CVE-2024-10723 |
Description: A stored cross-site scripting (XSS) vulnerability was discovered in phpipam/phpipam version 1.5.2. This vulnerability allows an attacker to inject malicious scripts into the destination address field of the NAT tool, which can be executed when a user interacts with the field. The impact of this vulnerability includes the potential theft of user cookies, unauthorized access to user accounts, and redirection to malicious websites. The issue has been fixed in version 1.7.0.
CVSS: LOW (3.5) EPSS Score: 0.03%
March 20th, 2025 (3 months ago)
|
CVE-2024-10722 |
Description: A stored cross-site scripting (XSS) vulnerability exists in phpipam/phpipam version 1.5.2. The vulnerability allows attackers to inject malicious scripts into the 'Description' field of custom fields in the 'IP RELATED MANAGEMENT' section. This can lead to data theft, account compromise, distribution of malware, website defacement, content manipulation, and phishing attacks. The issue is fixed in version 1.7.0.
CVSS: LOW (3.5) EPSS Score: 0.03%
March 20th, 2025 (3 months ago)
|
CVE-2024-10721 |
Description: A stored cross-site scripting (XSS) vulnerability was discovered in phpipam/phpipam version 1.5.2. This vulnerability allows an attacker to inject malicious scripts into the application, which can be executed in the context of other users who view the affected page. The issue occurs in the circuits options page (https://demo.phpipam.net/tools/circuits/options/). An attacker can exploit this vulnerability to steal cookies, gain unauthorized access to user accounts, or redirect users to malicious websites. The vulnerability has been fixed in version 1.7.0.
CVSS: LOW (3.5) EPSS Score: 0.03%
March 20th, 2025 (3 months ago)
|
CVE-2024-10719 |
Description: A stored cross-site scripting (XSS) vulnerability exists in phpipam version 1.5.2, specifically in the circuits options functionality. This vulnerability allows an attacker to inject malicious scripts via the 'option' parameter in the POST request to /phpipam/app/admin/circuits/edit-options-submit.php. The injected script can be executed in the context of the user's browser, leading to potential cookie theft and end-user file disclosure. The issue is fixed in version 1.7.0.
CVSS: LOW (2.4) EPSS Score: 0.03%
March 20th, 2025 (3 months ago)
|
CVE-2024-53142 |
Description:
Nessus Plugin ID 232962 with High Severity
Synopsis
The remote EulerOS host is missing multiple security updates.
Description
According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : initramfs: avoid filename buffer overrun(CVE-2024-53142) bpf, sockmap: Several fixes to bpf_msg_pop_data(CVE-2024-56720) scsi: sg: Fix slab-use-after-free read in sg_release()(CVE-2024-56631) dmaengine: idxd: Let probe fail when workqueue cannot be enabled(CVE-2022-48868) smb: client: fix use-after-free of signing key(CVE-2024-53179) bpf, sockmap: Fix race between element replace and close()(CVE-2024-56664) ftrace: Fix regression with module command in stack_trace_filter(CVE-2024-56569) RDMA/mlx5: Move events notifier registration to be after device registration(CVE-2024-53224) sched/deadline: Fix warning in migrate_enable for boosted tasks(CVE-2024-56583) af_packet: avoid erroring out after sock_init_data() in packet_create().(CVE-2024-56606) netdevsim: prevent bad user input in nsim_dev_health_break_write().(CVE-2024-56716) leds: class: Protect brightness_show() with led_cdev-led_access mutex(CVE-2024-56587) bpf: fix OOB devmap writes when deleting elemen(CVE-2024-56615) net: inet6: do not leave a dangling sk pointer in inet6_create().(CVE-2024-56600) nvme-multipath: defer partition scanning(CVE-2024-53093) virtiofs: use ...
CVSS: LOW (0.0)
March 20th, 2025 (3 months ago)
|
CVE-2025-30259 |
🚨 Marked as known exploited on March 20th, 2025 (3 months ago).
Description: The WhatsApp cloud service before late 2024 did not block certain crafted PDF content that can defeat a sandbox protection mechanism and consequently allow remote access to messaging applications by third parties, as exploited in the wild in 2024 for installation of Android malware associated with BIGPRETZEL.
CVSS: LOW (3.5) EPSS Score: 0.03%
March 20th, 2025 (3 months ago)
|
CVE-2025-30258 |
Description: In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka a "verification DoS."
CVSS: LOW (2.7) EPSS Score: 0.01%
March 19th, 2025 (3 months ago)
|
CVE-2024-42176 |
Description: HCL MyXalytics is affected by concurrent login vulnerability. A concurrent login vulnerability occurs when simultaneous active sessions are allowed for a single credential allowing an attacker to potentially obtain access to a user's account or sensitive information.
CVSS: LOW (2.6) EPSS Score: 0.02%
March 19th, 2025 (3 months ago)
|
CVE-2025-25040 |
Description: A vulnerability has been identified in the port ACL functionality of AOS-CX software running on the HPE Aruba Networking CX 9300 Switch Series only and affects:
- AOS-CX 10.14.xxxx : All patches
- AOS-CX 10.15.xxxx : 10.15.1000 and below
The vulnerability is specific to traffic originated by the CX 9300 switch platform and could allow an attacker to bypass ACL rules applied to routed ports on egress. As a result, port ACLs are not correctly enforced, which could lead to unauthorized traffic flow and violations of security policies. Egress VLAN ACLs and Routed VLAN ACLs are not affected by this vulnerability.
CVSS: LOW (3.3) EPSS Score: 0.01% SSVC Exploitation: none
March 18th, 2025 (3 months ago)
|
CVE-2024-21164 |
Description: Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 2.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N).
CVSS: LOW (2.5) EPSS Score: 0.03% SSVC Exploitation: none
March 18th, 2025 (3 months ago)
|