CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

🚨 Marked as known exploited on May 29th, 2025 (17 days ago).
Description: 🛡 Security Advisory: SQL Injection Vulnerability in Navidrome v0.55.2 Overview This vulnerability arises due to improper input validation on the role parameter within the API endpoint /api/artist. Attackers can exploit this flaw to inject arbitrary SQL queries, potentially gaining unauthorized access to the backend database and compromising sensitive user information. Details Vulnerable Component: API endpoint → /api/artist Parameter → role Vulnerability Type: SQL Injection (stacked queries, UNION queries) Database Affected: SQLite (confirmed exploitation via SQLite-specific payloads) Impact: Successful exploitation allows an unauthenticated attacker to: Execute arbitrary SQL commands Extract or manipulate sensitive data (e.g., user records, playlists) Potentially escalate privileges or disrupt service availability Proof of Concept (PoC) Example Exploit Command: sqlmap.py -r navi --level 5 --risk 3 -a --banner --batch --tamper charencode --dbms sqlite Sample Payloads: Stacked Queries: http://navidrome/api/artist?_end=15&_order=ASC&_sort=name&_start=0&role=albumartist');SELECT LIKE(CHAR(65,66,67,68,69,70,71),UPPER(HEX(RANDOMBLOB(500000000/2))))-- UNION-Based Query: http://navidrome.local/api/artist?_end=15&_order=ASC&_sort=name&_start=0&role=albumartist') UNION ALL SELECT 92,92,92,92,92,92,92,92,92,92,92,92,92,92,92,92,92,CHAR(113,98,118,98,113)||CHAR(113,84,86,119,114,71,106,104,90,118,120,104,79,66,104,108,121,106,70,68,90,113,104,117,67,98,113,67,103,84,71,...
Source: Github Advisory Database (Go)
May 29th, 2025 (17 days ago)
Description: Alleged data breach of Comando General de las Fuerzas Militares (cgfm.mil.co)
Source: DarkWebInformer
May 29th, 2025 (18 days ago)
Description: While the botnet may not be completely automated, it uses certain tactics when targeting devices that indicate that it may, at the very least, be semiautomated.
Source: Dark Reading
May 29th, 2025 (18 days ago)
Description: The sheriff said the woman self-administered the abortion and her family were concerned for her safety, so authorities searched through Flock cameras. Experts are still concerned that a cop in a state where abortion is illegal can search cameras in others where it's a human right.
Source: 404 Media
May 29th, 2025 (18 days ago)

CVE-2024-51392

Description: An issue in OpenKnowledgeMaps Headstart v7 allows a remote attacker to escalate privileges via the url parameter of the getPDF.php component

EPSS Score: 0.11%

Source: CVE
May 29th, 2025 (18 days ago)
Description: McKenzie Commercial delivers high-quality, cost-effective commerc ial construction services, while fostering a supportive work envi ronment for employees who provide exceptional workmanship. We are going to upload about 42 GB of corporate data. Employee pe rsonal information (DOB, passports, addresses, phones, emails, an d so on), financial data, client data, lots of project data, cont racts and agreements, confidential documents, NDAs, etc.
Source: Ransomware.live
May 29th, 2025 (18 days ago)
Description: Alleged sale of unauthorized admin access to three Romanian online shops
Source: DarkWebInformer
May 29th, 2025 (18 days ago)
Description: Fake installers for popular artificial intelligence (AI) tools like OpenAI ChatGPT and InVideo AI are being used as lures to propagate various threats, such as the CyberLock and Lucky_Gh0$t ransomware families, and a new malware dubbed Numero. "CyberLock ransomware, developed using PowerShell, primarily focuses on encrypting specific files on the victim's system," Cisco Talos researcher Chetan
Source: TheHackerNews
May 29th, 2025 (18 days ago)
Description: Funnull Technology supports “hundreds of thousands of websites” dedicated to the scams, otherwise known as pig butchering, according to the sanctions announcement by the Treasury Department’s Office of Foreign Assets Control.
Source: The Record
May 29th, 2025 (18 days ago)

CVE-2025-45474

Description: maccms10 v2025.1000.4047 is vulnerable to Server-side request forgery (SSRF) in Email Settings.

EPSS Score: 0.05%

SSVC Exploitation: poc

Source: CVE
May 29th, 2025 (18 days ago)