CVE-2024-38812
- 4 Posts
- 3 Interactions
CVE Info
Fediverse
VMware vCenter : un second patch pour cette faille de sécurité critique déjà corrigée en septembre dernier ! https://www.it-connect.fr/vmware-vcenter-second-patch-pour-faille-cve-2024-38812/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #VMware
The vulnerability, tracked as CVE-2024-38812 (CVSS score: 9.8), concerns a case of heap-overflow vulnerability in the implementation of the DCE/RPC protocol. https://thehackernews.com/2024/10/vmware-releases-vcenter-server-update.html
Update on CVE-2024-38812: Heap-Buffer Overflow vulnerability in VMWare vCenter: VMware has determined that the vCenter patches released previously did not completely mitigate the vulnerability. Refer attached image for the UPDATED response matrix.
🛑 MAJ 22 octobre 2024 :
#Broadcom a annoncé que les correctifs #VMware #vCenter publiés le 17 sept. 2024 ne couvraient pas complètement la vulnérabilité CVE-2024-38812. Il est important pour tous les clients d’appliquer les derniers correctifs disponibles dans la matrice de réponse. Les patches pour la version 8.0 U2 sont également disponibles.
Produits impactés :
- vCenter Server 8.0
- vCenter Server 7.0
- VMware Cloud Foundation 5.x
- VMware Cloud Foundation 4.x
CVE-2024-35219
- 1 Post
- 4 Interactions
CVE Info
Fediverse
CVE-2024-9050
- 1 Post
- 6 Interactions
CVE Info
Fediverse
CVE-2024-41583
- 1 Post
CVE Info
Fediverse
If you own, or support a Draytek Vigor router/modem, it's our turn to do the upgrade dance to mitigate some serious 'shit'.
https://www.draytek.com/support/resources/routers#version
Read more: https://www.draytek.com/about/security-advisory/ #Draytek #Vigor #Router #CVE-2024-46550 #CVE-2024-46568, #CVE-2024-46571, #CVE-2024-46580 #CVE-2024-46586, #CVE-2024-46588 ~ #CVE-2024-46598
#CVE-2024-41583 to #CVE-2024-41596
CVE-2024-46550
- 1 Post
CVE Info
Fediverse
If you own, or support a Draytek Vigor router/modem, it's our turn to do the upgrade dance to mitigate some serious 'shit'.
https://www.draytek.com/support/resources/routers#version
Read more: https://www.draytek.com/about/security-advisory/ #Draytek #Vigor #Router #CVE-2024-46550 #CVE-2024-46568, #CVE-2024-46571, #CVE-2024-46580 #CVE-2024-46586, #CVE-2024-46588 ~ #CVE-2024-46598
#CVE-2024-41583 to #CVE-2024-41596
CVE-2024-41596
- 1 Post
CVE Info
Fediverse
If you own, or support a Draytek Vigor router/modem, it's our turn to do the upgrade dance to mitigate some serious 'shit'.
https://www.draytek.com/support/resources/routers#version
Read more: https://www.draytek.com/about/security-advisory/ #Draytek #Vigor #Router #CVE-2024-46550 #CVE-2024-46568, #CVE-2024-46571, #CVE-2024-46580 #CVE-2024-46586, #CVE-2024-46588 ~ #CVE-2024-46598
#CVE-2024-41583 to #CVE-2024-41596
CVE-2024-46580
- 1 Post
CVE Info
Fediverse
If you own, or support a Draytek Vigor router/modem, it's our turn to do the upgrade dance to mitigate some serious 'shit'.
https://www.draytek.com/support/resources/routers#version
Read more: https://www.draytek.com/about/security-advisory/ #Draytek #Vigor #Router #CVE-2024-46550 #CVE-2024-46568, #CVE-2024-46571, #CVE-2024-46580 #CVE-2024-46586, #CVE-2024-46588 ~ #CVE-2024-46598
#CVE-2024-41583 to #CVE-2024-41596
CVE-2024-46598
- 1 Post
CVE Info
Fediverse
If you own, or support a Draytek Vigor router/modem, it's our turn to do the upgrade dance to mitigate some serious 'shit'.
https://www.draytek.com/support/resources/routers#version
Read more: https://www.draytek.com/about/security-advisory/ #Draytek #Vigor #Router #CVE-2024-46550 #CVE-2024-46568, #CVE-2024-46571, #CVE-2024-46580 #CVE-2024-46586, #CVE-2024-46588 ~ #CVE-2024-46598
#CVE-2024-41583 to #CVE-2024-41596