Show filters
546 Total Results
Displaying 71-80 of 546
Sort by:
Attacker Value
Unknown
CVE-2024-6802
Disclosure Date: July 17, 2024 (last updated August 26, 2024)
A vulnerability, which was classified as critical, was found in SourceCodester Computer Laboratory Management System 1.0. Affected is an unknown function of the file /lms/classes/Master.php?f=save_record. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
0
Attacker Value
Unknown
CVE-2024-23373
Disclosure Date: July 01, 2024 (last updated July 03, 2024)
Memory corruption when IOMMU unmap operation fails, the DMA and anon buffers are getting released.
0
Attacker Value
Unknown
CVE-2024-23372
Disclosure Date: July 01, 2024 (last updated July 03, 2024)
Memory corruption while invoking IOCTL call for GPU memory allocation and size param is greater than expected size.
0
Attacker Value
Unknown
CVE-2024-23368
Disclosure Date: July 01, 2024 (last updated July 03, 2024)
Memory corruption when allocating and accessing an entry in an SMEM partition.
0
Attacker Value
Unknown
CVE-2024-21469
Disclosure Date: July 01, 2024 (last updated July 03, 2024)
Memory corruption when an invoke call and a TEE call are bound for the same trusted application.
0
Attacker Value
Unknown
CVE-2024-21465
Disclosure Date: July 01, 2024 (last updated July 03, 2024)
Memory corruption while processing key blob passed by the user.
0
Attacker Value
Unknown
CVE-2024-21462
Disclosure Date: July 01, 2024 (last updated July 03, 2024)
Transient DOS while loading the TA ELF file.
0
Attacker Value
Unknown
CVE-2024-21461
Disclosure Date: July 01, 2024 (last updated July 03, 2024)
Memory corruption while performing finish HMAC operation when context is freed by keymaster.
0
Attacker Value
Unknown
CVE-2024-38375
Disclosure Date: June 26, 2024 (last updated June 27, 2024)
@fastly/js-compute is a JavaScript SDK and runtime for building Fastly Compute applications. The implementation of several functions were determined to include a use-after-free bug. This bug could allow for unintended data loss if the result of the preceding functions were sent anywhere else, and often results in a guest trap causing services to return a 500. This bug has been fixed in version 3.16.0 of the `@fastly/js-compute` package.
0
Attacker Value
Unknown
CVE-2024-37306
Disclosure Date: June 13, 2024 (last updated January 22, 2025)
Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. Starting in version 2.2.0 and prior to version 2.14.3, if an attacker can trick a logged-in CVAT user into visiting a malicious URL, they can initiate a dataset export or a backup from a project, task or job that the victim user has permission to export into a cloud storage that the victim user has access to. The name of the resulting file can be chosen by the attacker. This implies that the attacker can overwrite arbitrary files in any cloud storage that the victim can access and, if the attacker has read access to the cloud storage used in the attack, they can obtain media files, annotations, settings and other information from any projects, tasks or jobs that the victim has permission to export. Version 2.14.3 contains a fix for the issue. No known workarounds are available.
0