CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-57971

Description: DataSourceResource.java in the SpagoBI API support in Knowage Server in KNOWAGE before 8.1.30 does not ensure that java:comp/env/jdbc/ occurs at the beginning of a JNDI Name.

CVSS: CRITICAL (9.1)

EPSS Score: 0.05%

Source: CVE
February 17th, 2025 (5 months ago)

CVE-2024-57970

Description: libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname.

CVSS: MEDIUM (4.0)

EPSS Score: 0.04%

Source: CVE
February 17th, 2025 (5 months ago)

CVE-2024-44044

Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Oshine Modules allows Reflected XSS. This issue affects Oshine Modules: from n/a through n/a.

CVSS: HIGH (7.1)

EPSS Score: 0.04%

Source: CVE
February 17th, 2025 (5 months ago)

CVE-2024-0532

Description: A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as critical. This vulnerability affects the function set_repeat5 of the file /goform/WifiExtraSet of the component Web-based Management Interface. The manipulation of the argument wpapsk_crypto2_4g/wpapsk_crypto5g leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. In Tenda A15 15.13.07.13 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Betroffen ist die Funktion set_repeat5 der Datei /goform/WifiExtraSet der Komponente Web-based Management Interface. Dank Manipulation des Arguments wpapsk_crypto2_4g/wpapsk_crypto5g mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.

CVSS: HIGH (8.6)

EPSS Score: 0.78%

Source: CVE
February 17th, 2025 (5 months ago)
Description: A new malware called FinalDraft has been using Outlook email drafts for command-and-control communication in attacks against a ministry in a South American country. [...]
Source: BleepingComputer
February 17th, 2025 (5 months ago)
Description: Google Chrome has updated the existing "Enhanced protection" feature with AI to offer "real-time" protection against dangerous websites, downloads and extensions.  [...]
Source: BleepingComputer
February 17th, 2025 (5 months ago)
Source: TheRegister
February 17th, 2025 (5 months ago)
Description: GHNA Claims to be Selling Access to a Hong Kong-Based Cryptocurrency Staking Company
Source: DarkWebInformer
February 16th, 2025 (5 months ago)
Source: TheRegister
February 16th, 2025 (5 months ago)
Description: Mr Hamza Targeted the Website of Israel Defense Forces
Source: DarkWebInformer
February 16th, 2025 (5 months ago)