CVE-2024-7117
Vie, 26/07/2024 – 04:15
CVE-2024-7117
CVE-2024-7117
Vie, 26/07/2024 – 04:15
CVE-2024-7117
CVE-2024-7120
Vie, 26/07/2024 – 05:15
CVE-2024-7120
CVE-2024-7119
Vie, 26/07/2024 – 05:15
CVE-2024-7119
CVE-2023-49921
Vie, 26/07/2024 – 05:15
CVE-2023-49921
CVE-2024-6490
Vie, 26/07/2024 – 06:15
CVE-2024-6490
CVE-2024-40897
Vie, 26/07/2024 – 06:15
CVE-2024-40897
CVE-2024-7115
Vie, 26/07/2024 – 02:15
CVE-2024-7115
CVE-2024-7114
Vie, 26/07/2024 – 02:15
CVE-2024-7114
CVE-2024-4447
Vie, 26/07/2024 – 02:15
CVE-2024-4447
While this is a very small attack vector that requires very high permissions to execute, its danger lies principally in obfuscating attribution; all Sign In As operations are attributed appropriately in the log files, and a malicious administrator could use this information to render their dealings untraceable — including those admins who have not been granted this ability — such as by using a session ID to generate an API token.
Fixed in: 24.07.12 / 23.01.20 LTS / 23.10.24v13 LTS / 24.04.24v5 LTS
CVE-2024-7116
Vie, 26/07/2024 – 03:15
CVE-2024-7116