CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-41972

Description: A low privileged remote attacker can overwrite an arbitrary file on the filesystem which may lead to an arbitrary file read with root privileges.

CVSS: MEDIUM (6.5)

EPSS Score: 0.04%

Source: CVE
January 31st, 2025 (5 months ago)

CVE-2024-41971

Description: A low privileged remote attacker can overwrite an arbitrary file on the filesystem leading to a DoS and data loss.

CVSS: HIGH (8.1)

EPSS Score: 0.04%

Source: CVE
January 31st, 2025 (5 months ago)

CVE-2024-41970

Description: A low privileged remote attacker may gain access to forbidden diagnostic data due to incorrect permission assignment for critical resources.

CVSS: MEDIUM (5.7)

EPSS Score: 0.04%

Source: CVE
January 31st, 2025 (5 months ago)

CVE-2024-41968

Description: A low privileged remote attacker may modify the docker settings setup of the device, leading to a limited DoS.

CVSS: MEDIUM (5.4)

EPSS Score: 0.04%

Source: CVE
January 31st, 2025 (5 months ago)

CVE-2024-41967

Description: A low privileged remote attacker may modify the boot mode configuration setup of the device, leading to modification of the firmware upgrade process or a denial-of-service attack.

CVSS: HIGH (8.1)

EPSS Score: 0.04%

Source: CVE
January 31st, 2025 (5 months ago)

CVE-2024-4148

Description: A Regular Expression Denial of Service (ReDoS) vulnerability exists in the lunary-ai/lunary application, version 1.2.10. An attacker can exploit this vulnerability by maliciously manipulating regular expressions, which can significantly impact the response time of the application and potentially render it completely non-functional. Specifically, the vulnerability can be triggered by sending a specially crafted request to the application, leading to a denial of service where the application crashes.

CVSS: HIGH (7.5)

EPSS Score: 0.05%

Source: CVE
January 31st, 2025 (5 months ago)

CVE-2024-3502

Description: In lunary-ai/lunary versions up to and including 1.2.5, an information disclosure vulnerability exists where account recovery hashes of users are inadvertently exposed to unauthorized actors. This issue occurs when authenticated users inspect responses from `GET /v1/users/me` and `GET /v1/users/me/org` endpoints. The exposed account recovery hashes, while not directly related to user passwords, represent sensitive information that should not be accessible to unauthorized parties. Exposing these hashes could potentially facilitate account recovery attacks or other malicious activities. The vulnerability was addressed in version 1.2.6.

CVSS: CRITICAL (9.1)

EPSS Score: 0.05%

Source: CVE
January 31st, 2025 (5 months ago)

CVE-2024-3501

Description: In lunary-ai/lunary versions up to and including 1.2.5, an information disclosure vulnerability exists due to the inclusion of single-use tokens in the responses of `GET /v1/users/me` and `GET /v1/users/me/org` API endpoints. These tokens, intended for sensitive operations such as password resets or account verification, are exposed to unauthorized actors, potentially allowing them to perform actions on behalf of the user. This issue was addressed in version 1.2.6, where the exposure of single-use tokens in user-facing queries was mitigated.

CVSS: CRITICAL (9.1)

EPSS Score: 0.05%

Source: CVE
January 31st, 2025 (5 months ago)

CVE-2024-2658

Description: A misconfiguration in lmadmin.exe of FlexNet Publisher versions prior to 2024 R1 (11.19.6.0) allows the OpenSSL configuration file to load from a non-existent directory. An unauthorized, locally authenticated user with low privileges can potentially create the directory and load a specially crafted openssl.conf file leading to the execution of a malicious DLL (Dynamic-Link Library) with elevated privileges.

CVSS: HIGH (8.5)

EPSS Score: 0.05%

Source: CVE
January 31st, 2025 (5 months ago)

CVE-2024-25995

Description: An unauthenticated remote attacker can modify configurations to perform a remote code execution, gain root rights or perform an DoS due to improper input validation.

CVSS: CRITICAL (9.8)

EPSS Score: 0.05%

Source: CVE
January 31st, 2025 (5 months ago)