Posts
180
Following
Hidden
Followers
61
AttackerKB bot (Unofficial)
New assessment for topic: CVE-2025-32820

Topic description: "A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges can inject a path traversal sequence to make any directory on the SMA appliance writable. ..."

"[CVE-2025-32820](https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0011) is an administrator-level injection to make arbitrary system directories writable ..."

Link: https://attackerkb.com/assessments/9aa7635e-3b8d-42c0-b2b9-6f44d48609c8
0
0
0
New assessment for topic: CVE-2025-32819

Topic description: "A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings. ..."

"CVE-2025-32819 is a patch bypass for an [older 2021 vulnerability](https://www.nccgroup.com/us/research-blog/technical-advisory-sonicwall-sma-100-series-unauthenticated-arbitrary-file-deletion/) disclosed by NCC Group ..."

Link: https://attackerkb.com/assessments/edd5917f-ed7c-4fbd-a41e-cd6e71f4d2ca
0
0
0
New assessment for topic: CVE-2025-49706

Topic description: "Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network. ..."

"CVE-2025-49706 is an authentication bypass affecting Microsoft SharePoint Server, allowing a remote unauthenticated attacker to reach the ToolPane page, located at the `/_layouts/15/ToolPane.aspx` URI ..."

Link: https://attackerkb.com/assessments/2451dc3d-3351-480c-aeda-e986a77792cb
0
0
0
New assessment for topic: CVE-2025-23120

Topic description: "A vulnerability allowing remote code execution (RCE) for domain users. ..."

"[CVE-2025-23120](https://www.rapid7.com/blog/post/2025/03/19/etr-critical-veeam-backup-and-replication-cve-2025-23120/) is a critical pseudo-unauthenticated [deserialization remote code execution vulnerability](https://labs.watchtowr.com/by-executive-order-we-are-banning-blacklists-domain-level-rce-in-veeam-backup-replication-cve-2025-23120/) in Veeam Backup & Replication, a widely used backup solution ..."

Link: https://attackerkb.com/assessments/5f4f8ca4-244d-4391-aba4-2089f3bdc4bf
0
0
0
New assessment for topic: CVE-2025-23121

Topic description: "A vulnerability allowing remote code execution (RCE) on the Backup Server by an authenticated domain user ..."

"[CVE-2025-23121](https://www.rapid7.com/blog/post/etr-critical-veeam-backup-replication-cve-2025-23121/) is an almost-unauthenticated critical remote code execution vulnerability in Veeam Backup & Replication, a widely used backup solution ..."

Link: https://attackerkb.com/assessments/f5097862-0a05-470d-8bd4-3469302779a0
0
0
0
New assessment for topic: CVE-2025-1974

Topic description: "A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller ..."

"CVE-2025-1974 is a [critical vulnerability](https://kubernetes.io/blog/2025/03/24/ingress-nginx-cve-2025-1974/) in the Kubernetes Ingress-NGINX controller, and it facilitates [unauthenticated remote code execution](https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities) ..."

Link: https://attackerkb.com/assessments/f90c39ea-ae87-4c2f-9438-9aa62d3ce995
0
0
0
New assessment for topic: CVE-2024-29847

Topic description: "Deserialization of untrusted data in the agent portal of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to achieve remote code execution. ..."

"CVE-2024-29847 is an unauthenticated deserialization of untrusted data [remote code execution vulnerability](https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022?language=en_US) in Ivanti Endpoint Manager ("EPM") ..."

Link: https://attackerkb.com/assessments/883eb621-851a-4454-90ac-9643eef0016b
0
0
0
New assessment for topic: CVE-2023-34134

Topic description: "Exposure of sensitive information to an unauthorized actor vulnerability in SonicWall GMS and Analytics allows authenticated attacker to read administrator password hash via a web service call ..."

"CVE-2023-34134 is an [administrator password hash read](https://web.archive.org/web/20241215122545/https://www.sonicwall.com/support/product-notification/urgent-security-notice-sonicwall-gms-analytics-impacted-by-suite-of-vulnerabilities/230710150218060) via an [authenticated Web Services API call](https://www.nccgroup.com/us/research-blog/technical-advisory-sonicwall-global-management-system-gms-analytics-multiple-critical-vulnerabilities/) within the SonicWall Global Management System & Analytics suite ..."

Link: https://attackerkb.com/assessments/c52f41e0-f7c7-420b-9077-7c3cd7d1981a
0
0
0
New assessment for topic: CVE-2023-34133

Topic description: "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SonicWall GMS and Analytics allows an unauthenticated attacker to extract sensitive information from the application database ..."

"CVE-2023-34133 is an assortment of unauthenticated and authenticated [SQL injection vulnerabilities](https://web.archive.org/web/20241215122545/https://www.sonicwall.com/support/product-notification/urgent-security-notice-sonicwall-gms-analytics-impacted-by-suite-of-vulnerabilities/230710150218060) affecting multiple Web Services applications within the SonicWall Global Management System & Analytics suite ..."

