This vulnerability allows remote attackers to disclose sensitive information on affected installations of Hewlett Packard Enterprise AutoPass License Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assigned: CVE-2024-51769.
Category Archives: Advisories
ZDI-24-1632: Hewlett Packard Enterprise AutoPass License Server hsqldb Remote Code Execution Vulnerability
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Hewlett Packard Enterprise AutoPass License Server. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The ZDI has assigned a CVSS rating of 8.0. The following CVEs are assigned: CVE-2024-51768.
ZDI-24-1631: Hewlett Packard Enterprise AutoPass License Server Authentication Bypass Vulnerability
This vulnerability allows remote attackers to bypass authentication on affected installations of Hewlett Packard Enterprise AutoPass License Server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.3. The following CVEs are assigned: CVE-2024-51767.
DSA-5822-1 simplesamlphp – security update
It was discovered that in SimpleSAMLphp, an implementation of the SAML
2.0 protocol, is prone to a XXE vulnerability when loading an
(untrusted) XML document.
DSA-5815-2 needrestart – regression update
The update for needrestart announced as DSA 5815-1 introduced a
regression reporting false positives for processes running in chroot or
mountns. Updated packages are now available to correct this issue.
DSA-5823-1 webkit2gtk – security update
The following vulnerabilities have been discovered in the WebKitGTK
web engine:
CVE-2024-44308
Clement Lecigne and Benoit Sevens discovered that processing
maliciously crafted web content may lead to arbitrary code
execution. Apple is aware of a report that this issue may have
been actively exploited on Intel-based Mac systems.
CVE-2024-44309
Clement Lecigne and Benoit Sevens discovered that processing
maliciously crafted web content may lead to a cross site scripting
attack. Apple is aware of a report that this issue may have been
actively exploited on Intel-based Mac systems.
retsnoop-0.10.1-3.el9
FEDORA-EPEL-2024-a5d5bf3d08
Packages in this update:
retsnoop-0.10.1-3.el9
Update description:
Rebuild affected applications with ruzstd v0.7.3 to address RUSTSEC-2024-0400.
retsnoop-0.10.1-3.el10_0
FEDORA-EPEL-2024-6392f1c6e3
Packages in this update:
retsnoop-0.10.1-3.el10_0
Update description:
Rebuild affected applications with ruzstd v0.7.3 to address RUSTSEC-2024-0400.
retsnoop-0.10.1-3.fc40 rust-rbspy-0.24.0-3.fc40
FEDORA-2024-ccce2763b0
Packages in this update:
retsnoop-0.10.1-3.fc40
rust-rbspy-0.24.0-3.fc40
Update description:
Rebuild affected applications with ruzstd v0.7.3 to address RUSTSEC-2024-0400.
retsnoop-0.10.1-3.fc41 rust-rbspy-0.24.0-3.fc41
FEDORA-2024-aa246ab1a3
Packages in this update:
retsnoop-0.10.1-3.fc41
rust-rbspy-0.24.0-3.fc41
Update description:
Rebuild affected applications with ruzstd v0.7.3 to address RUSTSEC-2024-0400.