CVE-2023-20025 |
Description:
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow a remote attacker to bypass authentication or execute arbitrary commands on the underlying operating system of an affected device.
For more information about these vulnerabilities, see the Details section of this advisory.
Cisco has not released software updates to address the vulnerabilities described in this advisory. There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5
Security Impact Rating: Critical
CVE: CVE-2023-20025,CVE-2023-20026,CVE-2023-20118
CVSS: CRITICAL (9.0)
March 7th, 2025 (3 months ago)
|
CVE-2025-27603 |
Description: XWiki Confluence Migrator Pro helps admins to import confluence packages into their XWiki instance. A user that doesn't have programming rights can execute arbitrary code due to an unescaped translation when creating a page using the Migration Page template. This vulnerability is fixed in 1.2.0.
CVSS: CRITICAL (9.1) EPSS Score: 0.1%
March 7th, 2025 (3 months ago)
|
CVE-2025-27519 |
Description: Cognita is a RAG (Retrieval Augmented Generation) Framework for building modular, open source applications for production by TrueFoundry. A path traversal issue exists at /v1/internal/upload-to-local-directory which is enabled when the Local env variable is set to true, such as when Cognita is setup using Docker. Because the docker environment sets up the backend uvicorn server with auto reload enabled, when an attacker overwrites the /app/backend/__init__.py file, the file will automatically be reloaded and executed. This allows an attacker to get remote code execution in the context of the Docker container. This vulnerability is fixed in commit a78bd065e05a1b30a53a3386cc02e08c317d2243.
CVSS: CRITICAL (9.3) EPSS Score: 0.31%
March 7th, 2025 (3 months ago)
|
CVE-2025-22224 |
Description: Check out best practices for shoring up data security and reducing cyber risk. Plus, get tips on how to improve job satisfaction among tech staff. Meanwhile, find out why Congress wants federal contractors to adopt vulnerability disclosure programs. And get the latest on cyber scams; zero-day vulnerabilities; and critical infrastructure security.Dive into six things that are top of mind for the week ending March 6.1 - CSA: How to boost data security and reduce cyber riskRisk assessment gaps. Siloed cyber tools. Misaligned priorities. Those are some of the critical challenges that threaten data security in many enterprises today, according to the new Cloud Security Alliance report “Understanding Data Security Risk,” for which about 900 IT and security professionals were surveyed.Here’s a high-level view of data-security obstacles faced by respondents and of CSA’s mitigation recommendations.Inability to effectively flag vulnerabilities and prioritize their remediation across hybrid and cloud environmentsRecommendations include adopting tools that offer actionable insights into data risks by leveraging multiple risk indicators. Discordant priorities, as executives want to align data security with business goals, but fail to give cyber operations teams the resources they needRecommendations include proactively improving communication and collaboration between these two camps to match cyber investments with data-security goals. Failure from siloed, heterogeneous tools to provid...
CVSS: CRITICAL (9.3) EPSS Score: 24.22%
March 7th, 2025 (3 months ago)
|
CVE-2025-1315 |
Description: The InWave Jobs plugin for WordPress is vulnerable to privilege escalation via password reset in all versions up to, and including, 3.5.1. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
CVSS: CRITICAL (9.8) EPSS Score: 0.06%
March 7th, 2025 (3 months ago)
|
CVE-2024-12876 |
Description: The Golo - City Travel Guide WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.6.10. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
CVSS: CRITICAL (9.8) EPSS Score: 0.06%
March 7th, 2025 (3 months ago)
|
CVE-2025-27816 |
Description: A vulnerability was discovered in the Arctera InfoScale 7.0 through 8.0.2 where a .NET remoting endpoint can be exploited due to the insecure deserialization of potentially untrusted messages. The vulnerability is present in the Windows Plugin_Host service, which runs on all the servers where InfoScale is installed. The service is used only when applications are configured for Disaster Recovery (DR) using the DR wizard. Disabling the Plugin_Host service manually will eliminate the vulnerability.
CVSS: CRITICAL (9.8) EPSS Score: 0.06%
March 7th, 2025 (3 months ago)
|
CVE-2025-1475 |
Description: The WPCOM Member plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.7.5. This is due to insufficient verification on the 'user_phone' parameter when logging in. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if SMS login is enabled.
CVSS: CRITICAL (9.8) EPSS Score: 0.16%
March 7th, 2025 (3 months ago)
|
CVE-2024-4577 |
Description: Threat actors of unknown provenance have been attributed to a malicious campaign predominantly targeting organizations in Japan since January 2025.
"The attacker has exploited the vulnerability CVE-2024-4577, a remote code execution (RCE) flaw in the PHP-CGI implementation of PHP on Windows, to gain initial access to victim machines," Cisco Talos researcher Chetan Raghuprasad said in a technical
CVSS: CRITICAL (9.8) EPSS Score: 95.38%
March 7th, 2025 (3 months ago)
|
CVE-2025-27509 |
Description: fleetdm/fleet is an open source device management, built on osquery. In vulnerable versions of Fleet, an attacker could craft a specially-formed SAML response to forge authentication assertions, provision a new administrative user account if Just-In-Time (JIT) provisioning is enabled, or create new accounts tied to forged assertions if f MDM enrollment is enabled. This vulnerability is fixed in 4.64.2, 4.63.2, 4.62.4, and 4.58.1.
CVSS: CRITICAL (9.3) EPSS Score: 0.09% SSVC Exploitation: none
March 6th, 2025 (3 months ago)
|