Skip to content
Vulnerability Recap
What You Missed Last Week
Vulnerability Recap

Cybersecurity News, CVE Recaps, and Education Resource

  • Home
  • What You Missed Last Week
  • HackHer News
  • Cybersecurity Blog
Vulnerability Recap

Cybersecurity News, CVE Recaps, and Education Resource

CVE Updates (July 7–13, 2025)

Vuln Recap Editor, July 14, 2025July 14, 2025

Here are the CVE updates for the week of July 7th through the 13th.

Zero-Day Vulnerabilities

Microsoft SQL Server Information Disclosure Vulnerability | CVE-2025-49719

Description:
An input validation flaw affects Microsoft SQL Server, enabling unauthenticated attackers to retrieve sensitive memory content over the network. This vulnerability impacts multiple versions (2016–2022) and was disclosed publicly before Microsoft released a patch. It has been rated 7.5 on the CVSS 3.1 scale and classified as a zero-day.

Potential Impacts:

  • Sensitive Data Exposure: Uninitialized memory may reveal confidential data.
  • Wider Supply Chain Risk: Applications relying on SQL Server or OLE DB drivers might be indirectly impacted.
  • Unrestricted Access: Exploitation requires no authentication or user interaction.

Mitigation Recommendations:

  • Apply Patches Immediately: Update SQL Server to the latest supported version.
  • Update OLE DB Drivers: Upgrade to version 18 or 19.
  • Network Segmentation: Restrict SQL Server access to trusted environments.
  • Monitor Logs: Actively review logs for suspicious queries or activity.

🔴 Critical Severity Vulnerabilities

PHPMailer Command Injection Vulnerability (CISA KEV) | CVE-2016-10033

Description:
PHPMailer versions prior to 5.2.18 contain a command injection flaw in the mailSend function using the isMail transport. The flaw results from insufficient sanitization of the Sender property. When attackers craft a field including a backslash-double-quote ("), it can be used to manipulate the mail() command and execute arbitrary code.

Potential Impacts:

  • Remote Code Execution: Attackers may run arbitrary commands.
  • System Compromise: Complete server takeover is possible.
  • Data Breach: Sensitive files could be exposed.
  • Persistence: Malicious scripts might be embedded for ongoing access.

Mitigation Recommendations:

  • Upgrade PHPMailer: Use version 5.2.18 or newer.
  • Input Validation: Sanitize fields such as Sender, From, and Reply-To.
  • Use Secure Transports: Prefer isSMTP() over isMail().
  • Monitor for Exploitation: Audit logs for anomalies.

Multi-Router Looking Glass (MRLG) Buffer Overflow Vulnerability (CISA KEV) | CVE-2014-3931

Description:
Versions of MRLG before 5.5.0 contain a flaw in fastping.c that permits arbitrary memory writes. Improper input handling makes the application vulnerable to memory corruption and unexpected behavior, which in turn might enable remote code execution.

Potential Impacts:

  • Memory Corruption: Stability and functionality may degrade.
  • Denial of Service (DoS): Application crashes could occur.
  • Remote Code Execution: Under specific conditions, code execution is possible.

Mitigation Recommendations:

  • Upgrade MRLG: Use version 5.5.0 or later.
  • Network Segmentation: Restrict MRLG instance access.
  • Input Validation: Enforce strict checks on user input.
  • Monitor Logs: Watch for malformed requests targeting fastping.

Citrix NetScaler ADC and Gateway Out-of-Bounds Read Vulnerability (CISA KEV) | CVE-2025-5777

Description:
When configured as a Gateway or AAA virtual server, Citrix NetScaler may suffer from an out-of-bounds read issue. Improper input validation allows remote attackers to send crafted data, potentially triggering memory overread and exposing sensitive content.

Potential Impacts:

  • Information Disclosure: Exposed memory could reveal credentials or system configurations.
  • System Instability: Performance degradation or crashes may result.
  • Security Bypass: Leaked data might facilitate further compromise.

Mitigation Recommendations:

  • Apply Patches: Update to a secure version.
  • Restrict Access: Permit access only from trusted IP ranges.
  • Monitor Traffic: Employ IDS/IPS tools.
  • Enable Logging and Alerts: Track anomalies in memory behavior.

🟠 High Severity Vulnerabilities

Server-Side Request Forgery (SSRF) in Zimbra Collaboration Suite ProxyServlet (CISA KEV) | CVE-2019-9621: Remote attackers can exploit a Server-Side Request Forgery (SSRF) flaw in ProxyServlet to make unauthorized internal requests. As a result, sensitive services and systems may become accessible through a publicly exposed interface.

Rails Ruby on Rails Path Traversal Vulnerability (CISA KEV) | CVE-2019-5418: Older versions of Ruby on Rails can leak server file contents due to a flaw in Action View. Crafted HTTP Accept headers can trigger path traversal, potentially exposing sensitive data from the server’s filesystem.

Privilege Escalation via Insecure File Permissions in Canonical Multipass on macOS | CVE-2025-5199: Incorrect file permissions in Canonical Multipass (≤ 1.15.1) allow local attackers to run arbitrary code during system startup. Exploited files executed by a Launch Daemon may lead to elevated privileges.


🟡 Medium Severity Vulnerabilities

SQL Injection Vulnerability in Modern Bag 1.0 | CVE-2025-7478: An SQL injection vulnerability exists in the idCate parameter of /admin/category-list.php. Due to a lack of input sanitization, remote attackers can manipulate database queries. A public exploit increases the threat level.A SQL injection flaw in idCate parameter on /admin/category-list.php in Modern Bag v1.0 enables remote manipulation of database queries. A public exploit is available.

Missing Authorization in Juniper Networks Security Director Web Interface | CVE-2025-52950: In version 24.4.1, Juniper Security Director’s web interface fails to enforce proper access controls. Unauthenticated users may access or alter restricted resources through exposed endpoints.

Reflected Cross-Site Scripting (XSS) in eGroupWare calendar/freebusy.php | CVE-2023-38329: Version 17.1.20190111 of eGroupWare is vulnerable to reflected XSS in the calendar/freebusy.php file. Because user input is not sanitized, attackers can inject JavaScript via the user parameter, affecting users who click malicious links.

Post Views: 38
What You Missed Last Week CanonicalCitrix NetScaler ADCcve recapCybersecurityCybersecurity UpdateseGroupWareJuniper NetworksMicrosoft SQL ServerMitigation RecommendationsModern Bag 1.0MRLGPHPMailerPotential ImpactsVulnerabilitiesZimbra Collaboration Suite

Post navigation

Previous post
Next post

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

If you'd like to subscribe to our email, add your Name & E-Mail below.

Name
Email
The form has been submitted successfully!
There has been some error while submitting the form. Please verify all form fields again.
©2025 Vulnerability Recap | WordPress Theme by SuperbThemes