Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-0282

Description: Critical Vulnerability CVE-2025-0282 in Ivanti Connect Secure Enables Remote Command Execution via Buffer Overflow

CVSS: CRITICAL (9.0)

EPSS Score: 15.33%

Source: DarkWebInformer
January 14th, 2025 (3 months ago)

CVE-2024-50603

Description: The security vulnerability tracked as CVE-2024-50603, which rates 10 out of 10 on the CVSS scale, enables unauthenticated remote code execution on affected systems, which cyberattackers are using to plant malware.

CVSS: CRITICAL (10.0)

EPSS Score: 92.43%

Source: Dark Reading
January 13th, 2025 (3 months ago)

CVE-2024-50603

Description: Threat actors are exploiting a critical remote command execution vulnerability, tracked as CVE-2024-50603, in Aviatrix Controller instances to install backdoors and crypto miners. [...]

CVSS: CRITICAL (10.0)

EPSS Score: 92.43%

Source: BleepingComputer
January 13th, 2025 (3 months ago)

CVE-2024-51501

Description: Impact The Heartcore headless client library depends on Refit to assist in making HTTP requests to Heartcore public APIs. Refit recently published an advisory regarding a CRLF injection vulnerability whereby it is possible for a malicious user to smuggle additional headers or potentially body content into a request. This shouldn't affect Heartcore client library usage as the vulnerable method - HttpHeaders.TryAddWithoutValidation - is not used. However, since Refit is a transient dependency for applications using this library, then any users making direct use of Refit could be vulnerable. Patches The vulnerable version of Refit has been upgraded to a secure version, as of Umbraco.Headless.Client.Net version 1.5.0, available on Nuget. Workarounds If calling Refit from your own code, set any necessary HTTP headers without use of HttpHeaders.TryAddWithoutValidation. References See the original Refit advisory for further info. References https://github.com/reactiveui/refit/security/advisories/GHSA-3hxg-fxwm-8gf7 https://github.com/umbraco/Umbraco.Headless.Client.Net/security/advisories/GHSA-mgr7-5782-6jh9 https://nvd.nist.gov/vuln/detail/CVE-2024-51501 https://github.com/advisories/GHSA-mgr7-5782-6jh9

CVSS: CRITICAL (10.0)

Source: Github Advisory Database (Nuget)
January 13th, 2025 (3 months ago)

CVE-2024-50603

Description: A recently disclosed critical security flaw impacting the Aviatrix Controller cloud networking platform has come under active exploitation in the wild to deploy backdoors and cryptocurrency miners. Cloud security firm Wiz said it's currently responding to "multiple incidents" involving the weaponization of CVE-2024-50603 (CVSS score: 10.0), a maximum severity bug that could result in

CVSS: CRITICAL (10.0)

EPSS Score: 92.43%

Source: TheHackerNews
January 13th, 2025 (3 months ago)

CVE-2023-48365

Description: Qlik Sense contains an HTTP tunneling vulnerability that allows an attacker to escalate privileges and execute HTTP requests on the backend server hosting the software.

CVSS: CRITICAL (9.6)

Source: CISA KEV
January 13th, 2025 (3 months ago)

CVE-2025-0282

Description: As we saw in our previous blogpost, we fully analyzed Ivanti’s most recent unauthenticated Remote Code Execution vulnerability in their Connect Secure (VPN) appliance. Specifically, we analyzed CVE-2025-0282.Today, we’re going to walk through exploitation. Once again, however, stopping short of providing the world with a

CVSS: CRITICAL (9.0)

EPSS Score: 15.33%

Source: Watchtower Labs
January 12th, 2025 (3 months ago)

CVE-2025-0103

Description: An SQL injection vulnerability in Palo Alto Networks Expedition enables an authenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. This vulnerability also enables attackers to create and read arbitrary files on the Expedition system.

CVSS: CRITICAL (9.2)

EPSS Score: 0.04%

Source: CVE
January 12th, 2025 (3 months ago)

CVE-2024-12877

Description: The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.19.2 via deserialization of untrusted input from the donation form like 'firstName'. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files on the server that makes remote code execution possible. Please note this was only partially patched in 3.19.3, a fully sufficient patch was not released until 3.19.4. However, another CVE was assigned by another CNA for version 3.19.3 so we will leave this as affecting 3.19.2 and before. We have recommended the vendor use JSON encoding to prevent any further deserialization vulnerabilities from being present.

CVSS: CRITICAL (9.8)

EPSS Score: 0.07%

Source: CVE
January 12th, 2025 (3 months ago)

CVE-2025-23016

Description: FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.

CVSS: CRITICAL (9.3)

EPSS Score: 0.04%

Source: CVE
January 11th, 2025 (3 months ago)