CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2022-30635

Description: Nessus Plugin ID 234706 with High Severity Synopsis The remote Amazon Linux AMI host is missing a security update. Description The version of golang installed on the remote host is prior to 1.23.7-1.50. It is, therefore, affected by a vulnerability as referenced in the ALAS-2025-1971 advisory. Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635. (CVE-2024-34156)Tenable has extracted the preceding description block directly from the tested product security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Run 'yum update golang' to update your system. Read more at https://www.tenable.com/plugins/nessus/234706

CVSS: HIGH (7.5)

Source: Tenable Plugins
April 22nd, 2025 (2 months ago)

CVE-2022-49179

Description: Nessus Plugin ID 234707 with High Severity Synopsis The remote Amazon Linux AMI host is missing a security update. Description The version of kernel installed on the remote host is prior to 4.14.355-196.618. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS-2025-1970 advisory. In the Linux kernel, the following vulnerability has been resolved: block, bfq: don't move oom_bfqq (CVE-2022-49179) In the Linux kernel, the following vulnerability has been resolved: macsec: fix UAF bug for real_dev (CVE-2022-49390) In the Linux kernel, the following vulnerability has been resolved: block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (CVE-2022-49720) In the Linux kernel, the following vulnerability has been resolved: ext4: aovid use-after-free in ext4_ext_insert_extent() (CVE-2024-49883) In the Linux kernel, the following vulnerability has been resolved: slip: make slhc_remember() more robust against malicious packets (CVE-2024-50033) In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (CVE-2024-53057) In the Linux kernel, the following vulnerability has been resolved: hv_sock: Initializing vsk->trans to NULL to prevent a dangling pointer (CVE-2024-53103) In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: fix LED ID check in led_tg_check() (CVE-2024-...

CVSS: HIGH (7.8)

Source: Tenable Plugins
April 22nd, 2025 (2 months ago)

CVE-2025-3616

Description: The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the gspb_make_proxy_api_request() function in versions 11.4 to 11.4.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. The arbitrary file upload was sufficiently patched in 11.4.5, but a capability check was added in 11.4.6 to properly prevent unauthorized limited file uploads.

CVSS: HIGH (8.8)

EPSS Score: 0.25%

Source: CVE
April 22nd, 2025 (2 months ago)

CVE-2024-46899

Description: Hitachi Ops Center Common Services within Hitachi Ops Center Analyzer viewpoint OVF contains an authentication credentials leakage vulnerability.This issue affects Hitachi Ops Center Common Services: from 10.0.0-00 before 11.0.0-04; Hitachi Ops Center Analyzer viewpoint OVF: from 10.0.0-00 before 11.0.0-04.

CVSS: HIGH (7.1)

EPSS Score: 0.04%

Source: CVE
April 22nd, 2025 (2 months ago)

CVE-2025-3854

Description: A vulnerability, which was classified as critical, was found in H3C GR-3000AX up to V100R006. Affected is the function EnableIpv6/UpdateWanModeMulti/UpdateIpv6Params/EditWlanMacList/Edit_List_SSID of the file /goform/aspForm of the component HTTP POST Request Handler. The manipulation of the argument param leads to buffer overflow. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. Other functions might be affected as well. Es wurde eine Schwachstelle in H3C GR-3000AX bis V100R006 gefunden. Sie wurde als kritisch eingestuft. Dabei betrifft es die Funktion EnableIpv6/UpdateWanModeMulti/UpdateIpv6Params/EditWlanMacList/Edit_List_SSID der Datei /goform/aspForm der Komponente HTTP POST Request Handler. Dank der Manipulation des Arguments param mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei im lokalen Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen.

CVSS: HIGH (8.6)

EPSS Score: 0.09%

SSVC Exploitation: poc

Source: CVE
April 22nd, 2025 (2 months ago)

CVE-2025-1731

Description: An incorrect permission assignment vulnerability in the PostgreSQL commands of the USG FLEX H series uOS firmware versions from V1.20 through V1.31 could allow an authenticated local attacker with low privileges to gain access to the Linux shell and escalate their privileges by crafting malicious scripts or modifying system configurations with administrator-level access through a stolen token. Modifying the system configuration is only possible if the administrator has not logged out and the token remains valid.

CVSS: HIGH (7.8)

EPSS Score: 0.06%

Source: CVE
April 22nd, 2025 (2 months ago)

CVE-2025-32956

Description: ManageWiki is a MediaWiki extension allowing users to manage wikis. Versions before commit f504ed8, are vulnerable to SQL injection when renaming a namespace in Special:ManageWiki/namespaces when using a page prefix (namespace name, which is the current namespace you are renaming) with an injection payload. This issue has been patched in commit f504ed8. A workaround for this vulnerability involves setting `$wgManageWiki['namespaces'] = false;`.

CVSS: HIGH (8.0)

EPSS Score: 0.03%

Source: CVE
April 21st, 2025 (2 months ago)

CVE-2025-43922

Description: The FileWave Windows client before 16.0.0, in some non-default configurations, allows an unprivileged local user to escalate privileges to SYSTEM.

CVSS: HIGH (8.1)

EPSS Score: 0.02%

SSVC Exploitation: none

Source: CVE
April 21st, 2025 (2 months ago)

CVE-2025-23174

Description: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

CVSS: HIGH (7.5)

EPSS Score: 0.04%

Source: CVE
April 21st, 2025 (2 months ago)

CVE-2025-3857

Description: When reading binary Ion data through Amazon.IonDotnet using the RawBinaryReader class, Amazon.IonDotnet does not check the number of bytes read from the underlying stream while deserializing the binary format. If the Ion data is malformed or truncated, this triggers an infinite loop condition that could potentially result in a denial of service. Users should upgrade to Amazon.IonDotnet version 1.3.1 and ensure any forked or derivative code is patched to incorporate the new fixes.

CVSS: HIGH (8.7)

EPSS Score: 0.05%

SSVC Exploitation: none

Source: CVE
April 21st, 2025 (2 months ago)