Snapshot
March 23, 2024 - March 29, 2024
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2023-24955 | Microsoft SharePoint Server contains a code injection vulnerability that allows an authenticated attacker with Site Owner privileges to execute code remotely. | HIGH | Microsoft | March 26, 2024 |
CVE-2019-7256 | Nice Linear eMerge E3-Series contains an OS command injection vulnerability that allows an attacker to conduct remote code execution. | CRITICAL | Nice | March 25, 2024 |
CVE-2021-44529 | Ivanti Endpoint Manager Cloud Service Appliance (EPM CSA) contains a code injection vulnerability that allows an unauthenticated user to execute malicious code with limited permissions (nobody). | CRITICAL | Ivanti | March 25, 2024 |
CVE-2023-48788 | Fortinet FortiClient EMS contains a SQL injection vulnerability that allows an unauthenticated attacker to execute commands as SYSTEM via specifically crafted requests. | CRITICAL | Fortinet | March 25, 2024 |
Newswires |
||||
TeamCity Patches 26 Security Flaws, Implements Semi-Automatic Updates
JetBrains has recently rectified 26 security vulnerabilities in its TeamCity build management and continuous integration server. |
March 29, 2024 |
|||
Google Patches Chrome Zero-Days Exposed at Pwn2Own 2024
Google has addressed seven security vulnerabilities in its Chrome web browser, which includes two zero-day exploits revealed during the Pwn2Own Vancouver 2024 hacking competition. |
March 27, 2024 |
|||
CISA Reports Exploitation of Second SharePoint Flaw Revealed at Pwn2Own
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has reported that a second SharePoint flaw, uncovered during the Pwn2Own hacking competition last year, is currently being exploited. |
March 27, 2024 |
|||
Apple Releases Details on Security Bug Allowing Remote Code Execution
Apple has recently shed light on the security updates it quietly rolled out last week for iOS and iPadOS 17.4.1. |
March 26, 2024 |
|||
German Cybersecurity Authority Raises Alarm Over 17K Vulnerable Microsoft Exchange Servers
The German Federal Office for Information Security (BSI) has identified a significant security concern, with approximately 17,000 Microsoft Exchange servers in Germany found to be exposed online and vulnerable to one or more critical security vulnerabilities. |
March 26, 2024 |
|||
ShadowRay: Hackers Exploit Unpatched Ray Framework Vulnerability to Breach Servers
Hackers have found a way to exploit an unpatched vulnerability in Ray, a widely-used open-source AI framework, to gain unauthorized access to servers and hijack their resources. |
March 26, 2024 |
|||
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2024-3094 (5) | Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. | CRITICAL |
Remote Code Execution Public Exploits Available |
|
CVE-2023-29357 (5) | Microsoft SharePoint Server Elevation of Privilege Vulnerability | CRITICAL | Microsoft |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2023-48022 (4) | Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. | CRITICAL | Anyscale |
Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-21410 (3) | Microsoft Exchange Server Elevation of Privilege Vulnerability | CRITICAL | Microsoft |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2023-24955 (6) | Microsoft SharePoint Server Remote Code Execution Vulnerability | HIGH | Microsoft |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-29944 (4) | An attacker was able to inject an event handler into a privileged object that would allow arbitrary JavaScript execution in t... | N/A | Risk Context N/A | |
CVE-2024-29943 (4) | An attacker was able to perform an out-of-bounds read or write on a JavaScript object by fooling range-based bounds check eli... | N/A | Risk Context N/A | |
CVE-2024-28085 (3) | wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other use... | N/A |
Actively Exploited Public Exploits Available |
|
CVE-2024-2887 (3) | Type Confusion in WebAssembly in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to execute arbitrary code via... | N/A | Risk Context N/A | |
CVE-2024-2886 (3) | Use after free in WebCodecs in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to perform arbitrary read/write... | N/A | Risk Context N/A |
CISA Known Exploited Vulnerabilities
CISA added four vulnerabilities to the known exploited vulnerabilities list.
Nice — Linear eMerge E3-Series |
CVE-2019-7256 / Added: March 25, 2024 |
CRITICAL CVSS 10.00 EPSS Score 97.45 EPSS Percentile 99.95 |
Nice Linear eMerge E3-Series contains an OS command injection vulnerability that allows an attacker to conduct remote code execution. |
Headlines |
Ivanti — Endpoint Manager Cloud Service Appliance (EPM CSA) |
CVE-2021-44529 / Added: March 25, 2024 |
CRITICAL CVSS 9.80 EPSS Score 96.89 EPSS Percentile 99.69 |
Ivanti Endpoint Manager Cloud Service Appliance (EPM CSA) contains a code injection vulnerability that allows an unauthenticated user to execute malicious code with limited permissions (nobody). |
Headlines
|
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2024-3094 |
CRITICAL CVSS 10.00 |
Remote Code Execution Public Exploits Available |
Published: March 29, 2024 |
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-29357 |
CRITICAL CVSS 9.80 EPSS Score 48.40 EPSS Percentile 97.41 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: June 14, 2023 |
Microsoft SharePoint Server Elevation of Privilege Vulnerability |
Vendor Impacted: Microsoft |
Product Impacted: Sharepoint Server |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-48022 |
CRITICAL CVSS 9.80 EPSS Score 0.32 EPSS Percentile 70.02 |
Actively Exploited Remote Code Execution Public Exploits Available |
Published: Nov. 28, 2023 |
Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment |
Vendor Impacted: Anyscale |
Product Impacted: Ray |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-21410 |
CRITICAL CVSS 9.80 EPSS Score 1.86 EPSS Percentile 88.11 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Feb. 13, 2024 |
Microsoft Exchange Server Elevation of Privilege Vulnerability |
Vendor Impacted: Microsoft |
Product Impacted: Exchange Server |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2023-24955 |
HIGH CVSS 7.20 EPSS Score 34.44 EPSS Percentile 97.00 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: May 9, 2023 |
Microsoft SharePoint Server Remote Code Execution Vulnerability |
Vendor Impacted: Microsoft |
Products Impacted: Sharepoint Server, Sharepoint Enterprise Server |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-29944 |
CVSS Not Assigned EPSS Score 0.04 EPSS Percentile 13.25 |
Risk Context N/A |
Published: March 22, 2024 |
An attacker was able to inject an event handler into a privileged object that would allow arbitrary JavaScript execution in the parent process. Note: This vulnerability affects Desktop Firefox only, it does not affect mobile versions of Firefox. This vulnerability affects Firefox < 124.0.1 and Firefox ESR < 115.9.1. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-29943 |
CVSS Not Assigned EPSS Score 0.04 EPSS Percentile 7.53 |
Risk Context N/A |
Published: March 22, 2024 |
An attacker was able to perform an out-of-bounds read or write on a JavaScript object by fooling range-based bounds check elimination. This vulnerability affects Firefox < 124.0.1. |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-28085 |
CVSS Not Assigned EPSS Score 0.04 EPSS Percentile 13.25 |
Actively Exploited Public Exploits Available |
Published: March 27, 2024 |
wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover. |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-2887 |
CVSS Not Assigned EPSS Score 0.04 EPSS Percentile 13.25 |
Risk Context N/A |
Published: March 26, 2024 |
Type Confusion in WebAssembly in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-2886 |
CVSS Not Assigned EPSS Score 0.04 EPSS Percentile 13.25 |
Risk Context N/A |
Published: March 26, 2024 |
Use after free in WebCodecs in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High) |
Quotes
|
Headlines |
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.