NA - CVE-2024-52541 - Dell Client Platform BIOS contains a Weak...
Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.
NA - CVE-2025-0999 - Heap buffer overflow in V8 in Google Chrome...
Heap buffer overflow in V8 in Google Chrome prior to 133.0.6943.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
NA - CVE-2025-1006 - Use after free in Network in Google Chrome...
Use after free in Network in Google Chrome prior to 133.0.6943.126 allowed a remote attacker to potentially exploit heap corruption via a crafted web app. (Chromium security severity: Medium)
NA - CVE-2025-1426 - Heap buffer overflow in GPU in Google Chrome on...
Heap buffer overflow in GPU in Google Chrome on Android prior to 133.0.6943.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security...
NA - CVE-2025-24965 - crun is an open source OCI Container Runtime...
crun is an open source OCI Container Runtime fully written in C. In affected versions A malicious container image could trick the krun handler into escaping the root filesystem, allowing file...
NA - CVE-2025-27089 - Directus is a real-time API and App dashboard...
Directus is a real-time API and App dashboard for managing SQL database content. In affected versions if there are two overlapping policies for the `update` action that allow access to different...
Medium - CVE-2024-45777 - A flaw was found in grub2. The calculation of...
A flaw was found in grub2. The calculation of the translation buffer when reading a language .mo file in grub_gettext_getstr_from_position() may overflow, leading to a Out-of-bound write. This...
Medium - CVE-2024-53974 - Adobe Experience Manager versions 6.5.21 and...
Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts...