CVSS: 6.7EPSS: 0%CPEs: 2EXPL: 0CVE-2024-20140
https://notcve.org/view.php?id=CVE-2024-20140
06 Jan 2025 — In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09270402; Issue ID: MSV-2020. • https://corp.mediatek.com/product-security-bulletin/January-2025 • CWE-787: Out-of-bounds Write •
CVSS: 7.8EPSS: 2%CPEs: 15EXPL: 0CVE-2024-20089
https://notcve.org/view.php?id=CVE-2024-20089
02 Sep 2024 — In wlan, there is a possible denial of service due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08861558; Issue ID: MSV-1526. En WLAN, existe una posible denegación de servicio debido a un manejo incorrecto de errores. • https://corp.mediatek.com/product-security-bulletin/September-2024 • CWE-703: Improper Check or Handling of Exceptional Conditions CWE-754: Improper Check for Unusual or Exceptional Conditions •
CVSS: 4.4EPSS: 0%CPEs: 4EXPL: 0CVE-2024-20085
https://notcve.org/view.php?id=CVE-2024-20085
02 Sep 2024 — In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944204; Issue ID: MSV-1560. En estado de encendido, es posible que se produzca una lectura fuera de los límites debido a la falta de una comprobación de los límites. • https://corp.mediatek.com/product-security-bulletin/September-2024 • CWE-125: Out-of-bounds Read •
CVSS: 4.4EPSS: 0%CPEs: 4EXPL: 0CVE-2024-20084
https://notcve.org/view.php?id=CVE-2024-20084
02 Sep 2024 — In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08944210; Issue ID: MSV-1561. En estado de encendido, es posible que se produzca una lectura fuera de los límites debido a la falta de una comprobación de los límites. • https://corp.mediatek.com/product-security-bulletin/September-2024 • CWE-125: Out-of-bounds Read •
CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0CVE-2024-22278 – Harbor fails to validate the user permissions when updating project configurations
https://notcve.org/view.php?id=CVE-2024-22278
02 Aug 2024 — Incorrect user permission validation in Harbor <v2.9.5 and Harbor <v2.10.3 allows authenticated users to modify configurations. La validación de permisos de usuario incorrecta en Harbor • https://github.com/goharbor/harbor/security/advisories/GHSA-hw28-333w-qxp3 • CWE-269: Improper Privilege Management •
CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0CVE-2024-41265
https://notcve.org/view.php?id=CVE-2024-41265
01 Aug 2024 — A TLS certificate verification issue discovered in cortex v0.42.1 allows attackers to obtain sensitive information via the makeOperatorRequest function. • https://gist.github.com/nyxfqq/1a8237f3f9cf793c6433f08b17d1593c • CWE-599: Missing Validation of OpenSSL Certificate •
CVSS: 8.8EPSS: 1%CPEs: 2EXPL: 0CVE-2024-5187 – Arbitrary File Overwrite in download_model_with_test_data in onnx/onnx
https://notcve.org/view.php?id=CVE-2024-5187
06 Jun 2024 — A vulnerability in the `download_model_with_test_data` function of the onnx/onnx framework, version 1.16.0, allows for arbitrary file overwrite due to inadequate prevention of path traversal attacks in malicious tar files. This vulnerability enables attackers to overwrite any file on the system, potentially leading to remote code execution, deletion of system, personal, or application files, thus impacting the integrity and availability of the system. The issue arises from the function's handling of tar fil... • https://huntr.com/bounties/50235ebd-3410-4ada-b064-1a648e11237e • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0CVE-2024-31584
https://notcve.org/view.php?id=CVE-2024-31584
19 Apr 2024 — Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the component torch/csrc/jit/mobile/flatbuffer_loader.cpp. Pytorch anterior a v2.2.0 tiene una vulnerabilidad de lectura fuera de los límites a través del componente torch/csrc/jit/mobile/flatbuffer_loader.cpp. • https://github.com/pytorch/pytorch/blob/v2.1.2/torch/csrc/jit/mobile/flatbuffer_loader.cpp#L305 • CWE-125: Out-of-bounds Read •
CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0CVE-2024-31583
https://notcve.org/view.php?id=CVE-2024-31583
17 Apr 2024 — Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in torch/csrc/jit/mobile/interpreter.cpp. Se descubrió que Pytorch anterior a la versión v2.2.0 contenía una vulnerabilidad de use-after-free en torch/csrc/jit/mobile/interpreter.cpp. • https://gist.github.com/1047524396/43e19a41f2b36503a4a228c32cdbc176 • CWE-416: Use After Free •
CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0CVE-2024-21418 – Software for Open Networking in the Cloud (SONiC) Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-21418
12 Mar 2024 — Software for Open Networking in the Cloud (SONiC) Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios del software para redes abiertas en la nube (SONiC) • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21418 • CWE-284: Improper Access Control •
