Click to open the Alert Filter

 
Year Month
Severity
Categories
Search by Alert Name
Page(s) : 1 ... 28 29 30 31 32 33 34 35 36 37 [38] 39 40 41 42 43 44 45 46 47 48 ... Result(s) : 114976

Alerts Feed Alerts

DATE NAME CATEGORIES DETAIL
6.1 2025-05-28 CVE-2025-31500 cve Best Practical RT (Request Tracker) 5.0 through 5.0.7 allows XSS via JavaScript injection in an Asset name.
6.1 2025-05-28 CVE-2025-31501 cve Best Practical RT (Request Tracker) 5.0 through 5.0.7 allows XSS via JavaScript injection in an RT permalink.
4 2025-05-28 CVE-2025-32803 cve In some cases, Kea log files or lease files may be world-readable. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.
4.9 2025-05-28 CVE-2025-27702 cve CVE-2025-27702 is a vulnerability in the management console of Absolute Secure Access prior to version 13.54. Attackers with administrative access to the console and who have ...
6 2025-05-28 CVE-2025-27703 cve CVE-2025-27703 is a privilege escalation vulnerability in the management console of Absolute Secure Access prior to version 13.54. Attackers with administrative access to a sp...
6.1 2025-05-28 CVE-2025-32802 cve Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API ...
6.4 2025-05-28 CVE-2025-4963 cve The WP Extended plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.0.15 due to insufficient input san...
6.6 2025-05-28 CVE-2025-5297 cve A vulnerability, which was classified as critical, has been found in SourceCodester Computer Store System 1.0. This issue affects the function Add of the file main.c. The manipu...
4.3 2025-05-28 CVE-2024-54020 cve A missing authorization in Fortinet FortiManager versions 7.2.0 through 7.2.1, and versions 7.0.0 through 7.0.7 may allow an authenticated attacker to overwrite global threat fe...
5.3 2025-05-28 CVE-2025-47294 cve A integer overflow or wraparound in Fortinet FortiOS versions 7.2.0 through 7.2.7, versions 7.0.0 through 7.0.14 may allow a remote unauthenticated attacker to crash the csfd da...
6.1 2025-05-28 CVE-2025-5082 cve The WP Attachments plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘attachment_id’ parameter in all versions up to, and including, 5.0.12 due to ins...
5.3 2025-05-28 CVE-2025-25025 cve IBM Security Guardium 12.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information co...
4.3 2025-05-28 CVE-2025-25026 cve IBM Security Guardium 12.0 could allow an authenticated user to obtain sensitive information due to an incorrect authentication check.
6.5 2025-05-28 CVE-2025-25029 cve IBM Security Guardium 12.0 could allow a privileged user to download any file on the system due to improper escaping of input.
5.4 2025-05-27 CVE-2024-45094 cve IBM DS8900F and DS8A00 Hardware Management Console (HMC) is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript ...
5.4 2025-05-27 CVE-2025-5198 cve A flaw was found in Stackrox, where it is vulnerable to Cross-site scripting (XSS) if the script code is included in a small subset of table cells. The only known potential expl...
5.3 2025-05-27 CVE-2025-5245 cve A vulnerability classified as critical has been found in GNU Binutils up to 2.44. This affects the function debug_type_samep of the file /binutils/debug.c of the component objdu...
5.3 2025-05-27 CVE-2025-5244 cve A vulnerability was found in GNU Binutils up to 2.44. It has been rated as critical. Affected by this issue is the function elf_gc_sweep of the file bfd/elflink.c of the compone...
6.4 2025-05-27 CVE-2025-4783 cve The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the HTML attributes of the Countdown Timer Widget in all versions up to,...
6.5 2025-05-27 CVE-2025-33079 cve IBM Controller 11.0.0, 11.0.1, and 11.1.0 application could allow an authenticated user to obtain sensitive credentials that may be inadvertently included within the source code.
Page(s) : 1 ... 28 29 30 31 32 33 34 35 36 37 [38] 39 40 41 42 43 44 45 46 47 48 ... Result(s) : 114976