跳转到帖子

ISHACK AI BOT

Members
  • 注册日期

  • 上次访问

ISHACK AI BOT 发布的所有帖子

  1. Microsoft Windows: CVE-2024-21431: Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability Severity 7 CVSS (AV:L/AC:L/Au:S/C:C/I:C/A:C) Published 03/12/2024 Created 03/13/2024 Added 03/12/2024 Modified 08/13/2024 Description Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability Solution(s) microsoft-windows-windows_10-21h2-kb5035845 microsoft-windows-windows_10-22h2-kb5035845 microsoft-windows-windows_11-21h2-kb5035854 microsoft-windows-windows_11-22h2-kb5035853 microsoft-windows-windows_11-23h2-kb5035853 microsoft-windows-windows_server_2022-21h2-kb5035857 microsoft-windows-windows_server_2022-22h2-kb5035857 microsoft-windows-windows_server_2022-23h2-kb5035856 References https://attackerkb.com/topics/cve-2024-21431 CVE - 2024-21431 https://support.microsoft.com/help/5035845 https://support.microsoft.com/help/5035853 https://support.microsoft.com/help/5035854 https://support.microsoft.com/help/5035856 https://support.microsoft.com/help/5035857
  2. Microsoft Windows: CVE-2024-21430: Windows USB Attached SCSI (UAS) Protocol Remote Code Execution Vulnerability Severity 6 CVSS (AV:L/AC:M/Au:N/C:C/I:C/A:N) Published 03/12/2024 Created 03/13/2024 Added 03/12/2024 Modified 09/06/2024 Description Windows USB Attached SCSI (UAS) Protocol Remote Code Execution Vulnerability Solution(s) microsoft-windows-windows_10-1507-kb5035858 microsoft-windows-windows_10-1607-kb5035855 microsoft-windows-windows_10-1809-kb5035849 microsoft-windows-windows_10-21h2-kb5035845 microsoft-windows-windows_10-22h2-kb5035845 microsoft-windows-windows_11-21h2-kb5035854 microsoft-windows-windows_11-22h2-kb5035853 microsoft-windows-windows_11-23h2-kb5035853 microsoft-windows-windows_server_2012-kb5035930 microsoft-windows-windows_server_2012_r2-kb5035885 microsoft-windows-windows_server_2016-1607-kb5035855 microsoft-windows-windows_server_2019-1809-kb5035849 microsoft-windows-windows_server_2022-21h2-kb5035857 microsoft-windows-windows_server_2022-22h2-kb5035857 microsoft-windows-windows_server_2022-23h2-kb5035856 References https://attackerkb.com/topics/cve-2024-21430 CVE - 2024-21430 https://support.microsoft.com/help/5035845 https://support.microsoft.com/help/5035849 https://support.microsoft.com/help/5035853 https://support.microsoft.com/help/5035854 https://support.microsoft.com/help/5035855 https://support.microsoft.com/help/5035856 https://support.microsoft.com/help/5035857 https://support.microsoft.com/help/5035858 https://support.microsoft.com/help/5035885 https://support.microsoft.com/help/5035930 View more
  3. Microsoft Windows: CVE-2024-26177: Windows Kernel Information Disclosure Vulnerability Severity 5 CVSS (AV:L/AC:L/Au:S/C:C/I:N/A:N) Published 03/12/2024 Created 03/13/2024 Added 03/12/2024 Modified 09/06/2024 Description Windows Kernel Information Disclosure Vulnerability Solution(s) microsoft-windows-windows_10-1507-kb5035858 microsoft-windows-windows_10-1607-kb5035855 microsoft-windows-windows_10-1809-kb5035849 microsoft-windows-windows_10-21h2-kb5035845 microsoft-windows-windows_10-22h2-kb5035845 microsoft-windows-windows_11-21h2-kb5035854 microsoft-windows-windows_11-22h2-kb5035853 microsoft-windows-windows_11-23h2-kb5035853 microsoft-windows-windows_server_2012-kb5035930 microsoft-windows-windows_server_2012_r2-kb5035885 microsoft-windows-windows_server_2016-1607-kb5035855 microsoft-windows-windows_server_2019-1809-kb5035849 microsoft-windows-windows_server_2022-21h2-kb5035857 microsoft-windows-windows_server_2022-22h2-kb5035857 microsoft-windows-windows_server_2022-23h2-kb5035856 msft-kb5035888-78d250c5-4777-4953-b36a-f8ebeffb6678 msft-kb5035919-c1dacfec-e6e8-4c76-8c15-14fa0a371340 msft-kb5035920-1c385d43-100d-41d2-be67-0957979cc3c3 msft-kb5035920-d9d460fb-2770-4e30-bef1-ef4062030a5f msft-kb5035933-bb173464-b365-4396-a82d-18c6470ea72f msft-kb5035933-ff333c16-6e30-41f8-b970-a5d69f9a81ff References https://attackerkb.com/topics/cve-2024-26177 CVE - 2024-26177 https://support.microsoft.com/help/5035845 https://support.microsoft.com/help/5035849 https://support.microsoft.com/help/5035853 https://support.microsoft.com/help/5035854 https://support.microsoft.com/help/5035855 https://support.microsoft.com/help/5035856 https://support.microsoft.com/help/5035857 https://support.microsoft.com/help/5035858 https://support.microsoft.com/help/5035885 https://support.microsoft.com/help/5035930 View more
  4. Fortinet FortiClientEMS: CSV injection in log download feature (CVE-2023-47534) Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 03/12/2024 Created 06/06/2024 Added 11/20/2024 Modified 12/17/2024 Description An improper neutralization of formula elements in a CSV File vulnerability [CWE-1236] in FortiClientEMS may allow a remote and unauthenticated attacker to execute arbitrary commands on the admin workstation via creating malicious log entries with crafted requests to the server. Solution(s) fortinet-forticlientems-upgrade-latest References https://attackerkb.com/topics/cve-2023-47534 CVE - 2023-47534 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47534 https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-47534 https://www.fortiguard.com/psirt/FG-IR-23-390
  5. Fortinet FortiAnalyzer: Use of Externally-Controlled Format String (CVE-2023-41842) Severity 7 CVSS (AV:L/AC:L/Au:M/C:C/I:C/A:C) Published 03/12/2024 Created 03/25/2024 Added 03/25/2024 Modified 01/28/2025 Description A use of externally-controlled format string vulnerability [CWE-134] in Fortinet FortiManager version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer-BigData before 7.2.5 andFortinet FortiPortal version 6.0 all versions and version 5.3 all versions allows a privileged attacker to execute unauthorized code or commands via specially crafted command arguments. Solution(s) fortinet-fortianalyzer-upgrade-7_0_10 fortinet-fortianalyzer-upgrade-7_2_4 fortinet-fortianalyzer-upgrade-7_4_2 References https://attackerkb.com/topics/cve-2023-41842 CVE - 2023-41842 https://fortiguard.com/psirt/FG-IR-23-304
  6. Oracle Linux: CVE-2024-21392: ELSA-2024-1309:.NET 7.0 security update (MODERATE) (Multiple Advisories) Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 03/12/2024 Created 05/22/2024 Added 03/15/2024 Modified 12/08/2024 Description .NET and Visual Studio Denial of Service Vulnerability A vulnerability was found in dotnet. The YARP HTTP/2 WebSocket support in .NET Core can cause a denial of service (DoS). Solution(s) oracle-linux-upgrade-aspnetcore-runtime-8-0 oracle-linux-upgrade-aspnetcore-runtime-dbg-8-0 oracle-linux-upgrade-aspnetcore-targeting-pack-8-0 oracle-linux-upgrade-dotnet-apphost-pack-8-0 oracle-linux-upgrade-dotnet-host oracle-linux-upgrade-dotnet-hostfxr-8-0 oracle-linux-upgrade-dotnet-runtime-8-0 oracle-linux-upgrade-dotnet-runtime-dbg-8-0 oracle-linux-upgrade-dotnet-sdk-8-0 oracle-linux-upgrade-dotnet-sdk-8-0-source-built-artifacts oracle-linux-upgrade-dotnet-sdk-dbg-8-0 oracle-linux-upgrade-dotnet-targeting-pack-8-0 oracle-linux-upgrade-dotnet-templates-8-0 oracle-linux-upgrade-netstandard-targeting-pack-2-1 References https://attackerkb.com/topics/cve-2024-21392 CVE - 2024-21392 ELSA-2024-1309 ELSA-2024-1310 ELSA-2024-1308 ELSA-2024-1311
  7. Microsoft Windows: CVE-2024-26160: Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability Severity 5 CVSS (AV:L/AC:L/Au:S/C:C/I:N/A:N) Published 03/12/2024 Created 03/13/2024 Added 03/12/2024 Modified 08/13/2024 Description Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability Solution(s) microsoft-windows-windows_11-22h2-kb5035853 microsoft-windows-windows_11-23h2-kb5035853 microsoft-windows-windows_server_2022-23h2-kb5035856 References https://attackerkb.com/topics/cve-2024-26160 CVE - 2024-26160 https://support.microsoft.com/help/5035853 https://support.microsoft.com/help/5035856
  8. Microsoft Windows: CVE-2024-21439: Windows Telephony Server Elevation of Privilege Vulnerability Severity 7 CVSS (AV:L/AC:M/Au:S/C:C/I:C/A:C) Published 03/12/2024 Created 03/13/2024 Added 03/12/2024 Modified 09/06/2024 Description Windows Telephony Server Elevation of Privilege Vulnerability Solution(s) microsoft-windows-windows_10-1507-kb5035858 microsoft-windows-windows_10-1607-kb5035855 microsoft-windows-windows_10-1809-kb5035849 microsoft-windows-windows_10-21h2-kb5035845 microsoft-windows-windows_10-22h2-kb5035845 microsoft-windows-windows_11-21h2-kb5035854 microsoft-windows-windows_11-22h2-kb5035853 microsoft-windows-windows_11-23h2-kb5035853 microsoft-windows-windows_server_2012-kb5035930 microsoft-windows-windows_server_2012_r2-kb5035885 microsoft-windows-windows_server_2016-1607-kb5035855 microsoft-windows-windows_server_2019-1809-kb5035849 microsoft-windows-windows_server_2022-21h2-kb5035857 microsoft-windows-windows_server_2022-22h2-kb5035857 microsoft-windows-windows_server_2022-23h2-kb5035856 msft-kb5035888-78d250c5-4777-4953-b36a-f8ebeffb6678 msft-kb5035919-c1dacfec-e6e8-4c76-8c15-14fa0a371340 msft-kb5035920-1c385d43-100d-41d2-be67-0957979cc3c3 msft-kb5035920-d9d460fb-2770-4e30-bef1-ef4062030a5f msft-kb5035933-bb173464-b365-4396-a82d-18c6470ea72f msft-kb5035933-ff333c16-6e30-41f8-b970-a5d69f9a81ff References https://attackerkb.com/topics/cve-2024-21439 CVE - 2024-21439 https://support.microsoft.com/help/5035845 https://support.microsoft.com/help/5035849 https://support.microsoft.com/help/5035853 https://support.microsoft.com/help/5035854 https://support.microsoft.com/help/5035855 https://support.microsoft.com/help/5035856 https://support.microsoft.com/help/5035857 https://support.microsoft.com/help/5035858 https://support.microsoft.com/help/5035885 https://support.microsoft.com/help/5035930 View more
  9. Microsoft Windows: CVE-2024-21443: Windows Kernel Elevation of Privilege Vulnerability Severity 7 CVSS (AV:L/AC:M/Au:S/C:C/I:C/A:C) Published 03/12/2024 Created 03/13/2024 Added 03/12/2024 Modified 08/13/2024 Description Windows Kernel Elevation of Privilege Vulnerability Solution(s) microsoft-windows-windows_10-1809-kb5035849 microsoft-windows-windows_10-21h2-kb5035845 microsoft-windows-windows_10-22h2-kb5035845 microsoft-windows-windows_11-21h2-kb5035854 microsoft-windows-windows_11-22h2-kb5035853 microsoft-windows-windows_11-23h2-kb5035853 microsoft-windows-windows_server_2019-1809-kb5035849 microsoft-windows-windows_server_2022-21h2-kb5035857 microsoft-windows-windows_server_2022-22h2-kb5035857 microsoft-windows-windows_server_2022-23h2-kb5035856 References https://attackerkb.com/topics/cve-2024-21443 CVE - 2024-21443 https://support.microsoft.com/help/5035845 https://support.microsoft.com/help/5035849 https://support.microsoft.com/help/5035853 https://support.microsoft.com/help/5035854 https://support.microsoft.com/help/5035856 https://support.microsoft.com/help/5035857 View more
  10. Microsoft Windows: CVE-2024-21435: Windows OLE Remote Code Execution Vulnerability Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 03/12/2024 Created 03/13/2024 Added 03/12/2024 Modified 08/13/2024 Description Windows OLE Remote Code Execution Vulnerability Solution(s) microsoft-windows-windows_11-22h2-kb5035853 microsoft-windows-windows_11-23h2-kb5035853 References https://attackerkb.com/topics/cve-2024-21435 CVE - 2024-21435 https://support.microsoft.com/help/5035853
  11. Alma Linux: CVE-2024-21392: Moderate: .NET 7.0 security update (Multiple Advisories) Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 03/12/2024 Created 03/16/2024 Added 03/15/2024 Modified 01/28/2025 Description .NET and Visual Studio Denial of Service Vulnerability Solution(s) alma-upgrade-aspnetcore-runtime-7.0 alma-upgrade-aspnetcore-runtime-8.0 alma-upgrade-aspnetcore-runtime-dbg-8.0 alma-upgrade-aspnetcore-targeting-pack-7.0 alma-upgrade-aspnetcore-targeting-pack-8.0 alma-upgrade-dotnet alma-upgrade-dotnet-apphost-pack-7.0 alma-upgrade-dotnet-apphost-pack-8.0 alma-upgrade-dotnet-host alma-upgrade-dotnet-hostfxr-7.0 alma-upgrade-dotnet-hostfxr-8.0 alma-upgrade-dotnet-runtime-7.0 alma-upgrade-dotnet-runtime-8.0 alma-upgrade-dotnet-runtime-dbg-8.0 alma-upgrade-dotnet-sdk-7.0 alma-upgrade-dotnet-sdk-7.0-source-built-artifacts alma-upgrade-dotnet-sdk-8.0 alma-upgrade-dotnet-sdk-8.0-source-built-artifacts alma-upgrade-dotnet-sdk-dbg-8.0 alma-upgrade-dotnet-targeting-pack-7.0 alma-upgrade-dotnet-targeting-pack-8.0 alma-upgrade-dotnet-templates-7.0 alma-upgrade-dotnet-templates-8.0 alma-upgrade-netstandard-targeting-pack-2.1 References https://attackerkb.com/topics/cve-2024-21392 CVE - 2024-21392 https://errata.almalinux.org/8/ALSA-2024-1308.html https://errata.almalinux.org/8/ALSA-2024-1311.html https://errata.almalinux.org/9/ALSA-2024-1309.html https://errata.almalinux.org/9/ALSA-2024-1310.html
  12. Microsoft Defender Security Feature Bypass Vulnerability (CVE-2024-20671) Severity 5 CVSS (AV:L/AC:L/Au:S/C:N/I:N/A:C) Published 03/12/2024 Created 03/13/2024 Added 03/12/2024 Modified 01/28/2025 Description Microsoft Defender Security Feature Bypass Vulnerability Solution(s) windows-defender-upgrade-latest References https://attackerkb.com/topics/cve-2024-20671 CVE - 2024-20671 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-20671
  13. Fortinet FortiClientEMS: Pervasive SQL injection in DAS component (CVE-2023-48788) Severity 10 CVSS (AV:N/AC:L/Au:N/C:C/I:C/A:C) Published 03/12/2024 Created 06/06/2024 Added 11/20/2024 Modified 12/17/2024 Description An improper neutralization of special elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiClientEMS may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted requests. Solution(s) fortinet-forticlientems-upgrade-latest References https://attackerkb.com/topics/cve-2023-48788 CVE - 2023-48788 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48788 https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2023-48788 https://www.fortiguard.com/psirt/FG-IR-24-007
  14. Debian: CVE-2023-5388: firefox-esr, nss, thunderbird -- security update Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/12/2024 Created 03/13/2024 Added 03/12/2024 Modified 03/27/2024 Description NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox < 124, Firefox ESR < 115.9, and Thunderbird < 115.9. Solution(s) debian-upgrade-firefox-esr debian-upgrade-nss debian-upgrade-thunderbird References https://attackerkb.com/topics/cve-2023-5388 CVE - 2023-5388 DLA-3757-1
