Show filters
754 Total Results
Displaying 11-20 of 754
Sort by:
Attacker Value
Unknown

CVE-2024-29223

Disclosure Date: February 12, 2025 (last updated February 13, 2025)
Uncontrolled search path for some Intel(R) QuickAssist Technology software before version 2.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown

CVE-2024-6351

Disclosure Date: January 28, 2025 (last updated January 29, 2025)
A malformed packet can cause a buffer overflow in the NWK/APS layer of the Ember ZNet stack and lead to an assert
0
Attacker Value
Unknown

CVE-2024-6352

Disclosure Date: January 13, 2025 (last updated January 14, 2025)
A malformed packet can cause a buffer overflow in the APS layer of the Ember ZNet stack and lead to an assert
0
Attacker Value
Unknown

CVE-2024-13280

Disclosure Date: January 09, 2025 (last updated January 10, 2025)
Insufficient Session Expiration vulnerability in Drupal Persistent Login allows Forceful Browsing.This issue affects Persistent Login: from 0.0.0 before 1.8.0, from 2.0.* before 2.2.2.
0
Attacker Value
Unknown

CVE-2025-22823

Disclosure Date: January 09, 2025 (last updated January 10, 2025)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Justin Twerdy Genesis Style Shortcodes allows DOM-Based XSS.This issue affects Genesis Style Shortcodes: from n/a through 1.0.
0
Attacker Value
Unknown

CVE-2024-11974

Disclosure Date: January 04, 2025 (last updated January 05, 2025)
The Media Library Assistant plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘smc_settings_tab', 'unattachfixit-action', and 'woofixit-action’ parameters in all versions up to, and including, 3.23 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Attacker Value
Unknown

CVE-2024-52535

Disclosure Date: December 25, 2024 (last updated January 30, 2025)
Dell SupportAssist for Home PCs versions 4.6.1 and prior and Dell SupportAssist for Business PCs versions 4.5.0 and prior, contain a symbolic link (symlink) attack vulnerability in the software remediation component. A low-privileged authenticated user could potentially exploit this vulnerability, gaining privileges escalation, leading to arbitrary deletion of files and folders from the system.
Attacker Value
Unknown

CVE-2024-9852

Disclosure Date: November 28, 2024 (last updated December 21, 2024)
Uncontrolled Search Path Element vulnerability in ICONICS GENESIS64 all versions, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.
0
Attacker Value
Unknown

CVE-2024-8300

Disclosure Date: November 28, 2024 (last updated December 21, 2024)
Dead Code vulnerability in ICONICS GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3 and Mitsubishi Electric GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3 allows a local authenticated attacker to execute a malicious code by tampering with a specially crafted DLL. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.
0
Attacker Value
Unknown

CVE-2024-8299

Disclosure Date: November 28, 2024 (last updated December 21, 2024)
Uncontrolled Search Path Element vulnerability in ICONICS GENESIS64 all versions, Mitsubishi Electric GENESIS64 all versions and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.
0