CVE-2024-37080 |
Description: vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
CVSS: CRITICAL (9.8) EPSS Score: 5.2% SSVC Exploitation: poc
March 13th, 2025 (about 1 month ago)
|
CVE-2024-31473 |
Description: There is a command injection vulnerability in the underlying deauthentication service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
CVSS: CRITICAL (9.8) EPSS Score: 1.33% SSVC Exploitation: none
March 13th, 2025 (about 1 month ago)
|
CVE-2024-20997 |
Description: Vulnerability in the Oracle Hospitality Simphony product of Oracle Food and Beverage Applications (component: Simphony Enterprise Server). Supported versions that are affected are 19.1.0-19.5.4. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hospitality Simphony. While the vulnerability is in Oracle Hospitality Simphony, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Hospitality Simphony. CVSS 3.1 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
CVSS: CRITICAL (9.9) EPSS Score: 1.02% SSVC Exploitation: none
March 13th, 2025 (about 1 month ago)
|
CVE-2024-24996 |
Description: A Heap overflow vulnerability in WLInfoRailService component of Ivanti Avalanche before 6.4.3 allows an unauthenticated remote attacker to execute arbitrary commands.
CVSS: CRITICAL (9.8) EPSS Score: 8.89% SSVC Exploitation: none
March 13th, 2025 (about 1 month ago)
|
CVE-2025-27407 |
Description: graphql-ruby is a Ruby implementation of GraphQL. Starting in version 1.11.5 and prior to versions 1.11.8, 1.12.25, 1.13.24, 2.0.32, 2.1.14, 2.2.17, and 2.3.21, loading a malicious schema definition in `GraphQL::Schema.from_introspection` (or `GraphQL::Schema::Loader.load`) can result in remote code execution. Any system which loads a schema by JSON from an untrusted source is vulnerable, including those that use GraphQL::Client to load external schemas via GraphQL introspection. Versions 1.11.8, 1.12.25, 1.13.24, 2.0.32, 2.1.14, 2.2.17, and 2.3.21 contain a patch for the issue.
CVSS: CRITICAL (9.1) EPSS Score: 4.32% SSVC Exploitation: none
March 12th, 2025 (about 1 month ago)
|
CVE-2024-30620 |
Description: Tenda AX1803 v1.0.0.1 contains a stack overflow via the serviceName parameter in the function fromAdvSetMacMtuWan.
CVSS: CRITICAL (9.8) EPSS Score: 0.33% SSVC Exploitation: poc
March 12th, 2025 (about 1 month ago)
|
CVE-2025-1960 |
Description: CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could cause an
attacker to execute unauthorized commands when a system’s default password credentials have not been
changed on first use. The default username is not displayed correctly in the WebHMI interface.
CVSS: CRITICAL (9.2) EPSS Score: 0.06%
March 12th, 2025 (about 1 month ago)
|
![]() |
Description: CVE-2024-13871, CVE-2024-13872: Unauthenticated Command Injection in Bitdefender BOX v1 and Insecure Update Mechanism Vulnerability in libboxhermes.so in Bitdefender BOX v1
CVSS: CRITICAL (9.4) EPSS Score: 0.26%
March 12th, 2025 (about 1 month ago)
|
CVE-2024-13872 |
Description: Bitdefender Box, versions 1.3.11.490 through 1.3.11.505, uses the insecure HTTP protocol to download assets over the Internet to update and restart daemons and detection rules on the devices. Updates can be remotely triggered through the /set_temp_token API method. Then, an unauthenticated and network-adjacent attacker can use man-in-the-middle (MITM) techniques to return malicious responses. Restarted daemons that use malicious assets can then be exploited for remote code execution on the device.
CVSS: CRITICAL (9.4) EPSS Score: 0.02%
March 12th, 2025 (about 1 month ago)
|
CVE-2024-13871 |
Description: A command injection vulnerability exists in the /check_image_and_trigger_recovery API endpoint of Bitdefender Box 1 (firmware version 1.3.11.490). This flaw allows an unauthenticated, network-adjacent attacker to execute arbitrary commands on the device, potentially leading to full remote code execution (RCE).
CVSS: CRITICAL (9.4) EPSS Score: 0.26%
March 12th, 2025 (about 1 month ago)
|