Click to open the Alert Filter

 
Year Month
Severity
Categories
Search by Alert Name
Page(s) : 1 ... 156 157 158 159 160 161 162 163 164 165 [166] 167 168 169 170 171 172 173 174 175 176 ... Result(s) : 324475

Alerts Feed Alerts

DATE NAME CATEGORIES DETAIL
N/A 2025-05-28 CVE-2022-26056 cve Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
N/A 2025-05-28 CVE-2022-26072 cve Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
N/A 2025-05-28 CVE-2022-26304 cve Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
N/A 2025-05-28 CVE-2022-26424 cve Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
N/A 2025-05-28 CVE-2024-47056 cve SummaryThis advisory addresses a security vulnerability in Mautic where sensitive .envĀ configuration files may be directly accessible via a web browser. This exposure could lead...
7.8 2025-05-28 CVE-2025-32801 cve Kea configuration and API directives can be used to load a malicious hook library. Many common configurations run Kea as root, leave the API entry points unsecured by default, ...
6.1 2025-05-28 CVE-2025-32802 cve Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API ...
N/A 2025-05-28 CVE-2025-36572 cve Dell PowerStore, version(s) 4.0.0.0, contain(s) an Use of Hard-coded Credentials vulnerability in the PowerStore image file. A low privileged attacker with remote access, with t...
N/A 2025-05-28 CVE-2025-48746 cve Netwrix Directory Manager (formerly Imanami GroupID) v.11.0.0.0 and before, as well as after v.11.1.25134.03 lacks Authentication for a Critical Function.
N/A 2025-05-28 CVE-2025-48925 cve The TeleMessage service through 2025-05-05 relies on the client side (e.g., the TM SGNL app) to do MD5 hashing, and then accepts the hash as the authentication credential, as ex...
N/A 2025-05-28 CVE-2025-48926 cve The admin panel in the TeleMessage service through 2025-05-05 allows attackers to discover usernames, e-mail addresses, passwords, and telephone numbers, as exploited in the wil...
N/A 2025-05-28 CVE-2025-48927 cve The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in the wild in May 2025.
N/A 2025-05-28 CVE-2025-48928 cve The TeleMessage service through 2025-05-05 is based on a JSP application in which the heap content is roughly equivalent to a "core dump" in which a password previously sent ove...
N/A 2025-05-28 CVE-2025-48929 cve The TeleMessage service through 2025-05-05 implements authentication through a long-lived credential (e.g., not a token with a short expiration time) that can be reused at a lat...
N/A 2025-05-28 CVE-2025-48930 cve The TeleMessage service through 2025-05-05 stores certain cleartext information in memory, even though memory content may be accessible to an adversary through various avenues, ...
N/A 2025-05-28 CVE-2025-48931 cve The TeleMessage service through 2025-05-05 relies on MD5 for password hashing, which opens up various attack possibilities (including rainbow tables) with low computational effort.
N/A 2025-05-28 CVE-2025-5257 cve SummaryThis advisory addresses a security vulnerability in Mautic where unpublished page previews could be accessed by unauthenticated users and potentially indexed by search en...
N/A 2025-05-28 CVE-2025-1753 cve LLama-Index CLI version v0.12.20 contains an OS command injection vulnerability. The vulnerability arises from the improper handling of the `--files` argument, which is directly...
6.4 2025-05-28 CVE-2025-4963 cve The WP Extended plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.0.15 due to insufficient input san...
N/A 2025-05-28 CVE-2025-40673 cve A Missing Authorization vulnerability has been found in DinoRANK. This vulnerability allows an attacker to access invoices of any user via accessing endpoint '/facturas/Y...
Page(s) : 1 ... 156 157 158 159 160 161 162 163 164 165 [166] 167 168 169 170 171 172 173 174 175 176 ... Result(s) : 324475