Page(s) : 1 ... 501 502 503 504 505 506 507 508 509 510 [511] 512 513 514 515 516 517 518 519 520 521 ... | Result(s) : 43379 |
Alerts
DATE | NAME | CATEGORIES | DETAIL | |
---|---|---|---|---|
9.8 | 2022-09-19 | CVE-2022-40810 | cve | The d8s-ip-addresses for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis packag... |
9.8 | 2022-09-18 | CVE-2022-40766 | cve | Modern Campus Omni CMS (formerly OU Campus) 10.2.4 allows login-page SQL injection via a '" OR 1 = 1 -- - , |
9.8 | 2022-09-17 | CVE-2022-39217 | cve | some-natalie/ghas-to-csv (GitHub Advanced Security to CSV) is a GitHub action which scrapes the GitHub Advanced Security API and shoves it into a CSV. In affected versions this ... |
9.1 | 2022-09-16 | CVE-2022-39003 | cve | Buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability will affect the confidentiality and integrity of trusted components. |
9.8 | 2022-09-16 | CVE-2022-38621 | cve | Doufox v0.0.4 was discovered to contain a remote code execution (RCE) vulnerability via the edit file page. This vulnerability allows attackers to execute arbitrary code via a c... |
9.1 | 2022-09-16 | CVE-2021-40019 | cve | Out-of-bounds heap read vulnerability in the HW_KEYMASTER module. Successful exploitation of this vulnerability may cause out-of-bounds access. |
9.8 | 2022-09-16 | CVE-2022-3214 | cve | Delta Industrial Automation's DIAEnergy, an industrial energy management system, is vulnerable to CWE-798, Use of Hard-coded Credentials. Versions prior to 1.9.03.009 h... |
9.8 | 2022-09-16 | CVE-2022-39000 | cve | The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup. |
9.8 | 2022-09-16 | CVE-2021-42949 | cve | The component controlla_login function in HotelDruid Hotel Management Software v3.0.3 generates a predictable session token, allowing attackers to bypass authentication via brut... |
9.1 | 2022-09-16 | CVE-2022-35937 | cve | TensorFlow is an open source platform for machine learning. The `GatherNd` function takes arguments that determine the sizes of inputs and outputs. If the inputs given are great... |
9.8 | 2022-09-16 | CVE-2021-40017 | cve | The HW_KEYMASTER module lacks the validity check of the key format. Successful exploitation of this vulnerability may result in out-of-bounds memory access. |
9.1 | 2022-09-16 | CVE-2022-39008 | cve | The NFC module has bundle serialization/deserialization vulnerabilities. Successful exploitation of this vulnerability may cause third-party apps to read and write files that ar... |
9.8 | 2022-09-16 | CVE-2022-35939 | cve | TensorFlow is an open source platform for machine learning. The `ScatterNd` function takes an input argument that determines the indices of of the output tensor. An input index ... |
9.8 | 2022-09-16 | CVE-2022-39002 | cve | Double free vulnerability in the storage module. Successful exploitation of this vulnerability will cause the memory to be freed twice. |
9.8 | 2022-09-16 | CVE-2022-39009 | cve | The WLAN module has a vulnerability in permission verification. Successful exploitation of this vulnerability may cause third-party apps to affect WLAN functions. |
9.8 | 2022-09-16 | CVE-2022-40300 | cve | Zoho ManageEngine Password Manager Pro through 12120 before 12121, PAM360 through 5550 before 5600, and Access Manager Plus through 4304 before 4305 have multiple SQL injection ... |
9.8 | 2022-09-16 | CVE-2022-37258 | cve | Prototype pollution vulnerability in function convertLater in npm-convert.js in stealjs steal 2.2.4 via the packageName variable in npm-convert.js. |
9.8 | 2022-09-16 | CVE-2022-39007 | cve | The location module has a vulnerability of bypassing permission verification.Successful exploitation of this vulnerability may cause privilege escalation. |
9.1 | 2022-09-16 | CVE-2022-35938 | cve | TensorFlow is an open source platform for machine learning. The `GatherNd` function takes arguments that determine the sizes of inputs and outputs. If the inputs given are great... |
9.8 | 2022-09-16 | CVE-2022-38999 | cve | The AOD module has the improper update of reference count vulnerability. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability. |
Page(s) : 1 ... 501 502 503 504 505 506 507 508 509 510 [511] 512 513 514 515 516 517 518 519 520 521 ... | Result(s) : 43379 |