4.3
CVE-2024-11672 -
Incorrect authorization in the add permission component in Devolutions Remote Desktop Manager 2024.2.21 and earlier on Windows allows an authenticated malicious user to bypass the "Add" permission via the import in vault feature.
7
CVE-2024-27134 - Excessive directory permissions in MLflow leads to local privilege escalation when using spark_udf
Excessive directory permissions in MLflow leads to local privilege escalation when using spark_udf. This behavior can be exploited by a local attacker to gain elevated permissions by using a ToCToU attack. The issue is only relevant when the spark_udf() MLflow API is called.
6.9
CVE-2024-11403 - Out of Bounds Memory Read/Write in libjxl
There exists an out of bounds read/write in LibJXL versions prior to commitΒ 9cc451b91b74ba470fd72bd48c121e9f33d24c99. The JPEG decoder used by the JPEG XL encoderΒ when doing JPEG recompression (i.e. if using JxlEncoderAddJPEGFrame on untrusted input) does not properly check bounds in the presence oβ¦
6.9
CVE-2024-11498 - Resource exhaustion via Stack overflow in libjxl
There exists a stack buffer overflow in libjxl.Β A specifically-crafted file can cause the JPEG XL decoder to use large amounts of stack space (up to 256mb is possible, maybe 512mb), potentially exhausting the stack. An attacker can craft a file that will cause excessive memory usage. We recommend uβ¦
1
CVE-2020-12492 - Wifi information acquisition vulnerability in Framework Services
Improper handling of WiFi information by framework services can allow certain malicious applications to obtain sensitive information.
4.8
CVE-2020-12491 - Framework Information Disclosure Vulnerability
Improper control of framework service permissions with possibility of some sensitive device information leakage.
8.7
CVE-2024-11664 - eNMS TGZ File controller.py multiselect_filtering path traversal
A vulnerability, which was classified as critical, has been found in eNMS up to 4.2. Affected by this issue is the function multiselect_filtering of the file eNMS/controller.py of the component TGZ File Handler. The manipulation leads to path traversal. The attack may be launched remotely. The explβ¦
6.7
CVE-2022-33862 - Improper access control mechanism in IPP
IPP software prior to v1.71 is vulnerable to default credential vulnerability. This could lead attackers to identify and access vulnerable systems.
5.1
CVE-2022-33861 - Insufficient verification of authenticity in IPP
IPP software versions prior to v1.71 do not sufficiently verify the authenticity of data, in a way that causes it to accept invalid data.
5.2
CVE-2021-23282 - Stored Cross-site Scripting reported in Intelligent Power Manager v1
Eaton Intelligent Power Manager (IPM) prior to 1.70 is vulnerable to stored Cross site scripting. The vulnerability exists due to insufficient validation of input from certain resources by the IPM software. The attacker would need access to the local Subnet and an administrator interaction to comprβ¦