Severity High Analysis Summary The vulnerability dubbed “Spectre” affected microprocessors that performed branch prediction as a method of improving system performance when evaluating complex instruction paths […]
Severity High Analysis Summary Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could result in arbitrary code execution. These vulnerabilities can […]
Severity High Analysis Summary KDE is vulnerable to a command injection vulnerability in the KDesktopFile class. When a .desktop or .directory file is instantiated, it unsafely […]
Severity High Analysis Summary PowerShell can potentially execute arbitrary code when running specially named scripts due to trusting unsanitized filenames. This occurs when “.ps1” files contain […]
Severity High Analysis Summary The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate […]
Severity Medium Analysis Summary The vulnerability is due to insufficient validation of the firmware image file. An attacker could exploit this vulnerability by executing the BIOS […]
Severity Medium Analysis Summary Processing specially crafted MCR files lacking proper validation of user supplied data may cause the system to write outside the intended buffer […]
Severity Medium Analysis Summary The application fails to prevent an exception handler from being overwritten with arbitrary code. Impact Denial of service Affected Vendors National Renewable […]
Severity Medium Analysis Summary CVE 2019-10976 This vulnerability is triggered when input passed to the XML parser is not sanitized while parsing the XML project and/or […]