This weekly blog post is from via our unique intelligence collection pipelines. We are your eyes and ears online, including the Dark Web.
There are thousands of vulnerability discussions each week. SOS Intelligence gathers a list of the most discussed Common Vulnerabilities and Exposures (CVE) online for the previous week.
We make every effort to ensure the accuracy of the data presented. As this is an automated process some errors may creep in.
If you are feeling generous please do make us aware of anything you spot, feel free to follow us on Twitter @sosintel and DM us. Thank you!
1. CVE-2023-41265
An HTTP Request Tunneling vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows a remote attacker to elevate their privilege by tunneling HTTP requests in the raw HTTP request. This allows them to send requests that get executed by the backend server hosting the repository application. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13.
https://nvd.nist.gov/vuln/detail/CVE-2023-41265
2. CVE-2024-21893
A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.
https://nvd.nist.gov/vuln/detail/CVE-2024-21893
3. CVE-2024-0519
Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://nvd.nist.gov/vuln/detail/CVE-2024-0519
4. CVE-2023-6548
Improper Control of Generation of Code (‘Code Injection’) in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface.
https://nvd.nist.gov/vuln/detail/CVE-2023-6548
5. CVE-2023-2551
PHP Remote File Inclusion in GitHub repository unilogies/bumsys prior to 2.1.1.
https://nvd.nist.gov/vuln/detail/CVE-2023-2551
6. CVE-2024-3273
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
https://nvd.nist.gov/vuln/detail/CVE-2024-3273
7. CVE-2024-29049
Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2024-29049
8. CVE-2024-29981
Microsoft Edge (Chromium-based) Spoofing Vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2024-29981
9. CVE-2022-21990
Remote Desktop Client Remote Code Execution Vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2022-21990
10. CVE-2024-21413
Microsoft Outlook Remote Code Execution Vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2024-21413
Recent Comments