Recent backdoor implants and cyber-espionage attacks on their supply chains have African organizations looking to diversify beyond Chinese, American tech vendors.
Threat actors exploit misconfigured JupyterLab and Jupyter Notebooks servers to rip sports streams and illegally redistribute them. Researchers from security firm Aqua observed threat actors exploiting misconfigured JupyterLab and Jupyter Notebook servers to hijack environments, deploy streaming tools, and duplicate live sports broadcasts on illegal platforms. “threat actors using misconfigured servers to hijack environments for […]
A vulnerability was found in PyMOL 2.5.0. It has been declared as critical. This vulnerability affects unknown code of the component PYM File Handler. The manipulation leads to improper authorization.
This vulnerability was named CVE-2024-50636. The attack can be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Microsoft Windows Server 2022. This issue affects some unknown processing of the component SMBv3 Server. The manipulation leads to double free.
The identification of this vulnerability is CVE-2024-43447. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as critical, was found in Microsoft Windows. Affected is an unknown function of the component USB Video Class System Driver. The manipulation leads to out-of-bounds read.
This vulnerability is traded as CVE-2024-43449. It is possible to launch the attack on the physical device. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability has been found in Microsoft Windows and classified as critical. Affected by this vulnerability is an unknown functionality of the component DNS. The manipulation leads to improper enforcement of message integrity.
This vulnerability is known as CVE-2024-43450. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Windows. It has been classified as critical. This affects an unknown part of the component Registry. The manipulation leads to time-of-check time-of-use.
This vulnerability is uniquely identified as CVE-2024-43452. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Microsoft Windows 11 22H2/11 23H2/11 24H2/Server 2022 23H2/Server 2025. It has been rated as problematic. This issue affects some unknown processing of the component Virtual Hard Disk. The manipulation leads to sensitive data storage in improperly locked memory.
The identification of this vulnerability is CVE-2024-38264. The attack may be initiated remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical has been found in Microsoft SQL Server 2016/2017/2019. Affected is an unknown function of the component Native Client. The manipulation leads to use after free.
This vulnerability is traded as CVE-2024-43459. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical was found in Microsoft SQL Server 2016/2017/2019. Affected by this vulnerability is an unknown functionality of the component Native Client. The manipulation leads to heap-based buffer overflow.
This vulnerability is known as CVE-2024-43462. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical was found in Intel Server Board M70KLP. This vulnerability affects unknown code of the component UEFI Firmware. The manipulation leads to improper access controls.
This vulnerability was named CVE-2024-39609. The attack needs to be approached locally. There is no exploit available.
A vulnerability was found in Intel Server Board M10JNP2SB Family and classified as critical. Affected by this issue is some unknown functionality of the component UEFI Firmware. The manipulation leads to improper input validation.
This vulnerability is handled as CVE-2024-41167. It is possible to launch the attack on the local host. There is no exploit available.
A vulnerability was found in Apereo CAS 6.6 and classified as problematic. Affected by this issue is some unknown functionality of the file /login?service. The manipulation leads to session expiration.
This vulnerability is handled as CVE-2024-11208. The attack may be launched remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in Microsoft .NET and Visual Studio and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to unchecked input for loop condition.
This vulnerability is known as CVE-2024-43499. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as very critical, was found in Microsoft .NET and Visual Studio. Affected is an unknown function. The manipulation leads to type confusion.
This vulnerability is traded as CVE-2024-43498. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.