Overview CVE-2025-13412 is a reported Cross-Site Scripting (XSS) vulnerability affecting Campcodes Retro Basketball Shoes Online Store version 1.0. This vulnerability allows a remote attacker to inject malicious scripts into the application, potentially compromising user data or application functionality. While classified as low severity, it’s crucial to understand the potential impact and implement necessary mitigation measures. Technical Details The vulnerability resides within the /admin/admin_running.php file. By manipulating the product_name argument, an attacker can inject malicious JavaScript code. When a user views the page containing the injected script, the script will execute in their browser. This can lead to session hijacking, cookie…
-
-
Overview CVE-2025-13411 is a medium severity vulnerability discovered in Campcodes Retro Basketball Shoes Online Store version 1.0. This vulnerability allows for unrestricted file uploads through the /admin/admin_football.php script. An attacker can exploit this flaw remotely, potentially leading to arbitrary code execution on the server. The exploit is publicly available, increasing the risk of exploitation. Technical Details The vulnerability resides in the way the application handles the product_image argument within the /admin/admin_football.php file. Insufficient validation and sanitization of the uploaded file’s type and content allow an attacker to upload malicious files, such as PHP scripts or other executable files. Because there…
-
Overview A high-severity SQL Injection vulnerability, identified as CVE-2025-13410, has been discovered in Campcodes Retro Basketball Shoes Online Store version 1.0. This vulnerability allows a remote attacker to execute arbitrary SQL commands by manipulating the tid argument in the /admin/receipt.php file. The exploit for this vulnerability is publicly available, making immediate mitigation crucial. Technical Details The vulnerability resides within the /admin/receipt.php file. The application fails to properly sanitize user-supplied input to the tid parameter before using it in a SQL query. This lack of sanitization enables an attacker to inject malicious SQL code into the query, potentially allowing them to…
-
Overview CVE-2025-13147 is a Server-Side Request Forgery (SSRF) vulnerability affecting Progress MOVEit Transfer. This vulnerability could allow an attacker to force the MOVEit Transfer server to make requests to unintended locations, potentially exposing sensitive internal resources or facilitating further attacks. This issue affects MOVEit Transfer versions prior to 2024.1.8, versions from 2025.0.0 before 2025.0.4. Technical Details A Server-Side Request Forgery (SSRF) vulnerability occurs when a web application allows an attacker to control the destination of requests made by the server. In the context of MOVEit Transfer, a successful exploit could enable an attacker to: Scan internal network resources. Access internal…
-
Overview A highly critical SQL Injection vulnerability, identified as CVE-2025-65103, has been discovered in OpenSTAManager, an open-source management software for technical assistance and invoicing. This vulnerability allows any authenticated user, regardless of their permission level, to execute arbitrary SQL queries by manipulating the `display` parameter in an API request. This can lead to a full system compromise. The vulnerability has been patched in OpenSTAManager version 2.9.5. Immediate action is required to update your OpenSTAManager instance to mitigate this risk. Technical Details The vulnerability lies in the insufficient sanitization of user-supplied input in the API endpoints. Specifically, the `display` parameter, intended…
-
Overview CVE-2025-63932 describes a critical unauthenticated remote code execution (RCE) vulnerability affecting D-Link DIR-868L routers with firmware version A1 FW106KRb01.bin. This vulnerability allows an attacker to execute arbitrary shell commands on the router without any authentication, posing a significant security risk. Technical Details The vulnerability resides within the cgibin binary, specifically the HNAP (Home Network Administration Protocol) service. The service fails to properly sanitize the HTTP SOAPAction header field. An unauthenticated attacker can exploit this by crafting a malicious HTTP request with a specially crafted SOAPAction header. This crafted header allows the attacker to inject and execute arbitrary shell commands…
-
Overview CVE-2025-63214 describes a critical vulnerability discovered in BridgeTech VBC Server & Element Manager, specifically affecting firmware versions 6.5.0-10 and 6.5.0-9. This vulnerability allows unauthorized attackers to create and delete arbitrary user accounts, potentially leading to significant security breaches and system compromise. Technical Details The vulnerability stems from a broken access control issue within the BridgeTech VBC Server & Element Manager. Insufficient authorization checks allow attackers to bypass normal authentication mechanisms and directly manipulate user account data. The exact method of exploitation may involve crafted HTTP requests or other methods of injecting commands to the server. According to publicly available…
-
Overview CVE-2025-63213 describes a critical Remote Code Execution (RCE) vulnerability affecting QVidium Opera11 devices running firmware version 2.9.0-Ax4x-opera11. This vulnerability allows a remote attacker to execute arbitrary commands with root privileges by exploiting improper input validation in the /cgi-bin/net_ping.cgi endpoint. Successful exploitation of this vulnerability grants the attacker complete control over the affected device. Technical Details The vulnerability stems from insufficient input validation on the /cgi-bin/net_ping.cgi endpoint. An attacker can craft a malicious GET request, injecting arbitrary commands into a parameter that is subsequently executed by the system. Because these commands are executed with root privileges, the attacker gains complete…
-
Published: 2025-11-19T20:15:53.380 Overview A critical security vulnerability, identified as CVE-2025-63212, has been discovered in GatesAir Flexiva-LX devices. Specifically, models LX100, LX300, LX600, and LX1000 running firmware versions 1.0.13 and 2.0 are affected. This vulnerability allows an unauthenticated attacker to hijack active user sessions by retrieving sensitive session identifiers (sid) from a publicly accessible log file. Technical Details The vulnerability stems from the exposure of session IDs within the /log/Flexiva%20LX.log file. This log file is publicly accessible, meaning no authentication is required to view its contents. When a legitimate user (particularly an administrator) accesses the Flexiva-LX web interface and closes the…
-
Overview CVE-2025-51663 details a security vulnerability within the IPRateLimit implementation of FileCodeBox versions up to 2.2. This vulnerability allows remote attackers to circumvent IP-based rate limiting and failed attempt restrictions by manipulating HTTP headers, specifically X-Real-IP and X-Forwarded-For. Successful exploitation can lead to Denial-of-Service (DoS) attacks or brute-force attempts against share codes. Technical Details The FileCodeBox application utilizes IP-based rate limiting to protect against abuse and unauthorized access. However, the implementation trusts the X-Real-IP and X-Forwarded-For HTTP headers to identify client IP addresses. Attackers can forge these headers with arbitrary values, effectively bypassing the rate limit mechanism. By sending requests…