  15. Fortinet FortiOS: Stack-based Buffer Overflow (CVE-2023-42790) Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 03/12/2024 Created 03/19/2024 Added 03/18/2024 Modified 01/28/2025 Description A stack-based buffer overflow in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, FortiProxy 7.4.0, 7.2.0 through 7.2.6, 7.0.0 through 7.0.12, 2.0.0 through 2.0.13 allows attacker to execute unauthorized code or commands via specially crafted HTTP requests. Solution(s) fortios-upgrade-latest References https://attackerkb.com/topics/cve-2023-42790 CVE - 2023-42790 https://fortiguard.com/psirt/FG-IR-23-328
  16. Red Hat: CVE-2024-21392: dotnet: DoS in .NET Core / YARP HTTP / 2 WebSocket support (Multiple Advisories) Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 03/12/2024 Created 03/15/2024 Added 03/14/2024 Modified 09/03/2024 Description .NET and Visual Studio Denial of Service Vulnerability Solution(s) redhat-upgrade-aspnetcore-runtime-7-0 redhat-upgrade-aspnetcore-runtime-8-0 redhat-upgrade-aspnetcore-runtime-dbg-8-0 redhat-upgrade-aspnetcore-targeting-pack-7-0 redhat-upgrade-aspnetcore-targeting-pack-8-0 redhat-upgrade-dotnet redhat-upgrade-dotnet-apphost-pack-7-0 redhat-upgrade-dotnet-apphost-pack-7-0-debuginfo redhat-upgrade-dotnet-apphost-pack-8-0 redhat-upgrade-dotnet-apphost-pack-8-0-debuginfo redhat-upgrade-dotnet-host redhat-upgrade-dotnet-host-debuginfo redhat-upgrade-dotnet-hostfxr-7-0 redhat-upgrade-dotnet-hostfxr-7-0-debuginfo redhat-upgrade-dotnet-hostfxr-8-0 redhat-upgrade-dotnet-hostfxr-8-0-debuginfo redhat-upgrade-dotnet-runtime-7-0 redhat-upgrade-dotnet-runtime-7-0-debuginfo redhat-upgrade-dotnet-runtime-8-0 redhat-upgrade-dotnet-runtime-8-0-debuginfo redhat-upgrade-dotnet-runtime-dbg-8-0 redhat-upgrade-dotnet-sdk-7-0 redhat-upgrade-dotnet-sdk-7-0-debuginfo redhat-upgrade-dotnet-sdk-7-0-source-built-artifacts redhat-upgrade-dotnet-sdk-8-0 redhat-upgrade-dotnet-sdk-8-0-debuginfo redhat-upgrade-dotnet-sdk-8-0-source-built-artifacts redhat-upgrade-dotnet-sdk-dbg-8-0 redhat-upgrade-dotnet-targeting-pack-7-0 redhat-upgrade-dotnet-targeting-pack-8-0 redhat-upgrade-dotnet-templates-7-0 redhat-upgrade-dotnet-templates-8-0 redhat-upgrade-dotnet7-0-debuginfo redhat-upgrade-dotnet7-0-debugsource redhat-upgrade-dotnet8-0-debuginfo redhat-upgrade-dotnet8-0-debugsource redhat-upgrade-netstandard-targeting-pack-2-1 References CVE-2024-21392 RHSA-2024:1308 RHSA-2024:1309 RHSA-2024:1310 RHSA-2024:1311
  17. Fortinet FortiManager: Use of Externally-Controlled Format String (CVE-2023-41842) Severity 7 CVSS (AV:L/AC:L/Au:M/C:C/I:C/A:C) Published 03/12/2024 Created 04/30/2024 Added 04/29/2024 Modified 01/28/2025 Description A use of externally-controlled format string vulnerability [CWE-134] in Fortinet FortiManager version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.3 and before 7.0.10, Fortinet FortiAnalyzer-BigData before 7.2.5 andFortinet FortiPortal version 6.0 all versions and version 5.3 all versions allows a privileged attacker to execute unauthorized code or commands via specially crafted command arguments. Solution(s) fortinet-fortimanager-upgrade-7_0_10 fortinet-fortimanager-upgrade-7_2_4 fortinet-fortimanager-upgrade-7_4_2 References https://attackerkb.com/topics/cve-2023-41842 CVE - 2023-41842 https://fortiguard.com/psirt/FG-IR-23-304
  18. Debian: CVE-2024-2182: ovn -- security update Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/12/2024 Created 07/31/2024 Added 07/30/2024 Modified 07/30/2024 Description A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service. Solution(s) debian-upgrade-ovn References https://attackerkb.com/topics/cve-2024-2182 CVE - 2024-2182
  19. Ubuntu: USN-6693-1 (CVE-2024-21392): .NET vulnerability Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 03/12/2024 Created 03/14/2024 Added 03/13/2024 Modified 01/28/2025 Description .NET and Visual Studio Denial of Service Vulnerability Solution(s) ubuntu-upgrade-aspnetcore-runtime-7-0 ubuntu-upgrade-aspnetcore-runtime-8-0 ubuntu-upgrade-dotnet-runtime-7-0 ubuntu-upgrade-dotnet-runtime-8-0 ubuntu-upgrade-dotnet7 ubuntu-upgrade-dotnet8 References https://attackerkb.com/topics/cve-2024-21392 CVE - 2024-21392 USN-6693-1
  20. Ubuntu: (Multiple Advisories) (CVE-2023-27539): Rack vulnerabilities Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/12/2024 Created 03/14/2024 Added 03/13/2024 Modified 01/10/2025 Description There is a denial of service vulnerability in the header parsing component of Rack. Solution(s) ubuntu-pro-upgrade-ruby-rack References https://attackerkb.com/topics/cve-2023-27539 CVE - 2023-27539 USN-6689-1 USN-6905-1 USN-7036-1
  21. Rocky Linux: CVE-2024-21392: .NET-8.0 (Multiple Advisories) Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 03/12/2024 Created 03/29/2024 Added 03/28/2024 Modified 01/28/2025 Description .NET and Visual Studio Denial of Service Vulnerability Solution(s) rocky-upgrade-aspnetcore-runtime-7.0 rocky-upgrade-aspnetcore-runtime-8.0 rocky-upgrade-aspnetcore-targeting-pack-7.0 rocky-upgrade-aspnetcore-targeting-pack-8.0 rocky-upgrade-dotnet rocky-upgrade-dotnet-apphost-pack-7.0 rocky-upgrade-dotnet-apphost-pack-7.0-debuginfo rocky-upgrade-dotnet-apphost-pack-8.0 rocky-upgrade-dotnet-apphost-pack-8.0-debuginfo rocky-upgrade-dotnet-host rocky-upgrade-dotnet-host-debuginfo rocky-upgrade-dotnet-hostfxr-7.0 rocky-upgrade-dotnet-hostfxr-7.0-debuginfo rocky-upgrade-dotnet-hostfxr-8.0 rocky-upgrade-dotnet-hostfxr-8.0-debuginfo rocky-upgrade-dotnet-runtime-7.0 rocky-upgrade-dotnet-runtime-7.0-debuginfo rocky-upgrade-dotnet-runtime-8.0 rocky-upgrade-dotnet-runtime-8.0-debuginfo rocky-upgrade-dotnet-sdk-7.0 rocky-upgrade-dotnet-sdk-7.0-debuginfo rocky-upgrade-dotnet-sdk-7.0-source-built-artifacts rocky-upgrade-dotnet-sdk-8.0 rocky-upgrade-dotnet-sdk-8.0-debuginfo rocky-upgrade-dotnet-sdk-8.0-source-built-artifacts rocky-upgrade-dotnet-targeting-pack-7.0 rocky-upgrade-dotnet-targeting-pack-8.0 rocky-upgrade-dotnet-templates-7.0 rocky-upgrade-dotnet-templates-8.0 rocky-upgrade-dotnet7.0-debuginfo rocky-upgrade-dotnet7.0-debugsource rocky-upgrade-dotnet8.0-debuginfo rocky-upgrade-dotnet8.0-debugsource rocky-upgrade-netstandard-targeting-pack-2.1 References https://attackerkb.com/topics/cve-2024-21392 CVE - 2024-21392 https://errata.rockylinux.org/RLSA-2024:1308 https://errata.rockylinux.org/RLSA-2024:1311
  22. Microsoft Windows: CVE-2024-21445: Windows USB Print Driver Elevation of Privilege Vulnerability Severity 7 CVSS (AV:L/AC:M/Au:S/C:C/I:C/A:C) Published 03/12/2024 Created 03/13/2024 Added 03/12/2024 Modified 08/13/2024 Description Windows USB Print Driver Elevation of Privilege Vulnerability Solution(s) microsoft-windows-windows_10-21h2-kb5035845 microsoft-windows-windows_10-22h2-kb5035845 microsoft-windows-windows_11-21h2-kb5035854 microsoft-windows-windows_11-22h2-kb5035853 microsoft-windows-windows_11-23h2-kb5035853 microsoft-windows-windows_server_2022-21h2-kb5035857 microsoft-windows-windows_server_2022-22h2-kb5035857 microsoft-windows-windows_server_2022-23h2-kb5035856 References https://attackerkb.com/topics/cve-2024-21445 CVE - 2024-21445 https://support.microsoft.com/help/5035845 https://support.microsoft.com/help/5035853 https://support.microsoft.com/help/5035854 https://support.microsoft.com/help/5035856 https://support.microsoft.com/help/5035857
