Page(s) : 1 ... 567 568 569 570 571 572 573 574 575 576 [577] 578 579 580 581 582 583 584 585 586 587 ... | Result(s) : 299756 |
Alerts
DATE | NAME | CATEGORIES | DETAIL | |
---|---|---|---|---|
N/A | 2025-04-02 | CVE-2025-3073 | cve | Inappropriate implementation in Autofill in Google Chrome prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI s... |
N/A | 2025-04-02 | CVE-2025-3072 | cve | Inappropriate implementation in Custom Tabs in Google Chrome prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform U... |
N/A | 2025-04-02 | CVE-2025-3071 | cve | Inappropriate implementation in Navigations in Google Chrome prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass sa... |
N/A | 2025-04-02 | CVE-2025-3070 | cve | Insufficient validation of untrusted input in Extensions in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML pag... |
N/A | 2025-04-02 | CVE-2025-3069 | cve | Inappropriate implementation in Extensions in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium s... |
N/A | 2025-04-02 | CVE-2025-3068 | cve | Inappropriate implementation in Intents in Google Chrome on Android prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Ch... |
N/A | 2025-04-02 | CVE-2025-3067 | cve | Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 135.0.7049.52 allowed a remote attacker who convinced a user to engage in specific UI gestures t... |
N/A | 2025-04-02 | CVE-2025-3066 | cve | Use after free in Site Isolation in Google Chrome prior to 135.0.7049.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium secu... |
8.8 | 2025-04-02 | CVE-2025-3063 | cve | The Shopper Approved Reviews plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on t... |
N/A | 2025-04-02 | CVE-2025-30218 | cve | Next.js is a React framework for building full-stack web applications. To mitigate CVE-2025-29927, Next.js validated the x-middleware-subrequest-id which persisted across multip... |
N/A | 2025-04-02 | CVE-2025-30090 | cve | mime.php in SquirrelMail through 1.4.23-svn-20250401 and 1.5.x through 1.5.2-svn-20250401 allows XSS via e-mail headers, because JavaScript payloads are mishandled after $encode... |
N/A | 2025-04-02 | CVE-2025-30080 | cve | Signalling in Pexip Infinity 29 through 36.2 before 37.0 has improper input validation that allows remote attackers to trigger a temporary denial of service (software abort). |
N/A | 2025-04-02 | CVE-2025-29982 | cve | Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Insecure Inherited Permissions vulnerability. A low privileged attacker with local access could potentially ex... |
N/A | 2025-04-02 | CVE-2025-29981 | cve | Dell Wyse Management Suite, versions prior to WMS 5.1, contains an Exposure of Sensitive Information Through Data Queries vulnerability. An unauthenticated attacker with remote ... |
N/A | 2025-04-02 | CVE-2025-29719 | cve | SourceCodester (rems) Employee Management System 1.0 is vulnerable to Cross Site Scripting (XSS) in add_employee.php via the First Name and Address text fields. |
N/A | 2025-04-02 | CVE-2025-29085 | cve | SQL injection vulnerability in vipshop Saturn v.3.5.1 and before allows a remote attacker to execute arbitrary code via /console/dashboard/executorCount?zkClusterKey component. |
N/A | 2025-04-02 | CVE-2025-29063 | cve | An issue in BL-AC2100 V1.0.4 and before allows a remote attacker to execute arbitrary code via the enable parameter passed to /goform/set_hidessid_cfg is not handled properly. |
N/A | 2025-04-02 | CVE-2025-29062 | cve | An issue in BL-AC2100 |
N/A | 2025-04-02 | CVE-2025-2842 | cve | A flaw was found in the Tempo Operator. When the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Tempo Operator, the Operator creates a Cluster... |
N/A | 2025-04-02 | CVE-2025-2786 | cve | A flaw was found in Tempo Operator, where it creates a ServiceAccount, ClusterRole, and ClusterRoleBinding when a user deploys a TempoStack or TempoMonolithic instance. This fla... |
Page(s) : 1 ... 567 568 569 570 571 572 573 574 575 576 [577] 578 579 580 581 582 583 584 585 586 587 ... | Result(s) : 299756 |