Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: A sophisticated social engineering cybercrime campaign bent on financial gain was observed being run from Tencent servers in Singapore.
Source: Dark Reading
December 13th, 2024 (4 months ago)
Description: AE1021 and AE1021PE provided by FXC Inc. contain multiple vulnerabilities.
Source: Japan Vulnerability Notes (JVN)
December 13th, 2024 (4 months ago)
Description: WordPress Plugin "My WP Customize Admin/Frontend" contains a cross-site scripting vulnerability.
Source: Japan Vulnerability Notes (JVN)
December 13th, 2024 (4 months ago)

CVE-2024-9979

Description: A flaw was found in PyO3. This vulnerability causes a use-after-free issue, potentially leading to memory corruption or crashes via unsound borrowing from weak Python references.

EPSS Score: 0.05%

Source: CVE
December 13th, 2024 (4 months ago)

CVE-2024-8698

Description: A flaw exists in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The method incorrectly determines whether a SAML signature is for the full document or only for specific assertions based on the position of the signature in the XML document, rather than the Reference element used to specify the signed element. This flaw allows attackers to create crafted responses that can bypass the validation, potentially leading to privilege escalation or impersonation attacks.

EPSS Score: 0.07%

Source: CVE
December 13th, 2024 (4 months ago)

CVE-2024-7885

Description: A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBuilder instance across multiple requests. This issue occurs when the parseProxyProtocolV1 method processes multiple requests on the same HTTP connection. As a result, different requests may share the same StringBuilder instance, potentially leading to information leakage between requests or responses. In some cases, a value from a previous request or response may be erroneously reused, which could lead to unintended data exposure. This issue primarily results in errors and connection termination but creates a risk of data leakage in multi-request environments.

EPSS Score: 0.1%

Source: CVE
December 13th, 2024 (4 months ago)

CVE-2024-6508

Description: An insufficient entropy vulnerability was found in the Openshift Console. In the authorization code type and implicit grant type, the OAuth2 protocol is vulnerable to a Cross-Site Request Forgery (CSRF) attack if the state parameter is used inefficiently. This flaw allows logging into the victim’s current application account using a third-party account without any restrictions.

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (4 months ago)

CVE-2024-45772

Description: Deserialization of Untrusted Data vulnerability in Apache Lucene Replicator. This issue affects Apache Lucene's replicator module: from 4.4.0 before 9.12.0. The deprecated org.apache.lucene.replicator.http package is affected. The org.apache.lucene.replicator.nrt package is not affected. Users are recommended to upgrade to version 9.12.0, which fixes the issue. The deserialization can only be triggered if users actively deploy an network-accessible implementation and a corresponding client using a HTTP library that uses the API (e.g., a custom servlet and HTTPClient). Java serialization filters (such as -Djdk.serialFilter='!*' on the commandline) can mitigate the issue on vulnerable versions without impacting functionality.

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (4 months ago)

CVE-2024-2700

Description: A vulnerability was found in the quarkus-core component. Quarkus captures local environment variables from the Quarkus namespace during the application's build, therefore, running the resulting application inherits the values captured at build time. Some local environment variables may have been set by the developer or CI environment for testing purposes, such as dropping the database during application startup or trusting all TLS certificates to accept self-signed certificates. If these properties are configured using environment variables or the .env facility, they are captured into the built application, which can lead to dangerous behavior if the application does not override these values. This behavior only happens for configuration properties from the `quarkus.*` namespace. Application-specific properties are not captured.

EPSS Score: 0.04%

Source: CVE
December 13th, 2024 (4 months ago)

CVE-2024-12401

Description: A flaw was found in the cert-manager package. This flaw allows an attacker who can modify PEM data that the cert-manager reads, for example, in a Secret resource, to use large amounts of CPU in the cert-manager controller pod to effectively create a denial-of-service (DoS) vector for the cert-manager in the cluster.

EPSS Score: 0.21%

Source: CVE
December 13th, 2024 (4 months ago)