A vulnerability was found in OrbiTeam BSCW Classic up to 5.0.11/5.1.9/5.2.3/7.3.2/7.4.2. It has been declared as critical. This vulnerability affects an unknown function of the component Archive Extraction Handler. Upgrading to version 5.0.12, 5.1.10, 5.2.4, 7.3.3 or 7.4.3 eliminates this vulnerability.
OrbiTeam BSCW Classic up to 5.0.11/5.1.9/5.2.3/7.3.2/7.4.2 Archive Extraction code injection
- Virtual Patching
- August 30, 2021
- 6:04 pm
CVE-2024-24856 : LINUX KERNEL UP TO 6.8 ACPI_ALLOCATE_ZEROED NULL POINTER DEREFERENCE
Description The memory allocation function ACPI_ALLOCATE_ZEROED does not guarantee a successful allocation, but the subsequent code directly dereferences the pointer
CVE-2024-2912 : BENTOML FRAMEWORK UP TO 1.2.4 POST REQUEST INSECURE DEFAULT INITIALIZATION OF RESOURCE
Description An insecure deserialization vulnerability exists in the BentoML framework, allowing remote code execution (RCE) by sending a specially crafted
CVE-2024-26817 : LINUX KERNEL UP TO 6.8.5 AMDKFD KZALLOC INTEGER OVERFLOW
Description In the Linux kernel, the following vulnerability has been resolved: amdkfd: use calloc instead of kzalloc to avoid integer