This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics CNCSoft-G2. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-39880.
Category Archives: Advisories
ZDI-24-936: Delta Electronics CNCSoft-G2 DPAX File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics CNCSoft-G2. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-39880.
ZDI-24-935: Delta Electronics CNCSoft-G2 DPAX File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics CNCSoft-G2. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-39880.
ZDI-24-934: Delta Electronics CNCSoft-G2 DPAX File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics CNCSoft-G2. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-39880.
ZDI-24-933: Delta Electronics CNCSoft-G2 DPAX File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics CNCSoft-G2. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-39880.
USN-6903-1: Thunderbird vulnerabilities
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2024-6600, CVE-2024-6601,
CVE-2024-6604)
Ronald Crane discovered that Thunderbird did not properly manage certain
memory operations in the NSS. An attacker could potentially exploit this
issue to cause a denial of service. (CVE-2024-6602)
Irvan Kurniawan discovered that Thunderbird did not properly manage memory
during thread creation. An attacker could potentially exploit this
issue to cause a denial of service, or execute arbitrary code.
(CVE-2024-6603)
ffmpeg-6.1.1-4.fc39
FEDORA-2024-4d2c8e6f85
Packages in this update:
ffmpeg-6.1.1-4.fc39
Update description:
Backport fix for CVE-2023-49528
ffmpeg-6.1.1-19.fc40
FEDORA-2024-810afc5c2e
Packages in this update:
ffmpeg-6.1.1-19.fc40
Update description:
Backport fix for CVE-2023-49528 and backport fixes for compatibility with Mesa 24.0.6+ / 24.1.4+ for VA-API
httpd-2.4.62-1.fc39
FEDORA-2024-70530a7586
Packages in this update:
httpd-2.4.62-1.fc39
Update description:
new version 2.4.62
Fixes CVE-2024-40725
httpd-2.4.62-1.fc40
FEDORA-2024-de08df1535
Packages in this update:
httpd-2.4.62-1.fc40
Update description:
new version 2.4.62
Fixes CVE-2024-40725