Click to open the Alert Filter

 
Year Month
Severity
Categories
Search by Alert Name
Page(s) : 1 ... 728 729 730 731 732 733 734 735 736 737 [738] 739 740 741 742 743 744 745 746 747 748 ... Result(s) : 299995

Alerts Feed Alerts

DATE NAME CATEGORIES DETAIL
N/A 2025-03-14 CVE-2024-54445 cve Login functionality contains a blind SQL injection that can be exploited by unauthenticated attackers. Using a time-based blind SQLi technique the attacker can disclose all data...
N/A 2025-03-14 CVE-2024-54446 cve Document history functionality contains a blind SQL injection that can be exploited by authenticated attackers. Using a time-based blind SQLi technique the attacker can disclose...
N/A 2025-03-14 CVE-2024-54447 cve Saved search functionality contains a blind SQL injection that can be exploited by authenticated attackers. Using a time-based blind SQLi technique the attacker can disclose all...
N/A 2025-03-14 CVE-2024-54448 cve The Automation Scripting functionality can be exploited by attackers to run arbitrary system commands on the underlying operating system. An account with administrator privilege...
N/A 2025-03-14 CVE-2024-54449 cve The API used to interact with documents in the application contains two endpoints with a flaw that allows an authenticated attacker to write a file with controlled contents to a...
N/A 2025-03-14 CVE-2025-26312 cve SendQuick Entera devices before 11HF5 are vulnerable to CAPTCHA bypass by removing the Captcha parameter.
N/A 2025-03-14 CVE-2025-29775 cve xml-crypto is an XML digital signature and encryption library for Node.js. An attacker may be able to exploit a vulnerability in versions prior to 6.0.1, 3.2.1, and 2.1.6 to byp...
N/A 2025-03-14 CVE-2025-29779 cve Post-Quantum Secure Feldman's Verifiable Secret Sharing provides a Python implementation of Feldman's Verifiable Secret Sharing (VSS) scheme. In versions 0.8.0b2 and p...
N/A 2025-03-14 CVE-2025-29780 cve Post-Quantum Secure Feldman's Verifiable Secret Sharing provides a Python implementation of Feldman's Verifiable Secret Sharing (VSS) scheme. In versions 0.8.0b2 and p...
N/A 2025-03-14 CVE-2025-29771 cve HtmlSanitizer is a client-side HTML Sanitizer. Versions prior to 2.0.3 have a cross-site scripting vulnerability when the sanitizer is used with a `contentEditable` element to s...
5.4 2025-03-14 CVE-2025-29782 cve WeGIA is Web manager for charitable institutions A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `adicionar_tipo_docs_atendido.php` endpoint in versions ...
8.1 2025-03-14 CVE-2024-12810 cve The JobCareer | Job Board Responsive WordPress Theme theme for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability checks ...
5.9 2025-03-14 CVE-2024-13771 cve The Civi - Job Board & Freelance Marketplace WordPress Theme plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.1.4. This is due...
5.9 2025-03-14 CVE-2024-13772 cve The Civi - Job Board & Freelance Marketplace WordPress Theme plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.1.6.1. This is d...
7.5 2025-03-14 CVE-2024-13773 cve The Civi - Job Board & Freelance Marketplace WordPress Theme plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.1.4 via...
9.8 2025-03-14 CVE-2025-2232 cve The Realteo - Real Estate Plugin by Purethemes plugin for WordPress, used by the Findeo Theme, is vulnerable to authentication bypass in all versions up to, and including, 1.2.8...
N/A 2025-03-14 CVE-2025-26626 cve The GLPI Inventory Plugin handles various types of tasks for GLPI agents for the GLPI asset and IT management software package. Versions prior to 1.5.0 are vulnerable to reflect...
N/A 2025-03-14 CVE-2025-27593 cve The product can be used to distribute malicious code using SDD Device Drivers due to missing download verification checks, leading to code execution on target systems.
N/A 2025-03-14 CVE-2025-27594 cve The device uses an unencrypted, proprietary protocol for communication. Through this protocol, configuration data is transmitted and device authentication is performed. An attac...
N/A 2025-03-14 CVE-2025-27595 cve The device uses a weak hashing alghorithm to create the password hash. Hence, a matching password can be easily calculated by an attacker. This impacts the security and the inte...
Page(s) : 1 ... 728 729 730 731 732 733 734 735 736 737 [738] 739 740 741 742 743 744 745 746 747 748 ... Result(s) : 299995