Show filters
381 Total Results
Displaying 21-30 of 381
Sort by:
Attacker Value
Unknown

CVE-2024-23366

Disclosure Date: January 06, 2025 (last updated January 13, 2025)
Information Disclosure while invoking the mailbox write API when message received from user is larger than mailbox size.
Attacker Value
Unknown

CVE-2024-49422

Disclosure Date: December 31, 2024 (last updated January 02, 2025)
Protection Mechanism Failure in bootloader prior to SMR Oct-2024 Release 1 allows physical attackers to reset lockscreen failure count by hardware fault injection. User interaction is required for triggering this vulnerability.
0
Attacker Value
Unknown

CVE-2024-42004

Disclosure Date: December 18, 2024 (last updated December 20, 2024)
A library injection vulnerability exists in Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. A specially crafted library can leverage Teams's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions.
0
Attacker Value
Unknown

CVE-2024-41145

Disclosure Date: December 18, 2024 (last updated December 19, 2024)
A library injection vulnerability exists in the WebView.app helper app of Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. A specially crafted library can leverage Teams's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions.
Attacker Value
Unknown

CVE-2024-41138

Disclosure Date: December 18, 2024 (last updated December 19, 2024)
A library injection vulnerability exists in the com.microsoft.teams2.modulehost.app helper app of Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. A specially crafted library can leverage Teams's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions.
Attacker Value
Unknown

CVE-2024-12397

Disclosure Date: December 12, 2024 (last updated February 07, 2025)
A flaw was found in Quarkus-HTTP, which incorrectly parses cookies with certain value-delimiting characters in incoming requests. This issue could allow an attacker to construct a cookie value to exfiltrate HttpOnly cookie values or spoof arbitrary additional cookie values, leading to unauthorized data access or modification. The main threat from this flaw impacts data confidentiality and integrity.
0
Attacker Value
Unknown

CVE-2024-11201

Disclosure Date: December 06, 2024 (last updated December 21, 2024)
The myCred – Loyalty Points and Rewards plugin for WordPress and WooCommerce – Give Points, Ranks, Badges, Cashback, WooCommerce rewards, and WooCommerce credits for Gamification plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's mycred_send shortcode in all versions up to, and including, 2.7.5.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Attacker Value
Unknown

CVE-2024-49412

Disclosure Date: December 03, 2024 (last updated December 21, 2024)
Improper input validation in Settings prior to SMR Dec-2024 Release 1 allows local attackers to broadcast signal for discovering Bluetooth on Galaxy Watch.
0
Attacker Value
Unknown

CVE-2024-33063

Disclosure Date: December 02, 2024 (last updated December 21, 2024)
Transient DOS while parsing the ML IE when a beacon with common info length of the ML IE greater than the ML IE inside which this element is present.
Attacker Value
Unknown

CVE-2024-33056

Disclosure Date: December 02, 2024 (last updated December 21, 2024)
Memory corruption when allocating and accessing an entry in an SMEM partition continuously.