NA - CVE-2025-24795 - The Snowflake Connector for Python provides an...
The Snowflake Connector for Python provides an interface for developing Python applications that can connect to Snowflake and perform all standard operations. Snowflake discovered and remediated a...
NA - CVE-2025-24884 - kube-audit-rest is a simple logger of...
kube-audit-rest is a simple logger of mutation/creation requests to the k8s api. If the "full-elastic-stack" example vector configuration was used for a real cluster, the previous values of...
High - CVE-2024-11187 - It is possible to construct a zone such that...
It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either...
High - CVE-2024-12705 - Clients using DNS-over-HTTPS (DoH) can exhaust...
Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through...
NA - CVE-2024-23733 - The /WmAdmin/,/invoke/vm.server/login login...
The /WmAdmin/,/invoke/vm.server/login login page in the Integration Server in Software AG webMethods 10.15.0 before Core_Fix7 allows remote attackers to reach the administration panel and discover...
NA - CVE-2024-48761 - The specific component in Celk Saude 3.1.252.1...
The specific component in Celk Saude 3.1.252.1 that processes user input and returns error messages to the client is vulnerable due to improper validation or sanitization of the "erro" parameter....
NA - CVE-2024-54852 - When LDAP connection is activated in Teedy...
When LDAP connection is activated in Teedy versions between 1.9 to 1.12, the username field of the login form is vulnerable to LDAP injection. Due to improper sanitization of user input, an...
NA - CVE-2024-57395 - Password Vulnerability in Safety production...
Password Vulnerability in Safety production process management system v1.0 allows a remote attacker to escalate privileges, execute arbitrary code and obtain sensitive information via the password...