Lucene search

K

Countdown, Coming Soon, Maintenance – Countdown & Clock Security Vulnerabilities

redhatcve
redhatcve

CVE-2021-47166

A vulnerability was found in the NFS module in the Linux kernel where a memory corruption occurred in pg_bytes_written in the nfs_do_recoalesce() function. The value was updated before successfully flushing requests, potentially leading to incorrect accounting of written bytes. Mitigation Red Hat.....

7.4AI Score

0.0004EPSS

2024-03-25 05:26 PM
2
redhatcve
redhatcve

CVE-2021-47168

A vulnerability was found in the NFS implementation in Linux Kernel causing memory corruption due to an incorrect size limit in filelayout_decode_layout(). Using "sizeof(struct nfs_fh)" instead of NFS_MAXFHSIZE led to buffer overflow by two bytes leads to potential memory corruption. Mitigation...

7.8AI Score

0.0004EPSS

2024-03-25 04:55 PM
3
redhatcve
redhatcve

CVE-2021-47167

A vulnerability was found in the NFS module of the Linux kernel, where a potential system crash (Oops) occurred due to improper handling of the mirror array in __nfs_pageio_add_request(). The nfs_pageio_error_cleanup() function did not correctly reset the mirror array, leading to inconsistencies...

7.3AI Score

0.0004EPSS

2024-03-25 04:55 PM
3
rapid7blog
rapid7blog

Metasploit Framework 6.4 Released

Today, Metasploit is pleased to announce the release of Metasploit Framework 6.4. It has been just over a year since the release of version 6.3 and the team has added many new features and improvements since then. For news reporters, please reach out to [email protected]. Kerberos Improvements...

10CVSS

8.4AI Score

0.976EPSS

2024-03-25 01:33 PM
28
nessus
nessus

SUSE SLES12 Security Update : kernel (SUSE-SU-2024:0976-1)

The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:0976-1 advisory. In the Linux kernel, the following vulnerability has been resolved: i2c: Fix a potential use after free Free the adap structure only after...

7.8CVSS

7.6AI Score

EPSS

2024-03-23 12:00 AM
8
nessus
nessus

SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2024:0925-1)

The remote SUSE Linux SLED12 / SLED_SAP12 / SLES12 / SLES_SAP12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:0925-1 advisory. In the Linux kernel, the following vulnerability has been resolved: i2c: Fix a potential use after free ...

7.8CVSS

7.7AI Score

EPSS

2024-03-23 12:00 AM
10
nessus
nessus

SUSE SLES15 Security Update : kernel (SUSE-SU-2024:0926-1)

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:0926-1 advisory. In the Linux kernel, the following vulnerability has been resolved: i2c: Fix a potential use after free Free the adap...

7.8CVSS

7.4AI Score

EPSS

2024-03-23 12:00 AM
6
nessus
nessus

SUSE SLES15 Security Update : kernel (SUSE-SU-2024:0977-1)

The remote SUSE Linux SLES15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:0977-1 advisory. In the Linux kernel, the following vulnerability has been resolved: i2c: Fix a potential use after free Free the adap structure only after...

7.8CVSS

8.3AI Score

EPSS

2024-03-23 12:00 AM
9
nessus
nessus

SUSE SLES12 Security Update : kernel (SUSE-SU-2024:0975-1)

The remote SUSE Linux SLES12 / SLES_SAP12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:0975-1 advisory. In the Linux kernel, the following vulnerability has been resolved: i2c: Fix a potential use after free Free the adap...

7.8CVSS

8.1AI Score

EPSS

2024-03-23 12:00 AM
4
malwarebytes
malwarebytes

New Go loader pushes Rhadamanthys stealer

Malware loaders (also known as droppers or downloaders) are a popular commodity in the criminal underground. Their primary function is to successfully compromise a machine and deploy one or multiple additional payloads. A good loader avoids detection and identifies victims as legitimate (i.e. not.....

