Show filters
158 Total Results
Displaying 1-10 of 158
Sort by:
Attacker Value
Unknown
CVE-2017-5753
Disclosure Date: January 04, 2018 (last updated January 15, 2025)
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
1
Attacker Value
Unknown
CVE-2024-29980
Disclosure Date: January 14, 2025 (last updated January 15, 2025)
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore™ for Intel Kaby Lake, Phoenix SecureCore™ for Intel Coffee Lake, Phoenix SecureCore™ for Intel Comet Lake, Phoenix SecureCore™ for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCore™ for Intel Kaby Lake: before 4.0.1.1012; SecureCore™ for Intel Coffee Lake: before 4.1.0.568; SecureCore™ for Intel Comet Lake: before 4.2.1.292; SecureCore™ for Intel Ice Lake: before 4.2.0.334.
0
Attacker Value
Unknown
CVE-2024-29979
Disclosure Date: January 14, 2025 (last updated January 15, 2025)
Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore™ for Intel Kaby Lake, Phoenix SecureCore™ for Intel Coffee Lake, Phoenix SecureCore™ for Intel Comet Lake, Phoenix SecureCore™ for Intel Ice Lake allows Input Data Manipulation.This issue affects SecureCore™ for Intel Kaby Lake: before 4.0.1.1012; SecureCore™ for Intel Coffee Lake: before 4.1.0.568; SecureCore™ for Intel Comet Lake: before 4.2.1.292; SecureCore™ for Intel Ice Lake: before 4.2.0.334.
0
Attacker Value
Unknown
CVE-2024-11497
Disclosure Date: January 14, 2025 (last updated January 15, 2025)
An authenticated attacker can use this vulnerability to perform a privilege escalation to gain root access.
0
Attacker Value
Unknown
CVE-2024-52410
Disclosure Date: November 16, 2024 (last updated November 17, 2024)
Deserialization of Untrusted Data vulnerability in Phoenixheart Referrer Detector allows Object Injection.This issue affects Referrer Detector: from n/a through 4.2.1.0.
0
Attacker Value
Unknown
CVE-2024-11240
Disclosure Date: November 15, 2024 (last updated November 21, 2024)
A vulnerability was found in IBPhoenix ibWebAdmin up to 1.0.2 and classified as problematic. This issue affects some unknown processing of the file /database.php of the component Banco de Dados Tab. The manipulation of the argument db_login_role leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2024-10926
Disclosure Date: November 06, 2024 (last updated November 07, 2024)
A vulnerability was found in IBPhoenix ibWebAdmin up to 1.0.2 and classified as problematic. This issue affects some unknown processing of the file /toggle_fold_panel.php of the component Tabelas Section. The manipulation of the argument p leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
0
Attacker Value
Unknown
CVE-2024-7699
Disclosure Date: September 10, 2024 (last updated September 28, 2024)
An low privileged remote attacker can execute OS commands with root privileges due to improper neutralization of special elements in user data.
0
Attacker Value
Unknown
CVE-2024-7698
Disclosure Date: September 10, 2024 (last updated September 28, 2024)
A low privileged remote attacker can get access to CSRF tokens of higher privileged users which can be abused to mount CSRF attacks.
0
Attacker Value
Unknown
CVE-2024-43393
Disclosure Date: September 10, 2024 (last updated October 01, 2024)
A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_INCOMING.FROM_IP FW_INCOMING.IN_IP FW_OUTGOING.FROM_IP FW_OUTGOING.IN_IP FW_RULESETS.FROM_IP FW_RULESETS.IN_IP environment variable which can lead to a DoS.
0