CVE Monitor
3.44K subscribers
33.1K links
Download Telegram
{
"Source": "CVE FEED",
"Title": "CVE-2024-58314 - Atcom 2.7.x.x Authenticated Command Injection via Web Configuration CGI",
"Content": "CVE ID : CVE-2024-58314
Published : Dec. 12, 2025, 7:57 p.m. | 10 minutes ago
Description : Atcom 100M IP Phones firmware version 2.7.x.x contains an authenticated command injection vulnerability in the web configuration CGI script that allows attackers to execute arbitrary system commands. Attackers can inject shell commands through the 'cmd' parameter in web_cgi_main.cgi, enabling remote code execution with administrative credentials.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2024-58311 - Dormakaba Saflok System 6000 Key Generation Cryptographic Weakness",
"Content": "CVE ID : CVE-2024-58311
Published : Dec. 12, 2025, 7:57 p.m. | 10 minutes ago
Description : Dormakaba Saflok System 6000 contains a predictable key generation algorithm that allows attackers to derive card access keys from a 32-bit unique identifier. Attackers can exploit the deterministic key generation process by calculating valid access keys using a simple mathematical transformation of the card's unique identifier.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2024-58305 - WonderCMS 4.3.2 Cross-Site Scripting Remote Code Execution via Module Installation",
"Content": "CVE ID : CVE-2024-58305
Published : Dec. 12, 2025, 7:56 p.m. | 11 minutes ago
Description : WonderCMS 4.3.2 contains a cross-site scripting vulnerability that allows attackers to inject malicious JavaScript through the module installation endpoint. Attackers can craft a specially designed XSS payload to install a reverse shell module and execute remote commands by tricking an authenticated administrator into accessing a malicious link.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2024-58299 - PCMan FTP Server 2.0 Remote Buffer Overflow via 'pwd' Command",
"Content": "CVE ID : CVE-2024-58299
Published : Dec. 12, 2025, 7:56 p.m. | 11 minutes ago
Description : PCMan FTP Server 2.0 contains a buffer overflow vulnerability in the 'pwd' command that allows remote attackers to execute arbitrary code. Attackers can send a specially crafted payload during the FTP login process to overwrite memory and potentially gain system access.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2024-14010 - Typora 1.7.4 OS Command Injection via Export PDF Preferences",
"Content": "CVE ID : CVE-2024-14010
Published : Dec. 12, 2025, 7:55 p.m. | 12 minutes ago
Description : Typora 1.7.4 contains a command injection vulnerability in the PDF export preferences that allows attackers to execute arbitrary system commands. Attackers can inject malicious commands into the 'run command' input field during PDF export to achieve remote code execution.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-67734 - Frappe Authenticated Users can Execute JavaScript through its Job Form",
"Content": "CVE ID : CVE-2025-67734
Published : Dec. 12, 2025, 7:48 p.m. | 18 minutes ago
Description : Frappe Learning Management System (LMS) is a learning system that helps users structure their content. Versions prior to 2.42.0 allowed authenticated attackers to enter JavaScript through the Company Website field of the Job Form, exposing users to an XSS attack. The script could then be executed in the browsers of users who opened the malicious job posting. This issue is fixed in version 2.42.0.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14572 - UTT 进取 512W formWebAuthGlobalConfig memory corruption",
"Content": "CVE ID : CVE-2025-14572
Published : Dec. 12, 2025, 7:32 p.m. | 35 minutes ago
Description : A vulnerability was found in UTT 进取 512W up to 1.7.7-171114. This affects an unknown part of the file /goform/formWebAuthGlobalConfig. Performing manipulation of the argument hidcontact results in memory corruption. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-8083 - Vuetify Prototype Pollution via Preset options",
"Content": "CVE ID : CVE-2025-8083
Published : Dec. 12, 2025, 7:29 p.m. | 38 minutes ago
Description : The Preset configuration  feature of Vuetify is vulnerable to Prototype Pollution  due to the internal 'mergeDeep' utility function used to merge options with defaults. Using a specially-crafted, malicious preset can result in polluting all JavaScript objects with arbitrary properties, which can further negatively affect all aspects of the application's behavior. This can lead to a wide range of security issues, including resource exhaustion/denial of service or unauthorized access to data.

If the application utilizes Server-Side Rendering (SSR), this vulnerability could affect the whole server process.

This issue affects Vuetify versions greater than or equal to 2.2.0-beta.2 and less than 3.0.0-alpha.10.

