Run by the team at orchestration, AI, and automation platform Tines, the Tines library contains pre-built workflows shared by real security practitioners from across the community, all of which are free to import and deploy via the Community Edition of the platform.
Their bi-annual “You Did What with Tines?!” competition highlights some of the most interesting workflows submitted by their
A vulnerability has been found in RTI Connext Professional up to 6.1.2.16/7.3.0.1 and classified as critical. This vulnerability affects unknown code. The manipulation leads to buffer overflow.
This vulnerability was named CVE-2024-52059. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in RTI Connext Professional up to 6.0.1.39/6.1.2.20/7.3.0.4. This affects an unknown part of the component Routing Service. The manipulation leads to buffer overflow.
This vulnerability is uniquely identified as CVE-2024-52066. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in RTI Connext Professional up to 5.3.1.40/6.1.2.20/7.3.0.1 on Non-Windows. Affected by this issue is some unknown functionality of the component Persistence Service. The manipulation leads to buffer overflow.
This vulnerability is handled as CVE-2024-52065. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in RTI Connext Professional up to 5.3.1.44/6.0.1.39/6.1.2.20/7.3.0.1. Affected by this vulnerability is an unknown functionality of the component Core Libraries. The manipulation leads to buffer overflow.
This vulnerability is known as CVE-2024-52064. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical has been found in RTI Connext Professional up to 5.3.1.44/6.0.1.39/6.1.2.20/7.3.0.4. Affected is an unknown function of the component Core Libraries/Routing Service. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2024-52063. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in RTI Connext Professional up to 5.3.1.44/6.0.1.39/6.1.2.20/7.3.0.4. It has been rated as critical. This issue affects some unknown processing of the component Core Libraries. The manipulation leads to buffer overflow.
The identification of this vulnerability is CVE-2024-52062. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in RTI Connext Professional up to 5.3.1.44/6.0.1.39/6.1.2.20/7.3.0.4. It has been declared as critical. This vulnerability affects unknown code of the component Core Libraries/Queuing Service/Recording Service/Routing Service. The manipulation leads to buffer overflow.
This vulnerability was named CVE-2024-52061. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in RTI Connext Professional up to 6.1.2.18/7.3.0.1. It has been classified as critical. This affects an unknown part of the component System Designer. The manipulation leads to os command injection.
This vulnerability is uniquely identified as CVE-2024-52058. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in RTI Connext Professional up to 5.2.x/6.1.2.16/7.3.0 and classified as critical. Affected by this issue is some unknown functionality of the component Queuing Service. The manipulation leads to sql injection.
This vulnerability is handled as CVE-2024-52057. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in RTI Connext Professional up to 5.3.1.44/6.0.1.39/6.1.2.20/7.3.0.4 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Routing Service/Recording Service/Queuing Service/Observability Collector Service/Cloud Discovery Service. The manipulation leads to buffer overflow.
This vulnerability is known as CVE-2024-52060. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific risks it poses for your company is more complex than it seems