Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: Japanese and U.S. authorities have formerly attributed the theft of cryptocurrency worth $308 million from cryptocurrency company DMM Bitcoin in May 2024 to North Korean cyber actors. "The theft is affiliated with TraderTraitor threat activity, which is also tracked as Jade Sleet, UNC4899, and Slow Pisces," the agencies said. "TraderTraitor activity is often characterized by targeted social
Source: TheHackerNews
December 24th, 2024 (5 months ago)

CVE-2024-56337

Description: The Apache Software Foundation (ASF) has released a security update to address an important vulnerability in its Tomcat server software that could result in remote code execution (RCE) under certain conditions. The vulnerability, tracked as CVE-2024-56337, has been described as an incomplete mitigation for CVE-2024-50379 (CVSS score: 9.8), another critical security flaw in the same product that

EPSS Score: 0.04%

Source: TheHackerNews
December 24th, 2024 (5 months ago)
Description: Trend Micro Incorporated has released the security updates for Deep Security 20.0 Agent (for Windows).
Source: Japan Vulnerability Notes (JVN)
December 24th, 2024 (5 months ago)

CVE-2024-56364

Description: SimpleXLSX is software for parsing and retrieving data from Excel XLSx files. Starting in 1.0.12 and ending in 1.1.13, when calling the extended toHTMLEx method, it is possible to execute arbitrary JavaScript code. This vulnerability is fixed in 1.1.13.

CVSS: MEDIUM (5.4)

EPSS Score: 0.04%

Source: CVE
December 24th, 2024 (5 months ago)

CVE-2024-56363

Description: APTRS (Automated Penetration Testing Reporting System) is a Python and Django-based automated reporting tool designed for penetration testers and security organizations. In 1.0, there is a vulnerability in the web application's handling of user-supplied input that is incorporated into a Jinja2 template. Specifically, when user input is improperly sanitized or validated, an attacker can inject Jinja2 syntax into the template, causing the server to execute arbitrary code. For example, an attacker might be able to inject expressions like {{ config }}, {{ self.class.mro[1].subclasses() }}, or more dangerous payloads that trigger execution of arbitrary Python code. The vulnerability can be reproduced by submitting crafted input to all the template fields handled by ckeditor, that are passed directly to a Jinja2 template. If the input is rendered without sufficient sanitization, it results in the execution of malicious Jinja2 code on the server.

CVSS: HIGH (7.8)

EPSS Score: 0.04%

Source: CVE
December 24th, 2024 (5 months ago)

CVE-2024-56326

Description: Jinja is an extensible templating engine. Prior to 3.1.5, An oversight in how the Jinja sandboxed environment detects calls to str.format allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to store a reference to a malicious string's format method, then pass that to a filter that calls it. No such filters are built-in to Jinja, but could be present through custom filters in an application. After the fix, such indirect calls are also handled by the sandbox. This vulnerability is fixed in 3.1.5.

CVSS: MEDIUM (5.4)

EPSS Score: 0.13%

Source: CVE
December 24th, 2024 (5 months ago)

CVE-2024-56201

Description: Jinja is an extensible templating engine. Prior to 3.1.5, a bug in the Jinja compiler allows an attacker that controls both the content and filename of a template to execute arbitrary Python code, regardless of if Jinja's sandbox is used. To exploit the vulnerability, an attacker needs to control both the filename and the contents of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates where the template author can also choose the template filename. This vulnerability is fixed in 3.1.5.

CVSS: MEDIUM (5.4)

EPSS Score: 0.05%

Source: CVE
December 24th, 2024 (5 months ago)

CVE-2024-55947

Description: Gogs is an open source self-hosted Git service. A malicious user is able to write a file to an arbitrary path on the server to gain SSH access to the server. The vulnerability is fixed in 0.13.1.

CVSS: HIGH (8.7)

EPSS Score: 0.05%

Source: CVE
December 24th, 2024 (5 months ago)

CVE-2024-55539

Description: Weak algorithm used to sign RPM package. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux) before build 39185.

CVSS: LOW (2.5)

EPSS Score: 0.04%

Source: CVE
December 24th, 2024 (5 months ago)

CVE-2024-54148

Description: Gogs is an open source self-hosted Git service. A malicious user is able to commit and edit a crafted symlink file to a repository to gain SSH access to the server. The vulnerability is fixed in 0.13.1.

CVSS: HIGH (8.7)

EPSS Score: 0.05%

Source: CVE
December 24th, 2024 (5 months ago)