Note:
Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here .
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14372 - Google Chrome Password Manager Use After Free Vulnerability",
"Content": "CVE ID : CVE-2025-14372
Published : Dec. 12, 2025, 7:20 p.m. | 47 minutes ago
Description : Use after free in Password Manager in Google Chrome prior to 143.0.7499.110 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14373 - Google Chrome Android Domain Spoofing Vulnerability",
"Content": "CVE ID : CVE-2025-14373
Published : Dec. 12, 2025, 7:20 p.m. | 47 minutes ago
Description : Inappropriate implementation in Toolbar in Google Chrome on Android prior to 143.0.7499.110 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14174 - Google Chrome ANGLE Out-of-Bounds Memory Access Vulnerability",
"Content": "CVE ID : CVE-2025-14174
Published : Dec. 12, 2025, 7:20 p.m. | 47 minutes ago
Description : Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-8082 - Vuetify XSS via unsanitized 'titleDateFormat' in 'VDatePicker'",
"Content": "CVE ID : CVE-2025-8082
Published : Dec. 12, 2025, 7:16 p.m. | 51 minutes ago
Description : Improper neutralization of the title date in the 'VDatePicker' component in Vuetify, allows unsanitized HTML to be inserted into the page. This can lead to a Cross-Site Scripting (XSS)  attack. The vulnerability occurs because the 'title-date-format' property of the 'VDatePicker' can accept a user created function and assign its output to the 'innerHTML' property of the title element without sanitization.

This issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0.

Note:
Version 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see here .
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14571 - projectworlds Advanced Library Management System borrow_book.php sql injection",
"Content": "CVE ID : CVE-2025-14571
Published : Dec. 12, 2025, 7:16 p.m. | 51 minutes ago
Description : A vulnerability has been found in projectworlds Advanced Library Management System 1.0. Affected by this issue is some unknown functionality of the file /borrow_book.php. Such manipulation of the argument roll_number leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14568 - haxxorsid Stock-Management-System User.php sql injection",
"Content": "CVE ID : CVE-2025-14568
Published : Dec. 12, 2025, 7:16 p.m. | 51 minutes ago
Description : A security vulnerability has been detected in haxxorsid Stock-Management-System up to fbbbf213e9c93b87183a3891f77e3cc7095f22b0. This impacts an unknown function of the file model/User.php. The manipulation of the argument employee_id/id/admin leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. This vulnerability only affects products that are no longer supported by the maintainer.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14569 - ggml-org whisper.cpp common-whisper.cpp read_audio_data use after free",
"Content": "CVE ID : CVE-2025-14569
Published : Dec. 12, 2025, 7:16 p.m. | 51 minutes ago
Description : A vulnerability was detected in ggml-org whisper.cpp up to 1.8.2. Affected is the function read_audio_data of the file /whisper.cpp/examples/common-whisper.cpp. The manipulation results in use after free. The attack requires a local approach. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-14570 - projectworlds Advanced Library Management System view_admin.php sql injection",
"Content": "CVE ID : CVE-2025-14570
Published : Dec. 12, 2025, 7:16 p.m. | 51 minutes ago
Description : A flaw has been found in projectworlds Advanced Library Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /view_admin.php. This manipulation of the argument admin_id causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-67750 - Lightning Flow Scanner is Vulnerable to Code Injection via Unsafe Use of new Function() in APIVersion Rule",
"Content": "CVE ID : CVE-2025-67750
Published : Dec. 12, 2025, 9:15 p.m. | 52 minutes ago
Description : Lightning Flow Scanner provides a A CLI plugin, VS Code Extension and GitHub Action for analysis and optimization of Salesforce Flows. Versions 6.10.5 and below allow a maliciously crafted flow metadata file to cause arbitrary JavaScript execution during scanning. The APIVersion rule uses new Function() to evaluate expression strings, enabling an attacker to supply a malicious expression within rule configuration or crafted flow metadata. This could compromise developer machines, CI runners, or editor environments. This issue is fixed in version 6.10.6.
Severity: 8.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-67634 - Software Acquisition Guide Supplier Response Web Tool XSS",
"Content": "CVE ID : CVE-2025-67634
Published : Dec. 12, 2025, 9:15 p.m. | 52 minutes ago
Description : The CISA Software Acquisition Guide Supplier Response Web Tool before 2025-12-11 was vulnerable to cross-site scripting via text fields. If an attacker could convince a user to import a specially-crafted JSON file, the Tool would load JavaScript from the file into the page. The JavaScript would execute in the context of the user's browser when the user submits the page (clicks 'Next').
Severity: 4.6 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-46289 - Apple macOS Protected User Data Access Vulnerability",
"Content": "CVE ID : CVE-2025-46289
Published : Dec. 12, 2025, 9:15 p.m. | 52 minutes ago
Description : A logic issue was addressed with improved file handling. This issue is fixed in macOS Sonoma 14.8.3, macOS Sequoia 15.7.3. An app may be able to access protected user data.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-43527 - "macOS Sequoia Privilege Escalation"",
"Content": "CVE ID : CVE-2025-43527
Published : Dec. 12, 2025, 9:15 p.m. | 52 minutes ago
Description : A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.7.3. An app may be able to gain root privileges.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή
{
"Source": "CVE FEED",
"Title": "CVE-2025-43530 - "Apple macOS App Sensitive Data Access Vulnerability"",
"Content": "CVE ID : CVE-2025-43530
Published : Dec. 12, 2025, 9:15 p.m. | 52 minutes ago
Description : This issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.8.3, macOS Sequoia 15.7.3. An app may be able to access sensitive user data.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "12 Dec 2025",
"Type": "Vulnerability"
}
πŸ”Ή t.me/cvedetector πŸ”Ή