Today is Microsoft's November 2024 Patch Tuesday, which includes security updates for 91 flaws, including four zero-days, two of which are actively exploited. [...]
A vulnerability was found in Adobe After Effects up to 23.6.9/24.6.2. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to out-of-bounds write.
This vulnerability was named CVE-2024-47443. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Adobe After Effects up to 23.6.9/24.6.2. It has been classified as critical. This affects an unknown part. The manipulation leads to out-of-bounds write.
This vulnerability is uniquely identified as CVE-2024-47442. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Adobe After Effects up to 23.6.9/24.6.2 and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to out-of-bounds write.
This vulnerability is handled as CVE-2024-47441. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Adobe Audition up to 23.6.9/24.4.6 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to out-of-bounds read.
This vulnerability is known as CVE-2024-47449. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in Adobe After Effects up to 23.6.9/24.6.2. Affected is an unknown function. The manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2024-47446. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Adobe After Effects up to 23.6.9/24.6.2. This issue affects some unknown processing. The manipulation leads to out-of-bounds read.
The identification of this vulnerability is CVE-2024-47445. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Adobe After Effects up to 23.6.9/24.6.2. This vulnerability affects unknown code. The manipulation leads to out-of-bounds read.
This vulnerability was named CVE-2024-47444. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Citrix Session Recording. This affects an unknown part. The manipulation leads to deserialization.
This vulnerability is uniquely identified as CVE-2024-8069. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Microsoft Microsoft PC Manager. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to link following.
This vulnerability is handled as CVE-2024-49051. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Visual Studio Code Python Extension. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to trust boundary violation.
This vulnerability is known as CVE-2024-49050. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft TorchGeo. It has been classified as critical. Affected is an unknown function. The manipulation leads to code injection.
This vulnerability is traded as CVE-2024-49048. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Windows and classified as very critical. This issue affects some unknown processing of the component Task Scheduler. The manipulation leads to improper authentication.
The identification of this vulnerability is CVE-2024-49039. An attack has to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Microsoft Office and classified as problematic. This vulnerability affects unknown code of the component Word. The manipulation leads to improper input validation.
This vulnerability was named CVE-2024-49033. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as critical, has been found in Microsoft. This issue affects some unknown processing. The manipulation leads to an unknown weakness.
The identification of this vulnerability is CVE-2024-48999. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical was found in Microsoft. This vulnerability affects unknown code. The manipulation leads to an unknown weakness.
This vulnerability was named CVE-2024-48998. The attack can be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical has been found in Microsoft. This affects an unknown part. The manipulation leads to an unknown weakness.
This vulnerability is uniquely identified as CVE-2024-48997. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.