A vulnerability, which was classified as very critical, was found in Veritas Enterprise Vault up to 15.1. This affects an unknown part of the component .NET Remoting TCP Port. The manipulation leads to deserialization.
This vulnerability is uniquely identified as CVE-2024-53909. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Veritas Enterprise Vault up to 15.1. It has been classified as very critical. Affected is an unknown function of the component .NET Remoting TCP Port. The manipulation leads to deserialization.
This vulnerability is traded as CVE-2024-53912. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Veritas Enterprise Vault up to 15.1. It has been declared as very critical. Affected by this vulnerability is an unknown functionality of the component .NET Remoting TCP Port. The manipulation leads to deserialization.
This vulnerability is known as CVE-2024-53913. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Adobe Acrobat Reader up to 9.0. Affected is an unknown function. The manipulation leads to improper resource management.
This vulnerability is traded as CVE-2009-2983. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in Red Hat KON 0.3.9. Affected by this vulnerability is an unknown functionality of the component fld. The manipulation of the argument CHARSET_REGISTRY/CHARSET_ENCODING leads to memory corruption.
This vulnerability is known as CVE-2000-0607. Local access is required to approach this attack. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Alice Gate2 Plus Wi-Fi. Affected is an unknown function of the file cp06_wifi_m_nocifr.cgi. The manipulation leads to cross-site request forgery.
This vulnerability is traded as CVE-2008-7165. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
Linux-Targeting Bootkitty Appears More Proof-of-Concept Than Threat, Researchers Say Cybersecurity researchers have discovered the first-ever UEFI bootkit designed to target Linux systems and subvert their boot process for malicious purposes. The "Bootkitty" malware, first uploaded to VirusTotal this month, appears to be more "proof of concept" than full-fledged threat, they said.
European Commission Opens Infringement Procedures Against 23 EU Member States The European Commission on Thursday opened infringement procedures against 23 EU member states that missed a mid-October deadline for implementing the NIS2 Directive, as well 24 EU members that missed a Critical Entities Resilience Directive deadline.
Researchers Discover 20 Critical Flaws Attackers Could Exploit in a Variety of Ways Researchers identified 20 critical vulnerabilities in a type of Advantech industrial-grade wireless access points that is widely deployed across critical infrastructure environments. Attackers could exploit the flaws to remotely executive code and create denials of service.