Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: "Skylark" App fails to restrict custom URL schemes properly.
Source: Japan Vulnerability Notes (JVN)
December 3rd, 2024 (5 months ago)

CVE-2024-53937

Description: An issue was discovered on Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. The TELNET service is enabled by default with admin/admin as default credentials and is exposed over the LAN. The allows attackers to execute arbitrary commands with root-level permissions. Device setup does not require this password to be changed during setup in order to utilize the device. (However, the TELNET password is dictated by the current GUI password.)

EPSS Score: 0.04%

Source: CVE
December 3rd, 2024 (5 months ago)

CVE-2023-5870

Description: A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack.

EPSS Score: 0.19%

Source: CVE
December 3rd, 2024 (5 months ago)

CVE-2023-5379

Description: A flaw was found in Undertow. When an AJP request is sent that exceeds the max-header-size attribute in ajp-listener, JBoss EAP is marked in an error state by mod_cluster in httpd, causing JBoss EAP to close the TCP connection without returning an AJP response. This happens because mod_proxy_cluster marks the JBoss EAP instance as an error worker when the TCP connection is closed from the backend after sending the AJP request without receiving an AJP response, and stops forwarding. This issue could allow a malicious user could to repeatedly send requests that exceed the max-header-size, causing a Denial of Service (DoS).

EPSS Score: 0.09%

Source: CVE
December 3rd, 2024 (5 months ago)
Description: Howling Scorpius, active since 2023, uses Akira ransomware to target businesses globally, employing a double-extortion strategy and upgrading tools regularly. The post Threat Assessment: Howling Scorpius (Akira Ransomware) appeared first on Unit 42.
Source: Palo Alto Unit42
December 2nd, 2024 (5 months ago)
Description: Though it's still just a proof of concept, the malware is functional and can evade the Secure Boot process on devices from multiple vendors.
Source: Dark Reading
December 2nd, 2024 (5 months ago)
Description: South Korean police have arrested a CEO and five employees for manufacturing over 240,000 satellite receivers pre-loaded or later updated to include DDoS attack functionality at a purchaser's request. [...]
Source: BleepingComputer
December 2nd, 2024 (5 months ago)
Description: Chalk up another win for global cooperation among law enforcement, this time targeting seven types of cyber fraud, including voice phishing and business email compromise.
Source: Dark Reading
December 2nd, 2024 (5 months ago)
Description: Russian authorities have sentenced the leader of the criminal group behind the now-closed dark web platform Hydra Market to life in prison. [...]
Source: BleepingComputer
December 2nd, 2024 (5 months ago)
Description: Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 gift card.
Source: Dark Reading
December 2nd, 2024 (5 months ago)