![]() ![]() ![]() An unprivileged attacker could use this to force bcc to load compromised linux headers. ThĬVE-2024-28816 - Student Information Chatbot a0196ab allows SQL injection via the username to the login function in index.php.ĬVE-2024-28823 - Amazon AWS aws-js-s3-explorer (aka AWS JavaScript S3 Explorer) 1.0.0 allows XSS via a crafted S3 bucket name to index.html.ĬVE-2024-2313 - If kernel headers need to be extracted, bpftrace will attempt to load them from a temporary directory. Affected by this vulnerability is an unknown functionality of the file io\fabric\sdk\android\services\network\PinningTrustManager.java of the component SHA-1 Handler. CVE-2024-2184 - Buffer overflow in identifier field of WSD probe request process of Small Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary codĬVE-2024-2365 - A vulnerability classified as problematic was found in Musicshelf 1.0/1.1 on Android. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |