Kategorie: Allgemein

[UPDATE] [mittel] ImageMagick: Schwachstellen ermöglicen Offenlegung von Informationen

Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in ImageMagick ausnutzen, um Informationen offenzulegen.

[UPDATE] [mittel] ImageMagick: Mehrere Schwachstellen ermöglichen Denial of Service

Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in ImageMagick ausnutzen, um einen Denial of Service Angriff durchzuführen.

[UPDATE] [mittel] Broadcom Fabric OS: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen

Ein lokaler Angreifer kann mehrere Schwachstellen in Broadcom Fabric OS ausnutzen, um Informationen offenzulegen.

[UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service

Ein lokaler Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen unspezifischen Angriff durchzuführen.

Chromium: CVE-2024-8033 Inappropriate implementation in WebApp Installs

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.

Chromium: CVE-2024-7981 Inappropriate implementation in Views

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.

Chromium: CVE-2024-7975 Inappropriate implementation in Permissions

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.

Chromium: CVE-2024-7971 Type confusion in V8

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information. Google is aware that an exploit for CVE-2024-7971 exists in the wild.

Chromium: CVE-2024-7979 Insufficient data validation in Installer

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see [Google Chrome Releases](https://chromereleases.googleblog.com/2024) for more information.