From fb4ffe95e4720eac95589af042e5e16d660961ae Mon Sep 17 00:00:00 2001 From: Github-Bot Date: Mon, 28 Oct 2024 06:34:00 +0000 Subject: [PATCH] Updated by Github Bot --- cache/Tenable (Nessus).dat | 10 +++ data/cves.db | Bin 49827840 -> 49844224 bytes docs/index.html | 162 ++++++++++++++++++------------------- 3 files changed, 91 insertions(+), 81 deletions(-) diff --git a/cache/Tenable (Nessus).dat b/cache/Tenable (Nessus).dat index e61e24571dd..e48244ed13e 100644 --- a/cache/Tenable (Nessus).dat +++ b/cache/Tenable (Nessus).dat @@ -122,3 +122,13 @@ d9719476d79694ee7d821c73d87e9b33 1f779862d0961669d55291ac270dbb69 14316d4906d95d389ddf87c58462978c 70106e00d2a08844b0f30fb62527aad1 +5a13893a1a6c4fdce720193dc4855a7d +11ae587bc37aa40d9b21be435a6b5430 +96627caaec935cb9aed3c8472a323177 +a5f4a0c6f18a9107ee1561ae19432d7c +6bb7d979bb5cb3d0242348256e1633a2 +a36a2101fa80d6fdcd452ee7325fc99a +ed44cfb0b046e9079b8967e1130ce6ff +ce32608695c85a9fedf2a7f523db63a6 +c8cde1b1404a49f904b33bcf4db0763f +bf0ac006759954e119f3c984e39ad4f9 diff --git a/data/cves.db b/data/cves.db index 8f492b5e1589c44933b2c9901b4f3d4776c8f7b2..d3aa807b766ef945f67835a60b85198e41ddd5d5 100644 GIT binary patch delta 13453 zcmeI&36vDoxd(8%WCwv^5eNtu1Ob`usqX6T=^g|e7GY!&X8=*q{;I31XBxV@nqFoY z6^F$S#b{jPWKjy&B#K5&3{gQqao3z0Zap#1~DDSG?-}!(@>^wF%4rH&U8G}2&R!tf@u`f zXr>dG#xRX#I+1A{(|D!{OeZl-WGZKJGkKUQm{cY&laEPb@-qdPf=rc6A*L`>71Jc9 zlbI$nO<|hKbP7{7(=?{(Of#5fGM&mai)l7f4by2%bC~8b&10I+bUM=lrZbpond+Dp zGA&|S%ycHx5~j15&SqN5w2bK-rgNDhOei0nDavFp#h6T{I8!}S15<)&InxTJBvXnh z&15lUm{u}nnQ}~drUFwVQxnrFre>z|n9gUqfN3?;g-k6>YnawDtz%lxbP*FXZD6{X z=@O=mOqVi!o9Qy9%bC8zbOqCuOjj{o&2$aZwM^e-x{j%p>3dAyXZiut51FoKx`AmE zlg+f5=|-lTm~Ljeh3QtN+n9dD^kb%=AGd;qzo9R)e$Cw^xdV=Xmrl**mW_pI{ zS*GWho@aW2=|!fOn103dYo?c(e#7(%({GtxWqOTi57Y0MUT69}(_W^1O#7MMU^>9` z2c|cf-eP*2=^dtbncibM$n-wbADRBd^a0Z$rVp7uV)~fr6Q)m@4l{km^k=5OF#VP3 zZ%m&v{hjF_O#j?SuFJ^<3LFESp$l|{ZqOZiKu_oez2R8s1AU<%ltF(O00UtV90!A8 z2n>a9!7vyO$HNF12?9pJXgC4Jz*smD#=&@)04KpjC&m=CAJ0yqO|p$-i3eX5munL;tJUAaN zfYopzw7?oz3+rG#Tm%do;9|H0Ho~RwZMY0Bhws1@a3x#?SHm@MEqoWQgI4$+d>?)Q zKZNVy2G|5PY=#@*Cb$`Hfm`7=_!0aVege0{9k2!NguCFUa5vlo_rlNM=WrkV0=B|0 z;eL1k9)xYM9Ug)muoHH{!|({~hDYHscpRR9C*di08lHh?;W>C7UVs``{O_6@Cf#!vpXjY=iCa5bS`RunQiBM_@NR3Xj3#@B};wPr=jh3_J_Z!SnC} zya+GBui)44GW-T!f#1Tb@EYua-@)tfd)N#6U_ZP82jCCzCcFi2!#nUUyr*oZgUT&e zbl=i>ZYTNhx}*1%2bJ1mTF*6>c5UrXx4$=_;u7Ao2!}TCo`v|qyr=F8{n~>HHt);L zALZsxa`S=Q9Fm(4<>n)~`B-i~k(*ED=CHCuzxFfb<~v69?euV`zIvZW`}93_Rqw}o z59^ied3(>^JyPAD=q@_%Q{L~?T1JH%+!u|-^?J^8Pgw8P*1Pp^FzBl^blo(IL{5!Yb*t=pz4{k(;onf3To zpWp3O-M)}ewJL9*O7;D#E?^(neNZ{c=T(vD^%n1`l^I^wq^)bxyMY3#Gz?3E*4R!