CVE Feeds
Latest Critical CVEs
Updates on the latest high and critical severity vulnerabilities.
-
CVE-2025-66635 - Seiko Epson Web Config Stack-based Buffer Overflow Vulnerability
CVE ID :CVE-2025-66635
Published : Dec. 16, 2025, 7:15 a.m. | 1 hour, 47 minutes ago
Description :Stack-based buffer overflow vulnerability exists in SEIKO EPSON Web Config. Specially crafted data input by a logged-in user may execute arbitrary code. As for the details of the affected products and versions, see the information provided by the vendor under [References].
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-61976 - CHOCO TEI WATCHER mini Denial of Service (DoS)
CVE ID :CVE-2025-61976
Published : Dec. 16, 2025, 5:16 a.m. | 3 hours, 46 minutes ago
Description :CHOCO TEI WATCHER mini (IB-MCT001) contains an issue with improper check for unusual or exceptional conditions. If a remote attacker sends a specially crafted request to the Video Download interface, the system may become unresponsive.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-62848 - QTS, QuTS hero
CVE ID :CVE-2025-62848
Published : Dec. 16, 2025, 3:15 a.m. | 5 hours, 47 minutes ago
Description :A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. The remote attackers can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.7.3297 build 20251024 and later QuTS hero h5.2.7.3297 build 20251024 and later QuTS hero h5.3.1.3292 build 20251024 and later
Severity: 8.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-59385 - QTS, QuTS hero
CVE ID :CVE-2025-59385
Published : Dec. 16, 2025, 3:15 a.m. | 5 hours, 47 minutes ago
Description :An authentication bypass by spoofing vulnerability has been reported to affect several QNAP operating system versions. The remote attackers can then exploit the vulnerability to access resources which are not otherwise accessible without proper authentication. We have already fixed the vulnerability in the following versions: QTS 5.2.7.3297 build 20251024 and later QuTS hero h5.2.7.3297 build 20251024 and later QuTS hero h5.3.1.3292 build 20251024 and later
Severity: 8.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-67744 - Mermaid XSS vulnerability leads to Remote Code Execution
CVE ID :CVE-2025-67744
Published : Dec. 16, 2025, 1:15 a.m. | 7 hours, 47 minutes ago
Description :DeepChat is an open-source artificial intelligence agent platform that unifies models, tools, and agents. Prior to version 0.5.3, a security vulnerability exists in the Mermaid diagram rendering component that allows arbitrary JavaScript execution. Due to the exposure of the Electron IPC renderer to the DOM, this Cross-Site Scripting (XSS) flaw escalates to full Remote Code Execution (RCE), allowing an attacker to execute arbitrary system commands. Two concurrent issues, unsafe Mermaid configuration and an exposed IPC interface, cause this issue. Version 0.5.3 contains a patch.
Severity: 9.6 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-67736 - Authenticated SQL Injection in FreePBX tts (Text To Speech) module
CVE ID :CVE-2025-67736
Published : Dec. 16, 2025, 1:15 a.m. | 7 hours, 47 minutes ago
Description :The FreePBX module tts (Text to Speech) for FreePBX, an open-source web-based graphical user interface (GUI) that manages Asterisk. Versions prior to 16.0.5 and 17.0.5 are vulnerable to SQL injection by authenticated users with administrator access. Authenticated users with administrative access to the Administrator Control Panel (ACP) can leverage this SQL injection vulnerability to extract sensitive information from the database and execute code on the system as the `asterisk` user with chained elevation to `root` privileges. Users should upgrade to version 16.0.5 or 17.0.5 to receive a fix.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-66449 - ConvertX has Path Traversal that leads to Arbitrary File Write and Arbitrary Code Execution
CVE ID :CVE-2025-66449
Published : Dec. 16, 2025, 1:15 a.m. | 7 hours, 47 minutes ago
Description :ConvertXis a self-hosted online file converter. In versions prior to 0.16.0, the endpoint `/upload` allows an authenticated user to write arbitrary files on the system, overwriting binaries and allowing code execution. The upload function takes `file.name` directly from user supplied data without doing any sanitization on the name thus allowing for arbitrary file write. This can be used to overwrite system binaries with ones provided from an attacker allowing full code execution. Version 0.16.0 contains a patch for the issue.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-9121 - Hitachi Vantara Pentaho Business Analytics Server - Deserialization of Untrusted Data
CVE ID :CVE-2025-9121
Published : Dec. 15, 2025, 11:15 p.m. | 9 hours, 47 minutes ago
Description :Pentaho Data Integration and Analytics Community Dashboard Editor plugin versions before 10.2.0.4, including 9.3.0.x and 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-59947 - NanoMQ has Buffer Overflow
CVE ID :CVE-2025-59947
Published : Dec. 15, 2025, 9:15 p.m. | 11 hours, 47 minutes ago
Description :NanoMQ is a messaging broker/bus for IoT Edge & SDV. Versions prior to 0.24.4 have a buffer overflow case while the PUBLISH packets trigger both shared subscription and vanila subscription. This is fixed in version 0.24.4. As a workaround, disable shared subscription.
