Show filters
224 Total Results
Displaying 11-20 of 224
Sort by:
Attacker Value
Unknown
CVE-2024-42493
Disclosure Date: August 08, 2024 (last updated August 30, 2024)
Dorsett Controls InfoScan is vulnerable due to a leak of possible
sensitive information through the response headers and the rendered
JavaScript prior to user login.
0
Attacker Value
Unknown
CVE-2024-42408
Disclosure Date: August 08, 2024 (last updated August 30, 2024)
The InfoScan client download page can be intercepted with a proxy, to
expose filenames located on the system, which could lead to additional
information exposure.
0
Attacker Value
Unknown
CVE-2024-39287
Disclosure Date: August 08, 2024 (last updated August 30, 2024)
Dorsett Controls Central Server update server has potential information
leaks with an unprotected file that contains passwords and API keys.
0
Attacker Value
Unknown
CVE-2024-31203
Disclosure Date: July 31, 2024 (last updated August 13, 2024)
A “CWE-121: Stack-based Buffer Overflow” in the wd210std.dll dynamic library packaged with the ThermoscanIP installer allows a local attacker to possibly trigger a Denial-of-Service (DoS) condition on the target component.
0
Attacker Value
Unknown
CVE-2024-31202
Disclosure Date: July 31, 2024 (last updated August 13, 2024)
A “CWE-732: Incorrect Permission Assignment for Critical Resource” in the ThermoscanIP installation folder allows a local attacker to perform a Local Privilege Escalation.
0
Attacker Value
Unknown
CVE-2024-31201
Disclosure Date: July 31, 2024 (last updated August 13, 2024)
A “CWE-428: Unquoted Search Path or Element” affects the ThermoscanIP_Scrutation service. Such misconfiguration could be abused in scenarios where incorrect permissions were assigned to the C:\ path to attempt a privilege escalation on the local machine.
0
Attacker Value
Unknown
CVE-2024-4348
Disclosure Date: April 30, 2024 (last updated May 01, 2024)
A vulnerability, which was classified as problematic, was found in osCommerce 4. Affected is an unknown function of the file /catalog/all-products. The manipulation of the argument cat leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-262488. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2024-3204
Disclosure Date: April 02, 2024 (last updated April 07, 2024)
A vulnerability has been found in c-blosc2 up to 2.13.2 and classified as critical. Affected by this vulnerability is the function ndlz4_decompress of the file /src/c-blosc2/plugins/codecs/ndlz/ndlz4x4.c. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.14.3 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-259051.
0
Attacker Value
Unknown
CVE-2024-3203
Disclosure Date: April 02, 2024 (last updated April 07, 2024)
A vulnerability, which was classified as critical, was found in c-blosc2 up to 2.13.2. Affected is the function ndlz8_decompress of the file /src/c-blosc2/plugins/codecs/ndlz/ndlz8x8.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.14.3 is able to address this issue. It is recommended to upgrade the affected component. VDB-259050 is the identifier assigned to this vulnerability.
0
Attacker Value
Unknown
CVE-2024-24579
Disclosure Date: January 31, 2024 (last updated February 10, 2024)
stereoscope is a go library for processing container images and simulating a squash filesystem. Prior to version 0.0.1, it is possible to craft an OCI tar archive that, when stereoscope attempts to unarchive the contents, will result in writing to paths outside of the unarchive temporary directory. Specifically, use of `github.com/anchore/stereoscope/pkg/file.UntarToDirectory()` function, the `github.com/anchore/stereoscope/pkg/image/oci.TarballImageProvider` struct, or the higher level `github.com/anchore/stereoscope/pkg/image.Image.Read()` function express this vulnerability. As a workaround, if you are using the OCI archive as input into stereoscope then you can switch to using an OCI layout by unarchiving the tar archive and provide the unarchived directory to stereoscope.
0