Show filters
392 Total Results
Displaying 41-50 of 392
Sort by:
Attacker Value
Unknown

CVE-2024-47386

Disclosure Date: October 05, 2024 (last updated October 06, 2024)
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Extended The Ultimate WordPress Toolkit – WP Extended allows Reflected XSS.This issue affects The Ultimate WordPress Toolkit – WP Extended: from n/a through 3.0.8.
0
Attacker Value
Unknown

CVE-2024-0125

Disclosure Date: October 03, 2024 (last updated October 04, 2024)
NVIDIA CUDA Toolkit for Windows and Linux contains a vulnerability in the nvdisam command line tool, where a user can cause a NULL pointer dereference by running nvdisasm on a malformed ELF file. A successful exploit of this vulnerability might lead to a limited denial of service.
0
Attacker Value
Unknown

CVE-2024-0124

Disclosure Date: October 03, 2024 (last updated October 04, 2024)
NVIDIA CUDA Toolkit for Windows and Linux contains a vulnerability in the nvdisam command line tool, where a user can cause nvdisasm to read freed memory by running it on a malformed ELF file. A successful exploit of this vulnerability might lead to a limited denial of service.
0
Attacker Value
Unknown

CVE-2024-0123

Disclosure Date: October 03, 2024 (last updated October 04, 2024)
NVIDIA CUDA toolkit for Windows and Linux contains a vulnerability in the nvdisasm command line tool where an attacker may cause an improper validation in input issue by tricking the user into running nvdisasm on a malicious ELF file. A successful exploit of this vulnerability may lead to denial of service.
0
Attacker Value
Unknown

CVE-2024-0133

Disclosure Date: September 26, 2024 (last updated October 03, 2024)
NVIDIA Container Toolkit 1.16.1 or earlier contains a vulnerability in the default mode of operation allowing a specially crafted container image to create empty files on the host file system. This does not impact use cases where CDI is used. A successful exploit of this vulnerability may lead to data tampering.
Attacker Value
Unknown

CVE-2024-8803

Disclosure Date: September 26, 2024 (last updated October 03, 2024)
The Bulk NoIndex & NoFollow Toolkit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.15. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Attacker Value
Unknown

CVE-2024-8175

Disclosure Date: September 25, 2024 (last updated January 05, 2025)
An unauthenticated remote attacker can causes the CODESYS web server to access invalid memory which results in a DoS.
0
Attacker Value
Unknown

CVE-2024-8509

Disclosure Date: September 06, 2024 (last updated September 09, 2024)
A vulnerability was found in Forklift Controller.  There is no verification against the authorization header except to ensure it uses bearer authentication. Without an Authorization header and some form of a Bearer token, a 401 error occurs. The presence of a token value provides a 200 response with the requested information.
0
Attacker Value
Unknown

CVE-2024-42471

Disclosure Date: September 02, 2024 (last updated January 23, 2025)
actions/artifact is the GitHub ToolKit for developing GitHub Actions. Versions of `actions/artifact` on the 2.x branch before 2.1.2 are vulnerable to arbitrary file write when using `downloadArtifactInternal`, `downloadArtifactPublic`, or `streamExtractExternal` for extracting a specifically crafted artifact that contains path traversal filenames. Users are advised to upgrade to version 2.1.2 or higher. There are no known workarounds for this issue.
Attacker Value
Unknown

CVE-2024-0111

Disclosure Date: August 31, 2024 (last updated September 14, 2024)
NVIDIA CUDA Toolkit contains a vulnerability in command 'cuobjdump' where a user may cause a crash or produce incorrect output by passing a malformed ELF file. A successful exploit of this vulnerability may lead to a limited denial of service or data tampering.