Latest Vulnerabilities

Latest Vulnerabilities Updates on the latest vulnerabilities detected.

  • CVE-2024-13406 – Google Merchant Center Plugin for WordPress Reflected Cross-Site Scripting Vulnerability
    on January 22, 2025 at 7:15 am

    CVE ID : CVE-2024-13406 Published : Jan. 22, 2025, 7:15 a.m. | 48 minutes ago Description : The XML for Google Merchant Center plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘feed_id’ parameter in all versions up to, and including, 3.0.11 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Severity: 6.1 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2024-12857 – AdForest WordPress Authentication Bypass Vulnerability
    on January 22, 2025 at 7:15 am

    CVE ID : CVE-2024-12857 Published : Jan. 22, 2025, 7:15 a.m. | 48 minutes ago Description : The AdForest theme for WordPress is vulnerable to authentication bypass in all versions up to, and including, 5.1.8. This is due to the plugin not properly verifying a user’s identity prior to logging them in as that user. This makes it possible for unauthenticated attackers to authenticate as any user as long as they have configured OTP login by phone number. Severity: 9.8 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2024-12117 – The Stackable Gutenberg Blocks Stored Cross-Site Scripting Vulnerability
    on January 22, 2025 at 7:15 am

    CVE ID : CVE-2024-12117 Published : Jan. 22, 2025, 7:15 a.m. | 49 minutes ago Description : The Stackable – Page Builder Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘title’ parameter of the Button block in all versions up to, and including, 3.13.11 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Severity: 6.4 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2025-20617 – Cisco UD-LT2 OS Command Injection Vulnerability
    on January 22, 2025 at 6:15 am

    CVE ID : CVE-2025-20617 Published : Jan. 22, 2025, 6:15 a.m. | 1 hour, 49 minutes ago Description : Improper neutralization of special elements used in an OS command (‘OS Command Injection’) issue exists in UD-LT2 firmware Ver.1.00.008_SE and earlier. If this vulnerability is exploited, an arbitrary OS command may be executed by an attacker who can access the affected product with an administrative account. Severity: 7.2 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2025-22450 – WiSoka UD-LT2 Firewall Inclusion Vulnerability
    on January 22, 2025 at 6:15 am

    CVE ID : CVE-2025-22450 Published : Jan. 22, 2025, 6:15 a.m. | 1 hour, 49 minutes ago Description : Inclusion of undocumented features issue exists in UD-LT2 firmware Ver.1.00.008_SE and earlier. A remote attacker may disable the LAN-side firewall function of the affected products, and open specific ports. Severity: 7.5 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2025-23237 – “UD-LT2 OS Command Injection Vulnerability”
    on January 22, 2025 at 6:15 am

    CVE ID : CVE-2025-23237 Published : Jan. 22, 2025, 6:15 a.m. | 1 hour, 49 minutes ago Description : Improper neutralization of special elements used in an OS command (‘OS Command Injection’) issue exists in UD-LT2 firmware Ver.1.00.008_SE and earlier. If a user logs in to CLI of the affected product, an arbitrary OS command may be executed. Severity: 6.6 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2024-12879 – “WordPress WPBot Pro Unauthorized Data Modification – Arbitrary Chat Response Injection”
    on January 22, 2025 at 6:15 am

    CVE ID : CVE-2024-12879 Published : Jan. 22, 2025, 6:15 a.m. | 1 hour, 49 minutes ago Description : The WPBot Pro WordPress Chatbot plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ‘qc_wp_latest_update_check_pro’ function in all versions up to, and including, 13.5.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create Simple Text Responses to chat queries. Severity: 4.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2024-11218 – Podman/Buildah Compose Privilege Escalation Vulnerability
    on January 22, 2025 at 5:15 am

    CVE ID : CVE-2024-11218 Published : Jan. 22, 2025, 5:15 a.m. | 2 hours, 49 minutes ago Description : A vulnerability was found in `podman build` and `buildah.` This issue occurs in a container breakout by using –jobs=2 and a race condition when building a malicious Containerfile. SELinux might mitigate it, but even with SELinux on, it still allows the enumeration of files and directories on the host. Severity: 8.6 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2024-13590 – WordPress Ketchup Shortcodes Stored Cross-Site Scripting Vulnerability
    on January 22, 2025 at 4:15 am

    CVE ID : CVE-2024-13590 Published : Jan. 22, 2025, 4:15 a.m. | 3 hours, 49 minutes ago Description : The Ketchup Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘spacer’ shortcode in all versions up to, and including, 0.1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Severity: 6.4 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2024-13584 – WordPress Picture Gallery Stored Cross-Site Scripting (XSS)
    on January 22, 2025 at 4:15 am

    CVE ID : CVE-2024-13584 Published : Jan. 22, 2025, 4:15 a.m. | 3 hours, 49 minutes ago Description : The Picture Gallery – Frontend Image Uploads, AJAX Photo List plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘videowhisper_pictures’ shortcode in all versions up to, and including, 1.5.19 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Severity: 6.4 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2024-13426 – WordPress WP-Polls Stored Cross-Site Scripting (SQL Injection)
    on January 22, 2025 at 3:15 am

    CVE ID : CVE-2024-13426 Published : Jan. 22, 2025, 3:15 a.m. | 4 hours, 49 minutes ago Description : The WP-Polls plugin for WordPress is vulnerable to SQL Injection via COOKIE in all versions up to, and including, 2.77.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries. Those queries are stored and results are not displayed to the attacker, which means they cannot be exploited to obtain any additional information about the database. However, a properly configured payload allows for the injection of malicious JavaScript resulting in Stored Cross-Site Scripting. Severity: 5.4 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2025-23088 – Node.js Unmaintained Third-Party Components Vulnerability (CWE-1104)
    on January 22, 2025 at 2:15 am

