CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-21169

Description: Substance3D - Designer versions 14.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CVSS: HIGH (7.8)

EPSS Score: 0.02%

Source: CVE
March 11th, 2025 (4 months ago)

CVE-2024-9157

Description: ** UNSUPPORTED WHEN ASSIGNED **  A privilege escalation vulnerability in CxUIUSvc64.exe and CxUIUSvc32.exe of Synaptics audio drivers allows a local authorized attacker to load a DLL in a privileged process. Out of an abundance of caution, this CVE ID is being assigned to better serve our customers and ensure all who are still running this product understand that the product is End-of-Life and should be removed. For more information on this, refer to the CVE Record’s reference information.

CVSS: HIGH (7.8)

EPSS Score: 0.01%

Source: CVE
March 11th, 2025 (4 months ago)

CVE-2025-24983

Description: Microsoft Windows Win32 Kernel Subsystem contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.

CVSS: HIGH (7.0)

EPSS Score: 1.91%

Source: CISA KEV
March 11th, 2025 (4 months ago)

CVE-2025-24985

Description: Microsoft Windows Fast FAT File System Driver contains an integer overflow or wraparound vulnerability that allows an unauthorized attacker to execute code with a physical attack.

CVSS: HIGH (7.8)

EPSS Score: 9.81%

Source: CISA KEV
March 11th, 2025 (4 months ago)

CVE-2025-24993

Description: Microsoft Windows New Technology File System (NTFS) contains a heap-based buffer overflow vulnerability that could allow an authorized attacker to execute code locally.

CVSS: HIGH (7.8)

EPSS Score: 4.05%

Source: CISA KEV
March 11th, 2025 (4 months ago)
Description: The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading. References https://nvd.nist.gov/vuln/detail/CVE-2025-1550 https://github.com/keras-team/keras/pull/20751 https://github.com/keras-team/keras/commit/e67ac8ffd0c883bec68eb65bb52340c7f9d3a903 https://github.com/keras-team/keras/releases/tag/v3.9.0 https://github.com/advisories/GHSA-5478-v2w6-c6q7

CVSS: HIGH (7.3)

EPSS Score: 0.01%

Source: Github Advisory Database (PIP)
March 11th, 2025 (4 months ago)

CVE-2025-27403

Description: Ratify is a verification engine as a binary executable and on Kubernetes which enables verification of artifact security metadata and admits for deployment only those that comply with policies the user creates. In a Kubernetes environment, Ratify can be configured to authenticate to a private Azure Container Registry (ACR). The Azure workload identity and Azure managed identity authentication providers are configured in this setup. Users that configure a private ACR to be used with the Azure authentication providers may be impacted by a vulnerability that exists in versions prior to 1.2.3 and 1.3.2. Both Azure authentication providers attempt to exchange an Entra ID (EID) token for an ACR refresh token. However, Ratify’s Azure authentication providers did not verify that the target registry is an ACR. This could have led to the EID token being presented to a non-ACR registry during token exchange. EID tokens with ACR access can potentially be extracted and abused if a user workload contains an image reference to a malicious registry. As of versions 1.2.3 and 1.3.2, the Azure workload identity and Azure managed identity authentication providers are updated to add new validation prior to EID token exchange. Validation relies upon registry domain validation against a pre-configured list of well-known ACR endpoints. EID token exchange will be executed only if at least one of the configured well-known domain suffixes (wildcard support included) matches the registry domain of th...

CVSS: HIGH (7.2)

EPSS Score: 0.19%

SSVC Exploitation: none

Source: CVE
March 11th, 2025 (4 months ago)

CVE-2025-22454

Description: Insufficiently restrictive permissions in Ivanti Secure Access Client before 22.7R4 allows a local authenticated attacker to escalate their privileges.

CVSS: HIGH (7.8)

EPSS Score: 0.02%

SSVC Exploitation: none

Source: CVE
March 11th, 2025 (4 months ago)

CVE-2024-55590

Description: Multiple improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerabilities [CWE-78] in Fortinet FortiIsolator version 2.4.0 through 2.4.5 allows an authenticated attacker with at least read-only admin permission and CLI access to execute unauthorized code via specifically crafted CLI commands.

CVSS: HIGH (8.6)

EPSS Score: 0.21%

Source: CVE
March 11th, 2025 (4 months ago)

CVE-2024-54084

Description: APTIOV contains a vulnerability in BIOS where an attacker may cause a Time-of-check Time-of-use (TOCTOU) Race Condition by local means. Successful exploitation of this vulnerability may lead to arbitrary code execution.

CVSS: HIGH (7.5)

EPSS Score: 0.02%

SSVC Exploitation: none

Source: CVE
March 11th, 2025 (4 months ago)