CVE-2024-56180 |
Description: CWE-502 Deserialization of Untrusted Data at the eventmesh-meta-raft plugin module in Apache EventMesh master branch without release version on windows\linux\mac os e.g. platforms allows attackers to send controlled message and remote code execute via hessian deserialization rpc protocol. Users can use the code under the master branch in project repo or version 1.11.0 to fix this issue.
CVSS: CRITICAL (9.8) EPSS Score: 0.04%
February 15th, 2025 (2 months ago)
|
CVE-2024-52577 |
Description: In Apache Ignite versions from 2.6.0 and before 2.17.0, configured Class Serialization Filters are ignored for some Ignite endpoints. The vulnerability could be exploited if an attacker manually crafts an Ignite message containing a vulnerable object whose class is present in the Ignite server classpath and sends it to Ignite server endpoints. Deserialization of such a message by the Ignite server may result in the execution of arbitrary code on the Apache Ignite server side.
CVSS: CRITICAL (9.5) EPSS Score: 0.04%
February 15th, 2025 (2 months ago)
|
CVE-2024-13152 |
Description: Authorization Bypass Through User-Controlled SQL Primary Key vulnerability in BSS Software Mobuy Online Machinery Monitoring Panel allows SQL Injection.This issue affects Mobuy Online Machinery Monitoring Panel: before 2.0.
CVSS: CRITICAL (10.0) EPSS Score: 0.09%
February 15th, 2025 (2 months ago)
|
CVE-2024-52577 |
Description: In Apache Ignite versions from 2.6.0 and before 2.17.0, configured Class Serialization Filters are ignored for some Ignite endpoints. The vulnerability could be exploited if an attacker manually crafts an Ignite message containing a vulnerable object whose class is present in the Ignite server classpath and sends it to Ignite server endpoints. Deserialization of such a message by the Ignite server may result in the execution of arbitrary code on the Apache Ignite server side.
References
https://nvd.nist.gov/vuln/detail/CVE-2024-52577
https://lists.apache.org/thread/1bst0n27m9kb3b6f6hvlghn182vqb2hh
https://github.com/apache/ignite/commit/f1d3579eabb2c6f5b11b94d58600afc497a8603d
http://www.openwall.com/lists/oss-security/2025/02/14/2
https://github.com/advisories/GHSA-8355-xj3p-hv6q
CVSS: CRITICAL (9.5) EPSS Score: 0.04%
February 14th, 2025 (2 months ago)
|
CVE-2023-20198 |
Description: A newly uncovered cyber espionage campaign led by the Chinese state-sponsored hacking group Salt Typhoon (Red Mike) has compromised vulnerable Cisco devices worldwide, targeting telecommunications providers across multiple countries, including the United States, the United Kingdom, and South Africa. The attack exploits two critical privilege escalation vulnerabilities, CVE-2023-20198 and CVE-2023-20273, found in Cisco IOS XE …
The post Chinese Hackers Breach Cisco Devices in Global Telecom Attacks appeared first on CyberInsider.
CVSS: CRITICAL (10.0)
February 14th, 2025 (2 months ago)
|
CVE-2025-25286 |
Description: Crayfish is a collection of Islandora 8 microservices, one of which, Homarus, provides FFmpeg as a microservice. Prior to Crayfish version 4.1.0, remote code execution may be possible in web-accessible installations of Homarus in certain configurations. The issue has been patched in `islandora/crayfish:4.1.0`. Some workarounds are available. The exploit requires making a request against the Homarus's `/convert` endpoint; therefore, the ability to exploit is much reduced if the microservice is not directly accessible from the Internet, so: Prevent general access from the Internet from hitting Homarus. Alternatively or additionally, configure auth in Crayfish to be more strongly required, such that requests with `Authorization` headers that do not validate are rejected before the problematic CLI interpolation occurs.
CVSS: CRITICAL (9.8) EPSS Score: 0.04%
February 14th, 2025 (2 months ago)
|
CVE-2025-25067 |
Description: mySCADA myPRO Manager
is vulnerable to an OS command injection which could allow a remote attacker to execute arbitrary OS commands.
CVSS: CRITICAL (9.8) EPSS Score: 0.05%
February 14th, 2025 (2 months ago)
|
CVE-2025-24865 |
Description: The administrative web interface of
mySCADA myPRO Manager
can be accessed without authentication
which could allow an unauthorized attacker to retrieve sensitive
information and upload files without the associated password.
CVSS: CRITICAL (10.0) EPSS Score: 0.07%
February 14th, 2025 (2 months ago)
|
CVE-2025-1283 |
Description: The Dingtian DT-R0 Series is vulnerable to an exploit that allows
attackers to bypass login requirements by directly navigating to the
main page.
CVSS: CRITICAL (9.8) EPSS Score: 0.04%
February 14th, 2025 (2 months ago)
|
CVE-2025-1270 |
Description: Insecure direct object reference (IDOR) vulnerability in Anapi Group's h6web, allows an authenticated attacker to access other users' information by making a POST request and modifying the “pkrelated” parameter in the “/h6web/ha_datos_hermano.php” endpoint to refer to another user. In addition, the first request could also allow the attacker to impersonate other users. As a result, all requests made after exploitation of the IDOR vulnerability will be executed with the privileges of the impersonated user.
CVSS: CRITICAL (9.1) EPSS Score: 0.04%
February 14th, 2025 (2 months ago)
|