CVE-2024-27130

Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

  • 2 Posts
  • 3 Interactions

CVE Info

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Fediverse

Profile picture

watchTowr: QNAP QTS - QNAPping At The Wheel (CVE-2024-27130 and friends)
Always a pleasure to read vulnerability analyses from watchTowr as they take us through QNAP's Network Attached Storage (NAS) products QTS (operating system), QuTSCloud (VM-optimized version) and QTS hero (high performance features version). NAS are very attractive targets for ransomware actors, and watchTowr walks us through finding vulnerabilities and providing a working exploit (proofs of concept available). A lot of humor injected throughout.
watchTowr is extremely transparent in listing all of the vulnerabilities found (and what's under embargo), with a timeline, communications and coordination with QNAP (JetBrains take note!), and their vulnerability disclosure policy.

cc: @wdormann you might find this interesting if you haven't read it already

  • 1
  • 2
  • 16 hours ago
Profile picture

Resumen de las últimas 24 horas en seguridad informática: La seguridad informática enfrenta desafíos diarios: vulnerabilidades en QNAP, Rescuezilla facilitando respaldos, HTB Sherlock para detectar actividades maliciosas, phishing en Meta que evita MFA, backdoor de SSH infectando servidores Linux, Noruega recomienda reemplazar SSL VPN y CISA agrega zero-days de Google Chrome a su catálogo. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática.

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 17/05/24 📆 |====

🔒 QNAP QTS - QNAPping At The Wheel (CVE-2024-27130 and friends)

La seguridad informática se enfoca en proteger los datos, y obtener acceso a ellos o interrumpir ese acceso es una prioridad para grupos de ransomware y APT. ¡Descubre más sobre esta vulnerabilidad en QNAP! 👉 djar.co/Cxuol

🔒 Rescuezilla Facilita el Respaldo y la Restauración de Sistemas

Rescuezilla 2.5 presenta una CLI experimental y correcciones que simplifican el proceso de respaldo y restauración de sistemas. Conoce las novedades de esta herramienta aquí. 👉 djar.co/oDWcy

🔒 HTB Sherlock: Logjammer

Logjammer es un análisis detallado de registros de eventos de Windows, útil para detectar actividades maliciosas en sistemas. Descubre cómo esta herramienta puede mejorar la seguridad de tu entorno. 👉 djar.co/XgvZ

🔒 Campaña de Phishing Bypasses MFA para Atacar Cuentas Comerciales de Meta

Un sofisticado ataque de phishing logra evadir la autenticación de múltiples factores, comprometiendo cuentas comerciales en Meta y poniendo en riesgo a millones de usuarios. Protégete con más información sobre este incidente. 👉 djar.co/xhbSU

🔒 SSH Backdoor Infecta 400,000 Servidores Linux y Continúa Propagándose

Un backdoor de SSH ha afectado a una gran cantidad de servidores Linux durante años, propagándose sin control y ampliando el alcance del malware. ¡Conoce más detalles sobre esta amenaza! 👉 djar.co/55LV

🔒 Noruega Recomienda Reemplazar SSL VPN para Prevenir Brechas

El Centro Nacional Noruego de Ciberseguridad sugiere reemplazar soluciones SSL VPN/WebVPN para evitar vulnerabilidades y brechas en redes corporativas. Mantente protegido siguiendo estas recomendaciones. 👉 djar.co/P3HX

🔒 CISA Agrega Zero-Days de Google Chrome a su Catálogo de Vulnerabilidades Explotadas

CISA incluye dos vulnerabilidades zero-day de Google Chrome en su listado de vulnerabilidades conocidas y explotadas, destacando la importancia de mantenerse actualizado frente a estas amenazas. Infórmate más al respecto aquí. 👉 djar.co/GhjyE

