De Verenigde Staten zien veel potentie in samenwerking met Nederland op het gebied van defensie-innovaties. Dat is afgelopen dagen gebleken tijdens een bezoek van Heidi Shyu, de Amerikaanse portefeuillehouder voor innovatie van het Pentagon. Staatssecretaris Gijs Tuinman ontving haar.
A security flaw impacting the Wi-Fi Test Suite could enable unauthenticated local attackers to execute arbitrary code with elevated privileges.
The CERT Coordination Center (CERT/CC) said the susceptible code from the Wi-Fi Alliance has been found deployed on Arcadyan FMIMG51AX000J routers. The vulnerability is being tracked as CVE-2024-41992.
"This flaw allows an unauthenticated local attacker
A vulnerability was found in Sonatype Nexus Repository up to 3.72.0. It has been classified as critical. Affected is an unknown function. The manipulation leads to hard-coded credentials.
This vulnerability is traded as CVE-2024-5764. The attack needs to be approached locally. There is no exploit available.
A vulnerability classified as problematic has been found in Pimcore up to 3.1.15/4.1.6. This affects an unknown part of the component Portal Engine. The manipulation leads to unprotected storage of credentials.
This vulnerability is uniquely identified as CVE-2024-49370. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in HCL Sametime up to 12.0.2 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Legacy REST Service. The manipulation leads to cleartext transmission of sensitive information.
This vulnerability is known as CVE-2024-30124. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in ReneeCussack 3D Work In Progress Plugin up to 1.0.3 on WordPress. It has been classified as problematic. This affects an unknown part. The manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2024-49657. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in James Eggers Portfolleo Plugin up to 1.2 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to unrestricted upload.
This vulnerability is handled as CVE-2024-49653. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in ReneeCussack 3D Work In Progress Plugin up to 1.0.3 on WordPress. This affects an unknown part. The manipulation leads to unrestricted upload.
This vulnerability is uniquely identified as CVE-2024-49652. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability classified as critical was found in Tenda RX9 and RX9 Pro 22.03.02.10/22.03.02.20. Affected by this vulnerability is the function sub_42EA38 of the file /goform/SetVirtualServerCfg. The manipulation of the argument list leads to stack-based buffer overflow.
This vulnerability is known as CVE-2024-10282. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as critical, has been found in Tenda RX9 and RX9 Pro 22.03.02.20. Affected by this issue is the function sub_4337EC of the file /goform/SetNetControlList. The manipulation of the argument list leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2024-10283. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, was found in ZZCMS 2023. This affects an unknown part of the file 3/qq-connect2.0/API/com/inc.php. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2024-10290. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply restrictive firewalling.
A vulnerability, which was classified as very critical, has been found in Siemens InterMesh 7177 Hybrid 2.0 Subscriber and InterMesh 7707 Fire Subscriber. Affected by this issue is some unknown functionality of the component Web Server. The manipulation leads to os command injection.
This vulnerability is handled as CVE-2024-47901. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as very critical, was found in Siemens InterMesh 7177 Hybrid 2.0 Subscriber and InterMesh 7707 Fire Subscriber. This affects an unknown part of the component Web Server. The manipulation leads to missing authentication.
This vulnerability is uniquely identified as CVE-2024-47902. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.