Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-1878

Description: A vulnerability has been found in i-Drive i11 and i12 up to 20250227 and classified as problematic. This vulnerability affects unknown code of the component WiFi. The manipulation leads to use of default password. Access to the local network is required for this attack to succeed. The complexity of an attack is rather high. The exploitation appears to be difficult. It was not possible to identify the current maintainer of the product. It must be assumed that the product is end-of-life. In i-Drive i11 and i12 bis 20250227 wurde eine problematische Schwachstelle gefunden. Betroffen ist eine unbekannte Verarbeitung der Komponente WiFi. Durch Manipulation mit unbekannten Daten kann eine use of default password-Schwachstelle ausgenutzt werden. Der Angriff kann im lokalen Netzwerk passieren. Die Komplexität eines Angriffs ist eher hoch. Das Ausnutzen gilt als schwierig.

CVSS: LOW (2.3)

EPSS Score: 0.03%

SSVC Exploitation: none

Source: CVE
March 3rd, 2025 (about 2 months ago)

CVE-2025-27400

Description: As reported by Aakash Adhikari, Github: @justlife4x4, the Design > Themes > Skin (Images / CSS) config field allows a Stored XSS when it contains an end script tag. Impact A malicious user with access to this configuration field could use a Stored XSS to affect other authenticated admin users in the admin panel. The attack requires an admin user with configuration access, so in practice, it is not very likely to be used for gaining elevated privileges, although it could theoretically be used to impersonate other users. References https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5pxh-89cx-4668 https://nvd.nist.gov/vuln/detail/CVE-2025-27400 https://github.com/OpenMage/magento-lts/commit/d307e5bf75729a2347dde0952fe9fd9fcd9c6aea https://github.com/OpenMage/magento-lts/releases/tag/v20.12.3 https://github.com/OpenMage/magento-lts/releases/tag/v20.13.0 https://github.com/advisories/GHSA-5pxh-89cx-4668

CVSS: LOW (2.9)

EPSS Score: 0.12%

Source: Github Advisory Database (Composer)
March 3rd, 2025 (about 2 months ago)

CVE-2025-24023

Description: Flask-AppBuilder is an application development framework. Prior to 4.5.3, Flask-AppBuilder allows unauthenticated users to enumerate existing usernames by timing the response time from the server when brute forcing requests to login. This vulnerability is fixed in 4.5.3.

CVSS: LOW (3.7)

EPSS Score: 0.05%

Source: CVE
March 3rd, 2025 (about 2 months ago)

CVE-2025-0895

Description: IBM Cognos Analytics Mobile 1.1 for Android could allow a user with physical access to the device, to obtain sensitive information from debugging code log messages.

CVSS: LOW (2.4)

EPSS Score: 0.02%

Source: CVE
March 2nd, 2025 (about 2 months ago)

CVE-2024-55907

Description: IBM Cognos Analytics Mobile 1.1 for iOS application could allow an attacker to reverse engineer the codebase to gain knowledge about the programming technique, interface, class definitions, algorithms and functions used due to weak obfuscation.

CVSS: LOW (2.0)

EPSS Score: 0.02%

Source: CVE
March 2nd, 2025 (about 2 months ago)

CVE-2024-53104

Description: Nessus Plugin ID 216949 with Medium Severity Synopsis The remote Oracle Linux host is missing a security update. Description The remote Oracle Linux 9 host has packages installed that are affected by a vulnerability as referenced in the ELSA-2025-1659 advisory. - media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (CKI Backport Bot) [RHEL-78075] {CVE-2024-53104} - mm: migrate: fix getting incorrect page mapping during page migration (Rafael Aquini) [RHEL-70898 RHEL-27742 RHEL-28873] {CVE-2023-52490}Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the affected packages. Read more at https://www.tenable.com/plugins/nessus/216949

CVSS: LOW (0.0)

Source: Tenable Plugins
March 1st, 2025 (about 2 months ago)

CVE-2025-1795

Description: During an address list folding when a separating comma ends up on a folded line and that line is to be unicode-encoded then the separator itself is also unicode-encoded. Expected behavior is that the separating comma remains a plan comma. This can result in the address header being misinterpreted by some mail servers.

CVSS: LOW (2.3)

EPSS Score: 0.07%

Source: CVE
February 28th, 2025 (about 2 months ago)

CVE-2025-27400

Description: Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Versions prior to 20.12.3 and 20.13.1 contain a vulnerability that allows script execution in the admin panel which could lead to cross-site scripting against authenticated admin users. The attack requires an admin user with configuration access, so in practicality it is not very likely to be useful given that a user with this level of access is probably already a full admin. Versions 20.12.3 and 20.13.1 contain a patch for the issue.

CVSS: LOW (2.9)

EPSS Score: 0.12%

SSVC Exploitation: none

Source: CVE
February 28th, 2025 (about 2 months ago)

CVE-2025-22274

Description: It is possible to inject HTML code into the page content using the "content" field in the "Application definition" page. This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer.

CVSS: LOW (2.0)

EPSS Score: 0.04%

Source: CVE
February 28th, 2025 (about 2 months ago)

CVE-2025-22272

Description: In the "/EPMUI/ModalDlgHandler.ashx?value=showReadonlyDlg" endpoint, it is possible to inject code in the "modalDlgMsgInternal" parameter via POST, which is then executed in the browser. The risk of exploiting vulnerability is reduced due to the required additional bypassing the Content-Security-Policy policy This issue affects CyberArk Endpoint Privilege Manager in SaaS version 24.7.1. The status of other versions is unknown. After multiple attempts to contact the vendor we did not receive any answer.

CVSS: LOW (2.1)

EPSS Score: 0.04%

Source: CVE
February 28th, 2025 (about 2 months ago)