A vulnerability classified as problematic has been found in Microsoft Power Platform Terraform Provider up to 2.7.0. Affected is an unknown function. The manipulation of the argument client_secret leads to improper output neutralization for logs.
This vulnerability is traded as CVE-2024-47083. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 6.6.51/6.10.10 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component ipheth. The manipulation leads to Privilege Escalation.
This vulnerability is known as CVE-2024-46861. The attack needs to be approached within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.10.10 and classified as critical. Affected by this issue is the function hda_sdw_machine_select of the component soc-acpi-intel-mtl-match. The manipulation leads to infinite loop.
This vulnerability is handled as CVE-2024-46862. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in NginxProxyManager 2.11.3. Affected is the function requestLetsEncryptSslWithDnsChallenge. The manipulation leads to command injection.
This vulnerability is traded as CVE-2024-46257. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical has been found in NginxProxyManager 2.11.3. Affected is the function requestLetsEncryptSsl of the component Add Lets Encrypt Certificate. The manipulation leads to command injection.
This vulnerability is traded as CVE-2024-46256. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as very critical has been found in Silicon Labs Gecko OS. Affected is an unknown function of the component Debug Interface. The manipulation leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2024-23938. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as very critical was found in Autel MaxiCharger AC Elite Business C50. Affected by this vulnerability is the function DLB_HostHeartBeat. The manipulation leads to stack-based buffer overflow.
This vulnerability is known as CVE-2024-23957. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Alpine Halo9. It has been declared as very critical. Affected by this vulnerability is the function UPDM_wemCmdCreatSHA256Hash. The manipulation leads to command injection.
This vulnerability is known as CVE-2024-23924. The attack can be launched remotely. There is no exploit available.
It is recommended to replace the affected component with an alternative.
A vulnerability was found in Alpine Halo9. It has been rated as very critical. Affected by this issue is the function prh_l2_sar_data_ind. The manipulation leads to use after free.
This vulnerability is handled as CVE-2024-23923. The attack may be launched remotely. There is no exploit available.
It is recommended to replace the affected component with an alternative.
A vulnerability has been found in EU UK VAT Manager for WooCommerce Plugin up to 2.12.12 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to missing authorization.
This vulnerability is known as CVE-2024-9189. The attack needs to be initiated within the local network. There is no exploit available.
FSB Hackers Stripped of 107 Domains Used to Steal Credentials The U.S. Department of Justice and Microsoft seized more than 100 websites allegedly used by a Russian intelligence cyberespionage operation with a fondness for spear phishing. Targets include the national security apparatus and journalists, think tanks, and non-governmental organizations.
CorrectCare to Settle Lawsuit After 'Inadvertently' Exposing PHI on Web for Months A misconfigured web server and the exposure of sensitive information for nearly 600,000 prison inmates in 2022 will cost medical claims processing company CorrectCare $6.49 million to settle a consolidated proposed class action lawsuit, according to court records.
Also: Prison Sentences for BEC Scammers and a West African Cybercrime Crackdown This week, AI nudify sites spread malware, BEC scammers head to prison, London man charged with hacking, and a Spanish insurance company with a breach. Also, a North Korean hacking group and a West African crackdown on online scammers. And, a Schrödinger Windows vulnerability: Is it real?
US Cyber Defense Agency Plans to Review Updated Implementation Plans in November A top official from the U.S. Cybersecurity and Infrastructure Security Agency said Thursday the agency is planning to review updated federal implementation plans and ensure agencies are aligning with zero trust security objectives and addressing any funding gaps or technical challenges.
A vulnerability was found in Creatingahaven Compassion Satisfaction 0.75.13440.35155. It has been declared as critical. This vulnerability affects unknown code of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
This vulnerability was named CVE-2014-7368. The attack needs to be approached within the local network. There is no exploit available.
A vulnerability, which was classified as very critical, has been found in Adobe Flash Player. This issue affects some unknown processing. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2016-4190. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Grandora Rialto 1.6 and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument searchin leads to sql injection.
This vulnerability is known as CVE-2006-6927. The attack can be launched remotely. Furthermore, there is an exploit available.