CVE tracker
282 subscribers
3.66K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2025-63421 - Filosoft Comerc.32 Local Code Execution

CVE ID : CVE-2025-63421
Published : Feb. 12, 2026, 6:16 p.m. | 1 hour, 12 minutes ago
Description : An issue in filosoft Comerc.32 Commercial Invoicing v.16.0.0.3 allows a local attacker to execute arbitrary code via the comeinst.exe file
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-69806 - Bareiron Out-of-bounds Read

CVE ID : CVE-2025-69806
Published : Feb. 12, 2026, 6:16 p.m. | 1 hour, 12 minutes ago
Description : p2r3 bareiron commit: 8e4d4020d contains an Out-of-bounds Read, which allows unauthenticated remote attackers to get relative information leakage via a packet sent to the server
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-69807 - Bareiron Buffer Overflow Denial of Service

CVE ID : CVE-2025-69807
Published : Feb. 12, 2026, 6:16 p.m. | 1 hour, 12 minutes ago
Description : p2r3 Bareiron commit: 8e4d4020d is vulnerable to Buffer Overflow, which allows unauthenticated remote attackers to cause a denial of service via a packet sent to the server.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-70981 - CordysCRM SQL Injection Vulnerability

CVE ID : CVE-2025-70981
Published : Feb. 12, 2026, 6:16 p.m. | 1 hour, 12 minutes ago
Description : CordysCRM 1.4.1 is vulnerable to SQL Injection in the employee list query interface (/user/list) via the departmentIds parameter.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-21434 - webtransport-go affected by Memory Exhaustion Attack due to Missing Length Check in WT_CLOSE_SESSION Capsule

CVE ID : CVE-2026-21434
Published : Feb. 12, 2026, 6:18 p.m. | 1 hour, 10 minutes ago
Description : webtransport-go is an implementation of the WebTransport protocol. From 0.3.0 to 0.9.0, an attacker can cause excessive memory consumption in webtransport-go's session implementation by sending a WT_CLOSE_SESSION capsule containing an excessively large Application Error Message. The implementation does not enforce the draft-mandated limit of 1024 bytes on this field, allowing a peer to send an arbitrarily large message payload that is fully read and stored in memory. This allows an attacker to consume an arbitrary amount of memory. The attacker must transmit the full payload to achieve the memory consumption, but the lack of any upper bound makes large-scale attacks feasible given sufficient bandwidth. This vulnerability is fixed in 0.10.0.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-21435 - webtransport-go CloseWithError can block indefinitely

CVE ID : CVE-2026-21435
Published : Feb. 12, 2026, 6:22 p.m. | 1 hour, 5 minutes ago
Description : webtransport-go is an implementation of the WebTransport protocol. Prior to v0.10.0, an attacker can cause a denial of service in webtransport-go by preventing or indefinitely delaying WebTransport session closure. A malicious peer can withhold QUIC flow control credit on the CONNECT stream, blocking transmission of the WT_CLOSE_SESSION capsule and causing the close operation to hang. This vulnerability is fixed in v0.10.0.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-21438 - webtransport-go affected by a Memory Exhaustion Attack due to Missing Cleanup of Streams Map

CVE ID : CVE-2026-21438
Published : Feb. 12, 2026, 6:25 p.m. | 1 hour, 3 minutes ago
Description : webtransport-go is an implementation of the WebTransport protocol. Prior to 0.10.0, an attacker can cause unbounded memory consumption repeatedly creating and closing many WebTransport streams. Closed streams were not removed from an internal session map, preventing garbage collection of their resources. This vulnerability is fixed in v0.10.0.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-26218 - newbee-mall Default Seeded Administrator Credentials Allow Account Takeover

CVE ID : CVE-2026-26218
Published : Feb. 12, 2026, 6:38 p.m. | 50 minutes ago
Description : newbee-mall includes pre-seeded administrator accounts in its database initialization script. These accounts are provisioned with a predictable default password. Deployments that initialize or reset the database using the provided schema and fail to change the default administrative credentials may allow unauthenticated attackers to log in as an administrator and gain full administrative control of the application.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-26219 - newbee-mall Unsalted MD5 Password Hashing Enables Offline Credential Cracking

CVE ID : CVE-2026-26219
Published : Feb. 12, 2026, 6:39 p.m. | 49 minutes ago
Description : newbee-mall stores and verifies user passwords using an unsalted MD5 hashing algorithm. The implementation does not incorporate per-user salts or computational cost controls, enabling attackers who obtain password hashes through database exposure, backup leakage, or other compromise vectors to rapidly recover plaintext credentials via offline attacks.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22821 - mreporting affected by a SQLI on date change

CVE ID : CVE-2026-22821
Published : Feb. 12, 2026, 6:43 p.m. | 44 minutes ago
Description : mreporting is the more reporting GLPI plugin. Prior to 1.9.4, there is a possible SQL injection on date change. This vulnerability is fixed in 1.9.4.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2019-25319 - Domain Quester Pro 6.02 - Stack Overflow (SEH)

