A vulnerability classified as critical has been found in Php Blue Dragon CMS 3.0. This affects an unknown part of the file activecontent.php. The manipulation of the argument vsDragonRootPath leads to file inclusion.
This vulnerability is uniquely identified as CVE-2007-4313. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability, which was classified as problematic, was found in Linux Kernel up to 6.9.5. Affected is the function unpoison_memory of the component huge_memory. The manipulation leads to improper update of reference count.
This vulnerability is traded as CVE-2024-40914. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.162/6.1.99/6.6.40/6.9.9. It has been classified as problematic. This affects the function ndo_bpf of the file net/core/dev.c of the component i40e. The manipulation leads to state issue.
This vulnerability is uniquely identified as CVE-2024-41047. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in Linux Kernel up to 5.10.220/5.15.161/6.1.96/6.6.36/6.9.7. This issue affects the function i915_vma_revoke_fence. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2024-41092. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 5.10.221/5.15.162/6.1.97/6.6.38/6.9.8. This affects the function pipe_ctx of the component AMD Display. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2024-42120. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.9. It has been classified as problematic. This affects the function register_device of the component ppdev. The manipulation leads to unchecked return value.
This vulnerability is uniquely identified as CVE-2024-36015. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.9.2 and classified as critical. This vulnerability affects the function load_video_binaries of the component ssh_css. The manipulation leads to null pointer dereference.
This vulnerability was named CVE-2024-38547. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.9.3 and classified as critical. This vulnerability affects the function nci_rx_work of the component nfc. The manipulation leads to uninitialized resource.
This vulnerability was named CVE-2024-38381. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.9.2 and classified as critical. This vulnerability affects the function memdup_user_nul of the component scsi. The manipulation leads to buffer overflow.
This vulnerability was named CVE-2024-38560. Access to the local network is required for this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 5.15.160/6.1.92/6.6.32/6.9.3. It has been declared as critical. Affected by this vulnerability is the function cpumask_of_node in the library /arch/x86/include/asm/topology.h. The manipulation leads to improper validation of array index.
This vulnerability is known as CVE-2024-39277. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in VCCCD MyVCCCD 1.4.14. It has been rated as critical. This issue affects some unknown processing of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
The identification of this vulnerability is CVE-2014-7090. The attack can only be initiated within the local network. There is no exploit available.
Fall is in the air and frameworks for mitigating AI risk are dropping like leaves onto policymakers’ desks. From California’s SB 1047 bill and NIST’s model-testing deal with OpenAI and Anthropic to REAIM’s blueprint for military AI governance, AI regulation is proving to be a hot and complicated topic.
Discover how GreyNoise’s honeypots are monitoring exploit attempts on the SolarWinds Serv-U vulnerability (CVE-2024-28995). Gain insights into the specific files attackers target and how real-time data helps security teams focus on true threats. Read our full blog for detailed analysis.
Trend Micro MDR (Managed Detection and Response) team promptly mitigated a more_eggs infection. Using Vision One, MDR illustrated how Custom Filters/Models and Security Playbook can be used to automate the response to more_eggs and similar threats.