As security technology and threat awareness among organizations improves so do the adversaries who are adopting and relying on new techniques to maximize speed and impact while evading detection.
Ransomware and malware continue to be the method of choice by big game hunting (BGH) cyber criminals, and the increased use of hands-on or “interactive intrusion” techniques is especially alarming.
A vulnerability, which was classified as critical, has been found in XStream up to 1.4.17. This issue affects some unknown processing of the component Security Framework. The manipulation leads to deserialization.
The identification of this vulnerability is CVE-2021-39144. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in ZK Framework 8.6.4.1/9.0.1.2/9.5.1.3/9.6.0.1/9.6.1. This affects an unknown part of the component AuUploader. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2022-36537. The attack needs to be approached within the local network. Furthermore, there is an exploit available.
A vulnerability was found in Fortinet FortiOS up to 6.4.11/7.0.9/7.2.3 and classified as critical. Affected by this issue is some unknown functionality of the component CLI Command Handler. The manipulation leads to path traversal.
This vulnerability is handled as CVE-2022-41328. It is possible to launch the attack on the local host. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, was found in Microsoft Outlook 2013 SP1/2013 RT SP1/2016/2019/365 Apps for Enterprise. Affected is an unknown function. The manipulation leads to authentication bypass by capture-replay.
This vulnerability is traded as CVE-2023-23397. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Windows up to Server 2022 and classified as problematic. This issue affects some unknown processing of the component SmartScreen. The manipulation leads to incorrect authorization.
The identification of this vulnerability is CVE-2023-24880. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as critical, was found in Adobe ColdFusion up to 2018 Update 15/2021 Update 5. Affected is an unknown function. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2023-26360. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Linux Kernel up to 4.18. It has been declared as problematic. This vulnerability affects the function tcp_retransmit_timer of the component TCP Handler. The manipulation leads to resource consumption.
This vulnerability was named CVE-2024-41007. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.9.9. Affected by this issue is the function usb_string_copy of the component configfs. The manipulation leads to out-of-bounds write.
This vulnerability is handled as CVE-2024-42236. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.9.6 and classified as critical. This issue affects the function fib6_nh_init. The manipulation leads to null pointer dereference.
The identification of this vulnerability is CVE-2024-40961. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.9.6 and classified as critical. Affected by this issue is the function kv_dpm.c. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2024-40988. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 6.9.7. This issue affects the function create_pinctrl of the component pinctrl. The manipulation leads to deadlock.
The identification of this vulnerability is CVE-2024-42090. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.9.8 and classified as critical. Affected by this vulnerability is an unknown functionality of the component lima. The manipulation leads to denial of service.
This vulnerability is known as CVE-2024-42127. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.9.7 and classified as problematic. This issue affects the function gpiod_set_value of the component ilitek-ili9881c. The manipulation leads to Privilege Escalation.
The identification of this vulnerability is CVE-2024-42087. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.