CVE Feeds
Latest CVEs
Updates on the latest vulnerabilities detected.
-
CVE-2025-14847 - Zlib compressed protocol header length confusion may allow memory read
CVE ID :CVE-2025-14847
Published : Dec. 19, 2025, 11:15 a.m. | 20 minutes ago
Description :Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Server v4.4 versions prior to 4.4.30, MongoDB Server v4.2 versions greater than or equal to 4.2.0, MongoDB Server v4.0 versions greater than or equal to 4.0.0, and MongoDB Server v3.6 versions greater than or equal to 3.6.0.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-66524 - Apache NiFi: Deserialization of Untrusted Data in GetAsanaObject Processor
CVE ID :CVE-2025-66524
Published : Dec. 19, 2025, 10:15 a.m. | 1 hour, 20 minutes ago
Description :Apache NiFi 1.20.0 through 2.6.0 include the GetAsanaObject Processor, which requires integration with a configurable Distribute Map Cache Client Service for storing and retrieving state information. The GetAsanaObject Processor used generic Java Object serialization and deserialization without filtering. Unfiltered Java object deserialization does not provide protection against crafted state information stored in the cache server configured for GetAsanaObject. Exploitation requires an Apache NiFi system running with the GetAsanaObject Processor, and direct access to the configured cache server. Upgrading to Apache NiFi 2.7.0 is the recommended mitigation, which replaces Java Object serialization with JSON serialization. Removing the GetAsanaObject Processor located in the nifi-asana-processors-nar bundle also prevents exploitation.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-14455 - Image Photo Gallery Final Tiles Grid ributor+) Gallery Management
CVE ID :CVE-2025-14455
Published : Dec. 19, 2025, 10:15 a.m. | 1 hour, 20 minutes ago
Description :The Image Photo Gallery Final Tiles Grid plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 3.6.7. This is due to the plugin not properly verifying that a user is authorized to perform actions on gallery management functions. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete, modify, or clone galleries created by any user, including administrators.
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-12361 - myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program
CVE ID :CVE-2025-12361
Published : Dec. 19, 2025, 10:15 a.m. | 1 hour, 20 minutes ago
Description :The myCred – Points Management System For Gamification, Ranks, Badges, and Loyalty Program plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 2.9.7.1. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve sensitive information including user IDs, display names, and email addresses of all users on the site via the get_bank_accounts AJAX action. Passwords are not exposed.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-14151 - SlimStat Analytics ss-Site Scripting
CVE ID :CVE-2025-14151
Published : Dec. 19, 2025, 9:15 a.m. | 2 hours, 20 minutes ago
Description :The SlimStat Analytics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'outbound_resource' parameter in the slimtrack AJAX action in all versions up to, and including, 5.3.2. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-11747 - Colibri Page Builder +) Stored Cross-Site Scripting via Shortcode
CVE ID :CVE-2025-11747
Published : Dec. 19, 2025, 9:15 a.m. | 2 hours, 20 minutes ago
Description :The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the colibri_blog_posts shortcode in all versions up to, and including, 1.0.345 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-66522 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Digital IDs Common Name Field
CVE ID :CVE-2025-66522
Published : Dec. 19, 2025, 8:15 a.m. | 3 hours, 19 minutes ago
Description :A stored cross-site scripting (XSS) vulnerability exists in the Digital IDs functionality of the Foxit PDF Editor Cloud (pdfonline.foxit.com). The application does not properly sanitize or encode the Common Name field of Digital IDs before inserting user-supplied content into the DOM. As a result, embedded HTML or JavaScript may execute whenever the Digital IDs dialog is accessed or when the affected PDF is loaded.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-66521 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Trusted Certificates Feature
CVE ID :CVE-2025-66521
Published : Dec. 19, 2025, 8:15 a.m. | 3 hours, 19 minutes ago
Description :A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com within the Trusted Certificates feature. A crafted payload can be injected as the certificate name, which is later rendered into the DOM without proper sanitization. As a result, the injected script executes each time the Trusted Certificates view is loaded.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-66520 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Portfolio SVG Handling
CVE ID :CVE-2025-66520
Published : Dec. 19, 2025, 8:15 a.m. | 3 hours, 19 minutes ago
Description :A stored cross-site scripting (XSS) vulnerability exists in the Portfolio feature of the Foxit PDF Editor cloud (pdfonline.foxit.com). User-supplied SVG files are not properly sanitized or validated before being inserted into the HTML structure. As a result, embedded HTML or JavaScript within a crafted SVG may execute whenever the Portfolio file list is rendered.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-66519 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Layer Import Functionality
CVE ID :CVE-2025-66519
Published : Dec. 19, 2025, 8:15 a.m. | 3 hours, 19 minutes ago
Description :A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com within the Layer Import functionality. A crafted payload can be injected into the “Create new Layer” field during layer import and is later rendered into the DOM without proper sanitization. As a result, the injected script executes when the Layers panel is accessed.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-66502 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in Page Templates Feature
