CVE-2024-11286 |
Description: The WP JobHunt plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 7.1. This is due to the plugin not properly verifying a user's identity prior to authenticating them through the cs_parse_request() function. This makes it possible for unauthenticated attackers to to log in to any user's account, including administrators.
CVSS: CRITICAL (9.8) EPSS Score: 0.15%
March 14th, 2025 (about 1 month ago)
|
CVE-2024-11285 |
Description: The WP JobHunt plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 7.1. This is due to the plugin not properly validating a user's identity prior to updating their details like email via the account_settings_callback() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
CVSS: CRITICAL (9.8) EPSS Score: 0.07%
March 14th, 2025 (about 1 month ago)
|
CVE-2024-11284 |
Description: The WP JobHunt plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 6.9. This is due to the plugin not properly validating a user's identity prior to updating their password through the account_settings_save_callback() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
CVSS: CRITICAL (9.8) EPSS Score: 0.07%
March 14th, 2025 (about 1 month ago)
|
CVE-2024-22718 |
Description: Cross Site Scripting (XSS) vulnerability in Form Tools 3.1.1 allows attackers to run arbitrary code via the client_id parameter in the application URL.
CVSS: CRITICAL (9.6) EPSS Score: 0.35% SSVC Exploitation: none
March 13th, 2025 (about 1 month ago)
|
CVE-2024-36130 |
Description: An insufficient authorization vulnerability in web component of EPMM prior to 12.1.0.1 allows an unauthorized attacker within the network to execute arbitrary commands on the underlying operating system of the appliance.
CVSS: CRITICAL (9.8) EPSS Score: 9.11% SSVC Exploitation: none
March 13th, 2025 (about 1 month ago)
|
CVE-2024-22923 |
Description: SQL injection vulnerability in adv radius v.2.2.5 allows a local attacker to execute arbitrary code via a crafted script.
CVSS: CRITICAL (9.8) EPSS Score: 0.38% SSVC Exploitation: none
March 13th, 2025 (about 1 month ago)
|
CVE-2024-0039 |
Description: In attp_build_value_cmd of att_protocol.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS: CRITICAL (9.8) EPSS Score: 20.65% SSVC Exploitation: none
March 13th, 2025 (about 1 month ago)
|
CVE-2024-0390 |
Description: INPRAX "iZZi connect" application on Android contains hard-coded MQTT queue credentials. The same MQTT queue is used by corresponding physical recuperation devices. Exploiting this vulnerability could potentially allow unauthorized access to manage and read parameters of the recuperation unit "reQnet iZZi".This issue affects "iZZi connect" application versions before 2024010401.
CVSS: CRITICAL (9.8) EPSS Score: 0.24% SSVC Exploitation: none
March 13th, 2025 (about 1 month ago)
|
CVE-2025-2263 |
Description: During login to the web server in "Sante PACS Server.exe", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker.
CVSS: CRITICAL (9.8) EPSS Score: 0.23%
March 13th, 2025 (about 1 month ago)
|
CVE-2025-2080 |
Description: Optigo Networks Visual BACnet Capture Tool and Optigo Visual Networks Capture Tool version 3.1.2rc11 contain an exposed web management service that could allow an attacker to bypass authentication measures and gain controls over utilities within the products.
CVSS: CRITICAL (9.3) EPSS Score: 0.06%
March 13th, 2025 (about 1 month ago)
|