|
306371
|
- |
|
microsoft
|
internet_explorer windows_2003_server windows_7 windows_server_2003 windows_server_2008 windows_vista windows_xp
|
Use-after-free vulnerability in mstime.dll in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via vectors related to the TIME2 behavior, the CTimeAction object, and de…
|
CWE-94
Code Injection
|
CVE-2010-0492
|
2024-10-22 02:35 |
2010-04-1 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
306372
|
- |
|
microsoft
|
internet_explorer
|
Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly ini…
|
CWE-94
Code Injection
|
CVE-2010-0248
|
2024-10-22 02:35 |
2010-01-23 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
306373
|
- |
|
-
|
-
|
Improper Input Validation in the admin portal of Ivanti Connect Secure before 22.7R2.1 and 9.1R18.9, or Ivanti Policy Secure before 22.7R1.1 allows a remote authenticated attacker to achieve remote c…
|
-
|
CVE-2024-37404
|
2024-10-22 02:10 |
2024-10-19 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
306374
|
- |
|
-
|
-
|
Ivanti DSM < version 2024.2 allows authenticated users on the local machine to run code with elevated privileges due to insecure ACL via unspecified attack vector.
|
-
|
CVE-2024-29821
|
2024-10-22 02:10 |
2024-10-19 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
306375
|
- |
|
-
|
-
|
Ivanti DSM < version 2024.2 allows authenticated users on the local machine to run code with elevated privileges due to insecure ACL via unspecified attack vector.
|
-
|
CVE-2024-29213
|
2024-10-22 02:10 |
2024-10-19 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
306376
|
- |
|
-
|
-
|
In J2eeFAST <=2.7, the backend function has unsafe filtering, which allows an attacker to trigger certain sensitive functions resulting in arbitrary code execution.
|
-
|
CVE-2024-45944
|
2024-10-22 02:10 |
2024-10-19 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
306377
|
- |
|
-
|
-
|
Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.24, contains a Use of a Broken or Risky Cryptographic Algorithm vulnerability. A low privileged attacker with remote access could p…
|
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
|
CVE-2024-48016
|
2024-10-22 02:10 |
2024-10-19 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
306378
|
- |
|
-
|
-
|
Dell Secure Connect Gateway (SCG) 5.0 Appliance - SRS, version(s) 5.24, contains an Improper Certificate Validation vulnerability. A low privileged attacker with remote access could potentially explo…
|
CWE-295
Improper Certificate Validation
|
CVE-2024-47241
|
2024-10-22 02:10 |
2024-10-19 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
306379
|
- |
|
-
|
-
|
ACON is a widely-used library of tools for machine learning that focuses on adaptive correlation optimization. A potential vulnerability has been identified in the input validation process, which cou…
|
CWE-20
Improper Input Validation
|
CVE-2024-49361
|
2024-10-22 02:10 |
2024-10-19 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
306380
|
- |
|
-
|
-
|
secp256k1-node is a Node.js binding for an Optimized C library for EC operations on curve secp256k1. In `elliptic`-based version, `loadUncompressedPublicKey` has a check that the public key is on the…
|
CWE-354
Improper Validation of Integrity Check Value
|
CVE-2024-48930
|
2024-10-22 02:09 |
2024-10-22 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|