Post

2025-07-11 Daily Vulns

NEW:

CVEvendor-productdescriptionmetricReferenceurltitleGithubURL 
CVE-2025-27889wftpserver - Wing FTP ServerWing FTP Server before 7.4.4 does not properly validate and sanitize the url parameter of the downloadpass.html endpoint, allowing injection of an arbitrary link. If a user clicks a crafted link, this discloses a cleartext password to the attacker.CVSS3.1: 3.4 - LOW0 1 2Exploitation: pocAutomatable: noTechnical Impact: partialundefinedgithub
CVE-2025-27613j6t - gitkGitk is a Tcl/Tk based Git history browser. Starting with 1.7.0, when a user clones an untrusted repository and runs gitk without additional command arguments, files for which the user has write permission can be created and truncated. The option Support per-file encoding must have been enabled before in Gitk’s Preferences. This option is disabled by default. The same happens when Show origin of this line is used in the main window (regardless of whether Support per-file encoding is enabled or not). This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.CVSS3.1: 3.6 - LOW0 1 2Exploitation: noneAutomatable: noTechnical Impact: partialGitk can create and truncate files in the user’s home directorygithub
CVE-2023-50458dradisframework - DradisIn Dradis before 4.11.0, the Output Console shows a job queue that may contain information about other users’ jobs.CVSS3.1: 3.5 - LOW0 1Exploitation: noneAutomatable: noTechnical Impact: partialundefinedgithub
CVE-2025-0141Palo Alto Networks - GlobalProtect AppPalo Alto Networks - GlobalProtect AppPalo Alto Networks - GlobalProtect UWP AppPalo Alto Networks - GlobalProtect AppAn incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on enables a locally authenticated non administrative user to escalate their privileges to root on macOS and Linux or NT AUTHORITY\SYSTEM on Windows. The GlobalProtect app on iOS, Android, Chrome OS and GlobalProtect UWP app are not affected.CVSS4.0: 8.4 - HIGH0Exploitation: noneAutomatable: noTechnical Impact: totalGlobalProtect App: Privilege Escalation (PE) Vulnerabilitygithub
This post is licensed under CC BY 4.0 by the author.