Show filters
11,749 Total Results
Displaying 101-110 of 10,000
Refine your search criteria for more targeted results.
Sort by:
Attacker Value
Unknown
CVE-2024-52939
Disclosure Date: February 22, 2025 (last updated February 23, 2025)
Kernel software installed and running inside a Guest VM may post improper commands to the GPU Firmware to trigger a write data outside the Guest's virtualised GPU memory.
0
Attacker Value
Unknown
CVE-2024-47896
Disclosure Date: February 22, 2025 (last updated February 23, 2025)
Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data outside the Guest's virtualised GPU memory.
0
Attacker Value
Unknown
CVE-2024-46975
Disclosure Date: February 22, 2025 (last updated February 23, 2025)
Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data into another Guest's virtualised GPU memory.
0
Attacker Value
Unknown
CVE-2024-12577
Disclosure Date: February 22, 2025 (last updated February 23, 2025)
Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data outside the Guest's virtualised GPU memory.
0
Attacker Value
Unknown
CVE-2025-1361
Disclosure Date: February 22, 2025 (last updated February 23, 2025)
The IP2Location Country Blocker plugin for WordPress is vulnerable to Regular Information Exposure in all versions up to, and including, 2.38.8 due to missing capability checks on the admin_init() function. This makes it possible for unauthenticated attackers to view the plugin's settings.
0
Attacker Value
Unknown
CVE-2025-1471
Disclosure Date: February 21, 2025 (last updated February 23, 2025)
In Eclipse OMR versions 0.2.0 to 0.4.0, some of the z/OS atoe print functions use a constant length buffer for string conversion. If the input format string and arguments are larger than the buffer size then buffer overflow occurs. Beginning in version 0.5.0, the conversion buffers are sized correctly and checked appropriately to prevent buffer overflows.
0
Attacker Value
Unknown
CVE-2025-1470
Disclosure Date: February 21, 2025 (last updated February 23, 2025)
In Eclipse OMR, from the initial contribution to version 0.4.0, some OMR internal port library and utilities consumers of z/OS atoe functions do not check their return values for NULL memory pointers or for memory allocation failures. This can lead to NULL pointer dereference crashes. Beginning in version 0.5.0, internal OMR consumers of atoe functions handle NULL return values and memory allocation failures correctly.
0
Attacker Value
Unknown
CVE-2024-12276
Disclosure Date: February 21, 2025 (last updated February 23, 2025)
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to second-order SQL Injection via filenames in all versions up to, and including, 2.9.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with access to upload files and manage filenames through a third-party plugin like a File Manager, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. The risk of this vulnerability is very minimal as it requires a user to be able to manipulate filenames in order to successfully exploit.
0
Attacker Value
Unknown
CVE-2025-0728
Disclosure Date: February 21, 2025 (last updated February 23, 2025)
In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before
version 6.4.2, an attacker can cause an integer underflow and a
subsequent denial of service by writing a very large file, by specially
crafted packets with Content-Length smaller than the data request size. A
possible workaround is to disable HTTP PUT support.
0
Attacker Value
Unknown
CVE-2025-0727
Disclosure Date: February 21, 2025 (last updated February 23, 2025)
In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before
version 6.4.2, an attacker can cause an integer underflow and a
subsequent denial of service by writing a very large file, by specially
crafted packets with Content-Length in one packet smaller than the data
request size of the other packet. A possible workaround is to disable
HTTP PUT support.
0