Severity: 8.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53892 - Blackcat CMS 1.4 Remote Code Execution via Jquery Plugin Manager
CVE ID :CVE-2023-53892
Published : Dec. 15, 2025, 9:15 p.m. | 11 hours, 47 minutes ago
Description :Blackcat CMS 1.4 contains a remote code execution vulnerability that allows authenticated administrators to upload malicious PHP files through the jquery plugin manager. Attackers can upload a zip file with a PHP shell script and execute arbitrary system commands by accessing the uploaded plugin's PHP file with a 'code' parameter.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53889 - Perch CMS 3.2 Remote Code Execution via Unrestricted File Upload
CVE ID :CVE-2023-53889
Published : Dec. 15, 2025, 9:15 p.m. | 11 hours, 47 minutes ago
Description :Perch CMS 3.2 contains a remote code execution vulnerability that allows authenticated administrators to upload arbitrary PHP files through the assets management interface. Attackers can upload a malicious .phar file with embedded system command execution capabilities to execute arbitrary commands on the server.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53888 - Zomplog 3.9 Remote Code Execution via Authenticated File Manipulation
CVE ID :CVE-2023-53888
Published : Dec. 15, 2025, 9:15 p.m. | 11 hours, 47 minutes ago
Description :Zomplog 3.9 contains a remote code execution vulnerability that allows authenticated attackers to inject and execute arbitrary PHP code through file manipulation endpoints. Attackers can upload malicious JavaScript files, rename them to PHP, and execute system commands by exploiting the saveE and rename actions in the application.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53885 - Webutler v3.2 Remote Code Execution via Arbitrary File Upload
CVE ID :CVE-2023-53885
Published : Dec. 15, 2025, 9:15 p.m. | 11 hours, 47 minutes ago
Description :Webutler v3.2 contains a remote code execution vulnerability that allows authenticated administrators to upload PHP files with system command execution. Attackers can upload a PHAR file with embedded system commands to the media browser and execute arbitrary commands by accessing the uploaded file.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53883 - Webedition CMS v2.9.8.8 Remote Code Execution via PHP Page Creation
CVE ID :CVE-2023-53883
Published : Dec. 15, 2025, 9:15 p.m. | 11 hours, 47 minutes ago
Description :Webedition CMS v2.9.8.8 contains a remote code execution vulnerability that allows authenticated attackers to inject system commands through PHP page creation. Attackers can create a new PHP page with malicious system commands in the description field to execute arbitrary commands on the server.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53881 - ReyeeOS 1.204.1614 Man-in-the-Middle Remote Code Execution via CWMP
CVE ID :CVE-2023-53881
Published : Dec. 15, 2025, 9:15 p.m. | 11 hours, 47 minutes ago
Description :ReyeeOS 1.204.1614 contains an unencrypted CWMP communication vulnerability that allows attackers to intercept and manipulate device communication through a man-in-the-middle attack. Attackers can create a fake CWMP server to inject and execute arbitrary commands on Ruijie Reyee Cloud devices by exploiting the unprotected HTTP polling requests.
Severity: 9.2 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53877 - Bus Reservation System 1.1 Multiple SQL Injection via pickup_id Parameter
CVE ID :CVE-2023-53877
Published : Dec. 15, 2025, 9:15 p.m. | 11 hours, 47 minutes ago
Description :Bus Reservation System 1.1 contains a SQL injection vulnerability in the pickup_id parameter that allows attackers to manipulate database queries. Attackers can exploit boolean-based, error-based, and time-based blind SQL injection techniques to steal information from the database.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53873 - SyncBreeze 15.2.24 Denial of Service via Login Endpoint Overflow
CVE ID :CVE-2023-53873
Published : Dec. 15, 2025, 9:15 p.m. | 11 hours, 47 minutes ago
Description :SyncBreeze 15.2.24 contains a denial of service vulnerability in the login authentication mechanism that allows attackers to crash the service. Attackers can send an oversized password parameter with repeated 'password=' values to overwhelm the login endpoint and potentially disrupt service availability.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53872 - Wp2Fac 1.0 OS Command Injection via send.php Endpoint
CVE ID :CVE-2023-53872
Published : Dec. 15, 2025, 9:15 p.m. | 11 hours, 47 minutes ago
Description :Wp2Fac 1.0 contains an OS command injection vulnerability in the send.php endpoint that allows remote attackers to execute arbitrary system commands. Attackers can inject shell commands through the 'numara' parameter by appending shell commands with '&' operators to execute malicious code.
Severity: 9.3 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53869 - WEBIGniter 28.7.23 Unrestricted File Upload Remote Code Execution
CVE ID :CVE-2023-53869
Published : Dec. 15, 2025, 9:15 p.m. | 11 hours, 47 minutes ago
Description :WEBIGniter 28.7.23 contains a file upload vulnerability that allows authenticated attackers to upload and execute dangerous PHP files through the media function. Attackers can leverage any created account to upload malicious PHP scripts that enable remote code execution on the application server.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53868 - Coppermine Gallery 1.6.25 Remote Code Execution via Plugin Upload
CVE ID :CVE-2023-53868
Published : Dec. 15, 2025, 9:15 p.m. | 11 hours, 47 minutes ago
Description :Coppermine Gallery 1.6.25 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files through the plugin manager. Attackers can upload a zipped PHP file with system commands to the plugin directory and execute arbitrary code by accessing the uploaded plugin script.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Information
Vortech Consulting is a network security and design consulting firm originally founded in 1997. Over our nearly 30 year history we have provided security services and products for a wide variety of companies around the globe.
Company
Who's Online
We have 347 guests and no members online