CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-13872

Description: Bitdefender Box, versions 1.3.11.490 through 1.3.11.505, uses the insecure HTTP protocol to download assets over the Internet to update and restart daemons and detection rules on the devices. Updates can be remotely triggered through the /set_temp_token API method. Then, an unauthenticated and network-adjacent attacker can use man-in-the-middle (MITM) techniques to return malicious responses. Restarted daemons that use malicious assets can then be exploited for remote code execution on the device.

CVSS: CRITICAL (9.4)

EPSS Score: 0.02%

Source: CVE
March 12th, 2025 (3 months ago)

CVE-2024-13871

Description: A command injection vulnerability exists in the /check_image_and_trigger_recovery API endpoint of Bitdefender Box 1 (firmware version 1.3.11.490). This flaw allows an unauthenticated, network-adjacent attacker to execute arbitrary commands on the device, potentially leading to full remote code execution (RCE).

CVSS: CRITICAL (9.4)

EPSS Score: 0.26%

Source: CVE
March 12th, 2025 (3 months ago)

CVE-2024-13446

Description: The Workreap plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.2.5. This is due to the plugin not properly validating a user's identity prior to (1) performing a social auto-login or (2) updating their profile details (e.g. password). This makes it possible for unauthenticated attackers to (1) login as an arbitrary user if their email address is known or (2) change an arbitrary user's password, including administrators, and leverage that to gain access to their account. NOTE: This vulnerability was partially fixed in version 3.2.5.

CVSS: CRITICAL (9.8)

EPSS Score: 0.09%

Source: CVE
March 12th, 2025 (3 months ago)

CVE-2025-28915

Description: Unrestricted Upload of File with Dangerous Type vulnerability in Theme Egg ThemeEgg ToolKit allows Upload a Web Shell to a Web Server. This issue affects ThemeEgg ToolKit: from n/a through 1.2.9.

CVSS: CRITICAL (9.1)

EPSS Score: 1.91%

Source: CVE
March 11th, 2025 (3 months ago)

CVE-2025-26701

Description: An issue was discovered in Percona PMM Server (OVA) before 3.0.0-1.ova. The default service account credentials can lead to SSH access, use of Sudo to root, and sensitive data exposure. This is fixed in PMM2 2.42.0-1.ova, 2.43.0-1.ova, 2.43.1-1.ova, 2.43.2-1.ova, and 2.44.0-1.ova and in PMM3 3.0.0-1.ova and later.

CVSS: CRITICAL (10.0)

EPSS Score: 0.06%

Source: CVE
March 11th, 2025 (3 months ago)

CVE-2024-54085

Description: AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.

CVSS: CRITICAL (10.0)

EPSS Score: 0.1%

Source: CVE
March 11th, 2025 (3 months ago)

CVE-2024-27115

Description: A unauthenticated Remote Code Execution (RCE) vulnerability is found in the SO Planning online planning tool. With this vulnerability, an attacker can upload executable files that are moved to a publicly accessible folder before verifying any requirements. This leads to the possibility of execution of code on the underlying system when the file is triggered. The vulnerability has been remediated in version 1.52.02.

CVSS: CRITICAL (10.0)

EPSS Score: 79.33%

SSVC Exploitation: none

Source: CVE
March 11th, 2025 (3 months ago)

CVE-2024-27113

Description: An unauthenticated Insecure Direct Object Reference (IDOR) to the database has been found in the SO Planning tool that occurs when the public view setting is enabled. An attacker could use this vulnerability to gain access to the underlying database by exporting it as a CSV file. The vulnerability has been remediated in version 1.52.02.

CVSS: CRITICAL (9.3)

EPSS Score: 0.14%

SSVC Exploitation: none

Source: CVE
March 11th, 2025 (3 months ago)

CVE-2024-27112

Description: A unauthenticated SQL Injection has been found in the SO Planning tool that occurs when the public view setting is enabled. An attacker could use this vulnerability to gain access to the underlying database. The vulnerability has been remediated in version 1.52.02.

CVSS: CRITICAL (9.3)

EPSS Score: 0.12%

SSVC Exploitation: none

Source: CVE
March 11th, 2025 (3 months ago)

CVE-2024-21876

Description: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability via a URL parameter in Enphase IQ Gateway (formerly known as Envoy) allows an unautheticated attacker to access or create arbitratry files.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225.

CVSS: CRITICAL (9.3)

EPSS Score: 0.19%

SSVC Exploitation: none

Source: CVE
March 11th, 2025 (3 months ago)