Lucene search

K

6 matches found

CVE
CVE
added 2024/08/14 3:15 p.m.49 views

CVE-2024-41865

Dimension versions 3.4.11 and earlier are affected by an Untrusted Search Path vulnerability that could lead to arbitrary code execution. An attacker could exploit this vulnerability by inserting a malicious file into the search path, which the application might execute instead of the legitimate fi...

7.8CVSS7.8AI score0.00041EPSS
CVE
CVE
added 2024/08/14 3:15 p.m.48 views

CVE-2024-34125

Dimension versions 3.4.11 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must o...

5.5CVSS5.1AI score0.00078EPSS
CVE
CVE
added 2024/08/14 3:15 p.m.48 views

CVE-2024-34126

Dimension versions 3.4.11 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must o...

5.5CVSS5.1AI score0.00078EPSS
CVE
CVE
added 2024/08/14 3:15 p.m.45 views

CVE-2024-34124

Dimension versions 3.4.11 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7.9AI score0.00043EPSS
CVE
CVE
added 2024/08/14 3:15 p.m.44 views

CVE-2024-20790

Dimension versions 3.4.11 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must o...

5.5CVSS5.1AI score0.00078EPSS
CVE
CVE
added 2024/08/14 3:15 p.m.43 views

CVE-2024-20789

Dimension versions 3.4.11 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

7.8CVSS7.8AI score0.0005EPSS