Page(s) : 1 ... 125 126 127 128 129 130 131 132 133 134 [135] 136 137 138 139 140 141 142 143 144 145 ... | Result(s) : 312940 |
Alerts
DATE | NAME | CATEGORIES | DETAIL | |
---|---|---|---|---|
7.8 | 2025-03-11 | CVE-2025-27171 | cve | InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of... |
7.8 | 2025-03-11 | CVE-2025-27174 | cve | Acrobat Reader versions 24.001.30225, 20.005.30748, 25.001.20428 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the ... |
7.8 | 2025-03-11 | CVE-2025-27175 | cve | InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the c... |
5.5 | 2025-03-11 | CVE-2025-27176 | cve | InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacke... |
7.8 | 2025-03-11 | CVE-2025-27177 | cve | InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of... |
7.8 | 2025-03-11 | CVE-2025-27178 | cve | InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the c... |
5.5 | 2025-03-11 | CVE-2025-27179 | cve | InDesign Desktop versions ID20.1, ID19.5.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacke... |
N/A | 2025-03-11 | CVE-2025-27439 | cve | Buffer underflow in some Zoom Workplace Apps may allow an authenticated user to conduct an escalation of privilege via network access. |
N/A | 2025-03-11 | CVE-2025-27440 | cve | Heap overflow in some Zoom Workplace Apps may allow an authenticated user to conduct an escalation of privilege via network access. |
N/A | 2025-03-11 | CVE-2025-27591 | cve | A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed lo... |
N/A | 2025-03-11 | CVE-2025-27773 | cve | The SimpleSAMLphp SAML2 library is a PHP library for SAML2 related functionality. Prior to versions 4.17.0 and 5.0.0-alpha.20, there is a signature confusion attack in the HTTPR... |
N/A | 2025-03-11 | CVE-2025-2189 | cve | This vulnerability exists in the Tinxy smart devices due to storage of credentials in plaintext within the device firmware. An attacker with physical access could exploit this b... |
2.4 | 2025-03-11 | CVE-2025-2191 | cve | A vulnerability, which was classified as problematic, has been found in Claro A7600-A1 RNR4-A72T-2x16_v2110403_CLA_32_160817. Affected by this issue is some unknown functionalit... |
4.3 | 2025-03-11 | CVE-2025-2192 | cve | A vulnerability, which was classified as problematic, was found in Stoque Zeev.it 4.24. This affects an unknown part of the file /Login?inpLostSession=1 of the component Login P... |
N/A | 2025-03-11 | CVE-2025-2193 | cve | A vulnerability has been found in MRCMS 3.1.2 and classified as critical. This vulnerability affects the function delete of the file /admin/file/delete.do of the component org.m... |
N/A | 2025-03-11 | CVE-2024-12546 | cve | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
N/A | 2025-03-11 | CVE-2024-54084 | cve | APTIOV contains a vulnerability in BIOS where an attacker may cause a Time-of-check Time-of-use (TOCTOU) Race Condition by local means. Successful exploitation of this vulnerabi... |
N/A | 2025-03-11 | CVE-2024-54085 | cve | AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerab... |
N/A | 2025-03-11 | CVE-2025-22366 | cve | The authenticated firmware update capability of the firmware for Mennekes Smart / Premium Chargingpoints can be abused for command execution because OS command are improperly ne... |
N/A | 2025-03-11 | CVE-2025-22367 | cve | The authenticated time setting capability of the firmware for Mennekes Smart / Premium Chargingpoints can be abused for command execution because OS command are improperly neutr... |
Page(s) : 1 ... 125 126 127 128 129 130 131 132 133 134 [135] 136 137 138 139 140 141 142 143 144 145 ... | Result(s) : 312940 |