Red Hot Cyber
La cybersecurity è condivisione. Riconosci il rischio, combattilo, condividi le tue esperienze ed incentiva gli altri a fare meglio di te.
Cerca

Lista delle CVE più critiche emesse negli ultimi 3 giorni

Di seguito sono riportate le vulnerabilità critiche pubblicate negli ultimi giorni dal National Vulnerability Database degli Stati Uniti d'America. Se la vostra infrastruttura utilizza questi prodotti, è fondamentale prestare la massima attenzione per prevenire possibili sfruttamenti da parte di malintenzionati che potrebbero compromettere la sicurezza dei vostri sistemi.

📅 2025-07-22

🔧 Unknown

CVE-2012-10020 (score: 9.8, severity: CRITICAL)
The FoxyPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the uploadify.php file in versions up to, and including, 0.4.2.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
Source Identifier: [email protected]
Pubblicato il: 22/07/2025 02:15:22
Ultima modifica: 22/07/2025 02:15:22
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2012-10020

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2015-10137 (score: 9.8, severity: CRITICAL)
The Website Contact Form With File Upload plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'upload_file()' function in versions up to, and including, 1.3.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
Source Identifier: [email protected]
Pubblicato il: 22/07/2025 02:15:22
Ultima modifica: 22/07/2025 02:15:22
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2015-10137

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:

📅 2025-07-21

🔧 Unknown

CVE-2025-54122 (score: 10, severity: CRITICAL)
Manager-io/Manager is accounting software. A critical unauthenticated full read Server-Side Request Forgery (SSRF) vulnerability has been identified in the proxy handler component of both manager Desktop and Server edition versions up to and including 25.7.18.2519. This vulnerability allows an unauthenticated attacker to bypass network isolation and access restrictions, potentially enabling access to internal services, cloud metadata endpoints, and exfiltration of sensitive data from isolated network segments. This vulnerability is fixed in version 25.7.21.2525.
Source Identifier: [email protected]
Pubblicato il: 21/07/2025 21:15:26
Ultima modifica: 21/07/2025 21:15:26
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-54122

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: CHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 6
Fonti:
CVE-2020-26799 (score: 9.8, severity: CRITICAL)
A reflected cross-site scripting (XSS) vulnerability was discovered in index.php on Luxcal 4.5.2 which allows an unauthenticated attacker to steal other users' data.
Source Identifier: [email protected]
Pubblicato il: 21/07/2025 19:15:28
Ultima modifica: 21/07/2025 19:15:28
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2020-26799

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-36846 (score: 9.8, severity: CRITICAL)
An issue was discovered in Eveo URVE Web Manager 27.02.2025. The application exposes a /_internal/pc/vpro.php localhost endpoint to unauthenticated users that is vulnerable to OS Command Injection. The endpoint takes an input parameter that is passed directly into the shell_exec() function of PHP. NOTE: this can be chained with CVE-2025-36845.
Source Identifier: [email protected]
Pubblicato il: 21/07/2025 18:15:27
Ultima modifica: 21/07/2025 19:15:29
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-36846

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-6704 (score: 9.8, severity: CRITICAL)
An arbitrary file writing vulnerability in the Secure PDF eXchange (SPX) feature of Sophos Firewall versions older than 21.0 MR2 (21.0.2) can lead to pre-auth remote code execution, if a specific configuration of SPX is enabled in combination with the firewall running in High Availability (HA) mode.
Source Identifier: [email protected]
Pubblicato il: 21/07/2025 14:15:30
Ultima modifica: 21/07/2025 14:15:30
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-6704

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-7624 (score: 9.8, severity: CRITICAL)
An SQL injection vulnerability in the legacy (transparent) SMTP proxy of Sophos Firewall versions older than 21.0 MR2 (21.0.2) can lead to remote code execution, if a quarantining policy is active for Email and SFOS was upgraded from a version older than 21.0 GA.
Source Identifier: [email protected]
Pubblicato il: 21/07/2025 14:15:30
Ultima modifica: 21/07/2025 14:15:30
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7624

