Weekly Vulnerabilities Reports > February 3 to 9, 2025
Overview
213 new vulnerabilities reported during this period, including 19 critical vulnerabilities and 77 high severity vulnerabilities. This weekly summary report vulnerabilities in 397 products from 43 vendors including Qualcomm, Samsung, Mozilla, IBM, and Huawei. Vulnerabilities are notably categorized as "Cross-site Scripting", "Out-of-bounds Write", "Out-of-bounds Read", "Use After Free", and "Improper Validation of Array Index".
- 151 reported vulnerabilities are remotely exploitables.
- 63 reported vulnerabilities are related to weaknesses in OWASP Top Ten.
- 102 reported vulnerabilities are exploitable by an anonymous user.
- Qualcomm has the most reported vulnerabilities, with 24 reported vulnerabilities.
- Mozilla has the most reported critical vulnerabilities, with 4 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
19 Critical Vulnerabilities
77 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2025-02-07 | CVE-2024-7419 | Soflyy | Code Injection vulnerability in Soflyy WP ALL Export 1.7.9/1.8.6 The WP ALL Export Pro plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.9.1 via the custom export fields. | 8.8 |
2025-02-06 | CVE-2025-21177 | Microsoft | Server-Side Request Forgery (SSRF) vulnerability in Microsoft Dynamics 365 Sales Server-Side Request Forgery (SSRF) in Microsoft Dynamics 365 Sales allows an authorized attacker to elevate privileges over a network. | 8.8 |
2025-02-06 | CVE-2025-21279 | Microsoft | Unspecified vulnerability in Microsoft Edge Chromium Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.8 |
2025-02-06 | CVE-2025-21283 | Microsoft | Unspecified vulnerability in Microsoft Edge Chromium Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.8 |
2025-02-06 | CVE-2025-21342 | Microsoft | Unspecified vulnerability in Microsoft Edge Chromium Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.8 |
2025-02-06 | CVE-2025-21408 | Microsoft | Unspecified vulnerability in Microsoft Edge Chromium Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 8.8 |
2025-02-06 | CVE-2024-57668 | Fabianros | Unrestricted Upload of File with Dangerous Type vulnerability in Fabianros Shopping Portal 1.0 In Code-projects Shopping Portal v1.0, the insert-product.php page has an arbitrary file upload vulnerability. | 8.8 |
2025-02-06 | CVE-2025-0994 | Trimble | Unspecified vulnerability in Trimble Cityworks Trimble Cityworks versions prior to 15.8.9 and Cityworks with office companion versions prior to 23.10 are vulnerable to a deserialization vulnerability. | 8.8 |
2025-02-04 | CVE-2025-25039 | Arubanetworks | Unspecified vulnerability in Arubanetworks Clearpass Policy Manager A vulnerability in the web-based management interface of HPE Aruba Networking ClearPass Policy Manager (CPPM) allows remote authenticated users to run arbitrary commands on the underlying host. | 8.8 |
2025-02-04 | CVE-2025-1010 | Mozilla | Use After Free vulnerability in Mozilla Firefox An attacker could have caused a use-after-free via the Custom Highlight API, leading to a potentially exploitable crash. | 8.8 |
2025-02-04 | CVE-2025-1011 | Mozilla | Unspecified vulnerability in Mozilla Firefox A bug in WebAssembly code generation could have lead to a crash. | 8.8 |
2025-02-04 | CVE-2025-1014 | Mozilla | Improper Certificate Validation vulnerability in Mozilla Firefox Certificate length was not properly checked when added to a certificate store. | 8.8 |
2025-02-04 | CVE-2024-40890 | Zyxel | OS Command Injection vulnerability in Zyxel products **UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the CGI program of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device by sending a crafted HTTP POST request. | 8.8 |
2025-02-04 | CVE-2024-40891 | Zyxel | OS Command Injection vulnerability in Zyxel products **UNSUPPORTED WHEN ASSIGNED** A post-authentication command injection vulnerability in the management commands of the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an authenticated attacker to execute operating system (OS) commands on an affected device via Telnet. | 8.8 |
2025-02-03 | CVE-2025-24901 | Wegia | SQL Injection vulnerability in Wegia WeGIA is a Web Manager for Charitable Institutions. | 8.8 |
2025-02-03 | CVE-2025-24902 | Wegia | SQL Injection vulnerability in Wegia WeGIA is a Web Manager for Charitable Institutions. | 8.8 |
2025-02-03 | CVE-2025-24958 | Wegia | SQL Injection vulnerability in Wegia WeGIA is a Web Manager for Charitable Institutions. | 8.8 |
