A vulnerability has been found in HPE Insight Remote Support and classified as very critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to path traversal.
This vulnerability is known as CVE-2024-53676. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Linux Kernel up to 6.11.9. This vulnerability affects unknown code of the component vsock. The manipulation leads to memory leak.
This vulnerability was named CVE-2024-53118. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.9. It has been classified as problematic. This affects the function move_page_tables. The manipulation of the argument orig_old_start leads to incorrect comparison.
This vulnerability is uniquely identified as CVE-2024-53111. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.11.9. This affects an unknown part of the component panthor. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2024-53116. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.11.9. It has been classified as problematic. This affects the function kfree_skb. The manipulation leads to memory leak.
This vulnerability is uniquely identified as CVE-2024-53117. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Guangzhou Huayi Intelligent Technology Jeewms 3.7. It has been rated as problematic. This issue affects the function preHandle of the file src/main/java/com/zzjee/wm/controller/WmOmNoticeHController.java. The manipulation of the argument request leads to information disclosure.
The identification of this vulnerability is CVE-2024-11961. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 6.11.6. This affects the function trie_get_next_key of the component bpf. The manipulation leads to out-of-bounds write.
This vulnerability is uniquely identified as CVE-2024-50262. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple macOS up to 14.5. It has been classified as critical. Affected is an unknown function. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2024-44306. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple macOS up to 14.5. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to buffer overflow.
This vulnerability is known as CVE-2024-44307. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in 7-Zip and classified as critical. Affected by this vulnerability is an unknown functionality of the component Zstandard Decompression Handler. The manipulation leads to integer underflow.
This vulnerability is known as CVE-2024-11477. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Guangzhou Tuchuang Computer Software Development Interlib Library Cluster Automation Management System up to 2.0.1. This affects an unknown part of the file /interlib/admin/SysLib?cmdACT=inputLIBCODE&mod=batchXSL&xsl=editLIBCODE.xsl&libcodes=&ROWID=. The manipulation of the argument sql leads to sql injection.
This vulnerability is uniquely identified as CVE-2024-10946. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as critical was found in Guangzhou Tuchuang Computer Software Development Interlib Library Cluster Automation Management System up to 2.0.1. This vulnerability affects unknown code of the file /interlib/order/BatchOrder?cmdACT=admin_order&xsl=adminOrder_OrderList.xsl. The manipulation of the argument bookrecno leads to sql injection.
This vulnerability was named CVE-2024-10947. The attack can be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
Tech and Training Ideas to Help Cyber Professionals Advance Their Skills If you're a cybersecurity professional trying to come up with ideas for your holiday wish list (or maybe you’re a loved one trying to pick out the perfect gift), look no further! Here are some top picks that will thrill any cybersecurity practitioner.
LexisNexis Combines AI-Driven Document Authentication With Its Fraud Solutions To counter AI-driven fraud, LexisNexis acquired IDVerse, a London-based startup focused on document authentication and regulatory compliance. This acquisition aims to seamlessly integrate advanced tools into LexisNexis' fraud and identity platforms, enhancing global operations.
Attackers Target Managed File Transfer Software Vulnerabilities File transfer software made by Cleo Communications is under active attack and a patch meant to stymie hackers doesn't fix the flaw, say security researchers from Huntress. Hackers exploit an arbitrary file-write vulnerability along with a feature that automatically executes files.
Tech and Training Ideas to Help Cyber Professionals Advance Their Skills If you're a cybersecurity professional trying to come up with ideas for your holiday wish list (or maybe you’re a loved one trying to pick out the perfect gift), look no further! Here are some top picks that will thrill any cybersecurity practitioner.
Evidence Mounts for Chinese Hacking 'Quartermaster' A probable Chinese nation-state threat actor compromised Visual Studio Code and Microsoft Azure cloud infrastructure to target Western technology firms for espionage, security firms Tinexta Cyber and SentinelLabs said. The companies call the campaign "Operation Digital Eye."