CVE Feeds
Latest Critical CVEs
Updates on the latest high and critical severity vulnerabilities.
-
CVE-2025-68459 - Ruijie Networks Co., Ltd. AP180 Command Injection Vulnerability
CVE ID :CVE-2025-68459
Published : Dec. 18, 2025, 5:51 a.m. | 30 minutes ago
Description :RG - AP180, Indoor Wall Plate Wireless AP AP180 series provided by Ruijie Networks Co., Ltd. contain an OS command injection vulnerability. An arbitrary OS command may be executed on the product by an attacker who logs in to the CLI service.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-47372 - Buffer Copy Without Checking Size of Input in Boot
CVE ID :CVE-2025-47372
Published : Dec. 18, 2025, 5:29 a.m. | 52 minutes ago
Description :Memory Corruption when a corrupted ELF image with an oversized file size is read into a buffer without authentication.
Severity: 9.0 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-14202 - Cross-Site Request Forgery (CSRF) Leading to Account Takeover via SVG File Upload
CVE ID :CVE-2025-14202
Published : Dec. 18, 2025, 12:16 a.m. | 6 hours, 5 minutes ago
Description :A vulnerability in the file upload at bookmark + asset rendering pipeline allows an attacker to upload a malicious SVG file with JavaScript content. When an authenticated admin user views the SVG file with embedded JavaScript code of shared bookmark, JavaScript executes in the admin’s browser, retrieves the CSRF token, and sends a request to change the admin's password resulting in a full account takeover.
Severity: 8.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-68435 - Zerobyte has Authentication Bypass by Primary Weakness
CVE ID :CVE-2025-68435
Published : Dec. 17, 2025, 11:16 p.m. | 7 hours, 6 minutes ago
Description :Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.
Severity: 9.1 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-68434 - opensourcepos has Cross-Site Request Forgery vulnerability that leads to Unauthorized Administrator Creation
CVE ID :CVE-2025-68434
Published : Dec. 17, 2025, 11:16 p.m. | 7 hours, 6 minutes ago
Description :Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-68147 - opensourcepos has a Cross-site Scripting vulnerability
CVE ID :CVE-2025-68147
Published : Dec. 17, 2025, 11:16 p.m. | 7 hours, 6 minutes ago
Description :Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Stored Cross-Site Scripting (XSS) vulnerability exists in the "Return Policy" configuration field. The application does not properly sanitize user input before saving it to the database or displaying it on receipts. An attacker with access to the "Store Configuration" (such as a rogue administrator or an account compromised via the separate CSRF vulnerability) can inject malicious JavaScript payloads into this field. These payloads are executed in the browser of any user (including other administrators and sales staff) whenever they view a receipt or complete a transaction. This can lead to session hijacking, theft of sensitive data, or unauthorized actions performed on behalf of the victim. The vulnerability has been patched in version 3.4.2 by ensuring the output is escaped using the `esc()` function in the receipt template. As a temporary mitigation, administrators should ensure the "Return Policy" field contains only plain text and strictly avoid entering any HTML tags. There is no code-based workaround other than applying the patch.
Severity: 8.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53933 - Serendipity 2.4.0 Authenticated Remote Code Execution via File Upload
CVE ID :CVE-2023-53933
Published : Dec. 17, 2025, 11:15 p.m. | 7 hours, 6 minutes ago
Description :Serendipity 2.4.0 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files with .phar extension. Attackers can upload files with system command payloads to the media upload endpoint and execute arbitrary commands on the server.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53930 - ProjectSend r1605 Insecure Direct Object Reference File Download Vulnerability
CVE ID :CVE-2023-53930
Published : Dec. 17, 2025, 11:15 p.m. | 7 hours, 6 minutes ago
Description :ProjectSend r1605 contains an insecure direct object reference vulnerability that allows unauthenticated attackers to download private files by manipulating the download ID parameter. Attackers can access any user's private files by changing the 'id' parameter in the download request to process.php.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53929 - phpMyFAQ 3.1.12 CSV Injection via User Profile Export
CVE ID :CVE-2023-53929
Published : Dec. 17, 2025, 11:15 p.m. | 7 hours, 6 minutes ago
Description :phpMyFAQ 3.1.12 contains a CSV injection vulnerability that allows authenticated users to inject malicious formulas into their profile names. Attackers can modify their user profile name with a payload like 'calc|a!z|' to trigger code execution when an administrator exports user data as a CSV file.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53927 - PHPJabbers Simple CMS 5.0 Stored Cross-Site Scripting via Section Creation
CVE ID :CVE-2023-53927
Published : Dec. 17, 2025, 11:15 p.m. | 7 hours, 6 minutes ago
Description :PHPJabbers Simple CMS 5.0 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts through section name parameters. Attackers can create sections with embedded JavaScript payloads that will execute when administrators view the sections, potentially enabling client-side code execution.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53926 - PHPJabbers Simple CMS 5.0 SQL Injection via Column Parameter
