\nVTPM allows clients to\nexecute tpm2-tools binaries from a list of hardcoded options”\nThe communication with this server is done using protobuf, and the data is comprised of 2\nparts:\n\n1. \nAs noted in the “VTPM.md” file in the eve documentation, “VTPM is a server listening on port\n8877 in EVE, exposing limited functionality of the TPM to the clients. Possible buffer overflow in Zephyr mgmt subsystem when asserts are disabled\n\n Potential off-by-one buffer overflow vulnerability in the Zephyr fuse file system.\n\n\n A sandboxed process may be able to circumvent sandbox restrictions. A sandboxed process may be able to circumvent sandbox restrictions.Ī permissions issue was addressed with additional restrictions. Server-Side Request Forgery (SSRF) in GitHub repository plantuml/plantuml prior to 1.2023.9.Īn access issue was addressed with additional sandbox restrictions. It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.\n\n This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. An unauthenticated attacker can prepend a victim's request with arbitrary data. SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |