Lucene search

K

Countdown, Coming Soon, Maintenance – Countdown & Clock Security Vulnerabilities

redhatcve
redhatcve

CVE-2024-27919

A vulnerability was found in how Envoy Proxy implements the oghttp codec. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which...

7.5CVSS

6.9AI Score

0.0004EPSS

2024-04-03 07:27 PM
8
redhatcve
redhatcve

CVE-2024-27316

A vulnerability was found in how Apache httpd implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers,...

7.5CVSS

7.2AI Score

0.005EPSS

2024-04-03 07:27 PM
24
redhatcve
redhatcve

CVE-2024-2653

A vulnerability was found in how amphp implements the HTTP/2 protocol. There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which...

6.9AI Score

0.0004EPSS

2024-04-03 07:26 PM
13
cve
cve

CVE-2024-26711

In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad4130: zero-initialize clock init data The clk_init_data struct does not have all its members initialized, causing issues when trying to expose the internal clock on the CLK pin. Fix this by zero-initializing the...

6.7AI Score

0.0004EPSS

2024-04-03 03:15 PM
37
nvd
nvd

CVE-2024-26711

In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad4130: zero-initialize clock init data The clk_init_data struct does not have all its members initialized, causing issues when trying to expose the internal clock on the CLK pin. Fix this by zero-initializing the...

6.5AI Score

0.0004EPSS

2024-04-03 03:15 PM
debiancve
debiancve

CVE-2024-26711

In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad4130: zero-initialize clock init data The clk_init_data struct does not have all its members initialized, causing issues when trying to expose the internal clock on the CLK pin. Fix this by zero-initializing the...

7.1AI Score

0.0004EPSS

2024-04-03 03:15 PM
7
cvelist
cvelist

CVE-2024-26711 iio: adc: ad4130: zero-initialize clock init data

In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad4130: zero-initialize clock init data The clk_init_data struct does not have all its members initialized, causing issues when trying to expose the internal clock on the CLK pin. Fix this by zero-initializing the...

6.7AI Score

0.0004EPSS

2024-04-03 02:55 PM
2
github
github

Voilà Local file inclusion

Impact Any deployment of voilà dashboard allow local file inclusion, that is to say any file on a filesystem that is readable by the user that runs the voilà dashboard server can be downloaded by someone with network access to the server. Whether this still requires authentication depends on how...

7.5CVSS

7.1AI Score

0.0004EPSS

2024-04-03 02:13 PM
11
osv
osv

Voilà Local file inclusion

Impact Any deployment of voilà dashboard allow local file inclusion, that is to say any file on a filesystem that is readable by the user that runs the voilà dashboard server can be downloaded by someone with network access to the server. Whether this still requires authentication depends on how...

7.5CVSS

7.1AI Score

0.0004EPSS

2024-04-03 02:13 PM
2
krebs
krebs

‘The Manipulaters’ Improve Phishing, Still Fail at Opsec

Roughly nine years ago, KrebsOnSecurity profiled a Pakistan-based cybercrime group called "The Manipulaters," a sprawling web hosting network of phishing and spam delivery platforms. In January 2024, The Manipulaters pleaded with this author to unpublish previous stories about their work, claiming....

7.3AI Score

2024-04-03 01:16 PM
11
ubuntucve
ubuntucve

CVE-2024-26711

In the Linux kernel, the following vulnerability has been resolved: iio: adc: ad4130: zero-initialize clock init data The clk_init_data struct does not have all its members initialized, causing issues when trying to expose the internal clock on the CLK pin. Fix this by zero-initializing the...

6.6AI Score

0.0004EPSS

2024-04-03 12:00 AM
7
wpvulndb
wpvulndb

CGC Maintenance Mode <= 1.2 - Sensitive Information Exposure

Description The CGC Maintenance Mode plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2 via the REST API. This makes it possible for unauthenticated attackers to view protected posts via REST API even when maintenance mode is...

5.3CVSS

7AI Score

0.0004EPSS

2024-04-03 12:00 AM
6
spring
spring

This Week in Spring - April 2nd, 2024

Welcome, welcome, welcome, to another installment of This Week in Spring! You know, we've come a long way since you and I last spoke. It's April already! A new month! How bizarre. And, with the dawning of a new month, we're also more than 25% through this year! I sure hope you're paying attention.....

7.1AI Score

2024-04-03 12:00 AM
6
wpvulndb
wpvulndb

Landing Page Builder < 1.5.1.8 - Authenticated (Editor+) Stored Cross-Site Scripting

Description The Landing Page Builder – Coming Soon page, Maintenance Mode, Lead Page, WordPress Landing Pages plugin for WordPress is vulnerable to Stored Cross-Site Scripting via settings in all versions up to, and including, 1.5.1.7 due to insufficient input sanitization and output escaping....

