Total
48 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-3838 | 1 Google | 1 Chrome | 2024-08-06 | N/A | 5.5 MEDIUM |
Inappropriate implementation in Autofill in Google Chrome prior to 124.0.6367.60 allowed an attacker who convinced a user to install a malicious app to perform UI spoofing via a crafted app. (Chromium security severity: Medium) | |||||
CVE-2024-5500 | 1 Google | 1 Chrome | 2024-08-01 | N/A | 6.5 MEDIUM |
Inappropriate implementation in Sign-In in Google Chrome prior to 1.3.36.351 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium) | |||||
CVE-2024-27842 | 2024-08-01 | N/A | 8.1 HIGH | ||
The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5. An app may be able to execute arbitrary code with kernel privileges. | |||||
CVE-2024-25545 | 2024-08-01 | N/A | 7.8 HIGH | ||
An issue in Weave Weave Desktop v.7.78.10 allows a local attacker to execute arbitrary code via a crafted script to the nwjs framework component. | |||||
CVE-2024-6101 | 1 Google | 1 Chrome | 2024-07-03 | N/A | 8.8 HIGH |
Inappropriate implementation in V8 in Google Chrome prior to 126.0.6478.114 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High) | |||||
CVE-2024-3845 | 2024-07-03 | N/A | 9.8 CRITICAL | ||
Inappropriate implementation in Networks in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to bypass mixed content policy via a crafted HTML page. (Chromium security severity: Low) | |||||
CVE-2024-2617 | 2024-07-03 | N/A | 7.2 HIGH | ||
A vulnerability exists in the RTU500 that allows for authenticated and authorized users to bypass secure update. If a malicious actor successfully exploits this vulnerability, they could use it to update the RTU500 with unsigned firmware. | |||||
CVE-2024-23592 | 2024-04-08 | N/A | 6.3 MEDIUM | ||
An authentication bypass vulnerability was reported in Lenovo devices with Synaptics fingerprint readers that could allow an attacker with physical access to replay fingerprints and bypass Windows Hello authentication. |