Show filters
2,134 Total Results
Displaying 61-70 of 2,134
Sort by:
Attacker Value
Unknown

CVE-2024-10644

Disclosure Date: February 11, 2025 (last updated February 12, 2025)
Code injection in Ivanti Connect Secure before version 22.7R2.4 and Ivanti Policy Secure before version 22.7R1.3 allows a remote authenticated attacker with admin privileges to achieve remote code execution.
0
Attacker Value
Unknown

CVE-2025-0799

Disclosure Date: February 06, 2025 (last updated February 06, 2025)
IBM App Connect enterprise 12.0.1.0 through 12.0.12.10 and 13.0.1.0 through 13.0.2.1 could allow an authenticated user to write to an arbitrary file on the system during bar configuration deployment due to improper pathname limitations on restricted directories.
Attacker Value
Unknown

CVE-2025-20125

Disclosure Date: February 05, 2025 (last updated February 06, 2025)
A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker with valid read-only credentials to obtain sensitive information, change node configurations, and restart the node. This vulnerability is due to a lack of authorization in a specific API and improper validation of user-supplied data. An attacker could exploit this vulnerability by sending a crafted HTTP request to a specific API on the device. A successful exploit could allow the attacker to attacker to obtain information, modify system configuration, and reload the device. Note: To successfully exploit this vulnerability, the attacker must have valid read-only administrative credentials. In a single-node deployment, new devices will not be able to authenticate during the reload time.
Attacker Value
Unknown

CVE-2025-20124

Disclosure Date: February 05, 2025 (last updated February 06, 2025)
A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker to execute arbitrary commands as the root user on an affected device. This vulnerability is due to insecure deserialization of user-supplied Java byte streams by the affected software. An attacker could exploit this vulnerability by sending a crafted serialized Java object to an affected API. A successful exploit could allow the attacker to execute arbitrary commands on the device and elevate privileges. Note: To successfully exploit this vulnerability, the attacker must have valid read-only administrative credentials. In a single-node deployment, new devices will not be able to authenticate during the reload time.
Attacker Value
Unknown

CVE-2024-49843

Disclosure Date: February 03, 2025 (last updated February 06, 2025)
Memory corruption while processing IOCTL from user space to handle GPU AHB bus error.
Attacker Value
Unknown

CVE-2024-49840

Disclosure Date: February 03, 2025 (last updated February 06, 2025)
Memory corruption while Invoking IOCTL calls from user-space to validate FIPS encryption or decryption functionality.
Attacker Value
Unknown

CVE-2024-49839

Disclosure Date: February 03, 2025 (last updated February 06, 2025)
Memory corruption during management frame processing due to mismatch in T2LM info element.
Attacker Value
Unknown

CVE-2024-49838

Disclosure Date: February 03, 2025 (last updated February 06, 2025)
Information disclosure while parsing the OCI IE with invalid length.
Attacker Value
Unknown

CVE-2024-49834

Disclosure Date: February 03, 2025 (last updated February 06, 2025)
Memory corruption while power-up or power-down sequence of the camera sensor.
Attacker Value
Unknown

CVE-2024-49833

Disclosure Date: February 03, 2025 (last updated February 06, 2025)
Memory corruption can occur in the camera when an invalid CID is used.