Show filters
774 Total Results
Displaying 51-60 of 774
Sort by:
Attacker Value
Unknown
CVE-2024-21206
Disclosure Date: October 15, 2024 (last updated October 16, 2024)
Vulnerability in the Oracle Enterprise Command Center Framework product of Oracle E-Business Suite (component: Diagnostics). Supported versions that are affected are ECC:11-13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Command Center Framework. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Enterprise Command Center Framework accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
0
Attacker Value
Unknown
CVE-2024-33582
Disclosure Date: October 11, 2024 (last updated January 06, 2025)
A DLL hijack vulnerability was reported in Lenovo Service Framework that could allow a local attacker to execute code with elevated privileges.
0
Attacker Value
Unknown
CVE-2024-43484
Disclosure Date: October 08, 2024 (last updated January 06, 2025)
.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
0
Attacker Value
Unknown
CVE-2024-43483
Disclosure Date: October 08, 2024 (last updated January 06, 2025)
.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
0
Attacker Value
Unknown
CVE-2024-38809
Disclosure Date: September 27, 2024 (last updated September 28, 2024)
Applications that parse ETags from "If-Match" or "If-None-Match" request headers are vulnerable to DoS attack.
Users of affected versions should upgrade to the corresponding fixed version.
Users of older, unsupported versions could enforce a size limit on "If-Match" and "If-None-Match" headers, e.g. through a Filter.
0
Attacker Value
Unknown
CVE-2024-38808
Disclosure Date: August 20, 2024 (last updated August 20, 2024)
In Spring Framework versions 5.3.0 - 5.3.38 and older unsupported versions, it is possible for a user to provide a specially crafted Spring Expression Language (SpEL) expression that may cause a denial of service (DoS) condition.
Specifically, an application is vulnerable when the following is true:
* The application evaluates user-supplied SpEL expressions.
0
Attacker Value
Unknown
CVE-2024-43399
Disclosure Date: August 19, 2024 (last updated August 21, 2024)
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. Before 4.0.7, there is a flaw in the Static Libraries analysis section. Specifically, during the extraction of .a extension files, the measure intended to prevent Zip Slip attacks is improperly implemented. Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running MobSF. This vulnerability is fixed in 4.0.7.
0
Attacker Value
Unknown
CVE-2024-42377
Disclosure Date: August 13, 2024 (last updated September 13, 2024)
SAP shared service framework allows an
authenticated non-administrative user to call a remote-enabled function, which
will allow them to insert value entries into a non-sensitive table, causing low
impact on integrity of the application
0
Attacker Value
Unknown
CVE-2024-42376
Disclosure Date: August 13, 2024 (last updated September 13, 2024)
SAP Shared Service Framework does not perform necessary
authorization check for an authenticated user, resulting in escalation of
privileges. On successful exploitation, an attacker can cause a high impact on
confidentiality of the application.
0
Attacker Value
Unknown
CVE-2024-7490
Disclosure Date: August 08, 2024 (last updated August 13, 2024)
Improper Input Validation vulnerability in Microchip Techology Advanced Software Framework example DHCP server can cause remote code execution through a buffer overflow.
This vulnerability is associated with program files tinydhcpserver.C and program routines lwip_dhcp_find_option.
This issue affects Advanced Software Framework: through 3.52.0.2574.
ASF is no longer being supported. Apply provided workaround or migrate to an actively maintained framework.
0