CVE-2025-1691 |
Description: The MongoDB Shell may be susceptible to control character injection where an attacker with control of the mongosh autocomplete feature, can use the autocompletion feature to input and run obfuscated malicious text. This requires user interaction in the form of the user using ‘tab’ to autocomplete text that is a prefix of the attacker’s prepared autocompletion. This issue affects mongosh versions prior to 2.3.9.
The vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker.
CVSS: HIGH (7.6) EPSS Score: 0.05%
February 27th, 2025 (4 months ago)
|
CVE-2024-13402 |
Description: The Buddyboss Platform plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘link_title’ parameter in all versions up to, and including, 2.7.70 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVSS: MEDIUM (6.4) EPSS Score: 0.03%
February 27th, 2025 (4 months ago)
|
CVE-2024-13217 |
Description: The Jeg Elementor Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.6.11 via the 'expired_data' and 'build_content' functions. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, scheduled, and draft template data.
CVSS: MEDIUM (4.3) EPSS Score: 0.03%
February 27th, 2025 (4 months ago)
|
CVE-2024-10918 |
Description: Stack-based Buffer Overflow vulnerability in libmodbus v3.1.10 allows to overflow the buffer allocated for the Modbus response if the function tries to reply to a Modbus request with an
unexpected length.
CVSS: MEDIUM (4.8) EPSS Score: 0.05%
February 27th, 2025 (4 months ago)
|
![]() |
Description: Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools
February 27th, 2025 (4 months ago)
|
CVE-2024-1635 |
Description: A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available.
At HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree leaks via that task, which is added to XNIO WorkerThread. So, the workerThread points to the Undertow conduit, which contains the connections and causes the leak.
EPSS Score: 63.28% SSVC Exploitation: none
February 27th, 2025 (4 months ago)
|
![]() |
Description: We analyze the backdoor Squidoor, used by a suspected Chinese threat actor to steal sensitive information. This multi-platform backdoor is built for stealth.
The post Squidoor: Suspected Chinese Threat Actor’s Backdoor Targets Global Organizations appeared first on Unit 42.
February 27th, 2025 (4 months ago)
|
![]() |
Description:
Nessus Plugin ID 216873 with Critical Severity
Synopsis
The remote Fedora host is missing one or more security updates.
Description
The remote Fedora 41 host has a package installed that is affected by a vulnerability as referenced in the FEDORA-2025-3dfc505946 advisory. Merge branch 'f42' into f41 ---- Merge branch 'rawhide' into f41 ---- Fix merge conflictTenable has extracted the preceding description block directly from the Fedora security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the affected rpm-ostree package.
Read more at https://www.tenable.com/plugins/nessus/216873
February 27th, 2025 (4 months ago)
|
CVE-2023-28617 |
Description:
Nessus Plugin ID 216874 with High Severity
Synopsis
The remote Debian host is missing one or more security-related updates.
Description
The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-4069 advisory. ------------------------------------------------------------------------- Debian LTS Advisory DLA-4069-1 [email protected] https://www.debian.org/lts/security/ Sean Whitton February 27, 2025 https://wiki.debian.org/LTS ------------------------------------------------------------------------- Package : emacs Version : 1:27.1+1-3.1+deb11u6 CVE ID : CVE-2023-28617 CVE-2024-53920 CVE-2025-1244 Debian Bug : 1033342 1088690 1098255 Multiple vulnerabilities were discovered in GNU Emacs, the extensible, customisable, self-documenting, real-time display editor. CVE-2023-28617 Improper handling of file or directory names containing shell metacharacters in the ob-latex Lisp library could allow the execution of attacker-controlled code. CVE-2024-53920 Several ways to trigger arbitrary code execution were discovered in Emacs's support for editing files in its own dialect of Lisp. These include arbitrary code execution upon opening an otherwise innocent-looking file, with any (or no) file ext...
February 27th, 2025 (4 months ago)
|
![]() |
Description:
Nessus Plugin ID 216875 with Medium Severity
Synopsis
The remote PhotonOS host is missing multiple security updates.
Description
An update of the gnutls package has been released.
Solution
Update the affected Linux packages.
Read more at https://www.tenable.com/plugins/nessus/216875
February 27th, 2025 (4 months ago)
|