2025-02-03 | CVE-2024-12859 | The BoomBox Theme Extensions plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.8.0 via the 'boombox_listing' shortcode 'type' attribute. | 8.8 | |
2025-02-03 | CVE-2024-57968 | Advantive | Unrestricted Upload of File with Dangerous Type vulnerability in Advantive Veracore Advantive VeraCore before 2024.4.2.1 allows remote authenticated users to upload files to unintended folders (e.g., ones that are accessible during web browsing by other users). | 8.8 |
2025-02-03 | CVE-2025-20633 | Mediatek | Out-of-bounds Write vulnerability in Mediatek Software Development KIT In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. | 8.8 |
2025-02-09 | CVE-2024-13440 | Superstorefinder | Unspecified vulnerability in Superstorefinder Super Store Finder The Super Store Finder plugin for WordPress is vulnerable to SQL Injection via the ‘ssf_wp_user_name’ parameter in all versions up to, and including, 7.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. | 8.2 |
2025-02-05 | CVE-2025-1028 | The Contact Manager plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the contact form upload feature in all versions up to, and including, 8.6.4. | 8.1 | |
2025-02-04 | CVE-2025-23058 | Arubanetworks | Unspecified vulnerability in Arubanetworks Clearpass Policy Manager A vulnerability in the ClearPass Policy Manager web-based management interface allows a low-privileged (read-only) authenticated remote attacker to gain unauthorized access to data and the ability to execute functions that should be restricted to administrators only with read/write privileges. | 8.1 |
2025-02-04 | CVE-2025-23060 | Arubanetworks | Unspecified vulnerability in Arubanetworks Clearpass Policy Manager A vulnerability in HPE Aruba Networking ClearPass Policy Manager may, under certain circumstances, expose sensitive unencrypted information. | 8.1 |
2025-02-07 | CVE-2025-0303 | Openatom | Classic Buffer Overflow vulnerability in Openatom Openharmony 4.1.0/4.1.1 in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow. | 7.8 |
2025-02-07 | CVE-2025-0304 | Openatom | Use After Free vulnerability in Openatom Openharmony 4.1.0/4.1.1 in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free. | 7.8 |
2025-02-06 | CVE-2024-49814 | IBM Security Verify Access Appliance 10.0.0 through 10.0.3 could allow a locally authenticated user to increase their privileges due to execution with unnecessary privileges. | 7.8 | |
2025-02-04 | CVE-2025-20881 | Samsung | Out-of-bounds Write vulnerability in Samsung Android 12.0/13.0/14.0 Out-of-bounds write in accessing buffer storing the decoded video frames in libsthmbc.so prior to SMR Jan-2025 Release 1 allows local attackers to execute arbitrary code with privilege. | 7.8 |
2025-02-04 | CVE-2025-20882 | Samsung | Out-of-bounds Write vulnerability in Samsung Android 12.0/13.0/14.0 Out-of-bounds write in accessing uninitialized memory for svc1td in libsthmbc.so prior to SMR Jan-2025 Release 1 allows local attackers to execute arbitrary code with privilege. | 7.8 |
2025-02-04 | CVE-2025-20888 | Samsung | Out-of-bounds Write vulnerability in Samsung Android 12.0/13.0/14.0 Out-of-bounds write in handling the block size for smp4vtd in libsthmbc.so prior to SMR Jan-2025 Release 1 allows local attackers to execute arbitrary code with privilege. | 7.8 |
2025-02-04 | CVE-2025-20890 | Samsung | Out-of-bounds Write vulnerability in Samsung Android 12.0/13.0/14.0 Out-of-bounds write in decoding frame buffer in libsthmbc.so prior to SMR Jan-2025 Release 1 allows local attackers to execute arbitrary code with privilege. | 7.8 |
2025-02-03 | CVE-2024-38411 | Qualcomm | Use After Free vulnerability in Qualcomm products Memory corruption while registering a buffer from user-space to kernel-space using IOCTL calls. | 7.8 |
2025-02-03 | CVE-2024-38412 | Qualcomm | Use After Free vulnerability in Qualcomm products Memory corruption while invoking IOCTL calls from user-space to kernel-space to handle session errors. | 7.8 |
2025-02-03 | CVE-2024-38413 | Qualcomm | Out-of-bounds Write vulnerability in Qualcomm products Memory corruption while processing frame packets. | 7.8 |
2025-02-03 | CVE-2024-38420 | Qualcomm | Out-of-bounds Write vulnerability in Qualcomm products Memory corruption while configuring a Hypervisor based input virtual device. | 7.8 |
2025-02-03 | CVE-2024-45561 | Qualcomm | Use After Free vulnerability in Qualcomm products Memory corruption while handling IOCTL call from user-space to set latency level. | 7.8 |