7.1AI Score

2024-03-22 07:23 PM
17
krebs
krebs

Mozilla Drops Onerep After CEO Admits to Running People-Search Networks

The nonprofit organization that supports the Firefox web browser said today it is winding down its new partnership with Onerep, an identity protection service recently bundled with Firefox that offers to remove users from hundreds of people-search sites. The move comes just days after a report by.....

7.1AI Score

2024-03-22 07:02 PM
12
ibm
ibm

Security Bulletin: OpenSSH vulnerability affects IBM WebSphere Adapter for FTP shipped with IBM Business Automation Workflow - CVE-2023-48795

Summary IBM WebSphere Adapter for FTP is shipped with IBM Business Automation Workflow and is vulnerable to a machine-in-the-middle attack. Vulnerability Details ** CVEID: CVE-2023-48795 DESCRIPTION: **OpenSSH is vulnerable to a machine-in-the-middle attack, caused by a flaw in the extension...

5.9CVSS

6.8AI Score

0.963EPSS

2024-03-22 04:29 PM
17
mskb
mskb

January 9, 2024-KB5033920 Cumulative Update for .NET Framework 3.5 and 4.8.1 for Windows 11, version 22H2 and Windows 11, version 23H2

January 9, 2024-KB5033920 Cumulative Update for .NET Framework 3.5 and 4.8.1 for Windows 11, version 22H2 and Windows 11, version 23H2 Release Date: January 9, 2024 Version: .NET Framework 3.5 and 4.8.1 The January 9, 2024 update for Windows 11, version 22H2 and Windows 11, version 23H2 includes...

9.8CVSS

8.8AI Score

0.009EPSS

2024-03-22 07:00 AM
57
mskb
mskb

January 9, 2024-KB5033910 Cumulative Update for .NET Framework 4.8 for Windows 10, version 1607 and Windows Server 2016

January 9, 2024-KB5033910 Cumulative Update for .NET Framework 4.8 for Windows 10, version 1607 and Windows Server 2016 Release Date: January 9, 2024 Version: .NET Framework 4.8 The January 9, 2024 update for Windows 10, version 1607 and Windows Server 2016 includes security and cumulative...

9.8CVSS

9.1AI Score

0.009EPSS

2024-03-22 07:00 AM
139
mskb
mskb

January 9, 2024-KB5033917 Cumulative Update for .NET Framework 3.5 and 4.8.1 for Microsoft server operating system, version 23H2

January 9, 2024-KB5033917 Cumulative Update for .NET Framework 3.5 and 4.8.1 for Microsoft server operating system, version 23H2 Release Date: January 9, 2024 Version: .NET Framework 3.5 and 4.8.1 The January 9, 2024 update for Microsoft server operating system, version 23H2 includes security and.....

9.8CVSS

8.8AI Score

0.009EPSS

2024-03-22 07:00 AM
8
spring
spring

Reflectionless Templates With Spring

A few Java libraries have shown up recently that use text templates, but compile to Java classes at build time. They can thus claim to some extent to be "reflection free". Together with potential benefits of runtime performance, they promise to be easy to use and integrate with GraalVM native...

7.2AI Score

2024-03-22 12:00 AM
12
f5
f5

K000138991 : BIND vulnerability CVE-2023-6516

Security Advisory Description To keep its cache database efficient, named running as a recursive resolver occasionally attempts to clean up the database. It uses several methods, including some that are asynchronous: a small chunk of memory pointing to the cache element that can be cleaned up is...

7.5CVSS

7AI Score

0.001EPSS

2024-03-22 12:00 AM
7
exploitdb

7.4AI Score

2024-03-22 12:00 AM
129
redhatcve
redhatcve

CVE-2024-26643

A vulnerability was found in the netfilter/nf_tables subsystem of Linux Kernel, where a race condition caused where the garbage collector could prematurely collect elements from anonymous sets with timeouts while they were being released. Mitigation Red Hat has investigated whether a possible...

