Page(s) : 1 ... 19 20 21 22 23 24 25 26 27 28 [29] 30 31 32 33 34 35 36 37 38 39 ... | Result(s) : 97065 |
Alerts
DATE | NAME | CATEGORIES | DETAIL | |
---|---|---|---|---|
7.8 | 2025-05-15 | CVE-2025-30417 | cve | There is a memory corruption vulnerability due to an out of bounds write in Library!DecodeBase64() when using the SymbolEditor in NI Circuit Design Suite. This vulnerability ma... |
7.8 | 2025-05-15 | CVE-2025-30418 | cve | There is a memory corruption vulnerability due to an out of bounds write in CheckPins() when using the SymbolEditor in NI Circuit Design Suite. This vulnerability may result in... |
7.8 | 2025-05-15 | CVE-2025-30419 | cve | There is a memory corruption vulnerability due to an out of bounds read in GetSymbolBorderRectSize() when using the SymbolEditor in NI Circuit Design Suite. This vulnerability ... |
7.8 | 2025-05-15 | CVE-2025-30420 | cve | There is a memory corruption vulnerability due to an out of bounds read in Bitmap::InternalDraw() when using the SymbolEditor in NI Circuit Design Suite. This vulnerability may... |
7.8 | 2025-05-15 | CVE-2025-30421 | cve | There is a memory corruption vulnerability due to a stack-based buffer overflow in DrObjectStorage::XML_Serialize() when using the SymbolEditor in NI Circuit Design Suite. This... |
8.8 | 2025-05-15 | CVE-2025-47785 | cve | Emlog is an open source website building system. In versions up to and including 2.5.9, SQL injection occurs because the $origContent parameter in admin/article_save.php is not ... |
7.5 | 2025-05-14 | CVE-2025-2900 | cve | IBM Semeru Runtime 8.0.302.0 through 8.0.442.0, 11.0.12.0 through 11.0.26.0, 17.0.0.0 through 17.0.14.0, and 21.0.0.0 through 12.0.6.0 is vulnerable to a denial of service cause... |
8.8 | 2025-05-13 | CVE-2025-4474 | cve | The Frontend Dashboard plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the fed_admin_setting_form_function() function in versions... |
8.8 | 2025-05-13 | CVE-2025-4473 | cve | The Frontend Dashboard plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the ajax_request() function in versions 1.0 to 2.2.7. This... |
7.5 | 2025-05-13 | CVE-2025-4396 | cve | The Relevanssi – A Better Search plugin for WordPress is vulnerable to time-based SQL Injection via the cats and tags query parameters in all versions up to, and including, 4.24... |
7.8 | 2025-05-13 | CVE-2025-43557 | cve | Animate versions 24.0.8, 23.0.11 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the... |
7.8 | 2025-05-13 | CVE-2025-43556 | cve | Animate versions 24.0.8, 23.0.11 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the ... |
7.8 | 2025-05-13 | CVE-2025-43555 | cve | Animate versions 24.0.8, 23.0.11 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context... |
7.8 | 2025-05-13 | CVE-2025-43547 | cve | Bridge versions 15.0.3, 14.1.6 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the cu... |
7.8 | 2025-05-13 | CVE-2025-43546 | cve | Bridge versions 15.0.3, 14.1.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context o... |
7.8 | 2025-05-13 | CVE-2025-43545 | cve | Bridge versions 15.0.3, 14.1.6 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the c... |
8.8 | 2025-05-13 | CVE-2025-4317 | cve | The TheGem theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the thegem_get_logo_url() function in all versions up to, and inclu... |
7.7 | 2025-05-13 | CVE-2025-43011 | cve | Under certain conditions, SAP Landscape Transformation's PCL Basis module does not perform the necessary authorization checks, allowing authenticated users to access restri... |
8.3 | 2025-05-13 | CVE-2025-43010 | cve | SAP S/4HANA Cloud Private Edition or on Premise (SCM Master Data Layer (MDL)) allows an authenticated attacker with SAP standard authorization to execute a certain function modu... |
7.9 | 2025-05-13 | CVE-2025-43000 | cve | Under certain conditions Promotion Management Wizard (PMW) allows an attacker to access information which would otherwise be restricted.This has High impact on Confidentiality w... |
Page(s) : 1 ... 19 20 21 22 23 24 25 26 27 28 [29] 30 31 32 33 34 35 36 37 38 39 ... | Result(s) : 97065 |