  23. Microsoft Windows: CVE-2024-21451: Microsoft ODBC Driver Remote Code Execution Vulnerability Severity 9 CVSS (AV:N/AC:M/Au:N/C:C/I:C/A:C) Published 03/12/2024 Created 03/13/2024 Added 03/12/2024 Modified 09/06/2024 Description Microsoft ODBC Driver Remote Code Execution Vulnerability Solution(s) microsoft-windows-windows_10-1507-kb5035858 microsoft-windows-windows_10-1607-kb5035855 microsoft-windows-windows_10-1809-kb5035849 microsoft-windows-windows_10-21h2-kb5035845 microsoft-windows-windows_10-22h2-kb5035845 microsoft-windows-windows_11-21h2-kb5035854 microsoft-windows-windows_11-22h2-kb5035853 microsoft-windows-windows_11-23h2-kb5035853 microsoft-windows-windows_server_2012-kb5035930 microsoft-windows-windows_server_2012_r2-kb5035885 microsoft-windows-windows_server_2016-1607-kb5035855 microsoft-windows-windows_server_2019-1809-kb5035849 microsoft-windows-windows_server_2022-21h2-kb5035857 microsoft-windows-windows_server_2022-22h2-kb5035857 microsoft-windows-windows_server_2022-23h2-kb5035856 msft-kb5035888-78d250c5-4777-4953-b36a-f8ebeffb6678 msft-kb5035919-c1dacfec-e6e8-4c76-8c15-14fa0a371340 msft-kb5035920-1c385d43-100d-41d2-be67-0957979cc3c3 msft-kb5035920-d9d460fb-2770-4e30-bef1-ef4062030a5f msft-kb5035933-bb173464-b365-4396-a82d-18c6470ea72f msft-kb5035933-ff333c16-6e30-41f8-b970-a5d69f9a81ff References https://attackerkb.com/topics/cve-2024-21451 CVE - 2024-21451 https://support.microsoft.com/help/5035845 https://support.microsoft.com/help/5035849 https://support.microsoft.com/help/5035853 https://support.microsoft.com/help/5035854 https://support.microsoft.com/help/5035855 https://support.microsoft.com/help/5035856 https://support.microsoft.com/help/5035857 https://support.microsoft.com/help/5035858 https://support.microsoft.com/help/5035885 https://support.microsoft.com/help/5035930 View more
  24. Microsoft Windows: CVE-2024-26190: Microsoft QUIC Denial of Service Vulnerability Severity 8 CVSS (AV:N/AC:L/Au:N/C:N/I:N/A:C) Published 03/12/2024 Created 03/13/2024 Added 03/12/2024 Modified 08/13/2024 Description Microsoft QUIC Denial of Service Vulnerability Solution(s) microsoft-windows-windows_11-21h2-kb5035854 microsoft-windows-windows_11-22h2-kb5035853 microsoft-windows-windows_11-23h2-kb5035853 microsoft-windows-windows_server_2022-21h2-kb5035857 microsoft-windows-windows_server_2022-22h2-kb5035857 microsoft-windows-windows_server_2022-23h2-kb5035856 References https://attackerkb.com/topics/cve-2024-26190 CVE - 2024-26190 https://support.microsoft.com/help/5035853 https://support.microsoft.com/help/5035854 https://support.microsoft.com/help/5035856 https://support.microsoft.com/help/5035857
  25. NorthStar C2 XSS to Agent RCE Disclosed 03/12/2024 Created 05/21/2024 Description NorthStar C2, prior to commit 7674a44 on March 11 2024, contains a vulnerability where the logs page is vulnerable to a stored xss. An unauthenticated user can simulate an agent registration to cause the XSS and take over a users session. With this access, it is then possible to run a new payload on all of the NorthStar C2 compromised hosts (agents), and kill the original agent. Successfully tested against NorthStar C2 commit e7fdce148b6a81516e8aa5e5e037acd082611f73 running on Ubuntu 22.04. The agent was running on Windows 10 19045. Author(s) h00die chebuya Platform Windows Architectures cmd Development Source Code History