CVE Notify
17.9K subscribers
4 photos
153K links
Alert on the latest CVEs

Partner channel: @malwr
Download Telegram
๐Ÿšจ CVE-2024-23353
Transient DOS while decoding attach reject message received by UE, when IEI is set to ESM_IEI.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-23355
Memory corruption when keymaster operation imports a shared key.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-6640
In ICMPv6 Neighbor Discovery (ND), the ID is always 0. When pf is configured to allow ND and block incoming Echo Requests, a crafted Echo Request packet after a Neighbor Solicitation (NS) can trigger an Echo Reply. The packet has to come from the same host as the NS and have a zero as identifier to match the state created by the Neighbor Discovery and allow replies to be generated.

ICMPv6 packets with identifier value of zero bypass firewall rules written on the assumption that the incoming packets are going to create a state in the state table.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-5960
Plaintext Storage of a Password vulnerability in Eliz Software Panel allows : Use of Known Domain Credentials.This issue affects Panel: before v2.3.24.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-52550
Jenkins Pipeline: Groovy Plugin 3990.vd281dd77a_388 and earlier, except 3975.3977.v478dd9e956c3 does not check whether the main (Jenkinsfile) script for a rebuilt build is approved, allowing attackers with Item/Build permission to rebuild a previous build whose (Jenkinsfile) script is no longer approved.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-9766
Wacom Center WTabletServicePro Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Wacom Center. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within WTabletServicePro process. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-24304.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-7241
Panda Security Dome Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Panda Security Dome. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the PSANHost service. By creating a junction, an attacker can abuse the service to create an arbitrary file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23375.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-10471
The Everest Forms WordPress plugin before 3.0.4.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-23356
Memory corruption during session sign renewal request calls in HLOS.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-23381
Memory corruption when memory mapped in a VBO is not unmapped by the GPU SMMU.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-23382
Memory corruption while processing graphics kernel driver request to create DMA fence.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-23383
Memory corruption when kernel driver attempts to trigger hardware fences.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-23384
Memory corruption when the mapped pages in VBO are still mapped after reclaiming by shrinker.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-33010
Transient DOS while parsing fragments of MBSSID IE from beacon frame.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-33011
Transient DOS while parsing the MBSSID IE from the beacons, when the MBSSID IE length is zero.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-33012
Transient DOS while parsing the multiple MBSSID IEs from the beacon, when the tag length is non-zero value but with end of beacon.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-33013
Transient DOS when driver accesses the ML IE memory and offset value is incremented beyond ML IE length.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2024-11234
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2022-2667
A vulnerability was found in SourceCodester Loan Management System and classified as critical. This issue affects some unknown processing of the file delete_lplan.php. The manipulation of the argument lplan_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205619.

๐ŸŽ–@cveNotify
๐Ÿšจ CVE-2022-2766
A vulnerability was found in SourceCodester Loan Management System. It has been rated as critical. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-206162 is the identifier assigned to this vulnerability.

๐ŸŽ–@cveNotify