A vulnerability has been found in Sony XAV-AX5500 and classified as critical. Affected by this vulnerability is an unknown functionality of the component USB Configuration Descriptor Handler. The manipulation leads to buffer overflow.
This vulnerability is known as CVE-2024-23972. It is possible to launch the attack on the physical device. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in DataEase up to 2.10.0. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to xml external entity reference.
This vulnerability is handled as CVE-2024-46985. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in lobehub lobe-chat up to 1.19.12. This vulnerability affects unknown code of the file src/app/api/proxy/route.ts. The manipulation leads to server-side request forgery.
This vulnerability was named CVE-2024-47066. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Parallels Desktop up to 19.3.0 on macOS and classified as very critical. Affected by this issue is some unknown functionality of the component Parallels Service. The manipulation leads to incorrect execution-assigned permissions.
This vulnerability is handled as CVE-2024-34331. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in AliyunContainerService Pouch 1.3.1. This issue affects some unknown processing. The manipulation leads to symlink following.
The identification of this vulnerability is CVE-2024-41228. Access to the local network is required for this attack to succeed. There is no exploit available.
A new set of security vulnerabilities has been disclosed in the OpenPrinting Common Unix Printing System (CUPS) on Linux systems that could permit remote command execution under certain conditions.
"A remote unauthenticated attacker can silently replace existing printers' (or install new ones) IPP urls with a malicious one, resulting in arbitrary command execution (on the computer) when a print
A vulnerability, which was classified as critical, has been found in Google Chrome. Affected by this issue is the function erase of the file browser/extensions/api/dial/dial_registry.cc. The manipulation leads to incorrect permission assignment.
This vulnerability is handled as CVE-2016-5202. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
De eerste van de 213 F-16’s die Nederland kocht, arriveerde 6 juni 1979 op Vliegbasis Leeuwarden. Meer dan 45 jaar bewees het jachtvliegtuig van Amerikaanse makelij zijn meerwaarde in binnen- en buitenland. In 1979 volgde de F-16 Fighting Falcon de F-104 Starfighter op, en later ook de NF-5. Inmiddels vervangt de F-35 de F-16. Vanmiddag nam Defensie officieel afscheid van het legendarische toestel. Dat gebeurde onder meer met een formatievlucht van 8 toestellen boven Nederland.
Progress Software warned customers to patch multiple critical and high-severity vulnerabilities in its WhatsUp Gold network monitoring tool as soon as possible. [...]
The Network Coordination Hub for the National Network for Microelectronics Education will establish and operate regional nodes to offer consistent, rigorous, engaging curricula, instructional materials, experiential opportunities, teacher
In de lucht, op en onder water: drones, drones en nog eens drones. 25 NAVO-landen testten afgelopen weken de grootschalige inzet van deze onbemande systemen in maritieme operaties. Dat gebeurde voor de kust van het Portugese Sesimbra en het schiereiland Tróia. De Koninklijke Marine nam deel met amfibisch transportschip Zr.Ms. Johan de Witt. Ook de Mijnenbestrijding Module Groep leverde een bijdrage met ondersteuningsschip Geosea en verschillende waterdrones.
A vulnerability, which was classified as critical, was found in Veritas Backup Exec up to 21.1. This affects an unknown part of the component TLS Communication Handler. The manipulation of the argument input leads to improper authentication.
This vulnerability is uniquely identified as CVE-2021-27876. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Veritas Backup Exec up to 21.1 and classified as critical. This vulnerability affects unknown code of the component SHA Authentication. The manipulation leads to improper authentication.
This vulnerability was named CVE-2021-27877. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Veritas Backup Exec up to 21.1 and classified as critical. This issue affects some unknown processing of the component TLS Communication Handler. The manipulation leads to improper authentication.
The identification of this vulnerability is CVE-2021-27878. The attack may be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in Apple iOS and iPadOS up to 15.0.2. This affects an unknown part of the component GPU Drivers. The manipulation leads to out-of-bounds write.
This vulnerability is uniquely identified as CVE-2021-30900. An attack has to be approached locally. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in ARM Mali GPU Driver up to 2022-01-03 and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to Privilege Escalation.
This vulnerability is handled as CVE-2022-22706. The attack needs to be done within the local network. Furthermore, there is an exploit available.
A vulnerability was found in onesolutionapps Bust Out Bail 1.1 and classified as critical. This issue affects some unknown processing of the component X.509 Certificate Handler. The manipulation leads to cryptographic issues.
The identification of this vulnerability is CVE-2014-7045. Access to the local network is required for this attack. There is no exploit available.