Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-45607

Description: An issue in the component /manage/ of itranswarp v2.19 allows attackers to bypass authentication via a crafted request.

CVSS: CRITICAL (9.8)

EPSS Score: 0.12%

Source: CVE
May 5th, 2025 (about 1 month ago)

CVE-2025-1909

Description: The BuddyBoss Platform Pro plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.7.01. This is due to insufficient verification on the user being supplied during the Apple OAuth authenticate request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.

CVSS: CRITICAL (9.8)

EPSS Score: 0.33%

Source: CVE
May 5th, 2025 (about 1 month ago)
Description: An XML External Entity (XXE) vulnerability exists in the gateway component of WSO2 API Manager due to insufficient validation of XML input in crafted URL paths. User-supplied XML is parsed without appropriate restrictions, enabling external entity resolution. This vulnerability can be exploited by an unauthenticated remote attacker to read files from the server’s filesystem or perform denial-of-service (DoS) attacks. On systems running JDK 7 or early JDK 8, full file contents may be exposed. On later versions of JDK 8 and newer, only the first line of a file may be read, due to improvements in XML parser behavior. DoS attacks such as "Billion Laughs" payloads can cause service disruption. References https://nvd.nist.gov/vuln/detail/CVE-2025-2905 https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-3993 https://github.com/advisories/GHSA-h94w-8qhg-3xmc

CVSS: CRITICAL (9.1)

EPSS Score: 0.08%

Source: Github Advisory Database (Maven)
May 5th, 2025 (about 1 month ago)

CVE-2025-4318

Description: The AWS Amplify Studio UI component property expressions in the aws-amplify/amplify-codegen-ui package lack input validation. This could potentially allow an authenticated user who has access to create or modify components to run arbitrary JavaScript code during the component rendering and build process.

CVSS: CRITICAL (9.5)

EPSS Score: 0.06%

SSVC Exploitation: none

Source: CVE
May 5th, 2025 (about 1 month ago)

CVE-2025-4052

Description: Inappropriate implementation in DevTools in Google Chrome prior to 136.0.7103.59 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass discretionary access control via a crafted HTML page. (Chromium security severity: Low)

CVSS: CRITICAL (9.8)

EPSS Score: 0.05%

Source: CVE
May 5th, 2025 (about 1 month ago)

CVE-2025-3248

🚨 Marked as known exploited on May 5th, 2025 (about 1 month ago).
Description: CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-3248 Langflow Missing Authentication Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information. Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

CVSS: CRITICAL (9.8)

EPSS Score: 90.92%

Source: All CISA Advisories
May 5th, 2025 (about 1 month ago)

CVE-2025-45238

Description: foxcms v1.2.5 was discovered to contain an arbitrary file deletion vulnerability via the delRestoreSerie method.

CVSS: CRITICAL (9.1)

EPSS Score: 0.19%

Source: CVE
May 5th, 2025 (about 1 month ago)

CVE-2025-24977

Description: OpenCTI is an open cyber threat intelligence (CTI) platform. Prior to version 6.4.11 any user with the capability `manage customizations` can execute commands on the underlying infrastructure where OpenCTI is hosted and can access internal server side secrets by misusing the web-hooks. Since the malicious user gets a root shell inside a container this opens up the the infrastructure environment for further attacks and exposures. Version 6.4.11 fixes the issue.

CVSS: CRITICAL (9.1)

EPSS Score: 0.1%

Source: CVE
May 5th, 2025 (about 1 month ago)
Description: Critical Vulnerability in OpenCTI (CVE-2025-24977) Allows Infrastructure Takeover via Webhook Abuse

CVSS: CRITICAL (9.1)

EPSS Score: 0.1%

Source: DarkWebInformer
May 5th, 2025 (about 1 month ago)
🚨 Marked as known exploited on May 5th, 2025 (about 1 month ago).
Description: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a maximum-severity security flaw impacting Commvault Command Center to its Known Exploited Vulnerabilities (KEV) catalog, a little over a week after it was publicly disclosed. The vulnerability in question is CVE-2025-34028 (CVSS score: 10.0), a path traversal bug that affects 11.38 Innovation Release, from versions

CVSS: CRITICAL (10.0)

EPSS Score: 63.86%

Source: TheHackerNews
May 5th, 2025 (about 1 month ago)