6.8AI Score

0.0004EPSS

2024-03-21 11:04 PM
10
redhatcve
redhatcve

CVE-2023-52620

A vulnerability was found in netfilter/nf_tables componets of Linux Kernel allows an userspace to set timeouts for anonymous sets, which are not intended to be used this way. This could lead to unexpected behaviour or security issues. Mitigation Red Hat has investigated whether a possible...

7.5AI Score

0.0004EPSS

2024-03-21 11:03 PM
16
talosblog
talosblog

“Pig butchering” is an evolution of a social engineering tactic we’ve seen for years

Whether you want to call them "catfishing," "pig butchering" or just good 'old-fashioned "social engineering," romance scams have been around forever. I was first introduced to them through the MTV show "Catfish," but recently they seem to be making headlines as the term "pig butchering" enters...

8.1AI Score

2024-03-21 06:00 PM
13
wordfence
wordfence

Wordfence Intelligence Weekly WordPress Vulnerability Report (March 11, 2024 to March 17, 2024)

Did you know we're running a Bug Bounty Extravaganza again? Earn over 6x our usual bounty rates, up to $10,000, for all vulnerabilities submitted through May 27th, 2024 when you opt to have Wordfence handle responsible disclosure! Last week, there were 163 vulnerabilities disclosed in 126...

10CVSS

10AI Score

0.001EPSS

2024-03-21 03:55 PM
40
ibm
ibm

Security Bulletin: Vulnerability in IBM® SDK, Java™ Technology affects IBM Cloud Pak System [CVE-2022-3676]

Summary Vulnerability in IBM® SDK, Java™ Technology affect Cloud Pak System. Vulnerability Details ** CVEID: CVE-2022-3676 DESCRIPTION: **Eclipse Openj9 could allow a remote attacker to bypass security restrictions, caused by improper runtime type check by the interface calls. By sending a...

6.5CVSS

6.4AI Score

0.001EPSS

2024-03-21 11:56 AM
9
nvd
nvd

CVE-2024-27918

Coder allows oragnizations to provision remote development environments via Terraform. Prior to versions 2.6.1, 2.7.3, and 2.8.4, a vulnerability in Coder's OIDC authentication could allow an attacker to bypass the CODER_OIDC_EMAIL_DOMAIN verification and create an account with an email not in the....

8.2CVSS

8.3AI Score

0.0004EPSS

2024-03-21 02:52 AM
cve
cve

CVE-2024-27918

Coder allows oragnizations to provision remote development environments via Terraform. Prior to versions 2.6.1, 2.7.3, and 2.8.4, a vulnerability in Coder's OIDC authentication could allow an attacker to bypass the CODER_OIDC_EMAIL_DOMAIN verification and create an account with an email not in the....

8.2CVSS

8.2AI Score

0.0004EPSS

2024-03-21 02:52 AM
37
osv
osv

CVE-2024-27918

Coder allows oragnizations to provision remote development environments via Terraform. Prior to versions 2.6.1, 2.7.3, and 2.8.4, a vulnerability in Coder's OIDC authentication could allow an attacker to bypass the CODER_OIDC_EMAIL_DOMAIN verification and create an account with an email not in the....

8.2CVSS

6.9AI Score

0.0004EPSS

2024-03-21 02:52 AM
1
apple
apple

Apple Security Update: iOS 17.4.1 and iPadOS 17.4.1Details coming soon

Apple recommends to install security update iOS 17.4.1 and iPadOS 17.4.1Details coming soon on devices iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later,.....

6.6AI Score

2024-03-21 12:00 AM
5
apple
apple

Apple Security Update: iOS 16.7.7 and iPadOS 16.7.7Details coming soon

Apple recommends to install security update iOS 16.7.7 and iPadOS 16.7.7Details coming soon on devices iPhone 8, iPhone 8 Plus, iPhone X, iPad 5th generation, iPad Pro 9.7-inch, and iPad Pro 12.9-inch 1st...

6.6AI Score

2024-03-21 12:00 AM
3
nessus
nessus

EulerOS Virtualization 2.11.0 : curl (EulerOS-SA-2024-1439)

According to the versions of the curl packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name...

