Page(s) : 1 2 3 4 [5] 6 7 8 9 10 11 12 13 14 15 ... | Result(s) : 272015 |
Alerts
DATE | NAME | CATEGORIES | DETAIL | |
---|---|---|---|---|
N/A | 2024-04-23 | CVE-2024-26922 | cve | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate the parameters of bo mapping operations more clearly Verify the parameters of amdgpu_v... |
N/A | 2024-04-23 | CVE-2024-30800 | cve | PX4 Autopilot v.1.14 allows an attacker to fly the drone into no-fly zones by breaching the geofence using flaws in the function. |
6.5 | 2024-04-23 | CVE-2024-3911 | cve | An unauthenticated remote attacker can deceive users into performing unintended actions due to improper restriction of rendered UI layers or frames. |
N/A | 2024-04-23 | CVE-2024-28627 | cve | An issue in Flipsnack v.18/03/2024 allows a local attacker to obtain sensitive information via the reader.gz.js file. |
N/A | 2024-04-23 | CVE-2024-2477 | cve | The wpDiscuz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Alternative Text' field of an uploaded image in all versions up to, and includi... |
7.5 | 2024-04-23 | CVE-2024-28130 | cve | An incorrect type conversion vulnerability exists in the DVPSSoftcopyVOI_PList::createFromImage functionality of OFFIS DCMTK 3.6.8. A specially crafted malformed file can lead t... |
N/A | 2024-04-23 | CVE-2024-31804 | cve | An unquoted service path vulnerability in Terratec DMX_6Fire USB v.1.23.0.02 allows a local attacker to escalate privileges via the Program.exe component. |
N/A | 2024-04-23 | CVE-2024-32679 | cve | Missing Authorization vulnerability in Shared Files PRO Shared Files.This issue affects Shared Files: from n/a through 1.7.16. |
N/A | 2024-04-23 | CVE-2024-33211 | cve | Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vulnerability via the PPPOEPassword parameter in ip/goform/QuickIndex. |
N/A | 2024-04-23 | CVE-2024-33212 | cve | Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vulnerability via the funcpara1 parameter in ip/goform/setcfm. |
N/A | 2024-04-23 | CVE-2024-33213 | cve | Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vulnerability via the mitInterface parameter in ip/goform/RouteStatic. |
N/A | 2024-04-23 | CVE-2024-33214 | cve | Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vulnerability via the entrys parameter in ip/goform/RouteStatic. |
N/A | 2024-04-23 | CVE-2024-33215 | cve | Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vulnerability via the mitInterface parameter in ip/goform/addressNat. |
N/A | 2024-04-23 | CVE-2024-33217 | cve | Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vulnerability via the page parameter in ip/goform/addressNat. |
N/A | 2024-04-23 | CVE-2024-32258 | cve | The network server of fceux 2.7.0 has a path traversal vulnerability, allowing attackers to overwrite any files on the server without authentication by fake ROM. |
N/A | 2024-04-23 | CVE-2024-21972 | cve | An out of bounds write vulnerability in the AMD Radeon™ user mode driver for DirectX® 11 could allow an attacker with access to a malformed shader to potentially achieve arbitr... |
N/A | 2024-04-23 | CVE-2024-21979 | cve | An out of bounds write vulnerability in the AMD Radeon™ user mode driver for DirectX® 11 could allow an attacker with access to a malformed shader to potentially achieve arbitr... |
N/A | 2024-04-23 | CVE-2024-21511 | cve | Versions of the package mysql2 before 3.9.7 are vulnerable to Arbitrary Code Injection due to improper sanitization of the timezone parameter in the readCodeFor function by call... |
N/A | 2024-04-23 | CVE-2024-28890 | cve | Forminator prior to 1.29.0 contains an unrestricted upload of file with dangerous type vulnerability. If this vulnerability is exploited, a remote attacker may obtain sensitive ... |
N/A | 2024-04-23 | CVE-2024-31077 | cve | Forminator prior to 1.29.3 contains a SQL injection vulnerability. If this vulnerability is exploited, a remote authenticated attacker with an administrative privilege may obtai... |
Page(s) : 1 2 3 4 [5] 6 7 8 9 10 11 12 13 14 15 ... | Result(s) : 272015 |