A critical security flaw impacting the ProjectSend open-source file-sharing application has likely come under active exploitation in the wild, according to findings from VulnCheck.
The vulnerability, originally patched over a year-and-a-half ago as part of a commit pushed in May 2023, was not officially made available until August 2024 with the release of version r1720. As of November 26, 2024,
Cybersecurity researchers have shed light on what has been described as the first Unified Extensible Firmware Interface (UEFI) bootkit designed for Linux systems.
Dubbed Bootkitty by its creators who go by the name BlackCat, the bootkit is assessed to be a proof-of-concept (PoC) and there is no evidence that it has been put to use in real-world attacks. Also tracked as IranuKit, it was uploaded
A vulnerability classified as problematic was found in OpenVidReview 1.0. This vulnerability affects unknown code. The manipulation of the argument review name leads to cross site scripting.
This vulnerability was named CVE-2024-46055. The attack can be initiated remotely. There is no exploit available.
A vulnerability classified as critical has been found in OpenVidReview 1.0. This affects an unknown part of the file /upload. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2024-46054. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Devolutions XTS.NET up to 2024.11.19. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to covert timing channel.
This vulnerability is handled as CVE-2024-11862. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Omada Identity up to 15. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Access Request History. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-52951. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in GNU Emacs up to 30.0.92. It has been classified as critical. Affected is an unknown function of the file elisp-mode.el. The manipulation leads to code injection.
This vulnerability is traded as CVE-2024-53920. The attack can only be initiated within the local network. There is no exploit available.
A vulnerability was found in Zoho ManageEngine Analytics Plus up to 6099. It has been classified as problematic. Affected is an unknown function. The manipulation leads to information disclosure.
This vulnerability is traded as CVE-2024-52323. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Zabbix up to 7.0.2 and classified as problematic. Affected by this issue is the function curl_write_cb. The manipulation leads to unchecked return value to null pointer dereference.
This vulnerability is handled as CVE-2024-42328. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Zabbix up to 7.0.3rc1. It has been classified as problematic. This affects the function webdriver_session_query. The manipulation leads to unchecked return value to null pointer dereference.
This vulnerability is uniquely identified as CVE-2024-42329. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Zabbix up to 6.0.33/6.4.18/7.0.3. It has been declared as critical. This vulnerability affects unknown code of the component HttpRequest Handler. The manipulation leads to format string.
This vulnerability was named CVE-2024-42330. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Zabbix up to 7.0.2rc1. Affected by this vulnerability is the function zbx_snmp_cache_handle_engineid of the component Proxy. The manipulation leads to stack-based buffer overflow.
This vulnerability is known as CVE-2024-36468. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Zabbix up to 7.0.3. Affected by this issue is the function es_browser_get_variant of the file browser.c. The manipulation leads to use after free.
This vulnerability is handled as CVE-2024-42326. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.