Show filters
546 Total Results
Displaying 71-80 of 546
Sort by:
Attacker Value
Unknown

CVE-2024-6802

Disclosure Date: July 17, 2024 (last updated August 26, 2024)
A vulnerability, which was classified as critical, was found in SourceCodester Computer Laboratory Management System 1.0. Affected is an unknown function of the file /lms/classes/Master.php?f=save_record. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Attacker Value
Unknown

CVE-2024-23373

Disclosure Date: July 01, 2024 (last updated July 03, 2024)
Memory corruption when IOMMU unmap operation fails, the DMA and anon buffers are getting released.
Attacker Value
Unknown

CVE-2024-23372

Disclosure Date: July 01, 2024 (last updated July 03, 2024)
Memory corruption while invoking IOCTL call for GPU memory allocation and size param is greater than expected size.
Attacker Value
Unknown

CVE-2024-23368

Disclosure Date: July 01, 2024 (last updated July 03, 2024)
Memory corruption when allocating and accessing an entry in an SMEM partition.
Attacker Value
Unknown

CVE-2024-21469

Disclosure Date: July 01, 2024 (last updated July 03, 2024)
Memory corruption when an invoke call and a TEE call are bound for the same trusted application.
Attacker Value
Unknown

CVE-2024-21465

Disclosure Date: July 01, 2024 (last updated July 03, 2024)
Memory corruption while processing key blob passed by the user.
Attacker Value
Unknown

CVE-2024-21462

Disclosure Date: July 01, 2024 (last updated July 03, 2024)
Transient DOS while loading the TA ELF file.
Attacker Value
Unknown

CVE-2024-21461

Disclosure Date: July 01, 2024 (last updated July 03, 2024)
Memory corruption while performing finish HMAC operation when context is freed by keymaster.
Attacker Value
Unknown

CVE-2024-38375

Disclosure Date: June 26, 2024 (last updated June 27, 2024)
@fastly/js-compute is a JavaScript SDK and runtime for building Fastly Compute applications. The implementation of several functions were determined to include a use-after-free bug. This bug could allow for unintended data loss if the result of the preceding functions were sent anywhere else, and often results in a guest trap causing services to return a 500. This bug has been fixed in version 3.16.0 of the `@fastly/js-compute` package.
0
Attacker Value
Unknown

CVE-2024-37306

Disclosure Date: June 13, 2024 (last updated January 22, 2025)
Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. Starting in version 2.2.0 and prior to version 2.14.3, if an attacker can trick a logged-in CVAT user into visiting a malicious URL, they can initiate a dataset export or a backup from a project, task or job that the victim user has permission to export into a cloud storage that the victim user has access to. The name of the resulting file can be chosen by the attacker. This implies that the attacker can overwrite arbitrary files in any cloud storage that the victim can access and, if the attacker has read access to the cloud storage used in the attack, they can obtain media files, annotations, settings and other information from any projects, tasks or jobs that the victim has permission to export. Version 2.14.3 contains a fix for the issue. No known workarounds are available.