Use after free in WebRTC in Google Chrome on Linux prior to 148.0.7778.179 allowed a remote attacker to...
NVIDIA BioNeMo Core for Linux contains a vulnerability where a user could cause a path traversal by loading...
InfoScale CmdServer before 7.4.2 mishandles access control.
Cross-Site Request Forgery (CSRF) vulnerability in InfoScale v.9.1.3 Operations Manager (VIOM) allows an attacker to force the user...
Twig versions 2.16.x and 3.9.0 through 3.25.x contain a sandbox bypass vulnerability when using a SourcePolicyInterface that allows...
Improper Control of Generation of Code ('Code Injection') vulnerability in Mesalvo Meona Client Launcher Component, Mesalvo Meona Server...
An undocumented configuration export port is accessible on some models of ZKTeco CCTV cameras. This port does not...
Unrestricted Upload of File with Dangerous Type vulnerability in WP Swings Gift Cards For WooCommerce Pro allows Using...
A vulnerability in the access validation of internal REST APIs of Cisco Secure Workload could allow an unauthenticated, remote...
Improper link resolution before file access ('link following') in Microsoft Defender allows an authorized attacker to elevate privileges...
Welcome to WordPress. This is your first post. Edit or delete it, then start writing!