$5VRyuE{^SQ6j^}paMwlQ?IQtp?fio|c2#Cy(=8RzL5 zPuBywR||zT-Kz%;e>`TGl|I!Q)?$V~6bR_H>xOO0uoL|V5v(&B%-FmcqApp;rbN_? zTUk^1{2n#n@gw6oVV|+OzcRR&M^uYcBA3@!nD#x7xLpHmYsZO7mw}0Ny-1`*E^lU1 z^;uz9g=EZj@13j+Zr!|oN%xja)-udo&diBII%Z~tm2bdSwu#(0vD}L0JYr!(A}8=a znMft_W=!NQ=YTL*Ws(Uakxw>@ELxttQd1(|Al&ZK)yjp12yyXd>`3KAzCq6;&5fq0 zPg+qui4%inT8}0XXO3M(pM$Tv`Au@kX<+} zbdk~PO?NJFo+$?dz0pd@4vdj0lF#af8PT)#x$zT(Rmi)oxI1O0tZcK;4LQ)Xm33F= zR^zn~y?;PCty=-ZP}Hol^&5661MG)9PrCZGSaA_I^G1UlS7d}@krPOyO*4jsSjD5o zLy5FZhsc;&BU31)yjLfhaeeyf^G~gr6`50AS3Mt1r8sW;JR&DY^kNjU+9*|qj20!^y7}PegIX_qJl4I%BQIBHp_8m= zYZzZ7{)-OdSHnRMN+D*(6KPW*8*^vQ7uc%_r|;C8X)~+mojjlx#v2WKR-A+kmE+!> z7wHM&eCLdBjYjjJxu!A+*{Dmcis}tRxGkq? z728*fLBj9B#fsg{ipO*K6&;Q`Twww^QCiXEu|g^%+z5@NeL28rF{PBWh}kF~g^O44Vt4WHiekcZ6~%tuez=sR2yVGD z2jytjc=!_}(?rF-vqH~dKrD5^47!#uvso+a!K3QNT}rh*_qqd0AA5WM-AexxklwVB zX^zPGOGFN_6Hy+qUZ(e}(F;z{5Hobnbjb88}$BCv+R#SP@A! zCXxC;0Ew@(Z)`oFXe~}rM9{|M0E0ZKahWrpDyGVQ^bI-x=A%*E^ zO_5wCk&YxSV+EoJ$^4n^=SRLA;D~cuA{h*7#daS_=^0rBvIKlc;8aXFaLb8B(zxTI z{!#omYy_MVisON0Dq615P%7IdJt;394B>1vjH$SVMxvQ`M0U!E9*bo$*5bHN!*NX> zcluFFvO@q*M$hJ*f{I2F&PhZhQtWXZ0?I4Nf{GrIOnL7p4pB#3FJK~+E<+Uyv)B-d z4?(D!mRuoaM$o^q&4{wSV7{6$-G_*rjCCx}NFuvZ-d}NgNT#_M#HqNi4cLC2mKa(d z$_ICMqgarL$8R7W*}IVFFY2z4menh-hLV)GQv{TGbIP)qt72R-F_Cyuub0KG1!Q~k zJ8>18x^vhGFAuk%x2y^{)gi}(NQa}oFAk;(sK&PT753tsBidJogKb&Mpi80CMv9|U zr1(hJUcEj;rYoSfsBNQMEP+QiJWM(RjL(qGBzQ!d|6h%3_q4 z2&m@;(Nfj4D*2~#Lz<3LvCk_EpHSl>8WjG3h(|>Tqn=NMH0Mu41_(tv`XGm+h#14K|Lg9 zo;tUBR-H^H{`u6PsI6X7{Hr}!)ZX{PYs&HcoG@*hc-&`SwdoaQKubJs;0iURINFcL zMD2{y-Xr2du}pJP)1Ht}5Jg?9hT5)cMt$+Hp~f(T*Q(+FY_C^sznb0a>Q|JWGrZpR zT}~SCwhi+!-;sM!3976Yuhtgn*U#OS|NG`{_9>VDR?0aXoFI&TVGXLoY#DBJw8 z>kOBB`%t_-l`jdljncM_!dts&Wh`77jz;nNQj6i8qEGXOe1V|p4QiTw&+GRo!|Z;& zK2tioD((Hboyv@(GryxVzoRq1qccBeqJDJdXC{x%{Ep82zF}T?bmn(-<`-$7wzW;# zN>jx4ImFSK-_e=h(V5@>^vrMOe|6@EPf#wFldLYCsyg*P)Faz@s{fH=%r^ zi}#!@=USKa&@SnrN8_rF_o2bcKsX%mo0!7KH6tAIn_5_p+4_JdmEoP`Hy8Gemw8$;2BW8M|Ucc(s{o#06^+z==YQ+7qs9G7cNB!erIqO}zPwAZ2YSLnQ z(zN7j=aiLhZu_7k;0a+(+lQs9#d8;Cb@?Gi=~IvPBXTu!E?)NF#r9VZ%5_0gt}E)| zG`&%;GqQ!s6n5$ zVKDDm;(T8)Qsa?WR@Hn#H53d7j8H%i$IV#Wr&q=UJ}njv;?=>Soo$6U(T{g|u_)FG z8WRTIfM+uD1D827W{No}J&|lHo1h2p`R!fjtapvEryTdOt5;VnFUW@H-J-aL^mBsB zIGmz3bbC~f+mr!SC_%Yo>MXPAVo~i}kt?88V>z=SpU+fPROp4gRb1Zjn5%TzoA3@k zg%4fqGp^s}8aT?+WG0jD6=|y}eMDF%KD<57CQSRP=TpjY_L|ApDcxGn+k0`J+7&V_ zZY+;mg>>HClsFGd5^c-m&MJAS-u{1OyZ=|S-Rja-oQN-`Wc%=MXy!d<%J#9rrEPHG zQ#ilhh)30^>JOS>74Mir;b0|(Jxw*tV5?qsY3Wlj1w-D-a-VC&rcDnhJ<8;J!$L-` z_RFEhtNQHf!er%md(Eu7Tw_$Z=DN^K$Mi@lUXNF}SY^k1)M&-m?AL5P`3@?t%wX4` zO;fK{%9L!qy?^)n%C)w*>9Eqhi|l4z`^8mnBGdxU6UuS_z66|d|6yeu27Ld9Uc6_q z)3XL>JV4jAppJ3N8`nc>EQpWIV*Y^7G%GbtZkN6Es%u&Q3d3r|nq;EB-ptNSH%_-2ZGGDqWsFit*lRC;(xuw_>fTcp ecQ1WMSSp82eUEV+``?I@dcUtUc9FNTz<&U&odfXz delta 2894 zcmWmG^>-Hp7=>{*Kn4s(ha*NvcXu~RcgUrs8|l7uj85t9ZXDe$4JzFrZK6KkA3o0? zaL;+qd50~&pM2Qjd&wiiV_uCGEw`seln%N&Tvm`3Y(=+XSTU_HtXNiv72Aqq#kE4M zcvgHX%t~M-v=Ui~tt3`bE18wtN@1n6zO=%vR90#$jg{7lu+mxStqfL1>nkghmD$Q- zWwo+d*{vK_PAiv{+sb3*wenf{tpZj-tB_ULDq`p8lvUa)W0keaS>>$? zRz<6lRoSXyRkf;F)vd3sZ>$<&< z`?R!LS*@)$R$Hr`)!zEf>R@%WI$52qE>>5oo7LUwVfD0nS-q`3R$uFTtDn{18ek2y z23doxA=Xf9m^IuQVU4s#S++)7W2~{(IBUE$!J24IvL;(otVnCBHO-oC&9G)#v#iT8pg3))H%}wai*>t*};FtE|=58f&e!&RTD6ur^wotj*RIYpb=* z+HUQzc3Qiv-PRs!ueHzGZym6Hw4$to)*$3Heb;Y`BU9+xRH>{i1E$g;*$NJg&#roB{Yu&T%TMw*<)+6h&^~8E=J+q!$ zFRYi=E9ksQs>o4nX>mTd0^{@5cI0a2o5P}gMF%T19 zAQnOp8*va9p@@h02txuSL?R?c5+p@3Bu5IQ#Fq$1Dx^jlq(ubMAw4o6Bfdf=WJVTb zMK)wd4&+2GOR7Mq4MKx5% z*Z2lCP!qLK8+A|@^-v!T&=8H#7){U=&Cnd*q6Gr`w?r$nMjNz6JG94l=zxysgwE)K zuIPsD=z*T-h2H3czW5&f&>sUZ5Q8unLogJ>FdQQ=5~E;@#u$vnIE=>xOvEHi#uP+i zDyCsNW?&{}VK(MqF6LoA7T^ag#3C%l5-i0sEXNA0#44=D8mz@Stj7jy#3pRU7Hq{f zY{w4l#4hZ{9_+V2o4AGBxPzbZ3x362+{1l5z(YL3V?4oAJi~Lmz)QTsYy5^cc#C&sKY|e*F%T19AQnOp8*va9p@@h02txuSL?R?c5+p@3Bu5IQ z#Fq$1Dx^jlq(ubMAw4o6Bfdf=WJVTbMK)wd4&+2GOR7Mq4MKx5%*Z2lCP!qLK8+A|@^-v!T&=8H#7){U=&Cnd* zq6Gr`w?r$nMjNz6JG94l=zxysgwE)KuIPsD=z*T-h2H3czW5&f&>sUZ5Q8unLogJ> zFdQQ=5~E;@#u$vnIE=>xOvEHi#uP+iDyCsNW?&{}VK(MqF6LoA7T^ag#3C%l5-i0s zEXNA0#44=D8mz@Stj7jy#3pRU7Hq{fY{w4l#4hZ{9_+V2o4AGBxPzbZ3x362+{1l5z(YL3V?4oA zJj3(g19}m>d`ifg7%ig(p4X_*$QQwNqDLjVn?ERK(3I9QUIdeufxHUjbs)b5@+OeC zfxHXkeIOqK`54Hj;HcI!eh*%_{ZXh#p@S(JTyFR=QwNQgvRa?axx?; ZVPwCcu;{xY-h6%+BPycGAHjEH{SW4hTE+kX diff --git a/docs/index.html b/docs/index.html index 857ae89967b..e827f7f62a4 100644 --- a/docs/index.html +++ b/docs/index.html @@ -1,4 +1,4 @@ - + @@ -283,6 +283,86 @@

眈眈探求 | TITLE URL + + 5a13893a1a6c4fdce720193dc4855a7d + CVE-2024-48936 + 2024-10-28 04:15:02 + SchedMD Slurm before 24.05.4 has Incorrect Authorization. A mistake in authentication handling in stepmgr could permit an attacker to execute processes under other users' jobs. This is limited to jobs explicitly running with --stepmgr, or on systems that have globally enabled stepmgr via SlurmctldParameters=enable_stepmgr in their configuration. + 详情 + + + + 11ae587bc37aa40d9b21be435a6b5430 + CVE-2024-10440 + 2024-10-28 03:15:02 + The eHDR CTMS from Sunnet has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL command to read, modify, and delete database contents. + 详情 + + + + 96627caaec935cb9aed3c8472a323177 + CVE-2024-10439 + 2024-10-28 03:15:02 + The eHRD CTMS from Sunnet has an Insecure Direct Object Reference (IDOR) vulnerability, allowing unauthenticated remote attackers to modify a specific parameter to access arbitrary files uploaded by any user. + 详情 + + + + a5f4a0c6f18a9107ee1561ae19432d7c + CVE-2024-23843 + 2024-10-28 02:15:02 + Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Genians Genian NAC V5.0, Genians Genian NAC LTS V5.0.This issue affects Genian NAC V5.0: from V5.0.0 through V5.0.60; Genian NAC LTS V5.0: from 5.0.0 LTS through 5.0.55 LTS(Revision 125558), from 5.0.0 LTS through 5.0.56 LTS(Revision 125560). + 详情 + + + + 6bb7d979bb5cb3d0242348256e1633a2 + CVE-2024-50067 + 2024-10-28 01:15:02 + In the Linux kernel, the following vulnerability has been resolved: uprobe: avoid out-of-bounds memory access of fetching args Uprobe needs to fetch args into a percpu buffer, and then copy to ring buffer to avoid non-atomic context problem. Sometimes user-space strings, arrays can be very large, but the size of percpu buffer is only page size. And store_trace_args() won't check whether these data exceeds a single page or not, caused out-of-bounds memory access. It could be reproduced by following steps: 1. build kernel with CONFIG_KASAN enabled 2. save follow program as test.c ``` \#include \#include \#include // If string length large than MAX_STRING_SIZE, the fetch_store_strlen() // will return 0, cause __get_data_size() return shorter size, and // store_trace_args() will not trigger out-of-bounds access. // So make string length less than 4096. \#define STRLEN 4093 void generate_string(char *str, int n) { int i; for (i = 0; i < n; ++i) { char c = i % 26 + 'a'; str[i] = c; } str[n-1] = '\0'; } void print_string(char *str) { printf("%s\n", str); } int main() { char tmp[STRLEN]; generate_string(tmp, STRLEN); print_string(tmp); return 0; } ``` 3. compile program `gcc -o test test.c` 4. get the offset of `print_string()` ``` objdump -t test | grep -w print_string 0000000000401199 g F .text 000000000000001b print_string ``` 5. configure uprobe with offset 0x1199 ``` off=0x1199 cd /sys/kernel/debug/tracing/ echo "p /root/test:${off} arg1=+0(%di):ustring arg2=\$comm arg3=+0(%di):ustring" > uprobe_events echo 1 > events/uprobes/enable echo 1 > tracing_on ``` 6. run `test`, and kasan will report error. ================================================================== BUG: KASAN: use-after-free in strncpy_from_user+0x1d6/0x1f0 Write of size 8 at addr ffff88812311c004 by task test/499CPU: 0 UID: 0 PID: 499 Comm: test Not tainted 6.12.0-rc3+ #18 Hardware name: Red Hat KVM, BIOS 1.16.0-4.al8 04/01/2014 Call Trace: dump_stack_lvl+0x55/0x70 print_address_description.constprop.0+0x27/0x310 kasan_report+0x10f/0x120 ? strncpy_from_user+0x1d6/0x1f0 strncpy_from_user+0x1d6/0x1f0 ? rmqueue.constprop.0+0x70d/0x2ad0 process_fetch_insn+0xb26/0x1470 ? __pfx_process_fetch_insn+0x10/0x10 ? _raw_spin_lock+0x85/0xe0 ? __pfx__raw_spin_lock+0x10/0x10 ? __pte_offset_map+0x1f/0x2d0 ? unwind_next_frame+0xc5f/0x1f80 ? arch_stack_walk+0x68/0xf0 ? is_bpf_text_address+0x23/0x30 ? kernel_text_address.part.0+0xbb/0xd0 ? __kernel_text_address+0x66/0xb0 ? unwind_get_return_address+0x5e/0xa0 ? __pfx_stack_trace_consume_entry+0x10/0x10 ? arch_stack_walk+0xa2/0xf0 ? _raw_spin_lock_irqsave+0x8b/0xf0 ? __pfx__raw_spin_lock_irqsave+0x10/0x10 ? depot_alloc_stack+0x4c/0x1f0 ? _raw_spin_unlock_irqrestore+0xe/0x30 ? stack_depot_save_flags+0x35d/0x4f0 ? kasan_save_stack+0x34/0x50 ? kasan_save_stack+0x24/0x50 ? mutex_lock+0x91/0xe0 ? __pfx_mutex_lock+0x10/0x10 prepare_uprobe_buffer.part.0+0x2cd/0x500 uprobe_dispatcher+0x2c3/0x6a0 ? __pfx_uprobe_dispatcher+0x10/0x10 ? __kasan_slab_alloc+0x4d/0x90 handler_chain+0xdd/0x3e0 handle_swbp+0x26e/0x3d0 ? __pfx_handle_swbp+0x10/0x10 ? uprobe_pre_sstep_notifier+0x151/0x1b0 irqentry_exit_to_user_mode+0xe2/0x1b0 asm_exc_int3+0x39/0x40 RIP: 0033:0x401199 Code: 01 c2 0f b6 45 fb 88 02 83 45 fc 01 8b 45 fc 3b 45 e4 7c b7 8b 45 e4 48 98 48 8d 50 ff 48 8b 45 e8 48 01 d0 ce RSP: 002b:00007ffdf00576a8 EFLAGS: 00000206 RAX: 00007ffdf00576b0 RBX: 0000000000000000 RCX: 0000000000000ff2 RDX: 0000000000000ffc RSI: 0000000000000ffd RDI: 00007ffdf00576b0 RBP: 00007ffdf00586b0 R08: 00007feb2f9c0d20 R09: 00007feb2f9c0d20 R10: 0000000000000001 R11: 0000000000000202 R12: 0000000000401040 R13: 00007ffdf0058780 R14: 0000000000000000 R15: 0000000000000000 This commit enforces the buffer's maxlen less than a page-size to avoid store_trace_args() out-of-memory access. + 详情 + + + + a36a2101fa80d6fdcd452ee7325fc99a + CVE-2024-10435 + 2024-10-28 01:15:02 + A vulnerability was found in didi Super-Jacoco 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /cov/triggerEnvCov. The manipulation of the argument uuid leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. + 详情 + + + + ed44cfb0b046e9079b8967e1130ce6ff + CVE-2024-10434 + 2024-10-28 01:15:02 + A vulnerability was found in Tenda AC1206 up to 20241027. It has been classified as critical. This affects the function ate_Tenda_mfg_check_usb/ate_Tenda_mfg_check_usb3 of the file /goform/ate. The manipulation of the argument arg leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. + 详情 + + + + ce32608695c85a9fedf2a7f523db63a6 + CVE-2024-50624 + 2024-10-28 00:15:03 + ispdbservice.cpp in KDE Kmail before 6.2.0 allows man-in-the-middle attackers to trigger use of an attacker-controlled mail server because cleartext HTTP is used for a URL such as http://autoconfig.example.com or http://example.com/.well-known/autoconfig for retrieving the configuration. This is related to kmail-account-wizard. + 详情 + + + + c8cde1b1404a49f904b33bcf4db0763f + CVE-2024-50623 + 2024-10-28 00:15:03 + In Cleo Harmony before 5.8.0.20, VLTrader before 5.8.0.20, and LexiCom before 5.8.0.20, there is a JavaScript Injection vulnerability. + 详情 + + + + bf0ac006759954e119f3c984e39ad4f9 + CVE-2024-10433 + 2024-10-28 00:15:03 + A vulnerability was found in Project Worlds Simple Web-Based Chat Application 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument Name/Comment leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions different parameters to be affected which do not correlate with the screenshots of a successful attack. + 详情 + + 44fd7285b1b6d4837d69bdd971556498 CVE-2024-10408 @@ -443,86 +523,6 @@

眈眈探求 | 详情 - - e41781926644e5b7e01708f59f0e98ae - CVE-2022-30268 - 2024-10-25 02:43:51 - The affected products use the Winloader utility to manage firmware updates by serial port or a serial-over-Ethernet link that were found to not use authentication. This could allow an attacker to push malicious firmware images to the controller and cause a denial-of-service condition or allow remote code execution. This vulnerability only effects version of the CPE302, 205, and 310 that were produced before the "-Bxxx" hardware revisions. - 详情 - - - - f6fa6284bf91bb1d0d0d60dd291680d2 - CVE-2022-30265 - 2024-10-25 02:43:23 - Control logic downloaded to the PLC, which can be either written in one of the IEC 61131-3 languages or written in C and supplied as an ELF binary block, is not cryptographically authenticated. - 详情 - - - - fbaeb433df3a076886b57e9a767bb181 - CVE-2024-5717 - 2024-10-25 02:41:57 - This vulnerability allows remote attackers to execute arbitrary code on affected installations of Logsign Unified SecOps Platform. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the implementation of the HTTP API. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. - 详情 - - - - 7338bfcae89e47a36ac9c4d2f8348d6c - CVE-2024-5716 - 2024-10-25 02:41:28 - This vulnerability allows remote attackers to bypass authentication on affected installations of Logsign Unified SecOps Platform. Authentication is not required to exploit this vulnerability. The specific flaw exists within the password reset mechanism. The issue results from