    CVE ID : CVE-2025-23088 Published : Jan. 22, 2025, 2:15 a.m. | 5 hours, 48 minutes ago Description : This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components). Users are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support. Severity: 8.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2025-23090 – Node.js Permission Model Diagnostic Worker Thread Exposición
    on January 22, 2025 at 2:15 am

    CVE ID : CVE-2025-23090 Published : Jan. 22, 2025, 2:15 a.m. | 5 hours, 48 minutes ago Description : With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. This vulnerability affects Permission Model users (–permission) on Node.js v20, v22, and v23. Severity: 7.7 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2025-23087 – Node.js End-of-Life Vulnerability: Unmaintained Version Use
    on January 22, 2025 at 2:15 am

    CVE ID : CVE-2025-23087 Published : Jan. 22, 2025, 2:15 a.m. | 5 hours, 48 minutes ago Description : This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components). Users are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support. Severity: 8.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2025-23089 – Microsoft Node.js Unmaintained Component Exposure Vulnerability
    on January 22, 2025 at 2:15 am

    CVE ID : CVE-2025-23089 Published : Jan. 22, 2025, 2:15 a.m. | 5 hours, 48 minutes ago Description : This CVE has been issued to inform users that they are using End-of-Life (EOL) versions of Node.js. These versions are no longer supported and do not receive updates, including security patches. The continued use of EOL versions may expose systems to potential security risks due to unaddressed software vulnerabilities or dependencies (CWE-1104: Use of Unmaintained Third-Party Components). Users are advised to upgrade to actively supported versions of Node.js to ensure continued security updates and support. Severity: 8.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2025-23083 – Node.js permission model diagnostic channel worker thread creation arbitrary instance reuse vulnerability
    on January 22, 2025 at 2:15 am

    CVE ID : CVE-2025-23083 Published : Jan. 22, 2025, 2:15 a.m. | 5 hours, 48 minutes ago Description : With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. This vulnerability affects Permission Model users (–permission) on Node.js v20, v22, and v23. Severity: 7.7 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2025-0625 – CampCodes School Management Software Attachment Handler Improper Resource Identifier Control Remote vulnerability
    on January 22, 2025 at 2:15 am

    CVE ID : CVE-2025-0625 Published : Jan. 22, 2025, 2:15 a.m. | 5 hours, 48 minutes ago Description : A vulnerability, which was classified as problematic, was found in CampCodes School Management Software 1.0. This affects an unknown part of the component Attachment Handler. The manipulation leads to improper control of resource identifiers. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Severity: 3.1 | LOW Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2023-37039 – Magma Mobile Management Entity (MME) Null Pointer Dereference Vulnerability
    on January 22, 2025 at 12:15 am

    CVE ID : CVE-2023-37039 Published : Jan. 22, 2025, 12:15 a.m. | 7 hours, 48 minutes ago Description : A Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allow network-adjacent attackers to crash the MME via an S1AP `Initial UE Message` packet missing an expected `RRC Establishment Clause` field. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2024-13091 – “WordPress WPBot Pro Remote File Upload Vulnerability”
    on January 22, 2025 at 12:15 am

    CVE ID : CVE-2024-13091 Published : Jan. 22, 2025, 12:15 a.m. | 7 hours, 48 minutes ago Description : The WPBot Pro WordPress Chatbot plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ‘qcld_wpcfb_file_upload’ function in all versions up to, and including, 13.5.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site’s server which may make remote code execution possible. Note: The exploit requires thee ChatBot Conversational Forms plugin and the Conversational Form Builder Pro addon plugin. Severity: 9.8 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2024-49747 – Nordic Semiconductor Bluetooth GATT Out-of-Bounds Write RCE Vulnerability
    on January 21, 2025 at 11:15 pm

    CVE ID : CVE-2024-49747 Published : Jan. 21, 2025, 11:15 p.m. | 8 hours, 49 minutes ago Description : In gatts_process_read_by_type_req of gatt_sr.cc, there is a possible out of bounds write due to a logic error in the code. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2024-49748 – LibMob Quit Bluetooth RCE
    on January 21, 2025 at 11:15 pm

    CVE ID : CVE-2024-49748 Published : Jan. 21, 2025, 11:15 p.m. | 8 hours, 49 minutes ago Description : In gatts_process_primary_service_req of gatt_sr.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2024-49749 – Cisco DGifSlurp Out-of-Bounds Write Vulnerability
    on January 21, 2025 at 11:15 pm

    CVE ID : CVE-2024-49749 Published : Jan. 21, 2025, 11:15 p.m. | 8 hours, 49 minutes ago Description : In DGifSlurp of dgif_lib.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2024-49742 – Android Notification Access Exploit
    on January 21, 2025 at 11:15 pm

    CVE ID : CVE-2024-49742 Published : Jan. 21, 2025, 11:15 p.m. | 8 hours, 49 minutes ago Description : In onCreate of NotificationAccessConfirmationActivity.java , there is a possible way to hide an app with notification access in Settings due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2024-49744 – Google AccountManagerService Parcel Deserialization Privilege Escalation
    on January 21, 2025 at 11:15 pm

    CVE ID : CVE-2024-49744 Published : Jan. 21, 2025, 11:15 p.m. | 8 hours, 49 minutes ago Description : In checkKeyIntentParceledCorrectly of AccountManagerService.java, there is a possible way to bypass parcel mismatch mitigation due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more…

  • CVE-2024-49745 – Apache Parcel Heap-Based Buffer Overflow
    on January 21, 2025 at 11:15 pm

    CVE ID : CVE-2024-49745 Published : Jan. 21, 2025, 11:15 p.m. | 8 hours, 49 minutes ago Description : In growData of Parcel.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more…

Share Websitecyber