CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2025-0650

Description: Nessus Plugin ID 215097 with High Severity Synopsis The remote Red Hat host is missing a security update for ovn23.03. Description The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1093 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the RHEL ovn23.03 package based on the guidance in RHSA-2025:1093. Read more at https://www.tenable.com/plugins/nessus/215097

EPSS Score: 0.05%

Source: Tenable Plugins
February 7th, 2025 (5 months ago)

CVE-2024-26935

Description: Nessus Plugin ID 215098 with High Severity Synopsis The remote Red Hat host is missing one or more security updates for kernel-rt. Description The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2025:1067 advisory. The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * kernel: scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935) * kernel: arm64/sve: Discard stale CPU state when handling SVE traps (CVE-2024-50275) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. Solution Update the RHEL kernel-rt package based on the guidance in RHSA-2025:1067. Read more at https://www.tenable.com/plugins/nessus/215098
Source: Tenable Plugins
February 7th, 2025 (5 months ago)

CVE-2025-0650

Description: Nessus Plugin ID 215099 with High Severity Synopsis The remote Red Hat host is missing a security update for ovn23.09. Description The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1095 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the RHEL ovn23.09 package based on the guidance in RHSA-2025:1095. Read more at https://www.tenable.com/plugins/nessus/215099

EPSS Score: 0.05%

Source: Tenable Plugins
February 7th, 2025 (5 months ago)

CVE-2025-0650

Description: Nessus Plugin ID 215100 with High Severity Synopsis The remote Red Hat host is missing a security update for ovn22.09. Description The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2025:1091 advisory. OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups. Security Fix(es): * ovn: egress ACLs may be bypassed via specially crafted UDP packet (CVE-2025-0650) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the RHEL ovn22.09 package based on the guidance in RHSA-2025:1091. Read more at https://www.tenable.com/plugins/nessus/215100

EPSS Score: 0.05%

Source: Tenable Plugins
February 7th, 2025 (5 months ago)

CVE-2025-1017

Description: Nessus Plugin ID 215101 with Critical Severity Synopsis The remote Red Hat host is missing one or more security updates for firefox. Description The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2025:1066 advisory. Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7 (CVE-2025-1017) * firefox: thunderbird: Use-after-free in Custom Highlight (CVE-2025-1010) * firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7 (CVE-2025-1016) * firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows (CVE-2025-1013) * firefox: thunderbird: A bug in WebAssembly code generation could result in a crash (CVE-2025-1011) * firefox: thunderbird: Use-after-free in XSLT (CVE-2025-1009) * firefox: thunderbird: Certificate length was not properly checked (CVE-2025-1014) * firefox: thunderbird: Use-after-free during concurrent delazification (CVE-2025-1012) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the...

EPSS Score: 0.07%

Source: Tenable Plugins
February 7th, 2025 (5 months ago)
Description: Threat actors have been observed exploiting recently disclosed security flaws in SimpleHelp's Remote Monitoring and Management (RMM) software as a precursor for what appears to be a ransomware attack. The intrusion leveraged the now-patched vulnerabilities to gain initial access and maintain persistent remote access to an unspecified target network, cybersecurity company Field Effect said in a
Source: TheHackerNews
February 7th, 2025 (5 months ago)
Source: TheRegister
February 7th, 2025 (5 months ago)

CVE-2025-23094

Description: The Platform component of Mitel OpenScape 4000 and OpenScape 4000 Manager V11 R0.22.0 through V11 R0.22.1, V10 R1.54.0 through V10 R1.54.1, and V10 R1.42.6 and earlier could allow an unauthenticated attacker to conduct a command injection attack due to insufficient parameter sanitization. A successful exploit could allow an attacker to execute arbitrary commands within the same privilege level as the web access process.

EPSS Score: 0.04%

Source: CVE
February 7th, 2025 (5 months ago)

CVE-2025-23093

Description: The Platform component of Mitel OpenScape 4000 and OpenScape 4000 Manager through V10 R1.54.1 and V11 through R0.22.1 could allow an authenticated attacker to conduct a privilege escalation attack due to the execution of a resource with unnecessary privileges. A successful exploit could allow an attacker to execute arbitrary commands with elevated privileges.

EPSS Score: 0.04%

Source: CVE
February 7th, 2025 (5 months ago)