7.8

CVSS3.1

CVE-2018-9417 -

In f_hidg_read and hidg_disable of f_hid.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

๐Ÿ“… Published: Nov. 19, 2024, 9:10 p.m. ๐Ÿ”„ Last Modified: Nov. 22, 2024, 10:08 p.m.

5.5

CVSS3.1

CVE-2018-9412 -

In removeUnsynchronization of ID3.cpp there is a possible resource exhaustion due to improper input validation. This could lead to denial of service with no additional execution privileges needed. User interaction is needed for exploitation.

๐Ÿ“… Published: Nov. 19, 2024, 9:08 p.m. ๐Ÿ”„ Last Modified: March 19, 2025, 6:15 p.m.

8.8

CVSS3.1

CVE-2018-9411 -

In decrypt of ClearKeyCasPlugin.cpp there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote arbitrary code execution with no additional execution privileges needed. User interaction is needed for exploitation.

๐Ÿ“… Published: Nov. 19, 2024, 9:06 p.m. ๐Ÿ”„ Last Modified: Nov. 22, 2024, 10:30 p.m.

5.5

CVSS3.1

CVE-2018-9410 -

In analyzeAxes of FontUtils.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

๐Ÿ“… Published: Nov. 19, 2024, 9:04 p.m. ๐Ÿ”„ Last Modified: Nov. 22, 2024, 10:28 p.m.

9.8

CVSS3.1

CVE-2018-9365 -

In smp_data_received of smp_l2c.cc, there is a possible out of bounds read followed by code execution due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.

๐Ÿ“… Published: Nov. 19, 2024, 8:44 p.m. ๐Ÿ”„ Last Modified: Dec. 18, 2024, 2:20 p.m.

0.0

CVE-2024-53254 -

This CVE is a duplicate of another CVE.

๐Ÿ“… Published: Nov. 19, 2024, 8:08 p.m. ๐Ÿ”„ Last Modified: Nov. 27, 2024, 6:15 p.m.

6.5

CVSS3.1

CVE-2024-45422 - Zoom Apps - Improper Input Validation

Improper input validation in some Zoom Apps before version 6.2.0 may allow an unauthenticated user to conduct a denial of service via network access.

๐Ÿ“… Published: Nov. 19, 2024, 7:45 p.m. ๐Ÿ”„ Last Modified: Aug. 19, 2025, 2:08 p.m.

4.3

CVSS3.1

CVE-2024-52359 - IBM Concert Software improper access controls

IBM Concert Software 1.0.0, 1.0.1, 1.0.2, and 1.0.2.1 could allow an authenticated user to perform unauthorized actions that should be reserved to administrator used due to improper access controls.

๐Ÿ“… Published: Nov. 19, 2024, 7:39 p.m. ๐Ÿ”„ Last Modified: July 18, 2025, 1:37 p.m.

4.3

CVSS3.1

CVE-2024-45420 - Zoom Apps - Uncontrolled Resource Consumption

Uncontrolled resource consumption in some Zoom Apps before version 6.2.0 may allow an authenticated user to conduct a denial of service via network access.

๐Ÿ“… Published: Nov. 19, 2024, 7:32 p.m. ๐Ÿ”„ Last Modified: Aug. 19, 2025, 2:10 p.m.

7.6

CVSS3.1

CVE-2024-52360 - IBM Concert Software SQL injection

IBM Concert Software 1.0.0, 1.0.1, 1.0.2, and 1.0.2.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database.

๐Ÿ“… Published: Nov. 19, 2024, 7:31 p.m. ๐Ÿ”„ Last Modified: July 18, 2025, 1:37 p.m.
Total resulsts: 346547
Page 7524 of 34,655
ยซ previous page ยป next page
Filters