9.8CVSS

7.7AI Score

0.003EPSS

2024-03-21 12:00 AM
5
nessus
nessus

EulerOS Virtualization 2.11.1 : curl (EulerOS-SA-2024-1411)

According to the versions of the curl packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name...

9.8CVSS

7.2AI Score

0.003EPSS

2024-03-21 12:00 AM
9
apple
apple

Apple Security Update: visionOS 1.1.1Details coming soon

Apple recommends to install security update visionOS 1.1.1Details coming soon on devices Apple Vision...

6.9AI Score

2024-03-21 12:00 AM
5
openvas
openvas

Huawei EulerOS: Security Advisory for curl (EulerOS-SA-2024-1439)

The remote host is missing an update for the Huawei...

9.8CVSS

8AI Score

0.003EPSS

2024-03-21 12:00 AM
3
openvas
openvas

Huawei EulerOS: Security Advisory for curl (EulerOS-SA-2024-1411)

The remote host is missing an update for the Huawei...

9.8CVSS

8AI Score

0.003EPSS

2024-03-21 12:00 AM
3
rapid7blog
rapid7blog

The Updated APT Playbook: Tales from the Kimsuky threat actor group

Co-authors are Christiaan Beek and Raj Samani Within Rapid7 Labs we continually track and monitor threat groups. This is one of our key areas of focus as we work to ensure that our ability to protect customers remains constant. As part of this process, we routinely identify evolving tactics from...

7.8AI Score

2024-03-20 10:00 PM
22
malwarebytes
malwarebytes

[updated] Apex Legends Global Series plagued by hackers

The North American finals of online shooter game Apex Legends has been postponed after games were disrupted by hacking incidents. Apex Legends, published by EA, is currently in an important stage of its Global Series, the regional finals mode. This is a big deal for the top players since there is.....

7.6AI Score

2024-03-20 09:49 PM
17
ibm
ibm

Security Bulletin: Vulnerability in Node.js moment affect IBM Cloud Pak System

Summary Vulnerability in Node.js moment affect IBM Cloud Pak System. (CVE-2022-31129). Vulnerability Details ** CVEID: CVE-2022-31129 DESCRIPTION: **Moment is vulnerable to a denial of service, caused by inefficient regular expression complexity. By sending a specially-crafted request, a remote...

7.5CVSS

7AI Score

0.003EPSS

2024-03-20 05:18 PM
7
wordfence
wordfence

$601 Bounty Awarded for Interesting Cross-Site Request Forgery to Local JS File Inclusion Vulnerability Patched in File Manager WordPress Plugin

🎉 Did you know we're running a Bug Bounty Extravaganza again? Earn over 6x our usual bounty rates, up to $10,000, for all vulnerabilities submitted through May 27th, 2024 when you opt to have Wordfence handle responsible disclosure! On February 15th, 2024, during our second Bug Bounty...

8.8CVSS

7.7AI Score

0.0004EPSS

2024-03-20 03:00 PM
8
thn
thn

TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks

Multiple threat actors are exploiting the recently disclosed security flaws in JetBrains TeamCity software to deploy ransomware, cryptocurrency miners, Cobalt Strike beacons, and a Golang-based remote access trojan called Spark RAT. The attacks entail the exploitation of CVE-2024-27198 (CVSS...

9.8CVSS

7.9AI Score

0.972EPSS

2024-03-20 11:26 AM
27
cve
cve

CVE-2023-46841

Recent x86 CPUs offer functionality named Control-flow Enforcement Technology (CET). A sub-feature of this are Shadow Stacks (CET-SS). CET-SS is a hardware feature designed to protect against Return Oriented Programming attacks. When enabled, traditional stacks holding both data and return...

6.3AI Score

0.0004EPSS

2024-03-20 11:15 AM
58
nvd
nvd

CVE-2023-46841

Recent x86 CPUs offer functionality named Control-flow Enforcement Technology (CET). A sub-feature of this are Shadow Stacks (CET-SS). CET-SS is a hardware feature designed to protect against Return Oriented Programming attacks. When enabled, traditional stacks holding both data and return...

