Snapshot
March 30, 2024 - April 5, 2024
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2024-29748 | Android Pixel contains a privilege escalation vulnerability that allows an attacker to interrupt a factory reset triggered by a device admin app. | N/A | Android | April 4, 2024 |
CVE-2024-29745 | Android Pixel contains an information disclosure vulnerability in the fastboot firmware used to support unlocking, flashing, and locking affected devices. | N/A | Android | April 4, 2024 |
Newswires |
||||
Ivanti Patches High-Risk Vulnerabilities in VPN Gateways
Ivanti, a company specializing in IT security software, has released patches to address several vulnerabilities in its Connect Secure and Policy Secure gateways. |
April 3, 2024 |
|||
Google Addresses Additional Chrome Zero-Day Exploited at Pwn2Own
Google has patched a zero-day vulnerability in its Chrome browser, CVE-2024-3159, discovered during last month's Pwn2Own hacking contest. |
April 3, 2024 |
|||
Google Patches Two Zero-Day Vulnerabilities in Pixel Phones Exploited by Forensic Firms
Google has rectified two zero-day vulnerabilities in its Pixel smartphones that were being exploited by forensic companies to unlock phones and access their data. |
April 3, 2024 |
|||
Mispadu Banking Trojan Spreads Across Europe, Compromising Thousands of Credentials
The Mispadu banking Trojan, also known as URSA, has expanded its operations from Latin America and Spanish-speaking individuals to include targets in Italy, Poland, and Sweden. |
April 3, 2024 |
|||
Binarly Introduces Free Online Scanner to Detect Linux Backdoor
Binarly has rolled out a free online tool to scan for Linux executables impacted by the XZ Utils supply chain attack, tracked as CVE-2024-3094. |
April 2, 2024 |
|||
Malicious Code in XZ Utils for Linux Enables Remote Code Execution
A new report has shed light on a significant security threat to Linux systems. |
April 2, 2024 |
|||
Intricate Supply Chain Attack Implants Backdoor in XZ Utils
A newly discovered backdoor in XZ Utils, a data compression utility found in nearly all Linux distributions, has renewed concerns about software-supply chain security. |
April 1, 2024 |
|||
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2024-3094 (13) | Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. | CRITICAL | Tukaani |
Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-2879 (4) | The LayerSlider plugin for WordPress is vulnerable to SQL Injection via the ls_get_popup_markup action in versions 7.9.11 and... | CRITICAL |
Actively Exploited Remote Code Execution Public Exploits Available |
|
CVE-2024-0519 (2) | Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit h... | HIGH |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
|
CVE-2023-46805 (3) | An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote ... | HIGH | Ivanti |
CISA Known Exploited Remote Code Execution Public Exploits Available |
CVE-2024-2887 (3) | Type Confusion in WebAssembly in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to execute arbitrary code via... | N/A | Risk Context N/A | |
CVE-2024-2886 (3) | Use after free in WebCodecs in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to perform arbitrary read/write... | N/A | Risk Context N/A |
CISA Known Exploited Vulnerabilities
CISA added two vulnerabilities to the known exploited vulnerabilities list.
Android — Pixel |
CVE-2024-29748 / Added: April 4, 2024 |
CVSS Not Assigned |
Android Pixel contains a privilege escalation vulnerability that allows an attacker to interrupt a factory reset triggered by a device admin app. |
Headlines
|
Android — Pixel |
CVE-2024-29745 / Added: April 4, 2024 |
CVSS Not Assigned |
Android Pixel contains an information disclosure vulnerability in the fastboot firmware used to support unlocking, flashing, and locking affected devices. |
Headlines
|
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2024-3094 |
CRITICAL CVSS 10.00 EPSS Score 0.08 EPSS Percentile 32.77 |
Actively Exploited Remote Code Execution Public Exploits Available |
Published: March 29, 2024 |
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library. |
Vendor Impacted: Tukaani |
Product Impacted: Xz |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-2879 |
CRITICAL CVSS 9.80 EPSS Score 0.04 EPSS Percentile 7.64 |
Actively Exploited Remote Code Execution Public Exploits Available |
Published: April 3, 2024 |
The LayerSlider plugin for WordPress is vulnerable to SQL Injection via the ls_get_popup_markup action in versions 7.9.11 and 7.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-0519 |
HIGH CVSS 8.80 EPSS Score 0.18 EPSS Percentile 54.30 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 16, 2024 |
Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
Vendor Impacted: Google |
Products Impacted: Chrome, Chromium V8 |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2023-46805 |
HIGH CVSS 8.20 EPSS Score 96.43 EPSS Percentile 99.55 |
CISA Known Exploited Remote Code Execution Public Exploits Available |
Published: Jan. 12, 2024 |
An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks. |
Vendor Impacted: Ivanti |
Products Impacted: Connect Secure And Policy Secure, Connect Secure, Policy Secure |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-2887 |
CVSS Not Assigned EPSS Score 0.04 EPSS Percentile 13.37 |
Risk Context N/A |
Published: March 26, 2024 |
Type Confusion in WebAssembly in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-2886 |
CVSS Not Assigned EPSS Score 0.04 EPSS Percentile 13.37 |
Risk Context N/A |
Published: March 26, 2024 |
Use after free in WebCodecs in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High) |
Quotes
|
Headlines |
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.