Snapshot
Sept. 28, 2024 - Oct. 4, 2024
CISA Known Exploited Vulnerabilities |
||||
---|---|---|---|---|
CVE | Summary | Severity | Vendor | Date Added |
CVE-2024-45519 | Synacor Zimbra Collaboration contains an unspecified vulnerability in the postjournal service that may allow an unauthenticated user to execute commands. | CRITICAL | Synacor | Oct. 3, 2024 |
CVE-2024-29824 | Ivanti Endpoint Manager (EPM) contains a SQL injection vulnerability in Core server that allows an unauthenticated attacker within the same network to execute arbitrary code. | HIGH | Ivanti | Oct. 2, 2024 |
CVE-2019-0344 | SAP Commerce Cloud (formerly known as Hybris) contains a deserialization of untrusted data vulnerability within the mediaconversion and virtualjdbc extension that allows for code injection. | CRITICAL | SAP | Sept. 30, 2024 |
CVE-2020-15415 | DrayTek Vigor3900, Vigor2960, and Vigor300B devices contain an OS command injection vulnerability in cgi-bin/mainfunction.cgi/cvmcfgupload that allows for remote code execution via shell metacharacters in a filename when the text/x-python-script content type is used. | CRITICAL | DrayTek | Sept. 30, 2024 |
CVE-2023-25280 | D-Link DIR-820 routers contain an OS command injection vulnerability that allows a remote, unauthenticated attacker to escalate privileges to root via a crafted payload with the ping_addr parameter to ping.ccp. | CRITICAL | D-Link | Sept. 30, 2024 |
CVE-2021-4043 | Motion Spell GPAC contains a null pointer dereference vulnerability that could allow a local attacker to cause a denial-of-service (DoS) condition. | MEDIUM | Motion Spell | Sept. 30, 2024 |
Newswires |
||||
CosmicSting Attacks Compromise Over 4,000 Adobe Commerce and Magento Stores
Adobe Commerce and Magento online stores are facing a wave of 'CosmicSting' attacks, with threat actors successfully compromising approximately 5% of all stores. |
Oct. 3, 2024 |
|||
Cloudflare Successfully Thwarts Record-Breaking 3.8 Tbps DDoS Attack
Cloudflare, the web infrastructure and security company, has recently mitigated a Distributed Denial of Service (DDoS) attack that peaked at an unprecedented 3.8 terabits per second (Tbps), the largest ever publicly disclosed. |
Oct. 3, 2024 |
|||
Pervasive 'perfctl' Fileless Malware Threatens Millions of Linux Servers Globally
The 'perfctl' malware, also known as perfcc, has been plaguing Linux servers across the globe for years, implementing cryptomining and proxyjacking malware. |
Oct. 3, 2024 |
|||
Critical Ivanti Vulnerability Actively Exploited, CISA Issues Warning
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about an actively exploited, critical vulnerability in Ivanti's Endpoint Manager (EPM) appliances. |
Oct. 2, 2024 |
|||
Over 700,000 DrayTek Routers Vulnerable to New Security Flaws
Researchers from Forescout have uncovered 14 new vulnerabilities in routers manufactured by DrayTek. |
Oct. 2, 2024 |
|||
Critical Security Flaws Detected in Optigo Networks ONS-S8 Aggregation Switch
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about two critical vulnerabilities present in Optigo Networks ONS-S8 Aggregation Switch products. |
Oct. 2, 2024 |
|||
Zimbra Email Servers Under Attack: Active Exploitation of Critical RCE Flaw
Hackers have found a way to exploit a recently revealed remote code execution (RCE) vulnerability in Zimbra email servers. |
Oct. 2, 2024 |
|||
CosmicSting Exploit Targets Adobe Commerce and Magento Stores, Impacting 5% of All Stores
Cybersecurity researchers have revealed that a security vulnerability, dubbed CosmicSting, has been exploited by malicious actors, resulting in the compromise of 5% of all Adobe Commerce and Magento stores. |
Oct. 2, 2024 |
|||
Critical Vulnerabilities in Tank Gauge Systems Could Lead to Remote Attacks
Critical security vulnerabilities have been identified in six different Automatic Tank Gauge (ATG) systems from five manufacturers. |
Sept. 30, 2024 |
|||
Critical Vulnerability in NVIDIA Container Toolkit Allows Complete Host System Control
A severe security vulnerability has been identified in the NVIDIA Container Toolkit. |
Sept. 29, 2024 |
|||
Vulnerabilities In The News |
||||
CVE | Summary | Severity | Vendor | Risk Context |
CVE-2024-45519 (9) | The postjournal service in Zimbra Collaboration before 8.8.15 Patch 46, 9 before 9.0.0 Patch 41, 10 before 10.0.9, and 10.1 ... | CRITICAL | Zimbra, Synacor |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-47177 (3) | CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for C... | CRITICAL |
Remote Code Execution Public Exploits Available |
|
CVE-2024-29824 (5) | An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker... | HIGH | Ivanti |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-47175 (4) | CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. | HIGH |
Remote Code Execution |
|
CVE-2024-47076 (4) | CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `... | HIGH |
Remote Code Execution Public Exploits Available |
|
CVE-2024-0132 (4) | NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use vulnerability when used with default configu... | HIGH | Linux, Nvidia |
Actively Exploited Remote Code Execution |
CVE-2024-2961 (3) | The iconv function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes ... | HIGH |
Actively Exploited Remote Code Execution Public Exploits Available |
|
CVE-2021-4043 (6) | NULL Pointer Dereference in GitHub repository gpac/gpac prior to 1.1.0. | MEDIUM | Motion Spell, Gpac, Debian |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
CVE-2024-47176 (4) | CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including,... | MEDIUM |
Remote Code Execution Public Exploits Available |
CISA Known Exploited Vulnerabilities
CISA added six vulnerabilities to the known exploited vulnerabilities list.
