CVE-2024-13872 |
Description: Bitdefender Box, versions 1.3.11.490 through 1.3.11.505, uses the insecure HTTP protocol to download assets over the Internet to update and restart daemons and detection rules on the devices. Updates can be remotely triggered through the /set_temp_token API method. Then, an unauthenticated and network-adjacent attacker can use man-in-the-middle (MITM) techniques to return malicious responses. Restarted daemons that use malicious assets can then be exploited for remote code execution on the device.
CVSS: CRITICAL (9.4) EPSS Score: 0.02%
March 12th, 2025 (3 months ago)
|
CVE-2024-13871 |
Description: A command injection vulnerability exists in the /check_image_and_trigger_recovery API endpoint of Bitdefender Box 1 (firmware version 1.3.11.490). This flaw allows an unauthenticated, network-adjacent attacker to execute arbitrary commands on the device, potentially leading to full remote code execution (RCE).
CVSS: CRITICAL (9.4) EPSS Score: 0.26%
March 12th, 2025 (3 months ago)
|
CVE-2024-13446 |
Description: The Workreap plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.2.5. This is due to the plugin not properly validating a user's identity prior to (1) performing a social auto-login or (2) updating their profile details (e.g. password). This makes it possible for unauthenticated attackers to (1) login as an arbitrary user if their email address is known or (2) change an arbitrary user's password, including administrators, and leverage that to gain access to their account. NOTE: This vulnerability was partially fixed in version 3.2.5.
CVSS: CRITICAL (9.8) EPSS Score: 0.09%
March 12th, 2025 (3 months ago)
|
CVE-2025-28915 |
Description: Unrestricted Upload of File with Dangerous Type vulnerability in Theme Egg ThemeEgg ToolKit allows Upload a Web Shell to a Web Server. This issue affects ThemeEgg ToolKit: from n/a through 1.2.9.
CVSS: CRITICAL (9.1) EPSS Score: 1.91%
March 11th, 2025 (3 months ago)
|
CVE-2025-26701 |
Description: An issue was discovered in Percona PMM Server (OVA) before 3.0.0-1.ova. The default service account credentials can lead to SSH access, use of Sudo to root, and sensitive data exposure. This is fixed in PMM2 2.42.0-1.ova, 2.43.0-1.ova, 2.43.1-1.ova, 2.43.2-1.ova, and 2.44.0-1.ova and in PMM3 3.0.0-1.ova and later.
CVSS: CRITICAL (10.0) EPSS Score: 0.06%
March 11th, 2025 (3 months ago)
|
CVE-2024-54085 |
Description: AMI’s SPx contains
a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation
of this vulnerability may lead to a loss of confidentiality, integrity, and/or
availability.
CVSS: CRITICAL (10.0) EPSS Score: 0.1%
March 11th, 2025 (3 months ago)
|
CVE-2024-27115 |
Description: A unauthenticated Remote Code Execution (RCE) vulnerability is found in the SO Planning online planning tool. With this vulnerability, an attacker can upload executable files that are moved to a publicly accessible folder before verifying any requirements. This leads to the possibility of execution of code on the underlying system when the file is triggered. The vulnerability has been remediated in version 1.52.02.
CVSS: CRITICAL (10.0) EPSS Score: 79.33% SSVC Exploitation: none
March 11th, 2025 (3 months ago)
|
CVE-2024-27113 |
Description: An unauthenticated Insecure Direct Object Reference (IDOR) to the database has been found in the SO Planning tool that occurs when the public view setting is enabled. An attacker could use this vulnerability to gain access to the underlying database by exporting it as a CSV file. The vulnerability has been remediated in version 1.52.02.
CVSS: CRITICAL (9.3) EPSS Score: 0.14% SSVC Exploitation: none
March 11th, 2025 (3 months ago)
|
CVE-2024-27112 |
Description: A unauthenticated SQL Injection has been found in the SO Planning tool that occurs when the public view setting is enabled. An attacker could use this vulnerability to gain access to the underlying database. The vulnerability has been remediated in version 1.52.02.
CVSS: CRITICAL (9.3) EPSS Score: 0.12% SSVC Exploitation: none
March 11th, 2025 (3 months ago)
|
CVE-2024-21876 |
Description: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability via a URL parameter in Enphase IQ Gateway (formerly known as Envoy) allows an unautheticated attacker to access or create arbitratry files.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225.
CVSS: CRITICAL (9.3) EPSS Score: 0.19% SSVC Exploitation: none
March 11th, 2025 (3 months ago)
|