Page(s) : 1 ... 49 50 51 52 53 54 55 56 57 58 [59] 60 61 62 63 64 65 66 67 68 69 ... | Result(s) : 97082 |
Alerts
DATE | NAME | CATEGORIES | DETAIL | |
---|---|---|---|---|
7.3 | 2025-04-08 | CVE-2025-29792 | cve | Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally. |
8.8 | 2025-04-08 | CVE-2025-2807 | cve | The Motors – Car Dealership & Classified Listings Plugin plugin for WordPress is vulnerable to arbitrary plugin installations due to a missing capability check in the mvl_setup_... |
7.8 | 2025-04-08 | CVE-2025-27744 | cve | Improper access control in Microsoft Office allows an authorized attacker to elevate privileges locally. |
7.8 | 2025-04-08 | CVE-2025-27743 | cve | Untrusted search path in System Center allows an authorized attacker to elevate privileges locally. |
7.8 | 2025-04-08 | CVE-2025-27728 | cve | Out-of-bounds read in Windows Kernel-Mode Drivers allows an authorized attacker to elevate privileges locally. |
7.8 | 2025-04-08 | CVE-2025-27489 | cve | Improper input validation in Azure Local allows an authorized attacker to elevate privileges locally. |
7.7 | 2025-04-08 | CVE-2025-27428 | cve | Due to directory traversal vulnerability, an authorized attacker could gain access to some critical information by using RFC enabled function module. Upon successful exploitatio... |
7.8 | 2025-04-08 | CVE-2025-27200 | cve | Animate versions 24.0.7, 23.0.10 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exp... |
7.8 | 2025-04-08 | CVE-2025-27199 | cve | Animate versions 24.0.7, 23.0.10 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the curre... |
7.8 | 2025-04-08 | CVE-2025-27198 | cve | Photoshop Desktop versions 25.12.1, 26.4.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of... |
7.8 | 2025-04-08 | CVE-2025-27196 | cve | Premiere Pro versions 25.1, 24.6.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the cur... |
7.8 | 2025-04-08 | CVE-2025-27195 | cve | Media Encoder versions 25.1, 24.6.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the cu... |
7.8 | 2025-04-08 | CVE-2025-27194 | cve | Media Encoder versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current ... |
7.8 | 2025-04-08 | CVE-2025-27193 | cve | Bridge versions 14.1.5, 15.0.2 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current... |
7.8 | 2025-04-08 | CVE-2025-27183 | cve | After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current ... |
7.8 | 2025-04-08 | CVE-2025-27182 | cve | After Effects versions 25.1, 24.6.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current ... |
7.3 | 2025-04-08 | CVE-2025-26628 | cve | Insufficiently protected credentials in Azure Local Cluster allows an authorized attacker to disclose information locally. |
8.8 | 2025-04-08 | CVE-2025-2526 | cve | The Streamit theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.0.2. This is due to the plugin not properly v... |
8.8 | 2025-04-08 | CVE-2025-2525 | cve | The Streamit theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'st_Authentication_Controller::edit_profile' functi... |
8.5 | 2025-04-08 | CVE-2025-23186 | cve | In certain conditions, SAP NetWeaver Application Server ABAP allows an authenticated attacker to craft a Remote Function Call (RFC) request to restricted destinations, which can... |
Page(s) : 1 ... 49 50 51 52 53 54 55 56 57 58 [59] 60 61 62 63 64 65 66 67 68 69 ... | Result(s) : 97082 |