Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-7598

Description: A security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions enforced by network policies during namespace deletion. The order in which objects are deleted during namespace termination is not defined, and it is possible for network policies to be deleted before the pods that they protect. This can lead to a brief period in which the pods are running, but network policies that should apply to connections to and from the pods are not enforced.

CVSS: LOW (3.1)

EPSS Score: 0.03%

Source: CVE
March 20th, 2025 (about 1 month ago)

CVE-2024-13922

Description: The Order Export & Order Import for WooCommerce plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the admin_log_page() function in all versions up to, and including, 2.6.0. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary log files on the server.

CVSS: LOW (2.7)

EPSS Score: 0.05%

Source: CVE
March 20th, 2025 (about 1 month ago)

CVE-2025-1474

Description: In mlflow/mlflow version 2.18, an admin is able to create a new user account without setting a password. This vulnerability could lead to security risks, as accounts without passwords may be susceptible to unauthorized access. Additionally, this issue violates best practices for secure user account management. The issue is fixed in version 2.19.0.

CVSS: LOW (3.8)

EPSS Score: 0.04%

Source: CVE
March 20th, 2025 (about 1 month ago)

CVE-2024-10727

Description: A reflected cross-site scripting (XSS) vulnerability exists in phpipam/phpipam versions 1.5.0 through 1.6.0. The vulnerability arises when the application receives data in an HTTP request and includes that data within the immediate response in an unsafe manner. This allows an attacker to execute arbitrary JavaScript in the context of the user's browser, potentially leading to full compromise of the user.

CVSS: LOW (3.5)

EPSS Score: 0.03%

Source: CVE
March 20th, 2025 (about 1 month ago)

CVE-2024-10725

Description: A stored cross-site scripting (XSS) vulnerability exists in phpipam/phpipam version 1.5.2. This vulnerability allows an attacker to inject malicious scripts into the application, which are then executed in the context of other users who view the affected pages. The issue occurs when editing the NAT destination address, where user input is not properly sanitized. This can lead to data theft, account compromise, and other malicious activities. The vulnerability is fixed in version 1.7.0.

CVSS: LOW (3.5)

EPSS Score: 0.03%

Source: CVE
March 20th, 2025 (about 1 month ago)

CVE-2024-10724

Description: A stored cross-site scripting (XSS) vulnerability exists in phpipam/phpipam version 1.5.2, specifically in the Subnet NAT translations section when editing the Destination address. This vulnerability allows an attacker to execute malicious code. The issue is fixed in version 1.7.0.

CVSS: LOW (3.5)

EPSS Score: 0.03%

Source: CVE
March 20th, 2025 (about 1 month ago)

CVE-2024-10723

Description: A stored cross-site scripting (XSS) vulnerability was discovered in phpipam/phpipam version 1.5.2. This vulnerability allows an attacker to inject malicious scripts into the destination address field of the NAT tool, which can be executed when a user interacts with the field. The impact of this vulnerability includes the potential theft of user cookies, unauthorized access to user accounts, and redirection to malicious websites. The issue has been fixed in version 1.7.0.

CVSS: LOW (3.5)

EPSS Score: 0.03%

Source: CVE
March 20th, 2025 (about 1 month ago)

CVE-2024-10722

Description: A stored cross-site scripting (XSS) vulnerability exists in phpipam/phpipam version 1.5.2. The vulnerability allows attackers to inject malicious scripts into the 'Description' field of custom fields in the 'IP RELATED MANAGEMENT' section. This can lead to data theft, account compromise, distribution of malware, website defacement, content manipulation, and phishing attacks. The issue is fixed in version 1.7.0.

CVSS: LOW (3.5)

EPSS Score: 0.03%

Source: CVE
March 20th, 2025 (about 1 month ago)

CVE-2024-10721

Description: A stored cross-site scripting (XSS) vulnerability was discovered in phpipam/phpipam version 1.5.2. This vulnerability allows an attacker to inject malicious scripts into the application, which can be executed in the context of other users who view the affected page. The issue occurs in the circuits options page (https://demo.phpipam.net/tools/circuits/options/). An attacker can exploit this vulnerability to steal cookies, gain unauthorized access to user accounts, or redirect users to malicious websites. The vulnerability has been fixed in version 1.7.0.

CVSS: LOW (3.5)

EPSS Score: 0.03%

Source: CVE
March 20th, 2025 (about 1 month ago)

CVE-2024-10719

Description: A stored cross-site scripting (XSS) vulnerability exists in phpipam version 1.5.2, specifically in the circuits options functionality. This vulnerability allows an attacker to inject malicious scripts via the 'option' parameter in the POST request to /phpipam/app/admin/circuits/edit-options-submit.php. The injected script can be executed in the context of the user's browser, leading to potential cookie theft and end-user file disclosure. The issue is fixed in version 1.7.0.

CVSS: LOW (2.4)

EPSS Score: 0.03%

Source: CVE
March 20th, 2025 (about 1 month ago)