CVE tracker
282 subscribers
3.66K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2026-1104 - FastDup – Fastest WordPress Migration & Duplicator <= 2.7.1 - Missing Authorization to Authenticated (Contributor+) Backup Creation and Download

CVE ID : CVE-2026-1104
Published : Feb. 12, 2026, 2:25 p.m. | 1 hour, 2 minutes ago
Description : The FastDup – Fastest WordPress Migration & Duplicator plugin for WordPress is vulnerable to unauthorized backup creation and download due to a missing capability check on REST API endpoints in all versions up to, and including, 2.7.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to create and download full-site backup archives containing the entire WordPress installation, including database exports and configuration files.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-69634 - Dolibarr ERP & CRM CSRF Privilege Escalation

CVE ID : CVE-2025-69634
Published : Feb. 12, 2026, 4:16 p.m. | 3 hours, 12 minutes ago
Description : Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0.9 allows a remote attacker to escalate privileges via the notes field in perms.php
Severity: 9.0 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-69752 - Ideagen Q-Pulse Authentication Bypass

CVE ID : CVE-2025-69752
Published : Feb. 12, 2026, 4:16 p.m. | 3 hours, 12 minutes ago
Description : An issue in the "My Details" user profile functionality of Ideagen Q-Pulse 7.1.0.32 allows an authenticated user to view other users' profile information by modifying the objectKey HTTP parameter in the My Details page URL.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-70886 - Halo Denial of Service (DoS) Vulnerability

CVE ID : CVE-2025-70886
Published : Feb. 12, 2026, 4:16 p.m. | 3 hours, 12 minutes ago
Description : An issue in halo v.2.22.4 and before allows a remote attacker to cause a denial of service via a crafted payload to the public comment submission endpoint
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-26214 - Xiaomi Galaxy FDS Android SDK <= 3.0.8 TLS Hostname Verification Disabled Enables MITM

CVE ID : CVE-2026-26214
Published : Feb. 12, 2026, 4:16 p.m. | 3 hours, 12 minutes ago
Description : Galaxy FDS Android SDK (XiaoMi/galaxy-fds-sdk-android) version 3.0.8 and prior disable TLS hostname verification when HTTPS is enabled (the default configuration). In GalaxyFDSClientImpl.createHttpClient(), the SDK configures Apache HttpClient with SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER, which accepts any valid TLS certificate regardless of hostname mismatch. Because HTTPS is enabled by default in FDSClientConfiguration, all applications using the SDK with default settings are affected. This vulnerability allows a man-in-the-middle attacker to intercept and modify SDK communications to Xiaomi FDS cloud storage endpoints, potentially exposing authentication credentials, file contents, and API responses. The XiaoMi/galaxy-fds-sdk-android open source project has reached end-of-life status.
Severity: 7.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-26216 - Crawl4AI < 0.8.0 Docker API Unauthenticated Remote Code Execution via Hooks Parameter

CVE ID : CVE-2026-26216
Published : Feb. 12, 2026, 4:16 p.m. | 3 hours, 12 minutes ago
Description : Crawl4AI versions prior to 0.8.0 contain a remote code execution vulnerability in the Docker API deployment. The /crawl endpoint accepts a hooks parameter containing Python code that is executed using exec(). The __import__ builtin was included in the allowed builtins, allowing unauthenticated remote attackers to import arbitrary modules and execute system commands. Successful exploitation allows full server compromise, including arbitrary command execution, file read and write access, sensitive data exfiltration, and lateral movement within internal networks.
Severity: 10.0 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-26217 - Crawl4AI < 0.8.0 Docker API Local File Inclusion via file URL Handling

CVE ID : CVE-2026-26217
Published : Feb. 12, 2026, 4:16 p.m. | 3 hours, 12 minutes ago
Description : Crawl4AI versions prior to 0.8.0 contain a local file inclusion vulnerability in the Docker API deployment. The /execute_js, /screenshot, /pdf, and /html endpoints accept file:// URLs, allowing unauthenticated remote attackers to read arbitrary files from the server filesystem. An attacker can access sensitive files such as /etc/passwd, /etc/shadow, application configuration files, and environment variables via /proc/self/environ, potentially exposing credentials, API keys, and internal application structure.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-54756 - BrightSign Players Use of Default Credentials

CVE ID : CVE-2025-54756
Published : Feb. 12, 2026, 5:16 p.m. | 2 hours, 12 minutes ago
Description : BrightSign players running BrightSign OS series 4 prior to v8.5.53.1 or series 5 prior to v9.0.166 use a default password that is guessable with knowledge of the device information. The latest release fixes this issue for new installations; users of old installations are encouraged to change all default passwords.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-55210 - FreePBX API has a Privilege Escalation Error in GraphQL Allowing Authenticated Users to Access Additional Scopes

CVE ID : CVE-2025-55210
Published : Feb. 12, 2026, 5:16 p.m. | 2 hours, 12 minutes ago
Description : FreePBX is an open-source web-based graphical user interface (GUI) that manages Asterisk. Prior to 17.0.5 and 16.0.17, FreePBX module api (PBX API) is vulnerable to privilege escalation by authenticated users with REST/GraphQL API access. This vulnerability allows an attacker to forge a valid JWT with full access to the REST and GraphQL APIs on a FreePBX that they've already connected to, possibly as a lower privileged user. The JWT is signed using the api-oauth.key private key. An attacker can generate their own token if they possess this key (e.g., by accessing an affected instance), and specify any scopes they wish (e.g., rest, gql), bypassing traditional authorization checks. However, FreePBX enforces that the jti (JWT ID) claim must exist in the database (api_access_tokens table in the asterisk MySQL database) in order for the token to be accepted. Therefore, the attacker must know a jti value that already exists on the target instance. This vulnerability is fixed in 17.0.5 and 16.0.17.
Severity: 2.0 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-61879 - Infoblox NIOS Privilege Escalation File Write Vulnerability

