Click to open the Alert Filter

 
Year Month
Severity
Categories
Search by Alert Name
Page(s) : 1 ... 956 957 958 959 960 961 962 963 964 965 [966] 967 968 969 970 971 972 973 974 975 976 ... Result(s) : 326621

Alerts Feed Alerts

DATE NAME CATEGORIES DETAIL
4.3 2025-02-20 CVE-2024-43196 cve IBM OpenPages with Watson 8.3 and 9.0  application could allow an authenticated user to manipulate data in the Questionnaires application allowing the user to spoof other users...
6.5 2025-02-20 CVE-2024-49355 cve IBM OpenPages with Watson 8.3 and 9.0 may write improperly neutralized data to server log files when the tracing is enabled per the System Tracing feature.
6.5 2025-02-20 CVE-2024-49780 cve IBM OpenPages with Watson 8.3 and 9.0 IBM OpenPages could allow a remote attacker to traverse directories on the system. An attacker with privileges to perform Import Configurat...
8.2 2025-02-20 CVE-2024-49782 cve IBM OpenPages with Watson 8.3 and 9.0  could allow a remote attacker to spoof mail server identity when using SSL/TLS security. An attacker could exploit this vulnerability t...
5.4 2025-02-20 CVE-2024-13445 cve The Elementor Website Builder – More Than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the border, margin and gap parameters in all ...
N/A 2025-02-20 CVE-2025-27218 cve Sitecore Experience Manager (XM) and Experience Platform (XP) 10.4 before KB1002844 allow remote code execution through insecure deserialization.
N/A 2025-02-20 CVE-2024-12284 cve Authenticated privilege escalation in NetScaler Console and NetScaler Agent allows.
N/A 2025-02-20 CVE-2024-37361 cve The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid. (CWE-502)   Hitachi Vantara Pentaho Business Analytics Se...
N/A 2025-02-20 CVE-2024-37362 cve The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. (CWE-522)   ...
N/A 2025-02-20 CVE-2024-37363 cve The product does not perform an authorization check when an actor attempts to access a resource or perform an action. (CWE-862)  Hitachi Vantara Pentaho Business Analytics...
N/A 2025-02-20 CVE-2024-6696 cve The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untruste...
N/A 2025-02-20 CVE-2024-6697 cve The product does not handle or incorrectly handles when it has insufficient privileges to access resources or functionality as specified by their permissions. This may cause it ...
N/A 2025-02-20 CVE-2025-0112 cve A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent...
N/A 2025-02-19 CVE-2023-51305 cve PHPJabbers Car Park Booking System v3.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the "name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_...
N/A 2025-02-19 CVE-2024-10339 cve Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
N/A 2025-02-19 CVE-2024-37359 cve The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being...
N/A 2025-02-19 CVE-2024-37360 cve Hitachi Vantara Pentaho Business Analytics Server - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')   The software does not...
N/A 2025-02-19 CVE-2024-5705 cve The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers ...
N/A 2025-02-19 CVE-2024-5706 cve The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be ...
9.8 2025-02-19 CVE-2025-21355 cve Missing Authentication for Critical Function in Microsoft Bing allows an unauthorized attacker to execute code over a network
Page(s) : 1 ... 956 957 958 959 960 961 962 963 964 965 [966] 967 968 969 970 971 972 973 974 975 976 ... Result(s) : 326621