CVE-2024-42501 – Authenticated Path Traversal Vulnerability Leads to a Remote Command Execution (RCE)
https://notcve.org/view.php?id=CVE-2024-42501
Successful exploitation of this vulnerability allows an attacker to install unsigned packages on the underlying operating system, enabling the threat actor to execute arbitrary code or install implants. • https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04709en_us&docLocale=en_US • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2024-38812 – Heap-overflow vulnerability
https://notcve.org/view.php?id=CVE-2024-38812
A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution. • https://github.com/maybeheisenberg/CVE-2024-38812 https://github.com/groshi/CVE-2024-38812-POC-5-Hands-Private https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968 • CWE-122: Heap-based Buffer Overflow •
CVE-2024-8836 – PDF-XChange Editor TIF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2024-8836
An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. •
CVE-2024-8811 – WinZip Mark-of-the-Web Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2024-8811
An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. •
CVE-2024-8814 – PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-8814
This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. •