  • 0
  • 0
  • 17 hours ago

CVE-2024-34359

abetlen llama-cpp-python

10 May 2024
Published
10 May 2024
Updated

CVSS v3.1
CRITICAL (9.7)
EPSS
Pending

  • 1 Post

CVE Info

llama-cpp-python is the Python bindings for llama.cpp. `llama-cpp-python` depends on class `Llama` in `llama.py` to load `.gguf` llama.cpp or Latency Machine Learning Models. The `__init__` constructor built in the `Llama` takes several parameters to configure the loading and running of the model. Other than `NUMA, LoRa settings`, `loading tokenizers,` and `hardware settings`, `__init__` also loads the `chat template` from targeted `.gguf` 's Metadata and furtherly parses it to `llama_chat_format.Jinja2ChatFormatter.to_chat_handler()` to construct the `self.chat_handler` for this model. Nevertheless, `Jinja2ChatFormatter` parse the `chat template` within the Metadate with sandbox-less `jinja2.Environment`, which is furthermore rendered in `__call__` to construct the `prompt` of interaction. This allows `jinja2` Server Side Template Injection which leads to remote code execution by a carefully constructed payload.

Fediverse

Profile picture

'CVE-2024-34359 is a critical vulnerability stemming from the misuse of the Jinja2 template engine within the "llama_cpp_python" package ... The core issue arises from processing template data without proper security measures such as sandboxing, which Jinja2 supports but was not implemented in this instance. This oversight allows attackers to inject malicious templates that execute arbitrary code on the host system.

'With over 6,000 models on the HuggingFace platform ... potentially susceptible to similar vulnerabilities ... the breadth of the risk is substantial'.

Another day in OSS and software supply chains.
checkmarx.com/blog/llama-drama

  • 0
  • 0
  • 5 hours ago

CVE-2024-34351

vercel next.js

09 May 2024
Published
09 May 2024
Updated

CVSS v3.1
HIGH (7.5)
EPSS
Pending

  • 1 Post

CVE Info

Next.js is a React framework that can provide building blocks to create web applications. A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself. The required conditions are 1) Next.js is running in a self-hosted manner; 2) the Next.js application makes use of Server Actions; and 3) the Server Action performs a redirect to a relative path which starts with a `/`. This vulnerability was fixed in Next.js `14.1.1`.

Fediverse

Profile picture

Next.jsのSSRF CVE-2024-34351見てる

  • 0
  • 0
  • last hour

CVE-2024-22476

Intel(R) Neural Compressor software

16 May 2024
Published
16 May 2024
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.04%

  • 2 Posts
  • 6 Interactions

CVE Info

Improper input validation in some Intel(R) Neural Compressor software before version 2.5.0 may allow an unauthenticated user to potentially enable escalation of privilege via remote access.

Fediverse

Profile picture

10/10 critical in Neural Compressor software

Improper input validation in some Intel(R) Neural Compressor software before version 2.5.0 may allow an unauthenticated user to potentially enable escalation of privilege via remote access.

cve.mitre.org/cgi-bin/cvename.

  • 0
  • 0
  • 22 hours ago
Profile picture

Intel security advisory: Intel® Neural Compressor Software Advisory
Intel scores a perfect 10.0 CVSSv3 score (critical severity) 🥳 with CVE-2024-22476 : Improper input validation in some Intel Neural Compressor software before version 2.5.0 may allow an unauthenticated user to potentially enable escalation of privilege via remote access.
Also included is CVE-2024-21792 (4.7 medium) Time-of-check Time-of-use race condition in Intel Neural Compressor software before version 2.5.0 may allow an authenticated user to potentially enable information disclosure via local access.

No mention of exploitation. cc: @cR0w h/t: @Newk

  • 3
  • 3
  • 14 hours ago

CVE-2024-21893

KEV
Ivanti ICS

31 Jan 2024
Published
31 Jan 2024
Updated

CVSS v3.0
HIGH (8.2)
EPSS
96.36%

  • 1 Post
  • 1 Interaction

CVE Info

A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.

Fediverse

Profile picture

La nuova vulnerabilità Wi-Fi IEEE 802.11 mette a rischio miliardi di dispositivi
poliverso.org/display/0477a01e
La nuova vulnerabilità Wi-Fi IEEE 802.11 mette a rischio miliardi di dispositivi L’università belga KU Leuven ha identificato top10vpn.com/assets/2024/05/To una vulnerabilità redhotcyber.com/post/vulnerabi nello standard

  • 1
  • 0
  • 22 hours ago

CVE-2024-27956

ValvePress Automatic

21 Mar 2024
Published
29 Apr 2024
Updated

CVSS v3.1
CRITICAL (9.9)
EPSS
0.05%

  • 1 Post
  • 1 Interaction

CVE Info

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.

Fediverse

Profile picture

🚨POC RELEASED🚨WordPress Auto Admin Account Creation & Reverse Shell CVE-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server.

github.com/AiGptCode/WordPress

x.com/DarkWebInformer/status/1

  • 1
  • 0
  • 16 hours ago

CVE-2024-27834

Apple iOS and iPadOS

13 May 2024
Published
13 May 2024
Updated

CVSS
Pending
EPSS
Pending

  • 1 Post
  • 1 Interaction

CVE Info

The issue was addressed with improved checks. This issue is fixed in iOS 17.5 and iPadOS 17.5, tvOS 17.5, Safari 17.5, watchOS 10.5, macOS Sonoma 14.5. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.

Fediverse

Profile picture

Apple has released software updates to address a zero-day vulnerability in Safari.

The vulnerability is tracked as CVE-2024-27834, and when exploited, can allow an attacker to bypass security protections.

Users are advised to patch ASAP.

#cybersecurity #Apple #Safari #zeroday

bleepingcomputer.com/news/appl

  • 1
  • 0
  • 16 hours ago

CVE-2021-46873

Pending

29 Jan 2023
Published
29 Jan 2023
Updated

CVSS
Pending
EPSS
Pending

  • 1 Post
  • 6 Interactions

CVE Info

WireGuard, such as WireGuard 0.5.3 on Windows, does not fully account for the possibility that an adversary might be able to set a victim's system time to a future value, e.g., because unauthenticated NTP is used. This can lead to an outcome in which one static private key becomes permanently useless.

Fediverse

Profile picture

WireGuard CVE-2021-46873 is wild, i think this is the time for me to switch to post quantum secure protocols such as rosenpass

  • 0
  • 6
  • 17 hours ago

CVE-2024-3400

KEV
Palo Alto Networks PAN-OS

12 Apr 2024
Published
19 Apr 2024
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
95.36%

  • 1 Post

CVE Info

A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

Fediverse

Profile picture

A potential RCE (CVE-2024-3400) through Shodan/FOFA/BinaryEdge.

packetstormsecurity.com/files/

  • 0
  • 0
  • 15 hours ago

CVE-2023-52424

Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

  • 1 Post

CVE Info

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Fediverse

Profile picture

The SSID Confusion attack, tracked as CVE-2023-52424, impacts all operating systems and Wi-Fi clients, including home and mesh networks that are based on WEP, WPA3, 802.11X/EAP, and AMPE protocols. thehackernews.com/2024/05/new-

  • 0
  • 0
  • 17 hours ago

CVE-2021-30139

Pending

21 Apr 2021
Published
21 Apr 2021
Updated

CVSS
Pending
EPSS
0.10%

  • 1 Post

CVE Info

In Alpine Linux apk-tools before 2.12.5, the tarball parser allows a buffer overflow and crash.

Fediverse

Profile picture

@ariadne What about CVE-2021-30139? That's essentially an out-of-bounds read and hence a spatial memory safety violation.

