CVE-2022-2795
By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution…
Read morePage 6/27.
CVEs without a recognized CWE (not present in the CWE map or marked as N/A).
By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution…
Read moreThis issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.4, macOS Big Sur 11.6.6. An app may be able to bypass Privacy preferences.
Read moreA logic issue was addressed with improved restrictions. This issue is fixed in iOS 16, iOS 15.7 and iPadOS 15.7. A person with physical access to an iOS device may be able to access photos from the l…
Read moreA logic issue was addressed with improved state management. This issue is fixed in Safari 16, iOS 16, iOS 15.7 and iPadOS 15.7. A website may be able to track users through Safari web extensions.
Read moreThe issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An app may be able to disclose kernel memory.
Read moreA logic issue was addressed with improved state management. This issue is fixed in Safari 15.6, macOS Monterey 12.5. A user may be tracked through their IP address.
Read moreThis issue was addressed with improved checks. This issue is fixed in iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An app may be able to bypass Privacy preferences.
Read moreThis issue was addressed with improved checks. This issue is fixed in iOS 16, iOS 15.7 and iPadOS 15.7. Visiting a malicious website may lead to address bar spoofing.
Read moreA local Denial of Service (DoS) and local arbitrary code execution vulnerability that could potentially lead to a loss of confidentiality, integrity, and availability were discovered in HPE Integrate…
Read moreA vulnerability in the ClearPass OnGuard macOS agent could allow malicious users on a macOS instance to elevate their user privileges. A successful exploit could allow these users to execute arbitrar…
Read moreMicrosoft Endpoint Configuration Manager Spoofing Vulnerability
Read moreMicro-Star International Co., Ltd MSI Center 1.0.50.0 was discovered to contain a vulnerability in the component C_Features of MSI.CentralServer.exe. This vulnerability allows attackers to escalate p…
Read moreA potential unathenticated file deletion vulnerabilty on Trend Micro Mobile Security for Enterprise 9.8 SP5 could allow an attacker with access to the Management Server to delete files. This issue wa…
Read moreA vulnerability in Trend Micro Apex One and Apex One as a Service could allow an attacker to intercept and decode certain communication strings that may contain some identification attributes of a pa…
Read moreImproper validation of some components used by the rollback mechanism in Trend Micro Apex One and Trend Micro Apex One as a Service clients could allow a Apex One server administrator to instruct aff…
Read moreThe d8s-pdfs for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package. The affected version is 0.…
Read moreThe d8s-ip-addresses for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected versio…
Read moreThe d8s-dicts for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is 0.…
Read moreThe d8s-utility for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is…
Read moreThe d8s-ip-addresses for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected versio…
Read moreThe d8s-mpeg for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1…
Read moreThe d8s-asns for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1…
Read moreThe d8s-html for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is 0.1…
Read moreThe d8s-urls for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package. The affected version is 0.…
Read moreThe d8s-dates for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is 0.…
Read moreThe d8s-domains for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is…
Read moreThe d8s-uuids for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-hypothesis package. The affected version is 0.…
Read moreThe d8s-urls for python 0.1.0, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the dem…
Read moreThe d8s-domains for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-networking package. The affected version is…
Read moreThe d8s-urls for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritu…
Read moreThe d8s-urls for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The affected version is 0.1.0.
Read moreSafe Software FME Server v2021.2.5 and below does not employ server-side validation.
Read moreWhen logging in to a VBASE runtime project via Web-Remote, the product uses XOR with a static initial key to obfuscate login messages. An unauthenticated remote attacker with the ability to capture a…
Read moreIncorrect access control in Watchdog Anti-Virus v1.4.158 allows attackers to perform a DLL hijacking attack and execute arbitrary code via a crafted binary.
Read moreDoufox v0.0.4 was discovered to contain a remote code execution (RCE) vulnerability via the edit file page. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
Read moreThe HwChrService module has a vulnerability in permission control. Successful exploitation of this vulnerability may cause disclosure of user network information.
Read moreThe iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup.
Read moreThe AOD module has the improper update of reference count vulnerability. Successful exploitation of this vulnerability may affect data integrity, confidentiality, and availability.
Read moreThe secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality.
Read moreThe secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability.
Read moreThe secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability.
Read moreThe secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality.
Read moreThe secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability.
Read moreThe secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality.
Read moreThe secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality.
Read moreThe secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability.
Read moreThe secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability.
Read moreThe secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality.
Read moreThe secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability.
Read moreThe secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality.
Read moreThe secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality.
Read moreImplementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.
Read moreImplementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.
Read moreConfiguration defects in the secure OS module. Successful exploitation of this vulnerability will affect confidentiality.
Read moreOASES (aka Open Aviation Strategic Engineering System) 8.8.0.2 allows attackers to execute arbitrary code via the Open Print Folder menu.
Read moreTestLink 1.9.20 Raijin was discovered to contain a broken access control vulnerability at /lib/attachments/attachmentdownload.php
Read moreImproper authorization of a replayed LTE security mode command can lead to a denial of service in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Ind…
Read moreSuper Flexible Software GmbH & Co. KG Syncovery 9 for Linux v9.47x and below was discovered to contain multiple remote code execution (RCE) vulnerabilities via the Job_ExecuteBefore and Job_ExecuteAf…
Read moreBolt CMS contains a vulnerability in version 5.1.12 and below that allows an authenticated user with the ROLE_EDITOR privileges to upload and rename a malicious file to achieve remote code execution.