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-7921 (score: 9.8, severity: CRITICAL)
Certain modem models developed by Askey has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to control the program's execution flow and potentially execute arbitrary code.
Source Identifier: [email protected]
Pubblicato il: 21/07/2025 07:15:25
Ultima modifica: 21/07/2025 07:15:25
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7921

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-7343 (score: 9.8, severity: CRITICAL)
The SFT developed by Digiwin has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
Source Identifier: [email protected]
Pubblicato il: 21/07/2025 07:15:24
Ultima modifica: 21/07/2025 07:15:24
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7343

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-7918 (score: 9.8, severity: CRITICAL)
WinMatrix3 Web package developed by Simopro Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
Source Identifier: [email protected]
Pubblicato il: 21/07/2025 06:15:29
Ultima modifica: 21/07/2025 07:15:24
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7918

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-7916 (score: 9.8, severity: CRITICAL)
WinMatrix3 developed by Simopro Technology has an Insecure Deserialization vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server by sending maliciously crafted serialized contents.
Source Identifier: [email protected]
Pubblicato il: 21/07/2025 06:15:27
Ultima modifica: 21/07/2025 06:15:27
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7916

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:

📅 2025-07-20

🔧 microsoft

CVE-2025-53770 (score: 9.8, severity: CRITICAL)
Deserialization of untrusted data in on-premises Microsoft SharePoint Server allows an unauthorized attacker to execute code over a network. Microsoft is aware that an exploit for CVE-2025-53770 exists in the wild. Microsoft is preparing and fully testing a comprehensive update to address this vulnerability. In the meantime, please make sure that the mitigation provided in this CVE documentation is in place so that you are protected from exploitation.
Source Identifier: [email protected]
Pubblicato il: 20/07/2025 01:15:30
Ultima modifica: 22/07/2025 03:15:27
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-53770

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:

📅 2025-07-19

🔧 Unknown

CVE-2015-10138 (score: 9.8, severity: CRITICAL)
The Work The Flow File Upload plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the jQuery-File-Upload-9.5.0 server and test files in versions up to, and including, 2.5.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
Source Identifier: [email protected]
Pubblicato il: 19/07/2025 12:15:34
Ultima modifica: 19/07/2025 12:15:34
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2015-10138

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2015-10135 (score: 9.8, severity: CRITICAL)
The WPshop 2 – E-Commerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajaxUpload function in versions before 1.3.9.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
Source Identifier: [email protected]
Pubblicato il: 19/07/2025 10:15:23
Ultima modifica: 19/07/2025 10:15:23
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2015-10135

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2016-15043 (score: 9.8, severity: CRITICAL)
The WP Mobile Detector plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in resize.php file in versions up to, and including, 3.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
Source Identifier: [email protected]
Pubblicato il: 19/07/2025 10:15:23
Ultima modifica: 19/07/2025 10:15:23
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2016-15043

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2012-10019 (score: 9.8, severity: CRITICAL)
The Front End Editor plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation via the upload.php file in versions before 2.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
Source Identifier: [email protected]
Pubblicato il: 19/07/2025 10:15:22
Ultima modifica: 19/07/2025 10:15:22
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2012-10019

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-7696 (score: 9.8, severity: CRITICAL)
The Integration for Pipedrive and Contact Form 7, WPForms, Elementor, Ninja Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.2.3 via deserialization of untrusted input within the verify_field_val() function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file is deleted.
Source Identifier: [email protected]
Pubblicato il: 19/07/2025 05:15:22
Ultima modifica: 19/07/2025 05:15:22
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7696

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti:
CVE-2025-7697 (score: 9.8, severity: CRITICAL)
The Integration for Google Sheets and Contact Form 7, WPForms, Elementor, Ninja Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.1.1 via deserialization of untrusted input within the verify_field_val() function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file is deleted.
Source Identifier: [email protected]
Pubblicato il: 19/07/2025 05:15:22
Ultima modifica: 19/07/2025 05:15:22
NIST Source:https://nvd.nist.gov/vuln/detail/CVE-2025-7697

Metriche CVSS v3.1

  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Base Severity: CRITICAL
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • User Interaction: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploitability Score: 3.9
  • Impact Score: 5.9
Fonti: