CVE tracker
274 subscribers
3.56K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2026-3057 - a54552239 pearProjectApi Backend Task.php dateTotalForProject sql injection

CVE ID : CVE-2026-3057
Published : Feb. 24, 2026, 3:16 a.m. | 3 hours, 47 minutes ago
Description : A security flaw has been discovered in a54552239 pearProjectApi up to 2.8.10. Affected is the function dateTotalForProject of the file application/common/Model/Task.php of the component Backend Interface. The manipulation of the argument projectCode results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-27461 - Pimcore vulnerable to SQL injection via unsanitized filter value in Dependency Dao RLIKE clause

CVE ID : CVE-2026-27461
Published : Feb. 24, 2026, 4:15 a.m. | 2 hours, 47 minutes ago
Description : Pimcore is an Open Source Data & Experience Management Platform. In versions up to and including 11.5.14.1 and 12.3.2, the filter query parameter in the dependency listing endpoints is JSON-decoded and the value field is concatenated directly into RLIKE clauses without sanitization or parameterized queries. Exploiting this issue requires admin authentication. An attacker with admin panel access can extract the full database including password hashes of other admin users. Version 12.3.3 contains a patch.
Severity: 6.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-3066 - HummerRisk Cloud Compliance Scanning PlatformUtils.java fixedCommand command injection

CVE ID : CVE-2026-3066
Published : Feb. 24, 2026, 4:15 a.m. | 2 hours, 47 minutes ago
Description : A flaw has been found in HummerRisk up to 1.5.0. This vulnerability affects the function fixedCommand of the file hummer-common/hummer-common-core/src/main/java/com/hummer/common/core/utils/PlatformUtils.java of the component Cloud Compliance Scanning. Executing a manipulation can lead to command injection. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-3067 - HummerRisk Archive Extraction CommandUtils.java extractZip path traversal

CVE ID : CVE-2026-3067
Published : Feb. 24, 2026, 4:15 a.m. | 2 hours, 47 minutes ago
Description : A vulnerability has been found in HummerRisk up to 1.5.0. This issue affects the function extractTarGZ/extractZip of the file hummer-common/hummer-common-core/src/main/java/com/hummer/common/core/utils/CommandUtils.java of the component Archive Extraction. The manipulation leads to path traversal. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-3068 - itsourcecode Document Management System deluser.php sql injection

CVE ID : CVE-2026-3068
Published : Feb. 24, 2026, 4:15 a.m. | 2 hours, 47 minutes ago
Description : A weakness has been identified in itsourcecode Document Management System 1.0. This impacts an unknown function of the file /deluser.php. Executing a manipulation of the argument user2del can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-3069 - itsourcecode Document Management System edtlbls.php sql injection

CVE ID : CVE-2026-3069
Published : Feb. 24, 2026, 5:17 a.m. | 1 hour, 46 minutes ago
Description : A security vulnerability has been detected in itsourcecode Document Management System 1.0. Affected is an unknown function of the file /edtlbls.php. The manipulation of the argument field1 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-3070 - SourceCodester Modern Image Gallery App upload.php cross site scripting

CVE ID : CVE-2026-3070
Published : Feb. 24, 2026, 5:17 a.m. | 1 hour, 46 minutes ago
Description : A vulnerability was detected in SourceCodester Modern Image Gallery App 1.0. Affected by this vulnerability is an unknown functionality of the file upload.php. The manipulation of the argument filename results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15386 - Responsive Lightbox & Gallery < 2.6.1 - Unauthenticated Stored XSS

CVE ID : CVE-2025-15386
Published : Feb. 24, 2026, 6:16 a.m. | 46 minutes ago
Description : The Responsive Lightbox & Gallery WordPress plugin before 2.6.1 is vulnerable to an Unauthenticated Stored-XSS attack due to flawed regex replacement rules that can be abused by posting a comment with a malicious link when lightbox for comments are enabled and then approved.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-15589 - MuYuCMS Template Management Template.php delete_dir_file path traversal

CVE ID : CVE-2025-15589
Published : Feb. 24, 2026, 6:16 a.m. | 46 minutes ago
Description : A vulnerability was determined in MuYuCMS 2.7. Affected is the function delete_dir_file of the file application/admin/controller/Template.php of the component Template Management Page. This manipulation of the argument temn/tp causes path traversal. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-24314 - Information Disclosure vulnerability in S/4HANA (Manage Payment Media)

CVE ID : CVE-2026-24314
Published : Feb. 24, 2026, 6:16 a.m. | 46 minutes ago
Description : Under certain conditions SAP S/4HANA (Manage Payment Media) allows an authenticated attacker to access information which would otherwise be restricted. This could cause low impact on confidentiality of the application while integrity and availability are not impacted.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-40538 - SolarWinds Serv-U Broken Access Control Remote Code Execution Vulnerability

CVE ID : CVE-2025-40538
Published : Feb. 24, 2026, 8:16 a.m. | 2 hours, 50 minutes ago
Description : A broken access control vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to create a system admin user and execute arbitrary code as a privileged account via domain admin or group admin privileges. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.
Severity: 9.1 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-40539 - SolarWinds Serv-U Type Confusion Remote Code Execution Vulnerability