5.9CVSS

5.8AI Score

0.0004EPSS

2024-04-03 12:00 AM
12
wpvulndb
wpvulndb

CGC Maintenance Mode <= 1.2 - IP Spoofing

Description The CGC Maintenance Mode plugin for WordPress is vulnerable to IP Address Spoofing in all versions up to, and including, 1.2 due to insufficient IP address validation. This makes it possible for unauthenticated attackers to spoof their IP address and bypass...

3.7CVSS

6.7AI Score

0.0004EPSS

2024-04-03 12:00 AM
7
redhatcve
redhatcve

CVE-2024-26660

A vulnerability was found in the DRM/AMD/Display module of the Linux Kernel. An out-of-bounds access exists in the 'stream_enc_regs' array within DCN301, while accessing the array with 'eng_id,’ could lead to an out-of-bounds access beyond its four-element size, which can cause a system crash....

7.3AI Score

0.0004EPSS

2024-04-02 11:40 PM
8
redhatcve
redhatcve

CVE-2024-26658

A vulnerability was found in the bcachefs Linux kernel module which allows to a circular locking dependency, triggering a deadlock scenario during snapshot creation operations. This occurred due to the unconditional acquisition of s_umount in __bch2_ioctl_subvolume_create(), conflicting with...

6.2AI Score

0.0004EPSS

2024-04-02 11:40 PM
5
redhatcve
redhatcve

CVE-2023-52630

A vulnerability was found in the blk-iocost module of Linux Kernel, where a shift-out-of-bounds warning due to discrepancies in timestamp handling during CPU transitions in iocg_kick_delay(), occurred when called from a different CPU, @now could be earlier than @iocg-&gt;delay_at, triggering an...

7.6AI Score

0.0004EPSS

2024-04-02 11:40 PM
6
wordfence
wordfence

$5,500 Bounty Awarded for Unauthenticated SQL Injection Vulnerability Patched in LayerSlider WordPress Plugin

On March 25th, 2024, during our second Bug Bounty Extravaganza, we received a submission for an unauthenticated SQL Injection vulnerability in LayerSlider, a WordPress plugin with more than 1,000,000 estimated active installations. This vulnerability can be leveraged to extract sensitive data from....

7.5CVSS

9.9AI Score

0.004EPSS

2024-04-02 03:15 PM
16
talosblog
talosblog

Adversaries are leveraging remote access tools now more than ever — here’s how to stop them

Remote system management/desktop access tools such as AnyDesk and TeamViewer have grown in popularity since 2020. While there are many legitimate uses for this software, adversaries are also finding ways to use them for command and control in their campaigns. There is no easy way to effectively...

7.3AI Score

2024-04-02 12:00 PM
8
thn
thn

China-linked Hackers Deploy New 'UNAPIMON' Malware for Stealthy Operations

A threat activity cluster tracked as Earth Freybug has been observed using a new malware called UNAPIMON to fly under the radar. "Earth Freybug is a cyberthreat group that has been active since at least 2012 that focuses on espionage and financially motivated activities," Trend Micro security...

7.8AI Score

2024-04-02 11:00 AM
35
cve
cve

CVE-2024-2745

Rapid7's InsightVM maintenance mode login page suffers from a sensitive information exposure vulnerability whereby, sensitive information is exposed through query strings in the URL when login is attempted before the page is fully loaded. This vulnerability allows attackers to acquire sensitive...

3.3CVSS

6.3AI Score

0.0004EPSS

2024-04-02 10:15 AM
35
nvd
nvd

CVE-2024-2745

Rapid7's InsightVM maintenance mode login page suffers from a sensitive information exposure vulnerability whereby, sensitive information is exposed through query strings in the URL when login is attempted before the page is fully loaded. This vulnerability allows attackers to acquire sensitive...

3.3CVSS

3.6AI Score

0.0004EPSS

2024-04-02 10:15 AM
4
ibm
ibm

Security Bulletin: Information disclosure vulnerability affect IBM Business Automation Workflow - CVE-2023-50959

Summary IBM Business Automation Workflow is vulnerable to an information disclosure attack. Vulnerability Details ** CVEID: CVE-2023-50959 DESCRIPTION: **IBM Business Automation Workflow may allow end users to query more documents than expected from a connected Enterprise Content Management...

6.5CVSS

9.2AI Score

0.0005EPSS

2024-04-02 10:15 AM
17
cvelist
cvelist

CVE-2024-2745 Rapid7 InsightVM Sensitive Information Exposure via URL

Rapid7's InsightVM maintenance mode login page suffers from a sensitive information exposure vulnerability whereby, sensitive information is exposed through query strings in the URL when login is attempted before the page is fully loaded. This vulnerability allows attackers to acquire sensitive...

