Show filters
9 Total Results
Displaying 1-9 of 9
Sort by:
Attacker Value
Very High

CVE-2023-7102

Disclosure Date: December 24, 2023 (last updated February 25, 2025)
Use of a Third Party library produced a vulnerability in Barracuda Networks Inc. Barracuda ESG Appliance which allowed Parameter Injection.This issue affected Barracuda ESG Appliance, from 5.1.3.001 through 9.2.1.001, until Barracuda removed the vulnerable logic.
Attacker Value
Unknown

CVE-2025-23089

Disclosure Date: January 22, 2025 (last updated March 01, 2025)
** REJECT ** This Record was REJECTED after determining it is not in compliance with CVE Program requirements regarding assignment for vulnerabilities
0
Attacker Value
Unknown

CVE-2025-23088

Disclosure Date: January 22, 2025 (last updated March 01, 2025)
** REJECT ** This Record was REJECTED after determining it is not in compliance with CVE Program requirements regarding assignment for vulnerabilities
0
Attacker Value
Unknown

CVE-2025-23087

Disclosure Date: January 22, 2025 (last updated March 01, 2025)
** REJECT ** This Record was REJECTED after determining it is not in compliance with CVE Program requirements regarding assignment for vulnerabilities
0
Attacker Value
Unknown

CVE-2024-11999

Disclosure Date: December 17, 2024 (last updated February 27, 2025)
CWE-1104: Use of Unmaintained Third-Party Components vulnerability exists that could cause complete control of the device when an authenticated user installs malicious code into HMI product.
0
Attacker Value
Unknown

CVE-2024-8885

Disclosure Date: October 02, 2024 (last updated February 26, 2025)
A local privilege escalation vulnerability in Sophos Intercept X for Windows with Central Device Encryption 2024.2.0 and older allows writing of arbitrary files.
0
Attacker Value
Unknown

CVE-2024-35252

Disclosure Date: June 11, 2024 (last updated February 26, 2025)
Azure Storage Movement Client Library Denial of Service Vulnerability
Attacker Value
Unknown

CVE-2024-21631

Disclosure Date: January 03, 2024 (last updated February 25, 2025)
Vapor is an HTTP web framework for Swift. Prior to version 4.90.0, Vapor's `vapor_urlparser_parse` function uses `uint16_t` indexes when parsing a URI's components, which may cause integer overflows when parsing untrusted inputs. This vulnerability does not affect Vapor directly but could impact applications relying on the URI type for validating user input. The URI type is used in several places in Vapor. A developer may decide to use URI to represent a URL in their application (especially if that URL is then passed to the HTTP Client) and rely on its public properties and methods. However, URI may fail to properly parse a valid (albeit abnormally long) URL, due to string ranges being converted to 16-bit integers. An attacker may use this behavior to trick the application into accepting a URL to an untrusted destination. By padding the port number with zeros, an attacker can cause an integer overflow to occur when the URL authority is parsed and, as a result, spoof the host. Version …
Attacker Value
Unknown

CVE-2021-22142

Disclosure Date: November 22, 2023 (last updated February 25, 2025)
Kibana contains an embedded version of the Chromium browser that the Reporting feature uses to generate the downloadable reports. If a user with permissions to generate reports is able to render arbitrary HTML with this browser, they may be able to leverage known Chromium vulnerabilities to conduct further attacks. Kibana contains a number of protections to prevent this browser from rendering arbitrary content.