Autore: Angelo Barbosa

CVE-2024-41120 | opengeos streamlit-geospatial 9_ gpd.read_file url server-side request forgery (GHSL-2024-100)

A vulnerability was found in opengeos streamlit-geospatial. It has been declared as critical. Affected by this vulnerability is the function gpd.read_file of the file pages/9_????_Vector_Data_Visualization.py. The manipulation of the argument url leads to server-side request forgery. This vulnerability is known as CVE-2024-41120. The attack can be launched remotely. There is no exploit available. It is recommended to apply a patch to fix this...

Per saperne di più

CVE-2024-41118 | opengeos streamlit-geospatial 7_ get_layers url server-side request forgery (GHSL-2024-100)

A vulnerability was found in opengeos streamlit-geospatial. It has been classified as critical. Affected is the function get_layers of the file pages/7_????_Web_Map_Service.py. The manipulation of the argument url leads to server-side request forgery. This vulnerability is traded as CVE-2024-41118. It is possible to launch the attack remotely. There is no exploit available. It is recommended to apply a patch to fix this...

Per saperne di più

CVE-2024-42029 | xdg-desktop-portal-hyprland up to 1.3.2 App ID os command injection (Issue 242)

A vulnerability was found in xdg-desktop-portal-hyprland up to 1.3.2 and classified as critical. This issue affects some unknown processing of the component App ID Handler. The manipulation leads to os command injection. The identification of this vulnerability is CVE-2024-42029. Access to the local network is required for this attack. There is no exploit available. It is recommended to upgrade the affected...

Per saperne di più

CVE-2024-41119 | opengeos streamlit-geospatial 8_????️_Raster_Data_Visualization.py eval vis_params input validation (GHSL-2024-100)

A vulnerability has been found in opengeos streamlit-geospatial and classified as very critical. This vulnerability affects the function eval of the file 8_????️_Raster_Data_Visualization.py. The manipulation of the argument vis_params leads to improper input validation. This vulnerability was named CVE-2024-41119. The attack can be initiated remotely. There is no exploit available. It is recommended to apply a patch to fix this...

Per saperne di più