Title: WPBot Pro WordPress Chatbot <= 13.5.4 – Unauthenticated Arbitrary File Upload
Published Date: Jan 21, 2025
Risk Index: 4.96 of 10 (Medium)
Summary: A critical vulnerability has been identified in the WPBot Pro WordPress Chatbot plugin, affecting all versions up to, and including, version 13.5.4. This vulnerability allows unauthenticated attackers to upload arbitrary files to the affected server, potentially leading to remote code execution threats.
If exploited, this vulnerability could allow an attacker to gain unauthorized access to sensitive data or execute arbitrary code on the affected system. This can result in full server compromise, including the possibility of data theft, deployment of malware, and further unauthorized activities (e.g., creating backdoors or spreading ransomware).
Title: AdForest <= 5.1.8 – Authentication Bypass
Published Date: Jan 22, 2025
Risk Index: 4.67 of 10 (Medium)
Summary: A critical vulnerability has been identified in the AdForest theme for WordPress. The vulnerability allows for authentication bypass in all versions up to, and including, 5.1.8. Due to improper verification of a user’s identity before logging them in, it is possible for unauthenticated attackers to authenticate as any user, provided they have configured OTP login by phone number.
If exploited, this vulnerability could allow an attacker to gain unauthorized access to sensitive data, manipulate website content, or execute arbitrary code on the affected system. Compromised user accounts, especially administrative ones, could lead to widespread malicious activities, including the installation of malware, defacement of the site, or complete site takeover.
Title: Rsync: heap buffer overflow in rsync due to improper checksum length handling
Published Date: Jan 14, 2025
Risk Index: 8.04 of 10 (High)
Summary: A critical vulnerability has been identified in the rsync daemon due to a heap-based buffer overflow flaw. This issue arises from improper handling of attacker-controlled checksum lengths (s2length) in the code. When the maximum digest length (MAX_DIGEST_LEN) exceeds the fixed SUM_LENGTH (16 bytes), it allows an attacker to write out of bounds in the sum2 buffer.
If exploited, this vulnerability could allow an attacker to gain unauthorized access to sensitive data, execute arbitrary code within the context of the rsync daemon, or entirely compromise the system running rsync. The potential impacts include data breaches, system downtime, or full control over the affected systems.
Title: Download Protections were bypassed by .xrm-ms files on Windows
Published Date: Apr 16, 2024
Risk Index: 8.1 of 10 (High)
Summary: A critical vulnerability has been identified in the download protection mechanism of Mozilla Firefox, Firefox ESR, and Thunderbird on Windows operating systems, specifically relating to the .xrm-ms file types.
If exploited, this vulnerability could allow an attacker to trick users into downloading and executing malicious .xrm-ms files without the users being aware of the potential risk. This exploit could lead to unauthorized access to sensitive data, system compromise, or execution of arbitrary code on the affected Windows system.
Title: SolarWinds Security Event Manager Deserialization of Untrusted Data Remote Code Execution Vulnerability
Published Date: Mar 01, 2024
Risk Index: 8.03 of 10 (High)
Summary: A critical vulnerability has been identified in the XML parser component of SolarWinds Security Event Manager. This vulnerability allows an unauthenticated user to abuse SolarWindsโ service, resulting in remote code execution.
If exploited, this vulnerability could allow an attacker to gain unauthorized access to sensitive data or execute arbitrary code on the affected system. The potential consequences include data breaches, system compromise, lateral movement within the network, and the deployment of ransomware or other malicious software.