Ubuntu Linux Kernel Multiple Vulnerabilities
Multiple vulnerabilities were identified in Ubuntu Linux Kernel. An attacker could exploit some of these vulnerabilities to trigger security restriction bypass, denial...
Multiple vulnerabilities were identified in Ubuntu Linux Kernel. An attacker could exploit some of these vulnerabilities to trigger security restriction bypass, denial...
Multiple vulnerabilities were identified in Ubuntu Linux Kernel. An attacker could exploit some of these vulnerabilities to trigger security restriction bypass, denial...
Multiple vulnerabilities were identified in Fortinet Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service...
Microsoft has released monthly security update for their products: Vulnerable ProductRisk LevelImpactsNotesBrowser Low RiskSpoofing Developer Tools Medium RiskSpoofing Information Disclosure Security Restriction...
Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
Multiple vulnerabilities were identified in Samsung Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
Multiple vulnerabilities were identified in Android. A remote attacker could exploit some of these vulnerabilities to trigger denial of service...
Updated Description, Source and Related Links.CVE-2025-24054 is being exploited in the wild. External control of file name or path in...
Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
Microsoft has released monthly security update for their products: Vulnerable ProductRisk LevelImpactsNotesWindows High RiskRemote Code Execution Elevation of Privilege Spoofing Denial...
Multiple vulnerabilities were identified in F5 Products, attacker can exploit this vulnerability to trigger remote code execution, denial of service...
Multiple vulnerabilities were identified in Microsoft Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of...
Multiple vulnerabilities were identified in SonicWall Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of...
Exploit in the wild has been detected for CVE-2024-21410, affecting Microsoft Exchange Server. The vulnerability could be exploited by sending...
Microsoft has released monthly security update for their products: CVE-2024-29059 vulnerability is being actively exploited. An attacker can use the exposed ObjRef...
Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
Updated Description, Related Links.Proof of Concept exploit code Is publicly available for CVE-2024-43532. Updated Description, Related Links.Proof of Concept exploit code...
Microsoft has released monthly security update for their products: Vulnerable ProductRisk LevelImpactsNotesDeveloper Tools Medium RiskInformation Disclosure Remote Code Execution Elevation of...
Multiple vulnerabilities have been identified in Ivanti Products. A remote attacker could exploit these vulnerabilities to trigger remote code execution...
Updated Risk, Description, Source and Related Links.CVE-2024-30088 is being exploited in the wild. This is a Windows Kernel Time-of-check Time-of-use (TOCTOU)...
Microsoft has released monthly security update for their products: Vulnerable ProductRisk LevelImpactsNotesSystem Center Medium RiskElevation of Privilege Spoofing Microsoft Office Medium RiskElevation...
Multiple vulnerabilities were identified in Palo Alto PAN-OS. A remote user could exploit these vulnerabilities to trigger elevation of privilege...
Multiple vulnerabilities were identified in VMware products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of...