CVE-2023-20593
An issue in “Zen 2â€� CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information. Zafiyet ile ilgili Genel Bilgi, Etki…
An issue in “Zen 2â€� CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information. Zafiyet ile ilgili Genel Bilgi, Etki…
Apache Shiro, before 1.12.0 or 2.0.0-alpha-3, may be susceptible to a path traversal attack that results in an authentication bypass when used together with APIs…
Atera Agent through 1.8.3.6 on Windows Creates a Temporary File in a Directory with Insecure Permissions. Zafiyet ile ilgili Genel Bilgi, Etki ve Çözümleri için…
A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit…
A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit…
A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit…
A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit…
A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged…
A flaw was found in the Quay registry. While the image labels created through Quay undergo validation both in the UI and backend by applying…
A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. When a local user in the guest writes an executable file with…