Snapshot
Nov. 18, 2023 - Nov. 24, 2023
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2023-4911 | GNU C Library's dynamic loader ld.so contains a buffer overflow vulnerability when processing the GLIBC_TUNABLES environment variable, allowing a local attacker to execute code with elevated privileges. | HIGH | GNU | Nov. 21, 2023 |
Newswires |
||||
Critical Security Flaws in ownCloud File Sharing App Could Expose Admin Passwords
The open-source file sharing software, ownCloud, recently announced three critical security vulnerabilities. |
Nov. 24, 2023 |
|||
Critical Microsoft Excel Vulnerability Exposed: Details on CVE-2023-36041
Cisco Talos, a renowned intelligence group, recently revealed a critical vulnerability in Microsoft Excel, a tool that is extensively used for data management and analysis. |
Nov. 24, 2023 |
|||
Welltok Data Breach Affects 8.5 Million Patients: A Result of MOVEit Transfer Software Vulnerability
Welltok, a company offering health optimization solutions, has disclosed a data breach that has affected approximately 8.5 million patients in the U.S. |
Nov. 23, 2023 |
|||
Data Breach at AutoZone: 185,000 Customers Impacted by MOVEit Hack
AutoZone, a leading automobile parts retailer with over 7,000 stores across the Americas, has disclosed a data breach that affected approximately 185,000 individuals. |
Nov. 22, 2023 |
|||
Urgent Warnings Issued on CitrixBleed Exploitation by LockBit Ransomware Gang
The exploitation of a critical vulnerability in Citrix's NetScaler product has led to urgent warnings from Citrix and various government agencies in the US and Australia. |
Nov. 22, 2023 |
|||
Visual Studio Code RCE Vulnerability (CVE-2023-36742): Public PoC Exploit Revealed
Researchers have unveiled the specifics of a remote code execution vulnerability (CVE-2023-36742, CVSS score of 7.8) in Visual Studio Code, along with a public proof-of-concept (PoC) exploit. |
Nov. 22, 2023 |
|||
Public Release of PoC Exploit for Critical Windows Defender Bypass
A PoC exploit is now publicly available for a critical zero-day vulnerability in Windows SmartScreen technology. |
Nov. 21, 2023 |
|||
CISA Mandates Federal Agencies to Address 'Looney Tunables' Linux Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a directive to federal agencies, instructing them to secure their systems against a vulnerability that is currently being exploited in major Linux distributions. |
Nov. 21, 2023 |
|||
Critical Security Flaw Detected in WAGO Industrial Managed Switch
A critical security flaw, designated as CVE-2023-4149, has been identified in the WAGO Industrial Managed Switch. |
Nov. 21, 2023 |
|||
Citrix Urges Administrators to Terminate NetScaler User Sessions Amidst Hacker Threats
Citrix has issued a reminder to administrators that, in addition to applying necessary security updates to their NetScaler appliances, they must also terminate all previous and active user sessions to secure their devices against attacks. |
Nov. 21, 2023 |
|||
Windows Zero-Day CVE-2023-36025 Vulnerability: PoC Exploit Published by Researchers
Researchers have reverse-engineered a patch issued by Microsoft to create a proof-of-concept (PoC) exploit for the CVE-2023-36025 vulnerability. |
Nov. 21, 2023 |
|||
Delays in Updating Known Exploited Vulnerabilities (KEV) Catalog Pose Risks
On October 10, the Cybersecurity and Infrastructure Security Agency (CISA) added five known software flaws to its Known Exploited Vulnerabilities (KEV) catalog. |
Nov. 20, 2023 |
|||
CISA Issues Cybersecurity Guidelines for Healthcare and Public Health Entities
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a new Mitigation Guide aimed at assisting healthcare and public health (HPH) organizations in understanding and addressing cyber threats and risks. |
Nov. 20, 2023 |
|||
Kinsing Malware Exploits Apache ActiveMQ Flaw to Attack Linux Systems
Trend Micro's cybersecurity researchers have recently discovered an active exploitation of a critical flaw in Apache ActiveMQ, identified as CVE-2023-46604. |
Nov. 20, 2023 |
|||
Russian APT29 Group Exploits WinRAR Vulnerability and Ngrok Feature in Cyberattacks
APT29, another Russian state-sponsored hacker group, is launching cyberattacks using the CVE-2023-38831 vulnerability in WinRAR. |
Nov. 19, 2023 |
|||
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2023-49103 (2) | An issue was discovered in ownCloud owncloud/graphapi 0.2.x before 0.2.1 and 0.3.x before 0.3.1. | CRITICAL |
Remote Code Execution Public Exploits Available |
|
CVE-2023-46604 (6) | The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. | CRITICAL | Apache |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
CVE-2023-34048 (3) | vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. | CRITICAL | Vmware |
Remote Code Execution Public Exploits Available |
CVE-2023-34362 (3) | In Progress MOVEit Transfer before 2021.0.6 , 2021.1.4 , 2022.0.4 , 2022.1.5 , and 2023.0.1 , a SQL injection vulnerability h... | CRITICAL | Progress |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
CVE-2022-1471 (2) | SnakeYaml's Constructor class does not restrict types which can be instantiated during deserialization. | CRITICAL | Snakeyaml Project |
Remote Code Execution Public Exploits Available |
CVE-2023-36025 (3) | Windows SmartScreen Security Feature Bypass Vulnerability | HIGH | Microsoft |
CISA Known Exploited Actively Exploited Public Exploits Available |
CVE-2023-4911 (5) | A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment ... | HIGH | Gnu, Fedoraproject, Redhat |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2023-38831 (4) | RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. | HIGH | Rarlab |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2017-11882 (2) | Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microso... | HIGH | Microsoft |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2023-4966 (10) | Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway or AAA virtual server. | HIGH | Citrix |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
CISA Known Exploited Vulnerabilities
CISA added one vulnerability to the known exploited vulnerabilities list.
