Show filters
373 Total Results
Displaying 21-30 of 373
Sort by:
Attacker Value
Unknown

CVE-2024-45247

Disclosure Date: October 06, 2024 (last updated October 07, 2024)
Sonarr – CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
0
Attacker Value
Unknown

CVE-2024-41727

Disclosure Date: August 14, 2024 (last updated August 21, 2024)
In BIG-IP tenants running on r2000 and r4000 series hardware, or BIG-IP Virtual Edition (VEs) using Intel E810 SR-IOV NIC, undisclosed traffic can cause an increase in memory resource utilization.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Attacker Value
Unknown

CVE-2024-41723

Disclosure Date: August 14, 2024 (last updated August 21, 2024)
Undisclosed requests to BIG-IP iControl REST can lead to information leak of user account names.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Attacker Value
Unknown

CVE-2024-41164

Disclosure Date: August 14, 2024 (last updated August 20, 2024)
When TCP profile with Multipath TCP enabled (MPTCP) is configured on a Virtual Server, undisclosed traffic along with conditions beyond the attackers control can cause TMM to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Attacker Value
Unknown

CVE-2024-39778

Disclosure Date: August 14, 2024 (last updated August 20, 2024)
When a stateless virtual server is configured on BIG-IP system with a High-Speed Bridge (HSB), undisclosed requests can cause TMM to terminate.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Attacker Value
Unknown

CVE-2024-23909

Disclosure Date: August 14, 2024 (last updated September 07, 2024)
Uncontrolled search path in some Intel(R) FPGA SDK for OpenCL(TM) software technology may allow an authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2024-41178

Disclosure Date: July 23, 2024 (last updated July 24, 2024)
Exposure of temporary credentials in logs in Apache Arrow Rust Object Store (`object_store` crate), version 0.10.1 and earlier on all platforms using AWS WebIdentityTokens.  On certain error conditions, the logs may contain the OIDC token passed to AssumeRoleWithWebIdentity https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoleWithWebIdentity.html . This allows someone with access to the logs to impersonate that identity, including performing their own calls to AssumeRoleWithWebIdentity, until the OIDC token expires. Typically OIDC tokens are valid for up to an hour, although this will vary depending on the issuer. Users are recommended to use a different AWS authentication mechanism, disable logging or upgrade to version 0.10.2, which fixes this issue. Details: When using AWS WebIdentityTokens with the object_store crate, in the event of a failure and automatic retry, the underlying reqwest error, including the full URL with the credentials, potentially in the parame…
0
Attacker Value
Unknown

CVE-2023-37870

Disclosure Date: June 19, 2024 (last updated June 20, 2024)
Missing Authorization vulnerability in Woo WooCommerce Warranty Requests.This issue affects WooCommerce Warranty Requests: from n/a through 2.1.9.
0
Attacker Value
Unknown

CVE-2023-51496

Disclosure Date: June 14, 2024 (last updated August 08, 2024)
Missing Authorization vulnerability in Woo WooCommerce Warranty Requests.This issue affects WooCommerce Warranty Requests: from n/a through 2.2.7.
Attacker Value
Unknown

CVE-2023-51495

Disclosure Date: June 14, 2024 (last updated August 08, 2024)
Missing Authorization vulnerability in Woo WooCommerce Warranty Requests.This issue affects WooCommerce Warranty Requests: from n/a through 2.2.7.