Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-0364

Description: BigAntSoft BigAnt Server, up to and including version 5.6.06, is vulnerable to unauthenticated remote code execution via account registration. An unauthenticated remote attacker can create an administrative user through the default exposed SaaS registration mechanism. Once an administrator, the attacker can upload and execute arbitrary PHP code using the "Cloud Storage Addin," leading to unauthenticated code execution.

CVSS: CRITICAL (9.8)

EPSS Score: 0.04%

Source: CVE
February 5th, 2025 (3 months ago)

CVE-2024-9644

Description: The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to an authentication bypass vulnerability in the administrative web server. Authentication is not enforced on some administrative functionality when using the "bapply.cgi" endpoint instead of the normal "apply.cgi" endpoint. A remote and unauthenticated can use this vulnerability to modify settings or chain with existing authenticated vulnerabilities.

CVSS: CRITICAL (9.8)

EPSS Score: 0.04%

Source: CVE
February 5th, 2025 (3 months ago)

CVE-2024-9643

Description: The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to authentication bypass due to hard-coded credentials in the administrative web server. An attacker with knowledge of the credentials can gain administrative access via crafted HTTP requests. This issue appears similar to CVE-2023-32645.

CVSS: CRITICAL (9.8)

EPSS Score: 0.04%

Source: CVE
February 5th, 2025 (3 months ago)

CVE-2024-4040

Description: A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.

CVSS: CRITICAL (9.8)

EPSS Score: 96.77%

Source: CVE
February 5th, 2025 (3 months ago)

CVE-2024-21887

Description: A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.

CVSS: CRITICAL (9.1)

EPSS Score: 97.37%

Source: CVE
February 5th, 2025 (3 months ago)

CVE-2025-24958

Description: WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `salvar_tag.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS: CRITICAL (9.4)

EPSS Score: 0.05%

Source: CVE
February 4th, 2025 (3 months ago)

CVE-2025-24957

Description: WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `get_detalhes_socio.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS: CRITICAL (10.0)

EPSS Score: 0.11%

Source: CVE
February 4th, 2025 (3 months ago)

CVE-2025-24906

Description: WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `get_detalhes_cobranca.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS: CRITICAL (10.0)

EPSS Score: 0.11%

Source: CVE
February 4th, 2025 (3 months ago)

CVE-2025-24905

Description: WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `get_codigobarras_cobranca.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS: CRITICAL (10.0)

EPSS Score: 0.11%

Source: CVE
February 4th, 2025 (3 months ago)

CVE-2025-24902

Description: WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `salvar_cargo.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS: CRITICAL (9.4)

EPSS Score: 0.05%

Source: CVE
February 4th, 2025 (3 months ago)