9.3

CVSS4.0

CVE-2024-54152 - Angular Expressions - Remote Code Execution when using locals

Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to version 1.4.3, an attacker can write a malicious expression that escapes the sandbox to execute arbitrary code on the system. With a more complex (undisclosed) payload, one can get full access…

πŸ“… Published: Dec. 10, 2024, 3:37 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

6.8

CVSS4.0

CVE-2024-12236 - Use of Custom URI for media inputs with VPC-SC enabled potentially leads to data exfiltration

A security issue exists in Vertex Gemini API for customers using VPC-SC. By utilizing a custom crafted file URI for image input, data exfiltration is possible due to requests being routed outside the VPC-SC security perimeter, circumventing the intended security restrictions of VPC-SC. No further …

πŸ“… Published: Dec. 10, 2024, 3:07 p.m. πŸ”„ Last Modified: July 23, 2025, 8:13 p.m.

6.1

CVSS3.1

CVE-2024-12323 - turboSMTP <= 4.6 - Reflected Cross-Site Scripting via 'page'

The turboSMTP plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the β€˜page’ parameter in all versions up to, and including, 4.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in p…

πŸ“… Published: Dec. 10, 2024, 2:28 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

9.8

CVSS3.1

CVE-2024-5660 -

Use of Hardware Page Aggregation (HPA) and Stage-1 and/or Stage-2 translation on Cortex-A77, Cortex-A78, Cortex-A78C, Cortex-A78AE, Cortex-A710, Cortex-X1, Cortex-X1C, Cortex-X2, Cortex-X3, Cortex-X4, Cortex-X925, Neoverse V1, Neoverse V2, Neoverse V3, Neoverse V3AE, Neoverse N2 may permit bypass o…

πŸ“… Published: Dec. 10, 2024, 1:55 p.m. πŸ”„ Last Modified: Jan. 5, 2026, 2:44 p.m.

7.3

CVSS4.0

CVE-2024-54095 -

A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 10). The affected application is vulnerable to integer underflow vulnerability which can be triggered while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the …

πŸ“… Published: Dec. 10, 2024, 1:54 p.m. πŸ”„ Last Modified: July 12, 2025, 10:09 p.m.

7.3

CVSS4.0

CVE-2024-54094 -

A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 5). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.

πŸ“… Published: Dec. 10, 2024, 1:54 p.m. πŸ”„ Last Modified: July 12, 2025, 3:42 p.m.

7.3

CVSS4.0

CVE-2024-54093 -

A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 5). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted ASM files. This could allow an attacker to execute code in the context of the current process.

πŸ“… Published: Dec. 10, 2024, 1:54 p.m. πŸ”„ Last Modified: July 12, 2025, 10:09 p.m.

7.3

CVSS4.0

CVE-2024-54091 -

A vulnerability has been identified in Solid Edge SE2024 (All versions < V224.0 Update 12), Solid Edge SE2025 (All versions < V225.0 Update 3). The affected application contains an out of bounds write past the end of an allocated buffer while parsing X_T data or a specially crafted file in X_T form…

πŸ“… Published: Dec. 10, 2024, 1:54 p.m. πŸ”„ Last Modified: Oct. 29, 2025, 2:21 p.m.

5.9

CVSS4.0

CVE-2024-54005 -

A vulnerability has been identified in COMOS V10.3 (All versions < V10.3.3.5.8), COMOS V10.4.0 (All versions), COMOS V10.4.1 (All versions), COMOS V10.4.2 (All versions), COMOS V10.4.3 (All versions < V10.4.3.0.47), COMOS V10.4.4 (All versions < V10.4.4.2), COMOS V10.4.4.1 (All versions < V10.4.4.1…

πŸ“… Published: Dec. 10, 2024, 1:54 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.

5.1

CVSS4.0

CVE-2024-53832 -

A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V05.30). The affected devices contain a secure element which is connected via an unencrypted SPI bus. This could allow an attacker with physical access to the SPI bus to observe the password used for the …

πŸ“… Published: Dec. 10, 2024, 1:54 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.
Total resulsts: 346616
Page 7297 of 34,662
Β« previous page Β» next page
Filters