Link: https://attackerkb.com/assessments/2c5075d1-a31a-42f7-ab02-e59d8df1c85a
0
0
0
New assessment for topic: CVE-2023-34137

Topic description: "SonicWall GMS and Analytics CAS Web Services application use static values for authentication without proper checks leading to authentication bypass vulnerability ..."

"CVE-2023-34137 is [an authentication bypass](https://web.archive.org/web/20241205174819/https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0010) for the CAS Web Services application within the SonicWall Global Management System & Analytics suite ..."

Link: https://attackerkb.com/assessments/66499a72-446e-43e1-965f-85b89d94d54e
0
0
0
New assessment for topic: CVE-2023-34124

Topic description: "The authentication mechanism in SonicWall GMS and Analytics Web Services had insufficient checks, allowing authentication bypass ..."

"CVE-2023-34124 is an [authentication bypass](https://web.archive.org/web/20241215122545/https://www.sonicwall.com/support/product-notification/urgent-security-notice-sonicwall-gms-analytics-impacted-by-suite-of-vulnerabilities/230710150218060) for the MSW Web Services application within the SonicWall Global Management System & Analytics suite ..."

Link: https://attackerkb.com/assessments/124730ea-5d51-4685-8bea-a277c4292746
0
0
0
New assessment for topic: CVE-2023-36846

Topic description: "A Missing Authentication for Critical Function vulnerability in Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. ..."

"CVE-2023-36846 is a [missing authorization check](https://supportportal.juniper.net/s/article/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US) affecting Juniper Networks SRX-series devices running Junos OS ..."

Link: https://attackerkb.com/assessments/6ecd8cb7-298c-463a-a712-a0daa0cbbe06
0
0
0
New assessment for topic: CVE-2025-54309

Topic description: "CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS, as exploited in the wild in July 2025. ..."

"On Friday, July 18, 2025, managed file transfer vendor CrushFTP released information to a private mailing list on a [new critical vulnerability](https://www.crushftp.com/crush11wiki/Wiki.jsp?page=CompromiseJuly2025), tracked as [CVE-2025-54309](https://nvd.nist.gov/vuln/detail/CVE-2025-54309), affecting versions below 10.8.5 and 11.3.4_23 across all platforms ..."

Link: https://attackerkb.com/assessments/d47ba11a-b2cc-4f24-97ba-2ec8f7dc4915
0
0
0
New assessment for topic: CVE-2025-53770

Topic description: "Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. ..."

"[metadata only] ..."

Link: https://attackerkb.com/assessments/2c4b2b56-e82d-4b2e-9600-7c2049ed3dac
0
0
0
New assessment for topic: CVE-2025-53770

Topic description: "Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. ..."

"In July 2025, a critical remote code execution vulnerability—CVE-2025-53770—was discovered under active exploitation in the wild, targeting Microsoft SharePoint Server (on-premises editions 2016, 2019, and Subscription Edition) ..."

Link: https://attackerkb.com/assessments/a05ad608-8874-4c05-afa2-15bc2fe9910b
0
0
0
New assessment for topic: CVE-2018-20685

Topic description: "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of ..."

"[metadata only] ..."

Link: https://attackerkb.com/assessments/0cd89863-8189-4a87-a1ee-e2f00fcb681a
0
0
0
New assessment for topic: CVE-2025-24016

Topic description: "Wazuh is a free and open source platform used for threat prevention, detection, and response ..."

"An unsafe deserialization vulnerability allows for remote code execution on Wazuh servers. ..."

Link: https://attackerkb.com/assessments/ad9a16ce-02eb-46bd-8af0-810025ee5ca2
0
0
0
New assessment for topic: CVE-2025-47171

Topic description: "Improper input validation in Microsoft Office Outlook allows an authorized attacker to execute code locally. ..."

"# Titles: Microsoft Outlook Remote Code Execution Vulnerability - RCE ..."

Link: https://attackerkb.com/assessments/34aa8491-16dd-409f-8756-8a2511f13250
0
0
0
New assessment for topic: CVE-2025-25257

Topic description: "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem ..."

"Based upon the [technical analysis](https://labs.watchtowr.com/pre-auth-sql-injection-to-rce-fortinet-fortiweb-fabric-connector-cve-2025-25257/) by watchTowr, CVE-2025-25257 is an unauthenticated SQLi vulnerability that can be leveraged to achieve RCE with root privileges ..."

Link: https://attackerkb.com/assessments/1ee1ba51-2399-4e33-b559-c4a4f3383eda
0
0
0
New assessment for topic: CVE-2025-6543

Topic description: "Memory overflow vulnerability leading to unintended control flow and Denial of Service in NetScaler ADC and NetScaler Gateway when configured as Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server ..."

"The vendor [advisory](https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788) reported this as exploited in the wild prior to a patch being available, so an unknown threat actor was exploiting this as zero day vulnerability ..."

Link: https://attackerkb.com/assessments/1bebcdc8-a8b1-448c-9ef8-4bcf53928fde
0
0
1
Show older