Show filters
1,078 Total Results
Displaying 41-50 of 1,078
Sort by:
Attacker Value
Unknown
CVE-2024-6051
Disclosure Date: September 30, 2024 (last updated October 01, 2024)
Cross Application Scripting vulnerability in Vercom S.A. Redlink SDK in specific situations allows local code injection and to manipulate the view of a vulnerable application.This issue affects Redlink SDK versions through 1.13.
0
Attacker Value
Unknown
CVE-2024-47222
Disclosure Date: September 23, 2024 (last updated October 01, 2024)
New Cloud MyOffice SDK Collaborative Editing Server 2.2.2 through 2.8 allows SSRF via manipulation of requests from external document storage via the MS-WOPI protocol.
0
Attacker Value
Unknown
CVE-2024-8986
Disclosure Date: September 19, 2024 (last updated September 19, 2024)
The grafana plugin SDK bundles build metadata into the binaries it compiles; this metadata includes the repository URI for the plugin being built, as retrieved by running `git remote get-url origin`.
If credentials are included in the repository URI (for instance, to allow for fetching of private dependencies), the final binary will contain the full URI, including said credentials.
0
Attacker Value
Unknown
CVE-2024-42369
Disclosure Date: August 20, 2024 (last updated August 22, 2024)
matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. A malicious homeserver can craft a room or room structure such that the predecessors form a cycle. The matrix-js-sdk's getRoomUpgradeHistory function will infinitely recurse in this case, causing the code to hang. This method is public but also called by the 'leaveRoomChain()' method, so leaving a room will also trigger the bug. This was patched in matrix-js-sdk 34.3.1.
0
Attacker Value
Unknown
CVE-2024-27267
Disclosure Date: August 14, 2024 (last updated September 12, 2024)
The Object Request Broker (ORB) in IBM SDK, Java Technology Edition 7.1.0.0 through 7.1.5.18 and 8.0.0.0 through 8.0.8.26 is vulnerable to remote denial of service, caused by a race condition in the management of ORB listener threads. IBM X-Force ID: 284573.
0
Attacker Value
Unknown
CVE-2024-38158
Disclosure Date: August 13, 2024 (last updated August 17, 2024)
Azure IoT SDK Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2024-38157
Disclosure Date: August 13, 2024 (last updated August 17, 2024)
Azure IoT SDK Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2024-42347
Disclosure Date: August 06, 2024 (last updated August 13, 2024)
matrix-react-sdk is a react-based SDK for inserting a Matrix chat/voip client into a web page. A malicious homeserver could manipulate a user's account data to cause the client to enable URL previews in end-to-end encrypted rooms, in which case any URLs in encrypted messages would be sent to the server. This was patched in matrix-react-sdk 3.105.0. Deployments that trust their homeservers, as well as closed federations of trusted servers, are not affected. Users are advised to upgrade. There are no known workarounds for this vulnerability.
0
Attacker Value
Unknown
CVE-2024-40648
Disclosure Date: July 18, 2024 (last updated July 19, 2024)
matrix-rust-sdk is an implementation of a Matrix client-server library in Rust. The `UserIdentity::is_verified()` method in the matrix-sdk-crypto crate before version 0.7.2 doesn't take into account the verification status of the user's own identity while performing the check and may as a result return a value contrary to what is implied by its name and documentation. If the method is used to decide whether to perform sensitive operations towards a user identity, a malicious homeserver could manipulate the outcome in order to make the identity appear trusted. This is not a typical usage of the method, which lowers the impact. The method itself is not used inside the `matrix-sdk-crypto` crate. The 0.7.2 release of the `matrix-sdk-crypto` crate includes a fix. All users are advised to upgrade. There are no known workarounds for this vulnerability.
0
Attacker Value
Unknown
CVE-2024-39826
Disclosure Date: July 15, 2024 (last updated July 16, 2024)
Path traversal in Team Chat for some Zoom Workplace Apps and SDKs for Windows may allow an authenticated user to conduct information disclosure via network access.
0