Show filters
754 Total Results
Displaying 11-20 of 754
Sort by:
Attacker Value
Unknown
CVE-2024-29223
Disclosure Date: February 12, 2025 (last updated February 13, 2025)
Uncontrolled search path for some Intel(R) QuickAssist Technology software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2024-6351
Disclosure Date: January 28, 2025 (last updated January 29, 2025)
A malformed packet can cause a buffer overflow in the NWK/APS layer of the Ember ZNet stack and lead to an assert
0
Attacker Value
Unknown
CVE-2024-6352
Disclosure Date: January 13, 2025 (last updated January 14, 2025)
A malformed packet can cause a buffer overflow in the APS layer of the Ember ZNet stack and lead to an assert
0
Attacker Value
Unknown
CVE-2024-13280
Disclosure Date: January 09, 2025 (last updated January 10, 2025)
Insufficient Session Expiration vulnerability in Drupal Persistent Login allows Forceful Browsing.This issue affects Persistent Login: from 0.0.0 before 1.8.0, from 2.0.* before 2.2.2.
0
Attacker Value
Unknown
CVE-2025-22823
Disclosure Date: January 09, 2025 (last updated January 10, 2025)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Justin Twerdy Genesis Style Shortcodes allows DOM-Based XSS.This issue affects Genesis Style Shortcodes: from n/a through 1.0.
0
Attacker Value
Unknown
CVE-2024-11974
Disclosure Date: January 04, 2025 (last updated January 05, 2025)
The Media Library Assistant plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘smc_settings_tab', 'unattachfixit-action', and 'woofixit-action’ parameters in all versions up to, and including, 3.23 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
0
Attacker Value
Unknown
CVE-2024-52535
Disclosure Date: December 25, 2024 (last updated January 30, 2025)
Dell SupportAssist for Home PCs versions 4.6.1 and prior and Dell SupportAssist for Business PCs versions 4.5.0 and prior, contain a symbolic link (symlink) attack vulnerability in the software remediation component. A low-privileged authenticated user could potentially exploit this vulnerability, gaining privileges escalation, leading to arbitrary deletion of files and folders from the system.
0
Attacker Value
Unknown
CVE-2024-9852
Disclosure Date: November 28, 2024 (last updated December 21, 2024)
Uncontrolled Search Path Element vulnerability in ICONICS GENESIS64 all versions, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.
0
Attacker Value
Unknown
CVE-2024-8300
Disclosure Date: November 28, 2024 (last updated December 21, 2024)
Dead Code vulnerability in ICONICS GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3 and Mitsubishi Electric GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3 allows a local authenticated attacker to execute a malicious code by tampering with a specially crafted DLL. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.
0
Attacker Value
Unknown
CVE-2024-8299
Disclosure Date: November 28, 2024 (last updated December 21, 2024)
Uncontrolled Search Path Element vulnerability in ICONICS GENESIS64 all versions, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.
0