Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2024-10-15 CVE-2024-21285 Unspecified vulnerability in Oracle Banking Liquidity Management 14.5.0.12.0
Vulnerability in the Oracle Banking Liquidity Management product of Oracle Financial Services Applications (component: Reports).
network
high complexity
oracle
7.1
2024-10-15 CVE-2024-21286 Unspecified vulnerability in Oracle Peoplesoft Enterprise 9.2
Vulnerability in the PeopleSoft Enterprise ELM Enterprise Learning Management product of Oracle PeopleSoft (component: Enterprise Learning Management).
network
low complexity
oracle
5.4
2024-10-15 CVE-2024-9676 Unspecified vulnerability in Redhat products
A vulnerability was found in Podman, Buildah, and CRI-O.
network
low complexity
redhat
6.5
2024-10-15 CVE-2024-9979 A flaw was found in PyO3.
local
low complexity
5.3
2024-10-15 CVE-2024-9986 SQL Injection vulnerability in Fabianros Blood Bank Management System 1.0
A vulnerability was found in code-projects Blood Bank Management System 1.0.
network
low complexity
fabianros CWE-89
critical
9.8
2024-10-15 CVE-2024-45271 An unauthenticated local attacker can gain admin privileges by deploying a config file due to improper input validation.
local
low complexity
mbconnectline helmholz
7.8
2024-10-15 CVE-2024-45273 Inadequate Encryption Strength vulnerability in multiple products
An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.
local
low complexity
mbconnectline helmholz CWE-326
7.8
2024-10-15 CVE-2024-45275 The devices contain two hard coded user accounts with hardcoded passwords that allow an unauthenticated remote attacker for full control of the affected devices.
network
low complexity
mbconnectline helmholz
critical
9.8
2024-10-15 CVE-2024-47674 Incomplete Cleanup vulnerability in Linux Kernel
In the Linux kernel, the following vulnerability has been resolved: mm: avoid leaving partial pfn mappings around in error case As Jann points out, PFN mappings are special, because unlike normal memory mappings, there is no lifetime information associated with the mapping - it is just a raw mapping of PFNs with no reference counting of a 'struct page'. That's all very much intentional, but it does mean that it's easy to mess up the cleanup in case of errors.
local
low complexity
linux CWE-459
5.5
2024-10-15 CVE-2024-49382 Unspecified vulnerability in Acronis Cyber Protect 16
Excessive attack surface in archive-server service due to binding to an unrestricted IP address.
low complexity
acronis
4.3