CVE-2025-29905 |
Description: A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'RestoreFromBackup' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25923)
CVSS: HIGH (8.8) EPSS Score: 0.1%
April 16th, 2025 (4 days ago)
|
CVE-2025-2291 |
Description: Password can be used past expiry in PgBouncer due to auth_query not taking into account Postgres its VALID UNTIL value, which allows an attacker to log in with an already expired password
CVSS: HIGH (8.1) EPSS Score: 0.04%
April 16th, 2025 (4 days ago)
|
CVE-2025-20236 |
Description: A vulnerability in the custom URL parser of Cisco Webex App could allow an unauthenticated, remote attacker to persuade a user to download arbitrary files, which could allow the attacker to execute arbitrary commands on the host of the targeted user.
This vulnerability is due to insufficient input validation when Cisco Webex App processes a meeting invite link. An attacker could exploit this vulnerability by persuading a user to click a crafted meeting invite link and download arbitrary files. A successful exploit could allow the attacker to execute arbitrary commands with the privileges of the targeted user.
CVSS: HIGH (8.8) EPSS Score: 0.1% SSVC Exploitation: none
April 16th, 2025 (4 days ago)
|
CVE-2024-25269 |
Description: libheif <= 1.17.6 contains a memory leak in the function JpegEncoder::Encode. This flaw allows an attacker to cause a denial of service attack.
CVSS: HIGH (7.5) EPSS Score: 0.06% SSVC Exploitation: poc
April 16th, 2025 (4 days ago)
|
CVE-2024-28110 |
Description: Go SDK for CloudEvents is the official CloudEvents SDK to integrate applications with CloudEvents. Prior to version 2.15.2, using cloudevents.WithRoundTripper to create a cloudevents.Client with an authenticated http.RoundTripper causes the go-sdk to leak credentials to arbitrary endpoints. When the transport is populated with an authenticated transport, then http.DefaultClient is modified with the authenticated transport and will start to send Authorization tokens to any endpoint it is used to contact. Version 2.15.2 patches this issue.
CVSS: HIGH (7.5) EPSS Score: 0.05% SSVC Exploitation: none
April 16th, 2025 (4 days ago)
|
CVE-2024-27289 |
Description: pgx is a PostgreSQL driver and toolkit for Go. Prior to version 4.18.2, SQL injection can occur when all of the following conditions are met: the non-default simple protocol is used; a placeholder for a numeric value must be immediately preceded by a minus; there must be a second placeholder for a string value after the first placeholder; both must be on the same line; and both parameter values must be user-controlled. The problem is resolved in v4.18.2. As a workaround, do not use the simple protocol or do not place a minus directly before a placeholder.
CVSS: HIGH (8.1) EPSS Score: 0.05% SSVC Exploitation: poc
April 16th, 2025 (4 days ago)
|
CVE-2024-23609 |
Description: An improper error handling vulnerability in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions.
CVSS: HIGH (7.8) EPSS Score: 0.16% SSVC Exploitation: none
April 16th, 2025 (4 days ago)
|
CVE-2024-1986 |
Description: The Booster Elite for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the wc_add_new_product() function in all versions up to, and including, 7.1.7. This makes it possible for customer-level attackers, and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. This is only exploitable when the user product upload functionality is enabled.
CVSS: HIGH (8.8) EPSS Score: 4.31% SSVC Exploitation: none
April 16th, 2025 (4 days ago)
|
CVE-2024-0199 |
Description: An authorization bypass vulnerability was discovered in GitLab affecting versions 11.3 prior to 16.7.7, 16.7.6 prior to 16.8.4, and 16.8.3 prior to 16.9.2. An attacker could bypass CODEOWNERS by utilizing a crafted payload in an old feature branch to perform malicious actions.
CVSS: HIGH (7.7) EPSS Score: 0.01% SSVC Exploitation: poc
April 16th, 2025 (4 days ago)
|
CVE-2024-0049 |
Description: In multiple locations, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS: HIGH (7.8) EPSS Score: 0.05% SSVC Exploitation: none
April 16th, 2025 (4 days ago)
|