Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-2613

Description: The Login Manager – Design Login Page, View Login Activity, Limit Login Attempts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Custom logo and background URLs in all versions up to, and including, 2.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

CVSS: MEDIUM (4.4)

EPSS Score: 0.02%

Source: CVE
April 18th, 2025 (1 day ago)

CVE-2025-0467

Description: Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data outside the Guest's virtualised GPU memory.

EPSS Score: 0.02%

Source: CVE
April 18th, 2025 (1 day ago)

CVE-2024-13650

Description: The Piotnet Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'PAFE Before After Image Comparison Slider' widget in all versions up to, and including, 2.4.34 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVSS: MEDIUM (6.4)

EPSS Score: 0.03%

Source: CVE
April 18th, 2025 (1 day ago)
Description: Active! mail provided by QUALITIA CO., LTD. contains a stack-based buffer overflow vulnerability.
Source: Japan Vulnerability Notes (JVN)
April 18th, 2025 (1 day ago)
Description: Mid-America POOL RENOVATION, Inc (US)
Source: Ransomware.live
April 18th, 2025 (1 day ago)
Description: Compliance Consulting Group (US)
Source: Ransomware.live
April 18th, 2025 (1 day ago)
Description: Wilmington Personal Injury Lawyer - DPLAW(US)
Source: Ransomware.live
April 18th, 2025 (1 day ago)

CVE-2025-3509

Description: A Remote Code Execution (RCE) vulnerability was identified in GitHub Enterprise Server that allowed attackers to execute arbitrary code by exploiting the pre-receive hook functionality, potentially leading to privilege escalation and system compromise. The vulnerability involves using dynamically allocated ports that become temporarily available, such as during a hot patch upgrade. This means the vulnerability is only exploitable during specific operational conditions, which limits the attack window. Exploitation required either site administrator permissions to enable and configure pre-receive hooks or a user with permissions to modify repositories containing pre-receive hooks where this functionality was already enabled. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.17 and was fixed in versions 3.16.2, 3.15.6, 3.14.11, 3.13.14. This vulnerability was reported via the GitHub Bug Bounty program.

CVSS: HIGH (7.1)

EPSS Score: 0.24%

Source: CVE
April 17th, 2025 (1 day ago)

CVE-2025-3246

Description: An improper neutralization of input vulnerability was identified in GitHub Enterprise Server that allowed cross-site scripting in GitHub Markdown that used `$$..$$` math blocks. Exploitation required access to the target GitHub Enterprise Server instance and privileged user interaction with the malicious elements. This vulnerability affected version 3.16.1 of GitHub Enterprise Server and was fixed in version 3.16.2. This vulnerability was reported via the GitHub Bug Bounty program.

CVSS: HIGH (8.6)

EPSS Score: 0.04%

Source: CVE
April 17th, 2025 (1 day ago)

CVE-2025-3124

Description: A missing authorization vulnerability was identified in GitHub Enterprise Server that allowed a user to see the names of private repositories that they wouldn't otherwise have access to in the Security Overview in GitHub Advanced Security. The Security Overview was required to be filtered only using the `archived:` filter and all other access controls were functioning normally. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.17 and was fixed in versions 3.13.14, 3.14.11, 3.15.6, and 3.16.2.

CVSS: MEDIUM (5.3)

EPSS Score: 0.04%

Source: CVE
April 17th, 2025 (1 day ago)