Post

2025-07-15 Daily Vulns

NEW:

CVEvendor-productdescriptionmetricReferenceurltitleGithubURL 
CVE-2020-36847eemitch - Simple File ListThe Simple-File-List Plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.2.2 via the rename function which can be used to rename uploaded PHP code with a png extension to use a php extension. This allows unauthenticated attackers to execute code on the server.CVSS3.1: 9.8 - CRITICAL0 1 2 3 4Exploitation: pocAutomatable: yesTechnical Impact: totalSimple File List < 4.2.3 - Remote Code Executiongithub
CVE-2020-36848boldgrid - Total Upkeep – WordPress Backup Plugin plus Restore & Migrate by BoldGridThe Total Upkeep – WordPress Backup Plugin plus Restore & Migrate by BoldGrid plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.14.9 via the env-info.php and restore-info.json files. This makes it possible for unauthenticated attackers to find the location of back-up files and subsequently download them.CVSS3.1: 7.5 - HIGH0 1 2 3Exploitation: noneAutomatable: yesTechnical Impact: partialTotal Upkeep by BoldGrid <= 1.14.9 - Unauthenticated Backup Downloadgithub
CVE-2025-53014ImageMagick - ImageMagickImageMagick is free and open-source software used for editing and manipulating digital images. Versions prior to 7.1.2-0 and 6.9.13-26 have a heap buffer overflow in the `InterpretImageFilename` function. The issue stems from an off-by-one error that causes out-of-bounds memory access when processing format strings containing consecutive percent signs (`%%`). Versions 7.1.2-0 and 6.9.13-26 fix the issue.CVSS3.1: 3.7 - LOW0Exploitation: pocAutomatable: noTechnical Impact: partialImageMagick has Heap Buffer Overflow in InterpretImageFilenamegithub
CVE-2023-39339Ivanti - Policy SecureA vulnerability exists on all versions of Ivanti Policy Secure below 22.6R1 where an authenticated administrator can perform an arbitrary file read via a maliciously crafted web request.0Exploitation: noneAutomatable: noTechnical Impact: partialundefinedgithub 
CVE-2023-38036Ivanti - AvalancheA security vulnerability within Ivanti Avalanche Manager before version 6.4.1 may allow an unauthenticated attacker to create a buffer overflow that could result in service disruption or arbitrary code execution.CNA n/a CVSS3.1: 9.8 - CRITICAL0Exploitation: noneAutomatable: noTechnical Impact: totalundefinedgithub
CVE-2024-26292Avid - Avid NEXIS E-seriesAvid - Avid NEXIS F-seriesAvid - Avid NEXIS PRO+Avid - System Director Appliance (SDA+)An authenticated Arbitrary File Deletion vulnerability enables an attacker to delete critical files. This issue affects Avid NEXIS E-series: before 2025.5.1; Avid NEXIS F-series: before 2025.5.1; Avid NEXIS PRO+: before 2025.5.1; System Director Appliance (SDA+): before 2025.5.1.CVSS4.0: 7.1 - HIGH0 1Exploitation: noneAutomatable: noTechnical Impact: partialAuthenticated Arbitrary File Deletion affecting Avid NEXISgithub
CVE-2025-7596Tenda - FH1205A vulnerability was found in Tenda FH1205 2.0.0.7(775). It has been rated as critical. This issue affects the function formWifiExtraSet of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.Eine Schwachstelle wurde in Tenda FH1205 2.0.0.7(775) ausgemacht. Sie wurde als kritisch eingestuft. Davon betroffen ist die Funktion formWifiExtraSet der Datei /goform/WifiExtraSet. Dank Manipulation des Arguments wpapsk_crypto mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.CVSS4.0: 8.7 - HIGH CVSS3.1: 8.8 - HIGH0 1 2 3 4 5Exploitation: pocAutomatable: noTechnical Impact: totalTenda FH1205 WifiExtraSet formWifiExtraSet stack-based overflowgithub
This post is licensed under CC BY 4.0 by the author.