executed remotely. The exploit is now public and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1596 - D-Link DWR-M961 formLtefotaUpgradeQuectel sub_419920 command injection

CVE ID : CVE-2026-1596
Published : Jan. 29, 2026, 3:32 p.m. | 50 minutes ago
Description : A flaw has been found in D-Link DWR-M961 1.1.47. This vulnerability affects the function sub_419920 of the file /boafrm/formLtefotaUpgradeQuectel. This manipulation of the argument fota_url causes command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-62514 - `libparsec_crypto` does not check for weak order point of curve 25519

CVE ID : CVE-2025-62514
Published : Jan. 29, 2026, 3:46 p.m. | 35 minutes ago
Description : Parsec is a cloud-based application for cryptographically secure file sharing. In versions on the 3.x branch prior to 3.6.0, `libparsec_crypto`, a component of the Parsec application, does not check for weak order point of Curve25519 when compiled with its RustCrypto backend. In practice this means an attacker in a man-in-the-middle position would be able to provide weak order points to both parties in the Diffie-Hellman exchange, resulting in a high probability to for both parties to obtain the same shared key (hence leading to a successful SAS code exchange, misleading both parties into thinking no MITM has occurred) which is also known by the attacker. Note only Parsec web is impacted (as Parsec desktop uses `libparsec_crypto` with the libsodium backend). Version 3.6.0 of Parsec patches the issue.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-25063 - gradle-completion has a Bash command injection issue

CVE ID : CVE-2026-25063
Published : Jan. 29, 2026, 10:15 p.m. | 10 hours, 9 minutes ago
Description : gradle-completion provides Bash and Zsh completion support for Gradle. A command injection vulnerability was found in gradle-completion up to and including 9.3.0 that allows arbitrary code execution when a user triggers Bash tab completion in a project containing a malicious Gradle build file. The `gradle-completion` script for Bash fails to adequately sanitize Gradle task names and task descriptions, allowing command injection via a malicious Gradle build file when the user completes a command in Bash (without them explicitly running any task in the build). For example, given a task description that includes a string between backticks, then that string would be evaluated as a command when presenting the task description in the completion list. While task execution is the core feature of Gradle, this inherent execution may lead to unexpected outcomes. The vulnerability does not affect zsh completion. The first patched version is 9.3.1. As a workaround, it is possible and effective to temporarily disable bash completion for Gradle by removing `gradle-completion` from `.bashrc` or `.bash_profile`.
Severity: 8.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-25116 - Runtipi vulnerable to unauthenticated docker-compose.yml Overwrite via Path Traversal

CVE ID : CVE-2026-25116
Published : Jan. 29, 2026, 10:15 p.m. | 10 hours, 9 minutes ago
Description : Runtipi is a personal homeserver orchestrator. Starting in version 4.5.0 and prior to version 4.7.2, an unauthenticated Path Traversal vulnerability in the `UserConfigController` allows any remote user to overwrite the system's `docker-compose.yml` configuration file. By exploiting insecure URN parsing, an attacker can replace the primary stack configuration with a malicious one, resulting in full Remote Code Execution (RCE) and host filesystem compromise the next time the instance is restarted by the operator. Version 4.7.2 fixes the vulnerability.
Severity: 7.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-25117 - pwn.college DOJO vulnerable to sandbox escape leading to arbitrary javascript execution

CVE ID : CVE-2026-25117
Published : Jan. 29, 2026, 10:15 p.m. | 10 hours, 9 minutes ago
Description : pwn.college DOJO is an education platform for learning cybersecurity. Prior to commit e33da14449a5abcff507e554f66e2141d6683b0a, missing sandboxing on `/workspace/*` routes allows challenge authors to inject arbitrary javascript which runs on the same origin as `http[:]//dojo[.]website`. This is a sandbox escape leading to arbitrary javascript execution as the dojo's origin. A challenge author can craft a page that executes any dangerous actions that the user could. Version e33da14449a5abcff507e554f66e2141d6683b0a patches the issue.
Severity: 8.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...