Read moreThere is a remote code execution (RCE) vulnerability in Tenhot TWS-100 V4.0-201809201424 router device. It is necessary to know that the device account password is allowed to escape the execution sys…
Read moreThe login form /Login in ECi Printanista Hub (formerly FMAudit Printscout) before 5.5.2 (July 2023) performs expensive RSA key-generation operations, which allows attackers to cause a denial of servi…
Read moreAn issue was discovered in Nokia FastMile 5G Receiver 5G14-B 1.2104.00.0281. Bluetooth on the Nokia ODU uses outdated pairing mechanisms, allowing an attacker to passively intercept a paring handshak…
Read moreAn issue was discovered in Bento4 1.6.0-639. There ie excessive memory consumption in AP4_CttsAtom::Create in Core/Ap4CttsAtom.cpp.
Read moreSmartRG SR506n 2.5.15 and SR510n 2.6.13 routers are vulnerable to Remote Code Execution (RCE) via the ping host feature.
Read moreThe mobile application in Transtek Mojodat FAM (Fixed Asset Management) 2.4.6 allows remote attackers to fetch other users' data upon a successful login request.
Read moreThe mobile application in Transtek Mojodat FAM (Fixed Asset Management) 2.4.6 allows remote attackers to fetch cleartext passwords upon a successful login request.
Read moreThe mobile application in Transtek Mojodat FAM (Fixed Asset Management) 2.4.6 allows remote attackers to bypass authorization.
Read moreCuppaCMS 1.0 is vulnerable to Remote Code Execution (RCE). An authenticated user can control both parameters (action and function) from "/api/index.php.
Read moreInsufficient access control vulnerability was discovered in the Crestron AirMedia Windows Application, version 4.3.1.39, in which a user can pause the uninstallation of an executable to gain a SYSTEM…
Read moreIBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the invscout command to obtain root privileges. IBM X-Force ID: 232014.
Read moreIBM Db2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, 11.1, and 11.5 is vulnerable to a denial of service after entering a malformed SQL statement into the Db2expln tool. IBM X-Force ID: 230823.
Read moreIBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged local user to exploit a vulnerability in the AIX kernel to obtain root privileges. IBM X-Force ID: 230502.
Read moreIBM Control Desk 7.6.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting…
Read moreSummary:Product: AndroidVersions: Android SoCAndroid ID: A-238257000
Read moreSummary:Product: AndroidVersions: Android SoCAndroid ID: A-238257002
Read moreSummary:Product: AndroidVersions: Android SoCAndroid ID: A-238257004
Read moreSummary:Product: AndroidVersions: Android SoCAndroid ID: A-238227323
Read moreSummary:Product: AndroidVersions: Android SoCAndroid ID: A-238227324
Read moreSummary:Product: AndroidVersions: Android SoCAndroid ID: A-238227328
Read moreVisual Studio Code Elevation of Privilege Vulnerability
Read moreAV1 Video Extension Remote Code Execution Vulnerability
Read more.NET Core and Visual Studio Denial of Service Vulnerability
Read moreMicrosoft Edge (Chromium-based) Remote Code Execution Vulnerability
Read moreRaw Image Extension Remote Code Execution Vulnerability
Read moreMicrosoft Office Visio Remote Code Execution Vulnerability
Read moreMicrosoft SharePoint Server Remote Code Execution Vulnerability
Read moreMicrosoft SharePoint Server Remote Code Execution Vulnerability
Read moreAzure Guest Configuration and Azure Arc-enabled servers Elevation of Privilege Vulnerability
Read moreWindows Graphics Component Information Disclosure Vulnerability
Read moreWindows Print Spooler Elevation of Privilege Vulnerability
Read moreWindows Fax Service Remote Code Execution Vulnerability
Read moreWindows Kernel Elevation of Privilege Vulnerability
Read moreMicrosoft Office Visio Remote Code Execution Vulnerability
Read moreMicrosoft PowerPoint Remote Code Execution Vulnerability
Read moreMicrosoft SharePoint Server Remote Code Execution Vulnerability
Read moreNetwork Device Enrollment Service (NDES) Security Feature Bypass Vulnerability
Read moreSPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability
Read moreWindows Kernel Elevation of Privilege Vulnerability
Read moreWindows Kernel Elevation of Privilege Vulnerability
Read moreWindows Group Policy Elevation of Privilege Vulnerability
Read moreDirectX Graphics Kernel Elevation of Privilege Vulnerability
Read moreWindows Enterprise App Management Service Remote Code Execution Vulnerability
Read moreMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Read moreHTTP V3 Denial of Service Vulnerability
Read moreWindows Graphics Component Information Disclosure Vulnerability
Read moreMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Read moreMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Read moreMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Read moreWindows Secure Channel Denial of Service Vulnerability
Read moreWindows Event Tracing Denial of Service Vulnerability
Read moreRemote Procedure Call Runtime Remote Code Execution Vulnerability
Read moreMicrosoft Defender for Endpoint for Mac Elevation of Privilege Vulnerability
Read moreMicrosoft SharePoint Remote Code Execution Vulnerability
Read moreMicrosoft Dynamics CRM (on-premises) Remote Code Execution Vulnerability
Read moreWindows Common Log File System Driver Elevation of Privilege Vulnerability
Read moreMicrosoft ODBC Driver Remote Code Execution Vulnerability
Read moreMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Read moreMicrosoft ODBC Driver Remote Code Execution Vulnerability
Read moreMicrosoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
Read moreMicrosoft ODBC Driver Remote Code Execution Vulnerability
Read more