Show filters
57 Total Results
Displaying 31-40 of 57
Sort by:
Attacker Value
Unknown
CVE-2024-47557
Disclosure Date: October 07, 2024 (last updated October 17, 2024)
Pre-Auth RCE via Path Traversal
0
Attacker Value
Unknown
CVE-2024-47556
Disclosure Date: October 07, 2024 (last updated October 17, 2024)
Pre-Auth RCE via Path Traversal
0
Attacker Value
Unknown
CVE-2024-27018
Disclosure Date: May 01, 2024 (last updated May 24, 2024)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: br_netfilter: skip conntrack input hook for promisc packets
For historical reasons, when bridge device is in promisc mode, packets
that are directed to the taps follow bridge input hook path. This patch
adds a workaround to reset conntrack for these packets.
Jianbo Liu reports warning splats in their test infrastructure where
cloned packets reach the br_netfilter input hook to confirm the
conntrack object.
Scratch one bit from BR_INPUT_SKB_CB to annotate that this packet has
reached the input hook because it is passed up to the bridge device to
reach the taps.
[ 57.571874] WARNING: CPU: 1 PID: 0 at net/bridge/br_netfilter_hooks.c:616 br_nf_local_in+0x157/0x180 [br_netfilter]
[ 57.572749] Modules linked in: xt_MASQUERADE nf_conntrack_netlink nfnetlink iptable_nat xt_addrtype xt_conntrack nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcgss oid_registry overlay rpcrdma rdma_ucm ib_iser libiscsi scsi_trans…
0
Attacker Value
Unknown
CVE-2023-46783
Disclosure Date: November 06, 2023 (last updated November 15, 2023)
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Bright Plugins Pre-Orders for WooCommerce plugin <= 1.2.13 versions.
0
Attacker Value
Unknown
CVE-2023-45239
Disclosure Date: October 06, 2023 (last updated October 13, 2023)
A lack of input validation exists in tac_plus prior to commit 4fdf178 which, when pre or post auth commands are enabled, allows an attacker who can control the username, rem-addr, or NAC address sent to tac_plus to inject shell commands and gain remote code execution on the tac_plus server.
0
Attacker Value
Unknown
CVE-2023-32793
Disclosure Date: August 30, 2023 (last updated October 08, 2023)
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WooCommerce WooCommerce Pre-Orders plugin <= 2.0.0 versions.
0
Attacker Value
Unknown
CVE-2023-1671
Disclosure Date: April 04, 2023 (last updated October 08, 2023)
A pre-auth command injection vulnerability in the warn-proceed handler of Sophos Web Appliance older than version 4.3.10.4 allows execution of arbitrary code.
0
Attacker Value
Unknown
CVE-2022-37937
Disclosure Date: March 01, 2023 (last updated October 08, 2023)
Pre-auth memory corruption in HPE Serviceguard
0
Attacker Value
Unknown
CVE-2023-0122
Disclosure Date: January 17, 2023 (last updated October 08, 2023)
A NULL pointer dereference vulnerability in the Linux kernel NVMe functionality, in nvmet_setup_auth(), allows an attacker to perform a Pre-Auth Denial of Service (DoS) attack on a remote machine. Affected versions v6.0-rc1 to v6.0-rc3, fixed in v6.0-rc4.
0
Attacker Value
Unknown
CVE-2021-32824
Disclosure Date: January 03, 2023 (last updated October 08, 2023)
Apache Dubbo is a java based, open source RPC framework. Versions prior to 2.6.10 and 2.7.10 are vulnerable to pre-auth remote code execution via arbitrary bean manipulation in the Telnet handler. The Dubbo main service port can be used to access a Telnet Handler which offers some basic methods to collect information about the providers and methods exposed by the service and it can even allow to shutdown the service. This endpoint is unprotected. Additionally, a provider method can be invoked using the `invoke` handler. This handler uses a safe version of FastJson to process the call arguments. However, the resulting list is later processed with `PojoUtils.realize` which can be used to instantiate arbitrary classes and invoke its setters. Even though FastJson is properly protected with a default blocklist, `PojoUtils.realize` is not, and an attacker can leverage that to achieve remote code execution. Versions 2.6.10 and 2.7.10 contain fixes for this issue.
0