Page(s) : 1 ... 982 983 984 985 986 987 988 989 990 991 [992] 993 994 995 996 997 998 999 1000 1001 1002 ... | Result(s) : 326731 |
Alerts
DATE | NAME | CATEGORIES | DETAIL | |
---|---|---|---|---|
N/A | 2025-02-15 | CVE-2025-0997 | cve | Use after free in Navigation in Google Chrome prior to 133.0.6943.98 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium s... |
N/A | 2025-02-15 | CVE-2025-0998 | cve | Rejected reason: Not exploitable |
N/A | 2025-02-15 | CVE-2025-1302 | cve | Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on ... |
N/A | 2025-02-15 | CVE-2024-10405 | cve | Brocade SANnav before SANnav 2.3.1b enables weak TLS ciphers on ports 443 and 18082. In case of a successful exploit, an attacker can read Brocade SANnav data stream that incl... |
N/A | 2025-02-15 | CVE-2024-4282 | cve | Brocade SANnav OVA before SANnav 2.3.1b enables SHA1 deprecated setting for SSH for port 22. |
N/A | 2025-02-15 | CVE-2024-5461 | cve | Implementation of the Simple Network Management Protocol (SNMP) operating on the Brocade 6547 (FC5022) embedded switch blade, makes internal script calls to system.sh from wi... |
N/A | 2025-02-15 | CVE-2024-5462 | cve | If Brocade Fabric OS before Fabric OS 9.2.0 configuration settings are not set to encrypt SNMP passwords, then the SNMP privsecret / authsecret fields can be exposed in plaintex... |
N/A | 2025-02-15 | CVE-2025-21401 | cve | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability |
N/A | 2025-02-15 | CVE-2025-26819 | cve | Monero through 0.18.3.4 before ec74ff4 does not have response limits on HTTP server connections. |
N/A | 2025-02-14 | CVE-2025-25285 | cve | @octokit/endpoint turns REST API endpoints into generic request options. Starting in version 4.1.0 and prior to version 10.1.3, by crafting specific `options` parameters, the `e... |
N/A | 2025-02-14 | CVE-2025-25288 | cve | @octokit/plugin-paginate-rest is the Octokit plugin to paginate REST API endpoint responses. For versions starting in 1.0.0 and prior to 11.4.1 of the npm package `@octokit/plug... |
N/A | 2025-02-14 | CVE-2025-25289 | cve | @octokit/request-error is an error class for Octokit request errors. Starting in version 1.0.0 and prior to version 6.1.7, a Regular Expression Denial of Service (ReDoS) vulnera... |
N/A | 2025-02-14 | CVE-2025-25290 | cve | @octokit/request sends parameterized requests to GitHub’s APIs with sensible defaults in browsers and Node. Starting in version 1.0.0 and prior to version 9.2.1, the regular exp... |
N/A | 2025-02-14 | CVE-2025-25296 | cve | Label Studio is an open source data labeling tool. Prior to version 1.16.0, Label Studio's `/projects/upload-example` endpoint allows injection of arbitrary HTML through a ... |
N/A | 2025-02-14 | CVE-2025-25297 | cve | Label Studio is an open source data labeling tool. Prior to version 1.16.0, Label Studio's S3 storage integration feature contains a Server-Side Request Forgery (SSRF) vuln... |
N/A | 2025-02-14 | CVE-2025-25304 | cve | Vega is a visualization grammar, a declarative format for creating, saving, and sharing interactive visualization designs. Prior to version 5.26.0 of vega and 5.4.2 of vega-sele... |
N/A | 2025-02-14 | CVE-2022-26083 | cve | Generation of weak initialization vector in an Intel(R) IPP Cryptography software library before version 2021.5 may allow an unauthenticated user to potentially enable informati... |
N/A | 2025-02-14 | CVE-2022-28693 | cve | Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via loca... |
N/A | 2025-02-14 | CVE-2024-31144 | cve | For a brief summary of Xapi terminology, see: https://xapi-project.github.io/xen-api/overview.html#object-model-overview Xapi contains functionality to backup and restore ... |
N/A | 2025-02-14 | CVE-2025-0592 | cve | The vulnerability may allow a remote low priviledged attacker to run arbitrary shell commands by manipulating the firmware file and uploading it to the device. |
Page(s) : 1 ... 982 983 984 985 986 987 988 989 990 991 [992] 993 994 995 996 997 998 999 1000 1001 1002 ... | Result(s) : 326731 |