2025-02-03 | CVE-2024-45571 | Qualcomm | Use After Free vulnerability in Qualcomm products Memory corruption may occour occur when stopping the WLAN interface after processing a WMI command from the interface. | 7.8 |
2025-02-03 | CVE-2024-45573 | Qualcomm | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Qualcomm products Memory corruption may occour while generating test pattern due to negative indexing of display ID. | 7.8 |
2025-02-03 | CVE-2024-45582 | Qualcomm | Improper Validation of Array Index vulnerability in Qualcomm products Memory corruption while validating number of devices in Camera kernel . | 7.8 |
2025-02-03 | CVE-2024-45584 | Qualcomm | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Qualcomm products Memory corruption can occur when a compat IOCTL call is followed by a normal IOCTL call from userspace. | 7.8 |
2025-02-03 | CVE-2024-49832 | Qualcomm | Improper Validation of Array Index vulnerability in Qualcomm products Memory corruption in Camera due to unusually high number of nodes passed to AXI port. | 7.8 |
2025-02-03 | CVE-2024-49833 | Qualcomm | Improper Validation of Array Index vulnerability in Qualcomm products Memory corruption can occur in the camera when an invalid CID is used. | 7.8 |
2025-02-03 | CVE-2024-49834 | Qualcomm | Improper Validation of Array Index vulnerability in Qualcomm products Memory corruption while power-up or power-down sequence of the camera sensor. | 7.8 |
2025-02-03 | CVE-2024-49837 | Qualcomm | Improper Validation of Array Index vulnerability in Qualcomm products Memory corruption while reading CPU state data during guest VM suspend. | 7.8 |
2025-02-03 | CVE-2024-49840 | Qualcomm | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Qualcomm products Memory corruption while Invoking IOCTL calls from user-space to validate FIPS encryption or decryption functionality. | 7.8 |
2025-02-03 | CVE-2024-49843 | Qualcomm | Improper Validation of Array Index vulnerability in Qualcomm products Memory corruption while processing IOCTL from user space to handle GPU AHB bus error. | 7.8 |
2025-02-05 | CVE-2025-20169 | A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. | 7.7 | |
2025-02-05 | CVE-2025-20170 | A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. | 7.7 | |
2025-02-05 | CVE-2025-20174 | A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. | 7.7 | |
2025-02-05 | CVE-2025-20175 | A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device. This vulnerability is due to improper error handling when parsing SNMP requests. | 7.7 | |
2025-02-06 | CVE-2024-12602 | Huawei | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Identity verification vulnerability in the ParamWatcher module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |
2025-02-06 | CVE-2024-57954 | Huawei | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Permission verification vulnerability in the media library module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |
2025-02-06 | CVE-2024-57955 | Huawei | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Arbitrary write vulnerability in the Gallery module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |
2025-02-06 | CVE-2024-57956 | Huawei | Out-of-bounds Read vulnerability in Huawei Harmonyos 5.0.0 Out-of-bounds read vulnerability in the interpreter string module Impact: Successful exploitation of this vulnerability may affect availability. | 7.5 |
2025-02-06 | CVE-2024-57957 | Huawei | Information Exposure Through Log Files vulnerability in Huawei Harmonyos 5.0.0 Vulnerability of improper log information control in the UI framework module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |
2025-02-06 | CVE-2024-57960 | Huawei | Unspecified vulnerability in Huawei Emui and Harmonyos Input verification vulnerability in the ExternalStorageProvider module Impact: Successful exploitation of this vulnerability may affect service confidentiality. | 7.5 |
2025-02-06 | CVE-2024-57962 | Huawei | Unspecified vulnerability in Huawei Harmonyos 5.0.0 Vulnerability of incomplete verification information in the VPN service module Impact: Successful exploitation of this vulnerability may affect availability. | 7.5 |
2025-02-06 | CVE-2024-45626 | Apache | Unspecified vulnerability in Apache James Server Apache James server JMAP HTML to text plain implementation in versions below 3.8.2 and 3.7.6 is subject to unbounded memory consumption that can result in a denial of service. Users are recommended to upgrade to version 3.7.6 and 3.8.2, which fix this issue. | 7.5 |
2025-02-05 | CVE-2024-39564 | This is a similar, but different vulnerability than the issue reported as CVE-2024-39549. A double-free vulnerability in the routing process daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker to send a malformed BGP Path attribute update which allocates memory used to log the bad path attribute. | 7.5 | |
2025-02-04 | CVE-2025-1012 | Mozilla | Use After Free vulnerability in Mozilla Firefox A race during concurrent delazification could have led to a use-after-free. | 7.5 |
2025-02-04 | CVE-2025-22475 | Dell | Use of a Broken or Risky Cryptographic Algorithm vulnerability in Dell Data Domain Operating System Dell PowerProtect DD, versions prior to DDOS 8.3.0.0, 7.10.1.50, and 7.13.1.10 contains a use of a Cryptographic Primitive with a Risky Implementation vulnerability. | 7.5 |
2025-02-03 | CVE-2025-25181 | Advantive | SQL Injection vulnerability in Advantive Veracore A SQL injection vulnerability in timeoutWarning.asp in Advantive VeraCore through 2025.1.0 allows remote attackers to execute arbitrary SQL commands via the PmSess1 parameter. | 7.5 |
2025-02-03 | CVE-2024-38404 | Qualcomm | Out-of-bounds Read vulnerability in Qualcomm products Transient DOS when registration accept OTA is received with incorrect ciphering key data IE in modem. | 7.5 |
2025-02-03 | CVE-2024-49838 | Qualcomm | Out-of-bounds Read vulnerability in Qualcomm products Information disclosure while parsing the OCI IE with invalid length. | 7.5 |
2025-02-03 | CVE-2025-20637 | Mediatek | Improper Check for Unusual or Exceptional Conditions vulnerability in Mediatek Software Development KIT In network HW, there is a possible system hang due to an uncaught exception. | 7.5 |
2025-02-08 | CVE-2025-1117 | A vulnerability, which was classified as critical, was found in CoinRemitter 0.0.1/0.0.2 on OpenCart. | 7.3 | |
2025-02-08 | CVE-2025-1116 | A vulnerability, which was classified as critical, has been found in Dreamvention Live AJAX Search Free up to 1.0.6 on OpenCart. | 7.3 | |
2025-02-07 | CVE-2025-1104 | A vulnerability has been found in D-Link DHP-W310AV 1.04 and classified as critical. | 7.3 | |
2025-02-07 | CVE-2024-7425 | Soflyy | Code Injection vulnerability in Soflyy WP ALL Export 1.7.9/1.8.6 The WP ALL Export Pro plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to improper user input validation and sanitization in all versions up to, and including, 1.9.1. | 7.2 |
2025-02-07 | CVE-2024-9664 | Soflyy | Deserialization of Untrusted Data vulnerability in Soflyy WP ALL Import The WP All Import Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.9.7 via deserialization of untrusted input from an import file. | 7.2 |
2025-02-05 | CVE-2025-20124 | Cisco | Deserialization of Untrusted Data vulnerability in Cisco Identity Services Engine A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker to execute arbitrary commands as the root user on an affected device. This vulnerability is due to insecure deserialization of user-supplied Java byte streams by the affected software. | 7.2 |
2025-02-05 | CVE-2025-20125 | Cisco | Improper Authorization vulnerability in Cisco Identity Services Engine A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker with valid read-only credentials to obtain sensitive information, change node configurations, and restart the node. This vulnerability is due to a lack of authorization in a specific API and improper validation of user-supplied data. | 7.2 |
2025-02-03 | CVE-2025-24605 | Pluginus | Path Traversal vulnerability in Pluginus Wolf - Wordpress Posts Bulk Editor and products Manager Professional Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in realmag777 WOLF allows Path Traversal. | 7.2 |
2025-02-06 | CVE-2024-54171 | IBM EntireX 11.1 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. | 7.1 | |
2025-02-05 | CVE-2024-49352 | IBM Cognos Analytics 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.2.4, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. | 7.1 | |
2025-02-03 | CVE-2024-38418 | Qualcomm | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Qualcomm products Memory corruption while parsing the memory map info in IOCTL calls. | 7.0 |
2025-02-03 | CVE-2024-45560 | Qualcomm | Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Qualcomm products Memory corruption while taking a snapshot with hardware encoder due to unvalidated userspace buffer. | 7.0 |