Show filters
774 Total Results
Displaying 51-60 of 774
Sort by:
Attacker Value
Unknown

CVE-2024-21206

Disclosure Date: October 15, 2024 (last updated October 16, 2024)
Vulnerability in the Oracle Enterprise Command Center Framework product of Oracle E-Business Suite (component: Diagnostics). Supported versions that are affected are ECC:11-13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Enterprise Command Center Framework. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Enterprise Command Center Framework accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
Attacker Value
Unknown

CVE-2024-33582

Disclosure Date: October 11, 2024 (last updated January 06, 2025)
A DLL hijack vulnerability was reported in Lenovo Service Framework that could allow a local attacker to execute code with elevated privileges.
0
Attacker Value
Unknown

CVE-2024-43484

Disclosure Date: October 08, 2024 (last updated January 06, 2025)
.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
0
Attacker Value
Unknown

CVE-2024-43483

Disclosure Date: October 08, 2024 (last updated January 06, 2025)
.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
0
Attacker Value
Unknown

CVE-2024-38809

Disclosure Date: September 27, 2024 (last updated September 28, 2024)
Applications that parse ETags from "If-Match" or "If-None-Match" request headers are vulnerable to DoS attack. Users of affected versions should upgrade to the corresponding fixed version. Users of older, unsupported versions could enforce a size limit on "If-Match" and "If-None-Match" headers, e.g. through a Filter.
0
Attacker Value
Unknown

CVE-2024-38808

Disclosure Date: August 20, 2024 (last updated August 20, 2024)
In Spring Framework versions 5.3.0 - 5.3.38 and older unsupported versions, it is possible for a user to provide a specially crafted Spring Expression Language (SpEL) expression that may cause a denial of service (DoS) condition. Specifically, an application is vulnerable when the following is true: * The application evaluates user-supplied SpEL expressions.
0
Attacker Value
Unknown

CVE-2024-43399

Disclosure Date: August 19, 2024 (last updated August 21, 2024)
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. Before 4.0.7, there is a flaw in the Static Libraries analysis section. Specifically, during the extraction of .a extension files, the measure intended to prevent Zip Slip attacks is improperly implemented. Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running MobSF. This vulnerability is fixed in 4.0.7.
Attacker Value
Unknown

CVE-2024-42377

Disclosure Date: August 13, 2024 (last updated September 13, 2024)
SAP shared service framework allows an authenticated non-administrative user to call a remote-enabled function, which will allow them to insert value entries into a non-sensitive table, causing low impact on integrity of the application
Attacker Value
Unknown

CVE-2024-42376

Disclosure Date: August 13, 2024 (last updated September 13, 2024)
SAP Shared Service Framework does not perform necessary authorization check for an authenticated user, resulting in escalation of privileges. On successful exploitation, an attacker can cause a high impact on confidentiality of the application.
Attacker Value
Unknown

CVE-2024-7490

Disclosure Date: August 08, 2024 (last updated August 13, 2024)
Improper Input Validation vulnerability in Microchip Techology Advanced Software Framework example DHCP server can cause remote code execution through a buffer overflow. This vulnerability is associated with program files tinydhcpserver.C and program routines lwip_dhcp_find_option. This issue affects Advanced Software Framework: through 3.52.0.2574. ASF is no longer being supported. Apply provided workaround or migrate to an actively maintained framework.