Ivanti — Endpoint Manager (EPM) |
CVE-2024-29824 / Added: Oct. 2, 2024 |
HIGH CVSS 8.80 EPSS Score 2.17 EPSS Percentile 89.57 |
Ivanti Endpoint Manager (EPM) contains a SQL injection vulnerability in Core server that allows an unauthenticated attacker within the same network to execute arbitrary code. |
Headlines
|
SAP — Commerce Cloud |
CVE-2019-0344 / Added: Sept. 30, 2024 |
CRITICAL CVSS 9.80 EPSS Score 21.36 EPSS Percentile 96.52 |
SAP Commerce Cloud (formerly known as Hybris) contains a deserialization of untrusted data vulnerability within the mediaconversion and virtualjdbc extension that allows for code injection. |
Headlines |
DrayTek — Multiple Vigor Routers |
CVE-2020-15415 / Added: Sept. 30, 2024 |
CRITICAL CVSS 9.80 EPSS Score 94.31 EPSS Percentile 99.25 |
DrayTek Vigor3900, Vigor2960, and Vigor300B devices contain an OS command injection vulnerability in cgi-bin/mainfunction.cgi/cvmcfgupload that allows for remote code execution via shell metacharacters in a filename when the text/x-python-script content type is used. |
Headlines
|
D-Link — DIR-820 Router |
CVE-2023-25280 / Added: Sept. 30, 2024 |
CRITICAL CVSS 9.80 EPSS Score 2.15 EPSS Percentile 89.52 |
D-Link DIR-820 routers contain an OS command injection vulnerability that allows a remote, unauthenticated attacker to escalate privileges to root via a crafted payload with the ping_addr parameter to ping.ccp. |
Headlines |
In The News
Vulnerabilities receiving the most attention in traditional news media.
CVE-2024-45519 |
CRITICAL CVSS 9.80 EPSS Score 0.05 EPSS Percentile 22.67 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Oct. 2, 2024 |
The postjournal service in Zimbra Collaboration (ZCS) before 8.8.15 Patch 46, 9 before 9.0.0 Patch 41, 10 before 10.0.9, and 10.1 before 10.1.1 sometimes allows unauthenticated users to execute commands. |
Vendors Impacted: Zimbra, Synacor |
Products Impacted: Collaboration, Zimbra Collaboration |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-47177 |
CRITICAL CVSS 9.00 EPSS Score 0.04 EPSS Percentile 10.95 |
Remote Code Execution Public Exploits Available |
Published: Sept. 26, 2024 |
CUPS is a standards-based, open-source printing system, and cups-filters provides backends, filters, and other software for CUPS 2.x to use on non-Mac OS systems. Any value passed to `FoomaticRIPCommandLine` via a PPD file will be executed as a user controlled command. When combined with other logic bugs as described in CVE_2024-47176, this can lead to remote command execution. |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-29824 |
HIGH CVSS 8.80 EPSS Score 2.17 EPSS Percentile 89.57 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: May 31, 2024 |
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code. |
Vendor Impacted: Ivanti |
Products Impacted: Endpoint Manager (Epm), Endpoint Manager |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-47175 |
HIGH CVSS 8.60 EPSS Score 0.04 EPSS Percentile 14.87 |
Remote Code Execution |
Published: Sept. 26, 2024 |
CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176. |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-47076 |
HIGH CVSS 8.60 EPSS Score 0.04 EPSS Percentile 14.87 |
Remote Code Execution Public Exploits Available |
Published: Sept. 26, 2024 |
CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system. |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2024-0132 |
HIGH CVSS 8.30 EPSS Score 0.09 EPSS Percentile 39.65 |
Actively Exploited Remote Code Execution |
Published: Sept. 26, 2024 |
NVIDIA Container Toolkit 1.16.1 or earlier contains a Time-of-check Time-of-Use (TOCTOU) vulnerability when used with default configuration where a specifically crafted container image may gain access to the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering. |
Vendors Impacted: Linux, Nvidia |
Products Impacted: Nvidia Gpu Operator, Linux Kernel, Nvidia Container Toolkit |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-2961 |
HIGH CVSS 7.30 EPSS Score 0.05 EPSS Percentile 17.78 |
Actively Exploited Remote Code Execution Public Exploits Available |
Published: April 17, 2024 |
The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable. |
Quotes
|
Headlines |
Back to top ↑ |
CVE-2021-4043 |
MEDIUM CVSS 5.50 EPSS Score 0.91 EPSS Percentile 83.11 |
CISA Known Exploited Actively Exploited Remote Code Execution Public Exploits Available |
Published: Feb. 4, 2022 |
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 1.1.0. |
Vendors Impacted: Motion Spell, Gpac, Debian |
Products Impacted: Debian Linux, Gpac |
Quotes
|
Headlines
|
Back to top ↑ |
CVE-2024-47176 |
MEDIUM CVSS 5.30 EPSS Score 0.06 EPSS Percentile 27.66 |
Remote Code Execution Public Exploits Available |
Published: Sept. 26, 2024 |
CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to. |
Quotes
|
Headlines |
Back to top ↑ |
Accelerate Security Teams
Schedule a free consultation with a vulnerability expert to discuss your use cases and to see a demo.