Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-0493

Description: The MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to Limited Local File Inclusion in all versions up to, and including, 4.2.14 via the tabname parameter. This makes it possible for unauthenticated attackers to include PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included

CVSS: CRITICAL (9.8)

EPSS Score: 0.06%

Source: CVE
February 1st, 2025 (3 months ago)

CVE-2024-1741

Description: lunary-ai/lunary version 1.0.1 is vulnerable to improper authorization, allowing removed members to read, create, modify, and delete prompt templates using an old authorization token. Despite being removed from an organization, these members can still perform operations on prompt templates by sending HTTP requests with their previously captured authorization token. This issue exposes organizations to unauthorized access and manipulation of sensitive template data.

CVSS: CRITICAL (9.1)

EPSS Score: 0.12%

Source: CVE
February 1st, 2025 (3 months ago)

CVE-2024-1626

Description: An Insecure Direct Object Reference (IDOR) vulnerability exists in the lunary-ai/lunary repository, version 0.3.0, within the project update endpoint. The vulnerability allows authenticated users to modify the name of any project within the system without proper authorization checks, by directly referencing the project's ID in the PATCH request to the '/v1/projects/:projectId' endpoint. This issue arises because the endpoint does not verify if the provided project ID belongs to the currently authenticated user, enabling unauthorized modifications across different organizational projects.

CVSS: CRITICAL (9.1)

EPSS Score: 0.06%

Source: CVE
February 1st, 2025 (3 months ago)

CVE-2025-24503

Description: A malicious actor can fix the session of a PAM user by tricking the user to click on a specially crafted link to the PAM server.

CVSS: CRITICAL (9.3)

EPSS Score: 0.04%

Source: CVE
January 31st, 2025 (3 months ago)

CVE-2025-0680

Description: Affected products contain a vulnerability in the device cloud rpc command handling process that could allow remote attackers to take control over arbitrary devices connected to the cloud.

CVSS: CRITICAL (9.3)

EPSS Score: 0.04%

Source: CVE
January 31st, 2025 (3 months ago)

CVE-2025-0477

Description: An encryption vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to a weak encryption methodology and could allow a threat actor to extract passwords belonging to other users of the application.

CVSS: CRITICAL (9.3)

EPSS Score: 0.04%

Source: CVE
January 31st, 2025 (3 months ago)

CVE-2024-3502

Description: In lunary-ai/lunary versions up to and including 1.2.5, an information disclosure vulnerability exists where account recovery hashes of users are inadvertently exposed to unauthorized actors. This issue occurs when authenticated users inspect responses from `GET /v1/users/me` and `GET /v1/users/me/org` endpoints. The exposed account recovery hashes, while not directly related to user passwords, represent sensitive information that should not be accessible to unauthorized parties. Exposing these hashes could potentially facilitate account recovery attacks or other malicious activities. The vulnerability was addressed in version 1.2.6.

CVSS: CRITICAL (9.1)

EPSS Score: 0.05%

Source: CVE
January 31st, 2025 (3 months ago)

CVE-2024-3501

Description: In lunary-ai/lunary versions up to and including 1.2.5, an information disclosure vulnerability exists due to the inclusion of single-use tokens in the responses of `GET /v1/users/me` and `GET /v1/users/me/org` API endpoints. These tokens, intended for sensitive operations such as password resets or account verification, are exposed to unauthorized actors, potentially allowing them to perform actions on behalf of the user. This issue was addressed in version 1.2.6, where the exposure of single-use tokens in user-facing queries was mitigated.

CVSS: CRITICAL (9.1)

EPSS Score: 0.05%

Source: CVE
January 31st, 2025 (3 months ago)

CVE-2024-25995

Description: An unauthenticated remote attacker can modify configurations to perform a remote code execution, gain root rights or perform an DoS due to improper input validation.

CVSS: CRITICAL (9.8)

EPSS Score: 0.05%

Source: CVE
January 31st, 2025 (3 months ago)

CVE-2024-13742

Description: The iControlWP – Multiple WordPress Site Manager plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.4.5 via deserialization of untrusted input from the reqpars parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.

CVSS: CRITICAL (9.8)

EPSS Score: 0.06%

Source: CVE
January 31st, 2025 (3 months ago)