CVE-2024-42501 – Authenticated Path Traversal Vulnerability Leads to a Remote Command Execution (RCE)
https://notcve.org/view.php?id=CVE-2024-42501
Successful exploitation of this vulnerability allows an attacker to install unsigned packages on the underlying operating system, enabling the threat actor to execute arbitrary code or install implants. • https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04709en_us&docLocale=en_US • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2024-38812 – Heap-overflow vulnerability
https://notcve.org/view.php?id=CVE-2024-38812
A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution. • https://github.com/maybeheisenberg/CVE-2024-38812 https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968 • CWE-122: Heap-based Buffer Overflow •
CVE-2024-8805 – BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-8805
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. ... An attacker can leverage this vulnerability to execute code in the context of the current user. •
CVE-2024-8806 – Cohesive Networks VNS3 Command Injection Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-8806
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cohesive Networks VNS3. ... The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. •
CVE-2024-8807 – Cohesive Networks VNS3 Command Injection Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-8807
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cohesive Networks VNS3. ... The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. •