Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-7409

Description: A flaw was found in the QEMU NBD Server. This vulnerability allows a denial of service (DoS) attack via improper synchronization during socket closure when a client keeps a socket open as the server is taken offline.

EPSS Score: 0.05%

Source: CVE
December 4th, 2024 (6 months ago)

CVE-2024-7128

Description: A flaw was found in the OpenShift console. Several endpoints in the application use the authHandler() and authHandlerWithUser() middleware functions. When the default authentication provider ("openShiftAuth") is set, these functions do not perform any authentication checks, relying instead on the targeted service to handle authentication and authorization. This issue leads to various degrees of data exposure due to a lack of proper credential verification.

EPSS Score: 0.04%

Source: CVE
December 4th, 2024 (6 months ago)

CVE-2024-7079

Description: A flaw was found in the Openshift console. The /API/helm/verify endpoint is tasked to fetch and verify the installation of a Helm chart from a URI that is remote HTTP/HTTPS or local. Access to this endpoint is gated by the authHandlerWithUser() middleware function. Contrary to its name, this middleware function does not verify the validity of the user's credentials. As a result, unauthenticated users can access this endpoint.

EPSS Score: 0.04%

Source: CVE
December 4th, 2024 (6 months ago)

CVE-2024-46624

Description: An issue in InfoDom Performa 365 v4.0.1 allows authenticated attackers to elevate their privileges to Administrator via a crafted payload sent to /api/users.

EPSS Score: 0.04%

Source: CVE
December 4th, 2024 (6 months ago)

CVE-2024-45106

Description: Improper authentication of an HTTP endpoint in the S3 Gateway of Apache Ozone 1.4.0 allows any authenticated Kerberos user to revoke and regenerate the S3 secrets of any other user. This is only possible if: * ozone.s3g.secret.http.enabled is set to true. The default value of this configuration is false. * The user configured in ozone.s3g.kerberos.principal is also configured in ozone.s3.administrators or ozone.administrators. Users are recommended to upgrade to Apache Ozone version 1.4.1 which disables the affected endpoint.

EPSS Score: 0.04%

Source: CVE
December 4th, 2024 (6 months ago)

CVE-2023-4886

Description: A sensitive information exposure vulnerability was found in foreman. Contents of tomcat's server.xml file, which contain passwords to candlepin's keystore and truststore, were found to be world readable.

EPSS Score: 0.05%

Source: CVE
December 4th, 2024 (6 months ago)

CVE-2023-46846

Description: SQUID is vulnerable to HTTP request smuggling, caused by chunked decoder lenience, allows a remote attacker to perform Request/Response smuggling past firewall and frontend security systems.

EPSS Score: 2.48%

Source: CVE
December 4th, 2024 (6 months ago)

CVE-2023-4527

Description: A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

EPSS Score: 0.15%

Source: CVE
December 4th, 2024 (6 months ago)

CVE-2023-43787

Description: A vulnerability was found in libX11 due to an integer overflow within the XCreateImage() function. This flaw allows a local user to trigger an integer overflow and execute arbitrary code with elevated privileges.

EPSS Score: 0.04%

Source: CVE
December 4th, 2024 (6 months ago)

CVE-2023-39418

Description: A vulnerability was found in PostgreSQL with the use of the MERGE command, which fails to test new rows against row security policies defined for UPDATE and SELECT. If UPDATE and SELECT policies forbid some rows that INSERT policies do not forbid, a user could store such rows.

EPSS Score: 0.5%

Source: CVE
December 4th, 2024 (6 months ago)