CVE Notify
17.5K subscribers
4 photos
149K links
Alert on the latest CVEs

Partner channel: @malwr
Download Telegram
๐Ÿšจ CVE-2024-25254
SuperScan v4.1 was discovered to contain a buffer overflow via the Hostname/IP parameter.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-50636
PyMOL 2.5.0 contains a vulnerability in its "Run Script" function, which allows the execution of arbitrary Python code embedded within .PYM files. Attackers can craft a malicious .PYM file containing a Python reverse shell payload and exploit the function to achieve Remote Command Execution (RCE). This vulnerability arises because PyMOL treats .PYM files as Python scripts without properly validating or restricting the commands within the script, enabling attackers to run unauthorized commands in the context of the user running the application.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-11209
A vulnerability was found in Apereo CAS 6.6. It has been classified as critical. This affects an unknown part of the file /login?service of the component 2FA. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-43498
.NET and Visual Studio Remote Code Execution Vulnerability

๐ŸŽ–@cveNotify
๐Ÿ‘1
๐Ÿšจ CVE-2024-43499
.NET and Visual Studio Denial of Service Vulnerability

๐ŸŽ–@cveNotify
๐Ÿ‘1
๐Ÿšจ CVE-2024-39609
Improper Access Control in UEFI firmware for some Intel(R) Server Board M70KLP may allow a privileged user to potentially enable escalation of privilege via local access.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-41167
Improper input validation in UEFI firmware in some Intel(R) Server Board M10JNP2SB Family may allow a privileged user to potentially enable escalation of privilege via local access.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-11208
A vulnerability was found in Apereo CAS 6.6 and classified as problematic. Affected by this issue is some unknown functionality of the file /login?service. The manipulation leads to session expiration. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-38264
Microsoft Virtual Hard Disk (VHDX) Denial of Service Vulnerability

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-43447
Windows SMBv3 Server Remote Code Execution Vulnerability

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-43449
Windows USB Video Class System Driver Elevation of Privilege Vulnerability

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-43450
Windows DNS Spoofing Vulnerability

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-43452
Windows Registry Elevation of Privilege Vulnerability

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-25170
An issue in Mezzanine v6.0.0 allows attackers to bypass access controls via manipulating the Host header.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-21058
Vulnerability in the Unified Audit component of Oracle Database Server. Supported versions that are affected are 19.3-19.22 and 21.3-21.13. Easily exploitable vulnerability allows high privileged attacker having SYSDBA privilege with network access via Oracle Net to compromise Unified Audit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Unified Audit accessible data. CVSS 3.1 Base Score 4.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N).

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-39884
A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers.   "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted.

Users are recommended to upgrade to version 2.4.61, which fixes this issue.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-27532
wasm-micro-runtime (aka WebAssembly Micro Runtime or WAMR) 06df58f is vulnerable to NULL Pointer Dereference in function `block_type_get_result_types.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-46613
WeeChat before 4.4.2 has an integer overflow and resultant buffer overflow at core/core-string.c when there are more than two billion items in a list. This affects string_free_split_shared , string_free_split, string_free_split_command, and string_free_split_tags.

๐ŸŽ–@cveNotify