CVE ID :CVE-2025-66502
Published : Dec. 19, 2025, 8:15 a.m. | 3 hours, 19 minutes ago
Description :A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com within the Page Templates feature. A crafted payload can be stored as the template name, which is later rendered into the DOM without proper sanitization. As a result, the injected script executes each time the affected PDF is loaded.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-66501 - Foxit pdfonline.foxit.com Stored Cross-Site Scripting in eSign Predefined Text Feature
CVE ID :CVE-2025-66501
Published : Dec. 19, 2025, 8:15 a.m. | 3 hours, 19 minutes ago
Description :A stored cross-site scripting (XSS) vulnerability exists in pdfonline.foxit.com within the Predefined Text feature of the Foxit eSign section. A crafted payload can be stored via the Identity “First Name” field, which is later rendered into the DOM without proper sanitization. As a result, the injected script may execute when predefined text is used or when viewing document properties.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-66500 - Foxit webplugins.foxit.com Stored Cross-Site Scripting via postMessage Vulnerability
CVE ID :CVE-2025-66500
Published : Dec. 19, 2025, 8:15 a.m. | 3 hours, 19 minutes ago
Description :A stored cross-site scripting (XSS) vulnerability exists in webplugins.foxit.com. A postMessage handler fails to validate the message origin and directly assigns externalPath to a script source, allowing an attacker to execute arbitrary JavaScript when a crafted postMessage is received.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-66499 - Foxit PDF Reader PDF Parsing Heap-Based Buffer Overflow Remote Code Execution Vulnerability
CVE ID :CVE-2025-66499
Published : Dec. 19, 2025, 7:16 a.m. | 4 hours, 19 minutes ago
Description :A heap-based buffer overflow vulnerability exists in the PDF parsing of Foxit PDF Reader when processing specially crafted JBIG2 data. An integer overflow in the calculation of the image buffer size may occur, potentially allowing a remote attacker to execute arbitrary code.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-66498 - Foxit PDF Reader 3D Annotation Out-of-Bounds Memory Access Vulnerability
CVE ID :CVE-2025-66498
Published : Dec. 19, 2025, 7:16 a.m. | 4 hours, 19 minutes ago
Description :A memory corruption vulnerability exists in the 3D annotation handling of Foxit PDF Reader due to insufficient bounds checking when parsing U3D data. When opening a PDF file containing malformed or specially crafted PRC content, out-of-bounds memory access may occur, resulting in memory corruption.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-66497 - Foxit PDF Reader 3D Annotation Out-of-Bounds Memory Access Vulnerability
CVE ID :CVE-2025-66497
Published : Dec. 19, 2025, 7:16 a.m. | 4 hours, 19 minutes ago
Description :A memory corruption vulnerability exists in the 3D annotation handling of Foxit PDF Reader due to insufficient bounds checking when parsing PRC data. When opening a PDF file containing malformed or specially crafted PRC content, out-of-bounds memory access may occur, resulting in memory corruption.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-66496 - Foxit PDF Reader 3D Annotation Out-of-Bounds Memory Access Vulnerability
CVE ID :CVE-2025-66496
Published : Dec. 19, 2025, 7:16 a.m. | 4 hours, 19 minutes ago
Description :A memory corruption vulnerability exists in the 3D annotation handling of Foxit PDF Reader due to insufficient bounds checking when parsing PRC data. When opening a PDF file containing malformed or specially crafted PRC content, out-of-bounds memory access may occur, resulting in memory corruption.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-66495 - Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulnerability
CVE ID :CVE-2025-66495
Published : Dec. 19, 2025, 7:16 a.m. | 4 hours, 19 minutes ago
Description :A use-after-free vulnerability exists in the annotation handling of Foxit PDF Reader before 2025.2.1, 14.0.1, and 13.2.1 on Windows and MacOS. When opening a PDF containing specially crafted JavaScript, a pointer to memory that has already been freed may be accessed or dereferenced, potentially allowing a remote attacker to execute arbitrary code.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-66494 - Foxit PDF Reader PDF File Parsing Use-After-Free Remote Code Execution Vulnerability
CVE ID :CVE-2025-66494
Published : Dec. 19, 2025, 7:16 a.m. | 4 hours, 19 minutes ago
Description :A use-after-free vulnerability exists in the PDF file parsing of Foxit PDF Reader before 2025.2.1, 14.0.1, and 13.2.1 on Windows. A PDF object managed by multiple parent objects could be freed while still being referenced, potentially allowing a remote attacker to execute arbitrary code.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-66493 - Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability
CVE ID :CVE-2025-66493
Published : Dec. 19, 2025, 7:16 a.m. | 4 hours, 19 minutes ago
Description :A use-after-free vulnerability exists in the AcroForm handling of Foxit PDF Reader and Foxit PDF Editor before 2025.2.1,14.0.1 and 13.2.1 on Windows . When opening a PDF containing specially crafted JavaScript, a pointer to memory that has already been freed may be accessed or dereferenced, potentially allowing a remote attacker to execute arbitrary code.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Information
Vortech Consulting is a network security and design consulting firm originally founded in 1997. Over our nearly 30 year history we have provided security services and products for a wide variety of companies around the globe.
Company
Who's Online
We have 319 guests and no members online