Click to open the Alert Filter

 
Year Month
Severity
Categories
Search by Alert Name
Page(s) : 1 ... 922 923 924 925 926 927 928 929 930 931 [932] 933 934 935 936 937 938 939 940 941 942 ... Result(s) : 326353

Alerts Feed Alerts

DATE NAME CATEGORIES DETAIL
7.8 2025-02-25 CVE-2025-26594 cve A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal refere...
7.8 2025-02-25 CVE-2025-26595 cve A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers t...
7.8 2025-02-25 CVE-2025-26596 cve A heap overflow flaw was found in X.Org and Xwayland. The computation of the length in XkbSizeKeySyms() differs from what is written in XkbWriteKeySyms(), which may lead to a he...
7.8 2025-02-25 CVE-2025-26597 cve A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions un...
7.8 2025-02-25 CVE-2025-26598 cve An out-of-bounds write flaw was found in X.Org and Xwayland. The function GetBarrierDevice() searches for the pointer device based on its device ID and returns the matching valu...
7.8 2025-02-25 CVE-2025-26599 cve An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, com...
7.8 2025-02-25 CVE-2025-26600 cve A use-after-free flaw was found in X.Org and Xwayland. When a device is removed while still frozen, the events queued for that device remain while the device is freed. Replaying...
7.8 2025-02-25 CVE-2025-26601 cve A use-after-free flaw was found in X.Org and Xwayland. When changing an alarm, the values of the change mask are evaluated one after the other, changing the trigger values as re...
7.3 2025-02-25 CVE-2025-1067 cve There is an untrusted search path vulnerability in Esri ArcGIS Pro 3.3 and 3.4 that may allow a low privileged attacker with write privileges to the local file system to introdu...
7.3 2025-02-25 CVE-2025-1068 cve There is an untrusted search path vulnerability in Esri ArcGIS AllSource 1.2 and 1.3 that may allow a low privileged attacker with write privileges to the local file system to i...
N/A 2025-02-25 CVE-2025-1204 cve The "update" binary in the firmware of the affected product sends attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. Th...
8.8 2025-02-25 CVE-2024-12368 cve Improper access control in the auth_oauth module of Odoo Community 15.0 and Odoo Enterprise 15.0 allows an internal user to export the OAuth tokens of other users.
7.5 2025-02-25 CVE-2025-23046 cve GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.18, if a "Mail servers" authentication provider is configured to use...
6.5 2025-02-25 CVE-2025-25192 cve GLPI is a free asset and IT management software package. Prior to version 10.0.18, a low privileged user can enable debug mode and access sensitive information. Version 10.0.18 ...
N/A 2025-02-25 CVE-2025-1676 cve A vulnerability classified as critical was found in hzmanyun Education and Training System 3.1.1. Affected by this vulnerability is the function pdf2swf of the file /pdf2swf. Th...
5.3 2025-02-25 CVE-2025-1262 cve The Advanced Google reCaptcha plugin for WordPress is vulnerable to CAPTCHA Bypass in versions up to, and including, 1.27 . This makes it possible for unauthenticated attackers ...
N/A 2025-02-25 CVE-2024-51539 cve The Dell Secure Connect Gateway (SCG) Application and Appliance, versions prior to 5.28, contains a SQL injection vulnerability due to improper neutralization of special element...
N/A 2025-02-25 CVE-2024-10545 cve The Photo Gallery, Sliders, Proofing and WordPress plugin before 3.59.9 does not sanitise and escape some of its Image settings, which could allow high privilege users such as...
N/A 2025-02-25 CVE-2025-22210 cve A SQL injection vulnerability in the Hikashop component versions 3.3.0-5.1.4 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands in the c...
5.3 2025-02-25 CVE-2025-1063 cve The Classified Listing – Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4....
Page(s) : 1 ... 922 923 924 925 926 927 928 929 930 931 [932] 933 934 935 936 937 938 939 940 941 942 ... Result(s) : 326353