Page(s) : 1 ... 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 [1089] 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 ... | Result(s) : 301176 |
Alerts
DATE | NAME | CATEGORIES | DETAIL | |
---|---|---|---|---|
N/A | 2025-01-30 | CVE-2025-0662 | cve | In some cases, the ktrace facility will log the contents of kernel structures to userspace. In one such case, ktrace dumps a variable-sized sockaddr to userspace. There, the f... |
4.9 | 2025-01-30 | CVE-2025-23374 | cve | Dell Networking Switches running Enterprise SONiC OS, version(s) prior to 4.4.1 and 4.2.3, contain(s) an Insertion of Sensitive Information into Log File vulnerability. A high p... |
6.1 | 2025-01-30 | CVE-2025-0844 | cve | A vulnerability was found in needyamin Library Card System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file signu... |
N/A | 2025-01-29 | CVE-2024-57665 | cve | JFinalCMS 1.0 is vulnerable to SQL Injection in rc/main/java/com/cms/entity/Content.java. The cause of the vulnerability is that the title parameter is controllable and is conca... |
9.8 | 2025-01-29 | CVE-2025-0843 | cve | A vulnerability was found in needyamin Library Card System 1.0. It has been classified as critical. Affected is an unknown function of the file admindashboard.php of the compone... |
8.2 | 2025-01-29 | CVE-2025-21396 | cve | Missing authorization in Microsoft Account allows an unauthorized attacker to elevate privileges over a network. |
8.8 | 2025-01-29 | CVE-2025-21415 | cve | Authentication bypass by spoofing in Azure AI Face Service allows an authorized attacker to elevate privileges over a network. |
N/A | 2025-01-29 | CVE-2024-10001 | cve | A Code Injection vulnerability was identified in GitHub Enterprise Server that allowed attackers to inject malicious code into the query selector via the identity property in th... |
N/A | 2025-01-29 | CVE-2024-48849 | cve | Missing Origin Validation in WebSockets vulnerability in FLXEON. Session management was not sufficient to prevent unauthorized HTTPS requests. This issue affects FLXEON: through |
N/A | 2025-01-29 | CVE-2024-48852 | cve | Insertion of Sensitive Information into Log File vulnerability observed in FLEXON. Some information may be improperly disclosed through https access. This issue affects FLXEO... |
7.5 | 2025-01-29 | CVE-2025-0840 | cve | A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manip... |
N/A | 2025-01-29 | CVE-2025-20014 | cve | mySCADA myPRO does not properly neutralize POST requests sent to a specific port with version information. This vulnerability could be exploited by an attacker to execute arbitr... |
N/A | 2025-01-29 | CVE-2025-20061 | cve | mySCADA myPRO does not properly neutralize POST requests sent to a specific port with email information. This vulnerability could be exploited by an attacker to execute arbitrar... |
7.3 | 2025-01-29 | CVE-2025-0841 | cve | A vulnerability has been found in Aridius XYZ up to 20240927 on OpenCart and classified as critical. This vulnerability affects the function loadMore of the component News. The ... |
N/A | 2025-01-29 | CVE-2025-24788 | cve | snowflake-connector-net is the Snowflake Connector for .NET. Snowflake discovered and remediated a vulnerability in the Snowflake Connector for .NET in which files downloaded fr... |
N/A | 2025-01-29 | CVE-2025-24793 | cve | The Snowflake Connector for Python provides an interface for developing Python applications that can connect to Snowflake and perform all standard operations. Snowflake discover... |
N/A | 2025-01-29 | CVE-2025-24794 | cve | The Snowflake Connector for Python provides an interface for developing Python applications that can connect to Snowflake and perform all standard operations. Snowflake discover... |
N/A | 2025-01-29 | CVE-2025-24795 | cve | The Snowflake Connector for Python provides an interface for developing Python applications that can connect to Snowflake and perform all standard operations. Snowflake discover... |
N/A | 2025-01-29 | CVE-2025-24884 | cve | kube-audit-rest is a simple logger of mutation/creation requests to the k8s api. If the "full-elastic-stack" example vector configuration was used for a real cluster, the previo... |
N/A | 2025-01-29 | CVE-2024-11187 | cve | It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such quer... |
Page(s) : 1 ... 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 [1089] 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 ... | Result(s) : 301176 |