A vulnerability, which was classified as critical, was found in Adobe Substance3D Stager up to 3.0.2. This affects an unknown part. The manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2024-39388. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Adobe InDesign Desktop up to 18.5.2/19.4 and classified as critical. This vulnerability affects unknown code. The manipulation leads to stack-based buffer overflow.
This vulnerability was named CVE-2024-39389. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Adobe InDesign Desktop up to 18.5.2/19.4 and classified as critical. This issue affects some unknown processing. The manipulation leads to out-of-bounds write.
The identification of this vulnerability is CVE-2024-39390. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Adobe InDesign Desktop up to 18.5.2/19.4. It has been classified as critical. Affected is an unknown function. The manipulation leads to out-of-bounds write.
This vulnerability is traded as CVE-2024-39391. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Adobe InDesign Desktop up to 18.5.2/19.4. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to out-of-bounds write.
This vulnerability is known as CVE-2024-39394. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Adobe Acrobat Reader up to 20.005.30636/24.002.20965/24.002.20964/24.001.30123. It has been rated as critical. Affected by this issue is some unknown functionality. The manipulation leads to use after free.
This vulnerability is handled as CVE-2024-39422. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Adobe Acrobat Reader up to 20.005.30636/24.002.20965/24.002.20964/24.001.30123. This affects an unknown part. The manipulation leads to out-of-bounds write.
This vulnerability is uniquely identified as CVE-2024-39423. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A large-scale Coinbase phishing attack poses as a mandatory wallet migration, tricking recipients into setting up a new wallet with a pre-generated recovery phrase controlled by attackers. [...]
A vulnerability was found in Sun J2EE and classified as problematic. This issue affects some unknown processing. The manipulation leads to improper access controls.
The identification of this vulnerability is CVE-2009-2704. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical has been found in Jlink AX1800 1.0. Affected is an unknown function of the component Authentication. The manipulation leads to authentication bypass using alternate channel.
This vulnerability is traded as CVE-2023-37057. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Apple iOS and iPadOS. Affected by this issue is some unknown functionality. The manipulation leads to sandbox issue.
This vulnerability is handled as CVE-2024-54468. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Fast Tube Plugin up to 2.3.1 on WordPress and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-13218. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Imagination Technologies Graphics DDK up to 24.3 RTM2. It has been declared as problematic. This vulnerability affects unknown code of the component Kernel Memory Handler. The manipulation leads to use of out-of-range pointer offset.
This vulnerability was named CVE-2024-47900. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Mailcow. It has been rated as critical. This issue affects some unknown processing of the component Session Identifier Handler. The manipulation leads to session fixiation.
The identification of this vulnerability is CVE-2024-56529. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in Apache Hive 2.2.x/3.x. Affected is the function Arrays.equals of the component LlapSignerImpl. The manipulation leads to improper validation of integrity check value.
This vulnerability is traded as CVE-2024-23953. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A clever malware deployment scheme first spotted in targeted attacks last year has now gone mainstream. In this scam, dubbed "ClickFix," the visitor to a hacked or malicious website is asked to distinguish themselves from bots by pressing a combination of keyboard keys that causes Microsoft Windows to download password-stealing malware.