CVE ID : CVE-2025-40539
Published : Feb. 24, 2026, 8:16 a.m. | 2 hours, 50 minutes ago
Description : A type confusion vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to execute arbitrary native code as privileged account. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.
Severity: 9.1 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-40540 - SolarWinds Serv-U Type Confusion Remote Code Execution Vulnerability

CVE ID : CVE-2025-40540
Published : Feb. 24, 2026, 8:16 a.m. | 2 hours, 50 minutes ago
Description : A type confusion vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to execute arbitrary native code as privileged account. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.
Severity: 9.1 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-40541 - SolarWinds Serv-U Insecure Direct Object Reference (IDOR) Remote Code Execution Vulnerability

CVE ID : CVE-2025-40541
Published : Feb. 24, 2026, 8:16 a.m. | 2 hours, 50 minutes ago
Description : An Insecure Direct Object Reference (IDOR) vulnerability exists in Serv-U, which when exploited, gives a malicious actor the ability to execute native code as a privileged account. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.
Severity: 9.1 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1229 - Incorrect calculation in CIRCL secp384r1 CombinedMult

CVE ID : CVE-2026-1229
Published : Feb. 24, 2026, 8:16 a.m. | 2 hours, 50 minutes ago
Description : The CombinedMult function in the CIRCL ecc/p384 package (secp384r1 curve) produces an incorrect value for specific inputs. The issue is fixed by using complete addition formulas. ECDH and ECDSA signing relying on this curve are not affected. The bug was fixed in v1.6.3 https://github.com/cloudflare/circl/releases/tag/v1.6.3 .
Severity: 2.9 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-1524 - A local user can be impersonated when using federated authentication with Silent JIT Provisioning.

CVE ID : CVE-2024-1524
Published : Feb. 24, 2026, 9:16 a.m. | 1 hour, 50 minutes ago
Description : When the "Silent Just-In-Time Provisioning" feature is enabled for a federated identity provider (IDP) there is a risk that a local user store user's information may be replaced during the account provisioning process in cases where federated users share the same username as local users. There will be no impact on your deployment if any of the preconditions mentioned below are not met. Only when all the preconditions mentioned below are fulfilled could a malicious actor associate a targeted local user account with a federated IDP user account that they control. The Deployment should have: -An IDP configured for federated authentication with Silent JIT provisioning enabled. The malicious actor should have: -A fresh valid user account in the federated IDP that has not been used earlier. -Knowledge of the username of a valid user in the local IDP. -An account at the federated IDP matching the targeted local username.
Severity: 7.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-11165 - DotCMS Velocity Sandbox Escape Vulnerability

CVE ID : CVE-2025-11165
Published : Feb. 24, 2026, 9:16 a.m. | 1 hour, 50 minutes ago
Description : A sandbox escape vulnerability exists in dotCMS’s Velocity scripting engine (VTools) that allows authenticated users with scripting privileges to bypass class and package restrictions enforced by SecureUberspectorImpl. By dynamically modifying the Velocity engine’s runtime configuration and reinitializing its Uberspect, a malicious actor can remove the introspector.restrict.classes and introspector.restrict.packages protections. Once these restrictions are cleared, the attacker can access arbitrary Java classes, including java.lang.Runtime, and execute arbitrary system commands under the privileges of the application process (e.g. dotCMS or Tomcat user).
Severity: 9.4 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-56373 - Apache Airflow: SSTI to Code Execution in Airflow through Shared DB Information

CVE ID : CVE-2024-56373
Published : Feb. 24, 2026, 10:16 a.m. | 50 minutes ago
Description : DAG Author (who already has quite a lot of permissions) could manipulate database of Airflow 2 in the way to execute arbitrary code in the web-server context, which they should normally not be able to do, leading to potentially remote code execution in the context of web-server (server-side) as a result of a user viewing historical task information. The functionality responsible for that (log template history) has been disabled by default in 2.11.1 and users should upgrade to Airflow 3 if they want to continue to use log template history. They can also manually modify historical log file names if they want to see historical logs that were generated before the last log template change.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-27555 - Apache Airflow: Connection Secrets not masked in UI when Connection are added via Airflow cli

CVE ID : CVE-2025-27555
Published : Feb. 24, 2026, 10:16 a.m. | 50 minutes ago
Description : Airflow versions before 2.11.1 have a vulnerability that allows authenticated users with audit log access to see sensitive values in audit logs which they should not see. When sensitive connection parameters were set via airflow CLI, values of those variables appeared in the audit log and were stored unencrypted in the Airflow database. While this risk is limited to users with audit log access, it is recommended to upgrade to Airflow 2.11.1 or a later version, which addresses this issue. Users who previously used the CLI to set connections should manually delete entries with those connection sensitive values from the log table. This is similar but not the same issue as CVE-2024-50378
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2664 - Out of bounds read vulnerability in grpcfuse kernel module

CVE ID : CVE-2026-2664
Published : Feb. 24, 2026, 10:16 a.m. | 50 minutes ago
Description : An out of bounds read vulnerability in the grpcfuse kernel module present in the Linux VM in Docker Desktop for Windows, Linux and macOS up to version 4.61.0 could allow a local attacker to cause an unspecified impact by writing to /proc/docker entries. The issue has been fixed in Docker Desktop 4.62.0 .
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2786 - Use-after-free in the JavaScript Engine component

CVE ID : CVE-2026-2786
Published : Feb. 24, 2026, 2:16 p.m. | 51 minutes ago
Description : Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...