CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: IntelBroker and EnergyWeaponUser Allegedly Leaked the Source Code of Ministry of Environment
Source: DarkWebInformer
January 1st, 2025 (7 months ago)
Description: A Threat Actor is Allegedly Selling Access to an Unidentified Canadian Retail Corp
Source: DarkWebInformer
January 1st, 2025 (7 months ago)
Description: Threat hunters have disclosed a new "widespread timing-based vulnerability class" that leverages a double-click sequence to facilitate clickjacking attacks and account takeovers in almost all major websites. The technique has been codenamed DoubleClickjacking by security researcher Paulos Yibelo. "Instead of relying on a single click, it takes advantage of a double-click sequence," Yibelo said.
Source: TheHackerNews
January 1st, 2025 (7 months ago)
Description: The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) on Tuesday leveled sanctions against two entities in Iran and Russia for their attempts to interfere with the November 2024 presidential election. The federal agency said the entities – a subordinate organization of Iran's Islamic Revolutionary Guard Corps and a Moscow-based affiliate of Russia's Main Intelligence
Source: TheHackerNews
January 1st, 2025 (7 months ago)
Description: An announcement from Paris on Dread
Source: DarkWebInformer
January 1st, 2025 (7 months ago)

CVE-2024-7341

Description: A session fixation issue was discovered in the SAML adapters provided by Keycloak. The session ID and JSESSIONID cookie are not changed at login time, even when the turnOffChangeSessionIdOnLogin option is configured. This flaw allows an attacker who hijacks the current session before authentication to trigger session fixation.

EPSS Score: 0.19%

Source: CVE
January 1st, 2025 (7 months ago)

CVE-2024-7259

Description: A flaw was found in oVirt. A user with administrator privileges, including users with the ReadOnlyAdmin permission, may be able to use browser developer tools to view Provider passwords in cleartext.

EPSS Score: 0.05%

Source: CVE
January 1st, 2025 (7 months ago)

CVE-2024-7143

Description: A flaw was found in the Pulp package. When a role-based access control (RBAC) object in Pulp is set to assign permissions on its creation, it uses the `AutoAddObjPermsMixin` (typically the add_roles_for_object_creator method). This method finds the object creator by checking the current authenticated user. For objects that are created within a task, this current user is set by the first user with any permissions on the task object. This means the oldest user with model/domain-level task permissions will always be set as the current user of a task, even if they didn't dispatch the task. Therefore, all objects created in tasks will have their permissions assigned to this oldest user, and the creating user will receive nothing.

EPSS Score: 0.07%

Source: CVE
January 1st, 2025 (7 months ago)

CVE-2024-7012

Description: An authentication bypass vulnerability has been identified in Foreman when deployed with External Authentication, due to the puppet-foreman configuration. This issue arises from Apache's mod_proxy not properly unsetting headers because of restrictions on underscores in HTTP headers, allowing authentication through a malformed header. This flaw impacts all active Satellite deployments (6.13, 6.14 and 6.15) and could potentially enable unauthorized users to gain administrative access.

EPSS Score: 0.12%

Source: CVE
January 1st, 2025 (7 months ago)

CVE-2024-6535

Description: A flaw was found in Skupper. When Skupper is initialized with the console-enabled and with console-auth set to Openshift, it configures the openshift oauth-proxy with a static cookie-secret. In certain circumstances, this may allow an attacker to bypass authentication to the Skupper console via a specially-crafted cookie.

EPSS Score: 0.05%

Source: CVE
January 1st, 2025 (7 months ago)