Page(s) : 1 ... 19 20 21 22 23 24 25 26 27 28 [29] 30 31 32 33 34 35 36 37 38 39 ... | Result(s) : 8031 |
Alerts
DATE | NAME | CATEGORIES | DETAIL | |
---|---|---|---|---|
2.7 | 2022-12-01 | CVE-2022-41969 | cve | Nextcloud Server is an open source personal cloud server. Prior to versions 23.0.11, 24.0.7, and 25.0.0, there is no password length limit when creating a user as an administrat... |
2.7 | 2022-12-01 | CVE-2022-3710 | cve | A post-auth read-only SQL injection vulnerability allows API clients to read non-sensitive configuration database contents in the API controller of Sophos Firewall releases olde... |
3.3 | 2022-11-30 | CVE-2022-46156 | cve | The Synthetic Monitoring Agent for Grafana's Synthetic Monitoring application provides probe functionality and executes network checks for monitoring remote targets. Users ... |
3.7 | 2022-11-30 | CVE-2022-45842 | cve | Unauth. Race Condition vulnerability in WP ULike Plugin |
2.1 | 2022-11-29 | CVE-2022-32967 | cve | RTL8111EP-CG/RTL8111FP-CG DASH function has hard-coded password. An unauthenticated physical attacker can use the hard-coded default password during system reboot triggered by o... |
3.3 | 2022-11-25 | CVE-2022-41954 | cve | MPXJ is an open source library to read and write project plans from a variety of file formats and databases. On Unix-like operating systems (not Windows or macos), MPXJ's u... |
2.7 | 2022-11-25 | CVE-2022-38377 | cve | An improper access control vulnerability [CWE-284] in FortiManager 7.2.0, 7.0.0 through 7.0.3, 6.4.0 through 6.4.7, 6.2.0 through 6.2.9, 6.0.0 through 6.0.11 and FortiAnalyzer 7... |
3.1 | 2022-11-23 | CVE-2020-23587 | cve | A vulnerability found in the OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross-site ... |
3.7 | 2022-11-19 | CVE-2022-4064 | cve | A vulnerability was found in Dalli. It has been classified as problematic. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the... |
3.1 | 2022-11-18 | CVE-2022-40130 | cve | Auth. (subscriber+) Race Condition vulnerability in WP-Polls plugin |
3.3 | 2022-11-17 | CVE-2022-42903 | cve | Zoho ManageEngine SupportCenter Plus through 11024 allows low-privileged users to view the organization users list. |
3.7 | 2022-11-16 | CVE-2022-41914 | cve | Zulip is an open-source team collaboration tool. For organizations with System for Cross-domain Identity Management(SCIM) account management enabled, Zulip Server 5.0 through 5.... |
3.3 | 2022-11-16 | CVE-2022-34354 | cve | IBM Sterling Partner Engagement Manager 2.0 allows encrypted storage of client data to be stored locally which can be read by another user on the system. IBM X-Force ID: 230424. |
3.5 | 2022-11-15 | CVE-2022-45393 | cve | A cross-site request forgery (CSRF) vulnerability in Jenkins Delete log Plugin 1.0 and earlier allows attackers to delete build logs. |
3.3 | 2022-11-14 | CVE-2022-34314 | cve | IBM CICS TX 11.1 could disclose sensitive information to a local user due to insecure permission settings. IBM X-Force ID: 229450. |
3.3 | 2022-11-14 | CVE-2022-28764 | cve | The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.6 is susceptible to a local information exposure vulnerability. A failure to clear... |
3.3 | 2022-11-14 | CVE-2022-34312 | cve | IBM CICS TX 11.1 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 229447. |
3.1 | 2022-11-14 | CVE-2022-34313 | cve | IBM CICS TX 11.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a use... |
3.3 | 2022-11-11 | CVE-2022-33973 | cve | Improper access control in the Intel(R) WAPI Security software for Windows 10/11 before version 22.2150.0.1 may allow an authenticated user to potentially enable information dis... |
3.5 | 2022-11-10 | CVE-2022-39388 | cve | Istio is an open platform to connect, manage, and secure microservices. In versions on the 1.15.x branch prior to 1.15.3, a user can impersonate any workload identity within the... |
Page(s) : 1 ... 19 20 21 22 23 24 25 26 27 28 [29] 30 31 32 33 34 35 36 37 38 39 ... | Result(s) : 8031 |