CVE ID : CVE-2019-25319
Published : Feb. 12, 2026, 10:48 p.m. | 40 minutes ago
Description : Domain Quester Pro 6.02 contains a stack overflow vulnerability that allows remote attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) registers. Attackers can craft a malicious payload targeting the 'Domain Name Keywords' input field to trigger an access violation and execute a bind shell on port 9999.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2019-25320 - elearning-script 1.0 - Authentication Bypass

CVE ID : CVE-2019-25320
Published : Feb. 12, 2026, 10:48 p.m. | 40 minutes ago
Description : E Learning Script 1.0 contains an authentication bypass vulnerability that allows attackers to access the dashboard without valid credentials by manipulating login parameters. Attackers can exploit the /login.php file by sending a specific payload '=''or' to bypass authentication and gain unauthorized access to the system.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2019-25321 - FTP Navigator 8.03 - Stack Overflow (SEH)

CVE ID : CVE-2019-25321
Published : Feb. 12, 2026, 10:48 p.m. | 40 minutes ago
Description : FTP Navigator 8.03 contains a stack overflow vulnerability that allows attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) registers. Attackers can craft a malicious payload that triggers a buffer overflow when pasted into the Custom Command textbox, enabling remote code execution and launching the calculator as proof of concept.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2019-25322 - Heatmiser Netmonitor 3.03 - Hardcoded Credentials

CVE ID : CVE-2019-25322
Published : Feb. 12, 2026, 10:48 p.m. | 40 minutes ago
Description : Heatmiser Netmonitor 3.03 contains a hardcoded credentials vulnerability in the networkSetup.htm page with predictable admin login credentials. Attackers can access the device by using the hard-coded username 'admin' and password 'admin' in the hidden form input fields.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2019-25323 - Heatmiser Netmonitor 3.03 - HTML Injection

CVE ID : CVE-2019-25323
Published : Feb. 12, 2026, 10:48 p.m. | 40 minutes ago
Description : Heatmiser Netmonitor v3.03 contains an HTML injection vulnerability in the outputSetup.htm page that allows attackers to inject malicious HTML code through the outputtitle parameter. Attackers can craft specially formatted POST requests to the outputtitle parameter to execute arbitrary HTML and potentially manipulate the web interface's displayed content.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2019-25324 - RICOH Web Image Monitor 1.09 - HTML Injection

CVE ID : CVE-2019-25324
Published : Feb. 12, 2026, 10:48 p.m. | 40 minutes ago
Description : RICOH Web Image Monitor 1.09 contains an HTML injection vulnerability in the address configuration CGI script that allows attackers to inject malicious HTML code. Attackers can exploit the entryNameIn and entryDisplayNameIn parameters to insert arbitrary HTML content, potentially enabling cross-site scripting attacks.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2019-25325 - Thrive Smart Home 1.1 - 'Smart Home' Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CVE ID : CVE-2019-25325
Published : Feb. 12, 2026, 10:48 p.m. | 40 minutes ago
Description : Thrive Smart Home 1.1 contains an SQL injection vulnerability in the checklogin.php endpoint that allows unauthenticated attackers to bypass authentication by manipulating the 'user' POST parameter. Attackers can inject malicious SQL code like ' or 1=1# to manipulate login queries and gain unauthorized access to the application.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2019-25327 - Prime95 Version 29.8 build 6 - Buffer Overflow (SEH)

CVE ID : CVE-2019-25327
Published : Feb. 12, 2026, 10:48 p.m. | 40 minutes ago
Description : Prime95 version 29.8 build 6 contains a buffer overflow vulnerability in the user ID input field that allows remote attackers to execute arbitrary code. Attackers can craft a malicious payload and paste it into the PrimeNet user ID and proxy host fields to trigger a bind shell on port 3110.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2019-25328 - XnConvert 1.82 - Denial of Service

CVE ID : CVE-2019-25328
Published : Feb. 12, 2026, 10:48 p.m. | 40 minutes ago
Description : XnConvert 1.82 contains a denial of service vulnerability in its registration code input field that allows attackers to crash the application. Attackers can generate a 9000-byte buffer of repeated characters and paste it into the registration code field to trigger an application crash.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2019-25329 - FTP Navigator 8.03 - 'Custom Command' Denial of Service (SEH)

CVE ID : CVE-2019-25329
Published : Feb. 12, 2026, 10:48 p.m. | 40 minutes ago
Description : FTP Navigator 8.03 contains a denial of service vulnerability that allows attackers to crash the application by overwriting Structured Exception Handler (SEH) with malicious input. Attackers can generate a payload of 4108 'A' characters followed by 4 'B' characters and 40 'C' characters to trigger a program crash when pasted into the custom command input.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2019-25330 - SurfOffline Professional 2.2.0.103 - 'Project Name' Denial of Service (SEH)

CVE ID : CVE-2019-25330
Published : Feb. 12, 2026, 10:48 p.m. | 40 minutes ago
Description : SurfOffline Professional 2.2.0.103 contains a structured exception handler (SEH) overflow vulnerability that allows attackers to crash the application by manipulating the project name input. Attackers can generate a malicious payload of 382 'A' characters followed by specific byte sequences to trigger a denial of service condition and overwrite SEH registers.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...