3.3CVSS

4AI Score

0.0004EPSS

2024-04-02 09:51 AM
ibm
ibm

Security Bulletin: Incorrect authorization vulnerability affect IBM Business Automation Workflow - CVE-2023-47716

Summary IBM Business Automation Workflow embedded doucment managaement system is vulnerable to incorrect authorization an attack. Vulnerability Details ** CVEID: CVE-2023-47716 DESCRIPTION: **IBM CP4BA - Filenet Content Manager Component 5.5.8.0, 5.5.10.0, and 5.5.11.0 could allow a user to gain...

6.3CVSS

6.6AI Score

0.0004EPSS

2024-04-02 06:51 AM
7
ibm
ibm

Security Bulletin: Cross-Site scripting vulnerability in ESAPI may affect IBM Business Automation Workflow - IBM X-Force ID: 273485

Summary IBM Business Automation Workflow is vulnerable to a Cross-Site scripting attack. Vulnerability Details ** IBM X-Force ID: 273485 DESCRIPTION: **Enterprise Security API for Java is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the...

6.8AI Score

2024-04-02 06:49 AM
11
ibm
ibm

Security Bulletin: Vulnerability in PostCSS affects IBM Business Automation Workflow - CVE-2023-44270

Summary IBM Business Automation Workflow is depends on a vulnerable version of PostCSS. Vulnerability Details ** CVEID: CVE-2023-44270 DESCRIPTION: **PostCSS could allow a remote attacker to bypass security restrictions, caused by improper input validaiton. By using a specially crafted external...

5.3CVSS

9.4AI Score

0.001EPSS

2024-04-02 06:43 AM
7
nvd
nvd

CVE-2024-3165

System-&gt;Maintenance-&gt; Log Files in dotCMS dashboard is providing the username/password for database connections in the log output. Nevertheless, this is a moderate issue as it requires a backend admin as well as that dbs are locked down by environment. OWASP Top 10 - A05) Insecure Design OWAS...

4.5CVSS

4.7AI Score

0.0004EPSS

2024-04-01 10:15 PM
cve
cve

CVE-2024-3165

System-&gt;Maintenance-&gt; Log Files in dotCMS dashboard is providing the username/password for database connections in the log output. Nevertheless, this is a moderate issue as it requires a backend admin as well as that dbs are locked down by environment. OWASP Top 10 - A05) Insecure Design OWAS...

4.5CVSS

6.8AI Score

0.0004EPSS

2024-04-01 10:15 PM
22
nvd
nvd

CVE-2024-3164

In dotCMS dashboard, the Tools and Log Files tabs under System → Maintenance Portlet, which is and always has been an Admin portlet, is accessible to anyone with that portlet and not just to CMS Admins. Users that get site admin but not a system admin, should not have access to the System...

4.5CVSS

4.7AI Score

0.0004EPSS

2024-04-01 10:15 PM
cve
cve

CVE-2024-3164

In dotCMS dashboard, the Tools and Log Files tabs under System → Maintenance Portlet, which is and always has been an Admin portlet, is accessible to anyone with that portlet and not just to CMS Admins. Users that get site admin but not a system admin, should not have access to the System...

4.5CVSS

6.8AI Score

0.0004EPSS

2024-04-01 10:15 PM
25
cvelist
cvelist

CVE-2024-3165 Database Credential Exposure in the Logs

System-&gt;Maintenance-&gt; Log Files in dotCMS dashboard is providing the username/password for database connections in the log output. Nevertheless, this is a moderate issue as it requires a backend admin as well as that dbs are locked down by environment. OWASP Top 10 - A05) Insecure Design OWAS...

4.5CVSS

5.1AI Score

0.0004EPSS

2024-04-01 09:38 PM
cvelist
cvelist

CVE-2024-3164

In dotCMS dashboard, the Tools and Log Files tabs under System → Maintenance Portlet, which is and always has been an Admin portlet, is accessible to anyone with that portlet and not just to CMS Admins. Users that get site admin but not a system admin, should not have access to the System...

4.5CVSS

5.1AI Score

0.0004EPSS

2024-04-01 09:27 PM
redhatcve
redhatcve

CVE-2024-26655

A vulnerability was found in the posix_clock_open() function of Linux Kernel, where failure of the clk ops.open() function initialize a clock results in a memory leak, when the allocated resources, such as pccontext were not properly released upon encountering errors during clock initialization,...

7.3AI Score

0.0004EPSS

2024-04-01 07:25 PM
7
cve
cve

CVE-2024-26655

In the Linux kernel, the following vulnerability has been resolved: Fix memory leak in posix_clock_open() If the clk ops.open() function returns an error, we don't release the pccontext we allocated for this clock. Re-organize the code slightly to make it all more...