6.3AI Score

0.0004EPSS

2024-03-20 11:15 AM
osv
osv

CVE-2023-46841

Recent x86 CPUs offer functionality named Control-flow Enforcement Technology (CET). A sub-feature of this are Shadow Stacks (CET-SS). CET-SS is a hardware feature designed to protect against Return Oriented Programming attacks. When enabled, traditional stacks holding both data and return...

7.1AI Score

0.0004EPSS

2024-03-20 11:15 AM
11
debiancve
debiancve

CVE-2023-46841

Recent x86 CPUs offer functionality named Control-flow Enforcement Technology (CET). A sub-feature of this are Shadow Stacks (CET-SS). CET-SS is a hardware feature designed to protect against Return Oriented Programming attacks. When enabled, traditional stacks holding both data and return...

6.4AI Score

0.0004EPSS

2024-03-20 11:15 AM
9
cvelist
cvelist

CVE-2023-46841 x86: shadow stack vs exceptions from emulation stubs

Recent x86 CPUs offer functionality named Control-flow Enforcement Technology (CET). A sub-feature of this are Shadow Stacks (CET-SS). CET-SS is a hardware feature designed to protect against Return Oriented Programming attacks. When enabled, traditional stacks holding both data and return...

6.5AI Score

0.0004EPSS

2024-03-20 10:40 AM
1
cve
cve

CVE-2024-1477

The Easy Maintenance Mode plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.2 via the REST API. This makes it possible for authenticated attackers to obtain post and page content via REST API thus bypassign the protection provided by the....

5.3CVSS

5.9AI Score

0.0004EPSS

2024-03-20 07:15 AM
33
cve
cve

CVE-2024-1473

The Coming Soon & Maintenance Mode by Colorlib plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.0.99 via the REST API. This makes it possible for unauthenticated attackers to obtain post and page contents via REST API thus bypassing maintenance...

5.3CVSS

9.1AI Score

0.0004EPSS

2024-03-20 07:15 AM
27
nvd
nvd

CVE-2024-1473

The Coming Soon & Maintenance Mode by Colorlib plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.0.99 via the REST API. This makes it possible for unauthenticated attackers to obtain post and page contents via REST API thus bypassing maintenance...

5.3CVSS

5.1AI Score

0.0004EPSS

2024-03-20 07:15 AM
nvd
nvd

CVE-2024-1477

The Easy Maintenance Mode plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.2 via the REST API. This makes it possible for authenticated attackers to obtain post and page content via REST API thus bypassign the protection provided by the....

5.3CVSS

5AI Score

0.0004EPSS

2024-03-20 07:15 AM
cve
cve

CVE-2024-1181

The Coming Soon, Under Construction & Maintenance Mode By Dazzler plugin for WordPress is vulnerable to maintenance mode bypass in all versions up to, and including, 2.1.2. This is due to the plugin relying on the REQUEST_URI to determine if the page being accesses is an admin area. This makes it.....

5.3CVSS

9.2AI Score

0.0004EPSS

2024-03-20 07:15 AM
31
nvd
nvd

CVE-2024-1181

The Coming Soon, Under Construction & Maintenance Mode By Dazzler plugin for WordPress is vulnerable to maintenance mode bypass in all versions up to, and including, 2.1.2. This is due to the plugin relying on the REQUEST_URI to determine if the page being accesses is an admin area. This makes it.....

5.3CVSS

5.2AI Score

0.0004EPSS

2024-03-20 07:15 AM
cvelist
cvelist

CVE-2024-1181

The Coming Soon, Under Construction & Maintenance Mode By Dazzler plugin for WordPress is vulnerable to maintenance mode bypass in all versions up to, and including, 2.1.2. This is due to the plugin relying on the REQUEST_URI to determine if the page being accesses is an admin area. This makes it.....

5.3CVSS

5.5AI Score

0.0004EPSS

2024-03-20 06:48 AM
Total number of security vulnerabilities38166