Page(s) : 1 ... 475 476 477 478 479 480 481 482 483 484 [485] 486 487 488 489 490 491 492 493 494 495 ... | Result(s) : 325248 |
Alerts
DATE | NAME | CATEGORIES | DETAIL | |
---|---|---|---|---|
N/A | 2025-04-16 | CVE-2024-40071 | cve | Sourcecodester Online ID Generator System 1.0 was discovered to contain an arbitrary file upload vulnerability via id_generator/classes/SystemSettings.php?f=update_settings. Thi... |
N/A | 2025-04-16 | CVE-2024-40070 | cve | Sourcecodester Online ID Generator System 1.0 was discovered to contain an arbitrary file upload vulnerability via id_generator/classes/Users.php?f=save. This vulnerability allo... |
N/A | 2025-04-16 | CVE-2024-40069 | cve | Sourcecodester Online ID Generator System 1.0 was discovered to contain Stored Cross Site Scripting (XSS) via id_generator/classes/Users.php?f=save, and the point of vulnerabili... |
N/A | 2025-04-16 | CVE-2024-40068 | cve | Sourcecodester Online ID Generator System 1.0 was discovered to contain a SQL injection vulnerability via the id parameter at id_generator/admin/?page=templates/manage_template&... |
5.9 | 2025-04-16 | CVE-2024-22314 | cve | IBM Storage Defender - Resiliency Service 2.0.0 through 2.0.12 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive inform... |
N/A | 2025-04-16 | CVE-2024-22036 | cve | A vulnerability has been identified within Rancher where a cluster or node driver can be used to escape the chroot jail and gain root access to the Rancher container itself. In... |
6.1 | 2025-04-16 | CVE-2024-13452 | cve | The Contact Form by Supsystic plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7.29. This is due to missing or incorrect ... |
N/A | 2025-04-16 | CVE-2024-10680 | cve | The Form Maker by 10Web WordPress plugin before 1.15.32 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Store... |
N/A | 2025-04-16 | CVE-2023-53034 | cve | In the Linux kernel, the following vulnerability has been resolved: ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans There is a kernel API ntb_mw_clear_... |
N/A | 2025-04-16 | CVE-2023-32197 | cve | A Improper Privilege Management vulnerability in SUSE rancher in RoleTemplateobjects when external=true is set can lead to privilege escalation in specific scenarios.This issue ... |
5.5 | 2025-04-16 | CVE-2025-22062 | cve | In the Linux kernel, the following vulnerability has been resolved: sctp: add mutual exclusion in proc_sctp_do_udp_port() We must serialize calls to sctp_udp_sock_stop() and s... |
N/A | 2025-04-16 | CVE-2025-22102 | cve | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btnxpuart: Fix kernel panic during FW release This fixes a kernel panic seen during release FW i... |
5.5 | 2025-04-16 | CVE-2025-3730 | cve | A vulnerability, which was classified as problematic, was found in PyTorch 2.6.0. Affected is the function torch.nn.functional.ctc_loss of the file aten/src/ATen/native/LossCTC.... |
N/A | 2025-04-15 | CVE-2025-3622 | cve | A vulnerability, which was classified as critical, has been found in Xorbits Inference up to 1.4.1. This issue affects the function load of the file xinference/thirdparty/cosyvo... |
N/A | 2025-04-15 | CVE-2025-3618 | cve | A denial-of-service vulnerability exists in the Rockwell Automation ThinManager. The software fails to adequately verify the outcome of memory allocation while processing Type 1... |
N/A | 2025-04-15 | CVE-2025-3617 | cve | A privilege escalation vulnerability exists in the Rockwell Automation ThinManager. When the software starts up, files are deleted in the temporary folder causing the Access Con... |
3.5 | 2025-04-15 | CVE-2025-3613 | cve | A vulnerability has been found in Demtec Graphytics 5.0.7 and classified as problematic. This vulnerability affects unknown code of the file /visualization. The manipulation of ... |
4.3 | 2025-04-15 | CVE-2025-3612 | cve | A vulnerability, which was classified as problematic, was found in Demtec Graphytics 5.0.7. This affects an unknown part of the file /visualization of the component HTTP GET Par... |
N/A | 2025-04-15 | CVE-2025-3579 | cve | In versions prior to Aidex 1.7, an authenticated malicious user, taking advantage of an open registry, could execute unauthorised commands within the system. This includes execu... |
N/A | 2025-04-15 | CVE-2025-3578 | cve | A malicious, authenticated user in Aidex, versions prior to 1.7, could list credentials of other users, create or modify existing users in the application, list credentials of u... |
Page(s) : 1 ... 475 476 477 478 479 480 481 482 483 484 [485] 486 487 488 489 490 491 492 493 494 495 ... | Result(s) : 325248 |