Total
8 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-30058 | 2024-07-03 | N/A | 5.4 MEDIUM | ||
Microsoft Edge (Chromium-based) Spoofing Vulnerability | |||||
CVE-2024-29057 | 1 Microsoft | 1 Edge | 2024-06-11 | N/A | 4.3 MEDIUM |
Microsoft Edge (Chromium-based) Spoofing Vulnerability | |||||
CVE-2024-26188 | 2024-06-11 | N/A | 4.3 MEDIUM | ||
Microsoft Edge (Chromium-based) Spoofing Vulnerability | |||||
CVE-2024-21387 | 1 Microsoft | 1 Edge Chromium | 2024-06-11 | N/A | 5.3 MEDIUM |
Microsoft Edge for Android Spoofing Vulnerability | |||||
CVE-2024-21336 | 1 Microsoft | 1 Edge Chromium | 2024-06-11 | N/A | 2.5 LOW |
Microsoft Edge (Chromium-based) Spoofing Vulnerability | |||||
CVE-2022-41904 | 1 Element | 1 Element | 2022-11-16 | N/A | 6.5 MEDIUM |
Element iOS is an iOS Matrix client provided by Element. It is based on MatrixSDK. Prior to version 1.9.7, events encrypted using Megolm for which trust could not be established did not get decorated accordingly (with warning shields). Therefore a malicious homeserver could inject messages into the room without the user being alerted that the messages were not sent by a verified group member, even if the user has previously verified all group members. This issue has been patched in Element iOS 1.9.7. There are currently no known workarounds. | |||||
CVE-2021-22645 | 2 Luxion, Siemens | 8 Keyshot, Keyshot Network Rendering, Keyshot Viewer and 5 more | 2021-03-23 | 6.8 MEDIUM | 7.8 HIGH |
Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are vulnerable to an attack because the .bip documents display a “load” command, which can be pointed to a .dll from a remote network share. As a result, the .dll entry point can be executed without sufficient UI warning. | |||||
CVE-2019-13521 | 1 Rockwellautomation | 1 Arena Simulation | 2020-02-03 | 6.8 MEDIUM | 7.8 HIGH |
A maliciously crafted program file opened by an unsuspecting user of Rockwell Automation Arena Simulation Software version 16.00.00 and earlier may result in the limited exposure of information related to the targeted workstation. Rockwell Automation has released version 16.00.01 of Arena Simulation Software to address the reported vulnerabilities. |