Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2023-3019

Description: Nessus Plugin ID 234595 with Medium Severity Synopsis The remote CBL Mariner host is missing one or more security updates. Description The version of qemu installed on the remote CBL Mariner 2.0 host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the CVE-2023-3019 advisory. - A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. (CVE-2023-3019)Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the affected packages. Read more at https://www.tenable.com/plugins/nessus/234595
Source: Tenable Plugins
April 18th, 2025 (about 15 hours ago)

CVE-2023-3180

Description: Nessus Plugin ID 234596 with Medium Severity Synopsis The remote CBL Mariner host is missing one or more security updates. Description The version of qemu installed on the remote CBL Mariner 2.0 host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the CVE-2023-3180 advisory. - A flaw was found in the QEMU virtual crypto device while handling data encryption/decryption requests in virtio_crypto_handle_sym_req. There is no check for the value of `src_len` and `dst_len` in virtio_crypto_sym_op_helper, potentially leading to a heap buffer overflow when the two values differ. (CVE-2023-3180)Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the affected packages. Read more at https://www.tenable.com/plugins/nessus/234596
Source: Tenable Plugins
April 18th, 2025 (about 15 hours ago)

CVE-2023-3255

Description: Nessus Plugin ID 234597 with Medium Severity Synopsis The remote CBL Mariner host is missing one or more security updates. Description The version of qemu installed on the remote CBL Mariner 2.0 host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the CVE-2023-3255 advisory. - A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition May lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remote authenticated client who is able to send a clipboard to the VNC server to trigger a denial of service. (CVE-2023-3255)Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the affected packages. Read more at https://www.tenable.com/plugins/nessus/234597
Source: Tenable Plugins
April 18th, 2025 (about 15 hours ago)

CVE-2023-3255

Description: Nessus Plugin ID 234598 with Medium Severity Synopsis The remote Azure Linux host is missing one or more security updates. Description The version of qemu installed on the remote Azure Linux 3.0 host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the CVE-2023-3255 advisory. - A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition May lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remote authenticated client who is able to send a clipboard to the VNC server to trigger a denial of service. (CVE-2023-3255)Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the affected packages. Read more at https://www.tenable.com/plugins/nessus/234598
Source: Tenable Plugins
April 18th, 2025 (about 15 hours ago)

CVE-2024-10041

Description: Nessus Plugin ID 234605 with Medium Severity Synopsis The remote SUSE host is missing a security update. Description The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by a vulnerability as referenced in the SUSE-SU-2025:1334-1 advisory. - CVE-2024-10041: sensitive data exposure while performing authentications. (bsc#1232234)Tenable has extracted the preceding description block directly from the SUSE security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the affected packages. Read more at https://www.tenable.com/plugins/nessus/234605
Source: Tenable Plugins
April 18th, 2025 (about 15 hours ago)

CVE-2024-54551

Description: Nessus Plugin ID 234606 with Critical Severity Synopsis The remote SUSE host is missing one or more security updates. Description The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:1336-1 advisory. - Update to version 2.48.1 - CVE-2024-54551: improper memory handling may lead to a denial-of-service when processing certain web content (bsc#1240962) - CVE-2025-24208: permissions issue may lead to a cross-site scripting attack when loading a malicious iframe (bsc#1240961) - CVE-2025-24209: buffer overflow may lead to crash when processing maliciously crafted web content (bsc#1240964) - CVE-2025-24213: type confusion issue may lead to memory corruption (bsc#1240963) - CVE-2025-24216: improper memory handling may lead to an unexpected crash when processing certain web content (bsc#1240986) - CVE-2025-24264: improper memory handling may lead to unexpected crash when processing certain web content (bsc#1240987) - CVE-2025-30427: use-after-free issue may lead to an unexpected Safari crash when processing maliciously crafted web content (bsc#1240958)Tenable has extracted the preceding description block directly from the SUSE security advisory.Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. Solution Update the affecte...

EPSS Score: 0.17%

Source: Tenable Plugins
April 18th, 2025 (about 15 hours ago)

CVE-2024-56431

Description: Nessus Plugin ID 234612 with Critical Severity Synopsis The remote SUSE host is missing a security update. Description The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by a vulnerability as referenced in the SUSE-SU-2025:1340-1 advisory. - CVE-2024-56431: Fixed a negative shift in huffdec.c (bsc#1234837).Tenable has extracted the preceding description block directly from the SUSE security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Update the affected libmozjs-115-0, mozjs115 and / or mozjs115-devel packages. Read more at https://www.tenable.com/plugins/nessus/234612
Source: Tenable Plugins
April 18th, 2025 (about 15 hours ago)
Description: Nessus Plugin ID 234615 with Critical Severity Synopsis The remote PhotonOS host is missing multiple security updates. Description An update of the mozjs package has been released. Solution Update the affected Linux packages. Read more at https://www.tenable.com/plugins/nessus/234615
Source: Tenable Plugins
April 18th, 2025 (about 15 hours ago)
Description: Nessus Plugin ID 234616 with Info Severity Synopsis Dell Trusted Device is installed on the remote Windows host. Description Dell Trusted Device (formerly known as Dell BIOS Verification) is installed on the remote Windows host. Solution null Read more at https://www.tenable.com/plugins/nessus/234616
Source: Tenable Plugins
April 18th, 2025 (about 15 hours ago)
Description: Here's our live panel and podcast from SXSW!
Source: 404 Media
April 18th, 2025 (about 15 hours ago)