CVE Feeds
Latest CVEs
Updates on the latest vulnerabilities detected.
-
CVE-2025-68655 - Apache Apache Struts Remote Code Execution
CVE ID :CVE-2025-68655
Published : Dec. 23, 2025, 4:15 a.m. | 4 hours, 14 minutes ago
Description :Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-68654 - Apache HTTP Server Cross-Site Scripting
CVE ID :CVE-2025-68654
Published : Dec. 23, 2025, 4:15 a.m. | 4 hours, 14 minutes ago
Description :Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-68653 - Cisco Router Unvalidated User Input
CVE ID :CVE-2025-68653
Published : Dec. 23, 2025, 4:15 a.m. | 4 hours, 14 minutes ago
Description :Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-68652 - VMware SSH Command Injection
CVE ID :CVE-2025-68652
Published : Dec. 23, 2025, 4:15 a.m. | 4 hours, 14 minutes ago
Description :Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-68651 - Apache HTTP Server Cross-Site Request Forgery
CVE ID :CVE-2025-68651
Published : Dec. 23, 2025, 4:15 a.m. | 4 hours, 14 minutes ago
Description :Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-68650 - Cisco Router Unauthenticated Remote Command Execution
CVE ID :CVE-2025-68650
Published : Dec. 23, 2025, 4:15 a.m. | 4 hours, 14 minutes ago
Description :Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-67743 - Local Deep Research is Vulnerable to Server-Side Request Forgery (SSRF) in Download Service
CVE ID :CVE-2025-67743
Published : Dec. 23, 2025, 1:15 a.m. | 7 hours, 14 minutes ago
Description :Local Deep Research is an AI-powered research assistant for deep, iterative research. In versions from 1.3.0 to before 1.3.9, the download service (download_service.py) makes HTTP requests using raw requests.get() without utilizing the application's SSRF protection (safe_requests.py). This can allow attackers to access internal services and attempt to reach cloud provider metadata endpoints (AWS/GCP/Azure), as well as perform internal network reconnaissance, by submitting malicious URLs through the API, depending on the deployment and surrounding controls. This issue has been patched in version 1.3.9.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-15034 - itsourcecode Student Management System record.php sql injection
CVE ID :CVE-2025-15034
Published : Dec. 23, 2025, 1:15 a.m. | 7 hours, 14 minutes ago
Description :A security flaw has been discovered in itsourcecode Student Management System 1.0. This affects an unknown part of the file /record.php. The manipulation of the argument ID results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-68615 - Net-SNMP snmptrapd crash
CVE ID :CVE-2025-68615
Published : Dec. 23, 2025, 12:15 a.m. | 8 hours, 14 minutes ago
Description :net-snmp is a SNMP application library, tools and daemon. Prior to versions 5.9.5 and 5.10.pre2, a specially crafted packet to an net-snmp snmptrapd daemon can cause a buffer overflow and the daemon to crash. This issue has been patched in versions 5.9.5 and 5.10.pre2.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-68614 - LibreNMS Alert Rule API Cross-Site Scripting Vulnerability
CVE ID :CVE-2025-68614
Published : Dec. 23, 2025, 12:15 a.m. | 8 hours, 14 minutes ago
Description :LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Prior to version 25.12.0, the Alert Rule API is vulnerable to stored cross-site scripting. Alert rules can be created or updated via LibreNMS API. The alert rule name is not properly sanitized, and can be used to inject HTML code. This issue has been patched in version 25.12.0.
Severity: 4.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-68480 - Marshmallow has DoS in Schema.load(many)
CVE ID :CVE-2025-68480
Published : Dec. 22, 2025, 10:16 p.m. | 10 hours, 13 minutes ago
Description :Marshmallow is a lightweight library for converting complex objects to and from simple Python datatypes. In versions from 3.0.0rc1 to before 3.26.2 and from 4.0.0 to before 4.1.2, Schema.load(data, many=True) is vulnerable to denial of service attacks. A moderately sized request can consume a disproportionate amount of CPU time. This issue has been patched in version 3.26.2 and 4.1.2.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-68476 - KEDA has Arbitrary File Read via Insufficient Path Validation in HashiCorp Vault Service Account Credential
CVE ID :CVE-2025-68476
Published : Dec. 22, 2025, 10:16 p.m. | 10 hours, 13 minutes ago
Description :KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.
