Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-22226

🚨 Marked as known exploited on March 4th, 2025 (3 months ago).
Description: VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process.

CVSS: HIGH (7.1)

EPSS Score: 8.35%

Source: CVE
March 4th, 2025 (3 months ago)

CVE-2025-22225

🚨 Marked as known exploited on March 4th, 2025 (3 months ago).
Description: VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.

CVSS: HIGH (8.2)

EPSS Score: 8.45%

Source: CVE
March 4th, 2025 (3 months ago)

CVE-2025-22224

🚨 Marked as known exploited on March 4th, 2025 (3 months ago).
Description: VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

CVSS: CRITICAL (9.3)

EPSS Score: 24.22%

Source: CVE
March 4th, 2025 (3 months ago)

CVE-2024-43093

🚨 Marked as known exploited on April 10th, 2025 (about 2 months ago).
Description: Google has released a security update for Android, addressing two zero-day vulnerabilities that were being actively exploited in targeted attacks. The flaws, tracked as CVE-2024-43093 and CVE-2024-50302, were fixed in the latest March 2025 Android Security Bulletin, with Google urging users to apply the latest patches as soon as possible. The update comes after Amnesty … The post Google Patches Two Actively Exploited Zero-Day Flaws in Android appeared first on CyberInsider.

CVSS: HIGH (7.8)

Source: CyberInsider
March 4th, 2025 (3 months ago)

CVE-2024-48248

🚨 Marked as known exploited on March 19th, 2025 (3 months ago).
Description: NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials).

CVSS: HIGH (8.6)

EPSS Score: 90.8%

Source: CVE
March 4th, 2025 (3 months ago)
🚨 Marked as known exploited on April 10th, 2025 (about 2 months ago).
Description: CISA has warned US federal agencies to secure their systems against attacks exploiting vulnerabilities in Cisco and Windows systems. [...]
Source: BleepingComputer
March 3rd, 2025 (3 months ago)

CVE-2024-4885

🚨 Marked as known exploited on March 3rd, 2025 (3 months ago).
Description: In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold.  The WhatsUp.ExportUtilities.Export.GetFileWithoutZip allows execution of commands with iisapppool\nmconsole privileges.

CVSS: CRITICAL (9.8)

EPSS Score: 93.68%

SSVC Exploitation: active

Source: CVE
March 3rd, 2025 (3 months ago)

CVE-2025-24989

🚨 Marked as known exploited on February 21st, 2025 (3 months ago).
Description: An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control. This vulnerability has already been mitigated in the service and all affected cusomters have been notified. This update addressed the registration control bypass. Affected customers have been given instructions on reviewing their sites for potential exploitation and clean up methods. If you've not been notified this vulnerability does not affect you.

CVSS: HIGH (8.2)

EPSS Score: 25.72%

Source: CVE
February 20th, 2025 (3 months ago)

CVE-2024-38475

🚨 Marked as known exploited on May 1st, 2025 (about 1 month ago).
Description: Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected.  Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.

EPSS Score: 0.04%

Source: CVE
February 14th, 2025 (4 months ago)

CVE-2024-20953

🚨 Marked as known exploited on February 24th, 2025 (3 months ago).
Description: Vulnerability in the Oracle Agile PLM product of Oracle Supply Chain (component: Export). The supported version that is affected is 9.3.6. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile PLM. Successful attacks of this vulnerability can result in takeover of Oracle Agile PLM. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

CVSS: HIGH (8.8)

EPSS Score: 4.2%

Source: CVE
February 14th, 2025 (4 months ago)