Page(s) : 1 ... 922 923 924 925 926 927 928 929 930 931 [932] 933 934 935 936 937 938 939 940 941 942 ... | Result(s) : 326353 |
Alerts
DATE | NAME | CATEGORIES | DETAIL | |
---|---|---|---|---|
7.8 | 2025-02-25 | CVE-2025-26594 | cve | A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal refere... |
7.8 | 2025-02-25 | CVE-2025-26595 | cve | A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers t... |
7.8 | 2025-02-25 | CVE-2025-26596 | cve | A heap overflow flaw was found in X.Org and Xwayland. The computation of the length in XkbSizeKeySyms() differs from what is written in XkbWriteKeySyms(), which may lead to a he... |
7.8 | 2025-02-25 | CVE-2025-26597 | cve | A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions un... |
7.8 | 2025-02-25 | CVE-2025-26598 | cve | An out-of-bounds write flaw was found in X.Org and Xwayland. The function GetBarrierDevice() searches for the pointer device based on its device ID and returns the matching valu... |
7.8 | 2025-02-25 | CVE-2025-26599 | cve | An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, com... |
7.8 | 2025-02-25 | CVE-2025-26600 | cve | A use-after-free flaw was found in X.Org and Xwayland. When a device is removed while still frozen, the events queued for that device remain while the device is freed. Replaying... |
7.8 | 2025-02-25 | CVE-2025-26601 | cve | A use-after-free flaw was found in X.Org and Xwayland. When changing an alarm, the values of the change mask are evaluated one after the other, changing the trigger values as re... |
7.3 | 2025-02-25 | CVE-2025-1067 | cve | There is an untrusted search path vulnerability in Esri ArcGIS Pro 3.3 and 3.4 that may allow a low privileged attacker with write privileges to the local file system to introdu... |
7.3 | 2025-02-25 | CVE-2025-1068 | cve | There is an untrusted search path vulnerability in Esri ArcGIS AllSource 1.2 and 1.3 that may allow a low privileged attacker with write privileges to the local file system to i... |
N/A | 2025-02-25 | CVE-2025-1204 | cve | The "update" binary in the firmware of the affected product sends attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. Th... |
8.8 | 2025-02-25 | CVE-2024-12368 | cve | Improper access control in the auth_oauth module of Odoo Community 15.0 and Odoo Enterprise 15.0 allows an internal user to export the OAuth tokens of other users. |
7.5 | 2025-02-25 | CVE-2025-23046 | cve | GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.18, if a "Mail servers" authentication provider is configured to use... |
6.5 | 2025-02-25 | CVE-2025-25192 | cve | GLPI is a free asset and IT management software package. Prior to version 10.0.18, a low privileged user can enable debug mode and access sensitive information. Version 10.0.18 ... |
N/A | 2025-02-25 | CVE-2025-1676 | cve | A vulnerability classified as critical was found in hzmanyun Education and Training System 3.1.1. Affected by this vulnerability is the function pdf2swf of the file /pdf2swf. Th... |
5.3 | 2025-02-25 | CVE-2025-1262 | cve | The Advanced Google reCaptcha plugin for WordPress is vulnerable to CAPTCHA Bypass in versions up to, and including, 1.27 . This makes it possible for unauthenticated attackers ... |
N/A | 2025-02-25 | CVE-2024-51539 | cve | The Dell Secure Connect Gateway (SCG) Application and Appliance, versions prior to 5.28, contains a SQL injection vulnerability due to improper neutralization of special element... |
N/A | 2025-02-25 | CVE-2024-10545 | cve | The Photo Gallery, Sliders, Proofing and WordPress plugin before 3.59.9 does not sanitise and escape some of its Image settings, which could allow high privilege users such as... |
N/A | 2025-02-25 | CVE-2025-22210 | cve | A SQL injection vulnerability in the Hikashop component versions 3.3.0-5.1.4 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands in the c... |
5.3 | 2025-02-25 | CVE-2025-1063 | cve | The Classified Listing – Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.... |
Page(s) : 1 ... 922 923 924 925 926 927 928 929 930 931 [932] 933 934 935 936 937 938 939 940 941 942 ... | Result(s) : 326353 |