  • 0
  • 0
  • 23 hours ago

CVE-2024-21792

Intel(R) Neural Compressor software

16 May 2024
Published
16 May 2024
Updated

CVSS v3.1
MEDIUM (4.7)
EPSS
Pending

  • 1 Post
  • 6 Interactions

CVE Info

Time-of-check Time-of-use race condition in Intel(R) Neural Compressor software before version 2.5.0 may allow an authenticated user to potentially enable information disclosure via local access.

Fediverse

Profile picture

Intel security advisory: Intel® Neural Compressor Software Advisory
Intel scores a perfect 10.0 CVSSv3 score (critical severity) 🥳 with CVE-2024-22476 : Improper input validation in some Intel Neural Compressor software before version 2.5.0 may allow an unauthenticated user to potentially enable escalation of privilege via remote access.
Also included is CVE-2024-21792 (4.7 medium) Time-of-check Time-of-use race condition in Intel Neural Compressor software before version 2.5.0 may allow an authenticated user to potentially enable information disclosure via local access.

No mention of exploitation. cc: @cR0w h/t: @Newk

  • 3
  • 3
  • 14 hours ago

CVE-2024-4947

Google Chrome

15 May 2024
Published
15 May 2024
Updated

CVSS
Pending
EPSS
0.04%

  • 1 Post

CVE Info

Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

Fediverse

Profile picture

@browserversiontracker @ruario
For context, Microsoft Edge was updated against the 4 Chromium vulnerabilities patched Wednesday night:

Release notes for Microsoft Edge Security Updates:

Microsoft has a fix for CVE-2024-4947 to Microsoft Edge Stable Channel (Version 124.0.2478.109) and Extended Stable channel (Version 124.0.2478.109), which has been reported by the Chromium team as having an exploit in the wild.

  • 0
  • 0
  • 17 hours ago

CVE-2024-4948

Google Chrome

15 May 2024
Published
15 May 2024
Updated

CVSS
Pending
EPSS
0.04%

  • 1 Post

CVE Info

Use after free in Dawn in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Fediverse

Profile picture

@browserversiontracker @ruario
For context, Microsoft Edge was updated against the 4 Chromium vulnerabilities patched Wednesday night:

Release notes for Microsoft Edge Security Updates:

Microsoft has a fix for CVE-2024-4947 to Microsoft Edge Stable Channel (Version 124.0.2478.109) and Extended Stable channel (Version 124.0.2478.109), which has been reported by the Chromium team as having an exploit in the wild.

  • 0
  • 0
  • 17 hours ago

CVE-2024-4950

Google Chrome

15 May 2024
Published
15 May 2024
Updated

CVSS
Pending
EPSS
0.04%

  • 1 Post

CVE Info

Inappropriate implementation in Downloads in Google Chrome prior to 125.0.6422.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)

Fediverse

Profile picture

@browserversiontracker @ruario
For context, Microsoft Edge was updated against the 4 Chromium vulnerabilities patched Wednesday night:

Release notes for Microsoft Edge Security Updates:

Microsoft has a fix for CVE-2024-4947 to Microsoft Edge Stable Channel (Version 124.0.2478.109) and Extended Stable channel (Version 124.0.2478.109), which has been reported by the Chromium team as having an exploit in the wild.

  • 0
  • 0
  • 17 hours ago

CVE-2024-4949

Google Chrome

15 May 2024
Published
15 May 2024
Updated

CVSS
Pending
EPSS
0.04%

  • 1 Post

CVE Info

Use after free in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

Fediverse

Profile picture

@browserversiontracker @ruario
For context, Microsoft Edge was updated against the 4 Chromium vulnerabilities patched Wednesday night:

Release notes for Microsoft Edge Security Updates:

Microsoft has a fix for CVE-2024-4947 to Microsoft Edge Stable Channel (Version 124.0.2478.109) and Extended Stable channel (Version 124.0.2478.109), which has been reported by the Chromium team as having an exploit in the wild.

  • 0
  • 0
  • 17 hours ago