Show filters
303 Total Results
Displaying 31-40 of 303
Sort by:
Attacker Value
Unknown
CVE-2024-20085
Disclosure Date: September 02, 2024 (last updated September 06, 2024)
In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944204; Issue ID: MSV-1560.
0
Attacker Value
Unknown
CVE-2024-20084
Disclosure Date: September 02, 2024 (last updated September 06, 2024)
In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944210; Issue ID: MSV-1561.
0
Attacker Value
Unknown
CVE-2024-22278
Disclosure Date: August 02, 2024 (last updated August 10, 2024)
Incorrect user permission validation in Harbor <v2.9.5 and Harbor <v2.10.3 allows authenticated users to modify configurations.
0
Attacker Value
Unknown
CVE-2024-20081
Disclosure Date: July 01, 2024 (last updated February 04, 2025)
In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08719602; Issue ID: MSV-1412.
0
Attacker Value
Unknown
CVE-2024-5187
Disclosure Date: June 06, 2024 (last updated October 24, 2024)
A vulnerability in the `download_model_with_test_data` function of the onnx/onnx framework, version 1.16.0, allows for arbitrary file overwrite due to inadequate prevention of path traversal attacks in malicious tar files. This vulnerability enables attackers to overwrite any file on the system, potentially leading to remote code execution, deletion of system, personal, or application files, thus impacting the integrity and availability of the system. The issue arises from the function's handling of tar file extraction without performing security checks on the paths within the tar file, as demonstrated by the ability to overwrite the `/home/kali/.ssh/authorized_keys` file by specifying an absolute path in the malicious tar file.
0
Attacker Value
Unknown
CVE-2024-21418
Disclosure Date: March 12, 2024 (last updated January 12, 2025)
Software for Open Networking in the Cloud (SONiC) Elevation of Privilege Vulnerability
0
Attacker Value
Unknown
CVE-2024-20022
Disclosure Date: March 04, 2024 (last updated January 31, 2025)
In lk, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08528255; Issue ID: ALPS08528255.
0
Attacker Value
Unknown
CVE-2024-27319
Disclosure Date: February 23, 2024 (last updated February 14, 2025)
Versions of the package onnx before and including 1.15.0 are vulnerable to Out-of-bounds Read as the ONNX_ASSERT and ONNX_ASSERTM functions have an off by one string copy.
0
Attacker Value
Unknown
CVE-2024-27318
Disclosure Date: February 23, 2024 (last updated February 14, 2025)
Versions of the package onnx before and including 1.15.0 are vulnerable to Directory Traversal as the external_data field of the tensor proto can have a path to the file which is outside the model current directory or user-provided directory. The vulnerability occurs as a bypass for the patch added for CVE-2022-25882.
0
Attacker Value
Unknown
CVE-2024-26150
Disclosure Date: February 23, 2024 (last updated February 06, 2025)
`@backstage/backend-common` is a common functionality library for backends for Backstage, an open platform for building developer portals. In `@backstage/backend-common` prior to versions 0.21.1, 0.20.2, and 0.19.10, paths checks with the `resolveSafeChildPath` utility were not exhaustive enough, leading to risk of path traversal vulnerabilities if symlinks can be injected by attackers. This issue is patched in `@backstage/backend-common` versions 0.21.1, 0.20.2, and 0.19.10.
0