A vulnerability classified as critical has been found in Elvish up to 0.13.x. Affected is an unknown part of the component Web UI Backend. Upgrading to version 0.14.0 eliminates this vulnerability. Applying the patch ccc2750037bbbfafe9c1b7a78eadd3bd16e81fe5 is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Elvish up to 0.13.x Web UI Backend exposure of resource
- Virtual Patching
- September 24, 2021
- 7:04 am
CVE-2024-52759 : D-LINK DI-8003 16.07.26A1 IP_POSITION_ASP IP BUFFER OVERFLOW
Description D-LINK DI-8003 v16.07.26A1 was discovered to contain a buffer overflow via the ip parameter in the ip_position_asp function. References
CVE-2024-51503 : TREND MICRO DEEP SECURITY UP TO 20.0 OS COMMAND INJECTION
Description A security agent manual scan command injection vulnerability in the Trend Micro Deep Security 20 Agent could allow an
CVE-2024-52360 : IBM CONCERT SOFTWARE 1.0.0/1.0.1/1.0.2/1.0.2.1 SQL INJECTION
Description IBM Concert Software 1.0.0, 1.0.1, 1.0.2, and 1.0.2.1 is vulnerable to SQL injection. A remote attacker could send specially