the lack of restriction of excessive authentication attempts. An attacker can leverage this vulnerability to reset a user's password and bypass authentication on the system. - 详情 - - - - 3b0ec2041c38f2b6c8ce4b38b3fcfcd2 - CVE-2024-7240 - 2024-10-25 02:30:19 - This vulnerability allows local attackers to escalate privileges on affected installations of F-Secure Total. User interaction on the part of an administrator is required to exploit this vulnerability. The specific flaw exists within the WithSecure plugin hosting service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. - 详情 - - - - c742f88adbc2f1e7ee10af7ecbd18463 - CVE-2024-7238 - 2024-10-25 02:29:46 - This vulnerability allows local attackers to escalate privileges on affected installations of VIPRE Advanced Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Anti Malware Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. - 详情 - - - - 5f1301fe94f68f80ed703e0a44a766cf - CVE-2024-7234 - 2024-10-25 02:28:29 - This vulnerability allows local attackers to escalate privileges on affected installations of AVG AntiVirus Free. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the AVG Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. - 详情 - - - - b726af1b91cf91a01f73ba837637dee1 - CVE-2024-7227 - 2024-10-25 02:27:49 - This vulnerability allows local attackers to escalate privileges on affected installations of Avast Free Antivirus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Avast Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. - 详情 - - - - a5b24b53b530937981c4cb643acc4032 - CVE-2024-37396 - 2024-10-25 02:24:26 - A stored cross-site scripting (XSS) vulnerability in the Calendar function of Vanderbilt REDCap 13.1.9 allows authenticated users to execute arbitrary web scripts or HTML via injecting a crafted payload into the 'Notes' field of a calendar event. This could lead to the execution of malicious scripts when the event is viewed. Updating to version 14.2.1 or later is recommended to remediate this vulnerability. - 详情 - - - - 51702a7ed7a213966762449f8f65c69e - CVE-2024-37395 - 2024-10-25 02:24:05 - A stored cross-site scripting (XSS) vulnerability in the Public Survey function of Vanderbilt REDCap 13.1.9 allows authenticated users to execute arbitrary web scripts or HTML via injecting a crafted payload into the 'Survey Title' and 'Survey Instructions' fields. This vulnerability could be exploited by attackers to execute malicious scripts when the survey is accessed through its public link. It is advised to update to version 14.2.1 or later to fix this issue. - 详情 - -