Severity: 8.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-68475 - Fedify has ReDoS Vulnerability in HTML Parsing Regex
CVE ID :CVE-2025-68475
Published : Dec. 22, 2025, 10:16 p.m. | 10 hours, 13 minutes ago
Description :Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-67436 - PluXml CMS Remote Code Execution Vulnerability
CVE ID :CVE-2025-67436
Published : Dec. 22, 2025, 10:16 p.m. | 10 hours, 13 minutes ago
Description :Authenticated Remote Code Execution (RCE) in PluXml CMS 5.8.22 allows an attacker with administrator panel access to inject a malicious PHP webshell into a theme file (e.g., home.php).
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-65857 - Xiongmai XM530 IP Camera Unauthenticated Video Stream Exposure
CVE ID :CVE-2025-65857
Published : Dec. 22, 2025, 10:16 p.m. | 10 hours, 13 minutes ago
Description :An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06. The GetStreamUri exposes RTSP URIs containing hardcoded credentials enabling direct unauthorized video stream access.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-65856 - Xiongmai XM530 IP Camera Authentication Bypass
CVE ID :CVE-2025-65856
Published : Dec. 22, 2025, 10:16 p.m. | 10 hours, 13 minutes ago
Description :Authentication bypass vulnerability in Xiongmai XM530 IP cameras on Firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06 allows unauthenticated remote attackers to access sensitive device information and live video streams. The ONVIF implementation fails to enforce authentication on 31 critical endpoints, enabling direct unauthorized video stream access.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-34458 - wb2osz/direwolf
CVE ID :CVE-2025-34458
Published : Dec. 22, 2025, 10:16 p.m. | 10 hours, 13 minutes ago
Description :wb2osz/direwolf (Dire Wolf) versions up to and including 1.8, prior to commit 3658a87, contain a reachable assertion vulnerability in the APRS MIC-E decoder function aprs_mic_e() located in src/decode_aprs.c. When processing a specially crafted AX.25 frame containing a MIC-E message with an empty or truncated comment field, the application triggers an unhandled assertion checking for a non-empty comment. This assertion failure causes immediate process termination, allowing a remote, unauthenticated attacker to cause a denial of service by sending malformed APRS traffic.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2025-34457 - wb2osz/direwolf DoS
CVE ID :CVE-2025-34457
Published : Dec. 22, 2025, 10:16 p.m. | 10 hours, 13 minutes ago
Description :wb2osz/direwolf (Dire Wolf) versions up to and including 1.8, prior to commit 694c954, contain a stack-based buffer overflow vulnerability in the function kiss_rec_byte() located in src/kiss_frame.c. When processing crafted KISS frames that reach the maximum allowed frame length (MAX_KISS_LEN), the function appends a terminating FEND byte without reserving sufficient space in the stack buffer. This results in an out-of-bounds write followed by an out-of-bounds read during the subsequent call to kiss_unwrap(), leading to stack memory corruption or application crashes. This vulnerability may allow remote unauthenticated attackers to trigger a denial-of-service condition.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53981 - PhotoShow 3.0 Remote Code Execution via Exiftran Path Injection
CVE ID :CVE-2023-53981
Published : Dec. 22, 2025, 10:16 p.m. | 10 hours, 13 minutes ago
Description :PhotoShow 3.0 contains a remote code execution vulnerability that allows authenticated administrators to inject malicious commands through the exiftran path configuration. Attackers can exploit the ffmpeg configuration settings by base64 encoding a reverse shell command and executing it through a crafted video upload process.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more... -
CVE-2023-53980 - ProjectSend r1605 Remote Code Execution via File Extension Manipulation
CVE ID :CVE-2023-53980
Published : Dec. 22, 2025, 10:16 p.m. | 10 hours, 13 minutes ago
Description :ProjectSend r1605 contains a remote code execution vulnerability that allows attackers to upload malicious files by manipulating file extensions. Attackers can upload shell scripts with disguised extensions through the upload.process.php endpoint to execute arbitrary commands on the server.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Information
Vortech Consulting is a network security and design consulting firm originally founded in 1997. Over our nearly 30 year history we have provided security services and products for a wide variety of companies around the globe.
Company
Who's Online
We have 252 guests and no members online