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2023-49103 |
CRITICAL CVSS 10.00 EPSS Score 0.92 EPSS Percentile 81.07 |
Remote Code Execution Public Exploits Available |
Published: Nov. 21, 2023 |
An issue was discovered in ownCloud owncloud/graphapi 0.2.x before 0.2.1 and 0.3.x before 0.3.1. The graphapi app relies on a third-party GetPhpInfo.php library that provides a URL. When this URL is accessed, it reveals the configuration details of the PHP environment (phpinfo). This information includes all the environment variables of the webserver. In containerized deployments, these environment variables may include sensitive data such as the ownCloud admin password, mail server credentials, and license key. Simply disabling the graphapi app does not eliminate the vulnerability. Additionally, phpinfo exposes various other potentially sensitive configuration details that could be exploited by an attacker to gather information about the system. Therefore, even if ownCloud is not running in a containerized environment, this vulnerability should still be a cause for concern. Note that Docker containers from before February 2023 are not vulnerable to the credential disclosure. |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2023-46604 |
CRITICAL CVSS 9.80 EPSS Score 96.65 EPSS Percentile 99.53 |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
Published: Oct. 27, 2023 |
The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users are recommended to upgrade both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3 which fixes this issue. |
Vendor Impacted: Apache |
Products Impacted: Activemq Legacy Openwire Module, Activemq |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-34048 |
CRITICAL CVSS 9.80 EPSS Score 0.17 EPSS Percentile 53.31 |
Remote Code Execution Public Exploits Available |
Published: Oct. 25, 2023 |
vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution. |
Vendor Impacted: Vmware |
Product Impacted: Vcenter Server |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2023-34362 |
CRITICAL CVSS 9.80 EPSS Score 92.84 EPSS Percentile 98.78 |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
Published: June 2, 2023 |
In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions. |
Vendor Impacted: Progress |
Products Impacted: Moveit Cloud, Moveit Transfer |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2022-1471 |
CRITICAL CVSS 9.80 EPSS Score 0.42 EPSS Percentile 71.27 |
Remote Code Execution Public Exploits Available |
Published: Dec. 1, 2022 |
SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond. |
Vendor Impacted: Snakeyaml Project |
Product Impacted: Snakeyaml |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2023-36025 |
HIGH CVSS 8.80 EPSS Score 0.79 EPSS Percentile 79.59 |
CISA Known Exploited Actively Exploited Public Exploits Available |
Published: Nov. 14, 2023 |
Windows SmartScreen Security Feature Bypass Vulnerability |
Vendor Impacted: Microsoft |
Products Impacted: Windows, Windows 10 22h2, Windows 11 22h2, Windows Server 2022, Windows 10 1607, Windows 11 23h2, Windows Server 2016, Windows Server 2008, Windows 10 1809, Windows 10 1507, Windows 10 21h2, Windows Server 2019, Windows Server 2012, Windows 11 21h2 |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2023-4911 |
HIGH CVSS 7.80 EPSS Score 1.81 EPSS Percentile 86.79 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Oct. 3, 2023 |
A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges. |
Vendors Impacted: Gnu, Fedoraproject, Redhat |
Products Impacted: Virtualization, Glibc, Fedora, Gnu C Library, Enterprise Linux |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2023-38831 |
HIGH CVSS 7.80 EPSS Score 23.40 EPSS Percentile 96.09 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Aug. 23, 2023 |
RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023. |
Vendor Impacted: Rarlab |
Product Impacted: Winrar |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2017-11882 |
HIGH CVSS 7.80 EPSS Score 97.42 EPSS Percentile 99.92 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Nov. 15, 2017 |
Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884. |
Vendor Impacted: Microsoft |
Product Impacted: Office |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2023-4966 |
HIGH CVSS 7.50 EPSS Score 92.27 EPSS Percentile 98.71 |
CISA Known Exploited Actively Exploited Remote Code Execution Used In Ransomware Public Exploits Available |
Published: Oct. 10, 2023 |
Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. |
Vendor Impacted: Citrix |
Products Impacted: Netscaler Adc And Netscaler Gateway, Netscaler Gateway, Netscaler Application Delivery Controller |
Quotes
|
Headlines
|
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.