CVE Alert: CVE-2024-11955
Vulnerability Summary: CVE-2024-11955 A vulnerability was found in GLPI up to 10.0.17. It has been declared as problematic. Affected by...
Vulnerability Summary: CVE-2024-11955 A vulnerability was found in GLPI up to 10.0.17. It has been declared as problematic. Affected by...
Vulnerability Summary: CVE-2025-21627 GLPI is a free asset and IT management software package. In versions prior to 10.0.18, a malicious...
Vulnerability Summary: CVE-2025-26595 A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized...
Vulnerability Summary: CVE-2025-26596 A heap overflow flaw was found in X.Org and Xwayland. The computation of the length in XkbSizeKeySyms()...
Vulnerability Summary: CVE-2025-26600 A use-after-free flaw was found in X.Org and Xwayland. When a device is removed while still frozen,...
Vulnerability Summary: CVE-2025-26594 A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X...
Vulnerability Summary: CVE-2025-26601 A use-after-free flaw was found in X.Org and Xwayland. When changing an alarm, the values of the...
Vulnerability Summary: CVE-2025-25192 GLPI is a free asset and IT management software package. Prior to version 10.0.18, a low privileged...
Vulnerability Summary: CVE-2025-26599 An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may...
Vulnerability Summary: CVE-2024-12368 Improper access control in the auth_oauth module of Odoo Community 15.0 and Odoo Enterprise 15.0 allows an...
Vulnerability Summary: CVE-2025-1067 There is an untrusted search path vulnerability in Esri ArcGIS Pro 3.3 and 3.4 that may allow...
Vulnerability Summary: CVE-2025-1068 There is an untrusted search path vulnerability in Esri ArcGIS AllSource 1.2 and 1.3 that may allow...
Vulnerability Summary: CVE-2024-36259 Improper access control in mail module of Odoo Community 17.0 and Odoo Enterprise 17.0 allows remote authenticated...
Vulnerability Summary: CVE-2024-45426 Incorrect ownership assignment in some Zoom Workplace Apps may allow a privileged user to conduct an information...
Vulnerability Summary: CVE-2024-45421 Buffer overflow in some Zoom Apps may allow an authenticated user to conduct an escalation of privilege...
Vulnerability Summary: CVE-2024-45424 Business logic error in some Zoom Workplace Apps may allow an unauthenticated user to conduct a disclosure...
Vulnerability Summary: CVE-2024-45425 Incorrect user management in some Zoom Workplace Apps may allow a privileged user to conduct an information...
Vulnerability Summary: CVE-2024-27239 Use after free in some Zoom Workplace Apps and SDKs may allow an authenticated user to conduct...
Vulnerability Summary: CVE-2025-27146 matrix-appservice-irc is a Node.js IRC bridge for Matrix. The matrix-appservice-irc bridge up to version 3.0.3 contains a...
Vulnerability Summary: CVE-2025-27139 Combodo iTop is a web based IT service management tool. Versions prior to 2.7.12, 3.1.2, and 3.2.0...
Vulnerability Summary: CVE-2024-45417 Uncontrolled resource consumption in the installer for some Zoom apps for macOS before version 6.1.5 may allow...
Vulnerability Summary: CVE-2024-45418 Symlink following in the installer for some Zoom apps for macOS before version 6.1.5 may allow an...
Vulnerability Summary: CVE-2024-53870 NVIDIA CUDA toolkit for all platforms contains a vulnerability in the cuobjdump binary, where a user could...
Vulnerability Summary: CVE-2024-27246 Use after free in some Zoom Workplace Apps and SDKs may allow an authenticated user to conduct...