Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-37080

Description: vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

CVSS: CRITICAL (9.8)

EPSS Score: 5.2%

SSVC Exploitation: poc

Source: CVE
March 13th, 2025 (about 1 month ago)

CVE-2024-31473

Description: There is a command injection vulnerability in the underlying deauthentication service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS: CRITICAL (9.8)

EPSS Score: 1.33%

SSVC Exploitation: none

Source: CVE
March 13th, 2025 (about 1 month ago)

CVE-2024-20997

Description: Vulnerability in the Oracle Hospitality Simphony product of Oracle Food and Beverage Applications (component: Simphony Enterprise Server). Supported versions that are affected are 19.1.0-19.5.4. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Simphony. While the vulnerability is in Oracle Hospitality Simphony, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Hospitality Simphony. CVSS 3.1 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).

CVSS: CRITICAL (9.9)

EPSS Score: 1.02%

SSVC Exploitation: none

Source: CVE
March 13th, 2025 (about 1 month ago)

CVE-2024-24996

Description: A Heap overflow vulnerability in WLInfoRailService component of Ivanti Avalanche before 6.4.3 allows an unauthenticated remote attacker to execute arbitrary commands.

CVSS: CRITICAL (9.8)

EPSS Score: 8.89%

SSVC Exploitation: none

Source: CVE
March 13th, 2025 (about 1 month ago)

CVE-2025-27407

Description: graphql-ruby is a Ruby implementation of GraphQL. Starting in version 1.11.5 and prior to versions 1.11.8, 1.12.25, 1.13.24, 2.0.32, 2.1.14, 2.2.17, and 2.3.21, loading a malicious schema definition in `GraphQL::Schema.from_introspection` (or `GraphQL::Schema::Loader.load`) can result in remote code execution. Any system which loads a schema by JSON from an untrusted source is vulnerable, including those that use GraphQL::Client to load external schemas via GraphQL introspection. Versions 1.11.8, 1.12.25, 1.13.24, 2.0.32, 2.1.14, 2.2.17, and 2.3.21 contain a patch for the issue.

CVSS: CRITICAL (9.1)

EPSS Score: 4.32%

SSVC Exploitation: none

Source: CVE
March 12th, 2025 (about 1 month ago)

CVE-2024-30620

Description: Tenda AX1803 v1.0.0.1 contains a stack overflow via the serviceName parameter in the function fromAdvSetMacMtuWan.

CVSS: CRITICAL (9.8)

EPSS Score: 0.33%

SSVC Exploitation: poc

Source: CVE
March 12th, 2025 (about 1 month ago)

CVE-2025-1960

Description: CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could cause an attacker to execute unauthorized commands when a system’s default password credentials have not been changed on first use. The default username is not displayed correctly in the WebHMI interface.

CVSS: CRITICAL (9.2)

EPSS Score: 0.06%

Source: CVE
March 12th, 2025 (about 1 month ago)
Description: CVE-2024-13871, CVE-2024-13872: Unauthenticated Command Injection in Bitdefender BOX v1 and Insecure Update Mechanism Vulnerability in libboxhermes.so in Bitdefender BOX v1

CVSS: CRITICAL (9.4)

EPSS Score: 0.26%

Source: DarkWebInformer
March 12th, 2025 (about 1 month ago)

CVE-2024-13872

Description: Bitdefender Box, versions 1.3.11.490 through 1.3.11.505, uses the insecure HTTP protocol to download assets over the Internet to update and restart daemons and detection rules on the devices. Updates can be remotely triggered through the /set_temp_token API method. Then, an unauthenticated and network-adjacent attacker can use man-in-the-middle (MITM) techniques to return malicious responses. Restarted daemons that use malicious assets can then be exploited for remote code execution on the device.

CVSS: CRITICAL (9.4)

EPSS Score: 0.02%

Source: CVE
March 12th, 2025 (about 1 month ago)

CVE-2024-13871

Description: A command injection vulnerability exists in the /check_image_and_trigger_recovery API endpoint of Bitdefender Box 1 (firmware version 1.3.11.490). This flaw allows an unauthenticated, network-adjacent attacker to execute arbitrary commands on the device, potentially leading to full remote code execution (RCE).

CVSS: CRITICAL (9.4)

EPSS Score: 0.26%

Source: CVE
March 12th, 2025 (about 1 month ago)