CVE-2024-44915
Mié, 28/08/2024 – 18:15
CVE-2024-44915
CVE-2024-44915
Mié, 28/08/2024 – 18:15
CVE-2024-44915
CVE-2024-44914
Mié, 28/08/2024 – 18:15
CVE-2024-44914
CVE-2024-44913
Mié, 28/08/2024 – 18:15
CVE-2024-44913
CVE-2024-42905
Mié, 28/08/2024 – 18:15
CVE-2024-42905
CVE-2024-41236
Mié, 28/08/2024 – 18:15
CVE-2024-41236
CVE-2024-44761
Mié, 28/08/2024 – 19:15
CVE-2024-44761
CVE-2024-20284
Mié, 28/08/2024 – 17:15
CVE-2024-20284
The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user.
Note: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide.
CVE-2024-20279
Mié, 28/08/2024 – 17:15
CVE-2024-20279
CVE-2024-20285
Mié, 28/08/2024 – 17:15
CVE-2024-20285
The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user.
Note: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide.
CVE-2024-20286
Mié, 28/08/2024 – 17:15
CVE-2024-20286
The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user.
Note: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide.