CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-56757

Description: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: mediatek: add intf release flow when usb disconnect MediaTek claim an special usb intr interface for ISO data transmission. The interface need to be released before unregistering hci device when usb disconnect. Removing BT usb dongle without properly releasing the interface may cause Kernel panic while unregister hci device.

EPSS Score: 0.04%

Source: CVE
January 7th, 2025 (6 months ago)

CVE-2024-5594

Description: OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which attackers can use to inject unexpected arbitrary data into third-party executables or plug-ins.

EPSS Score: 0.04%

Source: CVE
January 7th, 2025 (6 months ago)

CVE-2024-55629

Description: Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, TCP streams with TCP urgent data (out of band data) can lead to Suricata analyzing data differently than the applications at the TCP endpoints, leading to possible evasions. Suricata 7.0.8 includes options to allow users to configure how to handle TCP urgent data. In IPS mode, you can use a rule such as drop tcp any any -> any any (sid:1; tcp.flags:U*;) to drop all the packets with urgent flag set.

CVSS: HIGH (7.5)

EPSS Score: 0.05%

Source: CVE
January 7th, 2025 (6 months ago)

CVE-2024-55628

Description: Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.8, DNS resource name compression can lead to small DNS messages containing very large hostnames which can be costly to decode, and lead to very large DNS log records. While there are limits in place, they were too generous. The issue has been addressed in Suricata 7.0.8.

CVSS: HIGH (7.5)

EPSS Score: 0.05%

Source: CVE
January 7th, 2025 (6 months ago)

CVE-2024-55627

Description: Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a specially crafted TCP stream can lead to a very large buffer overflow while being zero-filled during initialization with memset due to an unsigned integer underflow. The issue has been addressed in Suricata 7.0.8.

CVSS: MEDIUM (5.9)

EPSS Score: 0.05%

Source: CVE
January 7th, 2025 (6 months ago)

CVE-2024-55626

Description: Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a large BPF filter file provided to Suricata at startup can lead to a buffer overflow at Suricata startup. The issue has been addressed in Suricata 7.0.8.

CVSS: LOW (3.3)

EPSS Score: 0.05%

Source: CVE
January 7th, 2025 (6 months ago)

CVE-2024-55605

Description: Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a large input buffer to the to_lowercase, to_uppercase, strip_whitespace, compress_whitespace, dotprefix, header_lowercase, strip_pseudo_headers, url_decode, or xor transform can lead to a stack overflow causing Suricata to crash. The issue has been addressed in Suricata 7.0.8.

CVSS: HIGH (7.5)

EPSS Score: 0.04%

Source: CVE
January 7th, 2025 (6 months ago)

CVE-2024-55553

Description: In FRRouting (FRR) before 10.3, it is possible for an attacker to trigger repeated RIB revalidation by sending approximately 500 RPKI updates, potentially leading to prolonged revalidation times and a Denial of Service (DoS) scenario.

EPSS Score: 0.04%

Source: CVE
January 7th, 2025 (6 months ago)

CVE-2024-55529

Description: Z-BlogPHP 1.7.3 is vulnerable to arbitrary code execution via \zb_users\theme\shell\template.

EPSS Score: 0.04%

Source: CVE
January 7th, 2025 (6 months ago)

CVE-2024-55408

Description: An issue in the AsusSAIO.sys component of ASUS System Analysis IO v1.0.0 allows attackers to perform arbitrary read and write actions via supplying crafted IOCTL requests.

EPSS Score: 0.04%

Source: CVE
January 7th, 2025 (6 months ago)