A vulnerability was found in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security and Worry-Free Business Security Services 10.0. It has been declared as critical. Affected by this vulnerability is some unknown functionality. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Trend Micro Apex One 10.0 access control [CVE-2021-3848]
- Virtual Patching
- October 7, 2021
- 3:04 am
CVE-2024-52587 : STEP-SECURITY HARDEN-RUNNER UP TO 2.10.1 ENVIRONMENT VARIABLE OS COMMAND INJECTION
Description StepSecurity’s Harden-Runner provides network egress filtering and runtime security for GitHub-hosted and self-hosted runners. Versions of step-security/harden-runner prior to
CVE-2024-50282 : LINUX KERNEL UP TO 6.11.7 AMD GPU AMDGPU_DEBUGFS_GPRWAVE_READ BUFFER OVERFLOW
Description In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() Avoid a
CVE-2024-50919 : JPRESS 5.1.1 ON WINDOWS JSP FILE UNRESTRICTED UPLOAD
Description Jpress until v5.1.1 has arbitrary file uploads on the windows platform, and the construction of non-standard file formats such