Posts
178
Following
Hidden
Followers
61
AttackerKB bot (Unofficial)
New assessment for topic: CVE-2025-49619

Topic description: "Skyvern through 0.1.85 is vulnerable to server-side template injection (SSTI) in the Prompt field of workflow blocks such as the Navigation v2 Block ..."

"On June 7th, CVE-2025-49619 was published, alongside a [write-up](https://cristibtz.blog/posts/CVE-2025-49619/) ..."

Link: https://attackerkb.com/assessments/fcb4d7e0-b562-4515-9a78-4f40640308f2
0
0
0
New assessment for topic: CVE-2024-51981

Topic description: "An unauthenticated attacker may perform a blind server side request forgery (SSRF), due to a CLRF injection issue that can be leveraged to perform HTTP request smuggling ..."

"A Server Side Request Forgery (SSRF) vulnerability exists due to how the Brother firmware handles Web Services Eventing (WS-Eventing) subscriptions ..."

Link: https://attackerkb.com/assessments/fa5c2bf7-82ec-44cc-8808-d8647ae037d4
0
0
0
New assessment for topic: CVE-2025-1094

Topic description: "Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns ..."

"An attacker can inject unexpected UTF-8 characters, such as `\xC0` into a string that is correctly escaped via the PSQL escaping routines, such as `pg_escape_string` ..."

Link: https://attackerkb.com/assessments/74e38297-224a-4205-beb2-c5cef31d2ecf
0
0
0
New assessment for topic: CVE-2024-51977

Topic description: "An unauthenticated attacker who can access either the HTTP service (TCP port 80), the HTTPS service (TCP port 443), or the IPP service (TCP port 631), can leak several pieces of sensitive information from a vulnerable device ..."

"An unauthenticated attacker who can access either the HTTP service (Port 80), the HTTPS service (Port 443), or the IPP service (Port 631), can leak several pieces of information from a vulnerable device ..."

Link: https://attackerkb.com/assessments/d00cbb64-c04d-4317-9f35-c201a4aa5733
0
0
0
New assessment for topic: CVE-2024-51979

Topic description: "An authenticated attacker may trigger a stack based buffer overflow by performing a malformed request to either the HTTP service (TCP port 80), the HTTPS service (TCP port 443), or the IPP service (TCP port 631) ..."

"An authenticated stack-based buffer overflow exists in the printers HTTP server ..."

Link: https://attackerkb.com/assessments/aa600177-e69d-4eba-810a-f317d2ddb369
0
0
0
New assessment for topic: CVE-2024-51980

Topic description: "An unauthenticated attacker may perform a limited server side request forgery (SSRF), forcing the target device to open a TCP connection to an arbitrary port number on an arbitrary IP address ..."

"A Server Side Request Forgery (SSRF) vulnerability exists due to how the Brother firmware handles Web Services Addressing (WS-Addressing) during SOAP requests to the SOAP service over HTTP (TCP port 80) ..."

Link: https://attackerkb.com/assessments/686ad46c-d2c3-4116-b31e-010e695ba288
0
0
0
New assessment for topic: CVE-2024-51982

Topic description: "An unauthenticated attacker who can connect to TCP port 9100 can issue a Printer Job Language (PJL) command that will crash the target device ..."

"An unauthenticated attacker who can connect to TCP port 9100 can issue a Printer Job Language (PJL) command that will crash the target device ..."

Link: https://attackerkb.com/assessments/f29cd000-e191-42dd-ab80-271c3eef8c2d
0
0
0
New assessment for topic: CVE-2024-51983

Topic description: "An unauthenticated attacker who can connect to the Web Services feature (HTTP TCP port 80) can issue a WS-Scan SOAP request containing an unexpected JobToken value which will crash the target device ..."

"The device’s Web Services feature operates over HTTP (Port 80) and accepts an XML-based SOAP request ..."

Link: https://attackerkb.com/assessments/9b5204d1-0cb0-4d9c-a7ae-97199dd23d80
0
0
0
New assessment for topic: CVE-2024-51984

Topic description: "An authenticated attacker can reconfigure the target device to use an external service (such as LDAP or FTP) controlled by the attacker ..."

"An affected device allows for multiple external services to be configured for use by the device, such as LDAP, FTP, SFTP, and SharePoint ..."

Link: https://attackerkb.com/assessments/ded3c328-b080-4b18-b7f3-4df3838bdd18
0
0
0
New assessment for topic: CVE-2024-52056

Topic description: "Path Traversal in the Manager component of Wowza Streaming Engine below 4.9.1 allows an administrator user to delete any directory on the file system if the target directory contains an XML definition file. ..."

"CVE-2024-52056 permits authenticated administrators to delete arbitrary directories on the host that contain `Application.xml` ..."

Link: https://attackerkb.com/assessments/e8a64028-5caf-4872-889b-84d263b5a53c
0
0
0
New assessment for topic: CVE-2025-32821

Topic description: "A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN admin privileges can with admin privileges can inject shell command arguments to upload a file on the appliance. ..."

"An authenticated attacker with SMA administrator privileges can inject shell command arguments with an escape sequence to upload a fully controlled file anywhere that the `nobody` user can write to ..."

Link: https://attackerkb.com/assessments/cfb5634b-463d-4bcc-8d9f-a16af2ed4f60
0
0
0
New assessment for topic: CVE-2024-52054

Topic description: "Path Traversal in the Manager component of Wowza Streaming Engine below 4.9.1 allows an administrator user to create an XML definition file anywhere on the file system. ..."

"CVE-2024-52054 is a high-privilege path traversal vulnerability affecting the Wowza Streaming Engine Manager web service ..."

Link: https://attackerkb.com/assessments/a021a418-7449-4d1b-b8ac-ccdf120bcd7c
0
0
0
New assessment for topic: CVE-2024-52055

Topic description: "Path Traversal in the Manager component of Wowza Streaming Engine below 4.9.1 allows an administrator user to read any file on the file system if the target directory contains an XML definition file. ..."

"CVE-2024-52055 is a path traversal vulnerability that permits an administrator user to read any file on the file system if the target directory contains a file or directory called `Application.xml` ..."

Link: https://attackerkb.com/assessments/ced78fb9-1b04-494a-b111-d809adca520a
0
0
0
New assessment for topic: CVE-2024-6922

Topic description: "Automation Anywhere Automation 360 v21-v32 is vulnerable to Server-Side Request Forgery in a web API component ..."

"[CVE-2024-6922](https://nvd.nist.gov/vuln/detail/cve-2024-6922) is an unauthenticated blind Server-Side Request Forgery ("SSRF") vulnerability in Automation Anywhere Automation 360 ..."

Link: https://attackerkb.com/assessments/376cd313-be9a-4d42-a536-8ed32da9c648
0
0
0
New assessment for topic: CVE-2025-4678

Topic description: "Improper Neutralization of Special Elements in the chromium_path variable may allow OS command injection ..."

"This is a similar RCE like [CVE-2024-12971](https://attackerkb.com/topics/BJe14wkMYS/cve-2024-12971) but now in the `chromium_path`directory settings at the Pandora ITSM application ..."

Link: https://attackerkb.com/assessments/cbac9f7f-798e-424f-a010-48ceada60ff7
0
1
1
New assessment for topic: CVE-2025-32820

Topic description: "A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges can inject a path traversal sequence to make any directory on the SMA appliance writable. ..."

"[CVE-2025-32820](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0011) is an administrator-level injection to make arbitrary system directories writable ..."

Link: https://attackerkb.com/assessments/9aa7635e-3b8d-42c0-b2b9-6f44d48609c8
0
0
0
New assessment for topic: CVE-2025-32819

Topic description: "A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings. ..."

"CVE-2025-32819 is a patch bypass for an [older 2021 vulnerability](https://www.nccgroup.com/us/research-blog/technical-advisory-sonicwall-sma-100-series-unauthenticated-arbitrary-file-deletion/) disclosed by NCC Group ..."

Link: https://attackerkb.com/assessments/edd5917f-ed7c-4fbd-a41e-cd6e71f4d2ca
0
0
0
New assessment for topic: CVE-2025-49706

Topic description: "Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network. ..."

"CVE-2025-49706 is an authentication bypass affecting Microsoft SharePoint Server, allowing a remote unauthenticated attacker to reach the ToolPane page, located at the `/_layouts/15/ToolPane.aspx` URI ..."

Link: https://attackerkb.com/assessments/2451dc3d-3351-480c-aeda-e986a77792cb
0
0
0
New assessment for topic: CVE-2025-23120

Topic description: "A vulnerability allowing remote code execution (RCE) for domain users. ..."

"[CVE-2025-23120](https://www.rapid7.com/blog/post/2025/03/19/etr-critical-veeam-backup-and-replication-cve-2025-23120/) is a critical pseudo-unauthenticated [deserialization remote code execution vulnerability](https://labs.watchtowr.com/by-executive-order-we-are-banning-blacklists-domain-level-rce-in-veeam-backup-replication-cve-2025-23120/) in Veeam Backup & Replication, a widely used backup solution ..."

Link: https://attackerkb.com/assessments/5f4f8ca4-244d-4391-aba4-2089f3bdc4bf
0
0
0
New assessment for topic: CVE-2025-23121

Topic description: "A vulnerability allowing remote code execution (RCE) on the Backup Server by an authenticated domain user ..."

"[CVE-2025-23121](https://www.rapid7.com/blog/post/etr-critical-veeam-backup-replication-cve-2025-23121/) is an almost-unauthenticated critical remote code execution vulnerability in Veeam Backup & Replication, a widely used backup solution ..."

Link: https://attackerkb.com/assessments/f5097862-0a05-470d-8bd4-3469302779a0
0
0
0
Show older