CyberAlerts provides a trusted catalog of vulnerabilities known to be exploited in the wild, drawing from many sources, including CISA KEV. Organizations can use this catalog to better prioritize and manage vulnerabilities in response to real-world threat activity. Further information here.
Displaying vulnerabilities 101 - 110 of 131 in total
CVE-2025-23209 |
Description: Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. This is an remote code execution (RCE) vulnerability that affects Craft 4 and 5 installs where your security key has already been compromised. Anyone running an unpatched version of Craft with a compromised security key is affected. This vulnerability has been patched in Craft 5.5.8 and 4.13.8. Users who cannot update to a patched version, should rotate their security keys and ensure their privacy to help migitgate the issue.
CVSS: HIGH (8.1) EPSS Score: 0.05%
February 20th, 2025 (4 months ago)
|
CVE-2025-0111 |
Description: An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user.
You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .
This issue does not affect Cloud NGFW or Prisma Access software.
CVSS: HIGH (7.1) EPSS Score: 2.94%
February 20th, 2025 (4 months ago)
|
CVE-2024-53704 |
Description: An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication.
CVSS: CRITICAL (9.8) EPSS Score: 0.04%
February 18th, 2025 (4 months ago)
|
CVE-2025-0108 |
Description: An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS.
You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .
This issue does not affect Cloud NGFW or Prisma Access software.
CVSS: HIGH (8.8) EPSS Score: 96.76%
February 14th, 2025 (5 months ago)
|
CVE-2024-57727 |
Description: SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords.
CVSS: HIGH (7.5) EPSS Score: 0.47%
February 13th, 2025 (5 months ago)
|
CVE-2024-40890 |
Description: A post-authentication command injection vulnerability in the CGI program of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device by sending a crafted HTTP POST request.
CVSS: HIGH (8.8) EPSS Score: 4.13%
February 11th, 2025 (5 months ago)
|
CVE-2025-21391 |
Description: Windows Storage Elevation of Privilege Vulnerability
CVSS: HIGH (7.1) EPSS Score: 0.09%
February 11th, 2025 (5 months ago)
|
CVE-2025-21418 |
Description: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS: HIGH (7.8) EPSS Score: 0.05%
February 11th, 2025 (5 months ago)
|
CVE-2025-24200 |
Description: An authorization issue was addressed with improved state management. This issue is fixed in iPadOS 17.7.5, iOS 18.3.1 and iPadOS 18.3.1. A physical attack may disable USB Restricted Mode on a locked device. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
CVSS: MEDIUM (6.1) EPSS Score: 1.04%
February 10th, 2025 (5 months ago)
|
CVE-2024-21413 |
Description: Microsoft Outlook Remote Code Execution Vulnerability
CVSS: CRITICAL (9.8) EPSS Score: 0.05%
February 6th, 2025 (5 months ago)
|