CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-30349

🚨 Marked as known exploited on March 21st, 2025 (3 months ago).
Description: Horde IMP through 6.2.27, as used with Horde Application Framework through 5.2.23, allows XSS that leads to account takeover via a crafted text/html e-mail message with an onerror attribute (that may use base64-encoded JavaScript code), as exploited in the wild in March 2025.

CVSS: HIGH (7.2)

EPSS Score: 2.46%

SSVC Exploitation: none

Source: CVE
March 21st, 2025 (3 months ago)

CVE-2025-29807

Description: Deserialization of untrusted data in Microsoft Dataverse allows an authorized attacker to execute code over a network.

CVSS: HIGH (8.7)

EPSS Score: 0.65%

SSVC Exploitation: none

Source: CVE
March 21st, 2025 (3 months ago)
Description: A vulnerability has been identified in Redlib where an attacker can cause a denial-of-service (DOS) condition by submitting a specially crafted base2048-encoded DEFLATE decompression bomb to the restore_preferences form. This leads to excessive memory consumption and potential system instability, which can be exploited to disrupt Redlib instances. This vulnerability was introduced in 2e95e1fc6e2064ccfae87964b4860bda55eddb9a and fixed in 15147cea8e42f6569a11603d661d71122f6a02dc. Impact What kind of vulnerability is it? Who is impacted? This vulnerability allows a remote attacker with network access to exploit the preference restoration mechanism by providing a compressed payload that expands dramatically upon decompression. The issue arises because the system automatically decompresses user-supplied data without enforcing size limits, potentially leading to: Out-of-memory (OOM) conditions OS-level resource exhaustion, potentially leading to broader system instability or crashes Repeated exploitation, keeping the target system in a persistent degraded state Denial-of-service of any public instance Patches The problem has been patched in 15147cea8e42f6569a11603d661d71122f6a02dc. Users should upgrade to v0.36.0. Workarounds Until a patch is available, users can: Implement request size limits at the web server or application level to reject excessively large inputs. Disable or restrict the restore_preferences route (/settings/encoded-restore) at the reverse-proxy level if no...

CVSS: HIGH (8.7)

EPSS Score: 0.06%

Source: Github Advisory Database (Rust)
March 21st, 2025 (3 months ago)

CVE-2025-24915

Description: When installing Nessus Agent to a non-default location on a Windows host, Nessus Agent versions prior to 10.8.3 did not enforce secure permissions for sub-directories.  This could allow for local privilege escalation if users had not secured the directories in the non-default installation location.

CVSS: HIGH (7.8)

EPSS Score: 0.01%

Source: CVE
March 21st, 2025 (3 months ago)

CVE-2025-25068

Description: Mattermost versions 10.4.x <= 10.4.2, 10.3.x <= 10.3.3, 9.11.x <= 9.11.8, 10.5.x <= 10.5.0 fail to enforce MFA on plugin endpoints, which allows authenticated attackers to bypass MFA protections via API requests to plugin-specific routes.

CVSS: HIGH (7.5)

EPSS Score: 0.05%

Source: CVE
March 21st, 2025 (3 months ago)
Description: A Denial of Service (DoS) vulnerability exists in open-webui/open-webui version 0.3.21. This vulnerability affects multiple endpoints, including /ollama/models/upload, /audio/api/v1/transcriptions, and /rag/api/v1/doc. The application processes multipart boundaries without authentication, leading to resource exhaustion. By appending additional characters to the multipart boundary, an attacker can cause the server to parse each byte of the boundary, ultimately leading to service unavailability. This vulnerability can be exploited remotely, resulting in high CPU and memory usage, and rendering the service inaccessible to legitimate users. References https://nvd.nist.gov/vuln/detail/CVE-2024-9840 https://huntr.com/bounties/9178f09e-4d4f-4a5b-bc32-cada7445b03c https://github.com/advisories/GHSA-5ccf-884p-4jjq

CVSS: HIGH (7.5)

EPSS Score: 0.09%

Source: Github Advisory Database (NPM)
March 21st, 2025 (3 months ago)

CVE-2025-26336

Description: Dell Chassis Management Controller Firmware for Dell PowerEdge FX2, version(s) prior to 2.40.200.202101130302, and Dell Chassis Management Controller Firmware for Dell PowerEdge VRTX version(s) prior to 3.41.200.202209300499, contain(s) a Stack-based Buffer Overflow vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Remote execution.

CVSS: HIGH (8.3)

EPSS Score: 0.06%

Source: CVE
March 21st, 2025 (3 months ago)

CVE-2025-2585

Description: EBM Maintenance Center From EBM Technologies has a SQL Injection vulnerability, allowing remote attackers with regular privileges to inject arbitrary SQL commands to read, modify, and delete database contents.

CVSS: HIGH (8.8)

EPSS Score: 0.07%

Source: CVE
March 21st, 2025 (3 months ago)

CVE-2024-21149

Description: Vulnerability in the Oracle Enterprise Asset Management product of Oracle E-Business Suite (component: Work Definition Issues). Supported versions that are affected are 12.2.11-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Asset Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Enterprise Asset Management accessible data as well as unauthorized access to critical data or complete access to all Oracle Enterprise Asset Management accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).

CVSS: HIGH (8.1)

EPSS Score: 0.25%

SSVC Exploitation: none

Source: CVE
March 20th, 2025 (4 months ago)

CVE-2024-42052

Description: The MSI installer for Splashtop Streamer for Windows before 3.5.8.0 uses a temporary folder with weak permissions during installation. A local user can exploit this to escalate privileges to SYSTEM by placing a wevtutil.exe file in the folder.

CVSS: HIGH (7.8)

EPSS Score: 0.02%

SSVC Exploitation: none

Source: CVE
March 20th, 2025 (4 months ago)