CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-0526

Description: In affected versions of Octopus Deploy it was possible to upload files to unexpected locations on the host using an API endpoint. The field lacked validation which could potentially result in ways to circumvent expected workflows.

CVSS: LOW (2.3)

EPSS Score: 0.04%

Source: CVE
February 12th, 2025 (5 months ago)

CVE-2025-0525

Description: In affected versions of Octopus Server the preview import feature could be leveraged to identify the existence of a target file. This could provide an adversary with information that may aid in further attacks against the server.

CVSS: LOW (2.3)

EPSS Score: 0.04%

Source: CVE
February 12th, 2025 (5 months ago)

CVE-2025-0513

Description: In affected versions of Octopus Server error messages were handled unsafely on the error page. If an adversary could control any part of the error message they could embed code which may impact the user viewing the error message.

CVSS: LOW (1.8)

EPSS Score: 0.04%

Source: CVE
February 12th, 2025 (5 months ago)

CVE-2025-0181

Description: The WP Foodbakery plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.7. This is due to the plugin not properly validating a user's identity prior to setting the current user and their authentication cookie. This makes it possible for unauthenticated attackers to gain access to a target user's (e.g. administrators) account.

CVSS: CRITICAL (9.8)

EPSS Score: 0.09%

Source: CVE
February 12th, 2025 (5 months ago)

CVE-2025-0180

Description: The WP Foodbakery plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.3. This is due to the plugin not properly restricting what user meta can be updated during profile registration. This makes it possible for unauthenticated attackers to register on the site as an administrator.

CVSS: CRITICAL (9.8)

EPSS Score: 0.09%

Source: CVE
February 12th, 2025 (5 months ago)

CVE-2025-0064

Description: Under specific conditions, the Central Management Console of the SAP BusinessObjects Business Intelligence platform allows an attacker with admin rights to generate or retrieve a secret passphrase, enabling them to impersonate any user in the system. This results in a high impact on confidentiality and integrity, with no impact on availability.

CVSS: HIGH (8.7)

EPSS Score: 0.04%

Source: CVE
February 12th, 2025 (5 months ago)

CVE-2025-0054

Description: SAP NetWeaver Application Server Java does not sufficiently handle user input, resulting in a stored cross-site scripting vulnerability. The application allows attackers with basic user privileges to store a Javascript payload on the server, which could be later executed in the victim's web browser. With this the attacker might be able to read or modify information associated with the vulnerable web page.

CVSS: MEDIUM (5.4)

EPSS Score: 0.04%

Source: CVE
February 12th, 2025 (5 months ago)

CVE-2024-57777

Description: Directory Traversal vulnerability in Ianproxy v.0.1 and before allows a remote attacker to obtain sensitive information

EPSS Score: 0.04%

Source: CVE
February 12th, 2025 (5 months ago)

CVE-2024-57241

Description: Dedecms 5.71sp1 and earlier is vulnerable to URL redirect. In the web application, a logic error does not judge the input GET request resulting in URL redirection.

EPSS Score: 0.06%

Source: CVE
February 12th, 2025 (5 months ago)

CVE-2024-57000

Description: An issue in Anyscale Inc Ray between v.2.9.3 and v.2.40.0 allows a remote attacker to execute arbitrary code via a crafted script.

EPSS Score: 0.04%

Source: CVE
February 12th, 2025 (5 months ago)