Show filters
508 Total Results
Displaying 41-50 of 508
Sort by:
Attacker Value
Unknown

CVE-2021-26367

Disclosure Date: August 13, 2024 (last updated December 18, 2024)
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
Attacker Value
Unknown

CVE-2023-31315

Disclosure Date: August 12, 2024 (last updated August 13, 2024)
Improper validation in a model specific register (MSR) could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution.
0
Attacker Value
Unknown

CVE-2024-5964

Disclosure Date: July 18, 2024 (last updated January 05, 2025)
The Zenon Lite theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter within the theme's Button shortcode in all versions up to, and including, 1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
0
Attacker Value
Unknown

CVE-2024-0158

Disclosure Date: July 02, 2024 (last updated August 01, 2024)
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges
Attacker Value
Unknown

CVE-2024-5062

Disclosure Date: June 30, 2024 (last updated August 21, 2024)
A reflected Cross-Site Scripting (XSS) vulnerability was identified in zenml-io/zenml version 0.57.1. The vulnerability exists due to improper neutralization of input during web page generation, specifically within the survey redirect parameter. This flaw allows an attacker to redirect users to a specified URL after completing a survey, without proper validation of the 'redirect' parameter. Consequently, an attacker can execute arbitrary JavaScript code in the context of the user's browser session. This vulnerability could be exploited to steal cookies, potentially leading to account takeover.
Attacker Value
Unknown

CVE-2024-38527

Disclosure Date: June 26, 2024 (last updated June 27, 2024)
ZenUML is JavaScript-based diagramming tool that requires no server, using Markdown-inspired text definitions and a renderer to create and modify sequence diagrams. Markdown-based comments in the ZenUML diagram syntax are susceptible to Cross-site Scripting (XSS). The comment feature allows the user to attach small notes for reference. This feature allows the user to enter in their comment in markdown comment, allowing them to use common markdown features, such as `**` for bolded text. However, the markdown text is currently not sanitized before rendering, allowing an attacker to enter a malicious payload for the comment which leads to XSS. This puts existing applications that use ZenUML unsandboxed at risk of arbitrary JavaScript execution when rendering user-controlled diagrams. This vulnerability was patched in version 3.23.25,
0
Attacker Value
Unknown

CVE-2022-23829

Disclosure Date: June 18, 2024 (last updated June 19, 2024)
A potential weakness in AMD SPI protection features may allow a malicious attacker with Ring0 (kernel mode) access to bypass the native System Management Mode (SMM) ROM protections.
0
Attacker Value
Unknown

CVE-2024-3080

Disclosure Date: June 14, 2024 (last updated January 05, 2025)
Certain ASUS router models have authentication bypass vulnerability, allowing unauthenticated remote attackers to log in the device.
0
Attacker Value
Unknown

CVE-2024-3079

Disclosure Date: June 14, 2024 (last updated June 14, 2024)
Certain models of ASUS routers have buffer overflow vulnerabilities, allowing remote attackers with administrative privileges to execute arbitrary commands on the device.
0
Attacker Value
Unknown

CVE-2024-32860

Disclosure Date: June 13, 2024 (last updated August 17, 2024)
Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.