CVE-2024-2500 |
Description: The ColorMag theme for WordPress is vulnerable to Stored Cross-Site Scripting via a user's Display Name in all versions up to, and including, 3.1.6 due to insufficient input sanitization and output escaping. This makes it possible for authentciated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVSS: MEDIUM (6.4) EPSS Score: 0.14% SSVC Exploitation: none
April 10th, 2025 (11 days ago)
|
CVE-2024-24827 |
Description: Discourse is an open source platform for community discussion. Without a rate limit on the POST /uploads endpoint, it makes it easier for an attacker to carry out a DoS attack on the server since creating an upload can be a resource intensive process. Do note that the impact varies from site to site as various site settings like `max_image_size_kb`, `max_attachment_size_kb` and `max_image_megapixels` will determine the amount of resources used when creating an upload. The issue is patched in the latest stable, beta and tests-passed version of Discourse. Users are advised to upgrade. Users unable to upgrade should reduce `max_image_size_kb`, `max_attachment_size_kb` and `max_image_megapixels` as smaller uploads require less resources to process. Alternatively, `client_max_body_size` can be reduced in Nginx to prevent large uploads from reaching the server.
CVSS: MEDIUM (5.3) EPSS Score: 0.18% SSVC Exploitation: none
April 10th, 2025 (11 days ago)
|
CVE-2024-23821 |
Description: GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. A stored cross-site scripting (XSS) vulnerability exists in versions prior to 2.23.4 and 2.24.1 that enables an authenticated administrator with workspace-level privileges to store a JavaScript payload in the GeoServer catalog that will execute in the context of another user's browser when viewed in the GWC Demos Page. Access to the GWC Demos Page is available to all users although data security may limit users' ability to trigger the XSS. Versions 2.23.4 and 2.24.1 contain a patch for this issue.
CVSS: MEDIUM (4.8) EPSS Score: 0.27% SSVC Exploitation: none
April 10th, 2025 (11 days ago)
|
CVE-2024-2326 |
Description: The Pretty Links – Affiliate Links, Link Branding, Link Tracking & Marketing Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.6.3. This is due to missing or incorrect nonce validation when saving plugin settings. This makes it possible for unauthenticated attackers to change the plugin's configuration including stripe integration via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVSS: MEDIUM (4.3) EPSS Score: 0.03% SSVC Exploitation: none
April 10th, 2025 (11 days ago)
|
CVE-2024-2180 |
Description: Zemana AntiLogger v2.74.204.664 is vulnerable to a Memory Information Leak vulnerability by triggering the 0x80002020 IOCTL code of the zam64.sys and zamguard64.sys drivers
CVSS: MEDIUM (5.5) EPSS Score: 0.02% SSVC Exploitation: poc
April 10th, 2025 (11 days ago)
|
CVE-2024-20763 |
Description: Animate versions 24.0, 23.0.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
CVSS: MEDIUM (5.5) EPSS Score: 0.02% SSVC Exploitation: none
April 10th, 2025 (11 days ago)
|
CVE-2024-1605 |
Description: BMC Control-M branches 9.0.20 and 9.0.21 upon user login load all Dynamic Link Libraries (DLL) from a directory that grants Write and Read permissions to all users. Leveraging it leads to loading of a potentially malicious libraries, which will execute with the application's privileges.
Fix for 9.0.20 branch was released in version 9.0.20.238. Fix for 9.0.21 branch was released in version 9.0.21.201.
CVSS: MEDIUM (6.6) EPSS Score: 0.03% SSVC Exploitation: none
April 10th, 2025 (11 days ago)
|
![]() |
Description: Impact
User enumeration is possible by performing a timing attack on the login or password reset pages with user credentials.
This was originally disclosed in https://www.silverstripe.org/download/security-releases/ss-2017-005/ for CMS 3 but was not patched in CMS 4+
References
https://www.silverstripe.org/download/security-releases/ss-2017-005
https://www.silverstripe.org/download/security-releases/ss-2025-001
References
https://github.com/silverstripe/silverstripe-framework/security/advisories/GHSA-256q-hx8w-xcqx
https://nvd.nist.gov/vuln/detail/CVE-2017-12849
https://github.com/silverstripe/silverstripe-framework/pull/11681
https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/SS-2025-001.yaml
https://www.silverstripe.org/download/security-releases/ss-2017-005
https://www.silverstripe.org/download/security-releases/ss-2025-001
https://github.com/advisories/GHSA-256q-hx8w-xcqx
CVSS: MEDIUM (5.3)
April 10th, 2025 (11 days ago)
|
CVE-2025-23010 |
Description: An Improper Link Resolution Before File Access ('Link Following') vulnerability in SonicWall NetExtender Windows (32 and 64 bit) client which allows an attacker to manipulate file paths.
CVSS: MEDIUM (6.5) EPSS Score: 0.01% SSVC Exploitation: none
April 10th, 2025 (11 days ago)
|
CVE-2024-8148 |
Description: There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 11.2 and below that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks.
CVSS: MEDIUM (6.1) EPSS Score: 0.07% SSVC Exploitation: none
April 10th, 2025 (11 days ago)
|