CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-25200

Description: Summary Koa uses an evil regex to parse the X-Forwarded-Proto and X-Forwarded-Host HTTP headers. This can be exploited to carry out a Denial-of-Service attack. PoC Coming soon. Impact This is a Regex Denial-of-Service attack and causes memory exhaustion. The regex should be improved and empty values should not be allowed. References https://github.com/koajs/koa/security/advisories/GHSA-593f-38f6-jp5m https://nvd.nist.gov/vuln/detail/CVE-2025-25200 https://github.com/koajs/koa/commit/5054af6e31ffd451a4151a1fe144cef6e5d0d83c https://github.com/koajs/koa/commit/5f294bb1c7c8d9c61904378d250439a321bffd32 https://github.com/koajs/koa/commit/93fe903fc966635a991bcf890cfc3427d33a1a08 https://github.com/koajs/koa/releases/tag/2.15.4 https://github.com/advisories/GHSA-593f-38f6-jp5m

CVSS: CRITICAL (9.2)

EPSS Score: 0.04%

Source: Github Advisory Database (NPM)
February 12th, 2025 (4 months ago)

CVE-2025-24434

Description: Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high. References https://nvd.nist.gov/vuln/detail/CVE-2025-24434 https://helpx.adobe.com/security/products/magento/apsb25-08.html https://github.com/advisories/GHSA-fppq-f2m6-xv5c

CVSS: CRITICAL (9.1)

EPSS Score: 0.05%

Source: Github Advisory Database (Composer)
February 12th, 2025 (4 months ago)

CVE-2025-24434

Description: Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high. References https://nvd.nist.gov/vuln/detail/CVE-2025-24434 https://helpx.adobe.com/security/products/magento/apsb25-08.html https://github.com/advisories/GHSA-fppq-f2m6-xv5c

CVSS: CRITICAL (9.1)

EPSS Score: 0.05%

Source: Github Advisory Database (Composer)
February 12th, 2025 (4 months ago)

CVE-2025-24973

Description: Concorde, formerly know as Nexkey, is a fork of the federated microblogging platform Misskey. Prior to version 12.25Q1.1, due to an improper implementation of the logout process, authentication credentials remain in cookies even after a user has explicitly logged out, which may allow an attacker to steal authentication tokens. This could have devastating consequences if a user with admin privileges is (or was) using a shared device. Users who have logged in on a shared device should go to Settings > Security and regenerate their login tokens. Version 12.25Q1.1 fixes the issue. As a workaround, clear cookies and site data in the browser after logging out.

CVSS: CRITICAL (9.4)

EPSS Score: 0.04%

Source: CVE
February 12th, 2025 (4 months ago)

CVE-2025-24434

Description: Adobe Commerce versions 2.4.7-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high.

CVSS: CRITICAL (9.1)

EPSS Score: 0.05%

Source: CVE
February 12th, 2025 (4 months ago)

CVE-2025-22467

Description: A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.6 allows a remote authenticated attacker to achieve remote code execution.

CVSS: CRITICAL (9.9)

EPSS Score: 0.05%

Source: CVE
February 12th, 2025 (4 months ago)

CVE-2025-21198

Description: Microsoft High Performance Compute (HPC) Pack Remote Code Execution Vulnerability

CVSS: CRITICAL (9.0)

EPSS Score: 0.05%

Source: CVE
February 12th, 2025 (4 months ago)

CVE-2025-1144

Description: School Affairs System from Quanxun has an Exposure of Sensitive Information, allowing unauthenticated attackers to view specific pages and obtain database information as well as plaintext administrator credentials.

CVSS: CRITICAL (9.8)

EPSS Score: 0.04%

Source: CVE
February 12th, 2025 (4 months ago)

CVE-2025-1126

Description: A Reliance on Untrusted Inputs in a Security Decision vulnerability has been identified in the Lexmark Print Management Client.

CVSS: CRITICAL (9.3)

EPSS Score: 0.04%

Source: CVE
February 12th, 2025 (4 months ago)

CVE-2025-1044

Description: Logsign Unified SecOps Platform Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Logsign Unified SecOps Platform. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 443 by default. The issue results from the lack of proper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-25336.

CVSS: CRITICAL (9.8)

EPSS Score: 0.09%

Source: CVE
February 12th, 2025 (4 months ago)