CVE ID :CVE-2023-53926
Published : Dec. 17, 2025, 11:15 p.m. | 7 hours, 6 minutes ago
Description :PHPJabbers Simple CMS 5.0 contains a SQL injection vulnerability in the 'column' parameter that allows remote attackers to manipulate database queries. Attackers can inject crafted SQL payloads through the 'column' parameter in the index.php endpoint to potentially extract or modify database information.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53924 - UliCMS 2023.1-sniffing-vicuna Remote Code Execution via Avatar Upload
CVE ID :CVE-2023-53924
Published : Dec. 17, 2025, 11:15 p.m. | 7 hours, 6 minutes ago
Description :UliCMS 2023.1-sniffing-vicuna contains a remote code execution vulnerability that allows authenticated attackers to upload PHP files with .phar extension during profile avatar upload. Attackers can trigger code execution by visiting the uploaded file's location, enabling system command execution through maliciously crafted avatar uploads.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53923 - UliCMS 2023.1 Privilege Escalation via Unauthenticated Admin Account Creation
CVE ID :CVE-2023-53923
Published : Dec. 17, 2025, 11:15 p.m. | 7 hours, 6 minutes ago
Description :UliCMS 2023.1 contains a privilege escalation vulnerability that allows unauthenticated attackers to create administrative accounts through the UserController endpoint. Attackers can send a crafted POST request to /dist/admin/index.php with specific parameters to generate a new admin user with full system access.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53922 - TinyWebGallery v2.5 Remote Code Execution via Unrestricted File Upload
CVE ID :CVE-2023-53922
Published : Dec. 17, 2025, 11:15 p.m. | 7 hours, 6 minutes ago
Description :TinyWebGallery v2.5 contains a remote code execution vulnerability in the admin upload functionality that allows unauthenticated attackers to upload malicious PHP files. Attackers can upload .phar files with embedded system commands to execute arbitrary code on the server by accessing the uploaded file's URL.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53921 - SitemagicCMS 4.4.3 Remote Code Execution via Unrestricted File Upload
CVE ID :CVE-2023-53921
Published : Dec. 17, 2025, 11:15 p.m. | 7 hours, 6 minutes ago
Description :SitemagicCMS 4.4.3 contains a remote code execution vulnerability that allows attackers to upload malicious PHP files to the files/images directory. Attackers can upload a .phar file with system command execution payload to compromise the web application and execute arbitrary system commands.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53917 - Affiliate Me 5.0.1 SQL Injection Vulnerability via Admin Panel
CVE ID :CVE-2023-53917
Published : Dec. 17, 2025, 11:15 p.m. | 7 hours, 6 minutes ago
Description :Affiliate Me version 5.0.1 contains a SQL injection vulnerability in the admin.php endpoint that allows authenticated administrators to manipulate database queries. Attackers can exploit the 'id' parameter with crafted union-based queries to extract sensitive user information including usernames and password hashes.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53914 - UliCMS 2023.1 Authentication Bypass via Mass Assignment Vulnerability
CVE ID :CVE-2023-53914
Published : Dec. 17, 2025, 11:15 p.m. | 7 hours, 6 minutes ago
Description :UliCMS 2023.1 contains an authentication bypass vulnerability that allows unauthenticated attackers to create admin users through mass assignment in the UserController. Attackers can send a crafted POST request to the admin index.php endpoint with specific parameters to generate an administrative account with full system access.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53913 - Rukovoditel 3.3.1 CSV Injection via User Account Export
CVE ID :CVE-2023-53913
Published : Dec. 17, 2025, 11:15 p.m. | 7 hours, 6 minutes ago
Description :Rukovoditel 3.3.1 contains a CSV injection vulnerability that allows authenticated users to inject malicious formulas into the firstname field. Attackers can craft payloads like =calc|a!z| to trigger code execution when an admin exports customer data as a CSV file.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53912 - USB Flash Drives Control 4.1.0.0 Unquoted Service Path Privilege Escalation
CVE ID :CVE-2023-53912
Published : Dec. 17, 2025, 11:15 p.m. | 7 hours, 6 minutes ago
Description :USB Flash Drives Control 4.1.0.0 contains an unquoted service path vulnerability in its service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in 'C:\Program Files\USB Flash Drives Control\usbcs.exe' to inject malicious executables and escalate privileges on Windows systems.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53908 - HiSecOS 04.0.01 Privilege Escalation via User Role Modification
CVE ID :CVE-2023-53908
Published : Dec. 17, 2025, 11:15 p.m. | 7 hours, 6 minutes ago
Description :HiSecOS 04.0.01 contains a privilege escalation vulnerability that allows authenticated users to modify their access role through XML-based NETCONF configuration. Attackers can send crafted XML payloads to the /mops_data endpoint with a specific role value to elevate their user privileges to administrative level.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Information
Vortech Consulting is a network security and design consulting firm originally founded in 1997. Over our nearly 30 year history we have provided security services and products for a wide variety of companies around the globe.
Company
Who's Online
We have 224 guests and no members online