Title: WordPress Revy plugin <= 1.18 – Unauthenticated Arbitrary File Upload vulnerability
Published Date: Dec 06, 2024
Risk Index: 4.96 of 10 (Medium)
Summary: A critical vulnerability has been identified in the XML parser component of the WordPress Revy plugin. This vulnerability allows for the unrestricted upload of files with dangerous types, specifically enabling the upload of a web shell to a web server.
If exploited, this vulnerability could allow an attacker to gain unauthorized access to sensitive data, execute arbitrary code on the affected system, plant backdoors, steal user information, and potentially deliver further malicious payloads such as ransomware.
Title: SV100 Companion <= 2.0.02 – Missing Authorization to Unuathenticated
Published Date: Dec 06, 2024
Risk Index: 5.96 of 10 (Medium)
Summary: A critical vulnerability has been identified in the SV100 Companion plugin for WordPress. This vulnerability allows unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the settings_import() function.
If exploited, this vulnerability could allow an attacker to gain unauthorized administrative access to the WordPress site. This would permit the attacker to control the site completely, including adding, deleting, or modifying content; installing or removing plugins; and accessing sensitive data. The site could be used to distribute malware, redirect users to malicious sites, or serve as a launchpad for further attacks.
Title: XXE can expose crypt key and other secrets granting full admin access
Published Date: Jun 11, 2024
Risk Index: 9.82 of 10 (Critical)
Summary: A critical vulnerability has been identified in the XML parser component of Adobe Commerce. The identified vulnerability, classified as CVE-2024-34102, involves an Improper Restriction of XML External Entity Reference (‘XXE’) that can potentially lead to arbitrary code execution. If an attacker successfully exploits this vulnerability, they could gain unauthorized administrative access to the system, exposing cryptographic keys and other sensitive data. The exploitation process involves sending a crafted XML document that references external entities without requiring any user interaction, thus escalating the threat potential significantly.
If exploited, this vulnerability could allow an attacker to gain unauthorized access to sensitive data, execute arbitrary code on the affected system, and potentially take over the entire system infrastructure. The compromise could extend to leaking cryptographic keys, which in turn would grant administrative access to the attacker, leading to severe data breaches and compromise of customer information and business operations.
Title: Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Read-Only Path Traversal Vulnerability
Published Date: Jul 22, 2020
Risk Index: 9.91 of 10 (Critical)
Summary: A critical vulnerability has been identified in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software. This vulnerability may allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system due to improper input validation of URLs in HTTP requests processed by the affected devices.
If exploited, this vulnerability could allow an attacker to gain unauthorized access to sensitive information by reading arbitrary files within the web services file system on the targeted device. An attacker could impersonate another VPN user and establish a Clientless SSL VPN or AnyConnect VPN session to the device as that user. This would enable them to access sensitive data within the web services interface, posing significant risks to the organization’s data integrity and confidentiality.
Title: Microsoft Exchange Server Elevation of Privilege Vulnerability
Published Date: Nov 08, 2022
Risk Index: 9.56 of 10 (Critical)
Summary: A critical vulnerability has been identified in the XML parser component of Microsoft Exchange Server that could lead to elevation of privilege.
If exploited, this vulnerability could allow an attacker to gain unauthorized access to sensitive data or execute arbitrary code on the affected system. The ability to escalate privileges can lead to a complete system takeover, allowing attackers to manipulate system configurations, exfiltrate confidential information, and deploy further attacks within the network.