A vulnerability, which was classified as problematic, was found in Rundeck up to 3.3.13/3.4.2. Affected is an unknown code block. Upgrading to version 3.3.14 or 3.4.3 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Rundeck up to 3.3.13/3.4.2 cross-site request forgery [CVE-2021-39133]
- Virtual Patching
- August 31, 2021
- 7:05 am
CVE-2024-32608 : HDF5 UP TO 1.14.3 H5A__CLOSE MEMORY CORRUPTION
Description HDF5 library through 1.14.3 has memory corruption in H5A__close resulting in the corruption of the instruction pointer and causing
CVE-2024-45160 : LEMONLDAP::NG UP TO 2.19.1 OAUTH2 CLIENT AUTHENTICATION CLIENT_PASSWORD IMPROPER AUTHENTICATION
Description Incorrect credential validation in LemonLDAP::NG 2.18.x and 2.19.x before 2.19.2 allows attackers to bypass OAuth2 client authentication via an
CVE-2024-45179 : ZA-INTERNET C-MOR VIDEO SURVEILLANCE 5.2401/6.00PL01 WEB INTERFACE SETTIMEZONE.PML CITY OS COMMAND INJECTION
Description An issue was discovered in za-internet C-MOR Video Surveillance 5.2401 and 6.00PL01. Due to insufficient input validation, the C-MOR