Page(s) : 1 ... 896 897 898 899 900 901 902 903 904 905 [906] 907 908 909 910 911 912 913 914 915 916 ... | Result(s) : 43549 |
Alerts
DATE | NAME | CATEGORIES | DETAIL | |
---|---|---|---|---|
9.8 | 2020-04-15 | CVE-2020-6996 | cve | Triangle MicroWorks DNP3 Outstation LibrariesDNP3 Outstation .NET Protocol components and DNP3 Outstation ANSI C source code libraries are affected:3.16.00 through 3.25.01. A sp... |
9.8 | 2020-04-14 | CVE-2019-10939 | cve | A vulnerability has been identified in TIM 3V-IE (incl. SIPLUS NET variants) (All versions < V2.8), TIM 3V-IE Advanced (incl. SIPLUS NET variants) (All versions < V2.8), TIM 3V-... |
9.8 | 2020-04-14 | CVE-2020-6195 | cve | SAP Business Objects Business Intelligence Platform (CMC), version 4.1, 4.2, shows cleartext password in the response, leading to Information Disclosure. It involves social engi... |
9.3 | 2020-04-14 | CVE-2020-6238 | cve | SAP Commerce, versions - 6.6, 6.7, 1808, 1811, 1905, does not process XML input securely in the Rest API from Servlet xyformsweb, leading to Missing XML Validation. This affects... |
9.8 | 2020-04-14 | CVE-2019-16879 | cve | The Synergy Systems & Solutions (SSS) HUSKY RTU 6049-E70, with firmware Versions 5.0 and prior, has a Missing Authentication for Critical Function (CWE-306) vulnerability. The a... |
9.8 | 2020-04-14 | CVE-2020-10383 | cve | An issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is an unauthenticated remote code execution in the com... |
9.8 | 2020-04-13 | CVE-2020-11673 | cve | An issue was discovered in the Responsive Poll through 1.3.4 for Wordpress. It allows an unauthenticated user to manipulate polls, e.g., delete, clone, or view a hidden poll. Th... |
9.8 | 2020-04-13 | USN-4328-1 | Ubuntu | Thunderbird vulnerabilities |
9.8 | 2020-04-12 | CVE-2020-11722 | cve | Dungeon Crawl Stone Soup (aka DCSS or crawl) before 0.25 allows remote attackers to execute arbitrary code via Lua bytecode embedded in an uploaded .crawlrc file. |
9.8 | 2020-04-12 | CVE-2020-11710 | cve | An issue was discovered in docker-kong (for Kong) through 2.0.3. The admin API port may be accessible on interfaces other than 127.0.0.1. NOTE: The vendor argue that this CVE is... |
9.8 | 2020-04-12 | CVE-2020-11708 | cve | An issue was discovered in ProVide (formerly zFTPServer) through 13.1. Privilege escalation can occur via the /ajax/SetUserInfo messages parameter because of the EXECUTE() featu... |
9.8 | 2020-04-12 | CVE-2020-11705 | cve | An issue was discovered in ProVide (formerly zFTPServer) through 13.1. /ajax/ImportCertificate allows an attacker to load an arbitrary certificate in .pfx format or overwrite ar... |
9.8 | 2020-04-10 | CVE-2015-8546 | cve | An issue was discovered on Samsung mobile devices with software through 2015-11-12, affecting the Galaxy S6/S6 Edge, Galaxy S6 Edge+, and Galaxy Note5 with the Shannon333 chipse... |
9.8 | 2020-04-10 | CVE-2020-3952 | cve | Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access... |
9.8 | 2020-04-10 | CVE-2015-5524 | cve | An issue was discovered on Samsung mobile devices with KK(4.4) and later software through 2015-05-13. There is a buffer overflow in datablock_write because the amount of receive... |
9.8 | 2020-04-10 | CVE-2019-7305 | cve | Information Exposure vulnerability in eXtplorer makes the /usr/ and /etc/extplorer/ system directories world-accessible over HTTP. Introduced in the Makefile patch file debian/p... |
9.8 | 2020-04-09 | CVE-2020-8961 | cve | An issue was discovered in Avira Free-Antivirus before 15.0.2004.1825. The Self-Protection feature does not prohibit a write operation from an external process. Thus, code injec... |
9.8 | 2020-04-09 | CVE-2020-10631 | cve | An attacker could use a specially crafted URL to delete or read files outside the WebAccess/NMS's (versions prior to 3.0.2) control. |
9.8 | 2020-04-09 | CVE-2020-11656 | cve | In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement. |
9.1 | 2020-04-09 | CVE-2020-10619 | cve | An attacker could use a specially crafted URL to delete files outside the WebAccess/NMS's (versions prior to 3.0.2) control. |
Page(s) : 1 ... 896 897 898 899 900 901 902 903 904 905 [906] 907 908 909 910 911 912 913 914 915 916 ... | Result(s) : 43549 |