free
-
A vulnerability was found in Apple tvOS up to 11.4.1. It has been classified as critical. This affects an unknown part. The manipulation leads to use after free. This vulnerability is uniquely identified as CVE-2018-4315. It is possible to initiate the attack remotely. Furthermore, there is an exploit available. It is recommended to upgrade the…
-
A vulnerability, which was classified as critical, was found in Apple iCloud up to 7.6 on Windows. Affected is an unknown function of the component Memory Management Routine. The manipulation leads to use after free. This vulnerability is traded as CVE-2018-4318. It is possible to launch the attack remotely. Furthermore, there is an exploit available.…
-
A vulnerability, which was classified as critical, has been found in Apple iTunes up to 12.8 on Windows. This issue affects some unknown processing of the component Memory Management Routine. The manipulation leads to use after free. The identification of this vulnerability is CVE-2018-4318. The attack may be initiated remotely. Furthermore, there is an exploit…
-
A vulnerability classified as critical has been found in Apple tvOS up to 11.4.1. This affects an unknown part of the component Memory Management Routine. The manipulation leads to use after free. This vulnerability is uniquely identified as CVE-2018-4318. It is possible to initiate the attack remotely. Furthermore, there is an exploit available. It is…
-
A vulnerability was found in Apple iOS up to 11.4.1. It has been rated as critical. Affected by this issue is some unknown functionality of the component Memory Management Routine. The manipulation leads to use after free. This vulnerability is handled as CVE-2018-4318. The attack may be launched remotely. Furthermore, there is an exploit available.…
-
A vulnerability was found in Apple iCloud up to 7.6 on Windows and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to use after free. This vulnerability is handled as CVE-2018-4314. The attack may be launched remotely. Furthermore, there is an exploit available. It is recommended to upgrade the…
-
A vulnerability has been found in Apple iTunes up to 12.8 on Windows and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to use after free. This vulnerability is known as CVE-2018-4314. The attack can be launched remotely. Furthermore, there is an exploit available. It is recommended to upgrade…
-
A vulnerability was found in Microsoft Windows. It has been rated as critical. This issue affects some unknown processing of the component WDAC OLE DB Provider for SQL Server. The manipulation leads to use after free. The identification of this vulnerability is CVE-2024-30006. The attack may be initiated remotely. There is no exploit available. It…
-
A vulnerability, which was classified as problematic, has been found in Apache Xerces C++ up to 3.2.2. This issue affects some unknown processing of the component External DTD Scanning. The manipulation leads to use after free. The identification of this vulnerability is CVE-2024-23807. The attack needs to be approached within the local network. There is…
-
A vulnerability classified as critical has been found in Microsoft SQL Server. Affected is an unknown function of the component Native Client OLE DB Provider. The manipulation leads to use after free. This vulnerability is traded as CVE-2024-21332. It is possible to launch the attack remotely. There is no exploit available. It is recommended to…
-
A vulnerability was found in Microsoft SQL Server. It has been classified as critical. This affects an unknown part of the component Native Client OLE DB Provider. The manipulation leads to use after free. This vulnerability is uniquely identified as CVE-2024-21308. It is possible to initiate the attack remotely. There is no exploit available. It…
-
A vulnerability classified as critical was found in Qualcomm Snapdragon. Affected by this vulnerability is an unknown functionality of the component IOCTL Call Handler. The manipulation leads to use after free. This vulnerability is known as CVE-2024-23354. The attack needs to be approached locally. There is no exploit available. It is recommended to upgrade the…
-
A vulnerability classified as critical was found in Qualcomm Snapdragon. Affected by this vulnerability is an unknown functionality of the component IOCTL Call Handler. The manipulation leads to use after free. This vulnerability is known as CVE-2024-23354. The attack needs to be approached locally. There is no exploit available. It is recommended to upgrade the…
-
A vulnerability classified as critical was found in Qualcomm Snapdragon. Affected by this vulnerability is an unknown functionality of the component IOMMU. The manipulation leads to use after free. This vulnerability is known as CVE-2024-21471. Local access is required to approach this attack. There is no exploit available. It is recommended to upgrade the affected…
-
We tested the best free VPNs from reputable companies that offer solid services. Here’s what to know, how to avoid security risks, and what ZDNET’s recommendations are.
-
We tested the best free VPNs from reputable companies that offer solid services. Here’s what to know, how to avoid security risks, and what ZDNET’s recommendations are.
-
A vulnerability was found in Apple macOS up to 13.4.1. It has been classified as problematic. This affects an unknown part of the component curl. The manipulation leads to use after free. This vulnerability is uniquely identified as CVE-2023-28319. Local access is required to approach this attack. There is no exploit available. It is recommended…
-
A vulnerability, which was classified as critical, was found in curl. This affects an unknown part of the component SSH SHA256 Fingerprint Handler. The manipulation leads to use after free. This vulnerability is uniquely identified as CVE-2023-28319. It is possible to initiate the attack remotely. There is no exploit available. It is recommended to upgrade…
-
A vulnerability was found in Linux Kernel up to 6.1.82/6.6.22/6.7.10/6.8.1. It has been declared as problematic. Affected by this vulnerability is the function reqsk_timer_handler in the library lib/ref_tracker.c of the component rds. The manipulation leads to use after free. This vulnerability is known as CVE-2024-26865. Access to the local network is required for this attack.…
-
A vulnerability classified as critical has been found in Synology DiskStation Manager. This affects the function iscsi_snapshot_comm_core of the component Web Request Handler. The manipulation leads to use after free. This vulnerability is uniquely identified as CVE-2021-27646. It is possible to initiate the attack remotely. There is no exploit available. It is recommended to upgrade…