CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-13518

Description: The Simple:Press Forum plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.10.11. This is due to missing or incorrect nonce validation on the 'sp_save_edited_post' function. This makes it possible for unauthenticated attackers to modify a forum post via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVSS: MEDIUM (4.3)

EPSS Score: 0.01%

Source: CVE
March 1st, 2025 (4 months ago)

CVE-2025-1780

Description: The BuddyPress WooCommerce My Account Integration. Create WooCommerce Member Pages plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wc4bp_delete_page() function in all versions up to, and including, 3.4.25. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugins page setting.

CVSS: MEDIUM (4.3)

EPSS Score: 0.03%

Source: CVE
March 1st, 2025 (4 months ago)

CVE-2024-13358

Description: The BuddyPress WooCommerce My Account Integration. Create WooCommerce Member Pages plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wc4bp_delete_page() function in all versions up to, and including, 3.4.24. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugins page setting.

CVSS: MEDIUM (4.3)

EPSS Score: 0.03%

Source: CVE
March 1st, 2025 (4 months ago)

CVE-2025-23119

Description: An Improper Neutralization of Escape Sequences vulnerability could allow an Authentication Bypass with a Remote Code Execution (RCE) by a malicious actor with access to UniFi Protect Cameras adjacent network.

CVSS: HIGH (7.5)

EPSS Score: 0.06%

Source: CVE
March 1st, 2025 (4 months ago)

CVE-2025-23118

Description: An Improper Certificate Validation vulnerability could allow an authenticated malicious actor with access to UniFi Protect Cameras adjacent network to make unsupported changes to the camera system.

CVSS: MEDIUM (6.4)

EPSS Score: 0.01%

Source: CVE
March 1st, 2025 (4 months ago)

CVE-2025-23117

Description: An Insufficient Firmware Update Validation vulnerability could allow an authenticated malicious actor with access to UniFi Protect Cameras adjacent network to make unsupported changes to the camera system.

EPSS Score: 0.01%

Source: CVE
March 1st, 2025 (4 months ago)

CVE-2025-23116

Description: An Authentication Bypass vulnerability on UniFi Protect Application with Auto-Adopt Bridge Devices enabled could allow a malicious actor with access to UniFi Protect Cameras adjacent network to take control of UniFi Protect Cameras.

CVSS: CRITICAL (9.6)

EPSS Score: 0.03%

Source: CVE
March 1st, 2025 (4 months ago)

CVE-2025-23115

Description: A Use After Free vulnerability on UniFi Protect Cameras could allow a Remote Code Execution (RCE) by a malicious actor with access to UniFi Protect Cameras management network.

CVSS: CRITICAL (9.0)

EPSS Score: 0.22%

Source: CVE
March 1st, 2025 (4 months ago)
Description: Summary The site title field at /panel/options/site/allows embedding JS tags, which can be used to attack all members of the system. This is a widespread attack and can cause significant damage if there is a considerable number of users. Impact The attack is widespread, leveraging what XSS can do. This will undoubtedly impact system availability. Patches Formwork 2.x (aa3e9c6) escapes site title from panel header navigation. Details By embedding "
Source: Github Advisory Database (Composer)
March 1st, 2025 (4 months ago)
Description: Summary Improper validation of select fields allows attackers to craft an input that crashes the system, resulting in a 500 status and making the entire site and administration panel unavailable. This clearly impacts the Availability aspect of the CIA triad (confidentiality, integrity, and availability), although the attack still has certain limitations. Details The attack involves injecting any invalid user role value (e.g. ">") into the Role=User parameter in the /panel/users/{name}/profile page, which is the user profile update page. Doing this will change the users data in a way that prevents users and then the entire site from loading. Even though the actual data change is minimal, the error is unrecoverable until a valid role parameter is restored by direct modification of the user account file. Proper validation of select fields will prevent extraneous valid from being accepted and making the entire site and administration panel unavailable. Patches Formwork 2.x (d9f0c1f) adds proper validation to select fields. Impact The condition for this attack is having high privileges or Admin access, which means it could be exploited by an Insider Threat. Alternatively, if an attacker gains access to a privileged user account, they can execute the attack as well. Overall, the attack is relatively difficult to carry out, but if successful, the impact and damage would be significant. PoC Intercept the request and inject an input that will trigger an error. 2.After that, ...
Source: Github Advisory Database (Composer)
March 1st, 2025 (4 months ago)