CVE ID : CVE-2025-61879
Published : Feb. 12, 2026, 5:16 p.m. | 2 hours, 12 minutes ago
Description : In Infoblox NIOS through 9.0.7, a High-Privileged User Can Trigger an Arbitrary File Write via the Account Creation Mechanism.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-61880 - Infoblox NIOS Deserialization Remote Code Execution

CVE ID : CVE-2025-61880
Published : Feb. 12, 2026, 5:16 p.m. | 2 hours, 12 minutes ago
Description : In Infoblox NIOS through 9.0.7, insecure deserialization can result in remote code execution.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2023-20601 - Cisco RAS TA Driver Buffer Overflow

CVE ID : CVE-2023-20601
Published : Feb. 12, 2026, 6:16 p.m. | 1 hour, 12 minutes ago
Description : Improper input validation within RAS TA Driver can allow a local attacker to access out-of-bounds memory, potentially resulting in a denial-of-service condition.
Severity: 4.6 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2023-31323 - AMD Secure Processor ASP Type Confusion Vulnerability

CVE ID : CVE-2023-31323
Published : Feb. 12, 2026, 6:16 p.m. | 1 hour, 12 minutes ago
Description : Type confusion in the AMD Secure Processor (ASP) could allow an attacker to pass a malformed argument to the External Global Memory Interconnect Trusted Agent (XGMI TA) leading to a memory safety violation potentially resulting in loss of confidentiality, integrity, or availability.
Severity: 8.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-36319 - AMD VCN Firmware Register Write Vulnerability

CVE ID : CVE-2024-36319
Published : Feb. 12, 2026, 6:16 p.m. | 1 hour, 12 minutes ago
Description : Debug code left active in AMD's Video Decoder Engine Firmware (VCN FW) could allow a attacker to submit a maliciously crafted command causing the VCN FW to perform read/writes HW registers, potentially impacting confidentiality, integrity and availabilability of the system.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52533 - Xilinx Spartan Debug Interface Privilege Escalation

CVE ID : CVE-2025-52533
Published : Feb. 12, 2026, 6:16 p.m. | 1 hour, 12 minutes ago
Description : Improper Access Control in an on-chip debug interface could allow a privileged attacker to enable a debug interface and potentially compromise data confidentiality or integrity.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-54519 - Doc Nav DLL Hijacking Privilege Escalation Vulnerability

CVE ID : CVE-2025-54519
Published : Feb. 12, 2026, 6:16 p.m. | 1 hour, 12 minutes ago
Description : A DLL hijacking vulnerability in Doc Nav could allow a local attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.
Severity: 7.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-63421 - Filosoft Comerc.32 Local Code Execution

CVE ID : CVE-2025-63421
Published : Feb. 12, 2026, 6:16 p.m. | 1 hour, 12 minutes ago
Description : An issue in filosoft Comerc.32 Commercial Invoicing v.16.0.0.3 allows a local attacker to execute arbitrary code via the comeinst.exe file
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-69806 - Bareiron Out-of-bounds Read

CVE ID : CVE-2025-69806
Published : Feb. 12, 2026, 6:16 p.m. | 1 hour, 12 minutes ago
Description : p2r3 bareiron commit: 8e4d4020d contains an Out-of-bounds Read, which allows unauthenticated remote attackers to get relative information leakage via a packet sent to the server
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-69807 - Bareiron Buffer Overflow Denial of Service

CVE ID : CVE-2025-69807
Published : Feb. 12, 2026, 6:16 p.m. | 1 hour, 12 minutes ago
Description : p2r3 Bareiron commit: 8e4d4020d is vulnerable to Buffer Overflow, which allows unauthenticated remote attackers to cause a denial of service via a packet sent to the server.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-70981 - CordysCRM SQL Injection Vulnerability

CVE ID : CVE-2025-70981
Published : Feb. 12, 2026, 6:16 p.m. | 1 hour, 12 minutes ago
Description : CordysCRM 1.4.1 is vulnerable to SQL Injection in the employee list query interface (/user/list) via the departmentIds parameter.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-21434 - webtransport-go affected by Memory Exhaustion Attack due to Missing Length Check in WT_CLOSE_SESSION Capsule

CVE ID : CVE-2026-21434
Published : Feb. 12, 2026, 6:18 p.m. | 1 hour, 10 minutes ago
Description : webtransport-go is an implementation of the WebTransport protocol. From 0.3.0 to 0.9.0, an attacker can cause excessive memory consumption in webtransport-go's session implementation by sending a WT_CLOSE_SESSION capsule containing an excessively large Application Error Message. The implementation does not enforce the draft-mandated limit of 1024 bytes on this field, allowing a peer to send an arbitrarily large message payload that is fully read and stored in memory. This allows an attacker to consume an arbitrary amount of memory. The attacker must transmit the full payload to achieve the memory consumption, but the lack of any upper bound makes large-scale attacks feasible given sufficient bandwidth. This vulnerability is fixed in 0.10.0.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...