Oh and for non-security people : it was all vulnerabilities officialy published or modified in the last 24h. It mean that for these vulnerabilities patches exist (most of the time). It's a lot yes, be careful on internet, technology can't solve everything.
Sorry for the spam everyone, i was trying something. Well it work almost perfectly buuuut it generate a lot of posts. ^^ I will try to improve it next time to reduce the number of posts and make the link clickable.
Id: CVE-2024-6119 Score: Score: N/A Status: Received Details: Certificate validation flaw enables DoS attacks and app crashes for TLS clients. Source: nvd.nist.gov/vuln/detail/CVE-2024-6119
Id: CVE-2024-42991 Score: Score: 8.1 Status: Received Details: MCMS 5. 4. 1 front-end file upload vulnerability enables RCE attacks via malicious uploads, allowing full system takeover. Update is critical. Source: nvd.nist.gov/vuln/detail/CVE-2024-42991
Id: CVE-2024-7654 Score: Score: 8.3 Status: Received Details: ActiveMQ Discovery enabled by default in OpenEdge Management poses security risk for content injection attacks when auto-discovery is active. Source: nvd.nist.gov/vuln/detail/CVE-2024-7654
Id: CVE-2024-7346 Score: Score: 7.2 Status: Received Details: OpenEdge fixes default cert bypassing hostname checks in TLS, requires replacing with trusted CA certs. Source: nvd.nist.gov/vuln/detail/CVE-2024-7346
Id: CVE-2024-7345 Score: Score: 8.3 Status: Received Details: Vulnerability in ABL Client allowing unauthorized code injection via PASOE security bypass, affecting OpenEdge LTS 11. 7. 18 and 12. 2. 13 on multiple platforms. Source: nvd.nist.gov/vuln/detail/CVE-2024-7345
Id: CVE-2024-4259 Score: Score: 6.9 Status: Awaiting Analysis Details: AKOS privilege flaw enables unauthorized data access. Source: nvd.nist.gov/vuln/detail/CVE-2024-4259
Id: CVE-2024-34463 Score: Score: 5.1 Status: Awaiting Analysis Details: Unencrypted BLE transmission of sensitive weight data from BPL scale devices. Source: nvd.nist.gov/vuln/detail/CVE-2024-34463