A vulnerability has been found in libslirp 4.1.0 and classified as critical. Affected by this vulnerability is the function snprintf of the file tcp_subr.c. The manipulation as part of Return Value leads to buffer overflow.
This vulnerability is known as CVE-2020-8608. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Oracle Java SE 7u301. This affects an unknown part of the component JNDI. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2021-2432. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel. It has been classified as critical. Affected is the function route4_change of the file net/sched/cls_route.c of the component Traffic Control Networking Subsystem. The manipulation leads to use after free.
This vulnerability is traded as CVE-2021-3715. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
Sophos reports ransomware operators are exploiting a critical code execution flaw in Veeam Backup & Replication. Sophos researchers warn that ransomware operators are exploiting the critical vulnerability CVE-2024-40711 in Veeam Backup & Replication to create rogue accounts and deploy malware. In early September 2024, Veeam released security updates to address multiple vulnerabilities impacting its products, […]