6.8AI Score

0.0004EPSS

2024-04-01 03:15 PM
70
nvd
nvd

CVE-2024-26655

In the Linux kernel, the following vulnerability has been resolved: Fix memory leak in posix_clock_open() If the clk ops.open() function returns an error, we don't release the pccontext we allocated for this clock. Re-organize the code slightly to make it all more...

7.4AI Score

0.0004EPSS

2024-04-01 03:15 PM
debiancve
debiancve

CVE-2024-26655

In the Linux kernel, the following vulnerability has been resolved: Fix memory leak in posix_clock_open() If the clk ops.open() function returns an error, we don't release the pccontext we allocated for this clock. Re-organize the code slightly to make it all more...

6.8AI Score

0.0004EPSS

2024-04-01 03:15 PM
7
cvelist
cvelist

CVE-2024-26655 Fix memory leak in posix_clock_open()

In the Linux kernel, the following vulnerability has been resolved: Fix memory leak in posix_clock_open() If the clk ops.open() function returns an error, we don't release the pccontext we allocated for this clock. Re-organize the code slightly to make it all more...

6.9AI Score

0.0004EPSS

2024-04-01 02:58 PM
thn
thn

Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals

Several malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other threat actors have been observed on the Google Play Store. The findings come from HUMAN's Satori Threat Intelligence team, which said the cluster of VPN apps came fitted....

7AI Score

2024-04-01 10:10 AM
28
redhatcve
redhatcve

CVE-2024-26654

A vulnerability was found in the ALSA sh driver of Linux Kernel, when the snd_pcm_substream closes and deallocates aica_channel, which can still be accessed by the spu_dma_work scheduled by dreamcastcard-&gt;timer and del_timer() returns directly, allowing the worker thread to be rescheduled during...

6.8AI Score

0.0004EPSS

2024-04-01 09:26 AM
11
redhatcve
redhatcve

CVE-2024-26653

A vulnerability was found in the USB misc/ljca driver for Linux kernel resulted in a double free occurred during error handling when an auxiliary_device_add() encountered an error and invoked auxiliary_device_uninit(), the function ljca_auxdev_release erroneously called kfree() on...

7.2AI Score

0.0004EPSS

2024-04-01 09:26 AM
13
schneier
schneier

Ross Anderson

Ross Anderson unexpectedly passed away Thursday night in, I believe, his home in Cambridge. I can't remember when I first met Ross. Of course it was before 2008, when we created the Security and Human Behavior workshop. It was well before 2001, when we created the Workshop on Economics and...

7.2AI Score

2024-04-01 12:21 AM
8
nessus
nessus

Amazon Linux 2 : kernel (ALASKERNEL-5.10-2024-053)

The version of kernel installed on the remote host is prior to 5.10.210-201.852. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2KERNEL-5.10-2024-053 advisory. 2024-06-06: CVE-2023-52489 was added to this advisory. 2024-06-06: CVE-2023-52498 was added to this...

7.8CVSS

7.8AI Score

0.0004EPSS

2024-04-01 12:00 AM
22
ubuntucve
ubuntucve

CVE-2024-26655

In the Linux kernel, the following vulnerability has been resolved: Fix memory leak in posix_clock_open() If the clk ops.open() function returns an error, we don't release the pccontext we allocated for this clock. Re-organize the code slightly to make it all more...

6.8AI Score

0.0004EPSS

2024-04-01 12:00 AM
7
kitploit
kitploit

R2Frida - Radare2 And Frida Better Together

This is a self-contained plugin for radare2 that allows to instrument remote processes using frida. The radare project brings a complete toolchain for reverse engineering, providing well maintained functionalities and extend its features with other programming languages and tools. Frida is a...

7.4AI Score

2024-03-30 11:30 AM
12
malwarebytes
malwarebytes

MFA bombing taken to the next level

Simply put, MFA bombing (also known as “push bombing” or “MFA fatigue”) is a brute force attack on your patience. Cybercriminals use MFA bombing to break into accounts that are protected by multi-factor authentication (MFA). MFA normally requires a user to enter a six-digit code sent by SMS, or...

7.4AI Score

2024-03-29 04:45 PM
11
redhatcve
redhatcve

CVE-2023-52629

A vulnerability was found in the push-switch driver of Linux Kernel due to improper cleanup sequence in switch_drv_remove(). Originally, flush_work() was placed before timer_shutdown_sync(), allowing the worker to potentially be rescheduled in switch_timer() and causing a use-after-free bug....

6.4AI Score

0.0004EPSS

2024-03-29 03:50 PM
10
nvd
nvd

CVE-2024-29202

JumpServer is an open source bastion host and an operation and maintenance security audit system. Attackers can exploit a Jinja2 template injection vulnerability in JumpServer's Ansible to execute arbitrary code within the Celery container. Since the Celery container runs with root privileges and.....

9.9CVSS

9.5AI Score

0.0004EPSS

2024-03-29 03:15 PM
Total number of security vulnerabilities38166