Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Unknown
CVE-2025-24965
Disclosure Date: February 19, 2025 (last updated February 20, 2025)
crun is an open source OCI Container Runtime fully written in C. In affected versions A malicious container image could trick the krun handler into escaping the root filesystem, allowing file creation or modification on the host. No special permissions are needed, only the ability for the current user to write to the target file. The problem is fixed in crun 1.20 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
0
Attacker Value
Unknown
CVE-2022-27650
Disclosure Date: April 04, 2022 (last updated October 07, 2023)
A flaw was found in crun where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
0
Attacker Value
Unknown
CVE-2019-14476
Disclosure Date: December 16, 2020 (last updated February 22, 2025)
AdRem NetCrunch 10.6.0.4587 has a Server-Side Request Forgery (SSRF) vulnerability in the NetCrunch server. Every user can trick the server into performing SMB requests to other systems.
0
Attacker Value
Unknown
CVE-2019-14478
Disclosure Date: December 16, 2020 (last updated February 22, 2025)
AdRem NetCrunch 10.6.0.4587 has a stored Cross-Site Scripting (XSS) vulnerability in the NetCrunch web client. The user's input data is not properly encoded when being echoed back to the user. This data can be interpreted as executable code by the browser and allows an attacker to execute JavaScript code in the context of the user's browser if the victim opens or searches for a node whose "Display Name" contains an XSS payload.
0
Attacker Value
Unknown
CVE-2019-14479
Disclosure Date: December 16, 2020 (last updated February 22, 2025)
AdRem NetCrunch 10.6.0.4587 allows Remote Code Execution. In the NetCrunch web client, a read-only administrator can execute arbitrary code on the server running the NetCrunch server software.
0
Attacker Value
Unknown
CVE-2019-14481
Disclosure Date: December 16, 2020 (last updated February 22, 2025)
AdRem NetCrunch 10.6.0.4587 has a Cross-Site Request Forgery (CSRF) vulnerability in the NetCrunch web client. Successful exploitation requires a logged-in user to open a malicious page and leads to account takeover.
0
Attacker Value
Unknown
CVE-2019-14482
Disclosure Date: December 16, 2020 (last updated February 22, 2025)
AdRem NetCrunch 10.6.0.4587 has a hardcoded SSL private key vulnerability in the NetCrunch web client. The same hardcoded SSL private key is used across different customers' installations when no other SSL certificate is installed, which allows remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation.
0
Attacker Value
Unknown
CVE-2019-14483
Disclosure Date: December 16, 2020 (last updated November 28, 2024)
AdRem NetCrunch 10.6.0.4587 allows Credentials Disclosure. Every user can read the BSD, Linux, MacOS and Solaris private keys, private keys' passwords, and root passwords stored in the credential manager. Every administrator can read the ESX and Windows passwords stored in the credential manager.
0
Attacker Value
Unknown
CVE-2019-14480
Disclosure Date: December 16, 2020 (last updated February 22, 2025)
AdRem NetCrunch 10.6.0.4587 has an Improper Session Handling vulnerability in the NetCrunch web client, which can lead to an authentication bypass or escalation of privileges.
0
Attacker Value
Unknown
CVE-2019-14477
Disclosure Date: December 16, 2020 (last updated February 22, 2025)
AdRem NetCrunch 10.6.0.4587 has Improper Credential Storage since the internal user database is readable by low-privileged users and passwords in the database are weakly encoded or encrypted.
0