| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2024-38668 | Intel Quartus Prime 代码问题漏洞 | - | Intel(R) Quartus(R) Prime Standard Edition software for Windows | Medium | 6.7 | 2024-11-13 21:11:49 | Deep Dive |
| CVE-2024-41744 | IBM CICS TX Standard cross-site request forgery | IBM | CICS TX Standard | Medium | 6.5 | 2024-11-01 16:53:33 | Deep Dive |
| CVE-2024-41745 | IBM CICS TX Standard cross-site scripting | IBM | CICS TX Standard | Medium | 6.1 | 2024-11-01 16:48:49 | Deep Dive |
| CVE-2024-8533 | Rockwell Automation OptixPanel™ Privilege Escalation Vulnerability via File Permissions | Rockwell Automation | 2800C OptixPanel™ Compact | - | - | 2024-09-12 20:06:21 | Deep Dive |
| CVE-2024-34158 | Stack exhaustion in Parse in go/build/constraint | Go standard library | go/build/constraint | 中危 | - | 2024-09-06 20:42:43 | Deep Dive |
| CVE-2024-34156 | Stack exhaustion in Decoder.Decode in encoding/gob | Go standard library | encoding/gob | 高危 | - | 2024-09-06 20:42:43 | Deep Dive |
| CVE-2024-34155 | Stack exhaustion in all Parse functions in go/parser | Go standard library | go/parser | 中危 | - | 2024-09-06 20:42:43 | Deep Dive |
| CVE-2023-38655 | Intel AMT和Intel Standard Manageability 安全漏洞 | - | Intel(R) AMT and Intel(R) Standard Manageability | Medium | 6.8 | 2024-08-14 13:45:43 | Deep Dive |
| CVE-2023-42010 | IBM Sterling B2B Integrator Standard Edition information disclosure | IBM | Sterling B2B Integrator Standard Edition | Low | 3.1 | 2024-07-17 17:18:38 | Deep Dive |
| CVE-2024-24791 | Denial of service due to improper 100-continue handling in net/http | Go standard library | net/http | - | - | 2024-07-02 21:28:26 | Deep Dive |
| CVE-2023-42014 | IBM Sterling B2B Integrator Standard Edition cross-site scripting | IBM | Sterling B2B Integrator Standard Edition | Medium | 5.4 | 2024-06-27 18:00:43 | Deep Dive |
| CVE-2023-42011 | IBM Sterling B2B Integrator Standard Edition tapjacking | IBM | Sterling B2B Integrator Standard Edition | Medium | 4.3 | 2024-06-27 17:39:05 | Deep Dive |
| CVE-2024-36497 | Unhashed Storage of Password | Faronics | WINSelect (Standard + Enterprise) | - | - | 2024-06-24 09:06:04 | Deep Dive |
| CVE-2024-36496 | Hardcoded Credentials | Faronics | WINSelect (Standard + Enterprise) | - | - | 2024-06-24 09:04:18 | Deep Dive |
| CVE-2024-36495 | Read/Write Permissions for Everyone on Configuration File | Faronics | WINSelect (Standard + Enterprise) | - | - | 2024-06-24 08:50:07 | Deep Dive |
| CVE-2024-24789 | Mishandling of corrupt central directory record in archive/zip | Go standard library | archive/zip | - | - | 2024-06-05 15:13:52 | Deep Dive |
| CVE-2024-24790 | Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses in net/netip | Go standard library | net/netip | - | - | 2024-06-05 15:13:51 | Deep Dive |
| CVE-2024-21862 | Intel Quartus Prime 安全漏洞 | - | Intel(R) Quartus(R) Prime Standard Edition Design software | Medium | 6.7 | 2024-05-16 20:47:07 | Deep Dive |
| CVE-2024-24788 | Malformed DNS message can cause infinite loop in net | Go standard library | net | - | - | 2024-05-08 15:31:12 | Deep Dive |
| CVE-2023-27321 | OPC Foundation UA .NET Standard ConditionRefresh Resource Exhaustion Denial-of-Service Vulnerability | OPC Foundation | UA .NET Standard | - | - | 2024-05-07 22:55:02 | Deep Dive |