CVE-2024-53874 |
Description: NVIDIA CUDA toolkit for all platforms contains a vulnerability in the cuobjdump binary, where a user could cause an out-of-bounds read by passing a malformed ELF file to cuobjdump. A successful exploit of this vulnerability might lead to a partial denial of service.
CVSS: LOW (3.3) EPSS Score: 0.02% SSVC Exploitation: none
February 25th, 2025 (3 months ago)
|
CVE-2024-53873 |
Description: NVIDIA CUDA toolkit for Windows contains a vulnerability in the cuobjdump binary, where a user could cause an out-of-bounds read by passing a malformed ELF file to cuobjdump. A successful exploit of this vulnerability might lead to a partial denial of service.
CVSS: LOW (3.3) EPSS Score: 0.02%
February 25th, 2025 (3 months ago)
|
CVE-2024-53872 |
Description: NVIDIA CUDA toolkit for all platforms contains a vulnerability in the cuobjdump binary, where a user could cause an out-of-bounds read by passing a malformed ELF file to cuobjdump. A successful exploit of this vulnerability might lead to a partial denial of service.
CVSS: LOW (3.3) EPSS Score: 0.02%
February 25th, 2025 (3 months ago)
|
CVE-2024-53871 |
Description: NVIDIA CUDA toolkit for all platforms contains a vulnerability in the nvdisasm binary, where a user could cause an out-of-bounds read by passing a malformed ELF file to nvdisasm. A successful exploit of this vulnerability might lead to a partial denial of service.
CVSS: LOW (3.3) EPSS Score: 0.02%
February 25th, 2025 (3 months ago)
|
CVE-2024-53870 |
Description: NVIDIA CUDA toolkit for all platforms contains a vulnerability in the cuobjdump binary, where a user could cause an out-of-bounds read by passing a malformed ELF file to cuobjdump. A successful exploit of this vulnerability might lead to a partial denial of service.
CVSS: LOW (3.3) EPSS Score: 0.02%
February 25th, 2025 (3 months ago)
|
CVE-2025-26977 |
Description: Authorization Bypass Through User-Controlled Key vulnerability in Ninja Team Filebird allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Filebird: from n/a through 6.4.2.1.
CVSS: LOW (3.8) EPSS Score: 0.03%
February 25th, 2025 (3 months ago)
|
CVE-2024-51539 |
Description: The Dell Secure Connect Gateway (SCG) Application and Appliance, versions prior to 5.28, contains a SQL injection vulnerability due to improper neutralization of special elements used in an SQL command. This vulnerability can only be exploited locally on the affected system. A high-privilege attacker with access to the system could potentially exploit this vulnerability, leading to the disclosure of non-sensitive information that does not include any customer data.
CVSS: LOW (2.3) EPSS Score: 0.04%
February 25th, 2025 (3 months ago)
|
CVE-2024-53104 |
Description:
Nessus Plugin ID 216714 with High Severity
Synopsis
The remote SUSE host is missing a security update.
Description
The remote SUSE Linux SLES15 host has packages installed that are affected by a vulnerability as referenced in the SUSE- SU-2025:0704-1 advisory. This update for the Linux Kernel 5.14.21-150400_24_133 fixes one issue. The following security issue was fixed: - CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1236783).Tenable has extracted the preceding description block directly from the SUSE security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the affected kernel-livepatch-5_14_21-150400_24_133-default, kernel-livepatch-5_3_18-150300_59_182-default and / or kernel-livepatch-6_4_0-150600_23_25-default packages.
Read more at https://www.tenable.com/plugins/nessus/216714
CVSS: LOW (0.0)
February 25th, 2025 (3 months ago)
|
CVE-2024-53104 |
Description:
Nessus Plugin ID 216718 with High Severity
Synopsis
The remote SUSE host is missing a security update.
Description
The remote SUSE Linux SLES12 / SLES15 host has packages installed that are affected by a vulnerability as referenced in the SUSE-SU-2025:0650-1 advisory. This update for the Linux Kernel 4.12.14-122_219 fixes one issue. The following security issue was fixed: - CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1236783).Tenable has extracted the preceding description block directly from the SUSE security advisory.Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Solution
Update the affected kernel-livepatch-5_14_21-150500_55_73-default, kernel-livepatch-5_3_18-150300_59_179-default, kernel-livepatch-6_4_0-150600_10_5-rt and / or kgraft-patch-4_12_14-122_219-default packages.
Read more at https://www.tenable.com/plugins/nessus/216718
CVSS: LOW (0.0)
February 25th, 2025 (3 months ago)
|
CVE-2024-8612 |
Description:
Nessus Plugin ID 216730 with Low Severity
Synopsis
The remote SUSE host is missing one or more security updates.
Description
The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:0692-1 advisory. - CVE-2024-8612: Fixed information leak in virtio devices (bsc#1230915). - CVE-2024-7409: Fixed denial of service via improper synchronization in QEMU NBD Server during socket closure (bsc#1229007). - CVE-2024-3447: Fixed heap buffer overflow in sdhci_write_dataport() (bsc#1222845). Other fixes: - Fix ipxe build with new binutils (bsc#1219733, bsc#1219722).Tenable has extracted the preceding description block directly from the SUSE security advisory.Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Update the affected packages.
Read more at https://www.tenable.com/plugins/nessus/216730
CVSS: LOW (3.8) EPSS Score: 0.04%
February 25th, 2025 (3 months ago)
|