Click to open the Alert Filter

 
Year Month
Severity
Categories
Search by Alert Name
Page(s) : 1 2 3 [4] 5 6 7 8 9 10 11 12 13 14 ... Result(s) : 275454

Alerts Feed Alerts

DATE NAME CATEGORIES DETAIL
N/A 2024-05-15 CVE-2024-4950 cve Inappropriate implementation in Downloads in Google Chrome prior to 125.0.6422.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI ...
N/A 2024-05-15 CVE-2024-4976 cve Out-of-bounds array write in Xpdf 4.05 and earlier, due to missing object type check in AcroForm field reference.
N/A 2024-05-15 CVE-2024-25078 cve A memory corruption vulnerability in StorageSecurityCommandDxe in Insyde InsydeH2O before kernel 5.2: IB19130163 in 05.29.07, kernel 5.3: IB19130163 in 05.38.07, kernel 5.4: IB1...
N/A 2024-05-15 CVE-2024-25079 cve A memory corruption vulnerability in HddPassword in Insyde InsydeH2O kernel 5.2 before 05.29.09, kernel 5.3 before 05.38.09, kernel 5.4 before 05.46.09, kernel 5.5 before 05.54....
N/A 2024-05-15 CVE-2024-27353 cve A memory corruption vulnerability in SdHost and SdMmcDevice in Insyde InsydeH2O kernel 5.2 before 05.29.09, kernel 5.3 before 05.38.09, kernel 5.4 before 05.46.09, kernel 5.5 be...
N/A 2024-05-15 CVE-2024-34954 cve Code-projects Budget Management 1.0 is vulnerable to Cross Site Scripting (XSS) via the budget parameter.
N/A 2024-05-15 CVE-2024-34955 cve Code-projects Budget Management 1.0 is vulnerable to SQL Injection via the delete parameter.
N/A 2024-05-15 CVE-2023-5935 cve When configuring Arc (e.g. during the first setup), a local web interface is provided to ease the configuration process. Such web interface lacks authentication and may thus be ...
N/A 2024-05-15 CVE-2023-5936 cve On Unix systems (Linux, MacOS), Arc uses a temporary file with unsafe privileges. By tampering with such file, a malicious local user in the system may be able to trigger arb...
N/A 2024-05-15 CVE-2023-5937 cve On Windows systems, the Arc configuration files resulted to be world-readable. This can lead to information disclosure by local attackers, via exfiltration of sensitive data ...
N/A 2024-05-15 CVE-2024-31216 cve The source-controller is a Kubernetes operator, specialised in artifacts acquisition from external sources such as Git, OCI, Helm repositories and S3-compatible buckets. The sou...
N/A 2024-05-15 CVE-2024-35179 cve Stalwart Mail Server is an open-source mail server. Prior to version 0.8.0, when using `RUN_AS_USER`, the specified user (and therefore, web interface admins) can read arbitrary...
N/A 2024-05-15 CVE-2024-3317 cve An improper access control was identified in the Identity Security Cloud (ISC) message server API that allowed an authenticated user to exfiltrate job processing metadata (opaqu...
N/A 2024-05-15 CVE-2024-3318 cve A file path traversal vulnerability was identified in the DelimitedFileConnector Cloud Connector that allowed an authenticated administrator to set arbitrary connector attribute...
N/A 2024-05-15 CVE-2024-3319 cve An issue was identified in the Identity Security Cloud (ISC) Transform preview and IdentityProfile preview API endpoints that allowed an authenticated administrator to execute u...
N/A 2024-05-15 CVE-2024-4903 cve A vulnerability was found in Tongda OA 2017. It has been declared as critical. This vulnerability affects unknown code of the file /general/meeting/manage/delete.php. The manipu...
N/A 2024-05-15 CVE-2023-5938 cve Multiple functions use archives without properly validating the filenames therein, rendering the application vulnerable to path traversal via 'zip slip' attacks. An...
N/A 2024-05-15 CVE-2023-7258 cve A denial of service exists in Gvisor Sandbox where a bug in reference counting code in mount point tracking could lead to a panic, making it possible for an attacker running as ...
N/A 2024-05-15 CVE-2024-27593 cve A stored cross-site scripting (XSS) vulnerability in the Filter function of Eramba Version 3.22.3 Community Edition allows authenticated attackers to execute arbitrary web scrip...
N/A 2024-05-15 CVE-2024-28042 cve SUBNET Solutions Inc. has identified vulnerabilities in third-party components used in PowerSYSTEM Center.
Page(s) : 1 2 3 [4] 5 6 7 8 9 10 11 12 13 14 ... Result(s) : 275454