Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-13446

Description: The Workreap plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.2.5. This is due to the plugin not properly validating a user's identity prior to (1) performing a social auto-login or (2) updating their profile details (e.g. password). This makes it possible for unauthenticated attackers to (1) login as an arbitrary user if their email address is known or (2) change an arbitrary user's password, including administrators, and leverage that to gain access to their account. NOTE: This vulnerability was partially fixed in version 3.2.5.

CVSS: CRITICAL (9.8)

EPSS Score: 0.09%

Source: CVE
March 12th, 2025 (about 1 month ago)

CVE-2025-28915

Description: Unrestricted Upload of File with Dangerous Type vulnerability in Theme Egg ThemeEgg ToolKit allows Upload a Web Shell to a Web Server. This issue affects ThemeEgg ToolKit: from n/a through 1.2.9.

CVSS: CRITICAL (9.1)

EPSS Score: 1.91%

Source: CVE
March 11th, 2025 (about 1 month ago)

CVE-2025-26701

Description: An issue was discovered in Percona PMM Server (OVA) before 3.0.0-1.ova. The default service account credentials can lead to SSH access, use of Sudo to root, and sensitive data exposure. This is fixed in PMM2 2.42.0-1.ova, 2.43.0-1.ova, 2.43.1-1.ova, 2.43.2-1.ova, and 2.44.0-1.ova and in PMM3 3.0.0-1.ova and later.

CVSS: CRITICAL (10.0)

EPSS Score: 0.06%

Source: CVE
March 11th, 2025 (about 1 month ago)

CVE-2024-54085

Description: AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.

CVSS: CRITICAL (10.0)

EPSS Score: 0.1%

Source: CVE
March 11th, 2025 (about 1 month ago)

CVE-2024-27115

Description: A unauthenticated Remote Code Execution (RCE) vulnerability is found in the SO Planning online planning tool. With this vulnerability, an attacker can upload executable files that are moved to a publicly accessible folder before verifying any requirements. This leads to the possibility of execution of code on the underlying system when the file is triggered. The vulnerability has been remediated in version 1.52.02.

CVSS: CRITICAL (10.0)

EPSS Score: 79.33%

SSVC Exploitation: none

Source: CVE
March 11th, 2025 (about 1 month ago)

CVE-2024-27113

Description: An unauthenticated Insecure Direct Object Reference (IDOR) to the database has been found in the SO Planning tool that occurs when the public view setting is enabled. An attacker could use this vulnerability to gain access to the underlying database by exporting it as a CSV file. The vulnerability has been remediated in version 1.52.02.

CVSS: CRITICAL (9.3)

EPSS Score: 0.14%

SSVC Exploitation: none

Source: CVE
March 11th, 2025 (about 1 month ago)

CVE-2024-27112

Description: A unauthenticated SQL Injection has been found in the SO Planning tool that occurs when the public view setting is enabled. An attacker could use this vulnerability to gain access to the underlying database. The vulnerability has been remediated in version 1.52.02.

CVSS: CRITICAL (9.3)

EPSS Score: 0.12%

SSVC Exploitation: none

Source: CVE
March 11th, 2025 (about 1 month ago)

CVE-2024-21876

Description: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability via a URL parameter in Enphase IQ Gateway (formerly known as Envoy) allows an unautheticated attacker to access or create arbitratry files.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225.

CVSS: CRITICAL (9.3)

EPSS Score: 0.19%

SSVC Exploitation: none

Source: CVE
March 11th, 2025 (about 1 month ago)

CVE-2025-1744

Description: Nessus Plugin ID 232570 with Critical Severity Synopsis The remote CBL Mariner host is missing one or more security updates. Description The version of cloud-hypervisor installed on the remote CBL Mariner 2.0 host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the CVE-2025-1744 advisory. - Out-of-bounds Write vulnerability in radareorg radare2 allows heap-based buffer over-read or buffer overflow.This issue affects radare2: before <5.9.9. (CVE-2025-1744)Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the affected packages. Read more at https://www.tenable.com/plugins/nessus/232570

CVSS: CRITICAL (10.0)

EPSS Score: 0.05%

Source: Tenable Plugins
March 11th, 2025 (about 1 month ago)

CVE-2017-12166

Description: Nessus Plugin ID 232579 with Critical Severity Synopsis The remote Ubuntu host is missing one or more security updates. Description The remote Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS host has a package installed that is affected by multiple vulnerabilities as referenced in the USN-7340-1 advisory. It was discovered that OpenVPN did not perform proper input validation when generating a TLS key under certain configuration, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS. (CVE-2017-12166) Reynir Bjrnsson discovered that OpenVPN incorrectly handled certain control channel messages with nonprintable characters. A remote attacker could possibly use this issue to cause OpenVPN to consume resources, or fill up log files with garbage, leading to a denial of service. (CVE-2024-5594)Tenable has extracted the preceding description block directly from the Ubuntu security advisory.Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. Solution Update the affected openvpn package. Read more at https://www.tenable.com/plugins/nessus/232579

CVSS: CRITICAL (9.8)

Source: Tenable Plugins
March 11th, 2025 (about 1 month ago)