Show filters
373 Total Results
Displaying 21-30 of 373
Sort by:
Attacker Value
Unknown
CVE-2024-45247
Disclosure Date: October 06, 2024 (last updated October 07, 2024)
Sonarr – CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
0
Attacker Value
Unknown
CVE-2024-41727
Disclosure Date: August 14, 2024 (last updated August 21, 2024)
In BIG-IP tenants running on r2000 and r4000 series hardware, or BIG-IP Virtual Edition (VEs) using Intel E810 SR-IOV NIC, undisclosed traffic can cause an increase in memory resource utilization.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
0
Attacker Value
Unknown
CVE-2024-41723
Disclosure Date: August 14, 2024 (last updated August 21, 2024)
Undisclosed requests to BIG-IP iControl REST can lead to information leak of user account names. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
0
Attacker Value
Unknown
CVE-2024-41164
Disclosure Date: August 14, 2024 (last updated August 20, 2024)
When TCP profile with Multipath TCP enabled (MPTCP) is configured on a Virtual Server, undisclosed traffic along with conditions beyond the attackers control can cause TMM to terminate.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
0
Attacker Value
Unknown
CVE-2024-39778
Disclosure Date: August 14, 2024 (last updated August 20, 2024)
When a stateless virtual server is configured on BIG-IP system with a High-Speed Bridge (HSB), undisclosed requests can cause TMM to terminate.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
0
Attacker Value
Unknown
CVE-2024-23909
Disclosure Date: August 14, 2024 (last updated September 07, 2024)
Uncontrolled search path in some Intel(R) FPGA SDK for OpenCL(TM) software technology may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2024-41178
Disclosure Date: July 23, 2024 (last updated July 24, 2024)
Exposure of temporary credentials in logs in Apache Arrow Rust Object Store (`object_store` crate), version 0.10.1 and earlier on all platforms using AWS WebIdentityTokens.
On certain error conditions, the logs may contain the OIDC token passed to AssumeRoleWithWebIdentity https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoleWithWebIdentity.html . This allows someone with access to the logs to impersonate that identity, including performing their own calls to AssumeRoleWithWebIdentity, until the OIDC token expires. Typically OIDC tokens are valid for up to an hour, although this will vary depending on the issuer.
Users are recommended to use a different AWS authentication mechanism, disable logging or upgrade to version 0.10.2, which fixes this issue.
Details:
When using AWS WebIdentityTokens with the object_store crate, in the event of a failure and automatic retry, the underlying reqwest error, including the full URL with the credentials, potentially in the parame…
0
Attacker Value
Unknown
CVE-2023-37870
Disclosure Date: June 19, 2024 (last updated June 20, 2024)
Missing Authorization vulnerability in Woo WooCommerce Warranty Requests.This issue affects WooCommerce Warranty Requests: from n/a through 2.1.9.
0
Attacker Value
Unknown
CVE-2023-51496
Disclosure Date: June 14, 2024 (last updated August 08, 2024)
Missing Authorization vulnerability in Woo WooCommerce Warranty Requests.This issue affects WooCommerce Warranty Requests: from n/a through 2.2.7.
0
Attacker Value
Unknown
CVE-2023-51495
Disclosure Date: June 14, 2024 (last updated August 08, 2024)
Missing Authorization vulnerability in Woo WooCommerce Warranty Requests.This issue affects WooCommerce Warranty Requests: from n/a through 2.2.7.
0