Page 228 of 34747 results (0.011 seconds)

CVSS: 7.8EPSS: 0%CPEs: 43EXPL: 0

Improper privilege management in Jungo WinDriver 6.0.0 through 16.1.0 allows local attackers to escalate privileges and execute arbitrary code. • https://jungo.com/windriver/versions https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf •

CVSS: 7.8EPSS: 0%CPEs: 43EXPL: 0

Improper privilege management in Jungo WinDriver before 12.2.0 allows local attackers to escalate privileges and execute arbitrary code. • https://jungo.com/windriver/versions https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-04 https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2024-001_en.pdf • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-269: Improper Privilege Management •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 0

trunk.cocoapods.org is the authentication server for the CoacoaPods dependency manager. A vulnerability affected older pods which migrated from the pre-2014 pull request workflow to trunk. If the pods had never been claimed then it was still possible to do so. It was also possible to have all owners removed from a pod, and that made the pod available for the same claiming system. This was patched server-side in commit 71be5440906b6bdfbc0bcc7f8a9fec33367ea0f4 in September 2023. trunk.cocoapods.org es el servidor de autenticación para el administrador de dependencias de CoacoaPods. • https://blog.cocoapods.org/Claim-Your-Pods https://blog.cocoapods.org/CocoaPods-Trunk-RCEs-2023 https://evasec.webflow.io/blog/eva-discovered-supply-chain-vulnerabities-in-cocoapods#1-taking-unauthorized-ownership-over-orphaned-pods https://github.com/CocoaPods/CocoaPods/security/advisories/GHSA-j483-qm5c-7hqx https://github.com/CocoaPods/trunk.cocoapods.org/commit/71be5440906b6bdfbc0bcc7f8a9fec33367ea0f4 • CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

trunk.cocoapods.org is the authentication server for the CoacoaPods dependency manager. Prior to commit d4fa66f49cedab449af9a56a21ab40697b9f7b97, the trunk sessions verification step could be manipulated for owner session hijacking Compromising a victim’s session will result in a full takeover of the CocoaPods trunk account. The threat actor could manipulate their pod specifications, disrupt the distribution of legitimate libraries, or cause widespread disruption within the CocoaPods ecosystem. This was patched server-side with commit d4fa66f49cedab449af9a56a21ab40697b9f7b97 in October 2023. trunk.cocoapods.org es el servidor de autenticación para el administrador de dependencias de CoacoaPods. Antes del commit d4fa66f49cedab449af9a56a21ab40697b9f7b97, el paso de verificación de las sesiones troncales podría manipularse para secuestrar la sesión del propietario. • https://blog.cocoapods.org/CocoaPods-Trunk-RCEs-2023 https://evasec.io/blog/eva-discovered-supply-chain-vulnerabities-in-cocoapods#vulnerability-3-achieving-zero-click-account-takeover-by-defeating-email-security-boundaries https://github.com/CocoaPods/CocoaPods/security/advisories/GHSA-52gf-m7v9-m333 https://github.com/CocoaPods/trunk.cocoapods.org/commit/d4fa66f49cedab449af9a56a21ab40697b9f7b97 • CWE-488: Exposure of Data Element to Wrong Session •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

This RCE triggered a full user-session reset, as an attacker could have used this method to write to any Podspec in trunk. trunk.cocoapods.org es el servidor de autenticación para el administrador de dependencias de CoacoaPods. ... Este RCE desencadenó un restablecimiento completo de la sesión del usuario, ya que un atacante podría haber usado este método para escribir en cualquier Podspec en el tronco. • https://github.com/ReeFSpeK/CocoaPods-RCE_CVE-2024-38366 https://blog.cocoapods.org/CocoaPods-Trunk-RCEs-2023 https://evasec.webflow.io/blog/eva-discovered-supply-chain-vulnerabities-in-cocoapods#2-remote-code-execution-on-the-cocoapods-trunk-server https://github.com/CocoaPods/CocoaPods/security/advisories/GHSA-x2x4-g675-qg7c • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •