CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-51122

Description: Cross Site Scripting vulnerability in Zertificon Z1 SecureMail Z1 CertServer v.3.16.4-2516-debian12 alllows a remote attacker to execute arbitrary code via the ST, L, O, OU, CN parameters.

EPSS Score: 0.04%

Source: CVE
February 13th, 2025 (5 months ago)

CVE-2024-47006

Description: Uncontrolled search path for the Intel(R) RealSense D400 Series Universal Windows Platform (UWP) Driver for Windows(R) 10 all versions may allow an authenticated user to potentially enable escalation of privilege via local access.

CVSS: MEDIUM (5.4)

EPSS Score: 0.04%

Source: CVE
February 13th, 2025 (5 months ago)

CVE-2024-46923

Description: An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, and 2400. The absence of a null check leads to a Denial of Service at amdgpu_cs_ib_fill in the Xclipse Driver.

EPSS Score: 0.04%

Source: CVE
February 13th, 2025 (5 months ago)

CVE-2024-46922

Description: An issue was discovered in Samsung Mobile Processor Exynos 1480 and 2400. The absence of a null check leads to a Denial of Service at amdgpu_cs_parser_bos in the Xclipse Driver.

EPSS Score: 0.04%

Source: CVE
February 13th, 2025 (5 months ago)

CVE-2024-45461

Description: The CloudStack Quota feature allows cloud administrators to implement a quota or usage limit system for cloud resources, and is disabled by default. In environments where the feature is enabled, due to missing access check enforcements, non-administrative CloudStack user accounts are able to access and modify quota-related configurations and data. This issue affects Apache CloudStack from 4.7.0 through 4.18.2.3; and from 4.19.0.0 through 4.19.1.1, where the Quota feature is enabled. Users are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue. Alternatively, users that do not use the Quota feature are advised to disabled the plugin by setting the global setting "quota.enable.service" to "false".

EPSS Score: 0.07%

Source: CVE
February 13th, 2025 (5 months ago)

CVE-2024-42492

Description: Uncontrolled search path element in some BIOS and System Firmware Update Package for Intel(R) Server M50FCP family before version R01.02.0002 may allow a privileged user to potentially enable escalation of privilege via local access.

CVSS: MEDIUM (5.4)

EPSS Score: 0.04%

Source: CVE
February 13th, 2025 (5 months ago)

CVE-2024-42419

Description: Incorrect default permissions for some Intel(R) GPA and Intel(R) GPA Framework software installers may allow an authenticated user to potentially enable escalation of privilege via local access.

CVSS: MEDIUM (5.4)

EPSS Score: 0.04%

Source: CVE
February 13th, 2025 (5 months ago)

CVE-2024-42410

Description: Improper input validation in some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable denial of service via local access.

CVSS: MEDIUM (6.8)

EPSS Score: 0.04%

Source: CVE
February 13th, 2025 (5 months ago)

CVE-2024-42405

Description: Uncontrolled search path for some Intel(R) Quartus(R) Prime Software before version 23.1.1 Patch 1.01std may allow an authenticated user to potentially enable escalation of privilege via local access.

CVSS: MEDIUM (5.4)

EPSS Score: 0.04%

Source: CVE
February 13th, 2025 (5 months ago)

CVE-2024-41934

Description: Improper access control in some Intel(R) GPA software before version 2024.3 may allow an authenticated user to potentially enable denial of service via local access.

CVSS: MEDIUM (4.1)

EPSS Score: 0.04%

Source: CVE
February 13th, 2025 (5 months ago)