Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-58250

Description: The passprompt plugin in pppd in ppp before 2.5.2 mishandles privileges.

CVSS: CRITICAL (9.3)

EPSS Score: 0.02%

SSVC Exploitation: none

Source: CVE
April 22nd, 2025 (about 2 months ago)

CVE-2025-32958

Description: Adept is a language for general purpose programming. Prior to commit a1a41b7, the remoteBuild.yml workflow file uses actions/upload-artifact@v4 to upload the mac-standalone artifact. This artifact is a zip of the current directory, which includes the automatically generated .git/config file containing the run's GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in the AdeptLanguage/Adept repository. This issue has been patched in commit a1a41b7.

CVSS: CRITICAL (9.8)

EPSS Score: 0.06%

Source: CVE
April 21st, 2025 (about 2 months ago)

CVE-2024-38428

Description: url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.

CVSS: CRITICAL (9.1)

EPSS Score: 0.27%

SSVC Exploitation: none

Source: CVE
April 21st, 2025 (about 2 months ago)

CVE-2025-0632

Description: Local File Inclusion (LFI) vulnerability in a Render function of Formulatrix Rock Maker Web (RMW) allows a remote attacker to obtain sensitive data via arbitrary code execution. A malicious actor could execute malicious scripts to automatically download configuration files in known locations to exfiltrate data including credentials, and with no rate limiting a malicious actor could enumerate the filesystem of the host machine and potentially lead to full host compromise. This issue affects Rock Maker Web: from 3.2.1.1 and later

CVSS: CRITICAL (9.2)

EPSS Score: 0.56%

Source: CVE
April 21st, 2025 (about 2 months ago)
Description: Public exploits are now available for a critical Erlang/OTP SSH vulnerability tracked as CVE-2025-32433, allowing unauthenticated attackers to remotely execute code on impacted devices. [...]

CVSS: CRITICAL (10.0)

EPSS Score: 37.73%

Source: BleepingComputer
April 19th, 2025 (about 2 months ago)
Description: ASUS has disclosed a critical security flaw impacting routers with AiCloud enabled that could permit remote attackers to perform unauthorized execution of functions on susceptible devices. The vulnerability, tracked as CVE-2025-2492, has a CVSS score of 9.2 out of a maximum of 10.0. "An improper authentication control vulnerability exists in certain ASUS router firmware series,"

CVSS: CRITICAL (9.2)

EPSS Score: 0.33%

Source: TheHackerNews
April 19th, 2025 (about 2 months ago)

CVE-2025-1093

Description: The AIHub theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the generate_image function in all versions up to, and including, 1.3.7. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

CVSS: CRITICAL (9.8)

EPSS Score: 0.2%

Source: CVE
April 19th, 2025 (about 2 months ago)

CVE-2025-3278

Description: The UrbanGo Membership plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.0.4. This is due to the plugin allowing users who are registering new accounts to set their own role or by supplying 'user_register_role' field. This makes it possible for unauthenticated attackers to gain elevated privileges by creating an account with the administrator role.

CVSS: CRITICAL (9.8)

EPSS Score: 0.1%

Source: CVE
April 19th, 2025 (about 2 months ago)

CVE-2025-28236

Description: Nautel VX Series transmitters VX SW v6.4.0 and below was discovered to contain a remote code execution (RCE) vulnerability in the firmware update process. This vulnerability allows attackers to execute arbitrary code via supplying a crafted update package to the /#/software/upgrades endpoint.

CVSS: CRITICAL (9.8)

EPSS Score: 0.13%

Source: CVE
April 18th, 2025 (about 2 months ago)

CVE-2025-32434

Description: PyTorch is a Python package that provides tensor computation with strong GPU acceleration and deep neural networks built on a tape-based autograd system. In version 2.5.1 and prior, a Remote Command Execution (RCE) vulnerability exists in PyTorch when loading a model using torch.load with weights_only=True. This issue has been patched in version 2.6.0.

CVSS: CRITICAL (9.3)

EPSS Score: 0.41%

Source: CVE
April 18th, 2025 (about 2 months ago)